Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * linux/drivers/char/mem.c | |
3 | * | |
4 | * Copyright (C) 1991, 1992 Linus Torvalds | |
5 | * | |
d7d4d849 | 6 | * Added devfs support. |
1da177e4 | 7 | * Jan-11-1998, C. Scott Ananian <cananian@alumni.princeton.edu> |
af901ca1 | 8 | * Shared /dev/zero mmapping support, Feb 2000, Kanoj Sarcar <kanoj@sgi.com> |
1da177e4 LT |
9 | */ |
10 | ||
1da177e4 LT |
11 | #include <linux/mm.h> |
12 | #include <linux/miscdevice.h> | |
13 | #include <linux/slab.h> | |
14 | #include <linux/vmalloc.h> | |
15 | #include <linux/mman.h> | |
16 | #include <linux/random.h> | |
17 | #include <linux/init.h> | |
18 | #include <linux/raw.h> | |
19 | #include <linux/tty.h> | |
20 | #include <linux/capability.h> | |
1da177e4 LT |
21 | #include <linux/ptrace.h> |
22 | #include <linux/device.h> | |
50b1fdbd | 23 | #include <linux/highmem.h> |
1da177e4 | 24 | #include <linux/backing-dev.h> |
d6b29d7c | 25 | #include <linux/splice.h> |
b8a3ad5b | 26 | #include <linux/pfn.h> |
66300e66 | 27 | #include <linux/export.h> |
e1612de9 | 28 | #include <linux/io.h> |
a27bb332 | 29 | #include <linux/aio.h> |
1da177e4 LT |
30 | |
31 | #include <asm/uaccess.h> | |
1da177e4 LT |
32 | |
33 | #ifdef CONFIG_IA64 | |
34 | # include <linux/efi.h> | |
35 | #endif | |
36 | ||
e1612de9 HM |
37 | #define DEVPORT_MINOR 4 |
38 | ||
f222318e WF |
39 | static inline unsigned long size_inside_page(unsigned long start, |
40 | unsigned long size) | |
41 | { | |
42 | unsigned long sz; | |
43 | ||
7fabaddd | 44 | sz = PAGE_SIZE - (start & (PAGE_SIZE - 1)); |
f222318e | 45 | |
7fabaddd | 46 | return min(sz, size); |
f222318e WF |
47 | } |
48 | ||
1da177e4 | 49 | #ifndef ARCH_HAS_VALID_PHYS_ADDR_RANGE |
7e6735c3 | 50 | static inline int valid_phys_addr_range(phys_addr_t addr, size_t count) |
1da177e4 | 51 | { |
cfaf346c | 52 | return addr + count <= __pa(high_memory); |
1da177e4 | 53 | } |
80851ef2 | 54 | |
06c67bef | 55 | static inline int valid_mmap_phys_addr_range(unsigned long pfn, size_t size) |
80851ef2 BH |
56 | { |
57 | return 1; | |
58 | } | |
1da177e4 LT |
59 | #endif |
60 | ||
d092633b | 61 | #ifdef CONFIG_STRICT_DEVMEM |
e2beb3ea | 62 | static inline int range_is_allowed(unsigned long pfn, unsigned long size) |
ae531c26 | 63 | { |
e2beb3ea VP |
64 | u64 from = ((u64)pfn) << PAGE_SHIFT; |
65 | u64 to = from + size; | |
66 | u64 cursor = from; | |
67 | ||
68 | while (cursor < to) { | |
69 | if (!devmem_is_allowed(pfn)) { | |
70 | printk(KERN_INFO | |
71 | "Program %s tried to access /dev/mem between %Lx->%Lx.\n", | |
ae531c26 AV |
72 | current->comm, from, to); |
73 | return 0; | |
74 | } | |
e2beb3ea VP |
75 | cursor += PAGE_SIZE; |
76 | pfn++; | |
ae531c26 AV |
77 | } |
78 | return 1; | |
79 | } | |
80 | #else | |
e2beb3ea | 81 | static inline int range_is_allowed(unsigned long pfn, unsigned long size) |
ae531c26 AV |
82 | { |
83 | return 1; | |
84 | } | |
85 | #endif | |
86 | ||
d7d4d849 | 87 | void __weak unxlate_dev_mem_ptr(unsigned long phys, void *addr) |
e045fb2a | 88 | { |
89 | } | |
90 | ||
1da177e4 | 91 | /* |
d7d4d849 AM |
92 | * This funcion reads the *physical* memory. The f_pos points directly to the |
93 | * memory location. | |
1da177e4 | 94 | */ |
d7d4d849 | 95 | static ssize_t read_mem(struct file *file, char __user *buf, |
1da177e4 LT |
96 | size_t count, loff_t *ppos) |
97 | { | |
7e6735c3 | 98 | phys_addr_t p = *ppos; |
1da177e4 LT |
99 | ssize_t read, sz; |
100 | char *ptr; | |
101 | ||
08d2d00b PT |
102 | if (p != *ppos) |
103 | return 0; | |
104 | ||
136939a2 | 105 | if (!valid_phys_addr_range(p, count)) |
1da177e4 LT |
106 | return -EFAULT; |
107 | read = 0; | |
108 | #ifdef __ARCH_HAS_NO_PAGE_ZERO_MAPPED | |
109 | /* we don't have page 0 mapped on sparc and m68k.. */ | |
110 | if (p < PAGE_SIZE) { | |
7fabaddd | 111 | sz = size_inside_page(p, count); |
1da177e4 LT |
112 | if (sz > 0) { |
113 | if (clear_user(buf, sz)) | |
114 | return -EFAULT; | |
d7d4d849 AM |
115 | buf += sz; |
116 | p += sz; | |
117 | count -= sz; | |
118 | read += sz; | |
1da177e4 LT |
119 | } |
120 | } | |
121 | #endif | |
122 | ||
123 | while (count > 0) { | |
fa29e97b WF |
124 | unsigned long remaining; |
125 | ||
f222318e | 126 | sz = size_inside_page(p, count); |
1da177e4 | 127 | |
e045fb2a | 128 | if (!range_is_allowed(p >> PAGE_SHIFT, count)) |
129 | return -EPERM; | |
130 | ||
1da177e4 | 131 | /* |
d7d4d849 AM |
132 | * On ia64 if a page has been mapped somewhere as uncached, then |
133 | * it must also be accessed uncached by the kernel or data | |
134 | * corruption may occur. | |
1da177e4 LT |
135 | */ |
136 | ptr = xlate_dev_mem_ptr(p); | |
e045fb2a | 137 | if (!ptr) |
138 | return -EFAULT; | |
1da177e4 | 139 | |
fa29e97b | 140 | remaining = copy_to_user(buf, ptr, sz); |
e045fb2a | 141 | unxlate_dev_mem_ptr(p, ptr); |
fa29e97b WF |
142 | if (remaining) |
143 | return -EFAULT; | |
e045fb2a | 144 | |
1da177e4 LT |
145 | buf += sz; |
146 | p += sz; | |
147 | count -= sz; | |
148 | read += sz; | |
149 | } | |
150 | ||
151 | *ppos += read; | |
152 | return read; | |
153 | } | |
154 | ||
d7d4d849 | 155 | static ssize_t write_mem(struct file *file, const char __user *buf, |
1da177e4 LT |
156 | size_t count, loff_t *ppos) |
157 | { | |
7e6735c3 | 158 | phys_addr_t p = *ppos; |
1da177e4 LT |
159 | ssize_t written, sz; |
160 | unsigned long copied; | |
161 | void *ptr; | |
162 | ||
08d2d00b PT |
163 | if (p != *ppos) |
164 | return -EFBIG; | |
165 | ||
136939a2 | 166 | if (!valid_phys_addr_range(p, count)) |
1da177e4 LT |
167 | return -EFAULT; |
168 | ||
169 | written = 0; | |
170 | ||
171 | #ifdef __ARCH_HAS_NO_PAGE_ZERO_MAPPED | |
172 | /* we don't have page 0 mapped on sparc and m68k.. */ | |
173 | if (p < PAGE_SIZE) { | |
7fabaddd | 174 | sz = size_inside_page(p, count); |
1da177e4 LT |
175 | /* Hmm. Do something? */ |
176 | buf += sz; | |
177 | p += sz; | |
178 | count -= sz; | |
179 | written += sz; | |
180 | } | |
181 | #endif | |
182 | ||
183 | while (count > 0) { | |
f222318e | 184 | sz = size_inside_page(p, count); |
1da177e4 | 185 | |
e045fb2a | 186 | if (!range_is_allowed(p >> PAGE_SHIFT, sz)) |
187 | return -EPERM; | |
188 | ||
1da177e4 | 189 | /* |
d7d4d849 AM |
190 | * On ia64 if a page has been mapped somewhere as uncached, then |
191 | * it must also be accessed uncached by the kernel or data | |
192 | * corruption may occur. | |
1da177e4 LT |
193 | */ |
194 | ptr = xlate_dev_mem_ptr(p); | |
e045fb2a | 195 | if (!ptr) { |
196 | if (written) | |
197 | break; | |
198 | return -EFAULT; | |
199 | } | |
1da177e4 LT |
200 | |
201 | copied = copy_from_user(ptr, buf, sz); | |
fa29e97b | 202 | unxlate_dev_mem_ptr(p, ptr); |
1da177e4 | 203 | if (copied) { |
c654d60e JB |
204 | written += sz - copied; |
205 | if (written) | |
206 | break; | |
1da177e4 LT |
207 | return -EFAULT; |
208 | } | |
e045fb2a | 209 | |
1da177e4 LT |
210 | buf += sz; |
211 | p += sz; | |
212 | count -= sz; | |
213 | written += sz; | |
214 | } | |
215 | ||
216 | *ppos += written; | |
217 | return written; | |
218 | } | |
219 | ||
d7d4d849 | 220 | int __weak phys_mem_access_prot_allowed(struct file *file, |
f0970c13 | 221 | unsigned long pfn, unsigned long size, pgprot_t *vma_prot) |
222 | { | |
223 | return 1; | |
224 | } | |
225 | ||
44ac8413 | 226 | #ifndef __HAVE_PHYS_MEM_ACCESS_PROT |
d7d4d849 AM |
227 | |
228 | /* | |
229 | * Architectures vary in how they handle caching for addresses | |
230 | * outside of main memory. | |
231 | * | |
232 | */ | |
ea56f411 | 233 | #ifdef pgprot_noncached |
7e6735c3 | 234 | static int uncached_access(struct file *file, phys_addr_t addr) |
d7d4d849 AM |
235 | { |
236 | #if defined(CONFIG_IA64) | |
237 | /* | |
238 | * On ia64, we ignore O_DSYNC because we cannot tolerate memory | |
239 | * attribute aliases. | |
240 | */ | |
241 | return !(efi_mem_attributes(addr) & EFI_MEMORY_WB); | |
242 | #elif defined(CONFIG_MIPS) | |
243 | { | |
244 | extern int __uncached_access(struct file *file, | |
245 | unsigned long addr); | |
246 | ||
247 | return __uncached_access(file, addr); | |
248 | } | |
249 | #else | |
250 | /* | |
251 | * Accessing memory above the top the kernel knows about or through a | |
252 | * file pointer | |
253 | * that was marked O_DSYNC will be done non-cached. | |
254 | */ | |
255 | if (file->f_flags & O_DSYNC) | |
256 | return 1; | |
257 | return addr >= __pa(high_memory); | |
258 | #endif | |
259 | } | |
ea56f411 | 260 | #endif |
d7d4d849 | 261 | |
44ac8413 BH |
262 | static pgprot_t phys_mem_access_prot(struct file *file, unsigned long pfn, |
263 | unsigned long size, pgprot_t vma_prot) | |
264 | { | |
265 | #ifdef pgprot_noncached | |
7e6735c3 | 266 | phys_addr_t offset = pfn << PAGE_SHIFT; |
44ac8413 BH |
267 | |
268 | if (uncached_access(file, offset)) | |
269 | return pgprot_noncached(vma_prot); | |
270 | #endif | |
271 | return vma_prot; | |
272 | } | |
273 | #endif | |
274 | ||
5da6185b DH |
275 | #ifndef CONFIG_MMU |
276 | static unsigned long get_unmapped_area_mem(struct file *file, | |
277 | unsigned long addr, | |
278 | unsigned long len, | |
279 | unsigned long pgoff, | |
280 | unsigned long flags) | |
281 | { | |
282 | if (!valid_mmap_phys_addr_range(pgoff, len)) | |
283 | return (unsigned long) -EINVAL; | |
8a93258c | 284 | return pgoff << PAGE_SHIFT; |
5da6185b DH |
285 | } |
286 | ||
287 | /* can't do an in-place private mapping if there's no MMU */ | |
288 | static inline int private_mapping_ok(struct vm_area_struct *vma) | |
289 | { | |
290 | return vma->vm_flags & VM_MAYSHARE; | |
291 | } | |
292 | #else | |
293 | #define get_unmapped_area_mem NULL | |
294 | ||
295 | static inline int private_mapping_ok(struct vm_area_struct *vma) | |
296 | { | |
297 | return 1; | |
298 | } | |
299 | #endif | |
300 | ||
f0f37e2f | 301 | static const struct vm_operations_struct mmap_mem_ops = { |
7ae8ed50 RR |
302 | #ifdef CONFIG_HAVE_IOREMAP_PROT |
303 | .access = generic_access_phys | |
304 | #endif | |
e7f260a2 | 305 | }; |
306 | ||
d7d4d849 | 307 | static int mmap_mem(struct file *file, struct vm_area_struct *vma) |
1da177e4 | 308 | { |
80851ef2 BH |
309 | size_t size = vma->vm_end - vma->vm_start; |
310 | ||
06c67bef | 311 | if (!valid_mmap_phys_addr_range(vma->vm_pgoff, size)) |
80851ef2 BH |
312 | return -EINVAL; |
313 | ||
5da6185b DH |
314 | if (!private_mapping_ok(vma)) |
315 | return -ENOSYS; | |
316 | ||
e2beb3ea VP |
317 | if (!range_is_allowed(vma->vm_pgoff, size)) |
318 | return -EPERM; | |
319 | ||
f0970c13 | 320 | if (!phys_mem_access_prot_allowed(file, vma->vm_pgoff, size, |
321 | &vma->vm_page_prot)) | |
322 | return -EINVAL; | |
323 | ||
8b150478 | 324 | vma->vm_page_prot = phys_mem_access_prot(file, vma->vm_pgoff, |
80851ef2 | 325 | size, |
1da177e4 | 326 | vma->vm_page_prot); |
1da177e4 | 327 | |
e7f260a2 | 328 | vma->vm_ops = &mmap_mem_ops; |
329 | ||
314e51b9 | 330 | /* Remap-pfn-range will mark the range VM_IO */ |
1da177e4 LT |
331 | if (remap_pfn_range(vma, |
332 | vma->vm_start, | |
333 | vma->vm_pgoff, | |
80851ef2 | 334 | size, |
e7f260a2 | 335 | vma->vm_page_prot)) { |
1da177e4 | 336 | return -EAGAIN; |
e7f260a2 | 337 | } |
1da177e4 LT |
338 | return 0; |
339 | } | |
340 | ||
b781ecb6 | 341 | #ifdef CONFIG_DEVKMEM |
d7d4d849 | 342 | static int mmap_kmem(struct file *file, struct vm_area_struct *vma) |
1da177e4 | 343 | { |
4bb82551 LT |
344 | unsigned long pfn; |
345 | ||
6d3154cc LT |
346 | /* Turn a kernel-virtual address into a physical page frame */ |
347 | pfn = __pa((u64)vma->vm_pgoff << PAGE_SHIFT) >> PAGE_SHIFT; | |
4bb82551 | 348 | |
1da177e4 | 349 | /* |
d7d4d849 AM |
350 | * RED-PEN: on some architectures there is more mapped memory than |
351 | * available in mem_map which pfn_valid checks for. Perhaps should add a | |
352 | * new macro here. | |
1da177e4 LT |
353 | * |
354 | * RED-PEN: vmalloc is not supported right now. | |
355 | */ | |
4bb82551 | 356 | if (!pfn_valid(pfn)) |
1da177e4 | 357 | return -EIO; |
4bb82551 LT |
358 | |
359 | vma->vm_pgoff = pfn; | |
1da177e4 LT |
360 | return mmap_mem(file, vma); |
361 | } | |
b781ecb6 | 362 | #endif |
1da177e4 | 363 | |
b781ecb6 | 364 | #ifdef CONFIG_DEVKMEM |
1da177e4 LT |
365 | /* |
366 | * This function reads the *virtual* memory as seen by the kernel. | |
367 | */ | |
d7d4d849 | 368 | static ssize_t read_kmem(struct file *file, char __user *buf, |
1da177e4 LT |
369 | size_t count, loff_t *ppos) |
370 | { | |
371 | unsigned long p = *ppos; | |
372 | ssize_t low_count, read, sz; | |
890537b3 | 373 | char *kbuf; /* k-addr because vread() takes vmlist_lock rwlock */ |
325fda71 | 374 | int err = 0; |
1da177e4 LT |
375 | |
376 | read = 0; | |
377 | if (p < (unsigned long) high_memory) { | |
378 | low_count = count; | |
d7d4d849 AM |
379 | if (count > (unsigned long)high_memory - p) |
380 | low_count = (unsigned long)high_memory - p; | |
1da177e4 LT |
381 | |
382 | #ifdef __ARCH_HAS_NO_PAGE_ZERO_MAPPED | |
383 | /* we don't have page 0 mapped on sparc and m68k.. */ | |
384 | if (p < PAGE_SIZE && low_count > 0) { | |
7fabaddd WF |
385 | sz = size_inside_page(p, low_count); |
386 | if (clear_user(buf, sz)) | |
1da177e4 | 387 | return -EFAULT; |
7fabaddd WF |
388 | buf += sz; |
389 | p += sz; | |
390 | read += sz; | |
391 | low_count -= sz; | |
392 | count -= sz; | |
1da177e4 LT |
393 | } |
394 | #endif | |
395 | while (low_count > 0) { | |
f222318e | 396 | sz = size_inside_page(p, low_count); |
1da177e4 LT |
397 | |
398 | /* | |
399 | * On ia64 if a page has been mapped somewhere as | |
400 | * uncached, then it must also be accessed uncached | |
401 | * by the kernel or data corruption may occur | |
402 | */ | |
403 | kbuf = xlate_dev_kmem_ptr((char *)p); | |
404 | ||
405 | if (copy_to_user(buf, kbuf, sz)) | |
406 | return -EFAULT; | |
407 | buf += sz; | |
408 | p += sz; | |
409 | read += sz; | |
410 | low_count -= sz; | |
411 | count -= sz; | |
412 | } | |
413 | } | |
414 | ||
415 | if (count > 0) { | |
416 | kbuf = (char *)__get_free_page(GFP_KERNEL); | |
417 | if (!kbuf) | |
418 | return -ENOMEM; | |
419 | while (count > 0) { | |
80ad89a0 | 420 | sz = size_inside_page(p, count); |
325fda71 KH |
421 | if (!is_vmalloc_or_module_addr((void *)p)) { |
422 | err = -ENXIO; | |
423 | break; | |
424 | } | |
80ad89a0 WF |
425 | sz = vread(kbuf, (char *)p, sz); |
426 | if (!sz) | |
1da177e4 | 427 | break; |
80ad89a0 | 428 | if (copy_to_user(buf, kbuf, sz)) { |
325fda71 KH |
429 | err = -EFAULT; |
430 | break; | |
1da177e4 | 431 | } |
80ad89a0 WF |
432 | count -= sz; |
433 | buf += sz; | |
434 | read += sz; | |
435 | p += sz; | |
1da177e4 LT |
436 | } |
437 | free_page((unsigned long)kbuf); | |
438 | } | |
325fda71 KH |
439 | *ppos = p; |
440 | return read ? read : err; | |
1da177e4 LT |
441 | } |
442 | ||
443 | ||
d7d4d849 AM |
444 | static ssize_t do_write_kmem(unsigned long p, const char __user *buf, |
445 | size_t count, loff_t *ppos) | |
1da177e4 LT |
446 | { |
447 | ssize_t written, sz; | |
448 | unsigned long copied; | |
449 | ||
450 | written = 0; | |
451 | #ifdef __ARCH_HAS_NO_PAGE_ZERO_MAPPED | |
452 | /* we don't have page 0 mapped on sparc and m68k.. */ | |
ee32398f WF |
453 | if (p < PAGE_SIZE) { |
454 | sz = size_inside_page(p, count); | |
1da177e4 LT |
455 | /* Hmm. Do something? */ |
456 | buf += sz; | |
457 | p += sz; | |
1da177e4 LT |
458 | count -= sz; |
459 | written += sz; | |
460 | } | |
461 | #endif | |
462 | ||
463 | while (count > 0) { | |
464 | char *ptr; | |
1da177e4 | 465 | |
ee32398f | 466 | sz = size_inside_page(p, count); |
1da177e4 LT |
467 | |
468 | /* | |
d7d4d849 AM |
469 | * On ia64 if a page has been mapped somewhere as uncached, then |
470 | * it must also be accessed uncached by the kernel or data | |
471 | * corruption may occur. | |
1da177e4 | 472 | */ |
ee32398f | 473 | ptr = xlate_dev_kmem_ptr((char *)p); |
1da177e4 LT |
474 | |
475 | copied = copy_from_user(ptr, buf, sz); | |
476 | if (copied) { | |
c654d60e JB |
477 | written += sz - copied; |
478 | if (written) | |
479 | break; | |
1da177e4 LT |
480 | return -EFAULT; |
481 | } | |
482 | buf += sz; | |
483 | p += sz; | |
1da177e4 LT |
484 | count -= sz; |
485 | written += sz; | |
486 | } | |
487 | ||
488 | *ppos += written; | |
489 | return written; | |
490 | } | |
491 | ||
1da177e4 LT |
492 | /* |
493 | * This function writes to the *virtual* memory as seen by the kernel. | |
494 | */ | |
d7d4d849 | 495 | static ssize_t write_kmem(struct file *file, const char __user *buf, |
1da177e4 LT |
496 | size_t count, loff_t *ppos) |
497 | { | |
498 | unsigned long p = *ppos; | |
499 | ssize_t wrote = 0; | |
500 | ssize_t virtr = 0; | |
890537b3 | 501 | char *kbuf; /* k-addr because vwrite() takes vmlist_lock rwlock */ |
325fda71 | 502 | int err = 0; |
1da177e4 LT |
503 | |
504 | if (p < (unsigned long) high_memory) { | |
80ad89a0 WF |
505 | unsigned long to_write = min_t(unsigned long, count, |
506 | (unsigned long)high_memory - p); | |
ee32398f | 507 | wrote = do_write_kmem(p, buf, to_write, ppos); |
80ad89a0 WF |
508 | if (wrote != to_write) |
509 | return wrote; | |
1da177e4 LT |
510 | p += wrote; |
511 | buf += wrote; | |
512 | count -= wrote; | |
513 | } | |
514 | ||
515 | if (count > 0) { | |
516 | kbuf = (char *)__get_free_page(GFP_KERNEL); | |
517 | if (!kbuf) | |
518 | return wrote ? wrote : -ENOMEM; | |
519 | while (count > 0) { | |
80ad89a0 WF |
520 | unsigned long sz = size_inside_page(p, count); |
521 | unsigned long n; | |
1da177e4 | 522 | |
325fda71 KH |
523 | if (!is_vmalloc_or_module_addr((void *)p)) { |
524 | err = -ENXIO; | |
525 | break; | |
526 | } | |
80ad89a0 WF |
527 | n = copy_from_user(kbuf, buf, sz); |
528 | if (n) { | |
325fda71 KH |
529 | err = -EFAULT; |
530 | break; | |
1da177e4 | 531 | } |
c85e9a97 | 532 | vwrite(kbuf, (char *)p, sz); |
80ad89a0 WF |
533 | count -= sz; |
534 | buf += sz; | |
535 | virtr += sz; | |
536 | p += sz; | |
1da177e4 LT |
537 | } |
538 | free_page((unsigned long)kbuf); | |
539 | } | |
540 | ||
325fda71 KH |
541 | *ppos = p; |
542 | return virtr + wrote ? : err; | |
1da177e4 | 543 | } |
b781ecb6 | 544 | #endif |
1da177e4 | 545 | |
4f911d64 | 546 | #ifdef CONFIG_DEVPORT |
d7d4d849 | 547 | static ssize_t read_port(struct file *file, char __user *buf, |
1da177e4 LT |
548 | size_t count, loff_t *ppos) |
549 | { | |
550 | unsigned long i = *ppos; | |
551 | char __user *tmp = buf; | |
552 | ||
553 | if (!access_ok(VERIFY_WRITE, buf, count)) | |
d7d4d849 | 554 | return -EFAULT; |
1da177e4 | 555 | while (count-- > 0 && i < 65536) { |
d7d4d849 AM |
556 | if (__put_user(inb(i), tmp) < 0) |
557 | return -EFAULT; | |
1da177e4 LT |
558 | i++; |
559 | tmp++; | |
560 | } | |
561 | *ppos = i; | |
562 | return tmp-buf; | |
563 | } | |
564 | ||
d7d4d849 | 565 | static ssize_t write_port(struct file *file, const char __user *buf, |
1da177e4 LT |
566 | size_t count, loff_t *ppos) |
567 | { | |
568 | unsigned long i = *ppos; | |
890537b3 | 569 | const char __user *tmp = buf; |
1da177e4 | 570 | |
d7d4d849 | 571 | if (!access_ok(VERIFY_READ, buf, count)) |
1da177e4 LT |
572 | return -EFAULT; |
573 | while (count-- > 0 && i < 65536) { | |
574 | char c; | |
c654d60e JB |
575 | if (__get_user(c, tmp)) { |
576 | if (tmp > buf) | |
577 | break; | |
d7d4d849 | 578 | return -EFAULT; |
c654d60e | 579 | } |
d7d4d849 | 580 | outb(c, i); |
1da177e4 LT |
581 | i++; |
582 | tmp++; | |
583 | } | |
584 | *ppos = i; | |
585 | return tmp-buf; | |
586 | } | |
587 | #endif | |
588 | ||
d7d4d849 | 589 | static ssize_t read_null(struct file *file, char __user *buf, |
1da177e4 LT |
590 | size_t count, loff_t *ppos) |
591 | { | |
592 | return 0; | |
593 | } | |
594 | ||
d7d4d849 | 595 | static ssize_t write_null(struct file *file, const char __user *buf, |
1da177e4 LT |
596 | size_t count, loff_t *ppos) |
597 | { | |
598 | return count; | |
599 | } | |
600 | ||
162934de ZB |
601 | static ssize_t aio_read_null(struct kiocb *iocb, const struct iovec *iov, |
602 | unsigned long nr_segs, loff_t pos) | |
603 | { | |
604 | return 0; | |
605 | } | |
606 | ||
607 | static ssize_t aio_write_null(struct kiocb *iocb, const struct iovec *iov, | |
608 | unsigned long nr_segs, loff_t pos) | |
609 | { | |
610 | return iov_length(iov, nr_segs); | |
611 | } | |
612 | ||
1ebd32fc JA |
613 | static int pipe_to_null(struct pipe_inode_info *info, struct pipe_buffer *buf, |
614 | struct splice_desc *sd) | |
615 | { | |
616 | return sd->len; | |
617 | } | |
618 | ||
d7d4d849 | 619 | static ssize_t splice_write_null(struct pipe_inode_info *pipe, struct file *out, |
1ebd32fc JA |
620 | loff_t *ppos, size_t len, unsigned int flags) |
621 | { | |
622 | return splice_from_pipe(pipe, out, ppos, len, flags, pipe_to_null); | |
623 | } | |
624 | ||
d7d4d849 | 625 | static ssize_t read_zero(struct file *file, char __user *buf, |
1da177e4 LT |
626 | size_t count, loff_t *ppos) |
627 | { | |
557ed1fa | 628 | size_t written; |
1da177e4 LT |
629 | |
630 | if (!count) | |
631 | return 0; | |
632 | ||
633 | if (!access_ok(VERIFY_WRITE, buf, count)) | |
634 | return -EFAULT; | |
635 | ||
557ed1fa NP |
636 | written = 0; |
637 | while (count) { | |
638 | unsigned long unwritten; | |
639 | size_t chunk = count; | |
1da177e4 | 640 | |
557ed1fa NP |
641 | if (chunk > PAGE_SIZE) |
642 | chunk = PAGE_SIZE; /* Just for latency reasons */ | |
bb521c5d | 643 | unwritten = __clear_user(buf, chunk); |
557ed1fa | 644 | written += chunk - unwritten; |
1da177e4 | 645 | if (unwritten) |
557ed1fa | 646 | break; |
2b838687 LT |
647 | if (signal_pending(current)) |
648 | return written ? written : -ERESTARTSYS; | |
1da177e4 | 649 | buf += chunk; |
557ed1fa | 650 | count -= chunk; |
1da177e4 LT |
651 | cond_resched(); |
652 | } | |
557ed1fa | 653 | return written ? written : -EFAULT; |
1da177e4 LT |
654 | } |
655 | ||
162934de ZB |
656 | static ssize_t aio_read_zero(struct kiocb *iocb, const struct iovec *iov, |
657 | unsigned long nr_segs, loff_t pos) | |
658 | { | |
659 | size_t written = 0; | |
660 | unsigned long i; | |
661 | ssize_t ret; | |
662 | ||
663 | for (i = 0; i < nr_segs; i++) { | |
664 | ret = read_zero(iocb->ki_filp, iov[i].iov_base, iov[i].iov_len, | |
665 | &pos); | |
666 | if (ret < 0) | |
667 | break; | |
668 | written += ret; | |
669 | } | |
670 | ||
671 | return written ? written : -EFAULT; | |
672 | } | |
673 | ||
d7d4d849 | 674 | static int mmap_zero(struct file *file, struct vm_area_struct *vma) |
1da177e4 | 675 | { |
557ed1fa | 676 | #ifndef CONFIG_MMU |
1da177e4 | 677 | return -ENOSYS; |
557ed1fa NP |
678 | #endif |
679 | if (vma->vm_flags & VM_SHARED) | |
680 | return shmem_zero_setup(vma); | |
681 | return 0; | |
1da177e4 | 682 | } |
1da177e4 | 683 | |
d7d4d849 | 684 | static ssize_t write_full(struct file *file, const char __user *buf, |
1da177e4 LT |
685 | size_t count, loff_t *ppos) |
686 | { | |
687 | return -ENOSPC; | |
688 | } | |
689 | ||
690 | /* | |
691 | * Special lseek() function for /dev/null and /dev/zero. Most notably, you | |
692 | * can fopen() both devices with "a" now. This was previously impossible. | |
693 | * -- SRB. | |
694 | */ | |
d7d4d849 | 695 | static loff_t null_lseek(struct file *file, loff_t offset, int orig) |
1da177e4 LT |
696 | { |
697 | return file->f_pos = 0; | |
698 | } | |
699 | ||
700 | /* | |
701 | * The memory devices use the full 32/64 bits of the offset, and so we cannot | |
702 | * check against negative addresses: they are ok. The return value is weird, | |
703 | * though, in that case (0). | |
704 | * | |
705 | * also note that seeking relative to the "end of file" isn't supported: | |
706 | * it has no meaning, so it returns -EINVAL. | |
707 | */ | |
d7d4d849 | 708 | static loff_t memory_lseek(struct file *file, loff_t offset, int orig) |
1da177e4 LT |
709 | { |
710 | loff_t ret; | |
711 | ||
496ad9aa | 712 | mutex_lock(&file_inode(file)->i_mutex); |
1da177e4 | 713 | switch (orig) { |
d7d4d849 AM |
714 | case SEEK_CUR: |
715 | offset += file->f_pos; | |
d7d4d849 AM |
716 | case SEEK_SET: |
717 | /* to avoid userland mistaking f_pos=-9 as -EBADF=-9 */ | |
71811f32 | 718 | if (IS_ERR_VALUE((unsigned long long)offset)) { |
d7d4d849 | 719 | ret = -EOVERFLOW; |
1da177e4 | 720 | break; |
d7d4d849 AM |
721 | } |
722 | file->f_pos = offset; | |
723 | ret = file->f_pos; | |
724 | force_successful_syscall_return(); | |
725 | break; | |
726 | default: | |
727 | ret = -EINVAL; | |
1da177e4 | 728 | } |
496ad9aa | 729 | mutex_unlock(&file_inode(file)->i_mutex); |
1da177e4 LT |
730 | return ret; |
731 | } | |
732 | ||
890537b3 | 733 | static int open_port(struct inode *inode, struct file *filp) |
1da177e4 LT |
734 | { |
735 | return capable(CAP_SYS_RAWIO) ? 0 : -EPERM; | |
736 | } | |
737 | ||
738 | #define zero_lseek null_lseek | |
739 | #define full_lseek null_lseek | |
740 | #define write_zero write_null | |
741 | #define read_full read_zero | |
162934de | 742 | #define aio_write_zero aio_write_null |
1da177e4 LT |
743 | #define open_mem open_port |
744 | #define open_kmem open_mem | |
745 | ||
62322d25 | 746 | static const struct file_operations mem_fops = { |
1da177e4 LT |
747 | .llseek = memory_lseek, |
748 | .read = read_mem, | |
749 | .write = write_mem, | |
750 | .mmap = mmap_mem, | |
751 | .open = open_mem, | |
5da6185b | 752 | .get_unmapped_area = get_unmapped_area_mem, |
1da177e4 LT |
753 | }; |
754 | ||
b781ecb6 | 755 | #ifdef CONFIG_DEVKMEM |
62322d25 | 756 | static const struct file_operations kmem_fops = { |
1da177e4 LT |
757 | .llseek = memory_lseek, |
758 | .read = read_kmem, | |
759 | .write = write_kmem, | |
760 | .mmap = mmap_kmem, | |
761 | .open = open_kmem, | |
5da6185b | 762 | .get_unmapped_area = get_unmapped_area_mem, |
1da177e4 | 763 | }; |
b781ecb6 | 764 | #endif |
1da177e4 | 765 | |
62322d25 | 766 | static const struct file_operations null_fops = { |
1da177e4 LT |
767 | .llseek = null_lseek, |
768 | .read = read_null, | |
769 | .write = write_null, | |
162934de ZB |
770 | .aio_read = aio_read_null, |
771 | .aio_write = aio_write_null, | |
1ebd32fc | 772 | .splice_write = splice_write_null, |
1da177e4 LT |
773 | }; |
774 | ||
4f911d64 | 775 | #ifdef CONFIG_DEVPORT |
62322d25 | 776 | static const struct file_operations port_fops = { |
1da177e4 LT |
777 | .llseek = memory_lseek, |
778 | .read = read_port, | |
779 | .write = write_port, | |
780 | .open = open_port, | |
781 | }; | |
782 | #endif | |
783 | ||
62322d25 | 784 | static const struct file_operations zero_fops = { |
1da177e4 LT |
785 | .llseek = zero_lseek, |
786 | .read = read_zero, | |
787 | .write = write_zero, | |
162934de ZB |
788 | .aio_read = aio_read_zero, |
789 | .aio_write = aio_write_zero, | |
1da177e4 LT |
790 | .mmap = mmap_zero, |
791 | }; | |
792 | ||
5da6185b DH |
793 | /* |
794 | * capabilities for /dev/zero | |
795 | * - permits private mappings, "copies" are taken of the source of zeros | |
371d217e | 796 | * - no writeback happens |
5da6185b | 797 | */ |
1da177e4 | 798 | static struct backing_dev_info zero_bdi = { |
d993831f | 799 | .name = "char/mem", |
371d217e | 800 | .capabilities = BDI_CAP_MAP_COPY | BDI_CAP_NO_ACCT_AND_WRITEBACK, |
1da177e4 LT |
801 | }; |
802 | ||
62322d25 | 803 | static const struct file_operations full_fops = { |
1da177e4 LT |
804 | .llseek = full_lseek, |
805 | .read = read_full, | |
806 | .write = write_full, | |
807 | }; | |
808 | ||
389e0cb9 KS |
809 | static const struct memdev { |
810 | const char *name; | |
2c9ede55 | 811 | umode_t mode; |
389e0cb9 KS |
812 | const struct file_operations *fops; |
813 | struct backing_dev_info *dev_info; | |
814 | } devlist[] = { | |
e454cea2 | 815 | [1] = { "mem", 0, &mem_fops, &directly_mappable_cdev_bdi }, |
b781ecb6 | 816 | #ifdef CONFIG_DEVKMEM |
e454cea2 | 817 | [2] = { "kmem", 0, &kmem_fops, &directly_mappable_cdev_bdi }, |
b781ecb6 | 818 | #endif |
e454cea2 | 819 | [3] = { "null", 0666, &null_fops, NULL }, |
4f911d64 | 820 | #ifdef CONFIG_DEVPORT |
e454cea2 | 821 | [4] = { "port", 0, &port_fops, NULL }, |
1da177e4 | 822 | #endif |
e454cea2 KS |
823 | [5] = { "zero", 0666, &zero_fops, &zero_bdi }, |
824 | [7] = { "full", 0666, &full_fops, NULL }, | |
825 | [8] = { "random", 0666, &random_fops, NULL }, | |
826 | [9] = { "urandom", 0666, &urandom_fops, NULL }, | |
7f3a781d | 827 | #ifdef CONFIG_PRINTK |
e11fea92 | 828 | [11] = { "kmsg", 0644, &kmsg_fops, NULL }, |
7f3a781d | 829 | #endif |
d6f47bef ASF |
830 | }; |
831 | ||
832 | static int memory_open(struct inode *inode, struct file *filp) | |
833 | { | |
389e0cb9 KS |
834 | int minor; |
835 | const struct memdev *dev; | |
d6f47bef | 836 | |
389e0cb9 KS |
837 | minor = iminor(inode); |
838 | if (minor >= ARRAY_SIZE(devlist)) | |
205153aa | 839 | return -ENXIO; |
d6f47bef | 840 | |
389e0cb9 KS |
841 | dev = &devlist[minor]; |
842 | if (!dev->fops) | |
205153aa | 843 | return -ENXIO; |
d6f47bef | 844 | |
389e0cb9 KS |
845 | filp->f_op = dev->fops; |
846 | if (dev->dev_info) | |
847 | filp->f_mapping->backing_dev_info = dev->dev_info; | |
d6f47bef | 848 | |
4a3956c7 KH |
849 | /* Is /dev/mem or /dev/kmem ? */ |
850 | if (dev->dev_info == &directly_mappable_cdev_bdi) | |
851 | filp->f_mode |= FMODE_UNSIGNED_OFFSET; | |
852 | ||
389e0cb9 | 853 | if (dev->fops->open) |
205153aa FW |
854 | return dev->fops->open(inode, filp); |
855 | ||
856 | return 0; | |
1da177e4 LT |
857 | } |
858 | ||
62322d25 | 859 | static const struct file_operations memory_fops = { |
d7d4d849 | 860 | .open = memory_open, |
6038f373 | 861 | .llseek = noop_llseek, |
1da177e4 LT |
862 | }; |
863 | ||
2c9ede55 | 864 | static char *mem_devnode(struct device *dev, umode_t *mode) |
e454cea2 KS |
865 | { |
866 | if (mode && devlist[MINOR(dev->devt)].mode) | |
867 | *mode = devlist[MINOR(dev->devt)].mode; | |
868 | return NULL; | |
869 | } | |
870 | ||
ca8eca68 | 871 | static struct class *mem_class; |
1da177e4 LT |
872 | |
873 | static int __init chr_dev_init(void) | |
874 | { | |
389e0cb9 | 875 | int minor; |
e0bf68dd PZ |
876 | int err; |
877 | ||
878 | err = bdi_init(&zero_bdi); | |
879 | if (err) | |
880 | return err; | |
1da177e4 | 881 | |
d7d4d849 | 882 | if (register_chrdev(MEM_MAJOR, "mem", &memory_fops)) |
1da177e4 LT |
883 | printk("unable to get major %d for memory devs\n", MEM_MAJOR); |
884 | ||
ca8eca68 | 885 | mem_class = class_create(THIS_MODULE, "mem"); |
6e191f7b AB |
886 | if (IS_ERR(mem_class)) |
887 | return PTR_ERR(mem_class); | |
888 | ||
e454cea2 | 889 | mem_class->devnode = mem_devnode; |
389e0cb9 KS |
890 | for (minor = 1; minor < ARRAY_SIZE(devlist); minor++) { |
891 | if (!devlist[minor].name) | |
892 | continue; | |
e1612de9 HM |
893 | |
894 | /* | |
890537b3 | 895 | * Create /dev/port? |
e1612de9 HM |
896 | */ |
897 | if ((minor == DEVPORT_MINOR) && !arch_has_dev_port()) | |
898 | continue; | |
899 | ||
389e0cb9 KS |
900 | device_create(mem_class, NULL, MKDEV(MEM_MAJOR, minor), |
901 | NULL, devlist[minor].name); | |
902 | } | |
ebf644c4 | 903 | |
31d1d48e | 904 | return tty_init(); |
1da177e4 LT |
905 | } |
906 | ||
907 | fs_initcall(chr_dev_init); |