Commit | Line | Data |
---|---|---|
1da177e4 | 1 | /* |
1da177e4 LT |
2 | * Character-device access to raw MTD devices. |
3 | * | |
4 | */ | |
5 | ||
15fdc52f TG |
6 | #include <linux/device.h> |
7 | #include <linux/fs.h> | |
0c1eafdb | 8 | #include <linux/mm.h> |
9c74034f | 9 | #include <linux/err.h> |
15fdc52f | 10 | #include <linux/init.h> |
1da177e4 LT |
11 | #include <linux/kernel.h> |
12 | #include <linux/module.h> | |
15fdc52f TG |
13 | #include <linux/slab.h> |
14 | #include <linux/sched.h> | |
6071239e | 15 | #include <linux/smp_lock.h> |
15fdc52f | 16 | |
1da177e4 LT |
17 | #include <linux/mtd/mtd.h> |
18 | #include <linux/mtd/compatmac.h> | |
1da177e4 | 19 | |
15fdc52f | 20 | #include <asm/uaccess.h> |
9bc7b387 TP |
21 | |
22 | static struct class *mtd_class; | |
1da177e4 LT |
23 | |
24 | static void mtd_notify_add(struct mtd_info* mtd) | |
25 | { | |
26 | if (!mtd) | |
27 | return; | |
28 | ||
a9b12619 GKH |
29 | device_create(mtd_class, NULL, MKDEV(MTD_CHAR_MAJOR, mtd->index*2), |
30 | NULL, "mtd%d", mtd->index); | |
97894cda | 31 | |
a9b12619 GKH |
32 | device_create(mtd_class, NULL, MKDEV(MTD_CHAR_MAJOR, mtd->index*2+1), |
33 | NULL, "mtd%dro", mtd->index); | |
1da177e4 LT |
34 | } |
35 | ||
36 | static void mtd_notify_remove(struct mtd_info* mtd) | |
37 | { | |
38 | if (!mtd) | |
39 | return; | |
9bc7b387 | 40 | |
a98894ab TJ |
41 | device_destroy(mtd_class, MKDEV(MTD_CHAR_MAJOR, mtd->index*2)); |
42 | device_destroy(mtd_class, MKDEV(MTD_CHAR_MAJOR, mtd->index*2+1)); | |
1da177e4 LT |
43 | } |
44 | ||
45 | static struct mtd_notifier notifier = { | |
46 | .add = mtd_notify_add, | |
47 | .remove = mtd_notify_remove, | |
48 | }; | |
49 | ||
045e9a5d | 50 | /* |
f1a28c02 TG |
51 | * Data structure to hold the pointer to the mtd device as well |
52 | * as mode information ofr various use cases. | |
045e9a5d | 53 | */ |
f1a28c02 TG |
54 | struct mtd_file_info { |
55 | struct mtd_info *mtd; | |
56 | enum mtd_file_modes mode; | |
57 | }; | |
31f4233b | 58 | |
1da177e4 LT |
59 | static loff_t mtd_lseek (struct file *file, loff_t offset, int orig) |
60 | { | |
f1a28c02 TG |
61 | struct mtd_file_info *mfi = file->private_data; |
62 | struct mtd_info *mtd = mfi->mtd; | |
1da177e4 LT |
63 | |
64 | switch (orig) { | |
ea59830d | 65 | case SEEK_SET: |
1da177e4 | 66 | break; |
ea59830d | 67 | case SEEK_CUR: |
8b491d75 | 68 | offset += file->f_pos; |
1da177e4 | 69 | break; |
ea59830d | 70 | case SEEK_END: |
8b491d75 | 71 | offset += mtd->size; |
1da177e4 LT |
72 | break; |
73 | default: | |
74 | return -EINVAL; | |
75 | } | |
76 | ||
1887f517 | 77 | if (offset >= 0 && offset <= mtd->size) |
8b491d75 | 78 | return file->f_pos = offset; |
1da177e4 | 79 | |
8b491d75 | 80 | return -EINVAL; |
1da177e4 LT |
81 | } |
82 | ||
83 | ||
84 | ||
85 | static int mtd_open(struct inode *inode, struct file *file) | |
86 | { | |
87 | int minor = iminor(inode); | |
88 | int devnum = minor >> 1; | |
6071239e | 89 | int ret = 0; |
1da177e4 | 90 | struct mtd_info *mtd; |
f1a28c02 | 91 | struct mtd_file_info *mfi; |
1da177e4 LT |
92 | |
93 | DEBUG(MTD_DEBUG_LEVEL0, "MTD_open\n"); | |
94 | ||
95 | if (devnum >= MAX_MTD_DEVICES) | |
96 | return -ENODEV; | |
97 | ||
98 | /* You can't open the RO devices RW */ | |
aeb5d727 | 99 | if ((file->f_mode & FMODE_WRITE) && (minor & 1)) |
1da177e4 LT |
100 | return -EACCES; |
101 | ||
6071239e | 102 | lock_kernel(); |
1da177e4 | 103 | mtd = get_mtd_device(NULL, devnum); |
97894cda | 104 | |
6071239e JC |
105 | if (IS_ERR(mtd)) { |
106 | ret = PTR_ERR(mtd); | |
107 | goto out; | |
108 | } | |
97894cda | 109 | |
1da177e4 LT |
110 | if (MTD_ABSENT == mtd->type) { |
111 | put_mtd_device(mtd); | |
6071239e JC |
112 | ret = -ENODEV; |
113 | goto out; | |
1da177e4 LT |
114 | } |
115 | ||
1da177e4 | 116 | /* You can't open it RW if it's not a writeable device */ |
aeb5d727 | 117 | if ((file->f_mode & FMODE_WRITE) && !(mtd->flags & MTD_WRITEABLE)) { |
1da177e4 | 118 | put_mtd_device(mtd); |
6071239e JC |
119 | ret = -EACCES; |
120 | goto out; | |
1da177e4 | 121 | } |
97894cda | 122 | |
f1a28c02 TG |
123 | mfi = kzalloc(sizeof(*mfi), GFP_KERNEL); |
124 | if (!mfi) { | |
125 | put_mtd_device(mtd); | |
6071239e JC |
126 | ret = -ENOMEM; |
127 | goto out; | |
f1a28c02 TG |
128 | } |
129 | mfi->mtd = mtd; | |
130 | file->private_data = mfi; | |
131 | ||
6071239e JC |
132 | out: |
133 | unlock_kernel(); | |
134 | return ret; | |
1da177e4 LT |
135 | } /* mtd_open */ |
136 | ||
137 | /*====================================================================*/ | |
138 | ||
139 | static int mtd_close(struct inode *inode, struct file *file) | |
140 | { | |
f1a28c02 TG |
141 | struct mtd_file_info *mfi = file->private_data; |
142 | struct mtd_info *mtd = mfi->mtd; | |
1da177e4 LT |
143 | |
144 | DEBUG(MTD_DEBUG_LEVEL0, "MTD_close\n"); | |
145 | ||
7eafaed5 | 146 | /* Only sync if opened RW */ |
aeb5d727 | 147 | if ((file->f_mode & FMODE_WRITE) && mtd->sync) |
1da177e4 | 148 | mtd->sync(mtd); |
97894cda | 149 | |
1da177e4 | 150 | put_mtd_device(mtd); |
f1a28c02 TG |
151 | file->private_data = NULL; |
152 | kfree(mfi); | |
1da177e4 LT |
153 | |
154 | return 0; | |
155 | } /* mtd_close */ | |
156 | ||
157 | /* FIXME: This _really_ needs to die. In 2.5, we should lock the | |
158 | userspace buffer down and use it directly with readv/writev. | |
159 | */ | |
160 | #define MAX_KMALLOC_SIZE 0x20000 | |
161 | ||
162 | static ssize_t mtd_read(struct file *file, char __user *buf, size_t count,loff_t *ppos) | |
163 | { | |
f1a28c02 TG |
164 | struct mtd_file_info *mfi = file->private_data; |
165 | struct mtd_info *mtd = mfi->mtd; | |
1da177e4 LT |
166 | size_t retlen=0; |
167 | size_t total_retlen=0; | |
168 | int ret=0; | |
169 | int len; | |
170 | char *kbuf; | |
97894cda | 171 | |
1da177e4 LT |
172 | DEBUG(MTD_DEBUG_LEVEL0,"MTD_read\n"); |
173 | ||
174 | if (*ppos + count > mtd->size) | |
175 | count = mtd->size - *ppos; | |
176 | ||
177 | if (!count) | |
178 | return 0; | |
97894cda | 179 | |
1da177e4 LT |
180 | /* FIXME: Use kiovec in 2.5 to lock down the user's buffers |
181 | and pass them directly to the MTD functions */ | |
b802c074 TG |
182 | |
183 | if (count > MAX_KMALLOC_SIZE) | |
184 | kbuf=kmalloc(MAX_KMALLOC_SIZE, GFP_KERNEL); | |
185 | else | |
186 | kbuf=kmalloc(count, GFP_KERNEL); | |
187 | ||
188 | if (!kbuf) | |
189 | return -ENOMEM; | |
190 | ||
1da177e4 | 191 | while (count) { |
b802c074 | 192 | |
97894cda | 193 | if (count > MAX_KMALLOC_SIZE) |
1da177e4 LT |
194 | len = MAX_KMALLOC_SIZE; |
195 | else | |
196 | len = count; | |
197 | ||
f1a28c02 TG |
198 | switch (mfi->mode) { |
199 | case MTD_MODE_OTP_FACTORY: | |
31f4233b NP |
200 | ret = mtd->read_fact_prot_reg(mtd, *ppos, len, &retlen, kbuf); |
201 | break; | |
202 | case MTD_MODE_OTP_USER: | |
203 | ret = mtd->read_user_prot_reg(mtd, *ppos, len, &retlen, kbuf); | |
204 | break; | |
f1a28c02 TG |
205 | case MTD_MODE_RAW: |
206 | { | |
207 | struct mtd_oob_ops ops; | |
208 | ||
209 | ops.mode = MTD_OOB_RAW; | |
210 | ops.datbuf = kbuf; | |
211 | ops.oobbuf = NULL; | |
212 | ops.len = len; | |
213 | ||
214 | ret = mtd->read_oob(mtd, *ppos, &ops); | |
215 | retlen = ops.retlen; | |
216 | break; | |
217 | } | |
31f4233b | 218 | default: |
f4a43cfc | 219 | ret = mtd->read(mtd, *ppos, len, &retlen, kbuf); |
31f4233b | 220 | } |
1da177e4 LT |
221 | /* Nand returns -EBADMSG on ecc errors, but it returns |
222 | * the data. For our userspace tools it is important | |
97894cda | 223 | * to dump areas with ecc errors ! |
9a1fcdfd TG |
224 | * For kernel internal usage it also might return -EUCLEAN |
225 | * to signal the caller that a bitflip has occured and has | |
226 | * been corrected by the ECC algorithm. | |
1da177e4 LT |
227 | * Userspace software which accesses NAND this way |
228 | * must be aware of the fact that it deals with NAND | |
229 | */ | |
9a1fcdfd | 230 | if (!ret || (ret == -EUCLEAN) || (ret == -EBADMSG)) { |
1da177e4 LT |
231 | *ppos += retlen; |
232 | if (copy_to_user(buf, kbuf, retlen)) { | |
f4a43cfc | 233 | kfree(kbuf); |
1da177e4 LT |
234 | return -EFAULT; |
235 | } | |
236 | else | |
237 | total_retlen += retlen; | |
238 | ||
239 | count -= retlen; | |
240 | buf += retlen; | |
31f4233b NP |
241 | if (retlen == 0) |
242 | count = 0; | |
1da177e4 LT |
243 | } |
244 | else { | |
245 | kfree(kbuf); | |
246 | return ret; | |
247 | } | |
97894cda | 248 | |
1da177e4 LT |
249 | } |
250 | ||
b802c074 | 251 | kfree(kbuf); |
1da177e4 LT |
252 | return total_retlen; |
253 | } /* mtd_read */ | |
254 | ||
255 | static ssize_t mtd_write(struct file *file, const char __user *buf, size_t count,loff_t *ppos) | |
256 | { | |
f1a28c02 TG |
257 | struct mtd_file_info *mfi = file->private_data; |
258 | struct mtd_info *mtd = mfi->mtd; | |
1da177e4 LT |
259 | char *kbuf; |
260 | size_t retlen; | |
261 | size_t total_retlen=0; | |
262 | int ret=0; | |
263 | int len; | |
264 | ||
265 | DEBUG(MTD_DEBUG_LEVEL0,"MTD_write\n"); | |
97894cda | 266 | |
1da177e4 LT |
267 | if (*ppos == mtd->size) |
268 | return -ENOSPC; | |
97894cda | 269 | |
1da177e4 LT |
270 | if (*ppos + count > mtd->size) |
271 | count = mtd->size - *ppos; | |
272 | ||
273 | if (!count) | |
274 | return 0; | |
275 | ||
b802c074 TG |
276 | if (count > MAX_KMALLOC_SIZE) |
277 | kbuf=kmalloc(MAX_KMALLOC_SIZE, GFP_KERNEL); | |
278 | else | |
279 | kbuf=kmalloc(count, GFP_KERNEL); | |
280 | ||
281 | if (!kbuf) | |
282 | return -ENOMEM; | |
283 | ||
1da177e4 | 284 | while (count) { |
b802c074 | 285 | |
97894cda | 286 | if (count > MAX_KMALLOC_SIZE) |
1da177e4 LT |
287 | len = MAX_KMALLOC_SIZE; |
288 | else | |
289 | len = count; | |
290 | ||
1da177e4 LT |
291 | if (copy_from_user(kbuf, buf, len)) { |
292 | kfree(kbuf); | |
293 | return -EFAULT; | |
294 | } | |
97894cda | 295 | |
f1a28c02 TG |
296 | switch (mfi->mode) { |
297 | case MTD_MODE_OTP_FACTORY: | |
31f4233b NP |
298 | ret = -EROFS; |
299 | break; | |
300 | case MTD_MODE_OTP_USER: | |
301 | if (!mtd->write_user_prot_reg) { | |
302 | ret = -EOPNOTSUPP; | |
303 | break; | |
304 | } | |
305 | ret = mtd->write_user_prot_reg(mtd, *ppos, len, &retlen, kbuf); | |
306 | break; | |
f1a28c02 TG |
307 | |
308 | case MTD_MODE_RAW: | |
309 | { | |
310 | struct mtd_oob_ops ops; | |
311 | ||
312 | ops.mode = MTD_OOB_RAW; | |
313 | ops.datbuf = kbuf; | |
314 | ops.oobbuf = NULL; | |
315 | ops.len = len; | |
316 | ||
317 | ret = mtd->write_oob(mtd, *ppos, &ops); | |
318 | retlen = ops.retlen; | |
319 | break; | |
320 | } | |
321 | ||
31f4233b NP |
322 | default: |
323 | ret = (*(mtd->write))(mtd, *ppos, len, &retlen, kbuf); | |
324 | } | |
1da177e4 LT |
325 | if (!ret) { |
326 | *ppos += retlen; | |
327 | total_retlen += retlen; | |
328 | count -= retlen; | |
329 | buf += retlen; | |
330 | } | |
331 | else { | |
332 | kfree(kbuf); | |
333 | return ret; | |
334 | } | |
1da177e4 LT |
335 | } |
336 | ||
b802c074 | 337 | kfree(kbuf); |
1da177e4 LT |
338 | return total_retlen; |
339 | } /* mtd_write */ | |
340 | ||
341 | /*====================================================================== | |
342 | ||
343 | IOCTL calls for getting device parameters. | |
344 | ||
345 | ======================================================================*/ | |
346 | static void mtdchar_erase_callback (struct erase_info *instr) | |
347 | { | |
348 | wake_up((wait_queue_head_t *)instr->priv); | |
349 | } | |
350 | ||
34a82443 | 351 | #ifdef CONFIG_HAVE_MTD_OTP |
f1a28c02 TG |
352 | static int otp_select_filemode(struct mtd_file_info *mfi, int mode) |
353 | { | |
354 | struct mtd_info *mtd = mfi->mtd; | |
355 | int ret = 0; | |
356 | ||
357 | switch (mode) { | |
358 | case MTD_OTP_FACTORY: | |
359 | if (!mtd->read_fact_prot_reg) | |
360 | ret = -EOPNOTSUPP; | |
361 | else | |
362 | mfi->mode = MTD_MODE_OTP_FACTORY; | |
363 | break; | |
364 | case MTD_OTP_USER: | |
365 | if (!mtd->read_fact_prot_reg) | |
366 | ret = -EOPNOTSUPP; | |
367 | else | |
368 | mfi->mode = MTD_MODE_OTP_USER; | |
369 | break; | |
370 | default: | |
371 | ret = -EINVAL; | |
372 | case MTD_OTP_OFF: | |
373 | break; | |
374 | } | |
375 | return ret; | |
376 | } | |
377 | #else | |
378 | # define otp_select_filemode(f,m) -EOPNOTSUPP | |
379 | #endif | |
380 | ||
1da177e4 LT |
381 | static int mtd_ioctl(struct inode *inode, struct file *file, |
382 | u_int cmd, u_long arg) | |
383 | { | |
f1a28c02 TG |
384 | struct mtd_file_info *mfi = file->private_data; |
385 | struct mtd_info *mtd = mfi->mtd; | |
1da177e4 LT |
386 | void __user *argp = (void __user *)arg; |
387 | int ret = 0; | |
388 | u_long size; | |
73c619ea | 389 | struct mtd_info_user info; |
97894cda | 390 | |
1da177e4 LT |
391 | DEBUG(MTD_DEBUG_LEVEL0, "MTD_ioctl\n"); |
392 | ||
393 | size = (cmd & IOCSIZE_MASK) >> IOCSIZE_SHIFT; | |
394 | if (cmd & IOC_IN) { | |
395 | if (!access_ok(VERIFY_READ, argp, size)) | |
396 | return -EFAULT; | |
397 | } | |
398 | if (cmd & IOC_OUT) { | |
399 | if (!access_ok(VERIFY_WRITE, argp, size)) | |
400 | return -EFAULT; | |
401 | } | |
97894cda | 402 | |
1da177e4 LT |
403 | switch (cmd) { |
404 | case MEMGETREGIONCOUNT: | |
405 | if (copy_to_user(argp, &(mtd->numeraseregions), sizeof(int))) | |
406 | return -EFAULT; | |
407 | break; | |
408 | ||
409 | case MEMGETREGIONINFO: | |
410 | { | |
b67c5f87 ZW |
411 | uint32_t ur_idx; |
412 | struct mtd_erase_region_info *kr; | |
413 | struct region_info_user *ur = (struct region_info_user *) argp; | |
1da177e4 | 414 | |
b67c5f87 | 415 | if (get_user(ur_idx, &(ur->regionindex))) |
1da177e4 LT |
416 | return -EFAULT; |
417 | ||
b67c5f87 ZW |
418 | kr = &(mtd->eraseregions[ur_idx]); |
419 | ||
420 | if (put_user(kr->offset, &(ur->offset)) | |
421 | || put_user(kr->erasesize, &(ur->erasesize)) | |
422 | || put_user(kr->numblocks, &(ur->numblocks))) | |
1da177e4 | 423 | return -EFAULT; |
b67c5f87 | 424 | |
1da177e4 LT |
425 | break; |
426 | } | |
427 | ||
428 | case MEMGETINFO: | |
73c619ea JE |
429 | info.type = mtd->type; |
430 | info.flags = mtd->flags; | |
431 | info.size = mtd->size; | |
432 | info.erasesize = mtd->erasesize; | |
433 | info.writesize = mtd->writesize; | |
434 | info.oobsize = mtd->oobsize; | |
64f60710 AB |
435 | /* The below fields are obsolete */ |
436 | info.ecctype = -1; | |
437 | info.eccsize = 0; | |
73c619ea | 438 | if (copy_to_user(argp, &info, sizeof(struct mtd_info_user))) |
1da177e4 LT |
439 | return -EFAULT; |
440 | break; | |
441 | ||
442 | case MEMERASE: | |
443 | { | |
444 | struct erase_info *erase; | |
445 | ||
aeb5d727 | 446 | if(!(file->f_mode & FMODE_WRITE)) |
1da177e4 LT |
447 | return -EPERM; |
448 | ||
95b93a0c | 449 | erase=kzalloc(sizeof(struct erase_info),GFP_KERNEL); |
1da177e4 LT |
450 | if (!erase) |
451 | ret = -ENOMEM; | |
452 | else { | |
453 | wait_queue_head_t waitq; | |
454 | DECLARE_WAITQUEUE(wait, current); | |
455 | ||
456 | init_waitqueue_head(&waitq); | |
457 | ||
1da177e4 LT |
458 | if (copy_from_user(&erase->addr, argp, |
459 | sizeof(struct erase_info_user))) { | |
460 | kfree(erase); | |
461 | return -EFAULT; | |
462 | } | |
463 | erase->mtd = mtd; | |
464 | erase->callback = mtdchar_erase_callback; | |
465 | erase->priv = (unsigned long)&waitq; | |
97894cda | 466 | |
1da177e4 LT |
467 | /* |
468 | FIXME: Allow INTERRUPTIBLE. Which means | |
469 | not having the wait_queue head on the stack. | |
97894cda | 470 | |
1da177e4 LT |
471 | If the wq_head is on the stack, and we |
472 | leave because we got interrupted, then the | |
473 | wq_head is no longer there when the | |
474 | callback routine tries to wake us up. | |
475 | */ | |
476 | ret = mtd->erase(mtd, erase); | |
477 | if (!ret) { | |
478 | set_current_state(TASK_UNINTERRUPTIBLE); | |
479 | add_wait_queue(&waitq, &wait); | |
480 | if (erase->state != MTD_ERASE_DONE && | |
481 | erase->state != MTD_ERASE_FAILED) | |
482 | schedule(); | |
483 | remove_wait_queue(&waitq, &wait); | |
484 | set_current_state(TASK_RUNNING); | |
485 | ||
486 | ret = (erase->state == MTD_ERASE_FAILED)?-EIO:0; | |
487 | } | |
488 | kfree(erase); | |
489 | } | |
490 | break; | |
491 | } | |
492 | ||
493 | case MEMWRITEOOB: | |
494 | { | |
495 | struct mtd_oob_buf buf; | |
8593fbc6 | 496 | struct mtd_oob_ops ops; |
5f692837 | 497 | struct mtd_oob_buf __user *user_buf = argp; |
e9d8d482 | 498 | uint32_t retlen; |
97894cda | 499 | |
aeb5d727 | 500 | if(!(file->f_mode & FMODE_WRITE)) |
1da177e4 LT |
501 | return -EPERM; |
502 | ||
503 | if (copy_from_user(&buf, argp, sizeof(struct mtd_oob_buf))) | |
504 | return -EFAULT; | |
97894cda | 505 | |
8593fbc6 | 506 | if (buf.length > 4096) |
1da177e4 LT |
507 | return -EINVAL; |
508 | ||
509 | if (!mtd->write_oob) | |
510 | ret = -EOPNOTSUPP; | |
511 | else | |
512 | ret = access_ok(VERIFY_READ, buf.ptr, | |
513 | buf.length) ? 0 : EFAULT; | |
514 | ||
515 | if (ret) | |
516 | return ret; | |
517 | ||
7bc3312b | 518 | ops.ooblen = buf.length; |
8593fbc6 TG |
519 | ops.ooboffs = buf.start & (mtd->oobsize - 1); |
520 | ops.datbuf = NULL; | |
521 | ops.mode = MTD_OOB_PLACE; | |
522 | ||
7014568b | 523 | if (ops.ooboffs && ops.ooblen > (mtd->oobsize - ops.ooboffs)) |
8593fbc6 TG |
524 | return -EINVAL; |
525 | ||
526 | ops.oobbuf = kmalloc(buf.length, GFP_KERNEL); | |
527 | if (!ops.oobbuf) | |
1da177e4 | 528 | return -ENOMEM; |
97894cda | 529 | |
8593fbc6 TG |
530 | if (copy_from_user(ops.oobbuf, buf.ptr, buf.length)) { |
531 | kfree(ops.oobbuf); | |
1da177e4 LT |
532 | return -EFAULT; |
533 | } | |
534 | ||
8593fbc6 TG |
535 | buf.start &= ~(mtd->oobsize - 1); |
536 | ret = mtd->write_oob(mtd, buf.start, &ops); | |
1da177e4 | 537 | |
e9d8d482 DS |
538 | if (ops.oobretlen > 0xFFFFFFFFU) |
539 | ret = -EOVERFLOW; | |
540 | retlen = ops.oobretlen; | |
5f692837 | 541 | if (copy_to_user(&user_buf->length, &retlen, sizeof(buf.length))) |
1da177e4 LT |
542 | ret = -EFAULT; |
543 | ||
8593fbc6 | 544 | kfree(ops.oobbuf); |
1da177e4 LT |
545 | break; |
546 | ||
547 | } | |
548 | ||
549 | case MEMREADOOB: | |
550 | { | |
551 | struct mtd_oob_buf buf; | |
8593fbc6 | 552 | struct mtd_oob_ops ops; |
1da177e4 LT |
553 | |
554 | if (copy_from_user(&buf, argp, sizeof(struct mtd_oob_buf))) | |
555 | return -EFAULT; | |
97894cda | 556 | |
8593fbc6 | 557 | if (buf.length > 4096) |
1da177e4 LT |
558 | return -EINVAL; |
559 | ||
560 | if (!mtd->read_oob) | |
561 | ret = -EOPNOTSUPP; | |
562 | else | |
563 | ret = access_ok(VERIFY_WRITE, buf.ptr, | |
564 | buf.length) ? 0 : -EFAULT; | |
1da177e4 LT |
565 | if (ret) |
566 | return ret; | |
567 | ||
7bc3312b | 568 | ops.ooblen = buf.length; |
8593fbc6 TG |
569 | ops.ooboffs = buf.start & (mtd->oobsize - 1); |
570 | ops.datbuf = NULL; | |
571 | ops.mode = MTD_OOB_PLACE; | |
572 | ||
408b483d | 573 | if (ops.ooboffs && ops.ooblen > (mtd->oobsize - ops.ooboffs)) |
8593fbc6 TG |
574 | return -EINVAL; |
575 | ||
576 | ops.oobbuf = kmalloc(buf.length, GFP_KERNEL); | |
577 | if (!ops.oobbuf) | |
1da177e4 | 578 | return -ENOMEM; |
97894cda | 579 | |
8593fbc6 TG |
580 | buf.start &= ~(mtd->oobsize - 1); |
581 | ret = mtd->read_oob(mtd, buf.start, &ops); | |
1da177e4 | 582 | |
7014568b | 583 | if (put_user(ops.oobretlen, (uint32_t __user *)argp)) |
1da177e4 | 584 | ret = -EFAULT; |
7014568b VW |
585 | else if (ops.oobretlen && copy_to_user(buf.ptr, ops.oobbuf, |
586 | ops.oobretlen)) | |
1da177e4 | 587 | ret = -EFAULT; |
97894cda | 588 | |
8593fbc6 | 589 | kfree(ops.oobbuf); |
1da177e4 LT |
590 | break; |
591 | } | |
592 | ||
593 | case MEMLOCK: | |
594 | { | |
175428b2 | 595 | struct erase_info_user einfo; |
1da177e4 | 596 | |
175428b2 | 597 | if (copy_from_user(&einfo, argp, sizeof(einfo))) |
1da177e4 LT |
598 | return -EFAULT; |
599 | ||
600 | if (!mtd->lock) | |
601 | ret = -EOPNOTSUPP; | |
602 | else | |
175428b2 | 603 | ret = mtd->lock(mtd, einfo.start, einfo.length); |
1da177e4 LT |
604 | break; |
605 | } | |
606 | ||
607 | case MEMUNLOCK: | |
608 | { | |
175428b2 | 609 | struct erase_info_user einfo; |
1da177e4 | 610 | |
175428b2 | 611 | if (copy_from_user(&einfo, argp, sizeof(einfo))) |
1da177e4 LT |
612 | return -EFAULT; |
613 | ||
614 | if (!mtd->unlock) | |
615 | ret = -EOPNOTSUPP; | |
616 | else | |
175428b2 | 617 | ret = mtd->unlock(mtd, einfo.start, einfo.length); |
1da177e4 LT |
618 | break; |
619 | } | |
620 | ||
5bd34c09 | 621 | /* Legacy interface */ |
1da177e4 LT |
622 | case MEMGETOOBSEL: |
623 | { | |
5bd34c09 TG |
624 | struct nand_oobinfo oi; |
625 | ||
626 | if (!mtd->ecclayout) | |
627 | return -EOPNOTSUPP; | |
628 | if (mtd->ecclayout->eccbytes > ARRAY_SIZE(oi.eccpos)) | |
629 | return -EINVAL; | |
630 | ||
631 | oi.useecc = MTD_NANDECC_AUTOPLACE; | |
632 | memcpy(&oi.eccpos, mtd->ecclayout->eccpos, sizeof(oi.eccpos)); | |
633 | memcpy(&oi.oobfree, mtd->ecclayout->oobfree, | |
634 | sizeof(oi.oobfree)); | |
d25ade71 | 635 | oi.eccbytes = mtd->ecclayout->eccbytes; |
5bd34c09 TG |
636 | |
637 | if (copy_to_user(argp, &oi, sizeof(struct nand_oobinfo))) | |
1da177e4 LT |
638 | return -EFAULT; |
639 | break; | |
640 | } | |
641 | ||
642 | case MEMGETBADBLOCK: | |
643 | { | |
644 | loff_t offs; | |
97894cda | 645 | |
1da177e4 LT |
646 | if (copy_from_user(&offs, argp, sizeof(loff_t))) |
647 | return -EFAULT; | |
648 | if (!mtd->block_isbad) | |
649 | ret = -EOPNOTSUPP; | |
650 | else | |
651 | return mtd->block_isbad(mtd, offs); | |
652 | break; | |
653 | } | |
654 | ||
655 | case MEMSETBADBLOCK: | |
656 | { | |
657 | loff_t offs; | |
658 | ||
659 | if (copy_from_user(&offs, argp, sizeof(loff_t))) | |
660 | return -EFAULT; | |
661 | if (!mtd->block_markbad) | |
662 | ret = -EOPNOTSUPP; | |
663 | else | |
664 | return mtd->block_markbad(mtd, offs); | |
665 | break; | |
666 | } | |
667 | ||
34a82443 | 668 | #ifdef CONFIG_HAVE_MTD_OTP |
31f4233b NP |
669 | case OTPSELECT: |
670 | { | |
671 | int mode; | |
672 | if (copy_from_user(&mode, argp, sizeof(int))) | |
673 | return -EFAULT; | |
f1a28c02 TG |
674 | |
675 | mfi->mode = MTD_MODE_NORMAL; | |
676 | ||
677 | ret = otp_select_filemode(mfi, mode); | |
678 | ||
81dba488 | 679 | file->f_pos = 0; |
31f4233b NP |
680 | break; |
681 | } | |
682 | ||
683 | case OTPGETREGIONCOUNT: | |
684 | case OTPGETREGIONINFO: | |
685 | { | |
686 | struct otp_info *buf = kmalloc(4096, GFP_KERNEL); | |
687 | if (!buf) | |
688 | return -ENOMEM; | |
689 | ret = -EOPNOTSUPP; | |
f1a28c02 TG |
690 | switch (mfi->mode) { |
691 | case MTD_MODE_OTP_FACTORY: | |
31f4233b NP |
692 | if (mtd->get_fact_prot_info) |
693 | ret = mtd->get_fact_prot_info(mtd, buf, 4096); | |
694 | break; | |
695 | case MTD_MODE_OTP_USER: | |
696 | if (mtd->get_user_prot_info) | |
697 | ret = mtd->get_user_prot_info(mtd, buf, 4096); | |
698 | break; | |
f1a28c02 TG |
699 | default: |
700 | break; | |
31f4233b NP |
701 | } |
702 | if (ret >= 0) { | |
703 | if (cmd == OTPGETREGIONCOUNT) { | |
704 | int nbr = ret / sizeof(struct otp_info); | |
705 | ret = copy_to_user(argp, &nbr, sizeof(int)); | |
706 | } else | |
707 | ret = copy_to_user(argp, buf, ret); | |
708 | if (ret) | |
709 | ret = -EFAULT; | |
710 | } | |
711 | kfree(buf); | |
712 | break; | |
713 | } | |
714 | ||
715 | case OTPLOCK: | |
716 | { | |
175428b2 | 717 | struct otp_info oinfo; |
31f4233b | 718 | |
f1a28c02 | 719 | if (mfi->mode != MTD_MODE_OTP_USER) |
31f4233b | 720 | return -EINVAL; |
175428b2 | 721 | if (copy_from_user(&oinfo, argp, sizeof(oinfo))) |
31f4233b NP |
722 | return -EFAULT; |
723 | if (!mtd->lock_user_prot_reg) | |
724 | return -EOPNOTSUPP; | |
175428b2 | 725 | ret = mtd->lock_user_prot_reg(mtd, oinfo.start, oinfo.length); |
31f4233b NP |
726 | break; |
727 | } | |
728 | #endif | |
729 | ||
f1a28c02 TG |
730 | case ECCGETLAYOUT: |
731 | { | |
732 | if (!mtd->ecclayout) | |
733 | return -EOPNOTSUPP; | |
734 | ||
d25ade71 | 735 | if (copy_to_user(argp, mtd->ecclayout, |
f1a28c02 TG |
736 | sizeof(struct nand_ecclayout))) |
737 | return -EFAULT; | |
738 | break; | |
739 | } | |
740 | ||
741 | case ECCGETSTATS: | |
742 | { | |
743 | if (copy_to_user(argp, &mtd->ecc_stats, | |
744 | sizeof(struct mtd_ecc_stats))) | |
745 | return -EFAULT; | |
746 | break; | |
747 | } | |
748 | ||
749 | case MTDFILEMODE: | |
750 | { | |
751 | mfi->mode = 0; | |
752 | ||
753 | switch(arg) { | |
754 | case MTD_MODE_OTP_FACTORY: | |
755 | case MTD_MODE_OTP_USER: | |
756 | ret = otp_select_filemode(mfi, arg); | |
757 | break; | |
758 | ||
759 | case MTD_MODE_RAW: | |
760 | if (!mtd->read_oob || !mtd->write_oob) | |
761 | return -EOPNOTSUPP; | |
762 | mfi->mode = arg; | |
763 | ||
764 | case MTD_MODE_NORMAL: | |
765 | break; | |
766 | default: | |
767 | ret = -EINVAL; | |
768 | } | |
769 | file->f_pos = 0; | |
770 | break; | |
771 | } | |
772 | ||
1da177e4 LT |
773 | default: |
774 | ret = -ENOTTY; | |
775 | } | |
776 | ||
777 | return ret; | |
778 | } /* memory_ioctl */ | |
779 | ||
d54b1fdb | 780 | static const struct file_operations mtd_fops = { |
1da177e4 LT |
781 | .owner = THIS_MODULE, |
782 | .llseek = mtd_lseek, | |
783 | .read = mtd_read, | |
784 | .write = mtd_write, | |
785 | .ioctl = mtd_ioctl, | |
786 | .open = mtd_open, | |
787 | .release = mtd_close, | |
788 | }; | |
789 | ||
790 | static int __init init_mtdchar(void) | |
791 | { | |
792 | if (register_chrdev(MTD_CHAR_MAJOR, "mtd", &mtd_fops)) { | |
793 | printk(KERN_NOTICE "Can't allocate major number %d for Memory Technology Devices.\n", | |
794 | MTD_CHAR_MAJOR); | |
795 | return -EAGAIN; | |
796 | } | |
797 | ||
9bc7b387 TP |
798 | mtd_class = class_create(THIS_MODULE, "mtd"); |
799 | ||
800 | if (IS_ERR(mtd_class)) { | |
801 | printk(KERN_ERR "Error creating mtd class.\n"); | |
802 | unregister_chrdev(MTD_CHAR_MAJOR, "mtd"); | |
3a7a8824 | 803 | return PTR_ERR(mtd_class); |
9bc7b387 TP |
804 | } |
805 | ||
806 | register_mtd_user(¬ifier); | |
1da177e4 LT |
807 | return 0; |
808 | } | |
809 | ||
810 | static void __exit cleanup_mtdchar(void) | |
811 | { | |
9bc7b387 TP |
812 | unregister_mtd_user(¬ifier); |
813 | class_destroy(mtd_class); | |
1da177e4 LT |
814 | unregister_chrdev(MTD_CHAR_MAJOR, "mtd"); |
815 | } | |
816 | ||
817 | module_init(init_mtdchar); | |
818 | module_exit(cleanup_mtdchar); | |
819 | ||
820 | ||
821 | MODULE_LICENSE("GPL"); | |
822 | MODULE_AUTHOR("David Woodhouse <dwmw2@infradead.org>"); | |
823 | MODULE_DESCRIPTION("Direct character-device access to MTD devices"); |