ieee1394: sbp2: remove duplicate code
[linux-block.git] / drivers / mtd / mtdchar.c
CommitLineData
1da177e4 1/*
97894cda 2 * $Id: mtdchar.c,v 1.76 2005/11/07 11:14:20 gleixner Exp $
1da177e4
LT
3 *
4 * Character-device access to raw MTD devices.
5 *
6 */
7
15fdc52f
TG
8#include <linux/device.h>
9#include <linux/fs.h>
10#include <linux/init.h>
1da177e4
LT
11#include <linux/kernel.h>
12#include <linux/module.h>
15fdc52f
TG
13#include <linux/slab.h>
14#include <linux/sched.h>
15
1da177e4
LT
16#include <linux/mtd/mtd.h>
17#include <linux/mtd/compatmac.h>
1da177e4 18
15fdc52f 19#include <asm/uaccess.h>
9bc7b387
TP
20
21static struct class *mtd_class;
1da177e4
LT
22
23static void mtd_notify_add(struct mtd_info* mtd)
24{
25 if (!mtd)
26 return;
27
53f46542 28 class_device_create(mtd_class, NULL, MKDEV(MTD_CHAR_MAJOR, mtd->index*2),
9bc7b387 29 NULL, "mtd%d", mtd->index);
97894cda 30
53f46542 31 class_device_create(mtd_class, NULL,
9bc7b387
TP
32 MKDEV(MTD_CHAR_MAJOR, mtd->index*2+1),
33 NULL, "mtd%dro", mtd->index);
1da177e4
LT
34}
35
36static void mtd_notify_remove(struct mtd_info* mtd)
37{
38 if (!mtd)
39 return;
9bc7b387
TP
40
41 class_device_destroy(mtd_class, MKDEV(MTD_CHAR_MAJOR, mtd->index*2));
42 class_device_destroy(mtd_class, MKDEV(MTD_CHAR_MAJOR, mtd->index*2+1));
1da177e4
LT
43}
44
45static struct mtd_notifier notifier = {
46 .add = mtd_notify_add,
47 .remove = mtd_notify_remove,
48};
49
045e9a5d 50/*
f1a28c02
TG
51 * Data structure to hold the pointer to the mtd device as well
52 * as mode information ofr various use cases.
045e9a5d 53 */
f1a28c02
TG
54struct mtd_file_info {
55 struct mtd_info *mtd;
56 enum mtd_file_modes mode;
57};
31f4233b 58
1da177e4
LT
59static loff_t mtd_lseek (struct file *file, loff_t offset, int orig)
60{
f1a28c02
TG
61 struct mtd_file_info *mfi = file->private_data;
62 struct mtd_info *mtd = mfi->mtd;
1da177e4
LT
63
64 switch (orig) {
ea59830d 65 case SEEK_SET:
1da177e4 66 break;
ea59830d 67 case SEEK_CUR:
8b491d75 68 offset += file->f_pos;
1da177e4 69 break;
ea59830d 70 case SEEK_END:
8b491d75 71 offset += mtd->size;
1da177e4
LT
72 break;
73 default:
74 return -EINVAL;
75 }
76
1887f517 77 if (offset >= 0 && offset <= mtd->size)
8b491d75 78 return file->f_pos = offset;
1da177e4 79
8b491d75 80 return -EINVAL;
1da177e4
LT
81}
82
83
84
85static int mtd_open(struct inode *inode, struct file *file)
86{
87 int minor = iminor(inode);
88 int devnum = minor >> 1;
89 struct mtd_info *mtd;
f1a28c02 90 struct mtd_file_info *mfi;
1da177e4
LT
91
92 DEBUG(MTD_DEBUG_LEVEL0, "MTD_open\n");
93
94 if (devnum >= MAX_MTD_DEVICES)
95 return -ENODEV;
96
97 /* You can't open the RO devices RW */
98 if ((file->f_mode & 2) && (minor & 1))
99 return -EACCES;
100
101 mtd = get_mtd_device(NULL, devnum);
97894cda 102
1da177e4
LT
103 if (!mtd)
104 return -ENODEV;
97894cda 105
1da177e4
LT
106 if (MTD_ABSENT == mtd->type) {
107 put_mtd_device(mtd);
108 return -ENODEV;
109 }
110
1da177e4
LT
111 /* You can't open it RW if it's not a writeable device */
112 if ((file->f_mode & 2) && !(mtd->flags & MTD_WRITEABLE)) {
113 put_mtd_device(mtd);
114 return -EACCES;
115 }
97894cda 116
f1a28c02
TG
117 mfi = kzalloc(sizeof(*mfi), GFP_KERNEL);
118 if (!mfi) {
119 put_mtd_device(mtd);
120 return -ENOMEM;
121 }
122 mfi->mtd = mtd;
123 file->private_data = mfi;
124
1da177e4
LT
125 return 0;
126} /* mtd_open */
127
128/*====================================================================*/
129
130static int mtd_close(struct inode *inode, struct file *file)
131{
f1a28c02
TG
132 struct mtd_file_info *mfi = file->private_data;
133 struct mtd_info *mtd = mfi->mtd;
1da177e4
LT
134
135 DEBUG(MTD_DEBUG_LEVEL0, "MTD_close\n");
136
1da177e4
LT
137 if (mtd->sync)
138 mtd->sync(mtd);
97894cda 139
1da177e4 140 put_mtd_device(mtd);
f1a28c02
TG
141 file->private_data = NULL;
142 kfree(mfi);
1da177e4
LT
143
144 return 0;
145} /* mtd_close */
146
147/* FIXME: This _really_ needs to die. In 2.5, we should lock the
148 userspace buffer down and use it directly with readv/writev.
149*/
150#define MAX_KMALLOC_SIZE 0x20000
151
152static ssize_t mtd_read(struct file *file, char __user *buf, size_t count,loff_t *ppos)
153{
f1a28c02
TG
154 struct mtd_file_info *mfi = file->private_data;
155 struct mtd_info *mtd = mfi->mtd;
1da177e4
LT
156 size_t retlen=0;
157 size_t total_retlen=0;
158 int ret=0;
159 int len;
160 char *kbuf;
97894cda 161
1da177e4
LT
162 DEBUG(MTD_DEBUG_LEVEL0,"MTD_read\n");
163
164 if (*ppos + count > mtd->size)
165 count = mtd->size - *ppos;
166
167 if (!count)
168 return 0;
97894cda 169
1da177e4
LT
170 /* FIXME: Use kiovec in 2.5 to lock down the user's buffers
171 and pass them directly to the MTD functions */
b802c074
TG
172
173 if (count > MAX_KMALLOC_SIZE)
174 kbuf=kmalloc(MAX_KMALLOC_SIZE, GFP_KERNEL);
175 else
176 kbuf=kmalloc(count, GFP_KERNEL);
177
178 if (!kbuf)
179 return -ENOMEM;
180
1da177e4 181 while (count) {
b802c074 182
97894cda 183 if (count > MAX_KMALLOC_SIZE)
1da177e4
LT
184 len = MAX_KMALLOC_SIZE;
185 else
186 len = count;
187
f1a28c02
TG
188 switch (mfi->mode) {
189 case MTD_MODE_OTP_FACTORY:
31f4233b
NP
190 ret = mtd->read_fact_prot_reg(mtd, *ppos, len, &retlen, kbuf);
191 break;
192 case MTD_MODE_OTP_USER:
193 ret = mtd->read_user_prot_reg(mtd, *ppos, len, &retlen, kbuf);
194 break;
f1a28c02
TG
195 case MTD_MODE_RAW:
196 {
197 struct mtd_oob_ops ops;
198
199 ops.mode = MTD_OOB_RAW;
200 ops.datbuf = kbuf;
201 ops.oobbuf = NULL;
202 ops.len = len;
203
204 ret = mtd->read_oob(mtd, *ppos, &ops);
205 retlen = ops.retlen;
206 break;
207 }
31f4233b 208 default:
f4a43cfc 209 ret = mtd->read(mtd, *ppos, len, &retlen, kbuf);
31f4233b 210 }
1da177e4
LT
211 /* Nand returns -EBADMSG on ecc errors, but it returns
212 * the data. For our userspace tools it is important
97894cda 213 * to dump areas with ecc errors !
9a1fcdfd
TG
214 * For kernel internal usage it also might return -EUCLEAN
215 * to signal the caller that a bitflip has occured and has
216 * been corrected by the ECC algorithm.
1da177e4
LT
217 * Userspace software which accesses NAND this way
218 * must be aware of the fact that it deals with NAND
219 */
9a1fcdfd 220 if (!ret || (ret == -EUCLEAN) || (ret == -EBADMSG)) {
1da177e4
LT
221 *ppos += retlen;
222 if (copy_to_user(buf, kbuf, retlen)) {
f4a43cfc 223 kfree(kbuf);
1da177e4
LT
224 return -EFAULT;
225 }
226 else
227 total_retlen += retlen;
228
229 count -= retlen;
230 buf += retlen;
31f4233b
NP
231 if (retlen == 0)
232 count = 0;
1da177e4
LT
233 }
234 else {
235 kfree(kbuf);
236 return ret;
237 }
97894cda 238
1da177e4
LT
239 }
240
b802c074 241 kfree(kbuf);
1da177e4
LT
242 return total_retlen;
243} /* mtd_read */
244
245static ssize_t mtd_write(struct file *file, const char __user *buf, size_t count,loff_t *ppos)
246{
f1a28c02
TG
247 struct mtd_file_info *mfi = file->private_data;
248 struct mtd_info *mtd = mfi->mtd;
1da177e4
LT
249 char *kbuf;
250 size_t retlen;
251 size_t total_retlen=0;
252 int ret=0;
253 int len;
254
255 DEBUG(MTD_DEBUG_LEVEL0,"MTD_write\n");
97894cda 256
1da177e4
LT
257 if (*ppos == mtd->size)
258 return -ENOSPC;
97894cda 259
1da177e4
LT
260 if (*ppos + count > mtd->size)
261 count = mtd->size - *ppos;
262
263 if (!count)
264 return 0;
265
b802c074
TG
266 if (count > MAX_KMALLOC_SIZE)
267 kbuf=kmalloc(MAX_KMALLOC_SIZE, GFP_KERNEL);
268 else
269 kbuf=kmalloc(count, GFP_KERNEL);
270
271 if (!kbuf)
272 return -ENOMEM;
273
1da177e4 274 while (count) {
b802c074 275
97894cda 276 if (count > MAX_KMALLOC_SIZE)
1da177e4
LT
277 len = MAX_KMALLOC_SIZE;
278 else
279 len = count;
280
1da177e4
LT
281 if (copy_from_user(kbuf, buf, len)) {
282 kfree(kbuf);
283 return -EFAULT;
284 }
97894cda 285
f1a28c02
TG
286 switch (mfi->mode) {
287 case MTD_MODE_OTP_FACTORY:
31f4233b
NP
288 ret = -EROFS;
289 break;
290 case MTD_MODE_OTP_USER:
291 if (!mtd->write_user_prot_reg) {
292 ret = -EOPNOTSUPP;
293 break;
294 }
295 ret = mtd->write_user_prot_reg(mtd, *ppos, len, &retlen, kbuf);
296 break;
f1a28c02
TG
297
298 case MTD_MODE_RAW:
299 {
300 struct mtd_oob_ops ops;
301
302 ops.mode = MTD_OOB_RAW;
303 ops.datbuf = kbuf;
304 ops.oobbuf = NULL;
305 ops.len = len;
306
307 ret = mtd->write_oob(mtd, *ppos, &ops);
308 retlen = ops.retlen;
309 break;
310 }
311
31f4233b
NP
312 default:
313 ret = (*(mtd->write))(mtd, *ppos, len, &retlen, kbuf);
314 }
1da177e4
LT
315 if (!ret) {
316 *ppos += retlen;
317 total_retlen += retlen;
318 count -= retlen;
319 buf += retlen;
320 }
321 else {
322 kfree(kbuf);
323 return ret;
324 }
1da177e4
LT
325 }
326
b802c074 327 kfree(kbuf);
1da177e4
LT
328 return total_retlen;
329} /* mtd_write */
330
331/*======================================================================
332
333 IOCTL calls for getting device parameters.
334
335======================================================================*/
336static void mtdchar_erase_callback (struct erase_info *instr)
337{
338 wake_up((wait_queue_head_t *)instr->priv);
339}
340
f1a28c02
TG
341#if defined(CONFIG_MTD_OTP) || defined(CONFIG_MTD_ONENAND_OTP)
342static int otp_select_filemode(struct mtd_file_info *mfi, int mode)
343{
344 struct mtd_info *mtd = mfi->mtd;
345 int ret = 0;
346
347 switch (mode) {
348 case MTD_OTP_FACTORY:
349 if (!mtd->read_fact_prot_reg)
350 ret = -EOPNOTSUPP;
351 else
352 mfi->mode = MTD_MODE_OTP_FACTORY;
353 break;
354 case MTD_OTP_USER:
355 if (!mtd->read_fact_prot_reg)
356 ret = -EOPNOTSUPP;
357 else
358 mfi->mode = MTD_MODE_OTP_USER;
359 break;
360 default:
361 ret = -EINVAL;
362 case MTD_OTP_OFF:
363 break;
364 }
365 return ret;
366}
367#else
368# define otp_select_filemode(f,m) -EOPNOTSUPP
369#endif
370
1da177e4
LT
371static int mtd_ioctl(struct inode *inode, struct file *file,
372 u_int cmd, u_long arg)
373{
f1a28c02
TG
374 struct mtd_file_info *mfi = file->private_data;
375 struct mtd_info *mtd = mfi->mtd;
1da177e4
LT
376 void __user *argp = (void __user *)arg;
377 int ret = 0;
378 u_long size;
73c619ea 379 struct mtd_info_user info;
97894cda 380
1da177e4
LT
381 DEBUG(MTD_DEBUG_LEVEL0, "MTD_ioctl\n");
382
383 size = (cmd & IOCSIZE_MASK) >> IOCSIZE_SHIFT;
384 if (cmd & IOC_IN) {
385 if (!access_ok(VERIFY_READ, argp, size))
386 return -EFAULT;
387 }
388 if (cmd & IOC_OUT) {
389 if (!access_ok(VERIFY_WRITE, argp, size))
390 return -EFAULT;
391 }
97894cda 392
1da177e4
LT
393 switch (cmd) {
394 case MEMGETREGIONCOUNT:
395 if (copy_to_user(argp, &(mtd->numeraseregions), sizeof(int)))
396 return -EFAULT;
397 break;
398
399 case MEMGETREGIONINFO:
400 {
401 struct region_info_user ur;
402
403 if (copy_from_user(&ur, argp, sizeof(struct region_info_user)))
404 return -EFAULT;
405
406 if (ur.regionindex >= mtd->numeraseregions)
407 return -EINVAL;
408 if (copy_to_user(argp, &(mtd->eraseregions[ur.regionindex]),
409 sizeof(struct mtd_erase_region_info)))
410 return -EFAULT;
411 break;
412 }
413
414 case MEMGETINFO:
73c619ea
JE
415 info.type = mtd->type;
416 info.flags = mtd->flags;
417 info.size = mtd->size;
418 info.erasesize = mtd->erasesize;
419 info.writesize = mtd->writesize;
420 info.oobsize = mtd->oobsize;
421 info.ecctype = mtd->ecctype;
422 info.eccsize = mtd->eccsize;
423 if (copy_to_user(argp, &info, sizeof(struct mtd_info_user)))
1da177e4
LT
424 return -EFAULT;
425 break;
426
427 case MEMERASE:
428 {
429 struct erase_info *erase;
430
431 if(!(file->f_mode & 2))
432 return -EPERM;
433
434 erase=kmalloc(sizeof(struct erase_info),GFP_KERNEL);
435 if (!erase)
436 ret = -ENOMEM;
437 else {
438 wait_queue_head_t waitq;
439 DECLARE_WAITQUEUE(wait, current);
440
441 init_waitqueue_head(&waitq);
442
443 memset (erase,0,sizeof(struct erase_info));
444 if (copy_from_user(&erase->addr, argp,
445 sizeof(struct erase_info_user))) {
446 kfree(erase);
447 return -EFAULT;
448 }
449 erase->mtd = mtd;
450 erase->callback = mtdchar_erase_callback;
451 erase->priv = (unsigned long)&waitq;
97894cda 452
1da177e4
LT
453 /*
454 FIXME: Allow INTERRUPTIBLE. Which means
455 not having the wait_queue head on the stack.
97894cda 456
1da177e4
LT
457 If the wq_head is on the stack, and we
458 leave because we got interrupted, then the
459 wq_head is no longer there when the
460 callback routine tries to wake us up.
461 */
462 ret = mtd->erase(mtd, erase);
463 if (!ret) {
464 set_current_state(TASK_UNINTERRUPTIBLE);
465 add_wait_queue(&waitq, &wait);
466 if (erase->state != MTD_ERASE_DONE &&
467 erase->state != MTD_ERASE_FAILED)
468 schedule();
469 remove_wait_queue(&waitq, &wait);
470 set_current_state(TASK_RUNNING);
471
472 ret = (erase->state == MTD_ERASE_FAILED)?-EIO:0;
473 }
474 kfree(erase);
475 }
476 break;
477 }
478
479 case MEMWRITEOOB:
480 {
481 struct mtd_oob_buf buf;
8593fbc6 482 struct mtd_oob_ops ops;
97894cda 483
1da177e4
LT
484 if(!(file->f_mode & 2))
485 return -EPERM;
486
487 if (copy_from_user(&buf, argp, sizeof(struct mtd_oob_buf)))
488 return -EFAULT;
97894cda 489
8593fbc6 490 if (buf.length > 4096)
1da177e4
LT
491 return -EINVAL;
492
493 if (!mtd->write_oob)
494 ret = -EOPNOTSUPP;
495 else
496 ret = access_ok(VERIFY_READ, buf.ptr,
497 buf.length) ? 0 : EFAULT;
498
499 if (ret)
500 return ret;
501
8593fbc6 502 ops.len = buf.length;
7bc3312b 503 ops.ooblen = buf.length;
8593fbc6
TG
504 ops.ooboffs = buf.start & (mtd->oobsize - 1);
505 ops.datbuf = NULL;
506 ops.mode = MTD_OOB_PLACE;
507
7bc3312b 508 if (ops.ooboffs && ops.len > (mtd->oobsize - ops.ooboffs))
8593fbc6
TG
509 return -EINVAL;
510
511 ops.oobbuf = kmalloc(buf.length, GFP_KERNEL);
512 if (!ops.oobbuf)
1da177e4 513 return -ENOMEM;
97894cda 514
8593fbc6
TG
515 if (copy_from_user(ops.oobbuf, buf.ptr, buf.length)) {
516 kfree(ops.oobbuf);
1da177e4
LT
517 return -EFAULT;
518 }
519
8593fbc6
TG
520 buf.start &= ~(mtd->oobsize - 1);
521 ret = mtd->write_oob(mtd, buf.start, &ops);
1da177e4 522
8593fbc6
TG
523 if (copy_to_user(argp + sizeof(uint32_t), &ops.retlen,
524 sizeof(uint32_t)))
1da177e4
LT
525 ret = -EFAULT;
526
8593fbc6 527 kfree(ops.oobbuf);
1da177e4
LT
528 break;
529
530 }
531
532 case MEMREADOOB:
533 {
534 struct mtd_oob_buf buf;
8593fbc6 535 struct mtd_oob_ops ops;
1da177e4
LT
536
537 if (copy_from_user(&buf, argp, sizeof(struct mtd_oob_buf)))
538 return -EFAULT;
97894cda 539
8593fbc6 540 if (buf.length > 4096)
1da177e4
LT
541 return -EINVAL;
542
543 if (!mtd->read_oob)
544 ret = -EOPNOTSUPP;
545 else
546 ret = access_ok(VERIFY_WRITE, buf.ptr,
547 buf.length) ? 0 : -EFAULT;
1da177e4
LT
548 if (ret)
549 return ret;
550
8593fbc6 551 ops.len = buf.length;
7bc3312b 552 ops.ooblen = buf.length;
8593fbc6
TG
553 ops.ooboffs = buf.start & (mtd->oobsize - 1);
554 ops.datbuf = NULL;
555 ops.mode = MTD_OOB_PLACE;
556
7bc3312b 557 if (ops.ooboffs && ops.len > (mtd->oobsize - ops.ooboffs))
8593fbc6
TG
558 return -EINVAL;
559
560 ops.oobbuf = kmalloc(buf.length, GFP_KERNEL);
561 if (!ops.oobbuf)
1da177e4 562 return -ENOMEM;
97894cda 563
8593fbc6
TG
564 buf.start &= ~(mtd->oobsize - 1);
565 ret = mtd->read_oob(mtd, buf.start, &ops);
1da177e4 566
8593fbc6 567 if (put_user(ops.retlen, (uint32_t __user *)argp))
1da177e4 568 ret = -EFAULT;
8593fbc6
TG
569 else if (ops.retlen && copy_to_user(buf.ptr, ops.oobbuf,
570 ops.retlen))
1da177e4 571 ret = -EFAULT;
97894cda 572
8593fbc6 573 kfree(ops.oobbuf);
1da177e4
LT
574 break;
575 }
576
577 case MEMLOCK:
578 {
579 struct erase_info_user info;
580
581 if (copy_from_user(&info, argp, sizeof(info)))
582 return -EFAULT;
583
584 if (!mtd->lock)
585 ret = -EOPNOTSUPP;
586 else
587 ret = mtd->lock(mtd, info.start, info.length);
588 break;
589 }
590
591 case MEMUNLOCK:
592 {
593 struct erase_info_user info;
594
595 if (copy_from_user(&info, argp, sizeof(info)))
596 return -EFAULT;
597
598 if (!mtd->unlock)
599 ret = -EOPNOTSUPP;
600 else
601 ret = mtd->unlock(mtd, info.start, info.length);
602 break;
603 }
604
5bd34c09 605 /* Legacy interface */
1da177e4
LT
606 case MEMGETOOBSEL:
607 {
5bd34c09
TG
608 struct nand_oobinfo oi;
609
610 if (!mtd->ecclayout)
611 return -EOPNOTSUPP;
612 if (mtd->ecclayout->eccbytes > ARRAY_SIZE(oi.eccpos))
613 return -EINVAL;
614
615 oi.useecc = MTD_NANDECC_AUTOPLACE;
616 memcpy(&oi.eccpos, mtd->ecclayout->eccpos, sizeof(oi.eccpos));
617 memcpy(&oi.oobfree, mtd->ecclayout->oobfree,
618 sizeof(oi.oobfree));
619
620 if (copy_to_user(argp, &oi, sizeof(struct nand_oobinfo)))
1da177e4
LT
621 return -EFAULT;
622 break;
623 }
624
625 case MEMGETBADBLOCK:
626 {
627 loff_t offs;
97894cda 628
1da177e4
LT
629 if (copy_from_user(&offs, argp, sizeof(loff_t)))
630 return -EFAULT;
631 if (!mtd->block_isbad)
632 ret = -EOPNOTSUPP;
633 else
634 return mtd->block_isbad(mtd, offs);
635 break;
636 }
637
638 case MEMSETBADBLOCK:
639 {
640 loff_t offs;
641
642 if (copy_from_user(&offs, argp, sizeof(loff_t)))
643 return -EFAULT;
644 if (!mtd->block_markbad)
645 ret = -EOPNOTSUPP;
646 else
647 return mtd->block_markbad(mtd, offs);
648 break;
649 }
650
493c6460 651#if defined(CONFIG_MTD_OTP) || defined(CONFIG_MTD_ONENAND_OTP)
31f4233b
NP
652 case OTPSELECT:
653 {
654 int mode;
655 if (copy_from_user(&mode, argp, sizeof(int)))
656 return -EFAULT;
f1a28c02
TG
657
658 mfi->mode = MTD_MODE_NORMAL;
659
660 ret = otp_select_filemode(mfi, mode);
661
81dba488 662 file->f_pos = 0;
31f4233b
NP
663 break;
664 }
665
666 case OTPGETREGIONCOUNT:
667 case OTPGETREGIONINFO:
668 {
669 struct otp_info *buf = kmalloc(4096, GFP_KERNEL);
670 if (!buf)
671 return -ENOMEM;
672 ret = -EOPNOTSUPP;
f1a28c02
TG
673 switch (mfi->mode) {
674 case MTD_MODE_OTP_FACTORY:
31f4233b
NP
675 if (mtd->get_fact_prot_info)
676 ret = mtd->get_fact_prot_info(mtd, buf, 4096);
677 break;
678 case MTD_MODE_OTP_USER:
679 if (mtd->get_user_prot_info)
680 ret = mtd->get_user_prot_info(mtd, buf, 4096);
681 break;
f1a28c02
TG
682 default:
683 break;
31f4233b
NP
684 }
685 if (ret >= 0) {
686 if (cmd == OTPGETREGIONCOUNT) {
687 int nbr = ret / sizeof(struct otp_info);
688 ret = copy_to_user(argp, &nbr, sizeof(int));
689 } else
690 ret = copy_to_user(argp, buf, ret);
691 if (ret)
692 ret = -EFAULT;
693 }
694 kfree(buf);
695 break;
696 }
697
698 case OTPLOCK:
699 {
700 struct otp_info info;
701
f1a28c02 702 if (mfi->mode != MTD_MODE_OTP_USER)
31f4233b
NP
703 return -EINVAL;
704 if (copy_from_user(&info, argp, sizeof(info)))
705 return -EFAULT;
706 if (!mtd->lock_user_prot_reg)
707 return -EOPNOTSUPP;
708 ret = mtd->lock_user_prot_reg(mtd, info.start, info.length);
709 break;
710 }
711#endif
712
f1a28c02
TG
713 case ECCGETLAYOUT:
714 {
715 if (!mtd->ecclayout)
716 return -EOPNOTSUPP;
717
718 if (copy_to_user(argp, &mtd->ecclayout,
719 sizeof(struct nand_ecclayout)))
720 return -EFAULT;
721 break;
722 }
723
724 case ECCGETSTATS:
725 {
726 if (copy_to_user(argp, &mtd->ecc_stats,
727 sizeof(struct mtd_ecc_stats)))
728 return -EFAULT;
729 break;
730 }
731
732 case MTDFILEMODE:
733 {
734 mfi->mode = 0;
735
736 switch(arg) {
737 case MTD_MODE_OTP_FACTORY:
738 case MTD_MODE_OTP_USER:
739 ret = otp_select_filemode(mfi, arg);
740 break;
741
742 case MTD_MODE_RAW:
743 if (!mtd->read_oob || !mtd->write_oob)
744 return -EOPNOTSUPP;
745 mfi->mode = arg;
746
747 case MTD_MODE_NORMAL:
748 break;
749 default:
750 ret = -EINVAL;
751 }
752 file->f_pos = 0;
753 break;
754 }
755
1da177e4
LT
756 default:
757 ret = -ENOTTY;
758 }
759
760 return ret;
761} /* memory_ioctl */
762
763static struct file_operations mtd_fops = {
764 .owner = THIS_MODULE,
765 .llseek = mtd_lseek,
766 .read = mtd_read,
767 .write = mtd_write,
768 .ioctl = mtd_ioctl,
769 .open = mtd_open,
770 .release = mtd_close,
771};
772
773static int __init init_mtdchar(void)
774{
775 if (register_chrdev(MTD_CHAR_MAJOR, "mtd", &mtd_fops)) {
776 printk(KERN_NOTICE "Can't allocate major number %d for Memory Technology Devices.\n",
777 MTD_CHAR_MAJOR);
778 return -EAGAIN;
779 }
780
9bc7b387
TP
781 mtd_class = class_create(THIS_MODULE, "mtd");
782
783 if (IS_ERR(mtd_class)) {
784 printk(KERN_ERR "Error creating mtd class.\n");
785 unregister_chrdev(MTD_CHAR_MAJOR, "mtd");
3a7a8824 786 return PTR_ERR(mtd_class);
9bc7b387
TP
787 }
788
789 register_mtd_user(&notifier);
1da177e4
LT
790 return 0;
791}
792
793static void __exit cleanup_mtdchar(void)
794{
9bc7b387
TP
795 unregister_mtd_user(&notifier);
796 class_destroy(mtd_class);
1da177e4
LT
797 unregister_chrdev(MTD_CHAR_MAJOR, "mtd");
798}
799
800module_init(init_mtdchar);
801module_exit(cleanup_mtdchar);
802
803
804MODULE_LICENSE("GPL");
805MODULE_AUTHOR("David Woodhouse <dwmw2@infradead.org>");
806MODULE_DESCRIPTION("Direct character-device access to MTD devices");