[PATCH] mark struct file_operations const 5
[deliverable/linux.git] / drivers / mtd / mtdchar.c
CommitLineData
1da177e4 1/*
97894cda 2 * $Id: mtdchar.c,v 1.76 2005/11/07 11:14:20 gleixner Exp $
1da177e4
LT
3 *
4 * Character-device access to raw MTD devices.
5 *
6 */
7
15fdc52f
TG
8#include <linux/device.h>
9#include <linux/fs.h>
9c74034f 10#include <linux/err.h>
15fdc52f 11#include <linux/init.h>
1da177e4
LT
12#include <linux/kernel.h>
13#include <linux/module.h>
15fdc52f
TG
14#include <linux/slab.h>
15#include <linux/sched.h>
16
1da177e4
LT
17#include <linux/mtd/mtd.h>
18#include <linux/mtd/compatmac.h>
1da177e4 19
15fdc52f 20#include <asm/uaccess.h>
9bc7b387
TP
21
22static struct class *mtd_class;
1da177e4
LT
23
24static void mtd_notify_add(struct mtd_info* mtd)
25{
26 if (!mtd)
27 return;
28
53f46542 29 class_device_create(mtd_class, NULL, MKDEV(MTD_CHAR_MAJOR, mtd->index*2),
9bc7b387 30 NULL, "mtd%d", mtd->index);
97894cda 31
53f46542 32 class_device_create(mtd_class, NULL,
9bc7b387
TP
33 MKDEV(MTD_CHAR_MAJOR, mtd->index*2+1),
34 NULL, "mtd%dro", mtd->index);
1da177e4
LT
35}
36
37static void mtd_notify_remove(struct mtd_info* mtd)
38{
39 if (!mtd)
40 return;
9bc7b387
TP
41
42 class_device_destroy(mtd_class, MKDEV(MTD_CHAR_MAJOR, mtd->index*2));
43 class_device_destroy(mtd_class, MKDEV(MTD_CHAR_MAJOR, mtd->index*2+1));
1da177e4
LT
44}
45
46static struct mtd_notifier notifier = {
47 .add = mtd_notify_add,
48 .remove = mtd_notify_remove,
49};
50
045e9a5d 51/*
f1a28c02
TG
52 * Data structure to hold the pointer to the mtd device as well
53 * as mode information ofr various use cases.
045e9a5d 54 */
f1a28c02
TG
55struct mtd_file_info {
56 struct mtd_info *mtd;
57 enum mtd_file_modes mode;
58};
31f4233b 59
1da177e4
LT
60static loff_t mtd_lseek (struct file *file, loff_t offset, int orig)
61{
f1a28c02
TG
62 struct mtd_file_info *mfi = file->private_data;
63 struct mtd_info *mtd = mfi->mtd;
1da177e4
LT
64
65 switch (orig) {
ea59830d 66 case SEEK_SET:
1da177e4 67 break;
ea59830d 68 case SEEK_CUR:
8b491d75 69 offset += file->f_pos;
1da177e4 70 break;
ea59830d 71 case SEEK_END:
8b491d75 72 offset += mtd->size;
1da177e4
LT
73 break;
74 default:
75 return -EINVAL;
76 }
77
1887f517 78 if (offset >= 0 && offset <= mtd->size)
8b491d75 79 return file->f_pos = offset;
1da177e4 80
8b491d75 81 return -EINVAL;
1da177e4
LT
82}
83
84
85
86static int mtd_open(struct inode *inode, struct file *file)
87{
88 int minor = iminor(inode);
89 int devnum = minor >> 1;
90 struct mtd_info *mtd;
f1a28c02 91 struct mtd_file_info *mfi;
1da177e4
LT
92
93 DEBUG(MTD_DEBUG_LEVEL0, "MTD_open\n");
94
95 if (devnum >= MAX_MTD_DEVICES)
96 return -ENODEV;
97
98 /* You can't open the RO devices RW */
99 if ((file->f_mode & 2) && (minor & 1))
100 return -EACCES;
101
102 mtd = get_mtd_device(NULL, devnum);
97894cda 103
9c74034f
AB
104 if (IS_ERR(mtd))
105 return PTR_ERR(mtd);
97894cda 106
1da177e4
LT
107 if (MTD_ABSENT == mtd->type) {
108 put_mtd_device(mtd);
109 return -ENODEV;
110 }
111
1da177e4
LT
112 /* You can't open it RW if it's not a writeable device */
113 if ((file->f_mode & 2) && !(mtd->flags & MTD_WRITEABLE)) {
114 put_mtd_device(mtd);
115 return -EACCES;
116 }
97894cda 117
f1a28c02
TG
118 mfi = kzalloc(sizeof(*mfi), GFP_KERNEL);
119 if (!mfi) {
120 put_mtd_device(mtd);
121 return -ENOMEM;
122 }
123 mfi->mtd = mtd;
124 file->private_data = mfi;
125
1da177e4
LT
126 return 0;
127} /* mtd_open */
128
129/*====================================================================*/
130
131static int mtd_close(struct inode *inode, struct file *file)
132{
f1a28c02
TG
133 struct mtd_file_info *mfi = file->private_data;
134 struct mtd_info *mtd = mfi->mtd;
1da177e4
LT
135
136 DEBUG(MTD_DEBUG_LEVEL0, "MTD_close\n");
137
1da177e4
LT
138 if (mtd->sync)
139 mtd->sync(mtd);
97894cda 140
1da177e4 141 put_mtd_device(mtd);
f1a28c02
TG
142 file->private_data = NULL;
143 kfree(mfi);
1da177e4
LT
144
145 return 0;
146} /* mtd_close */
147
148/* FIXME: This _really_ needs to die. In 2.5, we should lock the
149 userspace buffer down and use it directly with readv/writev.
150*/
151#define MAX_KMALLOC_SIZE 0x20000
152
153static ssize_t mtd_read(struct file *file, char __user *buf, size_t count,loff_t *ppos)
154{
f1a28c02
TG
155 struct mtd_file_info *mfi = file->private_data;
156 struct mtd_info *mtd = mfi->mtd;
1da177e4
LT
157 size_t retlen=0;
158 size_t total_retlen=0;
159 int ret=0;
160 int len;
161 char *kbuf;
97894cda 162
1da177e4
LT
163 DEBUG(MTD_DEBUG_LEVEL0,"MTD_read\n");
164
165 if (*ppos + count > mtd->size)
166 count = mtd->size - *ppos;
167
168 if (!count)
169 return 0;
97894cda 170
1da177e4
LT
171 /* FIXME: Use kiovec in 2.5 to lock down the user's buffers
172 and pass them directly to the MTD functions */
b802c074
TG
173
174 if (count > MAX_KMALLOC_SIZE)
175 kbuf=kmalloc(MAX_KMALLOC_SIZE, GFP_KERNEL);
176 else
177 kbuf=kmalloc(count, GFP_KERNEL);
178
179 if (!kbuf)
180 return -ENOMEM;
181
1da177e4 182 while (count) {
b802c074 183
97894cda 184 if (count > MAX_KMALLOC_SIZE)
1da177e4
LT
185 len = MAX_KMALLOC_SIZE;
186 else
187 len = count;
188
f1a28c02
TG
189 switch (mfi->mode) {
190 case MTD_MODE_OTP_FACTORY:
31f4233b
NP
191 ret = mtd->read_fact_prot_reg(mtd, *ppos, len, &retlen, kbuf);
192 break;
193 case MTD_MODE_OTP_USER:
194 ret = mtd->read_user_prot_reg(mtd, *ppos, len, &retlen, kbuf);
195 break;
f1a28c02
TG
196 case MTD_MODE_RAW:
197 {
198 struct mtd_oob_ops ops;
199
200 ops.mode = MTD_OOB_RAW;
201 ops.datbuf = kbuf;
202 ops.oobbuf = NULL;
203 ops.len = len;
204
205 ret = mtd->read_oob(mtd, *ppos, &ops);
206 retlen = ops.retlen;
207 break;
208 }
31f4233b 209 default:
f4a43cfc 210 ret = mtd->read(mtd, *ppos, len, &retlen, kbuf);
31f4233b 211 }
1da177e4
LT
212 /* Nand returns -EBADMSG on ecc errors, but it returns
213 * the data. For our userspace tools it is important
97894cda 214 * to dump areas with ecc errors !
9a1fcdfd
TG
215 * For kernel internal usage it also might return -EUCLEAN
216 * to signal the caller that a bitflip has occured and has
217 * been corrected by the ECC algorithm.
1da177e4
LT
218 * Userspace software which accesses NAND this way
219 * must be aware of the fact that it deals with NAND
220 */
9a1fcdfd 221 if (!ret || (ret == -EUCLEAN) || (ret == -EBADMSG)) {
1da177e4
LT
222 *ppos += retlen;
223 if (copy_to_user(buf, kbuf, retlen)) {
f4a43cfc 224 kfree(kbuf);
1da177e4
LT
225 return -EFAULT;
226 }
227 else
228 total_retlen += retlen;
229
230 count -= retlen;
231 buf += retlen;
31f4233b
NP
232 if (retlen == 0)
233 count = 0;
1da177e4
LT
234 }
235 else {
236 kfree(kbuf);
237 return ret;
238 }
97894cda 239
1da177e4
LT
240 }
241
b802c074 242 kfree(kbuf);
1da177e4
LT
243 return total_retlen;
244} /* mtd_read */
245
246static ssize_t mtd_write(struct file *file, const char __user *buf, size_t count,loff_t *ppos)
247{
f1a28c02
TG
248 struct mtd_file_info *mfi = file->private_data;
249 struct mtd_info *mtd = mfi->mtd;
1da177e4
LT
250 char *kbuf;
251 size_t retlen;
252 size_t total_retlen=0;
253 int ret=0;
254 int len;
255
256 DEBUG(MTD_DEBUG_LEVEL0,"MTD_write\n");
97894cda 257
1da177e4
LT
258 if (*ppos == mtd->size)
259 return -ENOSPC;
97894cda 260
1da177e4
LT
261 if (*ppos + count > mtd->size)
262 count = mtd->size - *ppos;
263
264 if (!count)
265 return 0;
266
b802c074
TG
267 if (count > MAX_KMALLOC_SIZE)
268 kbuf=kmalloc(MAX_KMALLOC_SIZE, GFP_KERNEL);
269 else
270 kbuf=kmalloc(count, GFP_KERNEL);
271
272 if (!kbuf)
273 return -ENOMEM;
274
1da177e4 275 while (count) {
b802c074 276
97894cda 277 if (count > MAX_KMALLOC_SIZE)
1da177e4
LT
278 len = MAX_KMALLOC_SIZE;
279 else
280 len = count;
281
1da177e4
LT
282 if (copy_from_user(kbuf, buf, len)) {
283 kfree(kbuf);
284 return -EFAULT;
285 }
97894cda 286
f1a28c02
TG
287 switch (mfi->mode) {
288 case MTD_MODE_OTP_FACTORY:
31f4233b
NP
289 ret = -EROFS;
290 break;
291 case MTD_MODE_OTP_USER:
292 if (!mtd->write_user_prot_reg) {
293 ret = -EOPNOTSUPP;
294 break;
295 }
296 ret = mtd->write_user_prot_reg(mtd, *ppos, len, &retlen, kbuf);
297 break;
f1a28c02
TG
298
299 case MTD_MODE_RAW:
300 {
301 struct mtd_oob_ops ops;
302
303 ops.mode = MTD_OOB_RAW;
304 ops.datbuf = kbuf;
305 ops.oobbuf = NULL;
306 ops.len = len;
307
308 ret = mtd->write_oob(mtd, *ppos, &ops);
309 retlen = ops.retlen;
310 break;
311 }
312
31f4233b
NP
313 default:
314 ret = (*(mtd->write))(mtd, *ppos, len, &retlen, kbuf);
315 }
1da177e4
LT
316 if (!ret) {
317 *ppos += retlen;
318 total_retlen += retlen;
319 count -= retlen;
320 buf += retlen;
321 }
322 else {
323 kfree(kbuf);
324 return ret;
325 }
1da177e4
LT
326 }
327
b802c074 328 kfree(kbuf);
1da177e4
LT
329 return total_retlen;
330} /* mtd_write */
331
332/*======================================================================
333
334 IOCTL calls for getting device parameters.
335
336======================================================================*/
337static void mtdchar_erase_callback (struct erase_info *instr)
338{
339 wake_up((wait_queue_head_t *)instr->priv);
340}
341
f1a28c02
TG
342#if defined(CONFIG_MTD_OTP) || defined(CONFIG_MTD_ONENAND_OTP)
343static int otp_select_filemode(struct mtd_file_info *mfi, int mode)
344{
345 struct mtd_info *mtd = mfi->mtd;
346 int ret = 0;
347
348 switch (mode) {
349 case MTD_OTP_FACTORY:
350 if (!mtd->read_fact_prot_reg)
351 ret = -EOPNOTSUPP;
352 else
353 mfi->mode = MTD_MODE_OTP_FACTORY;
354 break;
355 case MTD_OTP_USER:
356 if (!mtd->read_fact_prot_reg)
357 ret = -EOPNOTSUPP;
358 else
359 mfi->mode = MTD_MODE_OTP_USER;
360 break;
361 default:
362 ret = -EINVAL;
363 case MTD_OTP_OFF:
364 break;
365 }
366 return ret;
367}
368#else
369# define otp_select_filemode(f,m) -EOPNOTSUPP
370#endif
371
1da177e4
LT
372static int mtd_ioctl(struct inode *inode, struct file *file,
373 u_int cmd, u_long arg)
374{
f1a28c02
TG
375 struct mtd_file_info *mfi = file->private_data;
376 struct mtd_info *mtd = mfi->mtd;
1da177e4
LT
377 void __user *argp = (void __user *)arg;
378 int ret = 0;
379 u_long size;
73c619ea 380 struct mtd_info_user info;
97894cda 381
1da177e4
LT
382 DEBUG(MTD_DEBUG_LEVEL0, "MTD_ioctl\n");
383
384 size = (cmd & IOCSIZE_MASK) >> IOCSIZE_SHIFT;
385 if (cmd & IOC_IN) {
386 if (!access_ok(VERIFY_READ, argp, size))
387 return -EFAULT;
388 }
389 if (cmd & IOC_OUT) {
390 if (!access_ok(VERIFY_WRITE, argp, size))
391 return -EFAULT;
392 }
97894cda 393
1da177e4
LT
394 switch (cmd) {
395 case MEMGETREGIONCOUNT:
396 if (copy_to_user(argp, &(mtd->numeraseregions), sizeof(int)))
397 return -EFAULT;
398 break;
399
400 case MEMGETREGIONINFO:
401 {
402 struct region_info_user ur;
403
404 if (copy_from_user(&ur, argp, sizeof(struct region_info_user)))
405 return -EFAULT;
406
407 if (ur.regionindex >= mtd->numeraseregions)
408 return -EINVAL;
409 if (copy_to_user(argp, &(mtd->eraseregions[ur.regionindex]),
410 sizeof(struct mtd_erase_region_info)))
411 return -EFAULT;
412 break;
413 }
414
415 case MEMGETINFO:
73c619ea
JE
416 info.type = mtd->type;
417 info.flags = mtd->flags;
418 info.size = mtd->size;
419 info.erasesize = mtd->erasesize;
420 info.writesize = mtd->writesize;
421 info.oobsize = mtd->oobsize;
422 info.ecctype = mtd->ecctype;
423 info.eccsize = mtd->eccsize;
424 if (copy_to_user(argp, &info, sizeof(struct mtd_info_user)))
1da177e4
LT
425 return -EFAULT;
426 break;
427
428 case MEMERASE:
429 {
430 struct erase_info *erase;
431
432 if(!(file->f_mode & 2))
433 return -EPERM;
434
95b93a0c 435 erase=kzalloc(sizeof(struct erase_info),GFP_KERNEL);
1da177e4
LT
436 if (!erase)
437 ret = -ENOMEM;
438 else {
439 wait_queue_head_t waitq;
440 DECLARE_WAITQUEUE(wait, current);
441
442 init_waitqueue_head(&waitq);
443
1da177e4
LT
444 if (copy_from_user(&erase->addr, argp,
445 sizeof(struct erase_info_user))) {
446 kfree(erase);
447 return -EFAULT;
448 }
449 erase->mtd = mtd;
450 erase->callback = mtdchar_erase_callback;
451 erase->priv = (unsigned long)&waitq;
97894cda 452
1da177e4
LT
453 /*
454 FIXME: Allow INTERRUPTIBLE. Which means
455 not having the wait_queue head on the stack.
97894cda 456
1da177e4
LT
457 If the wq_head is on the stack, and we
458 leave because we got interrupted, then the
459 wq_head is no longer there when the
460 callback routine tries to wake us up.
461 */
462 ret = mtd->erase(mtd, erase);
463 if (!ret) {
464 set_current_state(TASK_UNINTERRUPTIBLE);
465 add_wait_queue(&waitq, &wait);
466 if (erase->state != MTD_ERASE_DONE &&
467 erase->state != MTD_ERASE_FAILED)
468 schedule();
469 remove_wait_queue(&waitq, &wait);
470 set_current_state(TASK_RUNNING);
471
472 ret = (erase->state == MTD_ERASE_FAILED)?-EIO:0;
473 }
474 kfree(erase);
475 }
476 break;
477 }
478
479 case MEMWRITEOOB:
480 {
481 struct mtd_oob_buf buf;
8593fbc6 482 struct mtd_oob_ops ops;
97894cda 483
1da177e4
LT
484 if(!(file->f_mode & 2))
485 return -EPERM;
486
487 if (copy_from_user(&buf, argp, sizeof(struct mtd_oob_buf)))
488 return -EFAULT;
97894cda 489
8593fbc6 490 if (buf.length > 4096)
1da177e4
LT
491 return -EINVAL;
492
493 if (!mtd->write_oob)
494 ret = -EOPNOTSUPP;
495 else
496 ret = access_ok(VERIFY_READ, buf.ptr,
497 buf.length) ? 0 : EFAULT;
498
499 if (ret)
500 return ret;
501
7bc3312b 502 ops.ooblen = buf.length;
8593fbc6
TG
503 ops.ooboffs = buf.start & (mtd->oobsize - 1);
504 ops.datbuf = NULL;
505 ops.mode = MTD_OOB_PLACE;
506
7014568b 507 if (ops.ooboffs && ops.ooblen > (mtd->oobsize - ops.ooboffs))
8593fbc6
TG
508 return -EINVAL;
509
510 ops.oobbuf = kmalloc(buf.length, GFP_KERNEL);
511 if (!ops.oobbuf)
1da177e4 512 return -ENOMEM;
97894cda 513
8593fbc6
TG
514 if (copy_from_user(ops.oobbuf, buf.ptr, buf.length)) {
515 kfree(ops.oobbuf);
1da177e4
LT
516 return -EFAULT;
517 }
518
8593fbc6
TG
519 buf.start &= ~(mtd->oobsize - 1);
520 ret = mtd->write_oob(mtd, buf.start, &ops);
1da177e4 521
7014568b 522 if (copy_to_user(argp + sizeof(uint32_t), &ops.oobretlen,
8593fbc6 523 sizeof(uint32_t)))
1da177e4
LT
524 ret = -EFAULT;
525
8593fbc6 526 kfree(ops.oobbuf);
1da177e4
LT
527 break;
528
529 }
530
531 case MEMREADOOB:
532 {
533 struct mtd_oob_buf buf;
8593fbc6 534 struct mtd_oob_ops ops;
1da177e4
LT
535
536 if (copy_from_user(&buf, argp, sizeof(struct mtd_oob_buf)))
537 return -EFAULT;
97894cda 538
8593fbc6 539 if (buf.length > 4096)
1da177e4
LT
540 return -EINVAL;
541
542 if (!mtd->read_oob)
543 ret = -EOPNOTSUPP;
544 else
545 ret = access_ok(VERIFY_WRITE, buf.ptr,
546 buf.length) ? 0 : -EFAULT;
1da177e4
LT
547 if (ret)
548 return ret;
549
7bc3312b 550 ops.ooblen = buf.length;
8593fbc6
TG
551 ops.ooboffs = buf.start & (mtd->oobsize - 1);
552 ops.datbuf = NULL;
553 ops.mode = MTD_OOB_PLACE;
554
7bc3312b 555 if (ops.ooboffs && ops.len > (mtd->oobsize - ops.ooboffs))
8593fbc6
TG
556 return -EINVAL;
557
558 ops.oobbuf = kmalloc(buf.length, GFP_KERNEL);
559 if (!ops.oobbuf)
1da177e4 560 return -ENOMEM;
97894cda 561
8593fbc6
TG
562 buf.start &= ~(mtd->oobsize - 1);
563 ret = mtd->read_oob(mtd, buf.start, &ops);
1da177e4 564
7014568b 565 if (put_user(ops.oobretlen, (uint32_t __user *)argp))
1da177e4 566 ret = -EFAULT;
7014568b
VW
567 else if (ops.oobretlen && copy_to_user(buf.ptr, ops.oobbuf,
568 ops.oobretlen))
1da177e4 569 ret = -EFAULT;
97894cda 570
8593fbc6 571 kfree(ops.oobbuf);
1da177e4
LT
572 break;
573 }
574
575 case MEMLOCK:
576 {
577 struct erase_info_user info;
578
579 if (copy_from_user(&info, argp, sizeof(info)))
580 return -EFAULT;
581
582 if (!mtd->lock)
583 ret = -EOPNOTSUPP;
584 else
585 ret = mtd->lock(mtd, info.start, info.length);
586 break;
587 }
588
589 case MEMUNLOCK:
590 {
591 struct erase_info_user info;
592
593 if (copy_from_user(&info, argp, sizeof(info)))
594 return -EFAULT;
595
596 if (!mtd->unlock)
597 ret = -EOPNOTSUPP;
598 else
599 ret = mtd->unlock(mtd, info.start, info.length);
600 break;
601 }
602
5bd34c09 603 /* Legacy interface */
1da177e4
LT
604 case MEMGETOOBSEL:
605 {
5bd34c09
TG
606 struct nand_oobinfo oi;
607
608 if (!mtd->ecclayout)
609 return -EOPNOTSUPP;
610 if (mtd->ecclayout->eccbytes > ARRAY_SIZE(oi.eccpos))
611 return -EINVAL;
612
613 oi.useecc = MTD_NANDECC_AUTOPLACE;
614 memcpy(&oi.eccpos, mtd->ecclayout->eccpos, sizeof(oi.eccpos));
615 memcpy(&oi.oobfree, mtd->ecclayout->oobfree,
616 sizeof(oi.oobfree));
d25ade71 617 oi.eccbytes = mtd->ecclayout->eccbytes;
5bd34c09
TG
618
619 if (copy_to_user(argp, &oi, sizeof(struct nand_oobinfo)))
1da177e4
LT
620 return -EFAULT;
621 break;
622 }
623
624 case MEMGETBADBLOCK:
625 {
626 loff_t offs;
97894cda 627
1da177e4
LT
628 if (copy_from_user(&offs, argp, sizeof(loff_t)))
629 return -EFAULT;
630 if (!mtd->block_isbad)
631 ret = -EOPNOTSUPP;
632 else
633 return mtd->block_isbad(mtd, offs);
634 break;
635 }
636
637 case MEMSETBADBLOCK:
638 {
639 loff_t offs;
640
641 if (copy_from_user(&offs, argp, sizeof(loff_t)))
642 return -EFAULT;
643 if (!mtd->block_markbad)
644 ret = -EOPNOTSUPP;
645 else
646 return mtd->block_markbad(mtd, offs);
647 break;
648 }
649
493c6460 650#if defined(CONFIG_MTD_OTP) || defined(CONFIG_MTD_ONENAND_OTP)
31f4233b
NP
651 case OTPSELECT:
652 {
653 int mode;
654 if (copy_from_user(&mode, argp, sizeof(int)))
655 return -EFAULT;
f1a28c02
TG
656
657 mfi->mode = MTD_MODE_NORMAL;
658
659 ret = otp_select_filemode(mfi, mode);
660
81dba488 661 file->f_pos = 0;
31f4233b
NP
662 break;
663 }
664
665 case OTPGETREGIONCOUNT:
666 case OTPGETREGIONINFO:
667 {
668 struct otp_info *buf = kmalloc(4096, GFP_KERNEL);
669 if (!buf)
670 return -ENOMEM;
671 ret = -EOPNOTSUPP;
f1a28c02
TG
672 switch (mfi->mode) {
673 case MTD_MODE_OTP_FACTORY:
31f4233b
NP
674 if (mtd->get_fact_prot_info)
675 ret = mtd->get_fact_prot_info(mtd, buf, 4096);
676 break;
677 case MTD_MODE_OTP_USER:
678 if (mtd->get_user_prot_info)
679 ret = mtd->get_user_prot_info(mtd, buf, 4096);
680 break;
f1a28c02
TG
681 default:
682 break;
31f4233b
NP
683 }
684 if (ret >= 0) {
685 if (cmd == OTPGETREGIONCOUNT) {
686 int nbr = ret / sizeof(struct otp_info);
687 ret = copy_to_user(argp, &nbr, sizeof(int));
688 } else
689 ret = copy_to_user(argp, buf, ret);
690 if (ret)
691 ret = -EFAULT;
692 }
693 kfree(buf);
694 break;
695 }
696
697 case OTPLOCK:
698 {
699 struct otp_info info;
700
f1a28c02 701 if (mfi->mode != MTD_MODE_OTP_USER)
31f4233b
NP
702 return -EINVAL;
703 if (copy_from_user(&info, argp, sizeof(info)))
704 return -EFAULT;
705 if (!mtd->lock_user_prot_reg)
706 return -EOPNOTSUPP;
707 ret = mtd->lock_user_prot_reg(mtd, info.start, info.length);
708 break;
709 }
710#endif
711
f1a28c02
TG
712 case ECCGETLAYOUT:
713 {
714 if (!mtd->ecclayout)
715 return -EOPNOTSUPP;
716
d25ade71 717 if (copy_to_user(argp, mtd->ecclayout,
f1a28c02
TG
718 sizeof(struct nand_ecclayout)))
719 return -EFAULT;
720 break;
721 }
722
723 case ECCGETSTATS:
724 {
725 if (copy_to_user(argp, &mtd->ecc_stats,
726 sizeof(struct mtd_ecc_stats)))
727 return -EFAULT;
728 break;
729 }
730
731 case MTDFILEMODE:
732 {
733 mfi->mode = 0;
734
735 switch(arg) {
736 case MTD_MODE_OTP_FACTORY:
737 case MTD_MODE_OTP_USER:
738 ret = otp_select_filemode(mfi, arg);
739 break;
740
741 case MTD_MODE_RAW:
742 if (!mtd->read_oob || !mtd->write_oob)
743 return -EOPNOTSUPP;
744 mfi->mode = arg;
745
746 case MTD_MODE_NORMAL:
747 break;
748 default:
749 ret = -EINVAL;
750 }
751 file->f_pos = 0;
752 break;
753 }
754
1da177e4
LT
755 default:
756 ret = -ENOTTY;
757 }
758
759 return ret;
760} /* memory_ioctl */
761
d54b1fdb 762static const struct file_operations mtd_fops = {
1da177e4
LT
763 .owner = THIS_MODULE,
764 .llseek = mtd_lseek,
765 .read = mtd_read,
766 .write = mtd_write,
767 .ioctl = mtd_ioctl,
768 .open = mtd_open,
769 .release = mtd_close,
770};
771
772static int __init init_mtdchar(void)
773{
774 if (register_chrdev(MTD_CHAR_MAJOR, "mtd", &mtd_fops)) {
775 printk(KERN_NOTICE "Can't allocate major number %d for Memory Technology Devices.\n",
776 MTD_CHAR_MAJOR);
777 return -EAGAIN;
778 }
779
9bc7b387
TP
780 mtd_class = class_create(THIS_MODULE, "mtd");
781
782 if (IS_ERR(mtd_class)) {
783 printk(KERN_ERR "Error creating mtd class.\n");
784 unregister_chrdev(MTD_CHAR_MAJOR, "mtd");
3a7a8824 785 return PTR_ERR(mtd_class);
9bc7b387
TP
786 }
787
788 register_mtd_user(&notifier);
1da177e4
LT
789 return 0;
790}
791
792static void __exit cleanup_mtdchar(void)
793{
9bc7b387
TP
794 unregister_mtd_user(&notifier);
795 class_destroy(mtd_class);
1da177e4
LT
796 unregister_chrdev(MTD_CHAR_MAJOR, "mtd");
797}
798
799module_init(init_mtdchar);
800module_exit(cleanup_mtdchar);
801
802
803MODULE_LICENSE("GPL");
804MODULE_AUTHOR("David Woodhouse <dwmw2@infradead.org>");
805MODULE_DESCRIPTION("Direct character-device access to MTD devices");
This page took 0.176229 seconds and 5 git commands to generate.