]>
Commit | Line | Data |
---|---|---|
b2441318 | 1 | // SPDX-License-Identifier: GPL-2.0 |
1da177e4 LT |
2 | /* |
3 | * linux/drivers/char/mem.c | |
4 | * | |
5 | * Copyright (C) 1991, 1992 Linus Torvalds | |
6 | * | |
d7d4d849 | 7 | * Added devfs support. |
1da177e4 | 8 | * Jan-11-1998, C. Scott Ananian <[email protected]> |
af901ca1 | 9 | * Shared /dev/zero mmapping support, Feb 2000, Kanoj Sarcar <[email protected]> |
1da177e4 LT |
10 | */ |
11 | ||
1da177e4 LT |
12 | #include <linux/mm.h> |
13 | #include <linux/miscdevice.h> | |
14 | #include <linux/slab.h> | |
15 | #include <linux/vmalloc.h> | |
16 | #include <linux/mman.h> | |
17 | #include <linux/random.h> | |
18 | #include <linux/init.h> | |
1da177e4 LT |
19 | #include <linux/tty.h> |
20 | #include <linux/capability.h> | |
1da177e4 LT |
21 | #include <linux/ptrace.h> |
22 | #include <linux/device.h> | |
50b1fdbd | 23 | #include <linux/highmem.h> |
1da177e4 | 24 | #include <linux/backing-dev.h> |
c01d5b30 | 25 | #include <linux/shmem_fs.h> |
d6b29d7c | 26 | #include <linux/splice.h> |
b8a3ad5b | 27 | #include <linux/pfn.h> |
66300e66 | 28 | #include <linux/export.h> |
e1612de9 | 29 | #include <linux/io.h> |
e2e40f2c | 30 | #include <linux/uio.h> |
35b6c7e4 | 31 | #include <linux/uaccess.h> |
9b9d8dda | 32 | #include <linux/security.h> |
1da177e4 | 33 | |
3234ac66 | 34 | #define DEVMEM_MINOR 1 |
e1612de9 HM |
35 | #define DEVPORT_MINOR 4 |
36 | ||
f222318e WF |
37 | static inline unsigned long size_inside_page(unsigned long start, |
38 | unsigned long size) | |
39 | { | |
40 | unsigned long sz; | |
41 | ||
7fabaddd | 42 | sz = PAGE_SIZE - (start & (PAGE_SIZE - 1)); |
f222318e | 43 | |
7fabaddd | 44 | return min(sz, size); |
f222318e WF |
45 | } |
46 | ||
1da177e4 | 47 | #ifndef ARCH_HAS_VALID_PHYS_ADDR_RANGE |
7e6735c3 | 48 | static inline int valid_phys_addr_range(phys_addr_t addr, size_t count) |
1da177e4 | 49 | { |
cfaf346c | 50 | return addr + count <= __pa(high_memory); |
1da177e4 | 51 | } |
80851ef2 | 52 | |
06c67bef | 53 | static inline int valid_mmap_phys_addr_range(unsigned long pfn, size_t size) |
80851ef2 BH |
54 | { |
55 | return 1; | |
56 | } | |
1da177e4 LT |
57 | #endif |
58 | ||
d092633b | 59 | #ifdef CONFIG_STRICT_DEVMEM |
a4866aa8 KC |
60 | static inline int page_is_allowed(unsigned long pfn) |
61 | { | |
62 | return devmem_is_allowed(pfn); | |
63 | } | |
e2beb3ea | 64 | static inline int range_is_allowed(unsigned long pfn, unsigned long size) |
ae531c26 | 65 | { |
e2beb3ea VP |
66 | u64 from = ((u64)pfn) << PAGE_SHIFT; |
67 | u64 to = from + size; | |
68 | u64 cursor = from; | |
69 | ||
70 | while (cursor < to) { | |
39380b80 | 71 | if (!devmem_is_allowed(pfn)) |
ae531c26 | 72 | return 0; |
e2beb3ea VP |
73 | cursor += PAGE_SIZE; |
74 | pfn++; | |
ae531c26 AV |
75 | } |
76 | return 1; | |
77 | } | |
78 | #else | |
a4866aa8 KC |
79 | static inline int page_is_allowed(unsigned long pfn) |
80 | { | |
81 | return 1; | |
82 | } | |
e2beb3ea | 83 | static inline int range_is_allowed(unsigned long pfn, unsigned long size) |
ae531c26 AV |
84 | { |
85 | return 1; | |
86 | } | |
87 | #endif | |
88 | ||
8619e5bd TH |
89 | static inline bool should_stop_iteration(void) |
90 | { | |
91 | if (need_resched()) | |
92 | cond_resched(); | |
830a4e5c | 93 | return signal_pending(current); |
8619e5bd TH |
94 | } |
95 | ||
1da177e4 | 96 | /* |
d7d4d849 AM |
97 | * This funcion reads the *physical* memory. The f_pos points directly to the |
98 | * memory location. | |
1da177e4 | 99 | */ |
d7d4d849 | 100 | static ssize_t read_mem(struct file *file, char __user *buf, |
1da177e4 LT |
101 | size_t count, loff_t *ppos) |
102 | { | |
7e6735c3 | 103 | phys_addr_t p = *ppos; |
1da177e4 | 104 | ssize_t read, sz; |
4707a341 | 105 | void *ptr; |
22ec1a2a KC |
106 | char *bounce; |
107 | int err; | |
1da177e4 | 108 | |
08d2d00b PT |
109 | if (p != *ppos) |
110 | return 0; | |
111 | ||
136939a2 | 112 | if (!valid_phys_addr_range(p, count)) |
1da177e4 LT |
113 | return -EFAULT; |
114 | read = 0; | |
115 | #ifdef __ARCH_HAS_NO_PAGE_ZERO_MAPPED | |
116 | /* we don't have page 0 mapped on sparc and m68k.. */ | |
117 | if (p < PAGE_SIZE) { | |
7fabaddd | 118 | sz = size_inside_page(p, count); |
1da177e4 LT |
119 | if (sz > 0) { |
120 | if (clear_user(buf, sz)) | |
121 | return -EFAULT; | |
d7d4d849 AM |
122 | buf += sz; |
123 | p += sz; | |
124 | count -= sz; | |
125 | read += sz; | |
1da177e4 LT |
126 | } |
127 | } | |
128 | #endif | |
129 | ||
22ec1a2a KC |
130 | bounce = kmalloc(PAGE_SIZE, GFP_KERNEL); |
131 | if (!bounce) | |
132 | return -ENOMEM; | |
133 | ||
1da177e4 | 134 | while (count > 0) { |
fa29e97b | 135 | unsigned long remaining; |
b5b38200 | 136 | int allowed, probe; |
fa29e97b | 137 | |
f222318e | 138 | sz = size_inside_page(p, count); |
1da177e4 | 139 | |
22ec1a2a | 140 | err = -EPERM; |
a4866aa8 KC |
141 | allowed = page_is_allowed(p >> PAGE_SHIFT); |
142 | if (!allowed) | |
22ec1a2a KC |
143 | goto failed; |
144 | ||
145 | err = -EFAULT; | |
a4866aa8 KC |
146 | if (allowed == 2) { |
147 | /* Show zeros for restricted memory. */ | |
148 | remaining = clear_user(buf, sz); | |
149 | } else { | |
150 | /* | |
151 | * On ia64 if a page has been mapped somewhere as | |
152 | * uncached, then it must also be accessed uncached | |
153 | * by the kernel or data corruption may occur. | |
154 | */ | |
155 | ptr = xlate_dev_mem_ptr(p); | |
156 | if (!ptr) | |
22ec1a2a | 157 | goto failed; |
a4866aa8 | 158 | |
fe557319 | 159 | probe = copy_from_kernel_nofault(bounce, ptr, sz); |
a4866aa8 | 160 | unxlate_dev_mem_ptr(p, ptr); |
b5b38200 | 161 | if (probe) |
22ec1a2a KC |
162 | goto failed; |
163 | ||
164 | remaining = copy_to_user(buf, bounce, sz); | |
a4866aa8 | 165 | } |
1da177e4 | 166 | |
fa29e97b | 167 | if (remaining) |
22ec1a2a | 168 | goto failed; |
e045fb2a | 169 | |
1da177e4 LT |
170 | buf += sz; |
171 | p += sz; | |
172 | count -= sz; | |
173 | read += sz; | |
8619e5bd TH |
174 | if (should_stop_iteration()) |
175 | break; | |
1da177e4 | 176 | } |
22ec1a2a | 177 | kfree(bounce); |
1da177e4 LT |
178 | |
179 | *ppos += read; | |
180 | return read; | |
22ec1a2a KC |
181 | |
182 | failed: | |
183 | kfree(bounce); | |
184 | return err; | |
1da177e4 LT |
185 | } |
186 | ||
d7d4d849 | 187 | static ssize_t write_mem(struct file *file, const char __user *buf, |
1da177e4 LT |
188 | size_t count, loff_t *ppos) |
189 | { | |
7e6735c3 | 190 | phys_addr_t p = *ppos; |
1da177e4 LT |
191 | ssize_t written, sz; |
192 | unsigned long copied; | |
193 | void *ptr; | |
194 | ||
08d2d00b PT |
195 | if (p != *ppos) |
196 | return -EFBIG; | |
197 | ||
136939a2 | 198 | if (!valid_phys_addr_range(p, count)) |
1da177e4 LT |
199 | return -EFAULT; |
200 | ||
201 | written = 0; | |
202 | ||
203 | #ifdef __ARCH_HAS_NO_PAGE_ZERO_MAPPED | |
204 | /* we don't have page 0 mapped on sparc and m68k.. */ | |
205 | if (p < PAGE_SIZE) { | |
7fabaddd | 206 | sz = size_inside_page(p, count); |
1da177e4 LT |
207 | /* Hmm. Do something? */ |
208 | buf += sz; | |
209 | p += sz; | |
210 | count -= sz; | |
211 | written += sz; | |
212 | } | |
213 | #endif | |
214 | ||
215 | while (count > 0) { | |
a4866aa8 KC |
216 | int allowed; |
217 | ||
f222318e | 218 | sz = size_inside_page(p, count); |
1da177e4 | 219 | |
a4866aa8 KC |
220 | allowed = page_is_allowed(p >> PAGE_SHIFT); |
221 | if (!allowed) | |
e045fb2a | 222 | return -EPERM; |
223 | ||
a4866aa8 KC |
224 | /* Skip actual writing when a page is marked as restricted. */ |
225 | if (allowed == 1) { | |
226 | /* | |
227 | * On ia64 if a page has been mapped somewhere as | |
228 | * uncached, then it must also be accessed uncached | |
229 | * by the kernel or data corruption may occur. | |
230 | */ | |
231 | ptr = xlate_dev_mem_ptr(p); | |
232 | if (!ptr) { | |
233 | if (written) | |
234 | break; | |
235 | return -EFAULT; | |
236 | } | |
237 | ||
238 | copied = copy_from_user(ptr, buf, sz); | |
239 | unxlate_dev_mem_ptr(p, ptr); | |
240 | if (copied) { | |
241 | written += sz - copied; | |
242 | if (written) | |
243 | break; | |
244 | return -EFAULT; | |
245 | } | |
1da177e4 | 246 | } |
e045fb2a | 247 | |
1da177e4 LT |
248 | buf += sz; |
249 | p += sz; | |
250 | count -= sz; | |
251 | written += sz; | |
8619e5bd TH |
252 | if (should_stop_iteration()) |
253 | break; | |
1da177e4 LT |
254 | } |
255 | ||
256 | *ppos += written; | |
257 | return written; | |
258 | } | |
259 | ||
d7d4d849 | 260 | int __weak phys_mem_access_prot_allowed(struct file *file, |
f0970c13 | 261 | unsigned long pfn, unsigned long size, pgprot_t *vma_prot) |
262 | { | |
263 | return 1; | |
264 | } | |
265 | ||
44ac8413 | 266 | #ifndef __HAVE_PHYS_MEM_ACCESS_PROT |
d7d4d849 AM |
267 | |
268 | /* | |
269 | * Architectures vary in how they handle caching for addresses | |
270 | * outside of main memory. | |
271 | * | |
272 | */ | |
ea56f411 | 273 | #ifdef pgprot_noncached |
7e6735c3 | 274 | static int uncached_access(struct file *file, phys_addr_t addr) |
d7d4d849 | 275 | { |
d7d4d849 AM |
276 | /* |
277 | * Accessing memory above the top the kernel knows about or through a | |
278 | * file pointer | |
279 | * that was marked O_DSYNC will be done non-cached. | |
280 | */ | |
281 | if (file->f_flags & O_DSYNC) | |
282 | return 1; | |
283 | return addr >= __pa(high_memory); | |
d7d4d849 | 284 | } |
ea56f411 | 285 | #endif |
d7d4d849 | 286 | |
44ac8413 BH |
287 | static pgprot_t phys_mem_access_prot(struct file *file, unsigned long pfn, |
288 | unsigned long size, pgprot_t vma_prot) | |
289 | { | |
290 | #ifdef pgprot_noncached | |
7e6735c3 | 291 | phys_addr_t offset = pfn << PAGE_SHIFT; |
44ac8413 BH |
292 | |
293 | if (uncached_access(file, offset)) | |
294 | return pgprot_noncached(vma_prot); | |
295 | #endif | |
296 | return vma_prot; | |
297 | } | |
298 | #endif | |
299 | ||
5da6185b DH |
300 | #ifndef CONFIG_MMU |
301 | static unsigned long get_unmapped_area_mem(struct file *file, | |
302 | unsigned long addr, | |
303 | unsigned long len, | |
304 | unsigned long pgoff, | |
305 | unsigned long flags) | |
306 | { | |
307 | if (!valid_mmap_phys_addr_range(pgoff, len)) | |
308 | return (unsigned long) -EINVAL; | |
8a93258c | 309 | return pgoff << PAGE_SHIFT; |
5da6185b DH |
310 | } |
311 | ||
b4caecd4 CH |
312 | /* permit direct mmap, for read, write or exec */ |
313 | static unsigned memory_mmap_capabilities(struct file *file) | |
314 | { | |
315 | return NOMMU_MAP_DIRECT | | |
316 | NOMMU_MAP_READ | NOMMU_MAP_WRITE | NOMMU_MAP_EXEC; | |
317 | } | |
318 | ||
319 | static unsigned zero_mmap_capabilities(struct file *file) | |
320 | { | |
321 | return NOMMU_MAP_COPY; | |
322 | } | |
323 | ||
5da6185b DH |
324 | /* can't do an in-place private mapping if there's no MMU */ |
325 | static inline int private_mapping_ok(struct vm_area_struct *vma) | |
326 | { | |
fc4f4be9 | 327 | return is_nommu_shared_mapping(vma->vm_flags); |
5da6185b DH |
328 | } |
329 | #else | |
5da6185b DH |
330 | |
331 | static inline int private_mapping_ok(struct vm_area_struct *vma) | |
332 | { | |
333 | return 1; | |
334 | } | |
335 | #endif | |
336 | ||
f0f37e2f | 337 | static const struct vm_operations_struct mmap_mem_ops = { |
7ae8ed50 RR |
338 | #ifdef CONFIG_HAVE_IOREMAP_PROT |
339 | .access = generic_access_phys | |
340 | #endif | |
e7f260a2 | 341 | }; |
342 | ||
d7d4d849 | 343 | static int mmap_mem(struct file *file, struct vm_area_struct *vma) |
1da177e4 | 344 | { |
80851ef2 | 345 | size_t size = vma->vm_end - vma->vm_start; |
b299cde2 JW |
346 | phys_addr_t offset = (phys_addr_t)vma->vm_pgoff << PAGE_SHIFT; |
347 | ||
be62a320 CB |
348 | /* Does it even fit in phys_addr_t? */ |
349 | if (offset >> PAGE_SHIFT != vma->vm_pgoff) | |
350 | return -EINVAL; | |
351 | ||
b299cde2 | 352 | /* It's illegal to wrap around the end of the physical address space. */ |
32829da5 | 353 | if (offset + (phys_addr_t)size - 1 < offset) |
b299cde2 | 354 | return -EINVAL; |
80851ef2 | 355 | |
06c67bef | 356 | if (!valid_mmap_phys_addr_range(vma->vm_pgoff, size)) |
80851ef2 BH |
357 | return -EINVAL; |
358 | ||
5da6185b DH |
359 | if (!private_mapping_ok(vma)) |
360 | return -ENOSYS; | |
361 | ||
e2beb3ea VP |
362 | if (!range_is_allowed(vma->vm_pgoff, size)) |
363 | return -EPERM; | |
364 | ||
f0970c13 | 365 | if (!phys_mem_access_prot_allowed(file, vma->vm_pgoff, size, |
366 | &vma->vm_page_prot)) | |
367 | return -EINVAL; | |
368 | ||
8b150478 | 369 | vma->vm_page_prot = phys_mem_access_prot(file, vma->vm_pgoff, |
80851ef2 | 370 | size, |
1da177e4 | 371 | vma->vm_page_prot); |
1da177e4 | 372 | |
e7f260a2 | 373 | vma->vm_ops = &mmap_mem_ops; |
374 | ||
314e51b9 | 375 | /* Remap-pfn-range will mark the range VM_IO */ |
1da177e4 LT |
376 | if (remap_pfn_range(vma, |
377 | vma->vm_start, | |
378 | vma->vm_pgoff, | |
80851ef2 | 379 | size, |
e7f260a2 | 380 | vma->vm_page_prot)) { |
1da177e4 | 381 | return -EAGAIN; |
e7f260a2 | 382 | } |
1da177e4 LT |
383 | return 0; |
384 | } | |
385 | ||
f0a816fb | 386 | #ifdef CONFIG_DEVPORT |
d7d4d849 | 387 | static ssize_t read_port(struct file *file, char __user *buf, |
1da177e4 LT |
388 | size_t count, loff_t *ppos) |
389 | { | |
390 | unsigned long i = *ppos; | |
391 | char __user *tmp = buf; | |
392 | ||
96d4f267 | 393 | if (!access_ok(buf, count)) |
d7d4d849 | 394 | return -EFAULT; |
1da177e4 | 395 | while (count-- > 0 && i < 65536) { |
d7d4d849 AM |
396 | if (__put_user(inb(i), tmp) < 0) |
397 | return -EFAULT; | |
1da177e4 LT |
398 | i++; |
399 | tmp++; | |
400 | } | |
401 | *ppos = i; | |
402 | return tmp-buf; | |
403 | } | |
404 | ||
d7d4d849 | 405 | static ssize_t write_port(struct file *file, const char __user *buf, |
1da177e4 LT |
406 | size_t count, loff_t *ppos) |
407 | { | |
408 | unsigned long i = *ppos; | |
890537b3 | 409 | const char __user *tmp = buf; |
1da177e4 | 410 | |
96d4f267 | 411 | if (!access_ok(buf, count)) |
1da177e4 LT |
412 | return -EFAULT; |
413 | while (count-- > 0 && i < 65536) { | |
414 | char c; | |
6a0061ba | 415 | |
c654d60e JB |
416 | if (__get_user(c, tmp)) { |
417 | if (tmp > buf) | |
418 | break; | |
d7d4d849 | 419 | return -EFAULT; |
c654d60e | 420 | } |
d7d4d849 | 421 | outb(c, i); |
1da177e4 LT |
422 | i++; |
423 | tmp++; | |
424 | } | |
425 | *ppos = i; | |
426 | return tmp-buf; | |
427 | } | |
f0a816fb | 428 | #endif |
1da177e4 | 429 | |
d7d4d849 | 430 | static ssize_t read_null(struct file *file, char __user *buf, |
1da177e4 LT |
431 | size_t count, loff_t *ppos) |
432 | { | |
433 | return 0; | |
434 | } | |
435 | ||
d7d4d849 | 436 | static ssize_t write_null(struct file *file, const char __user *buf, |
1da177e4 LT |
437 | size_t count, loff_t *ppos) |
438 | { | |
439 | return count; | |
440 | } | |
441 | ||
cd28e28d | 442 | static ssize_t read_iter_null(struct kiocb *iocb, struct iov_iter *to) |
162934de ZB |
443 | { |
444 | return 0; | |
445 | } | |
446 | ||
cd28e28d | 447 | static ssize_t write_iter_null(struct kiocb *iocb, struct iov_iter *from) |
162934de | 448 | { |
cd28e28d AV |
449 | size_t count = iov_iter_count(from); |
450 | iov_iter_advance(from, count); | |
451 | return count; | |
162934de ZB |
452 | } |
453 | ||
1ebd32fc JA |
454 | static int pipe_to_null(struct pipe_inode_info *info, struct pipe_buffer *buf, |
455 | struct splice_desc *sd) | |
456 | { | |
457 | return sd->len; | |
458 | } | |
459 | ||
d7d4d849 | 460 | static ssize_t splice_write_null(struct pipe_inode_info *pipe, struct file *out, |
1ebd32fc JA |
461 | loff_t *ppos, size_t len, unsigned int flags) |
462 | { | |
463 | return splice_from_pipe(pipe, out, ppos, len, flags, pipe_to_null); | |
464 | } | |
465 | ||
70752795 PM |
466 | static int uring_cmd_null(struct io_uring_cmd *ioucmd, unsigned int issue_flags) |
467 | { | |
468 | return 0; | |
469 | } | |
470 | ||
13ba33e8 | 471 | static ssize_t read_iter_zero(struct kiocb *iocb, struct iov_iter *iter) |
1da177e4 | 472 | { |
13ba33e8 | 473 | size_t written = 0; |
1da177e4 | 474 | |
13ba33e8 AV |
475 | while (iov_iter_count(iter)) { |
476 | size_t chunk = iov_iter_count(iter), n; | |
6a0061ba | 477 | |
557ed1fa NP |
478 | if (chunk > PAGE_SIZE) |
479 | chunk = PAGE_SIZE; /* Just for latency reasons */ | |
13ba33e8 AV |
480 | n = iov_iter_zero(chunk, iter); |
481 | if (!n && iov_iter_count(iter)) | |
482 | return written ? written : -EFAULT; | |
483 | written += n; | |
2b838687 LT |
484 | if (signal_pending(current)) |
485 | return written ? written : -ERESTARTSYS; | |
e5f71d60 PB |
486 | if (!need_resched()) |
487 | continue; | |
488 | if (iocb->ki_flags & IOCB_NOWAIT) | |
489 | return written ? written : -EAGAIN; | |
1da177e4 LT |
490 | cond_resched(); |
491 | } | |
13ba33e8 | 492 | return written; |
162934de ZB |
493 | } |
494 | ||
99f66735 CH |
495 | static ssize_t read_zero(struct file *file, char __user *buf, |
496 | size_t count, loff_t *ppos) | |
497 | { | |
498 | size_t cleared = 0; | |
499 | ||
500 | while (count) { | |
501 | size_t chunk = min_t(size_t, count, PAGE_SIZE); | |
ab04de8e | 502 | size_t left; |
99f66735 | 503 | |
ab04de8e CH |
504 | left = clear_user(buf + cleared, chunk); |
505 | if (unlikely(left)) { | |
506 | cleared += (chunk - left); | |
507 | if (!cleared) | |
508 | return -EFAULT; | |
509 | break; | |
510 | } | |
99f66735 CH |
511 | cleared += chunk; |
512 | count -= chunk; | |
513 | ||
514 | if (signal_pending(current)) | |
ab04de8e | 515 | break; |
99f66735 CH |
516 | cond_resched(); |
517 | } | |
518 | ||
519 | return cleared; | |
520 | } | |
521 | ||
d7d4d849 | 522 | static int mmap_zero(struct file *file, struct vm_area_struct *vma) |
1da177e4 | 523 | { |
557ed1fa | 524 | #ifndef CONFIG_MMU |
1da177e4 | 525 | return -ENOSYS; |
557ed1fa NP |
526 | #endif |
527 | if (vma->vm_flags & VM_SHARED) | |
528 | return shmem_zero_setup(vma); | |
bfd40eaf | 529 | vma_set_anonymous(vma); |
557ed1fa | 530 | return 0; |
1da177e4 | 531 | } |
1da177e4 | 532 | |
c01d5b30 HD |
533 | static unsigned long get_unmapped_area_zero(struct file *file, |
534 | unsigned long addr, unsigned long len, | |
535 | unsigned long pgoff, unsigned long flags) | |
536 | { | |
537 | #ifdef CONFIG_MMU | |
538 | if (flags & MAP_SHARED) { | |
539 | /* | |
540 | * mmap_zero() will call shmem_zero_setup() to create a file, | |
541 | * so use shmem's get_unmapped_area in case it can be huge; | |
542 | * and pass NULL for file as in mmap.c's get_unmapped_area(), | |
543 | * so as not to confuse shmem with our handle on "/dev/zero". | |
544 | */ | |
545 | return shmem_get_unmapped_area(NULL, addr, len, pgoff, flags); | |
546 | } | |
547 | ||
548 | /* Otherwise flags & MAP_PRIVATE: with no shmem object beneath it */ | |
529ce23a | 549 | return mm_get_unmapped_area(current->mm, file, addr, len, pgoff, flags); |
c01d5b30 HD |
550 | #else |
551 | return -ENOSYS; | |
552 | #endif | |
553 | } | |
554 | ||
d7d4d849 | 555 | static ssize_t write_full(struct file *file, const char __user *buf, |
1da177e4 LT |
556 | size_t count, loff_t *ppos) |
557 | { | |
558 | return -ENOSPC; | |
559 | } | |
560 | ||
561 | /* | |
562 | * Special lseek() function for /dev/null and /dev/zero. Most notably, you | |
563 | * can fopen() both devices with "a" now. This was previously impossible. | |
564 | * -- SRB. | |
565 | */ | |
d7d4d849 | 566 | static loff_t null_lseek(struct file *file, loff_t offset, int orig) |
1da177e4 LT |
567 | { |
568 | return file->f_pos = 0; | |
569 | } | |
570 | ||
571 | /* | |
572 | * The memory devices use the full 32/64 bits of the offset, and so we cannot | |
573 | * check against negative addresses: they are ok. The return value is weird, | |
574 | * though, in that case (0). | |
575 | * | |
576 | * also note that seeking relative to the "end of file" isn't supported: | |
577 | * it has no meaning, so it returns -EINVAL. | |
578 | */ | |
d7d4d849 | 579 | static loff_t memory_lseek(struct file *file, loff_t offset, int orig) |
1da177e4 LT |
580 | { |
581 | loff_t ret; | |
582 | ||
5955102c | 583 | inode_lock(file_inode(file)); |
1da177e4 | 584 | switch (orig) { |
d7d4d849 AM |
585 | case SEEK_CUR: |
586 | offset += file->f_pos; | |
df561f66 | 587 | fallthrough; |
d7d4d849 AM |
588 | case SEEK_SET: |
589 | /* to avoid userland mistaking f_pos=-9 as -EBADF=-9 */ | |
ecb63a1b | 590 | if ((unsigned long long)offset >= -MAX_ERRNO) { |
d7d4d849 | 591 | ret = -EOVERFLOW; |
1da177e4 | 592 | break; |
d7d4d849 AM |
593 | } |
594 | file->f_pos = offset; | |
595 | ret = file->f_pos; | |
596 | force_successful_syscall_return(); | |
597 | break; | |
598 | default: | |
599 | ret = -EINVAL; | |
1da177e4 | 600 | } |
5955102c | 601 | inode_unlock(file_inode(file)); |
1da177e4 LT |
602 | return ret; |
603 | } | |
604 | ||
890537b3 | 605 | static int open_port(struct inode *inode, struct file *filp) |
1da177e4 | 606 | { |
3234ac66 DW |
607 | int rc; |
608 | ||
9b9d8dda MG |
609 | if (!capable(CAP_SYS_RAWIO)) |
610 | return -EPERM; | |
611 | ||
3234ac66 DW |
612 | rc = security_locked_down(LOCKDOWN_DEV_MEM); |
613 | if (rc) | |
614 | return rc; | |
615 | ||
616 | if (iminor(inode) != DEVMEM_MINOR) | |
617 | return 0; | |
618 | ||
619 | /* | |
620 | * Use a unified address space to have a single point to manage | |
621 | * revocations when drivers want to take over a /dev/mem mapped | |
622 | * range. | |
623 | */ | |
71a1d8ed | 624 | filp->f_mapping = iomem_get_mapping(); |
3234ac66 DW |
625 | |
626 | return 0; | |
1da177e4 LT |
627 | } |
628 | ||
629 | #define zero_lseek null_lseek | |
630 | #define full_lseek null_lseek | |
631 | #define write_zero write_null | |
cd28e28d | 632 | #define write_iter_zero write_iter_null |
1b057bd8 | 633 | #define splice_write_zero splice_write_null |
1da177e4 | 634 | #define open_mem open_port |
1da177e4 | 635 | |
73f0718e | 636 | static const struct file_operations __maybe_unused mem_fops = { |
1da177e4 LT |
637 | .llseek = memory_lseek, |
638 | .read = read_mem, | |
639 | .write = write_mem, | |
640 | .mmap = mmap_mem, | |
641 | .open = open_mem, | |
b4caecd4 | 642 | #ifndef CONFIG_MMU |
5da6185b | 643 | .get_unmapped_area = get_unmapped_area_mem, |
b4caecd4 CH |
644 | .mmap_capabilities = memory_mmap_capabilities, |
645 | #endif | |
641bb439 | 646 | .fop_flags = FOP_UNSIGNED_OFFSET, |
1da177e4 LT |
647 | }; |
648 | ||
62322d25 | 649 | static const struct file_operations null_fops = { |
1da177e4 LT |
650 | .llseek = null_lseek, |
651 | .read = read_null, | |
652 | .write = write_null, | |
cd28e28d AV |
653 | .read_iter = read_iter_null, |
654 | .write_iter = write_iter_null, | |
1ebd32fc | 655 | .splice_write = splice_write_null, |
70752795 | 656 | .uring_cmd = uring_cmd_null, |
1da177e4 LT |
657 | }; |
658 | ||
f0a816fb NS |
659 | #ifdef CONFIG_DEVPORT |
660 | static const struct file_operations port_fops = { | |
1da177e4 LT |
661 | .llseek = memory_lseek, |
662 | .read = read_port, | |
663 | .write = write_port, | |
664 | .open = open_port, | |
665 | }; | |
f0a816fb | 666 | #endif |
1da177e4 | 667 | |
62322d25 | 668 | static const struct file_operations zero_fops = { |
1da177e4 | 669 | .llseek = zero_lseek, |
1da177e4 | 670 | .write = write_zero, |
13ba33e8 | 671 | .read_iter = read_iter_zero, |
99f66735 | 672 | .read = read_zero, |
cd28e28d | 673 | .write_iter = write_iter_zero, |
1b057bd8 MK |
674 | .splice_read = copy_splice_read, |
675 | .splice_write = splice_write_zero, | |
1da177e4 | 676 | .mmap = mmap_zero, |
c01d5b30 | 677 | .get_unmapped_area = get_unmapped_area_zero, |
b4caecd4 CH |
678 | #ifndef CONFIG_MMU |
679 | .mmap_capabilities = zero_mmap_capabilities, | |
680 | #endif | |
1da177e4 LT |
681 | }; |
682 | ||
62322d25 | 683 | static const struct file_operations full_fops = { |
1da177e4 | 684 | .llseek = full_lseek, |
13ba33e8 | 685 | .read_iter = read_iter_zero, |
1da177e4 | 686 | .write = write_full, |
1b057bd8 | 687 | .splice_read = copy_splice_read, |
1da177e4 LT |
688 | }; |
689 | ||
389e0cb9 KS |
690 | static const struct memdev { |
691 | const char *name; | |
692 | const struct file_operations *fops; | |
b4caecd4 | 693 | fmode_t fmode; |
ed1af26c | 694 | umode_t mode; |
389e0cb9 | 695 | } devlist[] = { |
73f0718e | 696 | #ifdef CONFIG_DEVMEM |
641bb439 | 697 | [DEVMEM_MINOR] = { "mem", &mem_fops, 0, 0 }, |
b781ecb6 | 698 | #endif |
ed1af26c | 699 | [3] = { "null", &null_fops, FMODE_NOWAIT, 0666 }, |
4f911d64 | 700 | #ifdef CONFIG_DEVPORT |
ed1af26c | 701 | [4] = { "port", &port_fops, 0, 0 }, |
1da177e4 | 702 | #endif |
ed1af26c AD |
703 | [5] = { "zero", &zero_fops, FMODE_NOWAIT, 0666 }, |
704 | [7] = { "full", &full_fops, 0, 0666 }, | |
705 | [8] = { "random", &random_fops, FMODE_NOWAIT, 0666 }, | |
706 | [9] = { "urandom", &urandom_fops, FMODE_NOWAIT, 0666 }, | |
7f3a781d | 707 | #ifdef CONFIG_PRINTK |
ed1af26c | 708 | [11] = { "kmsg", &kmsg_fops, 0, 0644 }, |
7f3a781d | 709 | #endif |
d6f47bef ASF |
710 | }; |
711 | ||
712 | static int memory_open(struct inode *inode, struct file *filp) | |
713 | { | |
389e0cb9 KS |
714 | int minor; |
715 | const struct memdev *dev; | |
d6f47bef | 716 | |
389e0cb9 KS |
717 | minor = iminor(inode); |
718 | if (minor >= ARRAY_SIZE(devlist)) | |
205153aa | 719 | return -ENXIO; |
d6f47bef | 720 | |
389e0cb9 KS |
721 | dev = &devlist[minor]; |
722 | if (!dev->fops) | |
205153aa | 723 | return -ENXIO; |
d6f47bef | 724 | |
389e0cb9 | 725 | filp->f_op = dev->fops; |
b4caecd4 | 726 | filp->f_mode |= dev->fmode; |
4a3956c7 | 727 | |
389e0cb9 | 728 | if (dev->fops->open) |
205153aa FW |
729 | return dev->fops->open(inode, filp); |
730 | ||
731 | return 0; | |
1da177e4 LT |
732 | } |
733 | ||
62322d25 | 734 | static const struct file_operations memory_fops = { |
d7d4d849 | 735 | .open = memory_open, |
6038f373 | 736 | .llseek = noop_llseek, |
1da177e4 LT |
737 | }; |
738 | ||
ff62b8e6 | 739 | static char *mem_devnode(const struct device *dev, umode_t *mode) |
e454cea2 KS |
740 | { |
741 | if (mode && devlist[MINOR(dev->devt)].mode) | |
742 | *mode = devlist[MINOR(dev->devt)].mode; | |
743 | return NULL; | |
744 | } | |
745 | ||
7671284b IO |
746 | static const struct class mem_class = { |
747 | .name = "mem", | |
748 | .devnode = mem_devnode, | |
749 | }; | |
1da177e4 LT |
750 | |
751 | static int __init chr_dev_init(void) | |
752 | { | |
7671284b | 753 | int retval; |
389e0cb9 | 754 | int minor; |
1da177e4 | 755 | |
d7d4d849 | 756 | if (register_chrdev(MEM_MAJOR, "mem", &memory_fops)) |
1da177e4 LT |
757 | printk("unable to get major %d for memory devs\n", MEM_MAJOR); |
758 | ||
7671284b IO |
759 | retval = class_register(&mem_class); |
760 | if (retval) | |
761 | return retval; | |
6e191f7b | 762 | |
389e0cb9 KS |
763 | for (minor = 1; minor < ARRAY_SIZE(devlist); minor++) { |
764 | if (!devlist[minor].name) | |
765 | continue; | |
e1612de9 HM |
766 | |
767 | /* | |
890537b3 | 768 | * Create /dev/port? |
e1612de9 HM |
769 | */ |
770 | if ((minor == DEVPORT_MINOR) && !arch_has_dev_port()) | |
771 | continue; | |
772 | ||
7671284b | 773 | device_create(&mem_class, NULL, MKDEV(MEM_MAJOR, minor), |
389e0cb9 KS |
774 | NULL, devlist[minor].name); |
775 | } | |
ebf644c4 | 776 | |
31d1d48e | 777 | return tty_init(); |
1da177e4 LT |
778 | } |
779 | ||
780 | fs_initcall(chr_dev_init); |