summaryrefslogtreecommitdiffstats
path: root/tools
diff options
context:
space:
mode:
authorJohn Calixto <john.calixto@modsystems.com>2011-04-26 18:56:29 -0400
committerChris Ball <cjb@laptop.org>2011-05-24 21:02:54 -0400
commitcb87ea28ed9e75a41eb456bfcb547b4e6f10e750 (patch)
treee3fe4a653bd96815c650dd9f5db11edc6b39b0db /tools
parent641c3187b9d53cfd4c23b0ce2ab18a13d5e775e5 (diff)
downloadlinux-cb87ea28ed9e75a41eb456bfcb547b4e6f10e750.tar.bz2
mmc: core: Add mmc CMD+ACMD passthrough ioctl
Allows appropriately-privileged applications to send CMD (normal) and ACMD (application-specific; preceded with CMD55) commands to cards/devices on the mmc bus. This is primarily useful for enabling the security functionality built in to every SD card. It can also be used as a generic passthrough (e.g. to enable virtual machines to control mmc bus devices directly). However, this use case has not been tested rigorously. Generic passthrough testing was only conducted for a few non-security opcodes to prove the feasibility of the passthrough. Since any opcode can be sent using this passthrough, it is very possible to render the card/device unusable. Applications that use this ioctl must have CAP_SYS_RAWIO. Security commands tested on TI PCIxx12 (SDHCI), Sigma Designs SMP8652 SoC, TI OMAP3621/OMAP3630 SoC, Samsung S5PC110 SoC, Qualcomm MSM7200A SoC. Signed-off-by: John Calixto <john.calixto@modsystems.com> Reviewed-by: Andrei Warkentin <andreiw@motorola.com> Reviewed-by: Arnd Bergmann <arnd@arndb.de> Signed-off-by: Chris Ball <cjb@laptop.org>
Diffstat (limited to 'tools')
0 files changed, 0 insertions, 0 deletions