mtd: nand: kill member `ops' of `struct nand_chip'
[deliverable/linux.git] / drivers / mtd / mtdchar.c
CommitLineData
1da177e4 1/*
a1452a37
DW
2 * Copyright © 1999-2010 David Woodhouse <dwmw2@infradead.org>
3 *
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License as published by
6 * the Free Software Foundation; either version 2 of the License, or
7 * (at your option) any later version.
8 *
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
13 *
14 * You should have received a copy of the GNU General Public License
15 * along with this program; if not, write to the Free Software
16 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
1da177e4
LT
17 *
18 */
19
15fdc52f
TG
20#include <linux/device.h>
21#include <linux/fs.h>
0c1eafdb 22#include <linux/mm.h>
9c74034f 23#include <linux/err.h>
15fdc52f 24#include <linux/init.h>
1da177e4
LT
25#include <linux/kernel.h>
26#include <linux/module.h>
15fdc52f
TG
27#include <linux/slab.h>
28#include <linux/sched.h>
5aa82940 29#include <linux/mutex.h>
402d3265 30#include <linux/backing-dev.h>
97718540 31#include <linux/compat.h>
cd874237 32#include <linux/mount.h>
d0f7959e 33#include <linux/blkpg.h>
1da177e4 34#include <linux/mtd/mtd.h>
d0f7959e 35#include <linux/mtd/partitions.h>
dd02b67d 36#include <linux/mtd/map.h>
1da177e4 37
15fdc52f 38#include <asm/uaccess.h>
9bc7b387 39
cd874237 40#define MTD_INODE_FS_MAGIC 0x11307854
5aa82940 41static DEFINE_MUTEX(mtd_mutex);
cd874237 42static struct vfsmount *mtd_inode_mnt __read_mostly;
1da177e4 43
045e9a5d 44/*
f1a28c02 45 * Data structure to hold the pointer to the mtd device as well
92394b5c 46 * as mode information of various use cases.
045e9a5d 47 */
f1a28c02
TG
48struct mtd_file_info {
49 struct mtd_info *mtd;
cd874237 50 struct inode *ino;
f1a28c02
TG
51 enum mtd_file_modes mode;
52};
31f4233b 53
1da177e4
LT
54static loff_t mtd_lseek (struct file *file, loff_t offset, int orig)
55{
f1a28c02
TG
56 struct mtd_file_info *mfi = file->private_data;
57 struct mtd_info *mtd = mfi->mtd;
1da177e4
LT
58
59 switch (orig) {
ea59830d 60 case SEEK_SET:
1da177e4 61 break;
ea59830d 62 case SEEK_CUR:
8b491d75 63 offset += file->f_pos;
1da177e4 64 break;
ea59830d 65 case SEEK_END:
8b491d75 66 offset += mtd->size;
1da177e4
LT
67 break;
68 default:
69 return -EINVAL;
70 }
71
1887f517 72 if (offset >= 0 && offset <= mtd->size)
8b491d75 73 return file->f_pos = offset;
1da177e4 74
8b491d75 75 return -EINVAL;
1da177e4
LT
76}
77
78
79
80static int mtd_open(struct inode *inode, struct file *file)
81{
82 int minor = iminor(inode);
83 int devnum = minor >> 1;
6071239e 84 int ret = 0;
1da177e4 85 struct mtd_info *mtd;
f1a28c02 86 struct mtd_file_info *mfi;
cd874237 87 struct inode *mtd_ino;
1da177e4 88
289c0522 89 pr_debug("MTD_open\n");
1da177e4 90
1da177e4 91 /* You can't open the RO devices RW */
aeb5d727 92 if ((file->f_mode & FMODE_WRITE) && (minor & 1))
1da177e4
LT
93 return -EACCES;
94
5aa82940 95 mutex_lock(&mtd_mutex);
1da177e4 96 mtd = get_mtd_device(NULL, devnum);
97894cda 97
6071239e
JC
98 if (IS_ERR(mtd)) {
99 ret = PTR_ERR(mtd);
100 goto out;
101 }
97894cda 102
402d3265 103 if (mtd->type == MTD_ABSENT) {
1da177e4 104 put_mtd_device(mtd);
6071239e
JC
105 ret = -ENODEV;
106 goto out;
1da177e4
LT
107 }
108
cd874237
KS
109 mtd_ino = iget_locked(mtd_inode_mnt->mnt_sb, devnum);
110 if (!mtd_ino) {
111 put_mtd_device(mtd);
112 ret = -ENOMEM;
113 goto out;
114 }
115 if (mtd_ino->i_state & I_NEW) {
116 mtd_ino->i_private = mtd;
117 mtd_ino->i_mode = S_IFCHR;
118 mtd_ino->i_data.backing_dev_info = mtd->backing_dev_info;
119 unlock_new_inode(mtd_ino);
120 }
121 file->f_mapping = mtd_ino->i_mapping;
402d3265 122
1da177e4 123 /* You can't open it RW if it's not a writeable device */
aeb5d727 124 if ((file->f_mode & FMODE_WRITE) && !(mtd->flags & MTD_WRITEABLE)) {
cd874237 125 iput(mtd_ino);
1da177e4 126 put_mtd_device(mtd);
6071239e
JC
127 ret = -EACCES;
128 goto out;
1da177e4 129 }
97894cda 130
f1a28c02
TG
131 mfi = kzalloc(sizeof(*mfi), GFP_KERNEL);
132 if (!mfi) {
cd874237 133 iput(mtd_ino);
f1a28c02 134 put_mtd_device(mtd);
6071239e
JC
135 ret = -ENOMEM;
136 goto out;
f1a28c02 137 }
cd874237 138 mfi->ino = mtd_ino;
f1a28c02
TG
139 mfi->mtd = mtd;
140 file->private_data = mfi;
141
6071239e 142out:
5aa82940 143 mutex_unlock(&mtd_mutex);
6071239e 144 return ret;
1da177e4
LT
145} /* mtd_open */
146
147/*====================================================================*/
148
149static int mtd_close(struct inode *inode, struct file *file)
150{
f1a28c02
TG
151 struct mtd_file_info *mfi = file->private_data;
152 struct mtd_info *mtd = mfi->mtd;
1da177e4 153
289c0522 154 pr_debug("MTD_close\n");
1da177e4 155
7eafaed5 156 /* Only sync if opened RW */
aeb5d727 157 if ((file->f_mode & FMODE_WRITE) && mtd->sync)
1da177e4 158 mtd->sync(mtd);
97894cda 159
cd874237
KS
160 iput(mfi->ino);
161
1da177e4 162 put_mtd_device(mtd);
f1a28c02
TG
163 file->private_data = NULL;
164 kfree(mfi);
1da177e4
LT
165
166 return 0;
167} /* mtd_close */
168
3e45cf5e
GE
169/* Back in June 2001, dwmw2 wrote:
170 *
171 * FIXME: This _really_ needs to die. In 2.5, we should lock the
172 * userspace buffer down and use it directly with readv/writev.
173 *
174 * The implementation below, using mtd_kmalloc_up_to, mitigates
175 * allocation failures when the system is under low-memory situations
176 * or if memory is highly fragmented at the cost of reducing the
177 * performance of the requested transfer due to a smaller buffer size.
178 *
179 * A more complex but more memory-efficient implementation based on
180 * get_user_pages and iovecs to cover extents of those pages is a
181 * longer-term goal, as intimated by dwmw2 above. However, for the
182 * write case, this requires yet more complex head and tail transfer
183 * handling when those head and tail offsets and sizes are such that
184 * alignment requirements are not met in the NAND subdriver.
185 */
1da177e4
LT
186
187static ssize_t mtd_read(struct file *file, char __user *buf, size_t count,loff_t *ppos)
188{
f1a28c02
TG
189 struct mtd_file_info *mfi = file->private_data;
190 struct mtd_info *mtd = mfi->mtd;
1da177e4
LT
191 size_t retlen=0;
192 size_t total_retlen=0;
193 int ret=0;
194 int len;
3e45cf5e 195 size_t size = count;
1da177e4 196 char *kbuf;
97894cda 197
289c0522 198 pr_debug("MTD_read\n");
1da177e4
LT
199
200 if (*ppos + count > mtd->size)
201 count = mtd->size - *ppos;
202
203 if (!count)
204 return 0;
97894cda 205
3e45cf5e 206 kbuf = mtd_kmalloc_up_to(mtd, &size);
b802c074
TG
207 if (!kbuf)
208 return -ENOMEM;
209
1da177e4 210 while (count) {
3e45cf5e 211 len = min_t(size_t, count, size);
1da177e4 212
f1a28c02 213 switch (mfi->mode) {
beb133fc 214 case MTD_FILE_MODE_OTP_FACTORY:
31f4233b
NP
215 ret = mtd->read_fact_prot_reg(mtd, *ppos, len, &retlen, kbuf);
216 break;
beb133fc 217 case MTD_FILE_MODE_OTP_USER:
31f4233b
NP
218 ret = mtd->read_user_prot_reg(mtd, *ppos, len, &retlen, kbuf);
219 break;
beb133fc 220 case MTD_FILE_MODE_RAW:
f1a28c02
TG
221 {
222 struct mtd_oob_ops ops;
223
0612b9dd 224 ops.mode = MTD_OPS_RAW;
f1a28c02
TG
225 ops.datbuf = kbuf;
226 ops.oobbuf = NULL;
227 ops.len = len;
228
229 ret = mtd->read_oob(mtd, *ppos, &ops);
230 retlen = ops.retlen;
231 break;
232 }
31f4233b 233 default:
f4a43cfc 234 ret = mtd->read(mtd, *ppos, len, &retlen, kbuf);
31f4233b 235 }
7854d3f7 236 /* Nand returns -EBADMSG on ECC errors, but it returns
1da177e4 237 * the data. For our userspace tools it is important
7854d3f7 238 * to dump areas with ECC errors!
9a1fcdfd 239 * For kernel internal usage it also might return -EUCLEAN
25985edc 240 * to signal the caller that a bitflip has occurred and has
9a1fcdfd 241 * been corrected by the ECC algorithm.
1da177e4
LT
242 * Userspace software which accesses NAND this way
243 * must be aware of the fact that it deals with NAND
244 */
9a1fcdfd 245 if (!ret || (ret == -EUCLEAN) || (ret == -EBADMSG)) {
1da177e4
LT
246 *ppos += retlen;
247 if (copy_to_user(buf, kbuf, retlen)) {
f4a43cfc 248 kfree(kbuf);
1da177e4
LT
249 return -EFAULT;
250 }
251 else
252 total_retlen += retlen;
253
254 count -= retlen;
255 buf += retlen;
31f4233b
NP
256 if (retlen == 0)
257 count = 0;
1da177e4
LT
258 }
259 else {
260 kfree(kbuf);
261 return ret;
262 }
97894cda 263
1da177e4
LT
264 }
265
b802c074 266 kfree(kbuf);
1da177e4
LT
267 return total_retlen;
268} /* mtd_read */
269
270static ssize_t mtd_write(struct file *file, const char __user *buf, size_t count,loff_t *ppos)
271{
f1a28c02
TG
272 struct mtd_file_info *mfi = file->private_data;
273 struct mtd_info *mtd = mfi->mtd;
3e45cf5e 274 size_t size = count;
1da177e4
LT
275 char *kbuf;
276 size_t retlen;
277 size_t total_retlen=0;
278 int ret=0;
279 int len;
280
289c0522 281 pr_debug("MTD_write\n");
97894cda 282
1da177e4
LT
283 if (*ppos == mtd->size)
284 return -ENOSPC;
97894cda 285
1da177e4
LT
286 if (*ppos + count > mtd->size)
287 count = mtd->size - *ppos;
288
289 if (!count)
290 return 0;
291
3e45cf5e 292 kbuf = mtd_kmalloc_up_to(mtd, &size);
b802c074
TG
293 if (!kbuf)
294 return -ENOMEM;
295
1da177e4 296 while (count) {
3e45cf5e 297 len = min_t(size_t, count, size);
1da177e4 298
1da177e4
LT
299 if (copy_from_user(kbuf, buf, len)) {
300 kfree(kbuf);
301 return -EFAULT;
302 }
97894cda 303
f1a28c02 304 switch (mfi->mode) {
beb133fc 305 case MTD_FILE_MODE_OTP_FACTORY:
31f4233b
NP
306 ret = -EROFS;
307 break;
beb133fc 308 case MTD_FILE_MODE_OTP_USER:
31f4233b
NP
309 if (!mtd->write_user_prot_reg) {
310 ret = -EOPNOTSUPP;
311 break;
312 }
313 ret = mtd->write_user_prot_reg(mtd, *ppos, len, &retlen, kbuf);
314 break;
f1a28c02 315
beb133fc 316 case MTD_FILE_MODE_RAW:
f1a28c02
TG
317 {
318 struct mtd_oob_ops ops;
319
0612b9dd 320 ops.mode = MTD_OPS_RAW;
f1a28c02
TG
321 ops.datbuf = kbuf;
322 ops.oobbuf = NULL;
bf514081 323 ops.ooboffs = 0;
f1a28c02
TG
324 ops.len = len;
325
326 ret = mtd->write_oob(mtd, *ppos, &ops);
327 retlen = ops.retlen;
328 break;
329 }
330
31f4233b
NP
331 default:
332 ret = (*(mtd->write))(mtd, *ppos, len, &retlen, kbuf);
333 }
1da177e4
LT
334 if (!ret) {
335 *ppos += retlen;
336 total_retlen += retlen;
337 count -= retlen;
338 buf += retlen;
339 }
340 else {
341 kfree(kbuf);
342 return ret;
343 }
1da177e4
LT
344 }
345
b802c074 346 kfree(kbuf);
1da177e4
LT
347 return total_retlen;
348} /* mtd_write */
349
350/*======================================================================
351
352 IOCTL calls for getting device parameters.
353
354======================================================================*/
355static void mtdchar_erase_callback (struct erase_info *instr)
356{
357 wake_up((wait_queue_head_t *)instr->priv);
358}
359
34a82443 360#ifdef CONFIG_HAVE_MTD_OTP
f1a28c02
TG
361static int otp_select_filemode(struct mtd_file_info *mfi, int mode)
362{
363 struct mtd_info *mtd = mfi->mtd;
364 int ret = 0;
365
366 switch (mode) {
367 case MTD_OTP_FACTORY:
368 if (!mtd->read_fact_prot_reg)
369 ret = -EOPNOTSUPP;
370 else
beb133fc 371 mfi->mode = MTD_FILE_MODE_OTP_FACTORY;
f1a28c02
TG
372 break;
373 case MTD_OTP_USER:
374 if (!mtd->read_fact_prot_reg)
375 ret = -EOPNOTSUPP;
376 else
beb133fc 377 mfi->mode = MTD_FILE_MODE_OTP_USER;
f1a28c02
TG
378 break;
379 default:
380 ret = -EINVAL;
381 case MTD_OTP_OFF:
382 break;
383 }
384 return ret;
385}
386#else
387# define otp_select_filemode(f,m) -EOPNOTSUPP
388#endif
389
97718540
KC
390static int mtd_do_writeoob(struct file *file, struct mtd_info *mtd,
391 uint64_t start, uint32_t length, void __user *ptr,
392 uint32_t __user *retp)
393{
9ce244b3 394 struct mtd_file_info *mfi = file->private_data;
97718540
KC
395 struct mtd_oob_ops ops;
396 uint32_t retlen;
397 int ret = 0;
398
399 if (!(file->f_mode & FMODE_WRITE))
400 return -EPERM;
401
402 if (length > 4096)
403 return -EINVAL;
404
405 if (!mtd->write_oob)
406 ret = -EOPNOTSUPP;
407 else
0040476b 408 ret = access_ok(VERIFY_READ, ptr, length) ? 0 : -EFAULT;
97718540
KC
409
410 if (ret)
411 return ret;
412
413 ops.ooblen = length;
305b93f1 414 ops.ooboffs = start & (mtd->writesize - 1);
97718540 415 ops.datbuf = NULL;
beb133fc 416 ops.mode = (mfi->mode == MTD_FILE_MODE_RAW) ? MTD_OPS_RAW :
0612b9dd 417 MTD_OPS_PLACE_OOB;
97718540
KC
418
419 if (ops.ooboffs && ops.ooblen > (mtd->oobsize - ops.ooboffs))
420 return -EINVAL;
421
df1f1d1c
JL
422 ops.oobbuf = memdup_user(ptr, length);
423 if (IS_ERR(ops.oobbuf))
424 return PTR_ERR(ops.oobbuf);
97718540 425
305b93f1 426 start &= ~((uint64_t)mtd->writesize - 1);
97718540
KC
427 ret = mtd->write_oob(mtd, start, &ops);
428
429 if (ops.oobretlen > 0xFFFFFFFFU)
430 ret = -EOVERFLOW;
431 retlen = ops.oobretlen;
432 if (copy_to_user(retp, &retlen, sizeof(length)))
433 ret = -EFAULT;
434
435 kfree(ops.oobbuf);
436 return ret;
437}
438
c46f6483
BN
439static int mtd_do_readoob(struct file *file, struct mtd_info *mtd,
440 uint64_t start, uint32_t length, void __user *ptr,
441 uint32_t __user *retp)
97718540 442{
c46f6483 443 struct mtd_file_info *mfi = file->private_data;
97718540
KC
444 struct mtd_oob_ops ops;
445 int ret = 0;
446
447 if (length > 4096)
448 return -EINVAL;
449
450 if (!mtd->read_oob)
451 ret = -EOPNOTSUPP;
452 else
453 ret = access_ok(VERIFY_WRITE, ptr,
454 length) ? 0 : -EFAULT;
455 if (ret)
456 return ret;
457
458 ops.ooblen = length;
305b93f1 459 ops.ooboffs = start & (mtd->writesize - 1);
97718540 460 ops.datbuf = NULL;
beb133fc 461 ops.mode = (mfi->mode == MTD_FILE_MODE_RAW) ? MTD_OPS_RAW :
0612b9dd 462 MTD_OPS_PLACE_OOB;
97718540
KC
463
464 if (ops.ooboffs && ops.ooblen > (mtd->oobsize - ops.ooboffs))
465 return -EINVAL;
466
467 ops.oobbuf = kmalloc(length, GFP_KERNEL);
468 if (!ops.oobbuf)
469 return -ENOMEM;
470
305b93f1 471 start &= ~((uint64_t)mtd->writesize - 1);
97718540
KC
472 ret = mtd->read_oob(mtd, start, &ops);
473
474 if (put_user(ops.oobretlen, retp))
475 ret = -EFAULT;
476 else if (ops.oobretlen && copy_to_user(ptr, ops.oobbuf,
477 ops.oobretlen))
478 ret = -EFAULT;
479
480 kfree(ops.oobbuf);
041e4575
BN
481
482 /*
483 * NAND returns -EBADMSG on ECC errors, but it returns the OOB
484 * data. For our userspace tools it is important to dump areas
485 * with ECC errors!
486 * For kernel internal usage it also might return -EUCLEAN
487 * to signal the caller that a bitflip has occured and has
488 * been corrected by the ECC algorithm.
489 *
c478d7e4
BN
490 * Note: currently the standard NAND function, nand_read_oob_std,
491 * does not calculate ECC for the OOB area, so do not rely on
492 * this behavior unless you have replaced it with your own.
041e4575
BN
493 */
494 if (ret == -EUCLEAN || ret == -EBADMSG)
495 return 0;
496
97718540
KC
497 return ret;
498}
499
cc26c3cd
BN
500/*
501 * Copies (and truncates, if necessary) data from the larger struct,
502 * nand_ecclayout, to the smaller, deprecated layout struct,
92394b5c 503 * nand_ecclayout_user. This is necessary only to support the deprecated
cc26c3cd
BN
504 * API ioctl ECCGETLAYOUT while allowing all new functionality to use
505 * nand_ecclayout flexibly (i.e. the struct may change size in new
506 * releases without requiring major rewrites).
507 */
508static int shrink_ecclayout(const struct nand_ecclayout *from,
509 struct nand_ecclayout_user *to)
510{
511 int i;
512
513 if (!from || !to)
514 return -EINVAL;
515
516 memset(to, 0, sizeof(*to));
517
0ceacf36 518 to->eccbytes = min((int)from->eccbytes, MTD_MAX_ECCPOS_ENTRIES);
cc26c3cd
BN
519 for (i = 0; i < to->eccbytes; i++)
520 to->eccpos[i] = from->eccpos[i];
521
522 for (i = 0; i < MTD_MAX_OOBFREE_ENTRIES; i++) {
523 if (from->oobfree[i].length == 0 &&
524 from->oobfree[i].offset == 0)
525 break;
526 to->oobavail += from->oobfree[i].length;
527 to->oobfree[i] = from->oobfree[i];
528 }
529
530 return 0;
531}
532
d0f7959e
RT
533static int mtd_blkpg_ioctl(struct mtd_info *mtd,
534 struct blkpg_ioctl_arg __user *arg)
535{
536 struct blkpg_ioctl_arg a;
537 struct blkpg_partition p;
538
539 if (!capable(CAP_SYS_ADMIN))
540 return -EPERM;
541
d0f7959e
RT
542 if (copy_from_user(&a, arg, sizeof(struct blkpg_ioctl_arg)))
543 return -EFAULT;
544
545 if (copy_from_user(&p, a.data, sizeof(struct blkpg_partition)))
546 return -EFAULT;
547
548 switch (a.op) {
549 case BLKPG_ADD_PARTITION:
550
a7e93dcd
RT
551 /* Only master mtd device must be used to add partitions */
552 if (mtd_is_partition(mtd))
553 return -EINVAL;
554
d0f7959e
RT
555 return mtd_add_partition(mtd, p.devname, p.start, p.length);
556
557 case BLKPG_DEL_PARTITION:
558
559 if (p.pno < 0)
560 return -EINVAL;
561
562 return mtd_del_partition(mtd, p.pno);
563
564 default:
565 return -EINVAL;
566 }
567}
d0f7959e 568
e99d8b08
BN
569static int mtd_write_ioctl(struct mtd_info *mtd,
570 struct mtd_write_req __user *argp)
571{
572 struct mtd_write_req req;
573 struct mtd_oob_ops ops;
574 void __user *usr_data, *usr_oob;
575 int ret;
576
577 if (copy_from_user(&req, argp, sizeof(req)) ||
578 !access_ok(VERIFY_READ, req.usr_data, req.len) ||
579 !access_ok(VERIFY_READ, req.usr_oob, req.ooblen))
580 return -EFAULT;
581 if (!mtd->write_oob)
582 return -EOPNOTSUPP;
583
584 ops.mode = req.mode;
585 ops.len = (size_t)req.len;
586 ops.ooblen = (size_t)req.ooblen;
587 ops.ooboffs = 0;
588
589 usr_data = (void __user *)(uintptr_t)req.usr_data;
590 usr_oob = (void __user *)(uintptr_t)req.usr_oob;
591
592 if (req.usr_data) {
593 ops.datbuf = memdup_user(usr_data, ops.len);
594 if (IS_ERR(ops.datbuf))
595 return PTR_ERR(ops.datbuf);
596 } else {
597 ops.datbuf = NULL;
598 }
599
600 if (req.usr_oob) {
601 ops.oobbuf = memdup_user(usr_oob, ops.ooblen);
602 if (IS_ERR(ops.oobbuf)) {
603 kfree(ops.datbuf);
604 return PTR_ERR(ops.oobbuf);
605 }
606 } else {
607 ops.oobbuf = NULL;
608 }
609
610 ret = mtd->write_oob(mtd, (loff_t)req.start, &ops);
611
612 kfree(ops.datbuf);
613 kfree(ops.oobbuf);
614
615 return ret;
616}
617
55929332 618static int mtd_ioctl(struct file *file, u_int cmd, u_long arg)
1da177e4 619{
f1a28c02
TG
620 struct mtd_file_info *mfi = file->private_data;
621 struct mtd_info *mtd = mfi->mtd;
1da177e4
LT
622 void __user *argp = (void __user *)arg;
623 int ret = 0;
624 u_long size;
73c619ea 625 struct mtd_info_user info;
97894cda 626
289c0522 627 pr_debug("MTD_ioctl\n");
1da177e4
LT
628
629 size = (cmd & IOCSIZE_MASK) >> IOCSIZE_SHIFT;
630 if (cmd & IOC_IN) {
631 if (!access_ok(VERIFY_READ, argp, size))
632 return -EFAULT;
633 }
634 if (cmd & IOC_OUT) {
635 if (!access_ok(VERIFY_WRITE, argp, size))
636 return -EFAULT;
637 }
97894cda 638
1da177e4
LT
639 switch (cmd) {
640 case MEMGETREGIONCOUNT:
641 if (copy_to_user(argp, &(mtd->numeraseregions), sizeof(int)))
642 return -EFAULT;
643 break;
644
645 case MEMGETREGIONINFO:
646 {
b67c5f87
ZW
647 uint32_t ur_idx;
648 struct mtd_erase_region_info *kr;
bcc98a46 649 struct region_info_user __user *ur = argp;
1da177e4 650
b67c5f87 651 if (get_user(ur_idx, &(ur->regionindex)))
1da177e4
LT
652 return -EFAULT;
653
5e59be1f
DC
654 if (ur_idx >= mtd->numeraseregions)
655 return -EINVAL;
656
b67c5f87
ZW
657 kr = &(mtd->eraseregions[ur_idx]);
658
659 if (put_user(kr->offset, &(ur->offset))
660 || put_user(kr->erasesize, &(ur->erasesize))
661 || put_user(kr->numblocks, &(ur->numblocks)))
1da177e4 662 return -EFAULT;
b67c5f87 663
1da177e4
LT
664 break;
665 }
666
667 case MEMGETINFO:
a0c5a394 668 memset(&info, 0, sizeof(info));
73c619ea
JE
669 info.type = mtd->type;
670 info.flags = mtd->flags;
671 info.size = mtd->size;
672 info.erasesize = mtd->erasesize;
673 info.writesize = mtd->writesize;
674 info.oobsize = mtd->oobsize;
64f60710
AB
675 /* The below fields are obsolete */
676 info.ecctype = -1;
73c619ea 677 if (copy_to_user(argp, &info, sizeof(struct mtd_info_user)))
1da177e4
LT
678 return -EFAULT;
679 break;
680
681 case MEMERASE:
0dc54e9f 682 case MEMERASE64:
1da177e4
LT
683 {
684 struct erase_info *erase;
685
aeb5d727 686 if(!(file->f_mode & FMODE_WRITE))
1da177e4
LT
687 return -EPERM;
688
95b93a0c 689 erase=kzalloc(sizeof(struct erase_info),GFP_KERNEL);
1da177e4
LT
690 if (!erase)
691 ret = -ENOMEM;
692 else {
693 wait_queue_head_t waitq;
694 DECLARE_WAITQUEUE(wait, current);
695
696 init_waitqueue_head(&waitq);
697
0dc54e9f
KC
698 if (cmd == MEMERASE64) {
699 struct erase_info_user64 einfo64;
700
701 if (copy_from_user(&einfo64, argp,
702 sizeof(struct erase_info_user64))) {
703 kfree(erase);
704 return -EFAULT;
705 }
706 erase->addr = einfo64.start;
707 erase->len = einfo64.length;
708 } else {
709 struct erase_info_user einfo32;
710
711 if (copy_from_user(&einfo32, argp,
712 sizeof(struct erase_info_user))) {
713 kfree(erase);
714 return -EFAULT;
715 }
716 erase->addr = einfo32.start;
717 erase->len = einfo32.length;
1da177e4
LT
718 }
719 erase->mtd = mtd;
720 erase->callback = mtdchar_erase_callback;
721 erase->priv = (unsigned long)&waitq;
97894cda 722
1da177e4
LT
723 /*
724 FIXME: Allow INTERRUPTIBLE. Which means
725 not having the wait_queue head on the stack.
97894cda 726
1da177e4
LT
727 If the wq_head is on the stack, and we
728 leave because we got interrupted, then the
729 wq_head is no longer there when the
730 callback routine tries to wake us up.
731 */
732 ret = mtd->erase(mtd, erase);
733 if (!ret) {
734 set_current_state(TASK_UNINTERRUPTIBLE);
735 add_wait_queue(&waitq, &wait);
736 if (erase->state != MTD_ERASE_DONE &&
737 erase->state != MTD_ERASE_FAILED)
738 schedule();
739 remove_wait_queue(&waitq, &wait);
740 set_current_state(TASK_RUNNING);
741
742 ret = (erase->state == MTD_ERASE_FAILED)?-EIO:0;
743 }
744 kfree(erase);
745 }
746 break;
747 }
748
749 case MEMWRITEOOB:
750 {
751 struct mtd_oob_buf buf;
97718540 752 struct mtd_oob_buf __user *buf_user = argp;
1da177e4 753
97718540
KC
754 /* NOTE: writes return length to buf_user->length */
755 if (copy_from_user(&buf, argp, sizeof(buf)))
1da177e4 756 ret = -EFAULT;
97718540
KC
757 else
758 ret = mtd_do_writeoob(file, mtd, buf.start, buf.length,
759 buf.ptr, &buf_user->length);
1da177e4 760 break;
1da177e4
LT
761 }
762
763 case MEMREADOOB:
764 {
765 struct mtd_oob_buf buf;
97718540 766 struct mtd_oob_buf __user *buf_user = argp;
8593fbc6 767
97718540
KC
768 /* NOTE: writes return length to buf_user->start */
769 if (copy_from_user(&buf, argp, sizeof(buf)))
1da177e4 770 ret = -EFAULT;
97718540 771 else
c46f6483 772 ret = mtd_do_readoob(file, mtd, buf.start, buf.length,
97718540 773 buf.ptr, &buf_user->start);
1da177e4
LT
774 break;
775 }
776
aea7cea9
KC
777 case MEMWRITEOOB64:
778 {
779 struct mtd_oob_buf64 buf;
780 struct mtd_oob_buf64 __user *buf_user = argp;
781
782 if (copy_from_user(&buf, argp, sizeof(buf)))
783 ret = -EFAULT;
784 else
785 ret = mtd_do_writeoob(file, mtd, buf.start, buf.length,
786 (void __user *)(uintptr_t)buf.usr_ptr,
787 &buf_user->length);
788 break;
789 }
790
791 case MEMREADOOB64:
792 {
793 struct mtd_oob_buf64 buf;
794 struct mtd_oob_buf64 __user *buf_user = argp;
795
796 if (copy_from_user(&buf, argp, sizeof(buf)))
797 ret = -EFAULT;
798 else
c46f6483 799 ret = mtd_do_readoob(file, mtd, buf.start, buf.length,
aea7cea9
KC
800 (void __user *)(uintptr_t)buf.usr_ptr,
801 &buf_user->length);
802 break;
803 }
804
e99d8b08
BN
805 case MEMWRITE:
806 {
807 ret = mtd_write_ioctl(mtd,
808 (struct mtd_write_req __user *)arg);
809 break;
810 }
811
1da177e4
LT
812 case MEMLOCK:
813 {
175428b2 814 struct erase_info_user einfo;
1da177e4 815
175428b2 816 if (copy_from_user(&einfo, argp, sizeof(einfo)))
1da177e4
LT
817 return -EFAULT;
818
819 if (!mtd->lock)
820 ret = -EOPNOTSUPP;
821 else
175428b2 822 ret = mtd->lock(mtd, einfo.start, einfo.length);
1da177e4
LT
823 break;
824 }
825
826 case MEMUNLOCK:
827 {
175428b2 828 struct erase_info_user einfo;
1da177e4 829
175428b2 830 if (copy_from_user(&einfo, argp, sizeof(einfo)))
1da177e4
LT
831 return -EFAULT;
832
833 if (!mtd->unlock)
834 ret = -EOPNOTSUPP;
835 else
175428b2 836 ret = mtd->unlock(mtd, einfo.start, einfo.length);
1da177e4
LT
837 break;
838 }
839
9938424f
RC
840 case MEMISLOCKED:
841 {
842 struct erase_info_user einfo;
843
844 if (copy_from_user(&einfo, argp, sizeof(einfo)))
845 return -EFAULT;
846
847 if (!mtd->is_locked)
848 ret = -EOPNOTSUPP;
849 else
850 ret = mtd->is_locked(mtd, einfo.start, einfo.length);
851 break;
852 }
853
5bd34c09 854 /* Legacy interface */
1da177e4
LT
855 case MEMGETOOBSEL:
856 {
5bd34c09
TG
857 struct nand_oobinfo oi;
858
859 if (!mtd->ecclayout)
860 return -EOPNOTSUPP;
861 if (mtd->ecclayout->eccbytes > ARRAY_SIZE(oi.eccpos))
862 return -EINVAL;
863
864 oi.useecc = MTD_NANDECC_AUTOPLACE;
865 memcpy(&oi.eccpos, mtd->ecclayout->eccpos, sizeof(oi.eccpos));
866 memcpy(&oi.oobfree, mtd->ecclayout->oobfree,
867 sizeof(oi.oobfree));
d25ade71 868 oi.eccbytes = mtd->ecclayout->eccbytes;
5bd34c09
TG
869
870 if (copy_to_user(argp, &oi, sizeof(struct nand_oobinfo)))
1da177e4
LT
871 return -EFAULT;
872 break;
873 }
874
875 case MEMGETBADBLOCK:
876 {
877 loff_t offs;
97894cda 878
1da177e4
LT
879 if (copy_from_user(&offs, argp, sizeof(loff_t)))
880 return -EFAULT;
881 if (!mtd->block_isbad)
882 ret = -EOPNOTSUPP;
883 else
884 return mtd->block_isbad(mtd, offs);
885 break;
886 }
887
888 case MEMSETBADBLOCK:
889 {
890 loff_t offs;
891
892 if (copy_from_user(&offs, argp, sizeof(loff_t)))
893 return -EFAULT;
894 if (!mtd->block_markbad)
895 ret = -EOPNOTSUPP;
896 else
897 return mtd->block_markbad(mtd, offs);
898 break;
899 }
900
34a82443 901#ifdef CONFIG_HAVE_MTD_OTP
31f4233b
NP
902 case OTPSELECT:
903 {
904 int mode;
905 if (copy_from_user(&mode, argp, sizeof(int)))
906 return -EFAULT;
f1a28c02 907
beb133fc 908 mfi->mode = MTD_FILE_MODE_NORMAL;
f1a28c02
TG
909
910 ret = otp_select_filemode(mfi, mode);
911
81dba488 912 file->f_pos = 0;
31f4233b
NP
913 break;
914 }
915
916 case OTPGETREGIONCOUNT:
917 case OTPGETREGIONINFO:
918 {
919 struct otp_info *buf = kmalloc(4096, GFP_KERNEL);
920 if (!buf)
921 return -ENOMEM;
922 ret = -EOPNOTSUPP;
f1a28c02 923 switch (mfi->mode) {
beb133fc 924 case MTD_FILE_MODE_OTP_FACTORY:
31f4233b
NP
925 if (mtd->get_fact_prot_info)
926 ret = mtd->get_fact_prot_info(mtd, buf, 4096);
927 break;
beb133fc 928 case MTD_FILE_MODE_OTP_USER:
31f4233b
NP
929 if (mtd->get_user_prot_info)
930 ret = mtd->get_user_prot_info(mtd, buf, 4096);
931 break;
f1a28c02
TG
932 default:
933 break;
31f4233b
NP
934 }
935 if (ret >= 0) {
936 if (cmd == OTPGETREGIONCOUNT) {
937 int nbr = ret / sizeof(struct otp_info);
938 ret = copy_to_user(argp, &nbr, sizeof(int));
939 } else
940 ret = copy_to_user(argp, buf, ret);
941 if (ret)
942 ret = -EFAULT;
943 }
944 kfree(buf);
945 break;
946 }
947
948 case OTPLOCK:
949 {
175428b2 950 struct otp_info oinfo;
31f4233b 951
beb133fc 952 if (mfi->mode != MTD_FILE_MODE_OTP_USER)
31f4233b 953 return -EINVAL;
175428b2 954 if (copy_from_user(&oinfo, argp, sizeof(oinfo)))
31f4233b
NP
955 return -EFAULT;
956 if (!mtd->lock_user_prot_reg)
957 return -EOPNOTSUPP;
175428b2 958 ret = mtd->lock_user_prot_reg(mtd, oinfo.start, oinfo.length);
31f4233b
NP
959 break;
960 }
961#endif
962
7854d3f7 963 /* This ioctl is being deprecated - it truncates the ECC layout */
f1a28c02
TG
964 case ECCGETLAYOUT:
965 {
cc26c3cd
BN
966 struct nand_ecclayout_user *usrlay;
967
f1a28c02
TG
968 if (!mtd->ecclayout)
969 return -EOPNOTSUPP;
970
cc26c3cd
BN
971 usrlay = kmalloc(sizeof(*usrlay), GFP_KERNEL);
972 if (!usrlay)
973 return -ENOMEM;
974
975 shrink_ecclayout(mtd->ecclayout, usrlay);
976
977 if (copy_to_user(argp, usrlay, sizeof(*usrlay)))
978 ret = -EFAULT;
979 kfree(usrlay);
f1a28c02
TG
980 break;
981 }
982
983 case ECCGETSTATS:
984 {
985 if (copy_to_user(argp, &mtd->ecc_stats,
986 sizeof(struct mtd_ecc_stats)))
987 return -EFAULT;
988 break;
989 }
990
991 case MTDFILEMODE:
992 {
993 mfi->mode = 0;
994
995 switch(arg) {
beb133fc
BN
996 case MTD_FILE_MODE_OTP_FACTORY:
997 case MTD_FILE_MODE_OTP_USER:
f1a28c02
TG
998 ret = otp_select_filemode(mfi, arg);
999 break;
1000
beb133fc 1001 case MTD_FILE_MODE_RAW:
f1a28c02
TG
1002 if (!mtd->read_oob || !mtd->write_oob)
1003 return -EOPNOTSUPP;
1004 mfi->mode = arg;
1005
beb133fc 1006 case MTD_FILE_MODE_NORMAL:
f1a28c02
TG
1007 break;
1008 default:
1009 ret = -EINVAL;
1010 }
1011 file->f_pos = 0;
1012 break;
1013 }
1014
d0f7959e
RT
1015 case BLKPG:
1016 {
1017 ret = mtd_blkpg_ioctl(mtd,
1018 (struct blkpg_ioctl_arg __user *)arg);
1019 break;
1020 }
1021
1022 case BLKRRPART:
1023 {
1024 /* No reread partition feature. Just return ok */
1025 ret = 0;
1026 break;
1027 }
d0f7959e 1028
1da177e4
LT
1029 default:
1030 ret = -ENOTTY;
1031 }
1032
1033 return ret;
1034} /* memory_ioctl */
1035
55929332
AB
1036static long mtd_unlocked_ioctl(struct file *file, u_int cmd, u_long arg)
1037{
1038 int ret;
1039
5aa82940 1040 mutex_lock(&mtd_mutex);
55929332 1041 ret = mtd_ioctl(file, cmd, arg);
5aa82940 1042 mutex_unlock(&mtd_mutex);
55929332
AB
1043
1044 return ret;
1045}
1046
97718540
KC
1047#ifdef CONFIG_COMPAT
1048
1049struct mtd_oob_buf32 {
1050 u_int32_t start;
1051 u_int32_t length;
1052 compat_caddr_t ptr; /* unsigned char* */
1053};
1054
1055#define MEMWRITEOOB32 _IOWR('M', 3, struct mtd_oob_buf32)
1056#define MEMREADOOB32 _IOWR('M', 4, struct mtd_oob_buf32)
1057
1058static long mtd_compat_ioctl(struct file *file, unsigned int cmd,
1059 unsigned long arg)
1060{
1061 struct mtd_file_info *mfi = file->private_data;
1062 struct mtd_info *mtd = mfi->mtd;
0b6585ce 1063 void __user *argp = compat_ptr(arg);
97718540
KC
1064 int ret = 0;
1065
5aa82940 1066 mutex_lock(&mtd_mutex);
97718540
KC
1067
1068 switch (cmd) {
1069 case MEMWRITEOOB32:
1070 {
1071 struct mtd_oob_buf32 buf;
1072 struct mtd_oob_buf32 __user *buf_user = argp;
1073
1074 if (copy_from_user(&buf, argp, sizeof(buf)))
1075 ret = -EFAULT;
1076 else
1077 ret = mtd_do_writeoob(file, mtd, buf.start,
1078 buf.length, compat_ptr(buf.ptr),
1079 &buf_user->length);
1080 break;
1081 }
1082
1083 case MEMREADOOB32:
1084 {
1085 struct mtd_oob_buf32 buf;
1086 struct mtd_oob_buf32 __user *buf_user = argp;
1087
1088 /* NOTE: writes return length to buf->start */
1089 if (copy_from_user(&buf, argp, sizeof(buf)))
1090 ret = -EFAULT;
1091 else
c46f6483 1092 ret = mtd_do_readoob(file, mtd, buf.start,
97718540
KC
1093 buf.length, compat_ptr(buf.ptr),
1094 &buf_user->start);
1095 break;
1096 }
1097 default:
55929332 1098 ret = mtd_ioctl(file, cmd, (unsigned long)argp);
97718540
KC
1099 }
1100
5aa82940 1101 mutex_unlock(&mtd_mutex);
97718540
KC
1102
1103 return ret;
1104}
1105
1106#endif /* CONFIG_COMPAT */
1107
402d3265
DH
1108/*
1109 * try to determine where a shared mapping can be made
1110 * - only supported for NOMMU at the moment (MMU can't doesn't copy private
1111 * mappings)
1112 */
1113#ifndef CONFIG_MMU
1114static unsigned long mtd_get_unmapped_area(struct file *file,
1115 unsigned long addr,
1116 unsigned long len,
1117 unsigned long pgoff,
1118 unsigned long flags)
1119{
1120 struct mtd_file_info *mfi = file->private_data;
1121 struct mtd_info *mtd = mfi->mtd;
1122
1123 if (mtd->get_unmapped_area) {
1124 unsigned long offset;
1125
1126 if (addr != 0)
1127 return (unsigned long) -EINVAL;
1128
1129 if (len > mtd->size || pgoff >= (mtd->size >> PAGE_SHIFT))
1130 return (unsigned long) -EINVAL;
1131
1132 offset = pgoff << PAGE_SHIFT;
1133 if (offset > mtd->size - len)
1134 return (unsigned long) -EINVAL;
1135
1136 return mtd->get_unmapped_area(mtd, len, offset, flags);
1137 }
1138
1139 /* can't map directly */
1140 return (unsigned long) -ENOSYS;
1141}
1142#endif
1143
1144/*
1145 * set up a mapping for shared memory segments
1146 */
1147static int mtd_mmap(struct file *file, struct vm_area_struct *vma)
1148{
1149#ifdef CONFIG_MMU
1150 struct mtd_file_info *mfi = file->private_data;
1151 struct mtd_info *mtd = mfi->mtd;
dd02b67d
AG
1152 struct map_info *map = mtd->priv;
1153 unsigned long start;
1154 unsigned long off;
1155 u32 len;
1156
1157 if (mtd->type == MTD_RAM || mtd->type == MTD_ROM) {
1158 off = vma->vm_pgoff << PAGE_SHIFT;
1159 start = map->phys;
1160 len = PAGE_ALIGN((start & ~PAGE_MASK) + map->size);
1161 start &= PAGE_MASK;
1162 if ((vma->vm_end - vma->vm_start + off) > len)
1163 return -EINVAL;
1164
1165 off += start;
1166 vma->vm_pgoff = off >> PAGE_SHIFT;
1167 vma->vm_flags |= VM_IO | VM_RESERVED;
1168
1169#ifdef pgprot_noncached
1170 if (file->f_flags & O_DSYNC || off >= __pa(high_memory))
1171 vma->vm_page_prot = pgprot_noncached(vma->vm_page_prot);
1172#endif
1173 if (io_remap_pfn_range(vma, vma->vm_start, off >> PAGE_SHIFT,
1174 vma->vm_end - vma->vm_start,
1175 vma->vm_page_prot))
1176 return -EAGAIN;
402d3265 1177
402d3265 1178 return 0;
dd02b67d 1179 }
402d3265
DH
1180 return -ENOSYS;
1181#else
1182 return vma->vm_flags & VM_SHARED ? 0 : -ENOSYS;
1183#endif
1184}
1185
d54b1fdb 1186static const struct file_operations mtd_fops = {
1da177e4
LT
1187 .owner = THIS_MODULE,
1188 .llseek = mtd_lseek,
1189 .read = mtd_read,
1190 .write = mtd_write,
55929332 1191 .unlocked_ioctl = mtd_unlocked_ioctl,
97718540
KC
1192#ifdef CONFIG_COMPAT
1193 .compat_ioctl = mtd_compat_ioctl,
1194#endif
1da177e4
LT
1195 .open = mtd_open,
1196 .release = mtd_close,
402d3265
DH
1197 .mmap = mtd_mmap,
1198#ifndef CONFIG_MMU
1199 .get_unmapped_area = mtd_get_unmapped_area,
1200#endif
1da177e4
LT
1201};
1202
51139ada
AV
1203static struct dentry *mtd_inodefs_mount(struct file_system_type *fs_type,
1204 int flags, const char *dev_name, void *data)
cd874237 1205{
c74a1cbb 1206 return mount_pseudo(fs_type, "mtd_inode:", NULL, NULL, MTD_INODE_FS_MAGIC);
cd874237
KS
1207}
1208
1209static struct file_system_type mtd_inodefs_type = {
1210 .name = "mtd_inodefs",
51139ada 1211 .mount = mtd_inodefs_mount,
cd874237
KS
1212 .kill_sb = kill_anon_super,
1213};
1214
1215static void mtdchar_notify_add(struct mtd_info *mtd)
1216{
1217}
1218
1219static void mtdchar_notify_remove(struct mtd_info *mtd)
1220{
1221 struct inode *mtd_ino = ilookup(mtd_inode_mnt->mnt_sb, mtd->index);
1222
1223 if (mtd_ino) {
1224 /* Destroy the inode if it exists */
1225 mtd_ino->i_nlink = 0;
1226 iput(mtd_ino);
1227 }
1228}
1229
1230static struct mtd_notifier mtdchar_notifier = {
1231 .add = mtdchar_notify_add,
1232 .remove = mtdchar_notify_remove,
1233};
1234
1da177e4
LT
1235static int __init init_mtdchar(void)
1236{
cd874237 1237 int ret;
1f24b5a8 1238
cd874237 1239 ret = __register_chrdev(MTD_CHAR_MAJOR, 0, 1 << MINORBITS,
dad0db31 1240 "mtd", &mtd_fops);
cd874237
KS
1241 if (ret < 0) {
1242 pr_notice("Can't allocate major number %d for "
1243 "Memory Technology Devices.\n", MTD_CHAR_MAJOR);
1244 return ret;
9bc7b387
TP
1245 }
1246
cd874237
KS
1247 ret = register_filesystem(&mtd_inodefs_type);
1248 if (ret) {
1249 pr_notice("Can't register mtd_inodefs filesystem: %d\n", ret);
1250 goto err_unregister_chdev;
1251 }
1252
1253 mtd_inode_mnt = kern_mount(&mtd_inodefs_type);
1254 if (IS_ERR(mtd_inode_mnt)) {
1255 ret = PTR_ERR(mtd_inode_mnt);
1256 pr_notice("Error mounting mtd_inodefs filesystem: %d\n", ret);
1257 goto err_unregister_filesystem;
1258 }
1259 register_mtd_user(&mtdchar_notifier);
1260
1261 return ret;
1262
1263err_unregister_filesystem:
1264 unregister_filesystem(&mtd_inodefs_type);
1265err_unregister_chdev:
1266 __unregister_chrdev(MTD_CHAR_MAJOR, 0, 1 << MINORBITS, "mtd");
1267 return ret;
1da177e4
LT
1268}
1269
1270static void __exit cleanup_mtdchar(void)
1271{
cd874237 1272 unregister_mtd_user(&mtdchar_notifier);
423e0ab0 1273 kern_unmount(mtd_inode_mnt);
cd874237 1274 unregister_filesystem(&mtd_inodefs_type);
dad0db31 1275 __unregister_chrdev(MTD_CHAR_MAJOR, 0, 1 << MINORBITS, "mtd");
1da177e4
LT
1276}
1277
1278module_init(init_mtdchar);
1279module_exit(cleanup_mtdchar);
1280
1f24b5a8 1281MODULE_ALIAS_CHARDEV_MAJOR(MTD_CHAR_MAJOR);
1da177e4
LT
1282
1283MODULE_LICENSE("GPL");
1284MODULE_AUTHOR("David Woodhouse <dwmw2@infradead.org>");
1285MODULE_DESCRIPTION("Direct character-device access to MTD devices");
90160e13 1286MODULE_ALIAS_CHARDEV_MAJOR(MTD_CHAR_MAJOR);
This page took 0.716524 seconds and 5 git commands to generate.