mount: consolidate permission checks
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / drivers / char / mem.c
CommitLineData
1da177e4
LT
1/*
2 * linux/drivers/char/mem.c
3 *
4 * Copyright (C) 1991, 1992 Linus Torvalds
5 *
d7d4d849 6 * Added devfs support.
1da177e4 7 * Jan-11-1998, C. Scott Ananian <cananian@alumni.princeton.edu>
af901ca1 8 * Shared /dev/zero mmapping support, Feb 2000, Kanoj Sarcar <kanoj@sgi.com>
1da177e4
LT
9 */
10
1da177e4
LT
11#include <linux/mm.h>
12#include <linux/miscdevice.h>
13#include <linux/slab.h>
14#include <linux/vmalloc.h>
15#include <linux/mman.h>
16#include <linux/random.h>
17#include <linux/init.h>
18#include <linux/raw.h>
19#include <linux/tty.h>
20#include <linux/capability.h>
1da177e4
LT
21#include <linux/ptrace.h>
22#include <linux/device.h>
50b1fdbd
VG
23#include <linux/highmem.h>
24#include <linux/crash_dump.h>
1da177e4 25#include <linux/backing-dev.h>
315c215c 26#include <linux/bootmem.h>
d6b29d7c 27#include <linux/splice.h>
b8a3ad5b 28#include <linux/pfn.h>
66300e66 29#include <linux/export.h>
e1612de9 30#include <linux/io.h>
1da177e4
LT
31
32#include <asm/uaccess.h>
1da177e4
LT
33
34#ifdef CONFIG_IA64
35# include <linux/efi.h>
36#endif
37
e1612de9
HM
38#define DEVPORT_MINOR 4
39
f222318e
WF
40static inline unsigned long size_inside_page(unsigned long start,
41 unsigned long size)
42{
43 unsigned long sz;
44
7fabaddd 45 sz = PAGE_SIZE - (start & (PAGE_SIZE - 1));
f222318e 46
7fabaddd 47 return min(sz, size);
f222318e
WF
48}
49
1da177e4 50#ifndef ARCH_HAS_VALID_PHYS_ADDR_RANGE
7e6735c3 51static inline int valid_phys_addr_range(phys_addr_t addr, size_t count)
1da177e4 52{
cfaf346c 53 return addr + count <= __pa(high_memory);
1da177e4 54}
80851ef2 55
06c67bef 56static inline int valid_mmap_phys_addr_range(unsigned long pfn, size_t size)
80851ef2
BH
57{
58 return 1;
59}
1da177e4
LT
60#endif
61
d092633b 62#ifdef CONFIG_STRICT_DEVMEM
e2beb3ea 63static inline int range_is_allowed(unsigned long pfn, unsigned long size)
ae531c26 64{
e2beb3ea
VP
65 u64 from = ((u64)pfn) << PAGE_SHIFT;
66 u64 to = from + size;
67 u64 cursor = from;
68
69 while (cursor < to) {
70 if (!devmem_is_allowed(pfn)) {
71 printk(KERN_INFO
72 "Program %s tried to access /dev/mem between %Lx->%Lx.\n",
ae531c26
AV
73 current->comm, from, to);
74 return 0;
75 }
e2beb3ea
VP
76 cursor += PAGE_SIZE;
77 pfn++;
ae531c26
AV
78 }
79 return 1;
80}
81#else
e2beb3ea 82static inline int range_is_allowed(unsigned long pfn, unsigned long size)
ae531c26
AV
83{
84 return 1;
85}
86#endif
87
d7d4d849 88void __weak unxlate_dev_mem_ptr(unsigned long phys, void *addr)
e045fb2a 89{
90}
91
1da177e4 92/*
d7d4d849
AM
93 * This funcion reads the *physical* memory. The f_pos points directly to the
94 * memory location.
1da177e4 95 */
d7d4d849 96static ssize_t read_mem(struct file *file, char __user *buf,
1da177e4
LT
97 size_t count, loff_t *ppos)
98{
7e6735c3 99 phys_addr_t p = *ppos;
1da177e4
LT
100 ssize_t read, sz;
101 char *ptr;
102
136939a2 103 if (!valid_phys_addr_range(p, count))
1da177e4
LT
104 return -EFAULT;
105 read = 0;
106#ifdef __ARCH_HAS_NO_PAGE_ZERO_MAPPED
107 /* we don't have page 0 mapped on sparc and m68k.. */
108 if (p < PAGE_SIZE) {
7fabaddd 109 sz = size_inside_page(p, count);
1da177e4
LT
110 if (sz > 0) {
111 if (clear_user(buf, sz))
112 return -EFAULT;
d7d4d849
AM
113 buf += sz;
114 p += sz;
115 count -= sz;
116 read += sz;
1da177e4
LT
117 }
118 }
119#endif
120
121 while (count > 0) {
fa29e97b
WF
122 unsigned long remaining;
123
f222318e 124 sz = size_inside_page(p, count);
1da177e4 125
e045fb2a 126 if (!range_is_allowed(p >> PAGE_SHIFT, count))
127 return -EPERM;
128
1da177e4 129 /*
d7d4d849
AM
130 * On ia64 if a page has been mapped somewhere as uncached, then
131 * it must also be accessed uncached by the kernel or data
132 * corruption may occur.
1da177e4
LT
133 */
134 ptr = xlate_dev_mem_ptr(p);
e045fb2a 135 if (!ptr)
136 return -EFAULT;
1da177e4 137
fa29e97b 138 remaining = copy_to_user(buf, ptr, sz);
e045fb2a 139 unxlate_dev_mem_ptr(p, ptr);
fa29e97b
WF
140 if (remaining)
141 return -EFAULT;
e045fb2a 142
1da177e4
LT
143 buf += sz;
144 p += sz;
145 count -= sz;
146 read += sz;
147 }
148
149 *ppos += read;
150 return read;
151}
152
d7d4d849 153static ssize_t write_mem(struct file *file, const char __user *buf,
1da177e4
LT
154 size_t count, loff_t *ppos)
155{
7e6735c3 156 phys_addr_t p = *ppos;
1da177e4
LT
157 ssize_t written, sz;
158 unsigned long copied;
159 void *ptr;
160
136939a2 161 if (!valid_phys_addr_range(p, count))
1da177e4
LT
162 return -EFAULT;
163
164 written = 0;
165
166#ifdef __ARCH_HAS_NO_PAGE_ZERO_MAPPED
167 /* we don't have page 0 mapped on sparc and m68k.. */
168 if (p < PAGE_SIZE) {
7fabaddd 169 sz = size_inside_page(p, count);
1da177e4
LT
170 /* Hmm. Do something? */
171 buf += sz;
172 p += sz;
173 count -= sz;
174 written += sz;
175 }
176#endif
177
178 while (count > 0) {
f222318e 179 sz = size_inside_page(p, count);
1da177e4 180
e045fb2a 181 if (!range_is_allowed(p >> PAGE_SHIFT, sz))
182 return -EPERM;
183
1da177e4 184 /*
d7d4d849
AM
185 * On ia64 if a page has been mapped somewhere as uncached, then
186 * it must also be accessed uncached by the kernel or data
187 * corruption may occur.
1da177e4
LT
188 */
189 ptr = xlate_dev_mem_ptr(p);
e045fb2a 190 if (!ptr) {
191 if (written)
192 break;
193 return -EFAULT;
194 }
1da177e4
LT
195
196 copied = copy_from_user(ptr, buf, sz);
fa29e97b 197 unxlate_dev_mem_ptr(p, ptr);
1da177e4 198 if (copied) {
c654d60e
JB
199 written += sz - copied;
200 if (written)
201 break;
1da177e4
LT
202 return -EFAULT;
203 }
e045fb2a 204
1da177e4
LT
205 buf += sz;
206 p += sz;
207 count -= sz;
208 written += sz;
209 }
210
211 *ppos += written;
212 return written;
213}
214
d7d4d849 215int __weak phys_mem_access_prot_allowed(struct file *file,
f0970c13 216 unsigned long pfn, unsigned long size, pgprot_t *vma_prot)
217{
218 return 1;
219}
220
44ac8413 221#ifndef __HAVE_PHYS_MEM_ACCESS_PROT
d7d4d849
AM
222
223/*
224 * Architectures vary in how they handle caching for addresses
225 * outside of main memory.
226 *
227 */
ea56f411 228#ifdef pgprot_noncached
7e6735c3 229static int uncached_access(struct file *file, phys_addr_t addr)
d7d4d849
AM
230{
231#if defined(CONFIG_IA64)
232 /*
233 * On ia64, we ignore O_DSYNC because we cannot tolerate memory
234 * attribute aliases.
235 */
236 return !(efi_mem_attributes(addr) & EFI_MEMORY_WB);
237#elif defined(CONFIG_MIPS)
238 {
239 extern int __uncached_access(struct file *file,
240 unsigned long addr);
241
242 return __uncached_access(file, addr);
243 }
244#else
245 /*
246 * Accessing memory above the top the kernel knows about or through a
247 * file pointer
248 * that was marked O_DSYNC will be done non-cached.
249 */
250 if (file->f_flags & O_DSYNC)
251 return 1;
252 return addr >= __pa(high_memory);
253#endif
254}
ea56f411 255#endif
d7d4d849 256
44ac8413
BH
257static pgprot_t phys_mem_access_prot(struct file *file, unsigned long pfn,
258 unsigned long size, pgprot_t vma_prot)
259{
260#ifdef pgprot_noncached
7e6735c3 261 phys_addr_t offset = pfn << PAGE_SHIFT;
44ac8413
BH
262
263 if (uncached_access(file, offset))
264 return pgprot_noncached(vma_prot);
265#endif
266 return vma_prot;
267}
268#endif
269
5da6185b
DH
270#ifndef CONFIG_MMU
271static unsigned long get_unmapped_area_mem(struct file *file,
272 unsigned long addr,
273 unsigned long len,
274 unsigned long pgoff,
275 unsigned long flags)
276{
277 if (!valid_mmap_phys_addr_range(pgoff, len))
278 return (unsigned long) -EINVAL;
8a93258c 279 return pgoff << PAGE_SHIFT;
5da6185b
DH
280}
281
282/* can't do an in-place private mapping if there's no MMU */
283static inline int private_mapping_ok(struct vm_area_struct *vma)
284{
285 return vma->vm_flags & VM_MAYSHARE;
286}
287#else
288#define get_unmapped_area_mem NULL
289
290static inline int private_mapping_ok(struct vm_area_struct *vma)
291{
292 return 1;
293}
294#endif
295
f0f37e2f 296static const struct vm_operations_struct mmap_mem_ops = {
7ae8ed50
RR
297#ifdef CONFIG_HAVE_IOREMAP_PROT
298 .access = generic_access_phys
299#endif
e7f260a2 300};
301
d7d4d849 302static int mmap_mem(struct file *file, struct vm_area_struct *vma)
1da177e4 303{
80851ef2
BH
304 size_t size = vma->vm_end - vma->vm_start;
305
06c67bef 306 if (!valid_mmap_phys_addr_range(vma->vm_pgoff, size))
80851ef2
BH
307 return -EINVAL;
308
5da6185b
DH
309 if (!private_mapping_ok(vma))
310 return -ENOSYS;
311
e2beb3ea
VP
312 if (!range_is_allowed(vma->vm_pgoff, size))
313 return -EPERM;
314
f0970c13 315 if (!phys_mem_access_prot_allowed(file, vma->vm_pgoff, size,
316 &vma->vm_page_prot))
317 return -EINVAL;
318
8b150478 319 vma->vm_page_prot = phys_mem_access_prot(file, vma->vm_pgoff,
80851ef2 320 size,
1da177e4 321 vma->vm_page_prot);
1da177e4 322
e7f260a2 323 vma->vm_ops = &mmap_mem_ops;
324
314e51b9 325 /* Remap-pfn-range will mark the range VM_IO */
1da177e4
LT
326 if (remap_pfn_range(vma,
327 vma->vm_start,
328 vma->vm_pgoff,
80851ef2 329 size,
e7f260a2 330 vma->vm_page_prot)) {
1da177e4 331 return -EAGAIN;
e7f260a2 332 }
1da177e4
LT
333 return 0;
334}
335
b781ecb6 336#ifdef CONFIG_DEVKMEM
d7d4d849 337static int mmap_kmem(struct file *file, struct vm_area_struct *vma)
1da177e4 338{
4bb82551
LT
339 unsigned long pfn;
340
6d3154cc
LT
341 /* Turn a kernel-virtual address into a physical page frame */
342 pfn = __pa((u64)vma->vm_pgoff << PAGE_SHIFT) >> PAGE_SHIFT;
4bb82551 343
1da177e4 344 /*
d7d4d849
AM
345 * RED-PEN: on some architectures there is more mapped memory than
346 * available in mem_map which pfn_valid checks for. Perhaps should add a
347 * new macro here.
1da177e4
LT
348 *
349 * RED-PEN: vmalloc is not supported right now.
350 */
4bb82551 351 if (!pfn_valid(pfn))
1da177e4 352 return -EIO;
4bb82551
LT
353
354 vma->vm_pgoff = pfn;
1da177e4
LT
355 return mmap_mem(file, vma);
356}
b781ecb6 357#endif
1da177e4 358
50b1fdbd
VG
359#ifdef CONFIG_CRASH_DUMP
360/*
361 * Read memory corresponding to the old kernel.
50b1fdbd 362 */
315c215c 363static ssize_t read_oldmem(struct file *file, char __user *buf,
50b1fdbd
VG
364 size_t count, loff_t *ppos)
365{
315c215c
VG
366 unsigned long pfn, offset;
367 size_t read = 0, csize;
368 int rc = 0;
50b1fdbd 369
72414d3f 370 while (count) {
50b1fdbd 371 pfn = *ppos / PAGE_SIZE;
315c215c
VG
372 if (pfn > saved_max_pfn)
373 return read;
50b1fdbd 374
315c215c
VG
375 offset = (unsigned long)(*ppos % PAGE_SIZE);
376 if (count > PAGE_SIZE - offset)
377 csize = PAGE_SIZE - offset;
378 else
379 csize = count;
50b1fdbd 380
315c215c
VG
381 rc = copy_oldmem_page(pfn, buf, csize, offset, 1);
382 if (rc < 0)
383 return rc;
50b1fdbd
VG
384 buf += csize;
385 *ppos += csize;
386 read += csize;
387 count -= csize;
388 }
50b1fdbd
VG
389 return read;
390}
391#endif
1da177e4 392
b781ecb6 393#ifdef CONFIG_DEVKMEM
1da177e4
LT
394/*
395 * This function reads the *virtual* memory as seen by the kernel.
396 */
d7d4d849 397static ssize_t read_kmem(struct file *file, char __user *buf,
1da177e4
LT
398 size_t count, loff_t *ppos)
399{
400 unsigned long p = *ppos;
401 ssize_t low_count, read, sz;
402 char * kbuf; /* k-addr because vread() takes vmlist_lock rwlock */
325fda71 403 int err = 0;
1da177e4
LT
404
405 read = 0;
406 if (p < (unsigned long) high_memory) {
407 low_count = count;
d7d4d849
AM
408 if (count > (unsigned long)high_memory - p)
409 low_count = (unsigned long)high_memory - p;
1da177e4
LT
410
411#ifdef __ARCH_HAS_NO_PAGE_ZERO_MAPPED
412 /* we don't have page 0 mapped on sparc and m68k.. */
413 if (p < PAGE_SIZE && low_count > 0) {
7fabaddd
WF
414 sz = size_inside_page(p, low_count);
415 if (clear_user(buf, sz))
1da177e4 416 return -EFAULT;
7fabaddd
WF
417 buf += sz;
418 p += sz;
419 read += sz;
420 low_count -= sz;
421 count -= sz;
1da177e4
LT
422 }
423#endif
424 while (low_count > 0) {
f222318e 425 sz = size_inside_page(p, low_count);
1da177e4
LT
426
427 /*
428 * On ia64 if a page has been mapped somewhere as
429 * uncached, then it must also be accessed uncached
430 * by the kernel or data corruption may occur
431 */
432 kbuf = xlate_dev_kmem_ptr((char *)p);
433
434 if (copy_to_user(buf, kbuf, sz))
435 return -EFAULT;
436 buf += sz;
437 p += sz;
438 read += sz;
439 low_count -= sz;
440 count -= sz;
441 }
442 }
443
444 if (count > 0) {
445 kbuf = (char *)__get_free_page(GFP_KERNEL);
446 if (!kbuf)
447 return -ENOMEM;
448 while (count > 0) {
80ad89a0 449 sz = size_inside_page(p, count);
325fda71
KH
450 if (!is_vmalloc_or_module_addr((void *)p)) {
451 err = -ENXIO;
452 break;
453 }
80ad89a0
WF
454 sz = vread(kbuf, (char *)p, sz);
455 if (!sz)
1da177e4 456 break;
80ad89a0 457 if (copy_to_user(buf, kbuf, sz)) {
325fda71
KH
458 err = -EFAULT;
459 break;
1da177e4 460 }
80ad89a0
WF
461 count -= sz;
462 buf += sz;
463 read += sz;
464 p += sz;
1da177e4
LT
465 }
466 free_page((unsigned long)kbuf);
467 }
325fda71
KH
468 *ppos = p;
469 return read ? read : err;
1da177e4
LT
470}
471
472
d7d4d849
AM
473static ssize_t do_write_kmem(unsigned long p, const char __user *buf,
474 size_t count, loff_t *ppos)
1da177e4
LT
475{
476 ssize_t written, sz;
477 unsigned long copied;
478
479 written = 0;
480#ifdef __ARCH_HAS_NO_PAGE_ZERO_MAPPED
481 /* we don't have page 0 mapped on sparc and m68k.. */
ee32398f
WF
482 if (p < PAGE_SIZE) {
483 sz = size_inside_page(p, count);
1da177e4
LT
484 /* Hmm. Do something? */
485 buf += sz;
486 p += sz;
1da177e4
LT
487 count -= sz;
488 written += sz;
489 }
490#endif
491
492 while (count > 0) {
493 char *ptr;
1da177e4 494
ee32398f 495 sz = size_inside_page(p, count);
1da177e4
LT
496
497 /*
d7d4d849
AM
498 * On ia64 if a page has been mapped somewhere as uncached, then
499 * it must also be accessed uncached by the kernel or data
500 * corruption may occur.
1da177e4 501 */
ee32398f 502 ptr = xlate_dev_kmem_ptr((char *)p);
1da177e4
LT
503
504 copied = copy_from_user(ptr, buf, sz);
505 if (copied) {
c654d60e
JB
506 written += sz - copied;
507 if (written)
508 break;
1da177e4
LT
509 return -EFAULT;
510 }
511 buf += sz;
512 p += sz;
1da177e4
LT
513 count -= sz;
514 written += sz;
515 }
516
517 *ppos += written;
518 return written;
519}
520
1da177e4
LT
521/*
522 * This function writes to the *virtual* memory as seen by the kernel.
523 */
d7d4d849 524static ssize_t write_kmem(struct file *file, const char __user *buf,
1da177e4
LT
525 size_t count, loff_t *ppos)
526{
527 unsigned long p = *ppos;
528 ssize_t wrote = 0;
529 ssize_t virtr = 0;
1da177e4 530 char * kbuf; /* k-addr because vwrite() takes vmlist_lock rwlock */
325fda71 531 int err = 0;
1da177e4
LT
532
533 if (p < (unsigned long) high_memory) {
80ad89a0
WF
534 unsigned long to_write = min_t(unsigned long, count,
535 (unsigned long)high_memory - p);
ee32398f 536 wrote = do_write_kmem(p, buf, to_write, ppos);
80ad89a0
WF
537 if (wrote != to_write)
538 return wrote;
1da177e4
LT
539 p += wrote;
540 buf += wrote;
541 count -= wrote;
542 }
543
544 if (count > 0) {
545 kbuf = (char *)__get_free_page(GFP_KERNEL);
546 if (!kbuf)
547 return wrote ? wrote : -ENOMEM;
548 while (count > 0) {
80ad89a0
WF
549 unsigned long sz = size_inside_page(p, count);
550 unsigned long n;
1da177e4 551
325fda71
KH
552 if (!is_vmalloc_or_module_addr((void *)p)) {
553 err = -ENXIO;
554 break;
555 }
80ad89a0
WF
556 n = copy_from_user(kbuf, buf, sz);
557 if (n) {
325fda71
KH
558 err = -EFAULT;
559 break;
1da177e4 560 }
c85e9a97 561 vwrite(kbuf, (char *)p, sz);
80ad89a0
WF
562 count -= sz;
563 buf += sz;
564 virtr += sz;
565 p += sz;
1da177e4
LT
566 }
567 free_page((unsigned long)kbuf);
568 }
569
325fda71
KH
570 *ppos = p;
571 return virtr + wrote ? : err;
1da177e4 572}
b781ecb6 573#endif
1da177e4 574
4f911d64 575#ifdef CONFIG_DEVPORT
d7d4d849 576static ssize_t read_port(struct file *file, char __user *buf,
1da177e4
LT
577 size_t count, loff_t *ppos)
578{
579 unsigned long i = *ppos;
580 char __user *tmp = buf;
581
582 if (!access_ok(VERIFY_WRITE, buf, count))
d7d4d849 583 return -EFAULT;
1da177e4 584 while (count-- > 0 && i < 65536) {
d7d4d849
AM
585 if (__put_user(inb(i), tmp) < 0)
586 return -EFAULT;
1da177e4
LT
587 i++;
588 tmp++;
589 }
590 *ppos = i;
591 return tmp-buf;
592}
593
d7d4d849 594static ssize_t write_port(struct file *file, const char __user *buf,
1da177e4
LT
595 size_t count, loff_t *ppos)
596{
597 unsigned long i = *ppos;
598 const char __user * tmp = buf;
599
d7d4d849 600 if (!access_ok(VERIFY_READ, buf, count))
1da177e4
LT
601 return -EFAULT;
602 while (count-- > 0 && i < 65536) {
603 char c;
c654d60e
JB
604 if (__get_user(c, tmp)) {
605 if (tmp > buf)
606 break;
d7d4d849 607 return -EFAULT;
c654d60e 608 }
d7d4d849 609 outb(c, i);
1da177e4
LT
610 i++;
611 tmp++;
612 }
613 *ppos = i;
614 return tmp-buf;
615}
616#endif
617
d7d4d849 618static ssize_t read_null(struct file *file, char __user *buf,
1da177e4
LT
619 size_t count, loff_t *ppos)
620{
621 return 0;
622}
623
d7d4d849 624static ssize_t write_null(struct file *file, const char __user *buf,
1da177e4
LT
625 size_t count, loff_t *ppos)
626{
627 return count;
628}
629
1ebd32fc
JA
630static int pipe_to_null(struct pipe_inode_info *info, struct pipe_buffer *buf,
631 struct splice_desc *sd)
632{
633 return sd->len;
634}
635
d7d4d849 636static ssize_t splice_write_null(struct pipe_inode_info *pipe, struct file *out,
1ebd32fc
JA
637 loff_t *ppos, size_t len, unsigned int flags)
638{
639 return splice_from_pipe(pipe, out, ppos, len, flags, pipe_to_null);
640}
641
d7d4d849 642static ssize_t read_zero(struct file *file, char __user *buf,
1da177e4
LT
643 size_t count, loff_t *ppos)
644{
557ed1fa 645 size_t written;
1da177e4
LT
646
647 if (!count)
648 return 0;
649
650 if (!access_ok(VERIFY_WRITE, buf, count))
651 return -EFAULT;
652
557ed1fa
NP
653 written = 0;
654 while (count) {
655 unsigned long unwritten;
656 size_t chunk = count;
1da177e4 657
557ed1fa
NP
658 if (chunk > PAGE_SIZE)
659 chunk = PAGE_SIZE; /* Just for latency reasons */
bb521c5d 660 unwritten = __clear_user(buf, chunk);
557ed1fa 661 written += chunk - unwritten;
1da177e4 662 if (unwritten)
557ed1fa 663 break;
2b838687
LT
664 if (signal_pending(current))
665 return written ? written : -ERESTARTSYS;
1da177e4 666 buf += chunk;
557ed1fa 667 count -= chunk;
1da177e4
LT
668 cond_resched();
669 }
557ed1fa 670 return written ? written : -EFAULT;
1da177e4
LT
671}
672
d7d4d849 673static int mmap_zero(struct file *file, struct vm_area_struct *vma)
1da177e4 674{
557ed1fa 675#ifndef CONFIG_MMU
1da177e4 676 return -ENOSYS;
557ed1fa
NP
677#endif
678 if (vma->vm_flags & VM_SHARED)
679 return shmem_zero_setup(vma);
680 return 0;
1da177e4 681}
1da177e4 682
d7d4d849 683static ssize_t write_full(struct file *file, const char __user *buf,
1da177e4
LT
684 size_t count, loff_t *ppos)
685{
686 return -ENOSPC;
687}
688
689/*
690 * Special lseek() function for /dev/null and /dev/zero. Most notably, you
691 * can fopen() both devices with "a" now. This was previously impossible.
692 * -- SRB.
693 */
d7d4d849 694static loff_t null_lseek(struct file *file, loff_t offset, int orig)
1da177e4
LT
695{
696 return file->f_pos = 0;
697}
698
699/*
700 * The memory devices use the full 32/64 bits of the offset, and so we cannot
701 * check against negative addresses: they are ok. The return value is weird,
702 * though, in that case (0).
703 *
704 * also note that seeking relative to the "end of file" isn't supported:
705 * it has no meaning, so it returns -EINVAL.
706 */
d7d4d849 707static loff_t memory_lseek(struct file *file, loff_t offset, int orig)
1da177e4
LT
708{
709 loff_t ret;
710
a7113a96 711 mutex_lock(&file->f_path.dentry->d_inode->i_mutex);
1da177e4 712 switch (orig) {
d7d4d849
AM
713 case SEEK_CUR:
714 offset += file->f_pos;
d7d4d849
AM
715 case SEEK_SET:
716 /* to avoid userland mistaking f_pos=-9 as -EBADF=-9 */
717 if ((unsigned long long)offset >= ~0xFFFULL) {
718 ret = -EOVERFLOW;
1da177e4 719 break;
d7d4d849
AM
720 }
721 file->f_pos = offset;
722 ret = file->f_pos;
723 force_successful_syscall_return();
724 break;
725 default:
726 ret = -EINVAL;
1da177e4 727 }
a7113a96 728 mutex_unlock(&file->f_path.dentry->d_inode->i_mutex);
1da177e4
LT
729 return ret;
730}
731
732static int open_port(struct inode * inode, struct file * filp)
733{
734 return capable(CAP_SYS_RAWIO) ? 0 : -EPERM;
735}
736
737#define zero_lseek null_lseek
738#define full_lseek null_lseek
739#define write_zero write_null
740#define read_full read_zero
741#define open_mem open_port
742#define open_kmem open_mem
50b1fdbd 743#define open_oldmem open_mem
1da177e4 744
62322d25 745static const struct file_operations mem_fops = {
1da177e4
LT
746 .llseek = memory_lseek,
747 .read = read_mem,
748 .write = write_mem,
749 .mmap = mmap_mem,
750 .open = open_mem,
5da6185b 751 .get_unmapped_area = get_unmapped_area_mem,
1da177e4
LT
752};
753
b781ecb6 754#ifdef CONFIG_DEVKMEM
62322d25 755static const struct file_operations kmem_fops = {
1da177e4
LT
756 .llseek = memory_lseek,
757 .read = read_kmem,
758 .write = write_kmem,
759 .mmap = mmap_kmem,
760 .open = open_kmem,
5da6185b 761 .get_unmapped_area = get_unmapped_area_mem,
1da177e4 762};
b781ecb6 763#endif
1da177e4 764
62322d25 765static const struct file_operations null_fops = {
1da177e4
LT
766 .llseek = null_lseek,
767 .read = read_null,
768 .write = write_null,
1ebd32fc 769 .splice_write = splice_write_null,
1da177e4
LT
770};
771
4f911d64 772#ifdef CONFIG_DEVPORT
62322d25 773static const struct file_operations port_fops = {
1da177e4
LT
774 .llseek = memory_lseek,
775 .read = read_port,
776 .write = write_port,
777 .open = open_port,
778};
779#endif
780
62322d25 781static const struct file_operations zero_fops = {
1da177e4
LT
782 .llseek = zero_lseek,
783 .read = read_zero,
784 .write = write_zero,
785 .mmap = mmap_zero,
786};
787
5da6185b
DH
788/*
789 * capabilities for /dev/zero
790 * - permits private mappings, "copies" are taken of the source of zeros
371d217e 791 * - no writeback happens
5da6185b 792 */
1da177e4 793static struct backing_dev_info zero_bdi = {
d993831f 794 .name = "char/mem",
371d217e 795 .capabilities = BDI_CAP_MAP_COPY | BDI_CAP_NO_ACCT_AND_WRITEBACK,
1da177e4
LT
796};
797
62322d25 798static const struct file_operations full_fops = {
1da177e4
LT
799 .llseek = full_lseek,
800 .read = read_full,
801 .write = write_full,
802};
803
50b1fdbd 804#ifdef CONFIG_CRASH_DUMP
62322d25 805static const struct file_operations oldmem_fops = {
50b1fdbd
VG
806 .read = read_oldmem,
807 .open = open_oldmem,
6038f373 808 .llseek = default_llseek,
50b1fdbd
VG
809};
810#endif
811
389e0cb9
KS
812static const struct memdev {
813 const char *name;
2c9ede55 814 umode_t mode;
389e0cb9
KS
815 const struct file_operations *fops;
816 struct backing_dev_info *dev_info;
817} devlist[] = {
e454cea2 818 [1] = { "mem", 0, &mem_fops, &directly_mappable_cdev_bdi },
b781ecb6 819#ifdef CONFIG_DEVKMEM
e454cea2 820 [2] = { "kmem", 0, &kmem_fops, &directly_mappable_cdev_bdi },
b781ecb6 821#endif
e454cea2 822 [3] = { "null", 0666, &null_fops, NULL },
4f911d64 823#ifdef CONFIG_DEVPORT
e454cea2 824 [4] = { "port", 0, &port_fops, NULL },
1da177e4 825#endif
e454cea2
KS
826 [5] = { "zero", 0666, &zero_fops, &zero_bdi },
827 [7] = { "full", 0666, &full_fops, NULL },
828 [8] = { "random", 0666, &random_fops, NULL },
829 [9] = { "urandom", 0666, &urandom_fops, NULL },
7f3a781d 830#ifdef CONFIG_PRINTK
e11fea92 831 [11] = { "kmsg", 0644, &kmsg_fops, NULL },
7f3a781d 832#endif
50b1fdbd 833#ifdef CONFIG_CRASH_DUMP
e454cea2 834 [12] = { "oldmem", 0, &oldmem_fops, NULL },
50b1fdbd 835#endif
d6f47bef
ASF
836};
837
838static int memory_open(struct inode *inode, struct file *filp)
839{
389e0cb9
KS
840 int minor;
841 const struct memdev *dev;
d6f47bef 842
389e0cb9
KS
843 minor = iminor(inode);
844 if (minor >= ARRAY_SIZE(devlist))
205153aa 845 return -ENXIO;
d6f47bef 846
389e0cb9
KS
847 dev = &devlist[minor];
848 if (!dev->fops)
205153aa 849 return -ENXIO;
d6f47bef 850
389e0cb9
KS
851 filp->f_op = dev->fops;
852 if (dev->dev_info)
853 filp->f_mapping->backing_dev_info = dev->dev_info;
d6f47bef 854
4a3956c7
KH
855 /* Is /dev/mem or /dev/kmem ? */
856 if (dev->dev_info == &directly_mappable_cdev_bdi)
857 filp->f_mode |= FMODE_UNSIGNED_OFFSET;
858
389e0cb9 859 if (dev->fops->open)
205153aa
FW
860 return dev->fops->open(inode, filp);
861
862 return 0;
1da177e4
LT
863}
864
62322d25 865static const struct file_operations memory_fops = {
d7d4d849 866 .open = memory_open,
6038f373 867 .llseek = noop_llseek,
1da177e4
LT
868};
869
2c9ede55 870static char *mem_devnode(struct device *dev, umode_t *mode)
e454cea2
KS
871{
872 if (mode && devlist[MINOR(dev->devt)].mode)
873 *mode = devlist[MINOR(dev->devt)].mode;
874 return NULL;
875}
876
ca8eca68 877static struct class *mem_class;
1da177e4
LT
878
879static int __init chr_dev_init(void)
880{
389e0cb9 881 int minor;
e0bf68dd
PZ
882 int err;
883
884 err = bdi_init(&zero_bdi);
885 if (err)
886 return err;
1da177e4 887
d7d4d849 888 if (register_chrdev(MEM_MAJOR, "mem", &memory_fops))
1da177e4
LT
889 printk("unable to get major %d for memory devs\n", MEM_MAJOR);
890
ca8eca68 891 mem_class = class_create(THIS_MODULE, "mem");
6e191f7b
AB
892 if (IS_ERR(mem_class))
893 return PTR_ERR(mem_class);
894
e454cea2 895 mem_class->devnode = mem_devnode;
389e0cb9
KS
896 for (minor = 1; minor < ARRAY_SIZE(devlist); minor++) {
897 if (!devlist[minor].name)
898 continue;
e1612de9
HM
899
900 /*
901 * Create /dev/port?
902 */
903 if ((minor == DEVPORT_MINOR) && !arch_has_dev_port())
904 continue;
905
389e0cb9
KS
906 device_create(mem_class, NULL, MKDEV(MEM_MAJOR, minor),
907 NULL, devlist[minor].name);
908 }
ebf644c4 909
31d1d48e 910 return tty_init();
1da177e4
LT
911}
912
913fs_initcall(chr_dev_init);