fs: kill BDI_CAP_SWAP_BACKED
[deliverable/linux.git] / drivers / mtd / mtdchar.c
CommitLineData
1da177e4 1/*
a1452a37
DW
2 * Copyright © 1999-2010 David Woodhouse <dwmw2@infradead.org>
3 *
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License as published by
6 * the Free Software Foundation; either version 2 of the License, or
7 * (at your option) any later version.
8 *
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
13 *
14 * You should have received a copy of the GNU General Public License
15 * along with this program; if not, write to the Free Software
16 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
1da177e4
LT
17 *
18 */
19
15fdc52f
TG
20#include <linux/device.h>
21#include <linux/fs.h>
0c1eafdb 22#include <linux/mm.h>
9c74034f 23#include <linux/err.h>
15fdc52f 24#include <linux/init.h>
1da177e4
LT
25#include <linux/kernel.h>
26#include <linux/module.h>
15fdc52f
TG
27#include <linux/slab.h>
28#include <linux/sched.h>
5aa82940 29#include <linux/mutex.h>
402d3265 30#include <linux/backing-dev.h>
97718540 31#include <linux/compat.h>
cd874237 32#include <linux/mount.h>
d0f7959e 33#include <linux/blkpg.h>
b502bd11 34#include <linux/magic.h>
f83c3838 35#include <linux/major.h>
1da177e4 36#include <linux/mtd/mtd.h>
d0f7959e 37#include <linux/mtd/partitions.h>
dd02b67d 38#include <linux/mtd/map.h>
1da177e4 39
15fdc52f 40#include <asm/uaccess.h>
9bc7b387 41
660685d9
AB
42#include "mtdcore.h"
43
5aa82940 44static DEFINE_MUTEX(mtd_mutex);
1da177e4 45
045e9a5d 46/*
f1a28c02 47 * Data structure to hold the pointer to the mtd device as well
92394b5c 48 * as mode information of various use cases.
045e9a5d 49 */
f1a28c02
TG
50struct mtd_file_info {
51 struct mtd_info *mtd;
cd874237 52 struct inode *ino;
f1a28c02
TG
53 enum mtd_file_modes mode;
54};
31f4233b 55
969e57ad 56static loff_t mtdchar_lseek(struct file *file, loff_t offset, int orig)
1da177e4 57{
f1a28c02 58 struct mtd_file_info *mfi = file->private_data;
b959957f 59 return fixed_size_llseek(file, offset, orig, mfi->mtd->size);
1da177e4
LT
60}
61
00292bbf
AV
62static int count;
63static struct vfsmount *mnt;
64static struct file_system_type mtd_inodefs_type;
1da177e4 65
969e57ad 66static int mtdchar_open(struct inode *inode, struct file *file)
1da177e4
LT
67{
68 int minor = iminor(inode);
69 int devnum = minor >> 1;
6071239e 70 int ret = 0;
1da177e4 71 struct mtd_info *mtd;
f1a28c02 72 struct mtd_file_info *mfi;
cd874237 73 struct inode *mtd_ino;
1da177e4 74
289c0522 75 pr_debug("MTD_open\n");
1da177e4 76
1da177e4 77 /* You can't open the RO devices RW */
aeb5d727 78 if ((file->f_mode & FMODE_WRITE) && (minor & 1))
1da177e4
LT
79 return -EACCES;
80
00292bbf
AV
81 ret = simple_pin_fs(&mtd_inodefs_type, &mnt, &count);
82 if (ret)
83 return ret;
84
5aa82940 85 mutex_lock(&mtd_mutex);
1da177e4 86 mtd = get_mtd_device(NULL, devnum);
97894cda 87
6071239e
JC
88 if (IS_ERR(mtd)) {
89 ret = PTR_ERR(mtd);
90 goto out;
91 }
97894cda 92
402d3265 93 if (mtd->type == MTD_ABSENT) {
6071239e 94 ret = -ENODEV;
c65390f4 95 goto out1;
1da177e4
LT
96 }
97
00292bbf 98 mtd_ino = iget_locked(mnt->mnt_sb, devnum);
cd874237 99 if (!mtd_ino) {
cd874237 100 ret = -ENOMEM;
c65390f4 101 goto out1;
cd874237
KS
102 }
103 if (mtd_ino->i_state & I_NEW) {
104 mtd_ino->i_private = mtd;
105 mtd_ino->i_mode = S_IFCHR;
106 mtd_ino->i_data.backing_dev_info = mtd->backing_dev_info;
107 unlock_new_inode(mtd_ino);
108 }
109 file->f_mapping = mtd_ino->i_mapping;
402d3265 110
1da177e4 111 /* You can't open it RW if it's not a writeable device */
aeb5d727 112 if ((file->f_mode & FMODE_WRITE) && !(mtd->flags & MTD_WRITEABLE)) {
6071239e 113 ret = -EACCES;
c65390f4 114 goto out2;
1da177e4 115 }
97894cda 116
f1a28c02
TG
117 mfi = kzalloc(sizeof(*mfi), GFP_KERNEL);
118 if (!mfi) {
6071239e 119 ret = -ENOMEM;
c65390f4 120 goto out2;
f1a28c02 121 }
cd874237 122 mfi->ino = mtd_ino;
f1a28c02
TG
123 mfi->mtd = mtd;
124 file->private_data = mfi;
c65390f4
AV
125 mutex_unlock(&mtd_mutex);
126 return 0;
f1a28c02 127
c65390f4
AV
128out2:
129 iput(mtd_ino);
130out1:
131 put_mtd_device(mtd);
6071239e 132out:
5aa82940 133 mutex_unlock(&mtd_mutex);
00292bbf 134 simple_release_fs(&mnt, &count);
6071239e 135 return ret;
969e57ad 136} /* mtdchar_open */
1da177e4
LT
137
138/*====================================================================*/
139
969e57ad 140static int mtdchar_close(struct inode *inode, struct file *file)
1da177e4 141{
f1a28c02
TG
142 struct mtd_file_info *mfi = file->private_data;
143 struct mtd_info *mtd = mfi->mtd;
1da177e4 144
289c0522 145 pr_debug("MTD_close\n");
1da177e4 146
7eafaed5 147 /* Only sync if opened RW */
327cf292 148 if ((file->f_mode & FMODE_WRITE))
85f2f2a8 149 mtd_sync(mtd);
97894cda 150
cd874237
KS
151 iput(mfi->ino);
152
1da177e4 153 put_mtd_device(mtd);
f1a28c02
TG
154 file->private_data = NULL;
155 kfree(mfi);
00292bbf 156 simple_release_fs(&mnt, &count);
1da177e4
LT
157
158 return 0;
969e57ad 159} /* mtdchar_close */
1da177e4 160
3e45cf5e
GE
161/* Back in June 2001, dwmw2 wrote:
162 *
163 * FIXME: This _really_ needs to die. In 2.5, we should lock the
164 * userspace buffer down and use it directly with readv/writev.
165 *
166 * The implementation below, using mtd_kmalloc_up_to, mitigates
167 * allocation failures when the system is under low-memory situations
168 * or if memory is highly fragmented at the cost of reducing the
169 * performance of the requested transfer due to a smaller buffer size.
170 *
171 * A more complex but more memory-efficient implementation based on
172 * get_user_pages and iovecs to cover extents of those pages is a
173 * longer-term goal, as intimated by dwmw2 above. However, for the
174 * write case, this requires yet more complex head and tail transfer
175 * handling when those head and tail offsets and sizes are such that
176 * alignment requirements are not met in the NAND subdriver.
177 */
1da177e4 178
969e57ad
AB
179static ssize_t mtdchar_read(struct file *file, char __user *buf, size_t count,
180 loff_t *ppos)
1da177e4 181{
f1a28c02
TG
182 struct mtd_file_info *mfi = file->private_data;
183 struct mtd_info *mtd = mfi->mtd;
30fa9848 184 size_t retlen;
1da177e4
LT
185 size_t total_retlen=0;
186 int ret=0;
187 int len;
3e45cf5e 188 size_t size = count;
1da177e4 189 char *kbuf;
97894cda 190
289c0522 191 pr_debug("MTD_read\n");
1da177e4
LT
192
193 if (*ppos + count > mtd->size)
194 count = mtd->size - *ppos;
195
196 if (!count)
197 return 0;
97894cda 198
3e45cf5e 199 kbuf = mtd_kmalloc_up_to(mtd, &size);
b802c074
TG
200 if (!kbuf)
201 return -ENOMEM;
202
1da177e4 203 while (count) {
3e45cf5e 204 len = min_t(size_t, count, size);
1da177e4 205
f1a28c02 206 switch (mfi->mode) {
beb133fc 207 case MTD_FILE_MODE_OTP_FACTORY:
d264f72a
AB
208 ret = mtd_read_fact_prot_reg(mtd, *ppos, len,
209 &retlen, kbuf);
31f4233b 210 break;
beb133fc 211 case MTD_FILE_MODE_OTP_USER:
4ea1cabb
AB
212 ret = mtd_read_user_prot_reg(mtd, *ppos, len,
213 &retlen, kbuf);
31f4233b 214 break;
beb133fc 215 case MTD_FILE_MODE_RAW:
f1a28c02
TG
216 {
217 struct mtd_oob_ops ops;
218
0612b9dd 219 ops.mode = MTD_OPS_RAW;
f1a28c02
TG
220 ops.datbuf = kbuf;
221 ops.oobbuf = NULL;
222 ops.len = len;
223
fd2819bb 224 ret = mtd_read_oob(mtd, *ppos, &ops);
f1a28c02
TG
225 retlen = ops.retlen;
226 break;
227 }
31f4233b 228 default:
329ad399 229 ret = mtd_read(mtd, *ppos, len, &retlen, kbuf);
31f4233b 230 }
7854d3f7 231 /* Nand returns -EBADMSG on ECC errors, but it returns
1da177e4 232 * the data. For our userspace tools it is important
7854d3f7 233 * to dump areas with ECC errors!
9a1fcdfd 234 * For kernel internal usage it also might return -EUCLEAN
25985edc 235 * to signal the caller that a bitflip has occurred and has
9a1fcdfd 236 * been corrected by the ECC algorithm.
1da177e4
LT
237 * Userspace software which accesses NAND this way
238 * must be aware of the fact that it deals with NAND
239 */
d57f4054 240 if (!ret || mtd_is_bitflip_or_eccerr(ret)) {
1da177e4
LT
241 *ppos += retlen;
242 if (copy_to_user(buf, kbuf, retlen)) {
f4a43cfc 243 kfree(kbuf);
1da177e4
LT
244 return -EFAULT;
245 }
246 else
247 total_retlen += retlen;
248
249 count -= retlen;
250 buf += retlen;
31f4233b
NP
251 if (retlen == 0)
252 count = 0;
1da177e4
LT
253 }
254 else {
255 kfree(kbuf);
256 return ret;
257 }
97894cda 258
1da177e4
LT
259 }
260
b802c074 261 kfree(kbuf);
1da177e4 262 return total_retlen;
969e57ad 263} /* mtdchar_read */
1da177e4 264
969e57ad
AB
265static ssize_t mtdchar_write(struct file *file, const char __user *buf, size_t count,
266 loff_t *ppos)
1da177e4 267{
f1a28c02
TG
268 struct mtd_file_info *mfi = file->private_data;
269 struct mtd_info *mtd = mfi->mtd;
3e45cf5e 270 size_t size = count;
1da177e4
LT
271 char *kbuf;
272 size_t retlen;
273 size_t total_retlen=0;
274 int ret=0;
275 int len;
276
289c0522 277 pr_debug("MTD_write\n");
97894cda 278
1da177e4
LT
279 if (*ppos == mtd->size)
280 return -ENOSPC;
97894cda 281
1da177e4
LT
282 if (*ppos + count > mtd->size)
283 count = mtd->size - *ppos;
284
285 if (!count)
286 return 0;
287
3e45cf5e 288 kbuf = mtd_kmalloc_up_to(mtd, &size);
b802c074
TG
289 if (!kbuf)
290 return -ENOMEM;
291
1da177e4 292 while (count) {
3e45cf5e 293 len = min_t(size_t, count, size);
1da177e4 294
1da177e4
LT
295 if (copy_from_user(kbuf, buf, len)) {
296 kfree(kbuf);
297 return -EFAULT;
298 }
97894cda 299
f1a28c02 300 switch (mfi->mode) {
beb133fc 301 case MTD_FILE_MODE_OTP_FACTORY:
31f4233b
NP
302 ret = -EROFS;
303 break;
beb133fc 304 case MTD_FILE_MODE_OTP_USER:
482b43ad
AB
305 ret = mtd_write_user_prot_reg(mtd, *ppos, len,
306 &retlen, kbuf);
31f4233b 307 break;
f1a28c02 308
beb133fc 309 case MTD_FILE_MODE_RAW:
f1a28c02
TG
310 {
311 struct mtd_oob_ops ops;
312
0612b9dd 313 ops.mode = MTD_OPS_RAW;
f1a28c02
TG
314 ops.datbuf = kbuf;
315 ops.oobbuf = NULL;
bf514081 316 ops.ooboffs = 0;
f1a28c02
TG
317 ops.len = len;
318
a2cc5ba0 319 ret = mtd_write_oob(mtd, *ppos, &ops);
f1a28c02
TG
320 retlen = ops.retlen;
321 break;
322 }
323
31f4233b 324 default:
eda95cbf 325 ret = mtd_write(mtd, *ppos, len, &retlen, kbuf);
31f4233b 326 }
9a78bc83
CR
327
328 /*
329 * Return -ENOSPC only if no data could be written at all.
330 * Otherwise just return the number of bytes that actually
331 * have been written.
332 */
333 if ((ret == -ENOSPC) && (total_retlen))
334 break;
335
1da177e4
LT
336 if (!ret) {
337 *ppos += retlen;
338 total_retlen += retlen;
339 count -= retlen;
340 buf += retlen;
341 }
342 else {
343 kfree(kbuf);
344 return ret;
345 }
1da177e4
LT
346 }
347
b802c074 348 kfree(kbuf);
1da177e4 349 return total_retlen;
969e57ad 350} /* mtdchar_write */
1da177e4
LT
351
352/*======================================================================
353
354 IOCTL calls for getting device parameters.
355
356======================================================================*/
357static void mtdchar_erase_callback (struct erase_info *instr)
358{
359 wake_up((wait_queue_head_t *)instr->priv);
360}
361
f1a28c02
TG
362static int otp_select_filemode(struct mtd_file_info *mfi, int mode)
363{
364 struct mtd_info *mtd = mfi->mtd;
b6de3d6c 365 size_t retlen;
b6de3d6c 366
f1a28c02
TG
367 switch (mode) {
368 case MTD_OTP_FACTORY:
5dc63fa2
UKK
369 if (mtd_read_fact_prot_reg(mtd, -1, 0, &retlen, NULL) ==
370 -EOPNOTSUPP)
371 return -EOPNOTSUPP;
372
b6de3d6c 373 mfi->mode = MTD_FILE_MODE_OTP_FACTORY;
f1a28c02
TG
374 break;
375 case MTD_OTP_USER:
5dc63fa2
UKK
376 if (mtd_read_user_prot_reg(mtd, -1, 0, &retlen, NULL) ==
377 -EOPNOTSUPP)
378 return -EOPNOTSUPP;
379
b6de3d6c 380 mfi->mode = MTD_FILE_MODE_OTP_USER;
f1a28c02 381 break;
f1a28c02 382 case MTD_OTP_OFF:
5dc63fa2 383 mfi->mode = MTD_FILE_MODE_NORMAL;
f1a28c02 384 break;
5dc63fa2
UKK
385 default:
386 return -EINVAL;
f1a28c02 387 }
5dc63fa2
UKK
388
389 return 0;
f1a28c02 390}
f1a28c02 391
969e57ad 392static int mtdchar_writeoob(struct file *file, struct mtd_info *mtd,
97718540
KC
393 uint64_t start, uint32_t length, void __user *ptr,
394 uint32_t __user *retp)
395{
9ce244b3 396 struct mtd_file_info *mfi = file->private_data;
97718540
KC
397 struct mtd_oob_ops ops;
398 uint32_t retlen;
399 int ret = 0;
400
401 if (!(file->f_mode & FMODE_WRITE))
402 return -EPERM;
403
404 if (length > 4096)
405 return -EINVAL;
406
3c3c10bb 407 if (!mtd->_write_oob)
97718540
KC
408 ret = -EOPNOTSUPP;
409 else
0040476b 410 ret = access_ok(VERIFY_READ, ptr, length) ? 0 : -EFAULT;
97718540
KC
411
412 if (ret)
413 return ret;
414
415 ops.ooblen = length;
305b93f1 416 ops.ooboffs = start & (mtd->writesize - 1);
97718540 417 ops.datbuf = NULL;
beb133fc 418 ops.mode = (mfi->mode == MTD_FILE_MODE_RAW) ? MTD_OPS_RAW :
0612b9dd 419 MTD_OPS_PLACE_OOB;
97718540
KC
420
421 if (ops.ooboffs && ops.ooblen > (mtd->oobsize - ops.ooboffs))
422 return -EINVAL;
423
df1f1d1c
JL
424 ops.oobbuf = memdup_user(ptr, length);
425 if (IS_ERR(ops.oobbuf))
426 return PTR_ERR(ops.oobbuf);
97718540 427
305b93f1 428 start &= ~((uint64_t)mtd->writesize - 1);
a2cc5ba0 429 ret = mtd_write_oob(mtd, start, &ops);
97718540
KC
430
431 if (ops.oobretlen > 0xFFFFFFFFU)
432 ret = -EOVERFLOW;
433 retlen = ops.oobretlen;
434 if (copy_to_user(retp, &retlen, sizeof(length)))
435 ret = -EFAULT;
436
437 kfree(ops.oobbuf);
438 return ret;
439}
440
969e57ad 441static int mtdchar_readoob(struct file *file, struct mtd_info *mtd,
c46f6483
BN
442 uint64_t start, uint32_t length, void __user *ptr,
443 uint32_t __user *retp)
97718540 444{
c46f6483 445 struct mtd_file_info *mfi = file->private_data;
97718540
KC
446 struct mtd_oob_ops ops;
447 int ret = 0;
448
449 if (length > 4096)
450 return -EINVAL;
451
dac2639f
AB
452 if (!access_ok(VERIFY_WRITE, ptr, length))
453 return -EFAULT;
97718540
KC
454
455 ops.ooblen = length;
305b93f1 456 ops.ooboffs = start & (mtd->writesize - 1);
97718540 457 ops.datbuf = NULL;
beb133fc 458 ops.mode = (mfi->mode == MTD_FILE_MODE_RAW) ? MTD_OPS_RAW :
0612b9dd 459 MTD_OPS_PLACE_OOB;
97718540
KC
460
461 if (ops.ooboffs && ops.ooblen > (mtd->oobsize - ops.ooboffs))
462 return -EINVAL;
463
464 ops.oobbuf = kmalloc(length, GFP_KERNEL);
465 if (!ops.oobbuf)
466 return -ENOMEM;
467
305b93f1 468 start &= ~((uint64_t)mtd->writesize - 1);
fd2819bb 469 ret = mtd_read_oob(mtd, start, &ops);
97718540
KC
470
471 if (put_user(ops.oobretlen, retp))
472 ret = -EFAULT;
473 else if (ops.oobretlen && copy_to_user(ptr, ops.oobbuf,
474 ops.oobretlen))
475 ret = -EFAULT;
476
477 kfree(ops.oobbuf);
041e4575
BN
478
479 /*
480 * NAND returns -EBADMSG on ECC errors, but it returns the OOB
481 * data. For our userspace tools it is important to dump areas
482 * with ECC errors!
483 * For kernel internal usage it also might return -EUCLEAN
484 * to signal the caller that a bitflip has occured and has
485 * been corrected by the ECC algorithm.
486 *
c478d7e4
BN
487 * Note: currently the standard NAND function, nand_read_oob_std,
488 * does not calculate ECC for the OOB area, so do not rely on
489 * this behavior unless you have replaced it with your own.
041e4575 490 */
d57f4054 491 if (mtd_is_bitflip_or_eccerr(ret))
041e4575
BN
492 return 0;
493
97718540
KC
494 return ret;
495}
496
cc26c3cd
BN
497/*
498 * Copies (and truncates, if necessary) data from the larger struct,
499 * nand_ecclayout, to the smaller, deprecated layout struct,
92394b5c 500 * nand_ecclayout_user. This is necessary only to support the deprecated
cc26c3cd
BN
501 * API ioctl ECCGETLAYOUT while allowing all new functionality to use
502 * nand_ecclayout flexibly (i.e. the struct may change size in new
503 * releases without requiring major rewrites).
504 */
505static int shrink_ecclayout(const struct nand_ecclayout *from,
506 struct nand_ecclayout_user *to)
507{
508 int i;
509
510 if (!from || !to)
511 return -EINVAL;
512
513 memset(to, 0, sizeof(*to));
514
0ceacf36 515 to->eccbytes = min((int)from->eccbytes, MTD_MAX_ECCPOS_ENTRIES);
cc26c3cd
BN
516 for (i = 0; i < to->eccbytes; i++)
517 to->eccpos[i] = from->eccpos[i];
518
519 for (i = 0; i < MTD_MAX_OOBFREE_ENTRIES; i++) {
520 if (from->oobfree[i].length == 0 &&
521 from->oobfree[i].offset == 0)
522 break;
523 to->oobavail += from->oobfree[i].length;
524 to->oobfree[i] = from->oobfree[i];
525 }
526
527 return 0;
528}
529
969e57ad 530static int mtdchar_blkpg_ioctl(struct mtd_info *mtd,
d0f7959e
RT
531 struct blkpg_ioctl_arg __user *arg)
532{
533 struct blkpg_ioctl_arg a;
534 struct blkpg_partition p;
535
536 if (!capable(CAP_SYS_ADMIN))
537 return -EPERM;
538
d0f7959e
RT
539 if (copy_from_user(&a, arg, sizeof(struct blkpg_ioctl_arg)))
540 return -EFAULT;
541
542 if (copy_from_user(&p, a.data, sizeof(struct blkpg_partition)))
543 return -EFAULT;
544
545 switch (a.op) {
546 case BLKPG_ADD_PARTITION:
547
a7e93dcd
RT
548 /* Only master mtd device must be used to add partitions */
549 if (mtd_is_partition(mtd))
550 return -EINVAL;
551
1cc8d841
BN
552 /* Sanitize user input */
553 p.devname[BLKPG_DEVNAMELTH - 1] = '\0';
554
d0f7959e
RT
555 return mtd_add_partition(mtd, p.devname, p.start, p.length);
556
557 case BLKPG_DEL_PARTITION:
558
559 if (p.pno < 0)
560 return -EINVAL;
561
562 return mtd_del_partition(mtd, p.pno);
563
564 default:
565 return -EINVAL;
566 }
567}
d0f7959e 568
969e57ad 569static int mtdchar_write_ioctl(struct mtd_info *mtd,
e99d8b08
BN
570 struct mtd_write_req __user *argp)
571{
572 struct mtd_write_req req;
573 struct mtd_oob_ops ops;
f62cde49 574 const void __user *usr_data, *usr_oob;
e99d8b08
BN
575 int ret;
576
f62cde49 577 if (copy_from_user(&req, argp, sizeof(req)))
e99d8b08 578 return -EFAULT;
f62cde49
GU
579
580 usr_data = (const void __user *)(uintptr_t)req.usr_data;
581 usr_oob = (const void __user *)(uintptr_t)req.usr_oob;
582 if (!access_ok(VERIFY_READ, usr_data, req.len) ||
583 !access_ok(VERIFY_READ, usr_oob, req.ooblen))
584 return -EFAULT;
585
3c3c10bb 586 if (!mtd->_write_oob)
e99d8b08
BN
587 return -EOPNOTSUPP;
588
589 ops.mode = req.mode;
590 ops.len = (size_t)req.len;
591 ops.ooblen = (size_t)req.ooblen;
592 ops.ooboffs = 0;
593
f62cde49 594 if (usr_data) {
e99d8b08
BN
595 ops.datbuf = memdup_user(usr_data, ops.len);
596 if (IS_ERR(ops.datbuf))
597 return PTR_ERR(ops.datbuf);
598 } else {
599 ops.datbuf = NULL;
600 }
601
f62cde49 602 if (usr_oob) {
e99d8b08
BN
603 ops.oobbuf = memdup_user(usr_oob, ops.ooblen);
604 if (IS_ERR(ops.oobbuf)) {
605 kfree(ops.datbuf);
606 return PTR_ERR(ops.oobbuf);
607 }
608 } else {
609 ops.oobbuf = NULL;
610 }
611
a2cc5ba0 612 ret = mtd_write_oob(mtd, (loff_t)req.start, &ops);
e99d8b08
BN
613
614 kfree(ops.datbuf);
615 kfree(ops.oobbuf);
616
617 return ret;
618}
619
969e57ad 620static int mtdchar_ioctl(struct file *file, u_int cmd, u_long arg)
1da177e4 621{
f1a28c02
TG
622 struct mtd_file_info *mfi = file->private_data;
623 struct mtd_info *mtd = mfi->mtd;
1da177e4
LT
624 void __user *argp = (void __user *)arg;
625 int ret = 0;
626 u_long size;
73c619ea 627 struct mtd_info_user info;
97894cda 628
289c0522 629 pr_debug("MTD_ioctl\n");
1da177e4
LT
630
631 size = (cmd & IOCSIZE_MASK) >> IOCSIZE_SHIFT;
632 if (cmd & IOC_IN) {
633 if (!access_ok(VERIFY_READ, argp, size))
634 return -EFAULT;
635 }
636 if (cmd & IOC_OUT) {
637 if (!access_ok(VERIFY_WRITE, argp, size))
638 return -EFAULT;
639 }
97894cda 640
1da177e4
LT
641 switch (cmd) {
642 case MEMGETREGIONCOUNT:
643 if (copy_to_user(argp, &(mtd->numeraseregions), sizeof(int)))
644 return -EFAULT;
645 break;
646
647 case MEMGETREGIONINFO:
648 {
b67c5f87
ZW
649 uint32_t ur_idx;
650 struct mtd_erase_region_info *kr;
bcc98a46 651 struct region_info_user __user *ur = argp;
1da177e4 652
b67c5f87 653 if (get_user(ur_idx, &(ur->regionindex)))
1da177e4
LT
654 return -EFAULT;
655
5e59be1f
DC
656 if (ur_idx >= mtd->numeraseregions)
657 return -EINVAL;
658
b67c5f87
ZW
659 kr = &(mtd->eraseregions[ur_idx]);
660
661 if (put_user(kr->offset, &(ur->offset))
662 || put_user(kr->erasesize, &(ur->erasesize))
663 || put_user(kr->numblocks, &(ur->numblocks)))
1da177e4 664 return -EFAULT;
b67c5f87 665
1da177e4
LT
666 break;
667 }
668
669 case MEMGETINFO:
a0c5a394 670 memset(&info, 0, sizeof(info));
73c619ea
JE
671 info.type = mtd->type;
672 info.flags = mtd->flags;
673 info.size = mtd->size;
674 info.erasesize = mtd->erasesize;
675 info.writesize = mtd->writesize;
676 info.oobsize = mtd->oobsize;
19fb4341
BN
677 /* The below field is obsolete */
678 info.padding = 0;
73c619ea 679 if (copy_to_user(argp, &info, sizeof(struct mtd_info_user)))
1da177e4
LT
680 return -EFAULT;
681 break;
682
683 case MEMERASE:
0dc54e9f 684 case MEMERASE64:
1da177e4
LT
685 {
686 struct erase_info *erase;
687
aeb5d727 688 if(!(file->f_mode & FMODE_WRITE))
1da177e4
LT
689 return -EPERM;
690
95b93a0c 691 erase=kzalloc(sizeof(struct erase_info),GFP_KERNEL);
1da177e4
LT
692 if (!erase)
693 ret = -ENOMEM;
694 else {
695 wait_queue_head_t waitq;
696 DECLARE_WAITQUEUE(wait, current);
697
698 init_waitqueue_head(&waitq);
699
0dc54e9f
KC
700 if (cmd == MEMERASE64) {
701 struct erase_info_user64 einfo64;
702
703 if (copy_from_user(&einfo64, argp,
704 sizeof(struct erase_info_user64))) {
705 kfree(erase);
706 return -EFAULT;
707 }
708 erase->addr = einfo64.start;
709 erase->len = einfo64.length;
710 } else {
711 struct erase_info_user einfo32;
712
713 if (copy_from_user(&einfo32, argp,
714 sizeof(struct erase_info_user))) {
715 kfree(erase);
716 return -EFAULT;
717 }
718 erase->addr = einfo32.start;
719 erase->len = einfo32.length;
1da177e4
LT
720 }
721 erase->mtd = mtd;
722 erase->callback = mtdchar_erase_callback;
723 erase->priv = (unsigned long)&waitq;
97894cda 724
1da177e4
LT
725 /*
726 FIXME: Allow INTERRUPTIBLE. Which means
727 not having the wait_queue head on the stack.
97894cda 728
1da177e4
LT
729 If the wq_head is on the stack, and we
730 leave because we got interrupted, then the
731 wq_head is no longer there when the
732 callback routine tries to wake us up.
733 */
7e1f0dc0 734 ret = mtd_erase(mtd, erase);
1da177e4
LT
735 if (!ret) {
736 set_current_state(TASK_UNINTERRUPTIBLE);
737 add_wait_queue(&waitq, &wait);
738 if (erase->state != MTD_ERASE_DONE &&
739 erase->state != MTD_ERASE_FAILED)
740 schedule();
741 remove_wait_queue(&waitq, &wait);
742 set_current_state(TASK_RUNNING);
743
744 ret = (erase->state == MTD_ERASE_FAILED)?-EIO:0;
745 }
746 kfree(erase);
747 }
748 break;
749 }
750
751 case MEMWRITEOOB:
752 {
753 struct mtd_oob_buf buf;
97718540 754 struct mtd_oob_buf __user *buf_user = argp;
1da177e4 755
97718540
KC
756 /* NOTE: writes return length to buf_user->length */
757 if (copy_from_user(&buf, argp, sizeof(buf)))
1da177e4 758 ret = -EFAULT;
97718540 759 else
969e57ad 760 ret = mtdchar_writeoob(file, mtd, buf.start, buf.length,
97718540 761 buf.ptr, &buf_user->length);
1da177e4 762 break;
1da177e4
LT
763 }
764
765 case MEMREADOOB:
766 {
767 struct mtd_oob_buf buf;
97718540 768 struct mtd_oob_buf __user *buf_user = argp;
8593fbc6 769
97718540
KC
770 /* NOTE: writes return length to buf_user->start */
771 if (copy_from_user(&buf, argp, sizeof(buf)))
1da177e4 772 ret = -EFAULT;
97718540 773 else
969e57ad 774 ret = mtdchar_readoob(file, mtd, buf.start, buf.length,
97718540 775 buf.ptr, &buf_user->start);
1da177e4
LT
776 break;
777 }
778
aea7cea9
KC
779 case MEMWRITEOOB64:
780 {
781 struct mtd_oob_buf64 buf;
782 struct mtd_oob_buf64 __user *buf_user = argp;
783
784 if (copy_from_user(&buf, argp, sizeof(buf)))
785 ret = -EFAULT;
786 else
969e57ad 787 ret = mtdchar_writeoob(file, mtd, buf.start, buf.length,
aea7cea9
KC
788 (void __user *)(uintptr_t)buf.usr_ptr,
789 &buf_user->length);
790 break;
791 }
792
793 case MEMREADOOB64:
794 {
795 struct mtd_oob_buf64 buf;
796 struct mtd_oob_buf64 __user *buf_user = argp;
797
798 if (copy_from_user(&buf, argp, sizeof(buf)))
799 ret = -EFAULT;
800 else
969e57ad 801 ret = mtdchar_readoob(file, mtd, buf.start, buf.length,
aea7cea9
KC
802 (void __user *)(uintptr_t)buf.usr_ptr,
803 &buf_user->length);
804 break;
805 }
806
e99d8b08
BN
807 case MEMWRITE:
808 {
969e57ad 809 ret = mtdchar_write_ioctl(mtd,
e99d8b08
BN
810 (struct mtd_write_req __user *)arg);
811 break;
812 }
813
1da177e4
LT
814 case MEMLOCK:
815 {
175428b2 816 struct erase_info_user einfo;
1da177e4 817
175428b2 818 if (copy_from_user(&einfo, argp, sizeof(einfo)))
1da177e4
LT
819 return -EFAULT;
820
38134565 821 ret = mtd_lock(mtd, einfo.start, einfo.length);
1da177e4
LT
822 break;
823 }
824
825 case MEMUNLOCK:
826 {
175428b2 827 struct erase_info_user einfo;
1da177e4 828
175428b2 829 if (copy_from_user(&einfo, argp, sizeof(einfo)))
1da177e4
LT
830 return -EFAULT;
831
38134565 832 ret = mtd_unlock(mtd, einfo.start, einfo.length);
1da177e4
LT
833 break;
834 }
835
9938424f
RC
836 case MEMISLOCKED:
837 {
838 struct erase_info_user einfo;
839
840 if (copy_from_user(&einfo, argp, sizeof(einfo)))
841 return -EFAULT;
842
38134565 843 ret = mtd_is_locked(mtd, einfo.start, einfo.length);
9938424f
RC
844 break;
845 }
846
5bd34c09 847 /* Legacy interface */
1da177e4
LT
848 case MEMGETOOBSEL:
849 {
5bd34c09
TG
850 struct nand_oobinfo oi;
851
852 if (!mtd->ecclayout)
853 return -EOPNOTSUPP;
854 if (mtd->ecclayout->eccbytes > ARRAY_SIZE(oi.eccpos))
855 return -EINVAL;
856
857 oi.useecc = MTD_NANDECC_AUTOPLACE;
858 memcpy(&oi.eccpos, mtd->ecclayout->eccpos, sizeof(oi.eccpos));
859 memcpy(&oi.oobfree, mtd->ecclayout->oobfree,
860 sizeof(oi.oobfree));
d25ade71 861 oi.eccbytes = mtd->ecclayout->eccbytes;
5bd34c09
TG
862
863 if (copy_to_user(argp, &oi, sizeof(struct nand_oobinfo)))
1da177e4
LT
864 return -EFAULT;
865 break;
866 }
867
868 case MEMGETBADBLOCK:
869 {
870 loff_t offs;
97894cda 871
1da177e4
LT
872 if (copy_from_user(&offs, argp, sizeof(loff_t)))
873 return -EFAULT;
8f461a73 874 return mtd_block_isbad(mtd, offs);
1da177e4
LT
875 break;
876 }
877
878 case MEMSETBADBLOCK:
879 {
880 loff_t offs;
881
882 if (copy_from_user(&offs, argp, sizeof(loff_t)))
883 return -EFAULT;
800ffd34 884 return mtd_block_markbad(mtd, offs);
1da177e4
LT
885 break;
886 }
887
31f4233b
NP
888 case OTPSELECT:
889 {
890 int mode;
891 if (copy_from_user(&mode, argp, sizeof(int)))
892 return -EFAULT;
f1a28c02 893
beb133fc 894 mfi->mode = MTD_FILE_MODE_NORMAL;
f1a28c02
TG
895
896 ret = otp_select_filemode(mfi, mode);
897
81dba488 898 file->f_pos = 0;
31f4233b
NP
899 break;
900 }
901
902 case OTPGETREGIONCOUNT:
903 case OTPGETREGIONINFO:
904 {
905 struct otp_info *buf = kmalloc(4096, GFP_KERNEL);
4b78fc42 906 size_t retlen;
31f4233b
NP
907 if (!buf)
908 return -ENOMEM;
f1a28c02 909 switch (mfi->mode) {
beb133fc 910 case MTD_FILE_MODE_OTP_FACTORY:
4b78fc42 911 ret = mtd_get_fact_prot_info(mtd, 4096, &retlen, buf);
31f4233b 912 break;
beb133fc 913 case MTD_FILE_MODE_OTP_USER:
4b78fc42 914 ret = mtd_get_user_prot_info(mtd, 4096, &retlen, buf);
31f4233b 915 break;
f1a28c02 916 default:
87e858a9 917 ret = -EINVAL;
f1a28c02 918 break;
31f4233b 919 }
4b78fc42 920 if (!ret) {
31f4233b 921 if (cmd == OTPGETREGIONCOUNT) {
4b78fc42 922 int nbr = retlen / sizeof(struct otp_info);
31f4233b
NP
923 ret = copy_to_user(argp, &nbr, sizeof(int));
924 } else
4b78fc42 925 ret = copy_to_user(argp, buf, retlen);
31f4233b
NP
926 if (ret)
927 ret = -EFAULT;
928 }
929 kfree(buf);
930 break;
931 }
932
933 case OTPLOCK:
934 {
175428b2 935 struct otp_info oinfo;
31f4233b 936
beb133fc 937 if (mfi->mode != MTD_FILE_MODE_OTP_USER)
31f4233b 938 return -EINVAL;
175428b2 939 if (copy_from_user(&oinfo, argp, sizeof(oinfo)))
31f4233b 940 return -EFAULT;
4403dbfb 941 ret = mtd_lock_user_prot_reg(mtd, oinfo.start, oinfo.length);
31f4233b
NP
942 break;
943 }
31f4233b 944
7854d3f7 945 /* This ioctl is being deprecated - it truncates the ECC layout */
f1a28c02
TG
946 case ECCGETLAYOUT:
947 {
cc26c3cd
BN
948 struct nand_ecclayout_user *usrlay;
949
f1a28c02
TG
950 if (!mtd->ecclayout)
951 return -EOPNOTSUPP;
952
cc26c3cd
BN
953 usrlay = kmalloc(sizeof(*usrlay), GFP_KERNEL);
954 if (!usrlay)
955 return -ENOMEM;
956
957 shrink_ecclayout(mtd->ecclayout, usrlay);
958
959 if (copy_to_user(argp, usrlay, sizeof(*usrlay)))
960 ret = -EFAULT;
961 kfree(usrlay);
f1a28c02
TG
962 break;
963 }
964
965 case ECCGETSTATS:
966 {
967 if (copy_to_user(argp, &mtd->ecc_stats,
968 sizeof(struct mtd_ecc_stats)))
969 return -EFAULT;
970 break;
971 }
972
973 case MTDFILEMODE:
974 {
975 mfi->mode = 0;
976
977 switch(arg) {
beb133fc
BN
978 case MTD_FILE_MODE_OTP_FACTORY:
979 case MTD_FILE_MODE_OTP_USER:
f1a28c02
TG
980 ret = otp_select_filemode(mfi, arg);
981 break;
982
beb133fc 983 case MTD_FILE_MODE_RAW:
fc002e3c 984 if (!mtd_has_oob(mtd))
f1a28c02
TG
985 return -EOPNOTSUPP;
986 mfi->mode = arg;
987
beb133fc 988 case MTD_FILE_MODE_NORMAL:
f1a28c02
TG
989 break;
990 default:
991 ret = -EINVAL;
992 }
993 file->f_pos = 0;
994 break;
995 }
996
d0f7959e
RT
997 case BLKPG:
998 {
969e57ad 999 ret = mtdchar_blkpg_ioctl(mtd,
d0f7959e
RT
1000 (struct blkpg_ioctl_arg __user *)arg);
1001 break;
1002 }
1003
1004 case BLKRRPART:
1005 {
1006 /* No reread partition feature. Just return ok */
1007 ret = 0;
1008 break;
1009 }
d0f7959e 1010
1da177e4
LT
1011 default:
1012 ret = -ENOTTY;
1013 }
1014
1015 return ret;
1016} /* memory_ioctl */
1017
969e57ad 1018static long mtdchar_unlocked_ioctl(struct file *file, u_int cmd, u_long arg)
55929332
AB
1019{
1020 int ret;
1021
5aa82940 1022 mutex_lock(&mtd_mutex);
969e57ad 1023 ret = mtdchar_ioctl(file, cmd, arg);
5aa82940 1024 mutex_unlock(&mtd_mutex);
55929332
AB
1025
1026 return ret;
1027}
1028
97718540
KC
1029#ifdef CONFIG_COMPAT
1030
1031struct mtd_oob_buf32 {
1032 u_int32_t start;
1033 u_int32_t length;
1034 compat_caddr_t ptr; /* unsigned char* */
1035};
1036
1037#define MEMWRITEOOB32 _IOWR('M', 3, struct mtd_oob_buf32)
1038#define MEMREADOOB32 _IOWR('M', 4, struct mtd_oob_buf32)
1039
969e57ad 1040static long mtdchar_compat_ioctl(struct file *file, unsigned int cmd,
97718540
KC
1041 unsigned long arg)
1042{
1043 struct mtd_file_info *mfi = file->private_data;
1044 struct mtd_info *mtd = mfi->mtd;
0b6585ce 1045 void __user *argp = compat_ptr(arg);
97718540
KC
1046 int ret = 0;
1047
5aa82940 1048 mutex_lock(&mtd_mutex);
97718540
KC
1049
1050 switch (cmd) {
1051 case MEMWRITEOOB32:
1052 {
1053 struct mtd_oob_buf32 buf;
1054 struct mtd_oob_buf32 __user *buf_user = argp;
1055
1056 if (copy_from_user(&buf, argp, sizeof(buf)))
1057 ret = -EFAULT;
1058 else
969e57ad 1059 ret = mtdchar_writeoob(file, mtd, buf.start,
97718540
KC
1060 buf.length, compat_ptr(buf.ptr),
1061 &buf_user->length);
1062 break;
1063 }
1064
1065 case MEMREADOOB32:
1066 {
1067 struct mtd_oob_buf32 buf;
1068 struct mtd_oob_buf32 __user *buf_user = argp;
1069
1070 /* NOTE: writes return length to buf->start */
1071 if (copy_from_user(&buf, argp, sizeof(buf)))
1072 ret = -EFAULT;
1073 else
969e57ad 1074 ret = mtdchar_readoob(file, mtd, buf.start,
97718540
KC
1075 buf.length, compat_ptr(buf.ptr),
1076 &buf_user->start);
1077 break;
1078 }
1079 default:
969e57ad 1080 ret = mtdchar_ioctl(file, cmd, (unsigned long)argp);
97718540
KC
1081 }
1082
5aa82940 1083 mutex_unlock(&mtd_mutex);
97718540
KC
1084
1085 return ret;
1086}
1087
1088#endif /* CONFIG_COMPAT */
1089
402d3265
DH
1090/*
1091 * try to determine where a shared mapping can be made
1092 * - only supported for NOMMU at the moment (MMU can't doesn't copy private
1093 * mappings)
1094 */
1095#ifndef CONFIG_MMU
969e57ad 1096static unsigned long mtdchar_get_unmapped_area(struct file *file,
402d3265
DH
1097 unsigned long addr,
1098 unsigned long len,
1099 unsigned long pgoff,
1100 unsigned long flags)
1101{
1102 struct mtd_file_info *mfi = file->private_data;
1103 struct mtd_info *mtd = mfi->mtd;
cd621274
AB
1104 unsigned long offset;
1105 int ret;
402d3265 1106
cd621274
AB
1107 if (addr != 0)
1108 return (unsigned long) -EINVAL;
402d3265 1109
cd621274
AB
1110 if (len > mtd->size || pgoff >= (mtd->size >> PAGE_SHIFT))
1111 return (unsigned long) -EINVAL;
402d3265 1112
cd621274
AB
1113 offset = pgoff << PAGE_SHIFT;
1114 if (offset > mtd->size - len)
1115 return (unsigned long) -EINVAL;
402d3265 1116
cd621274 1117 ret = mtd_get_unmapped_area(mtd, len, offset, flags);
b9995932 1118 return ret == -EOPNOTSUPP ? -ENODEV : ret;
402d3265
DH
1119}
1120#endif
1121
1122/*
1123 * set up a mapping for shared memory segments
1124 */
969e57ad 1125static int mtdchar_mmap(struct file *file, struct vm_area_struct *vma)
402d3265
DH
1126{
1127#ifdef CONFIG_MMU
1128 struct mtd_file_info *mfi = file->private_data;
1129 struct mtd_info *mtd = mfi->mtd;
dd02b67d 1130 struct map_info *map = mtd->priv;
dd02b67d 1131
f5cf8f07
DW
1132 /* This is broken because it assumes the MTD device is map-based
1133 and that mtd->priv is a valid struct map_info. It should be
1134 replaced with something that uses the mtd_get_unmapped_area()
1135 operation properly. */
1136 if (0 /*mtd->type == MTD_RAM || mtd->type == MTD_ROM*/) {
dd02b67d 1137#ifdef pgprot_noncached
8558e4a2 1138 if (file->f_flags & O_DSYNC || map->phys >= __pa(high_memory))
dd02b67d
AG
1139 vma->vm_page_prot = pgprot_noncached(vma->vm_page_prot);
1140#endif
8558e4a2 1141 return vm_iomap_memory(vma, map->phys, map->size);
dd02b67d 1142 }
b9995932 1143 return -ENODEV;
402d3265 1144#else
b9995932 1145 return vma->vm_flags & VM_SHARED ? 0 : -EACCES;
402d3265
DH
1146#endif
1147}
1148
d54b1fdb 1149static const struct file_operations mtd_fops = {
1da177e4 1150 .owner = THIS_MODULE,
969e57ad
AB
1151 .llseek = mtdchar_lseek,
1152 .read = mtdchar_read,
1153 .write = mtdchar_write,
1154 .unlocked_ioctl = mtdchar_unlocked_ioctl,
97718540 1155#ifdef CONFIG_COMPAT
969e57ad 1156 .compat_ioctl = mtdchar_compat_ioctl,
97718540 1157#endif
969e57ad
AB
1158 .open = mtdchar_open,
1159 .release = mtdchar_close,
1160 .mmap = mtdchar_mmap,
402d3265 1161#ifndef CONFIG_MMU
969e57ad 1162 .get_unmapped_area = mtdchar_get_unmapped_area,
402d3265 1163#endif
1da177e4
LT
1164};
1165
00292bbf
AV
1166static const struct super_operations mtd_ops = {
1167 .drop_inode = generic_delete_inode,
1168 .statfs = simple_statfs,
1169};
1170
51139ada
AV
1171static struct dentry *mtd_inodefs_mount(struct file_system_type *fs_type,
1172 int flags, const char *dev_name, void *data)
cd874237 1173{
00292bbf 1174 return mount_pseudo(fs_type, "mtd_inode:", &mtd_ops, NULL, MTD_INODE_FS_MAGIC);
cd874237
KS
1175}
1176
1177static struct file_system_type mtd_inodefs_type = {
1178 .name = "mtd_inodefs",
51139ada 1179 .mount = mtd_inodefs_mount,
cd874237
KS
1180 .kill_sb = kill_anon_super,
1181};
7f78e035 1182MODULE_ALIAS_FS("mtd_inodefs");
cd874237 1183
660685d9 1184int __init init_mtdchar(void)
1da177e4 1185{
cd874237 1186 int ret;
1f24b5a8 1187
cd874237 1188 ret = __register_chrdev(MTD_CHAR_MAJOR, 0, 1 << MINORBITS,
dad0db31 1189 "mtd", &mtd_fops);
cd874237 1190 if (ret < 0) {
57ae2b60
AB
1191 pr_err("Can't allocate major number %d for MTD\n",
1192 MTD_CHAR_MAJOR);
cd874237 1193 return ret;
9bc7b387
TP
1194 }
1195
cd874237
KS
1196 ret = register_filesystem(&mtd_inodefs_type);
1197 if (ret) {
57ae2b60
AB
1198 pr_err("Can't register mtd_inodefs filesystem, error %d\n",
1199 ret);
cd874237
KS
1200 goto err_unregister_chdev;
1201 }
57ae2b60 1202
cd874237
KS
1203 return ret;
1204
cd874237
KS
1205err_unregister_chdev:
1206 __unregister_chrdev(MTD_CHAR_MAJOR, 0, 1 << MINORBITS, "mtd");
1207 return ret;
1da177e4
LT
1208}
1209
660685d9 1210void __exit cleanup_mtdchar(void)
1da177e4 1211{
cd874237 1212 unregister_filesystem(&mtd_inodefs_type);
dad0db31 1213 __unregister_chrdev(MTD_CHAR_MAJOR, 0, 1 << MINORBITS, "mtd");
1da177e4
LT
1214}
1215
90160e13 1216MODULE_ALIAS_CHARDEV_MAJOR(MTD_CHAR_MAJOR);
This page took 0.739665 seconds and 5 git commands to generate.