[SCSI] drivers/scsi: Use ARRAY_SIZE macro
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / drivers / scsi / aacraid / commctrl.c
CommitLineData
1da177e4
LT
1/*
2 * Adaptec AAC series RAID controller driver
3 * (c) Copyright 2001 Red Hat Inc. <alan@redhat.com>
4 *
5 * based on the old aacraid driver that is..
6 * Adaptec aacraid device driver for Linux.
7 *
8 * Copyright (c) 2000 Adaptec, Inc. (aacraid@adaptec.com)
9 *
10 * This program is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU General Public License as published by
12 * the Free Software Foundation; either version 2, or (at your option)
13 * any later version.
14 *
15 * This program is distributed in the hope that it will be useful,
16 * but WITHOUT ANY WARRANTY; without even the implied warranty of
17 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 * GNU General Public License for more details.
19 *
20 * You should have received a copy of the GNU General Public License
21 * along with this program; see the file COPYING. If not, write to
22 * the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA.
23 *
24 * Module Name:
25 * commctrl.c
26 *
27 * Abstract: Contains all routines for control of the AFA comm layer
28 *
29 */
30
31#include <linux/kernel.h>
32#include <linux/init.h>
33#include <linux/types.h>
34#include <linux/sched.h>
35#include <linux/pci.h>
36#include <linux/spinlock.h>
37#include <linux/slab.h>
38#include <linux/completion.h>
39#include <linux/dma-mapping.h>
40#include <linux/blkdev.h>
dc4adbf4
MH
41#include <linux/delay.h>
42#include <linux/kthread.h>
1da177e4
LT
43#include <asm/semaphore.h>
44#include <asm/uaccess.h>
45
46#include "aacraid.h"
47
48/**
49 * ioctl_send_fib - send a FIB from userspace
50 * @dev: adapter is being processed
51 * @arg: arguments to the ioctl call
52 *
53 * This routine sends a fib to the adapter on behalf of a user level
54 * program.
55 */
7c00ffa3
MH
56# define AAC_DEBUG_PREAMBLE KERN_INFO
57# define AAC_DEBUG_POSTAMBLE
1da177e4
LT
58
59static int ioctl_send_fib(struct aac_dev * dev, void __user *arg)
60{
61 struct hw_fib * kfib;
62 struct fib *fibptr;
7c00ffa3
MH
63 struct hw_fib * hw_fib = (struct hw_fib *)0;
64 dma_addr_t hw_fib_pa = (dma_addr_t)0LL;
65 unsigned size;
66 int retval;
1da177e4 67
bfb35aa8 68 fibptr = aac_fib_alloc(dev);
7c00ffa3 69 if(fibptr == NULL) {
1da177e4 70 return -ENOMEM;
7c00ffa3 71 }
1da177e4
LT
72
73 kfib = fibptr->hw_fib;
74 /*
75 * First copy in the header so that we can check the size field.
76 */
77 if (copy_from_user((void *)kfib, arg, sizeof(struct aac_fibhdr))) {
bfb35aa8 78 aac_fib_free(fibptr);
1da177e4
LT
79 return -EFAULT;
80 }
81 /*
82 * Since we copy based on the fib header size, make sure that we
83 * will not overrun the buffer when we copy the memory. Return
84 * an error if we would.
85 */
7c00ffa3
MH
86 size = le16_to_cpu(kfib->header.Size) + sizeof(struct aac_fibhdr);
87 if (size < le16_to_cpu(kfib->header.SenderSize))
88 size = le16_to_cpu(kfib->header.SenderSize);
89 if (size > dev->max_fib_size) {
6e289a90
MH
90 if (size > 2048) {
91 retval = -EINVAL;
92 goto cleanup;
93 }
7c00ffa3
MH
94 /* Highjack the hw_fib */
95 hw_fib = fibptr->hw_fib;
96 hw_fib_pa = fibptr->hw_fib_pa;
97 fibptr->hw_fib = kfib = pci_alloc_consistent(dev->pdev, size, &fibptr->hw_fib_pa);
98 memset(((char *)kfib) + dev->max_fib_size, 0, size - dev->max_fib_size);
99 memcpy(kfib, hw_fib, dev->max_fib_size);
1da177e4
LT
100 }
101
7c00ffa3
MH
102 if (copy_from_user(kfib, arg, size)) {
103 retval = -EFAULT;
104 goto cleanup;
1da177e4
LT
105 }
106
56b58712 107 if (kfib->header.Command == cpu_to_le16(TakeABreakPt)) {
1da177e4
LT
108 aac_adapter_interrupt(dev);
109 /*
110 * Since we didn't really send a fib, zero out the state to allow
111 * cleanup code not to assert.
112 */
113 kfib->header.XferState = 0;
114 } else {
bfb35aa8 115 retval = aac_fib_send(le16_to_cpu(kfib->header.Command), fibptr,
1da177e4
LT
116 le16_to_cpu(kfib->header.Size) , FsaNormal,
117 1, 1, NULL, NULL);
118 if (retval) {
7c00ffa3 119 goto cleanup;
1da177e4 120 }
bfb35aa8 121 if (aac_fib_complete(fibptr) != 0) {
7c00ffa3
MH
122 retval = -EINVAL;
123 goto cleanup;
1da177e4
LT
124 }
125 }
126 /*
127 * Make sure that the size returned by the adapter (which includes
128 * the header) is less than or equal to the size of a fib, so we
129 * don't corrupt application data. Then copy that size to the user
130 * buffer. (Don't try to add the header information again, since it
131 * was already included by the adapter.)
132 */
133
7c00ffa3
MH
134 retval = 0;
135 if (copy_to_user(arg, (void *)kfib, size))
136 retval = -EFAULT;
137cleanup:
138 if (hw_fib) {
139 pci_free_consistent(dev->pdev, size, kfib, fibptr->hw_fib_pa);
140 fibptr->hw_fib_pa = hw_fib_pa;
141 fibptr->hw_fib = hw_fib;
1da177e4 142 }
bfb35aa8 143 aac_fib_free(fibptr);
7c00ffa3 144 return retval;
1da177e4
LT
145}
146
147/**
148 * open_getadapter_fib - Get the next fib
149 *
150 * This routine will get the next Fib, if available, from the AdapterFibContext
151 * passed in from the user.
152 */
153
154static int open_getadapter_fib(struct aac_dev * dev, void __user *arg)
155{
156 struct aac_fib_context * fibctx;
157 int status;
158
159 fibctx = kmalloc(sizeof(struct aac_fib_context), GFP_KERNEL);
160 if (fibctx == NULL) {
161 status = -ENOMEM;
162 } else {
163 unsigned long flags;
164 struct list_head * entry;
165 struct aac_fib_context * context;
166
167 fibctx->type = FSAFS_NTC_GET_ADAPTER_FIB_CONTEXT;
168 fibctx->size = sizeof(struct aac_fib_context);
169 /*
170 * Yes yes, I know this could be an index, but we have a
171 * better guarantee of uniqueness for the locked loop below.
172 * Without the aid of a persistent history, this also helps
173 * reduce the chance that the opaque context would be reused.
174 */
175 fibctx->unique = (u32)((ulong)fibctx & 0xFFFFFFFF);
176 /*
177 * Initialize the mutex used to wait for the next AIF.
178 */
179 init_MUTEX_LOCKED(&fibctx->wait_sem);
180 fibctx->wait = 0;
181 /*
182 * Initialize the fibs and set the count of fibs on
183 * the list to 0.
184 */
185 fibctx->count = 0;
186 INIT_LIST_HEAD(&fibctx->fib_list);
187 fibctx->jiffies = jiffies/HZ;
188 /*
189 * Now add this context onto the adapter's
190 * AdapterFibContext list.
191 */
192 spin_lock_irqsave(&dev->fib_lock, flags);
193 /* Ensure that we have a unique identifier */
194 entry = dev->fib_list.next;
195 while (entry != &dev->fib_list) {
196 context = list_entry(entry, struct aac_fib_context, next);
197 if (context->unique == fibctx->unique) {
198 /* Not unique (32 bits) */
199 fibctx->unique++;
200 entry = dev->fib_list.next;
201 } else {
202 entry = entry->next;
203 }
204 }
205 list_add_tail(&fibctx->next, &dev->fib_list);
206 spin_unlock_irqrestore(&dev->fib_lock, flags);
207 if (copy_to_user(arg, &fibctx->unique,
208 sizeof(fibctx->unique))) {
209 status = -EFAULT;
210 } else {
211 status = 0;
212 }
213 }
214 return status;
215}
216
217/**
218 * next_getadapter_fib - get the next fib
219 * @dev: adapter to use
220 * @arg: ioctl argument
221 *
222 * This routine will get the next Fib, if available, from the AdapterFibContext
223 * passed in from the user.
224 */
225
226static int next_getadapter_fib(struct aac_dev * dev, void __user *arg)
227{
228 struct fib_ioctl f;
229 struct fib *fib;
230 struct aac_fib_context *fibctx;
231 int status;
232 struct list_head * entry;
233 unsigned long flags;
234
235 if(copy_from_user((void *)&f, arg, sizeof(struct fib_ioctl)))
236 return -EFAULT;
237 /*
238 * Verify that the HANDLE passed in was a valid AdapterFibContext
239 *
240 * Search the list of AdapterFibContext addresses on the adapter
241 * to be sure this is a valid address
242 */
243 entry = dev->fib_list.next;
244 fibctx = NULL;
245
246 while (entry != &dev->fib_list) {
247 fibctx = list_entry(entry, struct aac_fib_context, next);
248 /*
249 * Extract the AdapterFibContext from the Input parameters.
250 */
251 if (fibctx->unique == f.fibctx) { /* We found a winner */
252 break;
253 }
254 entry = entry->next;
255 fibctx = NULL;
256 }
257 if (!fibctx) {
258 dprintk ((KERN_INFO "Fib Context not found\n"));
259 return -EINVAL;
260 }
261
262 if((fibctx->type != FSAFS_NTC_GET_ADAPTER_FIB_CONTEXT) ||
263 (fibctx->size != sizeof(struct aac_fib_context))) {
264 dprintk ((KERN_INFO "Fib Context corrupt?\n"));
265 return -EINVAL;
266 }
267 status = 0;
268 spin_lock_irqsave(&dev->fib_lock, flags);
269 /*
270 * If there are no fibs to send back, then either wait or return
271 * -EAGAIN
272 */
273return_fib:
274 if (!list_empty(&fibctx->fib_list)) {
275 struct list_head * entry;
276 /*
277 * Pull the next fib from the fibs
278 */
279 entry = fibctx->fib_list.next;
280 list_del(entry);
281
282 fib = list_entry(entry, struct fib, fiblink);
283 fibctx->count--;
284 spin_unlock_irqrestore(&dev->fib_lock, flags);
285 if (copy_to_user(f.fib, fib->hw_fib, sizeof(struct hw_fib))) {
286 kfree(fib->hw_fib);
287 kfree(fib);
288 return -EFAULT;
289 }
290 /*
291 * Free the space occupied by this copy of the fib.
292 */
293 kfree(fib->hw_fib);
294 kfree(fib);
295 status = 0;
1da177e4
LT
296 } else {
297 spin_unlock_irqrestore(&dev->fib_lock, flags);
dc4adbf4
MH
298 /* If someone killed the AIF aacraid thread, restart it */
299 status = !dev->aif_thread;
300 if (status && dev->queues && dev->fsa_dev) {
301 /* Be paranoid, be very paranoid! */
302 kthread_stop(dev->thread);
303 ssleep(1);
304 dev->aif_thread = 0;
305 dev->thread = kthread_run(aac_command_thread, dev, dev->name);
306 ssleep(1);
307 }
1da177e4
LT
308 if (f.wait) {
309 if(down_interruptible(&fibctx->wait_sem) < 0) {
310 status = -EINTR;
311 } else {
312 /* Lock again and retry */
313 spin_lock_irqsave(&dev->fib_lock, flags);
314 goto return_fib;
315 }
316 } else {
317 status = -EAGAIN;
318 }
319 }
12a26d08 320 fibctx->jiffies = jiffies/HZ;
1da177e4
LT
321 return status;
322}
323
324int aac_close_fib_context(struct aac_dev * dev, struct aac_fib_context * fibctx)
325{
326 struct fib *fib;
327
328 /*
329 * First free any FIBs that have not been consumed.
330 */
331 while (!list_empty(&fibctx->fib_list)) {
332 struct list_head * entry;
333 /*
334 * Pull the next fib from the fibs
335 */
336 entry = fibctx->fib_list.next;
337 list_del(entry);
338 fib = list_entry(entry, struct fib, fiblink);
339 fibctx->count--;
340 /*
341 * Free the space occupied by this copy of the fib.
342 */
343 kfree(fib->hw_fib);
344 kfree(fib);
345 }
346 /*
347 * Remove the Context from the AdapterFibContext List
348 */
349 list_del(&fibctx->next);
350 /*
351 * Invalidate context
352 */
353 fibctx->type = 0;
354 /*
355 * Free the space occupied by the Context
356 */
357 kfree(fibctx);
358 return 0;
359}
360
361/**
362 * close_getadapter_fib - close down user fib context
363 * @dev: adapter
364 * @arg: ioctl arguments
365 *
366 * This routine will close down the fibctx passed in from the user.
367 */
368
369static int close_getadapter_fib(struct aac_dev * dev, void __user *arg)
370{
371 struct aac_fib_context *fibctx;
372 int status;
373 unsigned long flags;
374 struct list_head * entry;
375
376 /*
377 * Verify that the HANDLE passed in was a valid AdapterFibContext
378 *
379 * Search the list of AdapterFibContext addresses on the adapter
380 * to be sure this is a valid address
381 */
382
383 entry = dev->fib_list.next;
384 fibctx = NULL;
385
386 while(entry != &dev->fib_list) {
387 fibctx = list_entry(entry, struct aac_fib_context, next);
388 /*
389 * Extract the fibctx from the input parameters
390 */
391 if (fibctx->unique == (u32)(unsigned long)arg) {
392 /* We found a winner */
393 break;
394 }
395 entry = entry->next;
396 fibctx = NULL;
397 }
398
399 if (!fibctx)
400 return 0; /* Already gone */
401
402 if((fibctx->type != FSAFS_NTC_GET_ADAPTER_FIB_CONTEXT) ||
403 (fibctx->size != sizeof(struct aac_fib_context)))
404 return -EINVAL;
405 spin_lock_irqsave(&dev->fib_lock, flags);
406 status = aac_close_fib_context(dev, fibctx);
407 spin_unlock_irqrestore(&dev->fib_lock, flags);
408 return status;
409}
410
411/**
412 * check_revision - close down user fib context
413 * @dev: adapter
414 * @arg: ioctl arguments
415 *
416 * This routine returns the driver version.
417 * Under Linux, there have been no version incompatibilities, so this is
418 * simple!
419 */
420
421static int check_revision(struct aac_dev *dev, void __user *arg)
422{
423 struct revision response;
c7f47602
MH
424 char *driver_version = aac_driver_version;
425 u32 version;
426
9f30a323 427 response.compat = 1;
c7f47602
MH
428 version = (simple_strtol(driver_version,
429 &driver_version, 10) << 24) | 0x00000400;
430 version += simple_strtol(driver_version + 1, &driver_version, 10) << 16;
431 version += simple_strtol(driver_version + 1, NULL, 10);
432 response.version = cpu_to_le32(version);
433# if (defined(AAC_DRIVER_BUILD))
434 response.build = cpu_to_le32(AAC_DRIVER_BUILD);
435# else
436 response.build = cpu_to_le32(9999);
437# endif
1da177e4
LT
438
439 if (copy_to_user(arg, &response, sizeof(response)))
440 return -EFAULT;
441 return 0;
442}
443
7c00ffa3 444
1da177e4
LT
445/**
446 *
447 * aac_send_raw_scb
448 *
449 */
450
4833869e 451static int aac_send_raw_srb(struct aac_dev* dev, void __user * arg)
1da177e4
LT
452{
453 struct fib* srbfib;
454 int status;
56b58712
MH
455 struct aac_srb *srbcmd = NULL;
456 struct user_aac_srb *user_srbcmd = NULL;
457 struct user_aac_srb __user *user_srb = arg;
1da177e4
LT
458 struct aac_srb_reply __user *user_reply;
459 struct aac_srb_reply* reply;
460 u32 fibsize = 0;
461 u32 flags = 0;
462 s32 rcode = 0;
463 u32 data_dir;
464 void __user *sg_user[32];
465 void *sg_list[32];
466 u32 sg_indx = 0;
467 u32 byte_count = 0;
468 u32 actual_fibsize = 0;
469 int i;
470
471
472 if (!capable(CAP_SYS_ADMIN)){
7c00ffa3 473 dprintk((KERN_DEBUG"aacraid: No permission to send raw srb\n"));
1da177e4
LT
474 return -EPERM;
475 }
476 /*
477 * Allocate and initialize a Fib then setup a BlockWrite command
478 */
bfb35aa8 479 if (!(srbfib = aac_fib_alloc(dev))) {
5d497cec 480 return -ENOMEM;
1da177e4 481 }
bfb35aa8 482 aac_fib_init(srbfib);
1da177e4
LT
483
484 srbcmd = (struct aac_srb*) fib_data(srbfib);
485
7c00ffa3 486 memset(sg_list, 0, sizeof(sg_list)); /* cleanup may take issue */
1da177e4 487 if(copy_from_user(&fibsize, &user_srb->count,sizeof(u32))){
7c00ffa3 488 dprintk((KERN_DEBUG"aacraid: Could not copy data size from user\n"));
1da177e4
LT
489 rcode = -EFAULT;
490 goto cleanup;
491 }
492
7c00ffa3 493 if (fibsize > (dev->max_fib_size - sizeof(struct aac_fibhdr))) {
1da177e4
LT
494 rcode = -EINVAL;
495 goto cleanup;
496 }
497
4645df10 498 user_srbcmd = kmalloc(fibsize, GFP_KERNEL);
7c00ffa3
MH
499 if (!user_srbcmd) {
500 dprintk((KERN_DEBUG"aacraid: Could not make a copy of the srb\n"));
501 rcode = -ENOMEM;
502 goto cleanup;
503 }
56b58712 504 if(copy_from_user(user_srbcmd, user_srb,fibsize)){
7c00ffa3 505 dprintk((KERN_DEBUG"aacraid: Could not copy srb from user\n"));
1da177e4
LT
506 rcode = -EFAULT;
507 goto cleanup;
508 }
509
510 user_reply = arg+fibsize;
511
56b58712 512 flags = user_srbcmd->flags; /* from user in cpu order */
1da177e4 513 // Fix up srb for endian and force some values
56b58712 514
1da177e4 515 srbcmd->function = cpu_to_le32(SRBF_ExecuteScsi); // Force this
7c00ffa3
MH
516 srbcmd->channel = cpu_to_le32(user_srbcmd->channel);
517 srbcmd->id = cpu_to_le32(user_srbcmd->id);
518 srbcmd->lun = cpu_to_le32(user_srbcmd->lun);
7c00ffa3 519 srbcmd->timeout = cpu_to_le32(user_srbcmd->timeout);
5d497cec
MH
520 srbcmd->flags = cpu_to_le32(flags);
521 srbcmd->retry_limit = 0; // Obsolete parameter
56b58712 522 srbcmd->cdb_size = cpu_to_le32(user_srbcmd->cdb_size);
5d497cec 523 memcpy(srbcmd->cdb, user_srbcmd->cdb, sizeof(srbcmd->cdb));
1da177e4 524
56b58712 525 switch (flags & (SRB_DataIn | SRB_DataOut)) {
1da177e4
LT
526 case SRB_DataOut:
527 data_dir = DMA_TO_DEVICE;
528 break;
529 case (SRB_DataIn | SRB_DataOut):
530 data_dir = DMA_BIDIRECTIONAL;
531 break;
532 case SRB_DataIn:
533 data_dir = DMA_FROM_DEVICE;
534 break;
535 default:
536 data_dir = DMA_NONE;
537 }
6391a113 538 if (user_srbcmd->sg.count > ARRAY_SIZE(sg_list)) {
7c00ffa3
MH
539 dprintk((KERN_DEBUG"aacraid: too many sg entries %d\n",
540 le32_to_cpu(srbcmd->sg.count)));
541 rcode = -EINVAL;
542 goto cleanup;
543 }
1da177e4 544 if (dev->dac_support == 1) {
56b58712 545 struct user_sgmap64* upsg = (struct user_sgmap64*)&user_srbcmd->sg;
84e29308 546 struct sgmap64* psg = (struct sgmap64*)&srbcmd->sg;
7c00ffa3 547 struct user_sgmap* usg;
1da177e4
LT
548 byte_count = 0;
549
550 /*
551 * This should also catch if user used the 32 bit sgmap
552 */
553 actual_fibsize = sizeof(struct aac_srb) -
7c00ffa3
MH
554 sizeof(struct sgentry) +
555 ((upsg->count & 0xff) *
556 sizeof(struct sgentry));
1da177e4 557 if(actual_fibsize != fibsize){ // User made a mistake - should not continue
7c00ffa3 558 dprintk((KERN_DEBUG"aacraid: Bad Size specified in Raw SRB command\n"));
1da177e4
LT
559 rcode = -EINVAL;
560 goto cleanup;
561 }
7c00ffa3
MH
562 usg = kmalloc(actual_fibsize - sizeof(struct aac_srb)
563 + sizeof(struct sgmap), GFP_KERNEL);
564 if (!usg) {
565 dprintk((KERN_DEBUG"aacraid: Allocation error in Raw SRB command\n"));
566 rcode = -ENOMEM;
567 goto cleanup;
568 }
569 memcpy (usg, upsg, actual_fibsize - sizeof(struct aac_srb)
570 + sizeof(struct sgmap));
571 actual_fibsize = sizeof(struct aac_srb) -
572 sizeof(struct sgentry) + ((usg->count & 0xff) *
573 sizeof(struct sgentry64));
574 if ((data_dir == DMA_NONE) && upsg->count) {
575 kfree (usg);
576 dprintk((KERN_DEBUG"aacraid: SG with no direction specified in Raw SRB command\n"));
1da177e4
LT
577 rcode = -EINVAL;
578 goto cleanup;
579 }
580
7c00ffa3
MH
581 for (i = 0; i < usg->count; i++) {
582 u64 addr;
1da177e4 583 void* p;
7c00ffa3
MH
584 /* Does this really need to be GFP_DMA? */
585 p = kmalloc(usg->sg[i].count,GFP_KERNEL|__GFP_DMA);
1da177e4 586 if(p == 0) {
7c00ffa3
MH
587 kfree (usg);
588 dprintk((KERN_DEBUG"aacraid: Could not allocate SG buffer - size = %d buffer number %d of %d\n",
589 usg->sg[i].count,i,usg->count));
1da177e4
LT
590 rcode = -ENOMEM;
591 goto cleanup;
592 }
e75d5176 593 sg_user[i] = (void __user *)(long)usg->sg[i].addr;
1da177e4
LT
594 sg_list[i] = p; // save so we can clean up later
595 sg_indx = i;
596
597 if( flags & SRB_DataOut ){
56b58712 598 if(copy_from_user(p,sg_user[i],upsg->sg[i].count)){
7c00ffa3
MH
599 kfree (usg);
600 dprintk((KERN_DEBUG"aacraid: Could not copy sg data from user\n"));
1da177e4
LT
601 rcode = -EFAULT;
602 goto cleanup;
603 }
604 }
7c00ffa3 605 addr = pci_map_single(dev->pdev, p, usg->sg[i].count, data_dir);
1da177e4 606
56b58712 607 psg->sg[i].addr[0] = cpu_to_le32(addr & 0xffffffff);
7c00ffa3
MH
608 psg->sg[i].addr[1] = cpu_to_le32(addr>>32);
609 psg->sg[i].count = cpu_to_le32(usg->sg[i].count);
610 byte_count += usg->sg[i].count;
1da177e4 611 }
7c00ffa3 612 kfree (usg);
1da177e4
LT
613
614 srbcmd->count = cpu_to_le32(byte_count);
7c00ffa3 615 psg->count = cpu_to_le32(sg_indx+1);
bfb35aa8 616 status = aac_fib_send(ScsiPortCommand64, srbfib, actual_fibsize, FsaNormal, 1, 1,NULL,NULL);
1da177e4 617 } else {
56b58712 618 struct user_sgmap* upsg = &user_srbcmd->sg;
1da177e4
LT
619 struct sgmap* psg = &srbcmd->sg;
620 byte_count = 0;
621
5d497cec 622 actual_fibsize = sizeof (struct aac_srb) + (((user_srbcmd->sg.count & 0xff) - 1) * sizeof (struct sgentry));
1da177e4 623 if(actual_fibsize != fibsize){ // User made a mistake - should not continue
7c00ffa3 624 dprintk((KERN_DEBUG"aacraid: Bad Size specified in Raw SRB command\n"));
1da177e4
LT
625 rcode = -EINVAL;
626 goto cleanup;
627 }
56b58712 628 if ((data_dir == DMA_NONE) && upsg->count) {
7c00ffa3 629 dprintk((KERN_DEBUG"aacraid: SG with no direction specified in Raw SRB command\n"));
1da177e4
LT
630 rcode = -EINVAL;
631 goto cleanup;
632 }
56b58712 633 for (i = 0; i < upsg->count; i++) {
1da177e4
LT
634 dma_addr_t addr;
635 void* p;
56b58712 636 p = kmalloc(upsg->sg[i].count, GFP_KERNEL);
1da177e4 637 if(p == 0) {
7c00ffa3
MH
638 dprintk((KERN_DEBUG"aacraid: Could not allocate SG buffer - size = %d buffer number %d of %d\n",
639 upsg->sg[i].count, i, upsg->count));
1da177e4
LT
640 rcode = -ENOMEM;
641 goto cleanup;
642 }
e75d5176 643 sg_user[i] = (void __user *)(long)upsg->sg[i].addr;
1da177e4
LT
644 sg_list[i] = p; // save so we can clean up later
645 sg_indx = i;
646
647 if( flags & SRB_DataOut ){
7c00ffa3
MH
648 if(copy_from_user(p, sg_user[i],
649 upsg->sg[i].count)) {
650 dprintk((KERN_DEBUG"aacraid: Could not copy sg data from user\n"));
1da177e4
LT
651 rcode = -EFAULT;
652 goto cleanup;
653 }
654 }
7c00ffa3
MH
655 addr = pci_map_single(dev->pdev, p,
656 upsg->sg[i].count, data_dir);
1da177e4
LT
657
658 psg->sg[i].addr = cpu_to_le32(addr);
56b58712
MH
659 psg->sg[i].count = cpu_to_le32(upsg->sg[i].count);
660 byte_count += upsg->sg[i].count;
1da177e4
LT
661 }
662 srbcmd->count = cpu_to_le32(byte_count);
7c00ffa3 663 psg->count = cpu_to_le32(sg_indx+1);
bfb35aa8 664 status = aac_fib_send(ScsiPortCommand, srbfib, actual_fibsize, FsaNormal, 1, 1, NULL, NULL);
1da177e4
LT
665 }
666
667 if (status != 0){
7c00ffa3 668 dprintk((KERN_DEBUG"aacraid: Could not send raw srb fib to hba\n"));
5d497cec 669 rcode = -ENXIO;
1da177e4
LT
670 goto cleanup;
671 }
672
673 if( flags & SRB_DataIn ) {
674 for(i = 0 ; i <= sg_indx; i++){
7c00ffa3
MH
675 byte_count = le32_to_cpu((dev->dac_support == 1)
676 ? ((struct sgmap64*)&srbcmd->sg)->sg[i].count
677 : srbcmd->sg.sg[i].count);
678 if(copy_to_user(sg_user[i], sg_list[i], byte_count)){
679 dprintk((KERN_DEBUG"aacraid: Could not copy sg data to user\n"));
1da177e4
LT
680 rcode = -EFAULT;
681 goto cleanup;
682
683 }
684 }
685 }
686
687 reply = (struct aac_srb_reply *) fib_data(srbfib);
688 if(copy_to_user(user_reply,reply,sizeof(struct aac_srb_reply))){
7c00ffa3 689 dprintk((KERN_DEBUG"aacraid: Could not copy reply to user\n"));
1da177e4
LT
690 rcode = -EFAULT;
691 goto cleanup;
692 }
693
694cleanup:
56b58712 695 kfree(user_srbcmd);
1da177e4
LT
696 for(i=0; i <= sg_indx; i++){
697 kfree(sg_list[i]);
698 }
bfb35aa8
MH
699 aac_fib_complete(srbfib);
700 aac_fib_free(srbfib);
1da177e4
LT
701
702 return rcode;
703}
704
1da177e4
LT
705struct aac_pci_info {
706 u32 bus;
707 u32 slot;
708};
709
710
4833869e 711static int aac_get_pci_info(struct aac_dev* dev, void __user *arg)
1da177e4
LT
712{
713 struct aac_pci_info pci_info;
714
715 pci_info.bus = dev->pdev->bus->number;
716 pci_info.slot = PCI_SLOT(dev->pdev->devfn);
717
718 if (copy_to_user(arg, &pci_info, sizeof(struct aac_pci_info))) {
7c00ffa3 719 dprintk((KERN_DEBUG "aacraid: Could not copy pci info\n"));
1da177e4
LT
720 return -EFAULT;
721 }
722 return 0;
7c00ffa3 723}
1da177e4
LT
724
725
726int aac_do_ioctl(struct aac_dev * dev, int cmd, void __user *arg)
727{
728 int status;
729
730 /*
731 * HBA gets first crack
732 */
733
734 status = aac_dev_ioctl(dev, cmd, arg);
735 if(status != -ENOTTY)
736 return status;
737
738 switch (cmd) {
739 case FSACTL_MINIPORT_REV_CHECK:
740 status = check_revision(dev, arg);
741 break;
7c00ffa3 742 case FSACTL_SEND_LARGE_FIB:
1da177e4
LT
743 case FSACTL_SENDFIB:
744 status = ioctl_send_fib(dev, arg);
745 break;
746 case FSACTL_OPEN_GET_ADAPTER_FIB:
747 status = open_getadapter_fib(dev, arg);
748 break;
749 case FSACTL_GET_NEXT_ADAPTER_FIB:
750 status = next_getadapter_fib(dev, arg);
751 break;
752 case FSACTL_CLOSE_GET_ADAPTER_FIB:
753 status = close_getadapter_fib(dev, arg);
754 break;
755 case FSACTL_SEND_RAW_SRB:
756 status = aac_send_raw_srb(dev,arg);
757 break;
758 case FSACTL_GET_PCI_INFO:
759 status = aac_get_pci_info(dev,arg);
760 break;
761 default:
762 status = -ENOTTY;
763 break;
764 }
765 return status;
766}
767