ASoC: samsung: Add devm_clk_get to pcm.c
[deliverable/linux.git] / drivers / mtd / mtdchar.c
CommitLineData
1da177e4 1/*
a1452a37
DW
2 * Copyright © 1999-2010 David Woodhouse <dwmw2@infradead.org>
3 *
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License as published by
6 * the Free Software Foundation; either version 2 of the License, or
7 * (at your option) any later version.
8 *
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
13 *
14 * You should have received a copy of the GNU General Public License
15 * along with this program; if not, write to the Free Software
16 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
1da177e4
LT
17 *
18 */
19
15fdc52f
TG
20#include <linux/device.h>
21#include <linux/fs.h>
0c1eafdb 22#include <linux/mm.h>
9c74034f 23#include <linux/err.h>
15fdc52f 24#include <linux/init.h>
1da177e4
LT
25#include <linux/kernel.h>
26#include <linux/module.h>
15fdc52f
TG
27#include <linux/slab.h>
28#include <linux/sched.h>
5aa82940 29#include <linux/mutex.h>
402d3265 30#include <linux/backing-dev.h>
97718540 31#include <linux/compat.h>
cd874237 32#include <linux/mount.h>
d0f7959e 33#include <linux/blkpg.h>
b502bd11 34#include <linux/magic.h>
f83c3838 35#include <linux/major.h>
1da177e4 36#include <linux/mtd/mtd.h>
d0f7959e 37#include <linux/mtd/partitions.h>
dd02b67d 38#include <linux/mtd/map.h>
1da177e4 39
15fdc52f 40#include <asm/uaccess.h>
9bc7b387 41
660685d9
AB
42#include "mtdcore.h"
43
5aa82940 44static DEFINE_MUTEX(mtd_mutex);
1da177e4 45
045e9a5d 46/*
f1a28c02 47 * Data structure to hold the pointer to the mtd device as well
92394b5c 48 * as mode information of various use cases.
045e9a5d 49 */
f1a28c02
TG
50struct mtd_file_info {
51 struct mtd_info *mtd;
cd874237 52 struct inode *ino;
f1a28c02
TG
53 enum mtd_file_modes mode;
54};
31f4233b 55
969e57ad 56static loff_t mtdchar_lseek(struct file *file, loff_t offset, int orig)
1da177e4 57{
f1a28c02 58 struct mtd_file_info *mfi = file->private_data;
b959957f 59 return fixed_size_llseek(file, offset, orig, mfi->mtd->size);
1da177e4
LT
60}
61
00292bbf
AV
62static int count;
63static struct vfsmount *mnt;
64static struct file_system_type mtd_inodefs_type;
1da177e4 65
969e57ad 66static int mtdchar_open(struct inode *inode, struct file *file)
1da177e4
LT
67{
68 int minor = iminor(inode);
69 int devnum = minor >> 1;
6071239e 70 int ret = 0;
1da177e4 71 struct mtd_info *mtd;
f1a28c02 72 struct mtd_file_info *mfi;
cd874237 73 struct inode *mtd_ino;
1da177e4 74
289c0522 75 pr_debug("MTD_open\n");
1da177e4 76
1da177e4 77 /* You can't open the RO devices RW */
aeb5d727 78 if ((file->f_mode & FMODE_WRITE) && (minor & 1))
1da177e4
LT
79 return -EACCES;
80
00292bbf
AV
81 ret = simple_pin_fs(&mtd_inodefs_type, &mnt, &count);
82 if (ret)
83 return ret;
84
5aa82940 85 mutex_lock(&mtd_mutex);
1da177e4 86 mtd = get_mtd_device(NULL, devnum);
97894cda 87
6071239e
JC
88 if (IS_ERR(mtd)) {
89 ret = PTR_ERR(mtd);
90 goto out;
91 }
97894cda 92
402d3265 93 if (mtd->type == MTD_ABSENT) {
6071239e 94 ret = -ENODEV;
c65390f4 95 goto out1;
1da177e4
LT
96 }
97
00292bbf 98 mtd_ino = iget_locked(mnt->mnt_sb, devnum);
cd874237 99 if (!mtd_ino) {
cd874237 100 ret = -ENOMEM;
c65390f4 101 goto out1;
cd874237
KS
102 }
103 if (mtd_ino->i_state & I_NEW) {
104 mtd_ino->i_private = mtd;
105 mtd_ino->i_mode = S_IFCHR;
106 mtd_ino->i_data.backing_dev_info = mtd->backing_dev_info;
107 unlock_new_inode(mtd_ino);
108 }
109 file->f_mapping = mtd_ino->i_mapping;
402d3265 110
1da177e4 111 /* You can't open it RW if it's not a writeable device */
aeb5d727 112 if ((file->f_mode & FMODE_WRITE) && !(mtd->flags & MTD_WRITEABLE)) {
6071239e 113 ret = -EACCES;
c65390f4 114 goto out2;
1da177e4 115 }
97894cda 116
f1a28c02
TG
117 mfi = kzalloc(sizeof(*mfi), GFP_KERNEL);
118 if (!mfi) {
6071239e 119 ret = -ENOMEM;
c65390f4 120 goto out2;
f1a28c02 121 }
cd874237 122 mfi->ino = mtd_ino;
f1a28c02
TG
123 mfi->mtd = mtd;
124 file->private_data = mfi;
c65390f4
AV
125 mutex_unlock(&mtd_mutex);
126 return 0;
f1a28c02 127
c65390f4
AV
128out2:
129 iput(mtd_ino);
130out1:
131 put_mtd_device(mtd);
6071239e 132out:
5aa82940 133 mutex_unlock(&mtd_mutex);
00292bbf 134 simple_release_fs(&mnt, &count);
6071239e 135 return ret;
969e57ad 136} /* mtdchar_open */
1da177e4
LT
137
138/*====================================================================*/
139
969e57ad 140static int mtdchar_close(struct inode *inode, struct file *file)
1da177e4 141{
f1a28c02
TG
142 struct mtd_file_info *mfi = file->private_data;
143 struct mtd_info *mtd = mfi->mtd;
1da177e4 144
289c0522 145 pr_debug("MTD_close\n");
1da177e4 146
7eafaed5 147 /* Only sync if opened RW */
327cf292 148 if ((file->f_mode & FMODE_WRITE))
85f2f2a8 149 mtd_sync(mtd);
97894cda 150
cd874237
KS
151 iput(mfi->ino);
152
1da177e4 153 put_mtd_device(mtd);
f1a28c02
TG
154 file->private_data = NULL;
155 kfree(mfi);
00292bbf 156 simple_release_fs(&mnt, &count);
1da177e4
LT
157
158 return 0;
969e57ad 159} /* mtdchar_close */
1da177e4 160
3e45cf5e
GE
161/* Back in June 2001, dwmw2 wrote:
162 *
163 * FIXME: This _really_ needs to die. In 2.5, we should lock the
164 * userspace buffer down and use it directly with readv/writev.
165 *
166 * The implementation below, using mtd_kmalloc_up_to, mitigates
167 * allocation failures when the system is under low-memory situations
168 * or if memory is highly fragmented at the cost of reducing the
169 * performance of the requested transfer due to a smaller buffer size.
170 *
171 * A more complex but more memory-efficient implementation based on
172 * get_user_pages and iovecs to cover extents of those pages is a
173 * longer-term goal, as intimated by dwmw2 above. However, for the
174 * write case, this requires yet more complex head and tail transfer
175 * handling when those head and tail offsets and sizes are such that
176 * alignment requirements are not met in the NAND subdriver.
177 */
1da177e4 178
969e57ad
AB
179static ssize_t mtdchar_read(struct file *file, char __user *buf, size_t count,
180 loff_t *ppos)
1da177e4 181{
f1a28c02
TG
182 struct mtd_file_info *mfi = file->private_data;
183 struct mtd_info *mtd = mfi->mtd;
30fa9848 184 size_t retlen;
1da177e4
LT
185 size_t total_retlen=0;
186 int ret=0;
187 int len;
3e45cf5e 188 size_t size = count;
1da177e4 189 char *kbuf;
97894cda 190
289c0522 191 pr_debug("MTD_read\n");
1da177e4
LT
192
193 if (*ppos + count > mtd->size)
194 count = mtd->size - *ppos;
195
196 if (!count)
197 return 0;
97894cda 198
3e45cf5e 199 kbuf = mtd_kmalloc_up_to(mtd, &size);
b802c074
TG
200 if (!kbuf)
201 return -ENOMEM;
202
1da177e4 203 while (count) {
3e45cf5e 204 len = min_t(size_t, count, size);
1da177e4 205
f1a28c02 206 switch (mfi->mode) {
beb133fc 207 case MTD_FILE_MODE_OTP_FACTORY:
d264f72a
AB
208 ret = mtd_read_fact_prot_reg(mtd, *ppos, len,
209 &retlen, kbuf);
31f4233b 210 break;
beb133fc 211 case MTD_FILE_MODE_OTP_USER:
4ea1cabb
AB
212 ret = mtd_read_user_prot_reg(mtd, *ppos, len,
213 &retlen, kbuf);
31f4233b 214 break;
beb133fc 215 case MTD_FILE_MODE_RAW:
f1a28c02
TG
216 {
217 struct mtd_oob_ops ops;
218
0612b9dd 219 ops.mode = MTD_OPS_RAW;
f1a28c02
TG
220 ops.datbuf = kbuf;
221 ops.oobbuf = NULL;
222 ops.len = len;
223
fd2819bb 224 ret = mtd_read_oob(mtd, *ppos, &ops);
f1a28c02
TG
225 retlen = ops.retlen;
226 break;
227 }
31f4233b 228 default:
329ad399 229 ret = mtd_read(mtd, *ppos, len, &retlen, kbuf);
31f4233b 230 }
7854d3f7 231 /* Nand returns -EBADMSG on ECC errors, but it returns
1da177e4 232 * the data. For our userspace tools it is important
7854d3f7 233 * to dump areas with ECC errors!
9a1fcdfd 234 * For kernel internal usage it also might return -EUCLEAN
25985edc 235 * to signal the caller that a bitflip has occurred and has
9a1fcdfd 236 * been corrected by the ECC algorithm.
1da177e4
LT
237 * Userspace software which accesses NAND this way
238 * must be aware of the fact that it deals with NAND
239 */
d57f4054 240 if (!ret || mtd_is_bitflip_or_eccerr(ret)) {
1da177e4
LT
241 *ppos += retlen;
242 if (copy_to_user(buf, kbuf, retlen)) {
f4a43cfc 243 kfree(kbuf);
1da177e4
LT
244 return -EFAULT;
245 }
246 else
247 total_retlen += retlen;
248
249 count -= retlen;
250 buf += retlen;
31f4233b
NP
251 if (retlen == 0)
252 count = 0;
1da177e4
LT
253 }
254 else {
255 kfree(kbuf);
256 return ret;
257 }
97894cda 258
1da177e4
LT
259 }
260
b802c074 261 kfree(kbuf);
1da177e4 262 return total_retlen;
969e57ad 263} /* mtdchar_read */
1da177e4 264
969e57ad
AB
265static ssize_t mtdchar_write(struct file *file, const char __user *buf, size_t count,
266 loff_t *ppos)
1da177e4 267{
f1a28c02
TG
268 struct mtd_file_info *mfi = file->private_data;
269 struct mtd_info *mtd = mfi->mtd;
3e45cf5e 270 size_t size = count;
1da177e4
LT
271 char *kbuf;
272 size_t retlen;
273 size_t total_retlen=0;
274 int ret=0;
275 int len;
276
289c0522 277 pr_debug("MTD_write\n");
97894cda 278
1da177e4
LT
279 if (*ppos == mtd->size)
280 return -ENOSPC;
97894cda 281
1da177e4
LT
282 if (*ppos + count > mtd->size)
283 count = mtd->size - *ppos;
284
285 if (!count)
286 return 0;
287
3e45cf5e 288 kbuf = mtd_kmalloc_up_to(mtd, &size);
b802c074
TG
289 if (!kbuf)
290 return -ENOMEM;
291
1da177e4 292 while (count) {
3e45cf5e 293 len = min_t(size_t, count, size);
1da177e4 294
1da177e4
LT
295 if (copy_from_user(kbuf, buf, len)) {
296 kfree(kbuf);
297 return -EFAULT;
298 }
97894cda 299
f1a28c02 300 switch (mfi->mode) {
beb133fc 301 case MTD_FILE_MODE_OTP_FACTORY:
31f4233b
NP
302 ret = -EROFS;
303 break;
beb133fc 304 case MTD_FILE_MODE_OTP_USER:
482b43ad
AB
305 ret = mtd_write_user_prot_reg(mtd, *ppos, len,
306 &retlen, kbuf);
31f4233b 307 break;
f1a28c02 308
beb133fc 309 case MTD_FILE_MODE_RAW:
f1a28c02
TG
310 {
311 struct mtd_oob_ops ops;
312
0612b9dd 313 ops.mode = MTD_OPS_RAW;
f1a28c02
TG
314 ops.datbuf = kbuf;
315 ops.oobbuf = NULL;
bf514081 316 ops.ooboffs = 0;
f1a28c02
TG
317 ops.len = len;
318
a2cc5ba0 319 ret = mtd_write_oob(mtd, *ppos, &ops);
f1a28c02
TG
320 retlen = ops.retlen;
321 break;
322 }
323
31f4233b 324 default:
eda95cbf 325 ret = mtd_write(mtd, *ppos, len, &retlen, kbuf);
31f4233b 326 }
9a78bc83
CR
327
328 /*
329 * Return -ENOSPC only if no data could be written at all.
330 * Otherwise just return the number of bytes that actually
331 * have been written.
332 */
333 if ((ret == -ENOSPC) && (total_retlen))
334 break;
335
1da177e4
LT
336 if (!ret) {
337 *ppos += retlen;
338 total_retlen += retlen;
339 count -= retlen;
340 buf += retlen;
341 }
342 else {
343 kfree(kbuf);
344 return ret;
345 }
1da177e4
LT
346 }
347
b802c074 348 kfree(kbuf);
1da177e4 349 return total_retlen;
969e57ad 350} /* mtdchar_write */
1da177e4
LT
351
352/*======================================================================
353
354 IOCTL calls for getting device parameters.
355
356======================================================================*/
357static void mtdchar_erase_callback (struct erase_info *instr)
358{
359 wake_up((wait_queue_head_t *)instr->priv);
360}
361
f1a28c02
TG
362static int otp_select_filemode(struct mtd_file_info *mfi, int mode)
363{
364 struct mtd_info *mtd = mfi->mtd;
b6de3d6c 365 size_t retlen;
b6de3d6c 366
f1a28c02
TG
367 switch (mode) {
368 case MTD_OTP_FACTORY:
5dc63fa2
UKK
369 if (mtd_read_fact_prot_reg(mtd, -1, 0, &retlen, NULL) ==
370 -EOPNOTSUPP)
371 return -EOPNOTSUPP;
372
b6de3d6c 373 mfi->mode = MTD_FILE_MODE_OTP_FACTORY;
f1a28c02
TG
374 break;
375 case MTD_OTP_USER:
5dc63fa2
UKK
376 if (mtd_read_user_prot_reg(mtd, -1, 0, &retlen, NULL) ==
377 -EOPNOTSUPP)
378 return -EOPNOTSUPP;
379
b6de3d6c 380 mfi->mode = MTD_FILE_MODE_OTP_USER;
f1a28c02 381 break;
f1a28c02 382 case MTD_OTP_OFF:
5dc63fa2 383 mfi->mode = MTD_FILE_MODE_NORMAL;
f1a28c02 384 break;
5dc63fa2
UKK
385 default:
386 return -EINVAL;
f1a28c02 387 }
5dc63fa2
UKK
388
389 return 0;
f1a28c02 390}
f1a28c02 391
969e57ad 392static int mtdchar_writeoob(struct file *file, struct mtd_info *mtd,
97718540
KC
393 uint64_t start, uint32_t length, void __user *ptr,
394 uint32_t __user *retp)
395{
9ce244b3 396 struct mtd_file_info *mfi = file->private_data;
97718540
KC
397 struct mtd_oob_ops ops;
398 uint32_t retlen;
399 int ret = 0;
400
401 if (!(file->f_mode & FMODE_WRITE))
402 return -EPERM;
403
404 if (length > 4096)
405 return -EINVAL;
406
3c3c10bb 407 if (!mtd->_write_oob)
97718540
KC
408 ret = -EOPNOTSUPP;
409 else
0040476b 410 ret = access_ok(VERIFY_READ, ptr, length) ? 0 : -EFAULT;
97718540
KC
411
412 if (ret)
413 return ret;
414
415 ops.ooblen = length;
305b93f1 416 ops.ooboffs = start & (mtd->writesize - 1);
97718540 417 ops.datbuf = NULL;
beb133fc 418 ops.mode = (mfi->mode == MTD_FILE_MODE_RAW) ? MTD_OPS_RAW :
0612b9dd 419 MTD_OPS_PLACE_OOB;
97718540
KC
420
421 if (ops.ooboffs && ops.ooblen > (mtd->oobsize - ops.ooboffs))
422 return -EINVAL;
423
df1f1d1c
JL
424 ops.oobbuf = memdup_user(ptr, length);
425 if (IS_ERR(ops.oobbuf))
426 return PTR_ERR(ops.oobbuf);
97718540 427
305b93f1 428 start &= ~((uint64_t)mtd->writesize - 1);
a2cc5ba0 429 ret = mtd_write_oob(mtd, start, &ops);
97718540
KC
430
431 if (ops.oobretlen > 0xFFFFFFFFU)
432 ret = -EOVERFLOW;
433 retlen = ops.oobretlen;
434 if (copy_to_user(retp, &retlen, sizeof(length)))
435 ret = -EFAULT;
436
437 kfree(ops.oobbuf);
438 return ret;
439}
440
969e57ad 441static int mtdchar_readoob(struct file *file, struct mtd_info *mtd,
c46f6483
BN
442 uint64_t start, uint32_t length, void __user *ptr,
443 uint32_t __user *retp)
97718540 444{
c46f6483 445 struct mtd_file_info *mfi = file->private_data;
97718540
KC
446 struct mtd_oob_ops ops;
447 int ret = 0;
448
449 if (length > 4096)
450 return -EINVAL;
451
dac2639f
AB
452 if (!access_ok(VERIFY_WRITE, ptr, length))
453 return -EFAULT;
97718540
KC
454
455 ops.ooblen = length;
305b93f1 456 ops.ooboffs = start & (mtd->writesize - 1);
97718540 457 ops.datbuf = NULL;
beb133fc 458 ops.mode = (mfi->mode == MTD_FILE_MODE_RAW) ? MTD_OPS_RAW :
0612b9dd 459 MTD_OPS_PLACE_OOB;
97718540
KC
460
461 if (ops.ooboffs && ops.ooblen > (mtd->oobsize - ops.ooboffs))
462 return -EINVAL;
463
464 ops.oobbuf = kmalloc(length, GFP_KERNEL);
465 if (!ops.oobbuf)
466 return -ENOMEM;
467
305b93f1 468 start &= ~((uint64_t)mtd->writesize - 1);
fd2819bb 469 ret = mtd_read_oob(mtd, start, &ops);
97718540
KC
470
471 if (put_user(ops.oobretlen, retp))
472 ret = -EFAULT;
473 else if (ops.oobretlen && copy_to_user(ptr, ops.oobbuf,
474 ops.oobretlen))
475 ret = -EFAULT;
476
477 kfree(ops.oobbuf);
041e4575
BN
478
479 /*
480 * NAND returns -EBADMSG on ECC errors, but it returns the OOB
481 * data. For our userspace tools it is important to dump areas
482 * with ECC errors!
483 * For kernel internal usage it also might return -EUCLEAN
484 * to signal the caller that a bitflip has occured and has
485 * been corrected by the ECC algorithm.
486 *
c478d7e4
BN
487 * Note: currently the standard NAND function, nand_read_oob_std,
488 * does not calculate ECC for the OOB area, so do not rely on
489 * this behavior unless you have replaced it with your own.
041e4575 490 */
d57f4054 491 if (mtd_is_bitflip_or_eccerr(ret))
041e4575
BN
492 return 0;
493
97718540
KC
494 return ret;
495}
496
cc26c3cd
BN
497/*
498 * Copies (and truncates, if necessary) data from the larger struct,
499 * nand_ecclayout, to the smaller, deprecated layout struct,
92394b5c 500 * nand_ecclayout_user. This is necessary only to support the deprecated
cc26c3cd
BN
501 * API ioctl ECCGETLAYOUT while allowing all new functionality to use
502 * nand_ecclayout flexibly (i.e. the struct may change size in new
503 * releases without requiring major rewrites).
504 */
505static int shrink_ecclayout(const struct nand_ecclayout *from,
506 struct nand_ecclayout_user *to)
507{
508 int i;
509
510 if (!from || !to)
511 return -EINVAL;
512
513 memset(to, 0, sizeof(*to));
514
0ceacf36 515 to->eccbytes = min((int)from->eccbytes, MTD_MAX_ECCPOS_ENTRIES);
cc26c3cd
BN
516 for (i = 0; i < to->eccbytes; i++)
517 to->eccpos[i] = from->eccpos[i];
518
519 for (i = 0; i < MTD_MAX_OOBFREE_ENTRIES; i++) {
520 if (from->oobfree[i].length == 0 &&
521 from->oobfree[i].offset == 0)
522 break;
523 to->oobavail += from->oobfree[i].length;
524 to->oobfree[i] = from->oobfree[i];
525 }
526
527 return 0;
528}
529
969e57ad 530static int mtdchar_blkpg_ioctl(struct mtd_info *mtd,
d0f7959e
RT
531 struct blkpg_ioctl_arg __user *arg)
532{
533 struct blkpg_ioctl_arg a;
534 struct blkpg_partition p;
535
536 if (!capable(CAP_SYS_ADMIN))
537 return -EPERM;
538
d0f7959e
RT
539 if (copy_from_user(&a, arg, sizeof(struct blkpg_ioctl_arg)))
540 return -EFAULT;
541
542 if (copy_from_user(&p, a.data, sizeof(struct blkpg_partition)))
543 return -EFAULT;
544
545 switch (a.op) {
546 case BLKPG_ADD_PARTITION:
547
a7e93dcd
RT
548 /* Only master mtd device must be used to add partitions */
549 if (mtd_is_partition(mtd))
550 return -EINVAL;
551
d0f7959e
RT
552 return mtd_add_partition(mtd, p.devname, p.start, p.length);
553
554 case BLKPG_DEL_PARTITION:
555
556 if (p.pno < 0)
557 return -EINVAL;
558
559 return mtd_del_partition(mtd, p.pno);
560
561 default:
562 return -EINVAL;
563 }
564}
d0f7959e 565
969e57ad 566static int mtdchar_write_ioctl(struct mtd_info *mtd,
e99d8b08
BN
567 struct mtd_write_req __user *argp)
568{
569 struct mtd_write_req req;
570 struct mtd_oob_ops ops;
571 void __user *usr_data, *usr_oob;
572 int ret;
573
574 if (copy_from_user(&req, argp, sizeof(req)) ||
575 !access_ok(VERIFY_READ, req.usr_data, req.len) ||
576 !access_ok(VERIFY_READ, req.usr_oob, req.ooblen))
577 return -EFAULT;
3c3c10bb 578 if (!mtd->_write_oob)
e99d8b08
BN
579 return -EOPNOTSUPP;
580
581 ops.mode = req.mode;
582 ops.len = (size_t)req.len;
583 ops.ooblen = (size_t)req.ooblen;
584 ops.ooboffs = 0;
585
586 usr_data = (void __user *)(uintptr_t)req.usr_data;
587 usr_oob = (void __user *)(uintptr_t)req.usr_oob;
588
589 if (req.usr_data) {
590 ops.datbuf = memdup_user(usr_data, ops.len);
591 if (IS_ERR(ops.datbuf))
592 return PTR_ERR(ops.datbuf);
593 } else {
594 ops.datbuf = NULL;
595 }
596
597 if (req.usr_oob) {
598 ops.oobbuf = memdup_user(usr_oob, ops.ooblen);
599 if (IS_ERR(ops.oobbuf)) {
600 kfree(ops.datbuf);
601 return PTR_ERR(ops.oobbuf);
602 }
603 } else {
604 ops.oobbuf = NULL;
605 }
606
a2cc5ba0 607 ret = mtd_write_oob(mtd, (loff_t)req.start, &ops);
e99d8b08
BN
608
609 kfree(ops.datbuf);
610 kfree(ops.oobbuf);
611
612 return ret;
613}
614
969e57ad 615static int mtdchar_ioctl(struct file *file, u_int cmd, u_long arg)
1da177e4 616{
f1a28c02
TG
617 struct mtd_file_info *mfi = file->private_data;
618 struct mtd_info *mtd = mfi->mtd;
1da177e4
LT
619 void __user *argp = (void __user *)arg;
620 int ret = 0;
621 u_long size;
73c619ea 622 struct mtd_info_user info;
97894cda 623
289c0522 624 pr_debug("MTD_ioctl\n");
1da177e4
LT
625
626 size = (cmd & IOCSIZE_MASK) >> IOCSIZE_SHIFT;
627 if (cmd & IOC_IN) {
628 if (!access_ok(VERIFY_READ, argp, size))
629 return -EFAULT;
630 }
631 if (cmd & IOC_OUT) {
632 if (!access_ok(VERIFY_WRITE, argp, size))
633 return -EFAULT;
634 }
97894cda 635
1da177e4
LT
636 switch (cmd) {
637 case MEMGETREGIONCOUNT:
638 if (copy_to_user(argp, &(mtd->numeraseregions), sizeof(int)))
639 return -EFAULT;
640 break;
641
642 case MEMGETREGIONINFO:
643 {
b67c5f87
ZW
644 uint32_t ur_idx;
645 struct mtd_erase_region_info *kr;
bcc98a46 646 struct region_info_user __user *ur = argp;
1da177e4 647
b67c5f87 648 if (get_user(ur_idx, &(ur->regionindex)))
1da177e4
LT
649 return -EFAULT;
650
5e59be1f
DC
651 if (ur_idx >= mtd->numeraseregions)
652 return -EINVAL;
653
b67c5f87
ZW
654 kr = &(mtd->eraseregions[ur_idx]);
655
656 if (put_user(kr->offset, &(ur->offset))
657 || put_user(kr->erasesize, &(ur->erasesize))
658 || put_user(kr->numblocks, &(ur->numblocks)))
1da177e4 659 return -EFAULT;
b67c5f87 660
1da177e4
LT
661 break;
662 }
663
664 case MEMGETINFO:
a0c5a394 665 memset(&info, 0, sizeof(info));
73c619ea
JE
666 info.type = mtd->type;
667 info.flags = mtd->flags;
668 info.size = mtd->size;
669 info.erasesize = mtd->erasesize;
670 info.writesize = mtd->writesize;
671 info.oobsize = mtd->oobsize;
19fb4341
BN
672 /* The below field is obsolete */
673 info.padding = 0;
73c619ea 674 if (copy_to_user(argp, &info, sizeof(struct mtd_info_user)))
1da177e4
LT
675 return -EFAULT;
676 break;
677
678 case MEMERASE:
0dc54e9f 679 case MEMERASE64:
1da177e4
LT
680 {
681 struct erase_info *erase;
682
aeb5d727 683 if(!(file->f_mode & FMODE_WRITE))
1da177e4
LT
684 return -EPERM;
685
95b93a0c 686 erase=kzalloc(sizeof(struct erase_info),GFP_KERNEL);
1da177e4
LT
687 if (!erase)
688 ret = -ENOMEM;
689 else {
690 wait_queue_head_t waitq;
691 DECLARE_WAITQUEUE(wait, current);
692
693 init_waitqueue_head(&waitq);
694
0dc54e9f
KC
695 if (cmd == MEMERASE64) {
696 struct erase_info_user64 einfo64;
697
698 if (copy_from_user(&einfo64, argp,
699 sizeof(struct erase_info_user64))) {
700 kfree(erase);
701 return -EFAULT;
702 }
703 erase->addr = einfo64.start;
704 erase->len = einfo64.length;
705 } else {
706 struct erase_info_user einfo32;
707
708 if (copy_from_user(&einfo32, argp,
709 sizeof(struct erase_info_user))) {
710 kfree(erase);
711 return -EFAULT;
712 }
713 erase->addr = einfo32.start;
714 erase->len = einfo32.length;
1da177e4
LT
715 }
716 erase->mtd = mtd;
717 erase->callback = mtdchar_erase_callback;
718 erase->priv = (unsigned long)&waitq;
97894cda 719
1da177e4
LT
720 /*
721 FIXME: Allow INTERRUPTIBLE. Which means
722 not having the wait_queue head on the stack.
97894cda 723
1da177e4
LT
724 If the wq_head is on the stack, and we
725 leave because we got interrupted, then the
726 wq_head is no longer there when the
727 callback routine tries to wake us up.
728 */
7e1f0dc0 729 ret = mtd_erase(mtd, erase);
1da177e4
LT
730 if (!ret) {
731 set_current_state(TASK_UNINTERRUPTIBLE);
732 add_wait_queue(&waitq, &wait);
733 if (erase->state != MTD_ERASE_DONE &&
734 erase->state != MTD_ERASE_FAILED)
735 schedule();
736 remove_wait_queue(&waitq, &wait);
737 set_current_state(TASK_RUNNING);
738
739 ret = (erase->state == MTD_ERASE_FAILED)?-EIO:0;
740 }
741 kfree(erase);
742 }
743 break;
744 }
745
746 case MEMWRITEOOB:
747 {
748 struct mtd_oob_buf buf;
97718540 749 struct mtd_oob_buf __user *buf_user = argp;
1da177e4 750
97718540
KC
751 /* NOTE: writes return length to buf_user->length */
752 if (copy_from_user(&buf, argp, sizeof(buf)))
1da177e4 753 ret = -EFAULT;
97718540 754 else
969e57ad 755 ret = mtdchar_writeoob(file, mtd, buf.start, buf.length,
97718540 756 buf.ptr, &buf_user->length);
1da177e4 757 break;
1da177e4
LT
758 }
759
760 case MEMREADOOB:
761 {
762 struct mtd_oob_buf buf;
97718540 763 struct mtd_oob_buf __user *buf_user = argp;
8593fbc6 764
97718540
KC
765 /* NOTE: writes return length to buf_user->start */
766 if (copy_from_user(&buf, argp, sizeof(buf)))
1da177e4 767 ret = -EFAULT;
97718540 768 else
969e57ad 769 ret = mtdchar_readoob(file, mtd, buf.start, buf.length,
97718540 770 buf.ptr, &buf_user->start);
1da177e4
LT
771 break;
772 }
773
aea7cea9
KC
774 case MEMWRITEOOB64:
775 {
776 struct mtd_oob_buf64 buf;
777 struct mtd_oob_buf64 __user *buf_user = argp;
778
779 if (copy_from_user(&buf, argp, sizeof(buf)))
780 ret = -EFAULT;
781 else
969e57ad 782 ret = mtdchar_writeoob(file, mtd, buf.start, buf.length,
aea7cea9
KC
783 (void __user *)(uintptr_t)buf.usr_ptr,
784 &buf_user->length);
785 break;
786 }
787
788 case MEMREADOOB64:
789 {
790 struct mtd_oob_buf64 buf;
791 struct mtd_oob_buf64 __user *buf_user = argp;
792
793 if (copy_from_user(&buf, argp, sizeof(buf)))
794 ret = -EFAULT;
795 else
969e57ad 796 ret = mtdchar_readoob(file, mtd, buf.start, buf.length,
aea7cea9
KC
797 (void __user *)(uintptr_t)buf.usr_ptr,
798 &buf_user->length);
799 break;
800 }
801
e99d8b08
BN
802 case MEMWRITE:
803 {
969e57ad 804 ret = mtdchar_write_ioctl(mtd,
e99d8b08
BN
805 (struct mtd_write_req __user *)arg);
806 break;
807 }
808
1da177e4
LT
809 case MEMLOCK:
810 {
175428b2 811 struct erase_info_user einfo;
1da177e4 812
175428b2 813 if (copy_from_user(&einfo, argp, sizeof(einfo)))
1da177e4
LT
814 return -EFAULT;
815
38134565 816 ret = mtd_lock(mtd, einfo.start, einfo.length);
1da177e4
LT
817 break;
818 }
819
820 case MEMUNLOCK:
821 {
175428b2 822 struct erase_info_user einfo;
1da177e4 823
175428b2 824 if (copy_from_user(&einfo, argp, sizeof(einfo)))
1da177e4
LT
825 return -EFAULT;
826
38134565 827 ret = mtd_unlock(mtd, einfo.start, einfo.length);
1da177e4
LT
828 break;
829 }
830
9938424f
RC
831 case MEMISLOCKED:
832 {
833 struct erase_info_user einfo;
834
835 if (copy_from_user(&einfo, argp, sizeof(einfo)))
836 return -EFAULT;
837
38134565 838 ret = mtd_is_locked(mtd, einfo.start, einfo.length);
9938424f
RC
839 break;
840 }
841
5bd34c09 842 /* Legacy interface */
1da177e4
LT
843 case MEMGETOOBSEL:
844 {
5bd34c09
TG
845 struct nand_oobinfo oi;
846
847 if (!mtd->ecclayout)
848 return -EOPNOTSUPP;
849 if (mtd->ecclayout->eccbytes > ARRAY_SIZE(oi.eccpos))
850 return -EINVAL;
851
852 oi.useecc = MTD_NANDECC_AUTOPLACE;
853 memcpy(&oi.eccpos, mtd->ecclayout->eccpos, sizeof(oi.eccpos));
854 memcpy(&oi.oobfree, mtd->ecclayout->oobfree,
855 sizeof(oi.oobfree));
d25ade71 856 oi.eccbytes = mtd->ecclayout->eccbytes;
5bd34c09
TG
857
858 if (copy_to_user(argp, &oi, sizeof(struct nand_oobinfo)))
1da177e4
LT
859 return -EFAULT;
860 break;
861 }
862
863 case MEMGETBADBLOCK:
864 {
865 loff_t offs;
97894cda 866
1da177e4
LT
867 if (copy_from_user(&offs, argp, sizeof(loff_t)))
868 return -EFAULT;
8f461a73 869 return mtd_block_isbad(mtd, offs);
1da177e4
LT
870 break;
871 }
872
873 case MEMSETBADBLOCK:
874 {
875 loff_t offs;
876
877 if (copy_from_user(&offs, argp, sizeof(loff_t)))
878 return -EFAULT;
800ffd34 879 return mtd_block_markbad(mtd, offs);
1da177e4
LT
880 break;
881 }
882
31f4233b
NP
883 case OTPSELECT:
884 {
885 int mode;
886 if (copy_from_user(&mode, argp, sizeof(int)))
887 return -EFAULT;
f1a28c02 888
beb133fc 889 mfi->mode = MTD_FILE_MODE_NORMAL;
f1a28c02
TG
890
891 ret = otp_select_filemode(mfi, mode);
892
81dba488 893 file->f_pos = 0;
31f4233b
NP
894 break;
895 }
896
897 case OTPGETREGIONCOUNT:
898 case OTPGETREGIONINFO:
899 {
900 struct otp_info *buf = kmalloc(4096, GFP_KERNEL);
4b78fc42 901 size_t retlen;
31f4233b
NP
902 if (!buf)
903 return -ENOMEM;
f1a28c02 904 switch (mfi->mode) {
beb133fc 905 case MTD_FILE_MODE_OTP_FACTORY:
4b78fc42 906 ret = mtd_get_fact_prot_info(mtd, 4096, &retlen, buf);
31f4233b 907 break;
beb133fc 908 case MTD_FILE_MODE_OTP_USER:
4b78fc42 909 ret = mtd_get_user_prot_info(mtd, 4096, &retlen, buf);
31f4233b 910 break;
f1a28c02 911 default:
87e858a9 912 ret = -EINVAL;
f1a28c02 913 break;
31f4233b 914 }
4b78fc42 915 if (!ret) {
31f4233b 916 if (cmd == OTPGETREGIONCOUNT) {
4b78fc42 917 int nbr = retlen / sizeof(struct otp_info);
31f4233b
NP
918 ret = copy_to_user(argp, &nbr, sizeof(int));
919 } else
4b78fc42 920 ret = copy_to_user(argp, buf, retlen);
31f4233b
NP
921 if (ret)
922 ret = -EFAULT;
923 }
924 kfree(buf);
925 break;
926 }
927
928 case OTPLOCK:
929 {
175428b2 930 struct otp_info oinfo;
31f4233b 931
beb133fc 932 if (mfi->mode != MTD_FILE_MODE_OTP_USER)
31f4233b 933 return -EINVAL;
175428b2 934 if (copy_from_user(&oinfo, argp, sizeof(oinfo)))
31f4233b 935 return -EFAULT;
4403dbfb 936 ret = mtd_lock_user_prot_reg(mtd, oinfo.start, oinfo.length);
31f4233b
NP
937 break;
938 }
31f4233b 939
7854d3f7 940 /* This ioctl is being deprecated - it truncates the ECC layout */
f1a28c02
TG
941 case ECCGETLAYOUT:
942 {
cc26c3cd
BN
943 struct nand_ecclayout_user *usrlay;
944
f1a28c02
TG
945 if (!mtd->ecclayout)
946 return -EOPNOTSUPP;
947
cc26c3cd
BN
948 usrlay = kmalloc(sizeof(*usrlay), GFP_KERNEL);
949 if (!usrlay)
950 return -ENOMEM;
951
952 shrink_ecclayout(mtd->ecclayout, usrlay);
953
954 if (copy_to_user(argp, usrlay, sizeof(*usrlay)))
955 ret = -EFAULT;
956 kfree(usrlay);
f1a28c02
TG
957 break;
958 }
959
960 case ECCGETSTATS:
961 {
962 if (copy_to_user(argp, &mtd->ecc_stats,
963 sizeof(struct mtd_ecc_stats)))
964 return -EFAULT;
965 break;
966 }
967
968 case MTDFILEMODE:
969 {
970 mfi->mode = 0;
971
972 switch(arg) {
beb133fc
BN
973 case MTD_FILE_MODE_OTP_FACTORY:
974 case MTD_FILE_MODE_OTP_USER:
f1a28c02
TG
975 ret = otp_select_filemode(mfi, arg);
976 break;
977
beb133fc 978 case MTD_FILE_MODE_RAW:
fc002e3c 979 if (!mtd_has_oob(mtd))
f1a28c02
TG
980 return -EOPNOTSUPP;
981 mfi->mode = arg;
982
beb133fc 983 case MTD_FILE_MODE_NORMAL:
f1a28c02
TG
984 break;
985 default:
986 ret = -EINVAL;
987 }
988 file->f_pos = 0;
989 break;
990 }
991
d0f7959e
RT
992 case BLKPG:
993 {
969e57ad 994 ret = mtdchar_blkpg_ioctl(mtd,
d0f7959e
RT
995 (struct blkpg_ioctl_arg __user *)arg);
996 break;
997 }
998
999 case BLKRRPART:
1000 {
1001 /* No reread partition feature. Just return ok */
1002 ret = 0;
1003 break;
1004 }
d0f7959e 1005
1da177e4
LT
1006 default:
1007 ret = -ENOTTY;
1008 }
1009
1010 return ret;
1011} /* memory_ioctl */
1012
969e57ad 1013static long mtdchar_unlocked_ioctl(struct file *file, u_int cmd, u_long arg)
55929332
AB
1014{
1015 int ret;
1016
5aa82940 1017 mutex_lock(&mtd_mutex);
969e57ad 1018 ret = mtdchar_ioctl(file, cmd, arg);
5aa82940 1019 mutex_unlock(&mtd_mutex);
55929332
AB
1020
1021 return ret;
1022}
1023
97718540
KC
1024#ifdef CONFIG_COMPAT
1025
1026struct mtd_oob_buf32 {
1027 u_int32_t start;
1028 u_int32_t length;
1029 compat_caddr_t ptr; /* unsigned char* */
1030};
1031
1032#define MEMWRITEOOB32 _IOWR('M', 3, struct mtd_oob_buf32)
1033#define MEMREADOOB32 _IOWR('M', 4, struct mtd_oob_buf32)
1034
969e57ad 1035static long mtdchar_compat_ioctl(struct file *file, unsigned int cmd,
97718540
KC
1036 unsigned long arg)
1037{
1038 struct mtd_file_info *mfi = file->private_data;
1039 struct mtd_info *mtd = mfi->mtd;
0b6585ce 1040 void __user *argp = compat_ptr(arg);
97718540
KC
1041 int ret = 0;
1042
5aa82940 1043 mutex_lock(&mtd_mutex);
97718540
KC
1044
1045 switch (cmd) {
1046 case MEMWRITEOOB32:
1047 {
1048 struct mtd_oob_buf32 buf;
1049 struct mtd_oob_buf32 __user *buf_user = argp;
1050
1051 if (copy_from_user(&buf, argp, sizeof(buf)))
1052 ret = -EFAULT;
1053 else
969e57ad 1054 ret = mtdchar_writeoob(file, mtd, buf.start,
97718540
KC
1055 buf.length, compat_ptr(buf.ptr),
1056 &buf_user->length);
1057 break;
1058 }
1059
1060 case MEMREADOOB32:
1061 {
1062 struct mtd_oob_buf32 buf;
1063 struct mtd_oob_buf32 __user *buf_user = argp;
1064
1065 /* NOTE: writes return length to buf->start */
1066 if (copy_from_user(&buf, argp, sizeof(buf)))
1067 ret = -EFAULT;
1068 else
969e57ad 1069 ret = mtdchar_readoob(file, mtd, buf.start,
97718540
KC
1070 buf.length, compat_ptr(buf.ptr),
1071 &buf_user->start);
1072 break;
1073 }
1074 default:
969e57ad 1075 ret = mtdchar_ioctl(file, cmd, (unsigned long)argp);
97718540
KC
1076 }
1077
5aa82940 1078 mutex_unlock(&mtd_mutex);
97718540
KC
1079
1080 return ret;
1081}
1082
1083#endif /* CONFIG_COMPAT */
1084
402d3265
DH
1085/*
1086 * try to determine where a shared mapping can be made
1087 * - only supported for NOMMU at the moment (MMU can't doesn't copy private
1088 * mappings)
1089 */
1090#ifndef CONFIG_MMU
969e57ad 1091static unsigned long mtdchar_get_unmapped_area(struct file *file,
402d3265
DH
1092 unsigned long addr,
1093 unsigned long len,
1094 unsigned long pgoff,
1095 unsigned long flags)
1096{
1097 struct mtd_file_info *mfi = file->private_data;
1098 struct mtd_info *mtd = mfi->mtd;
cd621274
AB
1099 unsigned long offset;
1100 int ret;
402d3265 1101
cd621274
AB
1102 if (addr != 0)
1103 return (unsigned long) -EINVAL;
402d3265 1104
cd621274
AB
1105 if (len > mtd->size || pgoff >= (mtd->size >> PAGE_SHIFT))
1106 return (unsigned long) -EINVAL;
402d3265 1107
cd621274
AB
1108 offset = pgoff << PAGE_SHIFT;
1109 if (offset > mtd->size - len)
1110 return (unsigned long) -EINVAL;
402d3265 1111
cd621274 1112 ret = mtd_get_unmapped_area(mtd, len, offset, flags);
b9995932 1113 return ret == -EOPNOTSUPP ? -ENODEV : ret;
402d3265
DH
1114}
1115#endif
1116
1117/*
1118 * set up a mapping for shared memory segments
1119 */
969e57ad 1120static int mtdchar_mmap(struct file *file, struct vm_area_struct *vma)
402d3265
DH
1121{
1122#ifdef CONFIG_MMU
1123 struct mtd_file_info *mfi = file->private_data;
1124 struct mtd_info *mtd = mfi->mtd;
dd02b67d 1125 struct map_info *map = mtd->priv;
dd02b67d 1126
f5cf8f07
DW
1127 /* This is broken because it assumes the MTD device is map-based
1128 and that mtd->priv is a valid struct map_info. It should be
1129 replaced with something that uses the mtd_get_unmapped_area()
1130 operation properly. */
1131 if (0 /*mtd->type == MTD_RAM || mtd->type == MTD_ROM*/) {
dd02b67d 1132#ifdef pgprot_noncached
8558e4a2 1133 if (file->f_flags & O_DSYNC || map->phys >= __pa(high_memory))
dd02b67d
AG
1134 vma->vm_page_prot = pgprot_noncached(vma->vm_page_prot);
1135#endif
8558e4a2 1136 return vm_iomap_memory(vma, map->phys, map->size);
dd02b67d 1137 }
b9995932 1138 return -ENODEV;
402d3265 1139#else
b9995932 1140 return vma->vm_flags & VM_SHARED ? 0 : -EACCES;
402d3265
DH
1141#endif
1142}
1143
d54b1fdb 1144static const struct file_operations mtd_fops = {
1da177e4 1145 .owner = THIS_MODULE,
969e57ad
AB
1146 .llseek = mtdchar_lseek,
1147 .read = mtdchar_read,
1148 .write = mtdchar_write,
1149 .unlocked_ioctl = mtdchar_unlocked_ioctl,
97718540 1150#ifdef CONFIG_COMPAT
969e57ad 1151 .compat_ioctl = mtdchar_compat_ioctl,
97718540 1152#endif
969e57ad
AB
1153 .open = mtdchar_open,
1154 .release = mtdchar_close,
1155 .mmap = mtdchar_mmap,
402d3265 1156#ifndef CONFIG_MMU
969e57ad 1157 .get_unmapped_area = mtdchar_get_unmapped_area,
402d3265 1158#endif
1da177e4
LT
1159};
1160
00292bbf
AV
1161static const struct super_operations mtd_ops = {
1162 .drop_inode = generic_delete_inode,
1163 .statfs = simple_statfs,
1164};
1165
51139ada
AV
1166static struct dentry *mtd_inodefs_mount(struct file_system_type *fs_type,
1167 int flags, const char *dev_name, void *data)
cd874237 1168{
00292bbf 1169 return mount_pseudo(fs_type, "mtd_inode:", &mtd_ops, NULL, MTD_INODE_FS_MAGIC);
cd874237
KS
1170}
1171
1172static struct file_system_type mtd_inodefs_type = {
1173 .name = "mtd_inodefs",
51139ada 1174 .mount = mtd_inodefs_mount,
cd874237
KS
1175 .kill_sb = kill_anon_super,
1176};
7f78e035 1177MODULE_ALIAS_FS("mtd_inodefs");
cd874237 1178
660685d9 1179int __init init_mtdchar(void)
1da177e4 1180{
cd874237 1181 int ret;
1f24b5a8 1182
cd874237 1183 ret = __register_chrdev(MTD_CHAR_MAJOR, 0, 1 << MINORBITS,
dad0db31 1184 "mtd", &mtd_fops);
cd874237 1185 if (ret < 0) {
57ae2b60
AB
1186 pr_err("Can't allocate major number %d for MTD\n",
1187 MTD_CHAR_MAJOR);
cd874237 1188 return ret;
9bc7b387
TP
1189 }
1190
cd874237
KS
1191 ret = register_filesystem(&mtd_inodefs_type);
1192 if (ret) {
57ae2b60
AB
1193 pr_err("Can't register mtd_inodefs filesystem, error %d\n",
1194 ret);
cd874237
KS
1195 goto err_unregister_chdev;
1196 }
57ae2b60 1197
cd874237
KS
1198 return ret;
1199
cd874237
KS
1200err_unregister_chdev:
1201 __unregister_chrdev(MTD_CHAR_MAJOR, 0, 1 << MINORBITS, "mtd");
1202 return ret;
1da177e4
LT
1203}
1204
660685d9 1205void __exit cleanup_mtdchar(void)
1da177e4 1206{
cd874237 1207 unregister_filesystem(&mtd_inodefs_type);
dad0db31 1208 __unregister_chrdev(MTD_CHAR_MAJOR, 0, 1 << MINORBITS, "mtd");
1da177e4
LT
1209}
1210
90160e13 1211MODULE_ALIAS_CHARDEV_MAJOR(MTD_CHAR_MAJOR);
This page took 0.637337 seconds and 5 git commands to generate.