Merge tag 'md/3.16' of git://neil.brown.name/md
[deliverable/linux.git] / drivers / char / mem.c
CommitLineData
1da177e4
LT
1/*
2 * linux/drivers/char/mem.c
3 *
4 * Copyright (C) 1991, 1992 Linus Torvalds
5 *
d7d4d849 6 * Added devfs support.
1da177e4 7 * Jan-11-1998, C. Scott Ananian <cananian@alumni.princeton.edu>
af901ca1 8 * Shared /dev/zero mmapping support, Feb 2000, Kanoj Sarcar <kanoj@sgi.com>
1da177e4
LT
9 */
10
1da177e4
LT
11#include <linux/mm.h>
12#include <linux/miscdevice.h>
13#include <linux/slab.h>
14#include <linux/vmalloc.h>
15#include <linux/mman.h>
16#include <linux/random.h>
17#include <linux/init.h>
18#include <linux/raw.h>
19#include <linux/tty.h>
20#include <linux/capability.h>
1da177e4
LT
21#include <linux/ptrace.h>
22#include <linux/device.h>
50b1fdbd 23#include <linux/highmem.h>
1da177e4 24#include <linux/backing-dev.h>
d6b29d7c 25#include <linux/splice.h>
b8a3ad5b 26#include <linux/pfn.h>
66300e66 27#include <linux/export.h>
e1612de9 28#include <linux/io.h>
a27bb332 29#include <linux/aio.h>
1da177e4
LT
30
31#include <asm/uaccess.h>
1da177e4
LT
32
33#ifdef CONFIG_IA64
34# include <linux/efi.h>
35#endif
36
e1612de9
HM
37#define DEVPORT_MINOR 4
38
f222318e
WF
39static inline unsigned long size_inside_page(unsigned long start,
40 unsigned long size)
41{
42 unsigned long sz;
43
7fabaddd 44 sz = PAGE_SIZE - (start & (PAGE_SIZE - 1));
f222318e 45
7fabaddd 46 return min(sz, size);
f222318e
WF
47}
48
1da177e4 49#ifndef ARCH_HAS_VALID_PHYS_ADDR_RANGE
7e6735c3 50static inline int valid_phys_addr_range(phys_addr_t addr, size_t count)
1da177e4 51{
cfaf346c 52 return addr + count <= __pa(high_memory);
1da177e4 53}
80851ef2 54
06c67bef 55static inline int valid_mmap_phys_addr_range(unsigned long pfn, size_t size)
80851ef2
BH
56{
57 return 1;
58}
1da177e4
LT
59#endif
60
d092633b 61#ifdef CONFIG_STRICT_DEVMEM
e2beb3ea 62static inline int range_is_allowed(unsigned long pfn, unsigned long size)
ae531c26 63{
e2beb3ea
VP
64 u64 from = ((u64)pfn) << PAGE_SHIFT;
65 u64 to = from + size;
66 u64 cursor = from;
67
68 while (cursor < to) {
69 if (!devmem_is_allowed(pfn)) {
70 printk(KERN_INFO
71 "Program %s tried to access /dev/mem between %Lx->%Lx.\n",
ae531c26
AV
72 current->comm, from, to);
73 return 0;
74 }
e2beb3ea
VP
75 cursor += PAGE_SIZE;
76 pfn++;
ae531c26
AV
77 }
78 return 1;
79}
80#else
e2beb3ea 81static inline int range_is_allowed(unsigned long pfn, unsigned long size)
ae531c26
AV
82{
83 return 1;
84}
85#endif
86
d7d4d849 87void __weak unxlate_dev_mem_ptr(unsigned long phys, void *addr)
e045fb2a 88{
89}
90
1da177e4 91/*
d7d4d849
AM
92 * This funcion reads the *physical* memory. The f_pos points directly to the
93 * memory location.
1da177e4 94 */
d7d4d849 95static ssize_t read_mem(struct file *file, char __user *buf,
1da177e4
LT
96 size_t count, loff_t *ppos)
97{
7e6735c3 98 phys_addr_t p = *ppos;
1da177e4
LT
99 ssize_t read, sz;
100 char *ptr;
101
08d2d00b
PT
102 if (p != *ppos)
103 return 0;
104
136939a2 105 if (!valid_phys_addr_range(p, count))
1da177e4
LT
106 return -EFAULT;
107 read = 0;
108#ifdef __ARCH_HAS_NO_PAGE_ZERO_MAPPED
109 /* we don't have page 0 mapped on sparc and m68k.. */
110 if (p < PAGE_SIZE) {
7fabaddd 111 sz = size_inside_page(p, count);
1da177e4
LT
112 if (sz > 0) {
113 if (clear_user(buf, sz))
114 return -EFAULT;
d7d4d849
AM
115 buf += sz;
116 p += sz;
117 count -= sz;
118 read += sz;
1da177e4
LT
119 }
120 }
121#endif
122
123 while (count > 0) {
fa29e97b
WF
124 unsigned long remaining;
125
f222318e 126 sz = size_inside_page(p, count);
1da177e4 127
e045fb2a 128 if (!range_is_allowed(p >> PAGE_SHIFT, count))
129 return -EPERM;
130
1da177e4 131 /*
d7d4d849
AM
132 * On ia64 if a page has been mapped somewhere as uncached, then
133 * it must also be accessed uncached by the kernel or data
134 * corruption may occur.
1da177e4
LT
135 */
136 ptr = xlate_dev_mem_ptr(p);
e045fb2a 137 if (!ptr)
138 return -EFAULT;
1da177e4 139
fa29e97b 140 remaining = copy_to_user(buf, ptr, sz);
e045fb2a 141 unxlate_dev_mem_ptr(p, ptr);
fa29e97b
WF
142 if (remaining)
143 return -EFAULT;
e045fb2a 144
1da177e4
LT
145 buf += sz;
146 p += sz;
147 count -= sz;
148 read += sz;
149 }
150
151 *ppos += read;
152 return read;
153}
154
d7d4d849 155static ssize_t write_mem(struct file *file, const char __user *buf,
1da177e4
LT
156 size_t count, loff_t *ppos)
157{
7e6735c3 158 phys_addr_t p = *ppos;
1da177e4
LT
159 ssize_t written, sz;
160 unsigned long copied;
161 void *ptr;
162
08d2d00b
PT
163 if (p != *ppos)
164 return -EFBIG;
165
136939a2 166 if (!valid_phys_addr_range(p, count))
1da177e4
LT
167 return -EFAULT;
168
169 written = 0;
170
171#ifdef __ARCH_HAS_NO_PAGE_ZERO_MAPPED
172 /* we don't have page 0 mapped on sparc and m68k.. */
173 if (p < PAGE_SIZE) {
7fabaddd 174 sz = size_inside_page(p, count);
1da177e4
LT
175 /* Hmm. Do something? */
176 buf += sz;
177 p += sz;
178 count -= sz;
179 written += sz;
180 }
181#endif
182
183 while (count > 0) {
f222318e 184 sz = size_inside_page(p, count);
1da177e4 185
e045fb2a 186 if (!range_is_allowed(p >> PAGE_SHIFT, sz))
187 return -EPERM;
188
1da177e4 189 /*
d7d4d849
AM
190 * On ia64 if a page has been mapped somewhere as uncached, then
191 * it must also be accessed uncached by the kernel or data
192 * corruption may occur.
1da177e4
LT
193 */
194 ptr = xlate_dev_mem_ptr(p);
e045fb2a 195 if (!ptr) {
196 if (written)
197 break;
198 return -EFAULT;
199 }
1da177e4
LT
200
201 copied = copy_from_user(ptr, buf, sz);
fa29e97b 202 unxlate_dev_mem_ptr(p, ptr);
1da177e4 203 if (copied) {
c654d60e
JB
204 written += sz - copied;
205 if (written)
206 break;
1da177e4
LT
207 return -EFAULT;
208 }
e045fb2a 209
1da177e4
LT
210 buf += sz;
211 p += sz;
212 count -= sz;
213 written += sz;
214 }
215
216 *ppos += written;
217 return written;
218}
219
d7d4d849 220int __weak phys_mem_access_prot_allowed(struct file *file,
f0970c13 221 unsigned long pfn, unsigned long size, pgprot_t *vma_prot)
222{
223 return 1;
224}
225
44ac8413 226#ifndef __HAVE_PHYS_MEM_ACCESS_PROT
d7d4d849
AM
227
228/*
229 * Architectures vary in how they handle caching for addresses
230 * outside of main memory.
231 *
232 */
ea56f411 233#ifdef pgprot_noncached
7e6735c3 234static int uncached_access(struct file *file, phys_addr_t addr)
d7d4d849
AM
235{
236#if defined(CONFIG_IA64)
237 /*
238 * On ia64, we ignore O_DSYNC because we cannot tolerate memory
239 * attribute aliases.
240 */
241 return !(efi_mem_attributes(addr) & EFI_MEMORY_WB);
242#elif defined(CONFIG_MIPS)
243 {
244 extern int __uncached_access(struct file *file,
245 unsigned long addr);
246
247 return __uncached_access(file, addr);
248 }
249#else
250 /*
251 * Accessing memory above the top the kernel knows about or through a
252 * file pointer
253 * that was marked O_DSYNC will be done non-cached.
254 */
255 if (file->f_flags & O_DSYNC)
256 return 1;
257 return addr >= __pa(high_memory);
258#endif
259}
ea56f411 260#endif
d7d4d849 261
44ac8413
BH
262static pgprot_t phys_mem_access_prot(struct file *file, unsigned long pfn,
263 unsigned long size, pgprot_t vma_prot)
264{
265#ifdef pgprot_noncached
7e6735c3 266 phys_addr_t offset = pfn << PAGE_SHIFT;
44ac8413
BH
267
268 if (uncached_access(file, offset))
269 return pgprot_noncached(vma_prot);
270#endif
271 return vma_prot;
272}
273#endif
274
5da6185b
DH
275#ifndef CONFIG_MMU
276static unsigned long get_unmapped_area_mem(struct file *file,
277 unsigned long addr,
278 unsigned long len,
279 unsigned long pgoff,
280 unsigned long flags)
281{
282 if (!valid_mmap_phys_addr_range(pgoff, len))
283 return (unsigned long) -EINVAL;
8a93258c 284 return pgoff << PAGE_SHIFT;
5da6185b
DH
285}
286
287/* can't do an in-place private mapping if there's no MMU */
288static inline int private_mapping_ok(struct vm_area_struct *vma)
289{
290 return vma->vm_flags & VM_MAYSHARE;
291}
292#else
293#define get_unmapped_area_mem NULL
294
295static inline int private_mapping_ok(struct vm_area_struct *vma)
296{
297 return 1;
298}
299#endif
300
f0f37e2f 301static const struct vm_operations_struct mmap_mem_ops = {
7ae8ed50
RR
302#ifdef CONFIG_HAVE_IOREMAP_PROT
303 .access = generic_access_phys
304#endif
e7f260a2 305};
306
d7d4d849 307static int mmap_mem(struct file *file, struct vm_area_struct *vma)
1da177e4 308{
80851ef2
BH
309 size_t size = vma->vm_end - vma->vm_start;
310
06c67bef 311 if (!valid_mmap_phys_addr_range(vma->vm_pgoff, size))
80851ef2
BH
312 return -EINVAL;
313
5da6185b
DH
314 if (!private_mapping_ok(vma))
315 return -ENOSYS;
316
e2beb3ea
VP
317 if (!range_is_allowed(vma->vm_pgoff, size))
318 return -EPERM;
319
f0970c13 320 if (!phys_mem_access_prot_allowed(file, vma->vm_pgoff, size,
321 &vma->vm_page_prot))
322 return -EINVAL;
323
8b150478 324 vma->vm_page_prot = phys_mem_access_prot(file, vma->vm_pgoff,
80851ef2 325 size,
1da177e4 326 vma->vm_page_prot);
1da177e4 327
e7f260a2 328 vma->vm_ops = &mmap_mem_ops;
329
314e51b9 330 /* Remap-pfn-range will mark the range VM_IO */
1da177e4
LT
331 if (remap_pfn_range(vma,
332 vma->vm_start,
333 vma->vm_pgoff,
80851ef2 334 size,
e7f260a2 335 vma->vm_page_prot)) {
1da177e4 336 return -EAGAIN;
e7f260a2 337 }
1da177e4
LT
338 return 0;
339}
340
b781ecb6 341#ifdef CONFIG_DEVKMEM
d7d4d849 342static int mmap_kmem(struct file *file, struct vm_area_struct *vma)
1da177e4 343{
4bb82551
LT
344 unsigned long pfn;
345
6d3154cc
LT
346 /* Turn a kernel-virtual address into a physical page frame */
347 pfn = __pa((u64)vma->vm_pgoff << PAGE_SHIFT) >> PAGE_SHIFT;
4bb82551 348
1da177e4 349 /*
d7d4d849
AM
350 * RED-PEN: on some architectures there is more mapped memory than
351 * available in mem_map which pfn_valid checks for. Perhaps should add a
352 * new macro here.
1da177e4
LT
353 *
354 * RED-PEN: vmalloc is not supported right now.
355 */
4bb82551 356 if (!pfn_valid(pfn))
1da177e4 357 return -EIO;
4bb82551
LT
358
359 vma->vm_pgoff = pfn;
1da177e4
LT
360 return mmap_mem(file, vma);
361}
b781ecb6 362#endif
1da177e4 363
b781ecb6 364#ifdef CONFIG_DEVKMEM
1da177e4
LT
365/*
366 * This function reads the *virtual* memory as seen by the kernel.
367 */
d7d4d849 368static ssize_t read_kmem(struct file *file, char __user *buf,
1da177e4
LT
369 size_t count, loff_t *ppos)
370{
371 unsigned long p = *ppos;
372 ssize_t low_count, read, sz;
890537b3 373 char *kbuf; /* k-addr because vread() takes vmlist_lock rwlock */
325fda71 374 int err = 0;
1da177e4
LT
375
376 read = 0;
377 if (p < (unsigned long) high_memory) {
378 low_count = count;
d7d4d849
AM
379 if (count > (unsigned long)high_memory - p)
380 low_count = (unsigned long)high_memory - p;
1da177e4
LT
381
382#ifdef __ARCH_HAS_NO_PAGE_ZERO_MAPPED
383 /* we don't have page 0 mapped on sparc and m68k.. */
384 if (p < PAGE_SIZE && low_count > 0) {
7fabaddd
WF
385 sz = size_inside_page(p, low_count);
386 if (clear_user(buf, sz))
1da177e4 387 return -EFAULT;
7fabaddd
WF
388 buf += sz;
389 p += sz;
390 read += sz;
391 low_count -= sz;
392 count -= sz;
1da177e4
LT
393 }
394#endif
395 while (low_count > 0) {
f222318e 396 sz = size_inside_page(p, low_count);
1da177e4
LT
397
398 /*
399 * On ia64 if a page has been mapped somewhere as
400 * uncached, then it must also be accessed uncached
401 * by the kernel or data corruption may occur
402 */
403 kbuf = xlate_dev_kmem_ptr((char *)p);
404
405 if (copy_to_user(buf, kbuf, sz))
406 return -EFAULT;
407 buf += sz;
408 p += sz;
409 read += sz;
410 low_count -= sz;
411 count -= sz;
412 }
413 }
414
415 if (count > 0) {
416 kbuf = (char *)__get_free_page(GFP_KERNEL);
417 if (!kbuf)
418 return -ENOMEM;
419 while (count > 0) {
80ad89a0 420 sz = size_inside_page(p, count);
325fda71
KH
421 if (!is_vmalloc_or_module_addr((void *)p)) {
422 err = -ENXIO;
423 break;
424 }
80ad89a0
WF
425 sz = vread(kbuf, (char *)p, sz);
426 if (!sz)
1da177e4 427 break;
80ad89a0 428 if (copy_to_user(buf, kbuf, sz)) {
325fda71
KH
429 err = -EFAULT;
430 break;
1da177e4 431 }
80ad89a0
WF
432 count -= sz;
433 buf += sz;
434 read += sz;
435 p += sz;
1da177e4
LT
436 }
437 free_page((unsigned long)kbuf);
438 }
325fda71
KH
439 *ppos = p;
440 return read ? read : err;
1da177e4
LT
441}
442
443
d7d4d849
AM
444static ssize_t do_write_kmem(unsigned long p, const char __user *buf,
445 size_t count, loff_t *ppos)
1da177e4
LT
446{
447 ssize_t written, sz;
448 unsigned long copied;
449
450 written = 0;
451#ifdef __ARCH_HAS_NO_PAGE_ZERO_MAPPED
452 /* we don't have page 0 mapped on sparc and m68k.. */
ee32398f
WF
453 if (p < PAGE_SIZE) {
454 sz = size_inside_page(p, count);
1da177e4
LT
455 /* Hmm. Do something? */
456 buf += sz;
457 p += sz;
1da177e4
LT
458 count -= sz;
459 written += sz;
460 }
461#endif
462
463 while (count > 0) {
464 char *ptr;
1da177e4 465
ee32398f 466 sz = size_inside_page(p, count);
1da177e4
LT
467
468 /*
d7d4d849
AM
469 * On ia64 if a page has been mapped somewhere as uncached, then
470 * it must also be accessed uncached by the kernel or data
471 * corruption may occur.
1da177e4 472 */
ee32398f 473 ptr = xlate_dev_kmem_ptr((char *)p);
1da177e4
LT
474
475 copied = copy_from_user(ptr, buf, sz);
476 if (copied) {
c654d60e
JB
477 written += sz - copied;
478 if (written)
479 break;
1da177e4
LT
480 return -EFAULT;
481 }
482 buf += sz;
483 p += sz;
1da177e4
LT
484 count -= sz;
485 written += sz;
486 }
487
488 *ppos += written;
489 return written;
490}
491
1da177e4
LT
492/*
493 * This function writes to the *virtual* memory as seen by the kernel.
494 */
d7d4d849 495static ssize_t write_kmem(struct file *file, const char __user *buf,
1da177e4
LT
496 size_t count, loff_t *ppos)
497{
498 unsigned long p = *ppos;
499 ssize_t wrote = 0;
500 ssize_t virtr = 0;
890537b3 501 char *kbuf; /* k-addr because vwrite() takes vmlist_lock rwlock */
325fda71 502 int err = 0;
1da177e4
LT
503
504 if (p < (unsigned long) high_memory) {
80ad89a0
WF
505 unsigned long to_write = min_t(unsigned long, count,
506 (unsigned long)high_memory - p);
ee32398f 507 wrote = do_write_kmem(p, buf, to_write, ppos);
80ad89a0
WF
508 if (wrote != to_write)
509 return wrote;
1da177e4
LT
510 p += wrote;
511 buf += wrote;
512 count -= wrote;
513 }
514
515 if (count > 0) {
516 kbuf = (char *)__get_free_page(GFP_KERNEL);
517 if (!kbuf)
518 return wrote ? wrote : -ENOMEM;
519 while (count > 0) {
80ad89a0
WF
520 unsigned long sz = size_inside_page(p, count);
521 unsigned long n;
1da177e4 522
325fda71
KH
523 if (!is_vmalloc_or_module_addr((void *)p)) {
524 err = -ENXIO;
525 break;
526 }
80ad89a0
WF
527 n = copy_from_user(kbuf, buf, sz);
528 if (n) {
325fda71
KH
529 err = -EFAULT;
530 break;
1da177e4 531 }
c85e9a97 532 vwrite(kbuf, (char *)p, sz);
80ad89a0
WF
533 count -= sz;
534 buf += sz;
535 virtr += sz;
536 p += sz;
1da177e4
LT
537 }
538 free_page((unsigned long)kbuf);
539 }
540
325fda71
KH
541 *ppos = p;
542 return virtr + wrote ? : err;
1da177e4 543}
b781ecb6 544#endif
1da177e4 545
4f911d64 546#ifdef CONFIG_DEVPORT
d7d4d849 547static ssize_t read_port(struct file *file, char __user *buf,
1da177e4
LT
548 size_t count, loff_t *ppos)
549{
550 unsigned long i = *ppos;
551 char __user *tmp = buf;
552
553 if (!access_ok(VERIFY_WRITE, buf, count))
d7d4d849 554 return -EFAULT;
1da177e4 555 while (count-- > 0 && i < 65536) {
d7d4d849
AM
556 if (__put_user(inb(i), tmp) < 0)
557 return -EFAULT;
1da177e4
LT
558 i++;
559 tmp++;
560 }
561 *ppos = i;
562 return tmp-buf;
563}
564
d7d4d849 565static ssize_t write_port(struct file *file, const char __user *buf,
1da177e4
LT
566 size_t count, loff_t *ppos)
567{
568 unsigned long i = *ppos;
890537b3 569 const char __user *tmp = buf;
1da177e4 570
d7d4d849 571 if (!access_ok(VERIFY_READ, buf, count))
1da177e4
LT
572 return -EFAULT;
573 while (count-- > 0 && i < 65536) {
574 char c;
c654d60e
JB
575 if (__get_user(c, tmp)) {
576 if (tmp > buf)
577 break;
d7d4d849 578 return -EFAULT;
c654d60e 579 }
d7d4d849 580 outb(c, i);
1da177e4
LT
581 i++;
582 tmp++;
583 }
584 *ppos = i;
585 return tmp-buf;
586}
587#endif
588
d7d4d849 589static ssize_t read_null(struct file *file, char __user *buf,
1da177e4
LT
590 size_t count, loff_t *ppos)
591{
592 return 0;
593}
594
d7d4d849 595static ssize_t write_null(struct file *file, const char __user *buf,
1da177e4
LT
596 size_t count, loff_t *ppos)
597{
598 return count;
599}
600
162934de
ZB
601static ssize_t aio_read_null(struct kiocb *iocb, const struct iovec *iov,
602 unsigned long nr_segs, loff_t pos)
603{
604 return 0;
605}
606
607static ssize_t aio_write_null(struct kiocb *iocb, const struct iovec *iov,
608 unsigned long nr_segs, loff_t pos)
609{
610 return iov_length(iov, nr_segs);
611}
612
1ebd32fc
JA
613static int pipe_to_null(struct pipe_inode_info *info, struct pipe_buffer *buf,
614 struct splice_desc *sd)
615{
616 return sd->len;
617}
618
d7d4d849 619static ssize_t splice_write_null(struct pipe_inode_info *pipe, struct file *out,
1ebd32fc
JA
620 loff_t *ppos, size_t len, unsigned int flags)
621{
622 return splice_from_pipe(pipe, out, ppos, len, flags, pipe_to_null);
623}
624
d7d4d849 625static ssize_t read_zero(struct file *file, char __user *buf,
1da177e4
LT
626 size_t count, loff_t *ppos)
627{
557ed1fa 628 size_t written;
1da177e4
LT
629
630 if (!count)
631 return 0;
632
633 if (!access_ok(VERIFY_WRITE, buf, count))
634 return -EFAULT;
635
557ed1fa
NP
636 written = 0;
637 while (count) {
638 unsigned long unwritten;
639 size_t chunk = count;
1da177e4 640
557ed1fa
NP
641 if (chunk > PAGE_SIZE)
642 chunk = PAGE_SIZE; /* Just for latency reasons */
bb521c5d 643 unwritten = __clear_user(buf, chunk);
557ed1fa 644 written += chunk - unwritten;
1da177e4 645 if (unwritten)
557ed1fa 646 break;
2b838687
LT
647 if (signal_pending(current))
648 return written ? written : -ERESTARTSYS;
1da177e4 649 buf += chunk;
557ed1fa 650 count -= chunk;
1da177e4
LT
651 cond_resched();
652 }
557ed1fa 653 return written ? written : -EFAULT;
1da177e4
LT
654}
655
162934de
ZB
656static ssize_t aio_read_zero(struct kiocb *iocb, const struct iovec *iov,
657 unsigned long nr_segs, loff_t pos)
658{
659 size_t written = 0;
660 unsigned long i;
661 ssize_t ret;
662
663 for (i = 0; i < nr_segs; i++) {
664 ret = read_zero(iocb->ki_filp, iov[i].iov_base, iov[i].iov_len,
665 &pos);
666 if (ret < 0)
667 break;
668 written += ret;
669 }
670
671 return written ? written : -EFAULT;
672}
673
d7d4d849 674static int mmap_zero(struct file *file, struct vm_area_struct *vma)
1da177e4 675{
557ed1fa 676#ifndef CONFIG_MMU
1da177e4 677 return -ENOSYS;
557ed1fa
NP
678#endif
679 if (vma->vm_flags & VM_SHARED)
680 return shmem_zero_setup(vma);
681 return 0;
1da177e4 682}
1da177e4 683
d7d4d849 684static ssize_t write_full(struct file *file, const char __user *buf,
1da177e4
LT
685 size_t count, loff_t *ppos)
686{
687 return -ENOSPC;
688}
689
690/*
691 * Special lseek() function for /dev/null and /dev/zero. Most notably, you
692 * can fopen() both devices with "a" now. This was previously impossible.
693 * -- SRB.
694 */
d7d4d849 695static loff_t null_lseek(struct file *file, loff_t offset, int orig)
1da177e4
LT
696{
697 return file->f_pos = 0;
698}
699
700/*
701 * The memory devices use the full 32/64 bits of the offset, and so we cannot
702 * check against negative addresses: they are ok. The return value is weird,
703 * though, in that case (0).
704 *
705 * also note that seeking relative to the "end of file" isn't supported:
706 * it has no meaning, so it returns -EINVAL.
707 */
d7d4d849 708static loff_t memory_lseek(struct file *file, loff_t offset, int orig)
1da177e4
LT
709{
710 loff_t ret;
711
496ad9aa 712 mutex_lock(&file_inode(file)->i_mutex);
1da177e4 713 switch (orig) {
d7d4d849
AM
714 case SEEK_CUR:
715 offset += file->f_pos;
d7d4d849
AM
716 case SEEK_SET:
717 /* to avoid userland mistaking f_pos=-9 as -EBADF=-9 */
71811f32 718 if (IS_ERR_VALUE((unsigned long long)offset)) {
d7d4d849 719 ret = -EOVERFLOW;
1da177e4 720 break;
d7d4d849
AM
721 }
722 file->f_pos = offset;
723 ret = file->f_pos;
724 force_successful_syscall_return();
725 break;
726 default:
727 ret = -EINVAL;
1da177e4 728 }
496ad9aa 729 mutex_unlock(&file_inode(file)->i_mutex);
1da177e4
LT
730 return ret;
731}
732
890537b3 733static int open_port(struct inode *inode, struct file *filp)
1da177e4
LT
734{
735 return capable(CAP_SYS_RAWIO) ? 0 : -EPERM;
736}
737
738#define zero_lseek null_lseek
739#define full_lseek null_lseek
740#define write_zero write_null
741#define read_full read_zero
162934de 742#define aio_write_zero aio_write_null
1da177e4
LT
743#define open_mem open_port
744#define open_kmem open_mem
745
62322d25 746static const struct file_operations mem_fops = {
1da177e4
LT
747 .llseek = memory_lseek,
748 .read = read_mem,
749 .write = write_mem,
750 .mmap = mmap_mem,
751 .open = open_mem,
5da6185b 752 .get_unmapped_area = get_unmapped_area_mem,
1da177e4
LT
753};
754
b781ecb6 755#ifdef CONFIG_DEVKMEM
62322d25 756static const struct file_operations kmem_fops = {
1da177e4
LT
757 .llseek = memory_lseek,
758 .read = read_kmem,
759 .write = write_kmem,
760 .mmap = mmap_kmem,
761 .open = open_kmem,
5da6185b 762 .get_unmapped_area = get_unmapped_area_mem,
1da177e4 763};
b781ecb6 764#endif
1da177e4 765
62322d25 766static const struct file_operations null_fops = {
1da177e4
LT
767 .llseek = null_lseek,
768 .read = read_null,
769 .write = write_null,
162934de
ZB
770 .aio_read = aio_read_null,
771 .aio_write = aio_write_null,
1ebd32fc 772 .splice_write = splice_write_null,
1da177e4
LT
773};
774
4f911d64 775#ifdef CONFIG_DEVPORT
62322d25 776static const struct file_operations port_fops = {
1da177e4
LT
777 .llseek = memory_lseek,
778 .read = read_port,
779 .write = write_port,
780 .open = open_port,
781};
782#endif
783
62322d25 784static const struct file_operations zero_fops = {
1da177e4
LT
785 .llseek = zero_lseek,
786 .read = read_zero,
787 .write = write_zero,
162934de
ZB
788 .aio_read = aio_read_zero,
789 .aio_write = aio_write_zero,
1da177e4
LT
790 .mmap = mmap_zero,
791};
792
5da6185b
DH
793/*
794 * capabilities for /dev/zero
795 * - permits private mappings, "copies" are taken of the source of zeros
371d217e 796 * - no writeback happens
5da6185b 797 */
1da177e4 798static struct backing_dev_info zero_bdi = {
d993831f 799 .name = "char/mem",
371d217e 800 .capabilities = BDI_CAP_MAP_COPY | BDI_CAP_NO_ACCT_AND_WRITEBACK,
1da177e4
LT
801};
802
62322d25 803static const struct file_operations full_fops = {
1da177e4
LT
804 .llseek = full_lseek,
805 .read = read_full,
806 .write = write_full,
807};
808
389e0cb9
KS
809static const struct memdev {
810 const char *name;
2c9ede55 811 umode_t mode;
389e0cb9
KS
812 const struct file_operations *fops;
813 struct backing_dev_info *dev_info;
814} devlist[] = {
e454cea2 815 [1] = { "mem", 0, &mem_fops, &directly_mappable_cdev_bdi },
b781ecb6 816#ifdef CONFIG_DEVKMEM
e454cea2 817 [2] = { "kmem", 0, &kmem_fops, &directly_mappable_cdev_bdi },
b781ecb6 818#endif
e454cea2 819 [3] = { "null", 0666, &null_fops, NULL },
4f911d64 820#ifdef CONFIG_DEVPORT
e454cea2 821 [4] = { "port", 0, &port_fops, NULL },
1da177e4 822#endif
e454cea2
KS
823 [5] = { "zero", 0666, &zero_fops, &zero_bdi },
824 [7] = { "full", 0666, &full_fops, NULL },
825 [8] = { "random", 0666, &random_fops, NULL },
826 [9] = { "urandom", 0666, &urandom_fops, NULL },
7f3a781d 827#ifdef CONFIG_PRINTK
e11fea92 828 [11] = { "kmsg", 0644, &kmsg_fops, NULL },
7f3a781d 829#endif
d6f47bef
ASF
830};
831
832static int memory_open(struct inode *inode, struct file *filp)
833{
389e0cb9
KS
834 int minor;
835 const struct memdev *dev;
d6f47bef 836
389e0cb9
KS
837 minor = iminor(inode);
838 if (minor >= ARRAY_SIZE(devlist))
205153aa 839 return -ENXIO;
d6f47bef 840
389e0cb9
KS
841 dev = &devlist[minor];
842 if (!dev->fops)
205153aa 843 return -ENXIO;
d6f47bef 844
389e0cb9
KS
845 filp->f_op = dev->fops;
846 if (dev->dev_info)
847 filp->f_mapping->backing_dev_info = dev->dev_info;
d6f47bef 848
4a3956c7
KH
849 /* Is /dev/mem or /dev/kmem ? */
850 if (dev->dev_info == &directly_mappable_cdev_bdi)
851 filp->f_mode |= FMODE_UNSIGNED_OFFSET;
852
389e0cb9 853 if (dev->fops->open)
205153aa
FW
854 return dev->fops->open(inode, filp);
855
856 return 0;
1da177e4
LT
857}
858
62322d25 859static const struct file_operations memory_fops = {
d7d4d849 860 .open = memory_open,
6038f373 861 .llseek = noop_llseek,
1da177e4
LT
862};
863
2c9ede55 864static char *mem_devnode(struct device *dev, umode_t *mode)
e454cea2
KS
865{
866 if (mode && devlist[MINOR(dev->devt)].mode)
867 *mode = devlist[MINOR(dev->devt)].mode;
868 return NULL;
869}
870
ca8eca68 871static struct class *mem_class;
1da177e4
LT
872
873static int __init chr_dev_init(void)
874{
389e0cb9 875 int minor;
e0bf68dd
PZ
876 int err;
877
878 err = bdi_init(&zero_bdi);
879 if (err)
880 return err;
1da177e4 881
d7d4d849 882 if (register_chrdev(MEM_MAJOR, "mem", &memory_fops))
1da177e4
LT
883 printk("unable to get major %d for memory devs\n", MEM_MAJOR);
884
ca8eca68 885 mem_class = class_create(THIS_MODULE, "mem");
6e191f7b
AB
886 if (IS_ERR(mem_class))
887 return PTR_ERR(mem_class);
888
e454cea2 889 mem_class->devnode = mem_devnode;
389e0cb9
KS
890 for (minor = 1; minor < ARRAY_SIZE(devlist); minor++) {
891 if (!devlist[minor].name)
892 continue;
e1612de9
HM
893
894 /*
890537b3 895 * Create /dev/port?
e1612de9
HM
896 */
897 if ((minor == DEVPORT_MINOR) && !arch_has_dev_port())
898 continue;
899
389e0cb9
KS
900 device_create(mem_class, NULL, MKDEV(MEM_MAJOR, minor),
901 NULL, devlist[minor].name);
902 }
ebf644c4 903
31d1d48e 904 return tty_init();
1da177e4
LT
905}
906
907fs_initcall(chr_dev_init);
This page took 1.908394 seconds and 5 git commands to generate.