]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - drivers/char/mem.c
drivers: char: mem: Make /dev/mem an optional device
[mirror_ubuntu-bionic-kernel.git] / drivers / char / mem.c
CommitLineData
1da177e4
LT
1/*
2 * linux/drivers/char/mem.c
3 *
4 * Copyright (C) 1991, 1992 Linus Torvalds
5 *
d7d4d849 6 * Added devfs support.
1da177e4 7 * Jan-11-1998, C. Scott Ananian <cananian@alumni.princeton.edu>
af901ca1 8 * Shared /dev/zero mmapping support, Feb 2000, Kanoj Sarcar <kanoj@sgi.com>
1da177e4
LT
9 */
10
1da177e4
LT
11#include <linux/mm.h>
12#include <linux/miscdevice.h>
13#include <linux/slab.h>
14#include <linux/vmalloc.h>
15#include <linux/mman.h>
16#include <linux/random.h>
17#include <linux/init.h>
18#include <linux/raw.h>
19#include <linux/tty.h>
20#include <linux/capability.h>
1da177e4
LT
21#include <linux/ptrace.h>
22#include <linux/device.h>
50b1fdbd 23#include <linux/highmem.h>
1da177e4 24#include <linux/backing-dev.h>
d6b29d7c 25#include <linux/splice.h>
b8a3ad5b 26#include <linux/pfn.h>
66300e66 27#include <linux/export.h>
e1612de9 28#include <linux/io.h>
a27bb332 29#include <linux/aio.h>
1da177e4
LT
30
31#include <asm/uaccess.h>
1da177e4
LT
32
33#ifdef CONFIG_IA64
34# include <linux/efi.h>
35#endif
36
e1612de9
HM
37#define DEVPORT_MINOR 4
38
f222318e
WF
39static inline unsigned long size_inside_page(unsigned long start,
40 unsigned long size)
41{
42 unsigned long sz;
43
7fabaddd 44 sz = PAGE_SIZE - (start & (PAGE_SIZE - 1));
f222318e 45
7fabaddd 46 return min(sz, size);
f222318e
WF
47}
48
1da177e4 49#ifndef ARCH_HAS_VALID_PHYS_ADDR_RANGE
7e6735c3 50static inline int valid_phys_addr_range(phys_addr_t addr, size_t count)
1da177e4 51{
cfaf346c 52 return addr + count <= __pa(high_memory);
1da177e4 53}
80851ef2 54
06c67bef 55static inline int valid_mmap_phys_addr_range(unsigned long pfn, size_t size)
80851ef2
BH
56{
57 return 1;
58}
1da177e4
LT
59#endif
60
d092633b 61#ifdef CONFIG_STRICT_DEVMEM
e2beb3ea 62static inline int range_is_allowed(unsigned long pfn, unsigned long size)
ae531c26 63{
e2beb3ea
VP
64 u64 from = ((u64)pfn) << PAGE_SHIFT;
65 u64 to = from + size;
66 u64 cursor = from;
67
68 while (cursor < to) {
69 if (!devmem_is_allowed(pfn)) {
70 printk(KERN_INFO
71 "Program %s tried to access /dev/mem between %Lx->%Lx.\n",
ae531c26
AV
72 current->comm, from, to);
73 return 0;
74 }
e2beb3ea
VP
75 cursor += PAGE_SIZE;
76 pfn++;
ae531c26
AV
77 }
78 return 1;
79}
80#else
e2beb3ea 81static inline int range_is_allowed(unsigned long pfn, unsigned long size)
ae531c26
AV
82{
83 return 1;
84}
85#endif
86
4707a341
TR
87#ifndef unxlate_dev_mem_ptr
88#define unxlate_dev_mem_ptr unxlate_dev_mem_ptr
89void __weak unxlate_dev_mem_ptr(phys_addr_t phys, void *addr)
e045fb2a 90{
91}
4707a341 92#endif
e045fb2a 93
1da177e4 94/*
d7d4d849
AM
95 * This funcion reads the *physical* memory. The f_pos points directly to the
96 * memory location.
1da177e4 97 */
d7d4d849 98static ssize_t read_mem(struct file *file, char __user *buf,
1da177e4
LT
99 size_t count, loff_t *ppos)
100{
7e6735c3 101 phys_addr_t p = *ppos;
1da177e4 102 ssize_t read, sz;
4707a341 103 void *ptr;
1da177e4 104
08d2d00b
PT
105 if (p != *ppos)
106 return 0;
107
136939a2 108 if (!valid_phys_addr_range(p, count))
1da177e4
LT
109 return -EFAULT;
110 read = 0;
111#ifdef __ARCH_HAS_NO_PAGE_ZERO_MAPPED
112 /* we don't have page 0 mapped on sparc and m68k.. */
113 if (p < PAGE_SIZE) {
7fabaddd 114 sz = size_inside_page(p, count);
1da177e4
LT
115 if (sz > 0) {
116 if (clear_user(buf, sz))
117 return -EFAULT;
d7d4d849
AM
118 buf += sz;
119 p += sz;
120 count -= sz;
121 read += sz;
1da177e4
LT
122 }
123 }
124#endif
125
126 while (count > 0) {
fa29e97b
WF
127 unsigned long remaining;
128
f222318e 129 sz = size_inside_page(p, count);
1da177e4 130
e045fb2a 131 if (!range_is_allowed(p >> PAGE_SHIFT, count))
132 return -EPERM;
133
1da177e4 134 /*
d7d4d849
AM
135 * On ia64 if a page has been mapped somewhere as uncached, then
136 * it must also be accessed uncached by the kernel or data
137 * corruption may occur.
1da177e4
LT
138 */
139 ptr = xlate_dev_mem_ptr(p);
e045fb2a 140 if (!ptr)
141 return -EFAULT;
1da177e4 142
fa29e97b 143 remaining = copy_to_user(buf, ptr, sz);
e045fb2a 144 unxlate_dev_mem_ptr(p, ptr);
fa29e97b
WF
145 if (remaining)
146 return -EFAULT;
e045fb2a 147
1da177e4
LT
148 buf += sz;
149 p += sz;
150 count -= sz;
151 read += sz;
152 }
153
154 *ppos += read;
155 return read;
156}
157
d7d4d849 158static ssize_t write_mem(struct file *file, const char __user *buf,
1da177e4
LT
159 size_t count, loff_t *ppos)
160{
7e6735c3 161 phys_addr_t p = *ppos;
1da177e4
LT
162 ssize_t written, sz;
163 unsigned long copied;
164 void *ptr;
165
08d2d00b
PT
166 if (p != *ppos)
167 return -EFBIG;
168
136939a2 169 if (!valid_phys_addr_range(p, count))
1da177e4
LT
170 return -EFAULT;
171
172 written = 0;
173
174#ifdef __ARCH_HAS_NO_PAGE_ZERO_MAPPED
175 /* we don't have page 0 mapped on sparc and m68k.. */
176 if (p < PAGE_SIZE) {
7fabaddd 177 sz = size_inside_page(p, count);
1da177e4
LT
178 /* Hmm. Do something? */
179 buf += sz;
180 p += sz;
181 count -= sz;
182 written += sz;
183 }
184#endif
185
186 while (count > 0) {
f222318e 187 sz = size_inside_page(p, count);
1da177e4 188
e045fb2a 189 if (!range_is_allowed(p >> PAGE_SHIFT, sz))
190 return -EPERM;
191
1da177e4 192 /*
d7d4d849
AM
193 * On ia64 if a page has been mapped somewhere as uncached, then
194 * it must also be accessed uncached by the kernel or data
195 * corruption may occur.
1da177e4
LT
196 */
197 ptr = xlate_dev_mem_ptr(p);
e045fb2a 198 if (!ptr) {
199 if (written)
200 break;
201 return -EFAULT;
202 }
1da177e4
LT
203
204 copied = copy_from_user(ptr, buf, sz);
fa29e97b 205 unxlate_dev_mem_ptr(p, ptr);
1da177e4 206 if (copied) {
c654d60e
JB
207 written += sz - copied;
208 if (written)
209 break;
1da177e4
LT
210 return -EFAULT;
211 }
e045fb2a 212
1da177e4
LT
213 buf += sz;
214 p += sz;
215 count -= sz;
216 written += sz;
217 }
218
219 *ppos += written;
220 return written;
221}
222
d7d4d849 223int __weak phys_mem_access_prot_allowed(struct file *file,
f0970c13 224 unsigned long pfn, unsigned long size, pgprot_t *vma_prot)
225{
226 return 1;
227}
228
44ac8413 229#ifndef __HAVE_PHYS_MEM_ACCESS_PROT
d7d4d849
AM
230
231/*
232 * Architectures vary in how they handle caching for addresses
233 * outside of main memory.
234 *
235 */
ea56f411 236#ifdef pgprot_noncached
7e6735c3 237static int uncached_access(struct file *file, phys_addr_t addr)
d7d4d849
AM
238{
239#if defined(CONFIG_IA64)
240 /*
241 * On ia64, we ignore O_DSYNC because we cannot tolerate memory
242 * attribute aliases.
243 */
244 return !(efi_mem_attributes(addr) & EFI_MEMORY_WB);
245#elif defined(CONFIG_MIPS)
246 {
247 extern int __uncached_access(struct file *file,
248 unsigned long addr);
249
250 return __uncached_access(file, addr);
251 }
252#else
253 /*
254 * Accessing memory above the top the kernel knows about or through a
255 * file pointer
256 * that was marked O_DSYNC will be done non-cached.
257 */
258 if (file->f_flags & O_DSYNC)
259 return 1;
260 return addr >= __pa(high_memory);
261#endif
262}
ea56f411 263#endif
d7d4d849 264
44ac8413
BH
265static pgprot_t phys_mem_access_prot(struct file *file, unsigned long pfn,
266 unsigned long size, pgprot_t vma_prot)
267{
268#ifdef pgprot_noncached
7e6735c3 269 phys_addr_t offset = pfn << PAGE_SHIFT;
44ac8413
BH
270
271 if (uncached_access(file, offset))
272 return pgprot_noncached(vma_prot);
273#endif
274 return vma_prot;
275}
276#endif
277
5da6185b
DH
278#ifndef CONFIG_MMU
279static unsigned long get_unmapped_area_mem(struct file *file,
280 unsigned long addr,
281 unsigned long len,
282 unsigned long pgoff,
283 unsigned long flags)
284{
285 if (!valid_mmap_phys_addr_range(pgoff, len))
286 return (unsigned long) -EINVAL;
8a93258c 287 return pgoff << PAGE_SHIFT;
5da6185b
DH
288}
289
290/* can't do an in-place private mapping if there's no MMU */
291static inline int private_mapping_ok(struct vm_area_struct *vma)
292{
293 return vma->vm_flags & VM_MAYSHARE;
294}
295#else
296#define get_unmapped_area_mem NULL
297
298static inline int private_mapping_ok(struct vm_area_struct *vma)
299{
300 return 1;
301}
302#endif
303
f0f37e2f 304static const struct vm_operations_struct mmap_mem_ops = {
7ae8ed50
RR
305#ifdef CONFIG_HAVE_IOREMAP_PROT
306 .access = generic_access_phys
307#endif
e7f260a2 308};
309
d7d4d849 310static int mmap_mem(struct file *file, struct vm_area_struct *vma)
1da177e4 311{
80851ef2
BH
312 size_t size = vma->vm_end - vma->vm_start;
313
06c67bef 314 if (!valid_mmap_phys_addr_range(vma->vm_pgoff, size))
80851ef2
BH
315 return -EINVAL;
316
5da6185b
DH
317 if (!private_mapping_ok(vma))
318 return -ENOSYS;
319
e2beb3ea
VP
320 if (!range_is_allowed(vma->vm_pgoff, size))
321 return -EPERM;
322
f0970c13 323 if (!phys_mem_access_prot_allowed(file, vma->vm_pgoff, size,
324 &vma->vm_page_prot))
325 return -EINVAL;
326
8b150478 327 vma->vm_page_prot = phys_mem_access_prot(file, vma->vm_pgoff,
80851ef2 328 size,
1da177e4 329 vma->vm_page_prot);
1da177e4 330
e7f260a2 331 vma->vm_ops = &mmap_mem_ops;
332
314e51b9 333 /* Remap-pfn-range will mark the range VM_IO */
1da177e4
LT
334 if (remap_pfn_range(vma,
335 vma->vm_start,
336 vma->vm_pgoff,
80851ef2 337 size,
e7f260a2 338 vma->vm_page_prot)) {
1da177e4 339 return -EAGAIN;
e7f260a2 340 }
1da177e4
LT
341 return 0;
342}
343
b781ecb6 344#ifdef CONFIG_DEVKMEM
d7d4d849 345static int mmap_kmem(struct file *file, struct vm_area_struct *vma)
1da177e4 346{
4bb82551
LT
347 unsigned long pfn;
348
6d3154cc
LT
349 /* Turn a kernel-virtual address into a physical page frame */
350 pfn = __pa((u64)vma->vm_pgoff << PAGE_SHIFT) >> PAGE_SHIFT;
4bb82551 351
1da177e4 352 /*
d7d4d849
AM
353 * RED-PEN: on some architectures there is more mapped memory than
354 * available in mem_map which pfn_valid checks for. Perhaps should add a
355 * new macro here.
1da177e4
LT
356 *
357 * RED-PEN: vmalloc is not supported right now.
358 */
4bb82551 359 if (!pfn_valid(pfn))
1da177e4 360 return -EIO;
4bb82551
LT
361
362 vma->vm_pgoff = pfn;
1da177e4
LT
363 return mmap_mem(file, vma);
364}
b781ecb6 365#endif
1da177e4 366
b781ecb6 367#ifdef CONFIG_DEVKMEM
1da177e4
LT
368/*
369 * This function reads the *virtual* memory as seen by the kernel.
370 */
d7d4d849 371static ssize_t read_kmem(struct file *file, char __user *buf,
1da177e4
LT
372 size_t count, loff_t *ppos)
373{
374 unsigned long p = *ppos;
375 ssize_t low_count, read, sz;
890537b3 376 char *kbuf; /* k-addr because vread() takes vmlist_lock rwlock */
325fda71 377 int err = 0;
1da177e4
LT
378
379 read = 0;
380 if (p < (unsigned long) high_memory) {
381 low_count = count;
d7d4d849
AM
382 if (count > (unsigned long)high_memory - p)
383 low_count = (unsigned long)high_memory - p;
1da177e4
LT
384
385#ifdef __ARCH_HAS_NO_PAGE_ZERO_MAPPED
386 /* we don't have page 0 mapped on sparc and m68k.. */
387 if (p < PAGE_SIZE && low_count > 0) {
7fabaddd
WF
388 sz = size_inside_page(p, low_count);
389 if (clear_user(buf, sz))
1da177e4 390 return -EFAULT;
7fabaddd
WF
391 buf += sz;
392 p += sz;
393 read += sz;
394 low_count -= sz;
395 count -= sz;
1da177e4
LT
396 }
397#endif
398 while (low_count > 0) {
f222318e 399 sz = size_inside_page(p, low_count);
1da177e4
LT
400
401 /*
402 * On ia64 if a page has been mapped somewhere as
403 * uncached, then it must also be accessed uncached
404 * by the kernel or data corruption may occur
405 */
4707a341 406 kbuf = xlate_dev_kmem_ptr((void *)p);
1da177e4
LT
407
408 if (copy_to_user(buf, kbuf, sz))
409 return -EFAULT;
410 buf += sz;
411 p += sz;
412 read += sz;
413 low_count -= sz;
414 count -= sz;
415 }
416 }
417
418 if (count > 0) {
419 kbuf = (char *)__get_free_page(GFP_KERNEL);
420 if (!kbuf)
421 return -ENOMEM;
422 while (count > 0) {
80ad89a0 423 sz = size_inside_page(p, count);
325fda71
KH
424 if (!is_vmalloc_or_module_addr((void *)p)) {
425 err = -ENXIO;
426 break;
427 }
80ad89a0
WF
428 sz = vread(kbuf, (char *)p, sz);
429 if (!sz)
1da177e4 430 break;
80ad89a0 431 if (copy_to_user(buf, kbuf, sz)) {
325fda71
KH
432 err = -EFAULT;
433 break;
1da177e4 434 }
80ad89a0
WF
435 count -= sz;
436 buf += sz;
437 read += sz;
438 p += sz;
1da177e4
LT
439 }
440 free_page((unsigned long)kbuf);
441 }
325fda71
KH
442 *ppos = p;
443 return read ? read : err;
1da177e4
LT
444}
445
446
d7d4d849
AM
447static ssize_t do_write_kmem(unsigned long p, const char __user *buf,
448 size_t count, loff_t *ppos)
1da177e4
LT
449{
450 ssize_t written, sz;
451 unsigned long copied;
452
453 written = 0;
454#ifdef __ARCH_HAS_NO_PAGE_ZERO_MAPPED
455 /* we don't have page 0 mapped on sparc and m68k.. */
ee32398f
WF
456 if (p < PAGE_SIZE) {
457 sz = size_inside_page(p, count);
1da177e4
LT
458 /* Hmm. Do something? */
459 buf += sz;
460 p += sz;
1da177e4
LT
461 count -= sz;
462 written += sz;
463 }
464#endif
465
466 while (count > 0) {
4707a341 467 void *ptr;
1da177e4 468
ee32398f 469 sz = size_inside_page(p, count);
1da177e4
LT
470
471 /*
d7d4d849
AM
472 * On ia64 if a page has been mapped somewhere as uncached, then
473 * it must also be accessed uncached by the kernel or data
474 * corruption may occur.
1da177e4 475 */
4707a341 476 ptr = xlate_dev_kmem_ptr((void *)p);
1da177e4
LT
477
478 copied = copy_from_user(ptr, buf, sz);
479 if (copied) {
c654d60e
JB
480 written += sz - copied;
481 if (written)
482 break;
1da177e4
LT
483 return -EFAULT;
484 }
485 buf += sz;
486 p += sz;
1da177e4
LT
487 count -= sz;
488 written += sz;
489 }
490
491 *ppos += written;
492 return written;
493}
494
1da177e4
LT
495/*
496 * This function writes to the *virtual* memory as seen by the kernel.
497 */
d7d4d849 498static ssize_t write_kmem(struct file *file, const char __user *buf,
1da177e4
LT
499 size_t count, loff_t *ppos)
500{
501 unsigned long p = *ppos;
502 ssize_t wrote = 0;
503 ssize_t virtr = 0;
890537b3 504 char *kbuf; /* k-addr because vwrite() takes vmlist_lock rwlock */
325fda71 505 int err = 0;
1da177e4
LT
506
507 if (p < (unsigned long) high_memory) {
80ad89a0
WF
508 unsigned long to_write = min_t(unsigned long, count,
509 (unsigned long)high_memory - p);
ee32398f 510 wrote = do_write_kmem(p, buf, to_write, ppos);
80ad89a0
WF
511 if (wrote != to_write)
512 return wrote;
1da177e4
LT
513 p += wrote;
514 buf += wrote;
515 count -= wrote;
516 }
517
518 if (count > 0) {
519 kbuf = (char *)__get_free_page(GFP_KERNEL);
520 if (!kbuf)
521 return wrote ? wrote : -ENOMEM;
522 while (count > 0) {
80ad89a0
WF
523 unsigned long sz = size_inside_page(p, count);
524 unsigned long n;
1da177e4 525
325fda71
KH
526 if (!is_vmalloc_or_module_addr((void *)p)) {
527 err = -ENXIO;
528 break;
529 }
80ad89a0
WF
530 n = copy_from_user(kbuf, buf, sz);
531 if (n) {
325fda71
KH
532 err = -EFAULT;
533 break;
1da177e4 534 }
c85e9a97 535 vwrite(kbuf, (char *)p, sz);
80ad89a0
WF
536 count -= sz;
537 buf += sz;
538 virtr += sz;
539 p += sz;
1da177e4
LT
540 }
541 free_page((unsigned long)kbuf);
542 }
543
325fda71
KH
544 *ppos = p;
545 return virtr + wrote ? : err;
1da177e4 546}
b781ecb6 547#endif
1da177e4 548
4f911d64 549#ifdef CONFIG_DEVPORT
d7d4d849 550static ssize_t read_port(struct file *file, char __user *buf,
1da177e4
LT
551 size_t count, loff_t *ppos)
552{
553 unsigned long i = *ppos;
554 char __user *tmp = buf;
555
556 if (!access_ok(VERIFY_WRITE, buf, count))
d7d4d849 557 return -EFAULT;
1da177e4 558 while (count-- > 0 && i < 65536) {
d7d4d849
AM
559 if (__put_user(inb(i), tmp) < 0)
560 return -EFAULT;
1da177e4
LT
561 i++;
562 tmp++;
563 }
564 *ppos = i;
565 return tmp-buf;
566}
567
d7d4d849 568static ssize_t write_port(struct file *file, const char __user *buf,
1da177e4
LT
569 size_t count, loff_t *ppos)
570{
571 unsigned long i = *ppos;
890537b3 572 const char __user *tmp = buf;
1da177e4 573
d7d4d849 574 if (!access_ok(VERIFY_READ, buf, count))
1da177e4
LT
575 return -EFAULT;
576 while (count-- > 0 && i < 65536) {
577 char c;
c654d60e
JB
578 if (__get_user(c, tmp)) {
579 if (tmp > buf)
580 break;
d7d4d849 581 return -EFAULT;
c654d60e 582 }
d7d4d849 583 outb(c, i);
1da177e4
LT
584 i++;
585 tmp++;
586 }
587 *ppos = i;
588 return tmp-buf;
589}
590#endif
591
d7d4d849 592static ssize_t read_null(struct file *file, char __user *buf,
1da177e4
LT
593 size_t count, loff_t *ppos)
594{
595 return 0;
596}
597
d7d4d849 598static ssize_t write_null(struct file *file, const char __user *buf,
1da177e4
LT
599 size_t count, loff_t *ppos)
600{
601 return count;
602}
603
162934de
ZB
604static ssize_t aio_read_null(struct kiocb *iocb, const struct iovec *iov,
605 unsigned long nr_segs, loff_t pos)
606{
607 return 0;
608}
609
610static ssize_t aio_write_null(struct kiocb *iocb, const struct iovec *iov,
611 unsigned long nr_segs, loff_t pos)
612{
613 return iov_length(iov, nr_segs);
614}
615
1ebd32fc
JA
616static int pipe_to_null(struct pipe_inode_info *info, struct pipe_buffer *buf,
617 struct splice_desc *sd)
618{
619 return sd->len;
620}
621
d7d4d849 622static ssize_t splice_write_null(struct pipe_inode_info *pipe, struct file *out,
1ebd32fc
JA
623 loff_t *ppos, size_t len, unsigned int flags)
624{
625 return splice_from_pipe(pipe, out, ppos, len, flags, pipe_to_null);
626}
627
13ba33e8 628static ssize_t read_iter_zero(struct kiocb *iocb, struct iov_iter *iter)
1da177e4 629{
13ba33e8 630 size_t written = 0;
1da177e4 631
13ba33e8
AV
632 while (iov_iter_count(iter)) {
633 size_t chunk = iov_iter_count(iter), n;
557ed1fa
NP
634 if (chunk > PAGE_SIZE)
635 chunk = PAGE_SIZE; /* Just for latency reasons */
13ba33e8
AV
636 n = iov_iter_zero(chunk, iter);
637 if (!n && iov_iter_count(iter))
638 return written ? written : -EFAULT;
639 written += n;
2b838687
LT
640 if (signal_pending(current))
641 return written ? written : -ERESTARTSYS;
1da177e4
LT
642 cond_resched();
643 }
13ba33e8 644 return written;
162934de
ZB
645}
646
d7d4d849 647static int mmap_zero(struct file *file, struct vm_area_struct *vma)
1da177e4 648{
557ed1fa 649#ifndef CONFIG_MMU
1da177e4 650 return -ENOSYS;
557ed1fa
NP
651#endif
652 if (vma->vm_flags & VM_SHARED)
653 return shmem_zero_setup(vma);
654 return 0;
1da177e4 655}
1da177e4 656
d7d4d849 657static ssize_t write_full(struct file *file, const char __user *buf,
1da177e4
LT
658 size_t count, loff_t *ppos)
659{
660 return -ENOSPC;
661}
662
663/*
664 * Special lseek() function for /dev/null and /dev/zero. Most notably, you
665 * can fopen() both devices with "a" now. This was previously impossible.
666 * -- SRB.
667 */
d7d4d849 668static loff_t null_lseek(struct file *file, loff_t offset, int orig)
1da177e4
LT
669{
670 return file->f_pos = 0;
671}
672
673/*
674 * The memory devices use the full 32/64 bits of the offset, and so we cannot
675 * check against negative addresses: they are ok. The return value is weird,
676 * though, in that case (0).
677 *
678 * also note that seeking relative to the "end of file" isn't supported:
679 * it has no meaning, so it returns -EINVAL.
680 */
d7d4d849 681static loff_t memory_lseek(struct file *file, loff_t offset, int orig)
1da177e4
LT
682{
683 loff_t ret;
684
496ad9aa 685 mutex_lock(&file_inode(file)->i_mutex);
1da177e4 686 switch (orig) {
d7d4d849
AM
687 case SEEK_CUR:
688 offset += file->f_pos;
d7d4d849
AM
689 case SEEK_SET:
690 /* to avoid userland mistaking f_pos=-9 as -EBADF=-9 */
71811f32 691 if (IS_ERR_VALUE((unsigned long long)offset)) {
d7d4d849 692 ret = -EOVERFLOW;
1da177e4 693 break;
d7d4d849
AM
694 }
695 file->f_pos = offset;
696 ret = file->f_pos;
697 force_successful_syscall_return();
698 break;
699 default:
700 ret = -EINVAL;
1da177e4 701 }
496ad9aa 702 mutex_unlock(&file_inode(file)->i_mutex);
1da177e4
LT
703 return ret;
704}
705
890537b3 706static int open_port(struct inode *inode, struct file *filp)
1da177e4
LT
707{
708 return capable(CAP_SYS_RAWIO) ? 0 : -EPERM;
709}
710
711#define zero_lseek null_lseek
712#define full_lseek null_lseek
713#define write_zero write_null
162934de 714#define aio_write_zero aio_write_null
1da177e4
LT
715#define open_mem open_port
716#define open_kmem open_mem
717
73f0718e 718static const struct file_operations __maybe_unused mem_fops = {
1da177e4
LT
719 .llseek = memory_lseek,
720 .read = read_mem,
721 .write = write_mem,
722 .mmap = mmap_mem,
723 .open = open_mem,
5da6185b 724 .get_unmapped_area = get_unmapped_area_mem,
1da177e4
LT
725};
726
b781ecb6 727#ifdef CONFIG_DEVKMEM
62322d25 728static const struct file_operations kmem_fops = {
1da177e4
LT
729 .llseek = memory_lseek,
730 .read = read_kmem,
731 .write = write_kmem,
732 .mmap = mmap_kmem,
733 .open = open_kmem,
5da6185b 734 .get_unmapped_area = get_unmapped_area_mem,
1da177e4 735};
b781ecb6 736#endif
1da177e4 737
62322d25 738static const struct file_operations null_fops = {
1da177e4
LT
739 .llseek = null_lseek,
740 .read = read_null,
741 .write = write_null,
162934de
ZB
742 .aio_read = aio_read_null,
743 .aio_write = aio_write_null,
1ebd32fc 744 .splice_write = splice_write_null,
1da177e4
LT
745};
746
4f911d64 747#ifdef CONFIG_DEVPORT
62322d25 748static const struct file_operations port_fops = {
1da177e4
LT
749 .llseek = memory_lseek,
750 .read = read_port,
751 .write = write_port,
752 .open = open_port,
753};
754#endif
755
62322d25 756static const struct file_operations zero_fops = {
1da177e4 757 .llseek = zero_lseek,
13ba33e8 758 .read = new_sync_read,
1da177e4 759 .write = write_zero,
13ba33e8 760 .read_iter = read_iter_zero,
162934de 761 .aio_write = aio_write_zero,
1da177e4
LT
762 .mmap = mmap_zero,
763};
764
5da6185b
DH
765/*
766 * capabilities for /dev/zero
767 * - permits private mappings, "copies" are taken of the source of zeros
371d217e 768 * - no writeback happens
5da6185b 769 */
1da177e4 770static struct backing_dev_info zero_bdi = {
d993831f 771 .name = "char/mem",
371d217e 772 .capabilities = BDI_CAP_MAP_COPY | BDI_CAP_NO_ACCT_AND_WRITEBACK,
1da177e4
LT
773};
774
62322d25 775static const struct file_operations full_fops = {
1da177e4 776 .llseek = full_lseek,
13ba33e8
AV
777 .read = new_sync_read,
778 .read_iter = read_iter_zero,
1da177e4
LT
779 .write = write_full,
780};
781
389e0cb9
KS
782static const struct memdev {
783 const char *name;
2c9ede55 784 umode_t mode;
389e0cb9
KS
785 const struct file_operations *fops;
786 struct backing_dev_info *dev_info;
787} devlist[] = {
73f0718e 788#ifdef CONFIG_DEVMEM
e454cea2 789 [1] = { "mem", 0, &mem_fops, &directly_mappable_cdev_bdi },
73f0718e 790#endif
b781ecb6 791#ifdef CONFIG_DEVKMEM
e454cea2 792 [2] = { "kmem", 0, &kmem_fops, &directly_mappable_cdev_bdi },
b781ecb6 793#endif
e454cea2 794 [3] = { "null", 0666, &null_fops, NULL },
4f911d64 795#ifdef CONFIG_DEVPORT
e454cea2 796 [4] = { "port", 0, &port_fops, NULL },
1da177e4 797#endif
e454cea2
KS
798 [5] = { "zero", 0666, &zero_fops, &zero_bdi },
799 [7] = { "full", 0666, &full_fops, NULL },
800 [8] = { "random", 0666, &random_fops, NULL },
801 [9] = { "urandom", 0666, &urandom_fops, NULL },
7f3a781d 802#ifdef CONFIG_PRINTK
e11fea92 803 [11] = { "kmsg", 0644, &kmsg_fops, NULL },
7f3a781d 804#endif
d6f47bef
ASF
805};
806
807static int memory_open(struct inode *inode, struct file *filp)
808{
389e0cb9
KS
809 int minor;
810 const struct memdev *dev;
d6f47bef 811
389e0cb9
KS
812 minor = iminor(inode);
813 if (minor >= ARRAY_SIZE(devlist))
205153aa 814 return -ENXIO;
d6f47bef 815
389e0cb9
KS
816 dev = &devlist[minor];
817 if (!dev->fops)
205153aa 818 return -ENXIO;
d6f47bef 819
389e0cb9
KS
820 filp->f_op = dev->fops;
821 if (dev->dev_info)
822 filp->f_mapping->backing_dev_info = dev->dev_info;
d6f47bef 823
4a3956c7
KH
824 /* Is /dev/mem or /dev/kmem ? */
825 if (dev->dev_info == &directly_mappable_cdev_bdi)
826 filp->f_mode |= FMODE_UNSIGNED_OFFSET;
827
389e0cb9 828 if (dev->fops->open)
205153aa
FW
829 return dev->fops->open(inode, filp);
830
831 return 0;
1da177e4
LT
832}
833
62322d25 834static const struct file_operations memory_fops = {
d7d4d849 835 .open = memory_open,
6038f373 836 .llseek = noop_llseek,
1da177e4
LT
837};
838
2c9ede55 839static char *mem_devnode(struct device *dev, umode_t *mode)
e454cea2
KS
840{
841 if (mode && devlist[MINOR(dev->devt)].mode)
842 *mode = devlist[MINOR(dev->devt)].mode;
843 return NULL;
844}
845
ca8eca68 846static struct class *mem_class;
1da177e4
LT
847
848static int __init chr_dev_init(void)
849{
389e0cb9 850 int minor;
e0bf68dd
PZ
851 int err;
852
853 err = bdi_init(&zero_bdi);
854 if (err)
855 return err;
1da177e4 856
d7d4d849 857 if (register_chrdev(MEM_MAJOR, "mem", &memory_fops))
1da177e4
LT
858 printk("unable to get major %d for memory devs\n", MEM_MAJOR);
859
ca8eca68 860 mem_class = class_create(THIS_MODULE, "mem");
6e191f7b
AB
861 if (IS_ERR(mem_class))
862 return PTR_ERR(mem_class);
863
e454cea2 864 mem_class->devnode = mem_devnode;
389e0cb9
KS
865 for (minor = 1; minor < ARRAY_SIZE(devlist); minor++) {
866 if (!devlist[minor].name)
867 continue;
e1612de9
HM
868
869 /*
890537b3 870 * Create /dev/port?
e1612de9
HM
871 */
872 if ((minor == DEVPORT_MINOR) && !arch_has_dev_port())
873 continue;
874
389e0cb9
KS
875 device_create(mem_class, NULL, MKDEV(MEM_MAJOR, minor),
876 NULL, devlist[minor].name);
877 }
ebf644c4 878
31d1d48e 879 return tty_init();
1da177e4
LT
880}
881
882fs_initcall(chr_dev_init);