2005-04-17 06:20:36 +08:00
|
|
|
/*
|
|
|
|
* arch/s390/kernel/cpcmd.c
|
|
|
|
*
|
|
|
|
* S390 version
|
2005-06-26 05:55:32 +08:00
|
|
|
* Copyright (C) 1999,2005 IBM Deutschland Entwicklung GmbH, IBM Corporation
|
2005-04-17 06:20:36 +08:00
|
|
|
* Author(s): Martin Schwidefsky (schwidefsky@de.ibm.com),
|
|
|
|
* Christian Borntraeger (cborntra@de.ibm.com),
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/kernel.h>
|
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/slab.h>
|
|
|
|
#include <linux/spinlock.h>
|
|
|
|
#include <linux/stddef.h>
|
|
|
|
#include <linux/string.h>
|
|
|
|
#include <asm/ebcdic.h>
|
|
|
|
#include <asm/cpcmd.h>
|
|
|
|
#include <asm/system.h>
|
2007-02-06 04:16:54 +08:00
|
|
|
#include <asm/io.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
static DEFINE_SPINLOCK(cpcmd_lock);
|
2005-06-26 05:55:32 +08:00
|
|
|
static char cpcmd_buf[241];
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
/*
|
2006-12-04 22:40:30 +08:00
|
|
|
* __cpcmd has some restrictions over cpcmd
|
|
|
|
* - the response buffer must reside below 2GB (if any)
|
|
|
|
* - __cpcmd is unlocked and therefore not SMP-safe
|
2005-04-17 06:20:36 +08:00
|
|
|
*/
|
2005-06-26 05:55:32 +08:00
|
|
|
int __cpcmd(const char *cmd, char *response, int rlen, int *response_code)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2006-12-04 22:40:30 +08:00
|
|
|
unsigned cmdlen;
|
2006-09-28 22:56:43 +08:00
|
|
|
int return_code, return_len;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
cmdlen = strlen(cmd);
|
|
|
|
BUG_ON(cmdlen > 240);
|
2005-06-26 05:55:32 +08:00
|
|
|
memcpy(cpcmd_buf, cmd, cmdlen);
|
2005-04-17 06:20:36 +08:00
|
|
|
ASCEBC(cpcmd_buf, cmdlen);
|
|
|
|
|
|
|
|
if (response != NULL && rlen > 0) {
|
2006-09-28 22:56:43 +08:00
|
|
|
register unsigned long reg2 asm ("2") = (addr_t) cpcmd_buf;
|
|
|
|
register unsigned long reg3 asm ("3") = (addr_t) response;
|
|
|
|
register unsigned long reg4 asm ("4") = cmdlen | 0x40000000L;
|
|
|
|
register unsigned long reg5 asm ("5") = rlen;
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
memset(response, 0, rlen);
|
2006-09-28 22:56:43 +08:00
|
|
|
asm volatile(
|
2006-01-06 16:19:28 +08:00
|
|
|
#ifndef CONFIG_64BIT
|
2006-09-28 22:56:43 +08:00
|
|
|
" diag %2,%0,0x8\n"
|
|
|
|
" brc 8,1f\n"
|
|
|
|
" ar %1,%4\n"
|
2006-01-06 16:19:28 +08:00
|
|
|
#else /* CONFIG_64BIT */
|
2006-09-28 22:56:43 +08:00
|
|
|
" sam31\n"
|
|
|
|
" diag %2,%0,0x8\n"
|
|
|
|
" sam64\n"
|
|
|
|
" brc 8,1f\n"
|
|
|
|
" agr %1,%4\n"
|
2006-01-06 16:19:28 +08:00
|
|
|
#endif /* CONFIG_64BIT */
|
2006-09-28 22:56:43 +08:00
|
|
|
"1:\n"
|
|
|
|
: "+d" (reg4), "+d" (reg5)
|
|
|
|
: "d" (reg2), "d" (reg3), "d" (rlen) : "cc");
|
|
|
|
return_code = (int) reg4;
|
|
|
|
return_len = (int) reg5;
|
2005-04-17 06:20:36 +08:00
|
|
|
EBCASC(response, rlen);
|
|
|
|
} else {
|
2006-09-28 22:56:43 +08:00
|
|
|
register unsigned long reg2 asm ("2") = (addr_t) cpcmd_buf;
|
|
|
|
register unsigned long reg3 asm ("3") = cmdlen;
|
2005-06-26 05:55:32 +08:00
|
|
|
return_len = 0;
|
2006-09-28 22:56:43 +08:00
|
|
|
asm volatile(
|
2006-01-06 16:19:28 +08:00
|
|
|
#ifndef CONFIG_64BIT
|
2006-09-28 22:56:43 +08:00
|
|
|
" diag %1,%0,0x8\n"
|
2006-01-06 16:19:28 +08:00
|
|
|
#else /* CONFIG_64BIT */
|
2006-09-28 22:56:43 +08:00
|
|
|
" sam31\n"
|
|
|
|
" diag %1,%0,0x8\n"
|
|
|
|
" sam64\n"
|
2006-01-06 16:19:28 +08:00
|
|
|
#endif /* CONFIG_64BIT */
|
2006-09-28 22:56:43 +08:00
|
|
|
: "+d" (reg3) : "d" (reg2) : "cc");
|
|
|
|
return_code = (int) reg3;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
2005-06-26 05:55:32 +08:00
|
|
|
if (response_code != NULL)
|
|
|
|
*response_code = return_code;
|
|
|
|
return return_len;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
EXPORT_SYMBOL(__cpcmd);
|
|
|
|
|
2005-06-26 05:55:32 +08:00
|
|
|
int cpcmd(const char *cmd, char *response, int rlen, int *response_code)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
char *lowbuf;
|
2005-06-26 05:55:32 +08:00
|
|
|
int len;
|
2006-12-04 22:40:30 +08:00
|
|
|
unsigned long flags;
|
2005-06-26 05:55:32 +08:00
|
|
|
|
2007-02-06 04:16:54 +08:00
|
|
|
if ((virt_to_phys(response) != (unsigned long) response) ||
|
|
|
|
(((unsigned long)response + rlen) >> 31)) {
|
2005-04-17 06:20:36 +08:00
|
|
|
lowbuf = kmalloc(rlen, GFP_KERNEL | GFP_DMA);
|
|
|
|
if (!lowbuf) {
|
|
|
|
printk(KERN_WARNING
|
|
|
|
"cpcmd: could not allocate response buffer\n");
|
2005-06-26 05:55:32 +08:00
|
|
|
return -ENOMEM;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
2006-12-04 22:40:30 +08:00
|
|
|
spin_lock_irqsave(&cpcmd_lock, flags);
|
2005-06-26 05:55:32 +08:00
|
|
|
len = __cpcmd(cmd, lowbuf, rlen, response_code);
|
2006-12-04 22:40:30 +08:00
|
|
|
spin_unlock_irqrestore(&cpcmd_lock, flags);
|
2005-04-17 06:20:36 +08:00
|
|
|
memcpy(response, lowbuf, rlen);
|
|
|
|
kfree(lowbuf);
|
2007-02-06 04:16:54 +08:00
|
|
|
} else {
|
|
|
|
spin_lock_irqsave(&cpcmd_lock, flags);
|
|
|
|
len = __cpcmd(cmd, response, rlen, response_code);
|
|
|
|
spin_unlock_irqrestore(&cpcmd_lock, flags);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
2005-06-26 05:55:32 +08:00
|
|
|
return len;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
EXPORT_SYMBOL(cpcmd);
|