[S390] cpcmd with vmalloc addresses.
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / arch / s390 / kernel / cpcmd.c
CommitLineData
1da177e4
LT
1/*
2 * arch/s390/kernel/cpcmd.c
3 *
4 * S390 version
6b979de3 5 * Copyright (C) 1999,2005 IBM Deutschland Entwicklung GmbH, IBM Corporation
1da177e4
LT
6 * Author(s): Martin Schwidefsky (schwidefsky@de.ibm.com),
7 * Christian Borntraeger (cborntra@de.ibm.com),
8 */
9
10#include <linux/kernel.h>
11#include <linux/module.h>
12#include <linux/slab.h>
13#include <linux/spinlock.h>
14#include <linux/stddef.h>
15#include <linux/string.h>
16#include <asm/ebcdic.h>
17#include <asm/cpcmd.h>
18#include <asm/system.h>
bda3563f 19#include <asm/io.h>
1da177e4
LT
20
21static DEFINE_SPINLOCK(cpcmd_lock);
6b979de3 22static char cpcmd_buf[241];
1da177e4
LT
23
24/*
740b5706
HC
25 * __cpcmd has some restrictions over cpcmd
26 * - the response buffer must reside below 2GB (if any)
27 * - __cpcmd is unlocked and therefore not SMP-safe
1da177e4 28 */
6b979de3 29int __cpcmd(const char *cmd, char *response, int rlen, int *response_code)
1da177e4 30{
740b5706 31 unsigned cmdlen;
94c12cc7 32 int return_code, return_len;
1da177e4 33
1da177e4
LT
34 cmdlen = strlen(cmd);
35 BUG_ON(cmdlen > 240);
6b979de3 36 memcpy(cpcmd_buf, cmd, cmdlen);
1da177e4
LT
37 ASCEBC(cpcmd_buf, cmdlen);
38
39 if (response != NULL && rlen > 0) {
94c12cc7
MS
40 register unsigned long reg2 asm ("2") = (addr_t) cpcmd_buf;
41 register unsigned long reg3 asm ("3") = (addr_t) response;
42 register unsigned long reg4 asm ("4") = cmdlen | 0x40000000L;
43 register unsigned long reg5 asm ("5") = rlen;
44
1da177e4 45 memset(response, 0, rlen);
94c12cc7 46 asm volatile(
347a8dc3 47#ifndef CONFIG_64BIT
94c12cc7
MS
48 " diag %2,%0,0x8\n"
49 " brc 8,1f\n"
50 " ar %1,%4\n"
347a8dc3 51#else /* CONFIG_64BIT */
94c12cc7
MS
52 " sam31\n"
53 " diag %2,%0,0x8\n"
54 " sam64\n"
55 " brc 8,1f\n"
56 " agr %1,%4\n"
347a8dc3 57#endif /* CONFIG_64BIT */
94c12cc7
MS
58 "1:\n"
59 : "+d" (reg4), "+d" (reg5)
60 : "d" (reg2), "d" (reg3), "d" (rlen) : "cc");
61 return_code = (int) reg4;
62 return_len = (int) reg5;
1da177e4
LT
63 EBCASC(response, rlen);
64 } else {
94c12cc7
MS
65 register unsigned long reg2 asm ("2") = (addr_t) cpcmd_buf;
66 register unsigned long reg3 asm ("3") = cmdlen;
6b979de3 67 return_len = 0;
94c12cc7 68 asm volatile(
347a8dc3 69#ifndef CONFIG_64BIT
94c12cc7 70 " diag %1,%0,0x8\n"
347a8dc3 71#else /* CONFIG_64BIT */
94c12cc7
MS
72 " sam31\n"
73 " diag %1,%0,0x8\n"
74 " sam64\n"
347a8dc3 75#endif /* CONFIG_64BIT */
94c12cc7
MS
76 : "+d" (reg3) : "d" (reg2) : "cc");
77 return_code = (int) reg3;
1da177e4 78 }
6b979de3
CB
79 if (response_code != NULL)
80 *response_code = return_code;
81 return return_len;
1da177e4
LT
82}
83
84EXPORT_SYMBOL(__cpcmd);
85
6b979de3 86int cpcmd(const char *cmd, char *response, int rlen, int *response_code)
1da177e4
LT
87{
88 char *lowbuf;
6b979de3 89 int len;
740b5706 90 unsigned long flags;
6b979de3 91
bda3563f
CB
92 if ((virt_to_phys(response) != (unsigned long) response) ||
93 (((unsigned long)response + rlen) >> 31)) {
1da177e4
LT
94 lowbuf = kmalloc(rlen, GFP_KERNEL | GFP_DMA);
95 if (!lowbuf) {
96 printk(KERN_WARNING
97 "cpcmd: could not allocate response buffer\n");
6b979de3 98 return -ENOMEM;
1da177e4 99 }
740b5706 100 spin_lock_irqsave(&cpcmd_lock, flags);
6b979de3 101 len = __cpcmd(cmd, lowbuf, rlen, response_code);
740b5706 102 spin_unlock_irqrestore(&cpcmd_lock, flags);
1da177e4
LT
103 memcpy(response, lowbuf, rlen);
104 kfree(lowbuf);
bda3563f
CB
105 } else {
106 spin_lock_irqsave(&cpcmd_lock, flags);
107 len = __cpcmd(cmd, response, rlen, response_code);
108 spin_unlock_irqrestore(&cpcmd_lock, flags);
1da177e4 109 }
6b979de3 110 return len;
1da177e4
LT
111}
112
113EXPORT_SYMBOL(cpcmd);