40300a6dc4
uvm returns a page of the correct color.
407 lines
9.4 KiB
C
407 lines
9.4 KiB
C
/* $NetBSD: mm.c,v 1.17 2013/01/19 00:27:34 matt Exp $ */
|
|
|
|
/*-
|
|
* Copyright (c) 2002, 2008, 2010 The NetBSD Foundation, Inc.
|
|
* All rights reserved.
|
|
*
|
|
* This code is derived from software contributed to The NetBSD Foundation
|
|
* by Christos Zoulas, Joerg Sonnenberger and Mindaugas Rasiukevicius.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
|
|
* ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
|
|
* TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
|
|
* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
/*
|
|
* Special /dev/{mem,kmem,zero,null} memory devices.
|
|
*/
|
|
|
|
#include <sys/cdefs.h>
|
|
__KERNEL_RCSID(0, "$NetBSD: mm.c,v 1.17 2013/01/19 00:27:34 matt Exp $");
|
|
|
|
#include "opt_compat_netbsd.h"
|
|
|
|
#include <sys/param.h>
|
|
#include <sys/conf.h>
|
|
#include <sys/ioctl.h>
|
|
#include <sys/mman.h>
|
|
#include <sys/uio.h>
|
|
#include <sys/termios.h>
|
|
|
|
#include <dev/mm.h>
|
|
|
|
#include <uvm/uvm_extern.h>
|
|
|
|
static void * dev_zero_page __read_mostly;
|
|
static kmutex_t dev_mem_lock __cacheline_aligned;
|
|
static vaddr_t dev_mem_addr __read_mostly;
|
|
|
|
static dev_type_read(mm_readwrite);
|
|
static dev_type_ioctl(mm_ioctl);
|
|
static dev_type_mmap(mm_mmap);
|
|
static dev_type_ioctl(mm_ioctl);
|
|
|
|
const struct cdevsw mem_cdevsw = {
|
|
#ifdef __HAVE_MM_MD_OPEN
|
|
mm_md_open,
|
|
#else
|
|
nullopen,
|
|
#endif
|
|
nullclose, mm_readwrite, mm_readwrite,
|
|
mm_ioctl, nostop, notty, nopoll, mm_mmap, nokqfilter,
|
|
D_MPSAFE
|
|
};
|
|
|
|
#ifdef pmax /* XXX */
|
|
const struct cdevsw mem_ultrix_cdevsw = {
|
|
nullopen, nullclose, mm_readwrite, mm_readwrite, mm_ioctl,
|
|
nostop, notty, nopoll, mm_mmap, nokqfilter, D_MPSAFE
|
|
};
|
|
#endif
|
|
|
|
/*
|
|
* mm_init: initialize memory device driver.
|
|
*/
|
|
void
|
|
mm_init(void)
|
|
{
|
|
vaddr_t pg;
|
|
|
|
mutex_init(&dev_mem_lock, MUTEX_DEFAULT, IPL_NONE);
|
|
|
|
/* Read-only zero-page. */
|
|
pg = uvm_km_alloc(kernel_map, PAGE_SIZE, 0, UVM_KMF_WIRED|UVM_KMF_ZERO);
|
|
KASSERT(pg != 0);
|
|
pmap_protect(pmap_kernel(), pg, pg + PAGE_SIZE, VM_PROT_READ);
|
|
pmap_update(pmap_kernel());
|
|
dev_zero_page = (void *)pg;
|
|
|
|
#ifndef __HAVE_MM_MD_CACHE_ALIASING
|
|
/* KVA for mappings during I/O. */
|
|
dev_mem_addr = uvm_km_alloc(kernel_map, PAGE_SIZE, 0,
|
|
UVM_KMF_VAONLY|UVM_KMF_WAITVA);
|
|
KASSERT(dev_mem_addr != 0);
|
|
#else
|
|
dev_mem_addr = 0;
|
|
#endif
|
|
}
|
|
|
|
|
|
/*
|
|
* dev_mem_getva: get a special virtual address. If architecture requires,
|
|
* allocate VA according to PA, which avoids cache-aliasing issues. Use a
|
|
* constant, general mapping address otherwise.
|
|
*/
|
|
static inline vaddr_t
|
|
dev_mem_getva(paddr_t pa)
|
|
{
|
|
#ifdef __HAVE_MM_MD_CACHE_ALIASING
|
|
return uvm_km_alloc(kernel_map, PAGE_SIZE,
|
|
atop(pa) & uvmexp.colormask,
|
|
UVM_KMF_VAONLY | UVM_KMF_WAITVA | UVM_KMF_COLORMATCH);
|
|
#else
|
|
return dev_mem_addr;
|
|
#endif
|
|
}
|
|
|
|
static inline void
|
|
dev_mem_relva(paddr_t pa, vaddr_t va)
|
|
{
|
|
#ifdef __HAVE_MM_MD_CACHE_ALIASING
|
|
uvm_km_free(kernel_map, va, PAGE_SIZE, UVM_KMF_VAONLY);
|
|
#else
|
|
KASSERT(dev_mem_addr == va);
|
|
#endif
|
|
}
|
|
|
|
/*
|
|
* dev_kmem_readwrite: helper for DEV_MEM (/dev/mem) case of R/W.
|
|
*/
|
|
static int
|
|
dev_mem_readwrite(struct uio *uio, struct iovec *iov)
|
|
{
|
|
paddr_t paddr;
|
|
vaddr_t vaddr;
|
|
vm_prot_t prot;
|
|
size_t len, offset;
|
|
bool have_direct;
|
|
int error;
|
|
|
|
/* Check for wrap around. */
|
|
if ((intptr_t)uio->uio_offset != uio->uio_offset) {
|
|
return EFAULT;
|
|
}
|
|
paddr = uio->uio_offset & ~PAGE_MASK;
|
|
prot = (uio->uio_rw == UIO_WRITE) ? VM_PROT_WRITE : VM_PROT_READ;
|
|
error = mm_md_physacc(paddr, prot);
|
|
if (error) {
|
|
return error;
|
|
}
|
|
offset = uio->uio_offset & PAGE_MASK;
|
|
len = MIN(uio->uio_resid, PAGE_SIZE - offset);
|
|
|
|
#ifdef __HAVE_MM_MD_DIRECT_MAPPED_PHYS
|
|
/* Is physical address directly mapped? Return VA. */
|
|
have_direct = mm_md_direct_mapped_phys(paddr, &vaddr);
|
|
#else
|
|
vaddr = 0;
|
|
have_direct = false;
|
|
#endif
|
|
if (!have_direct) {
|
|
/* Get a special virtual address. */
|
|
const vaddr_t va = dev_mem_getva(paddr);
|
|
|
|
/* Map selected KVA to physical address. */
|
|
mutex_enter(&dev_mem_lock);
|
|
pmap_kenter_pa(va, paddr, prot, 0);
|
|
pmap_update(pmap_kernel());
|
|
|
|
/* Perform I/O. */
|
|
vaddr = va + offset;
|
|
error = uiomove((void *)vaddr, len, uio);
|
|
|
|
/* Unmap, flush before unlock. */
|
|
pmap_kremove(va, PAGE_SIZE);
|
|
pmap_update(pmap_kernel());
|
|
mutex_exit(&dev_mem_lock);
|
|
|
|
/* "Release" the virtual address. */
|
|
dev_mem_relva(paddr, va);
|
|
} else {
|
|
/* Direct map, just perform I/O. */
|
|
vaddr += offset;
|
|
error = uiomove((void *)vaddr, len, uio);
|
|
}
|
|
return error;
|
|
}
|
|
|
|
/*
|
|
* dev_kmem_readwrite: helper for DEV_KMEM (/dev/kmem) case of R/W.
|
|
*/
|
|
static int
|
|
dev_kmem_readwrite(struct uio *uio, struct iovec *iov)
|
|
{
|
|
void *addr;
|
|
size_t len, offset;
|
|
vm_prot_t prot;
|
|
int error;
|
|
bool md_kva;
|
|
|
|
/* Check for wrap around. */
|
|
addr = (void *)(intptr_t)uio->uio_offset;
|
|
if ((uintptr_t)addr != uio->uio_offset) {
|
|
return EFAULT;
|
|
}
|
|
/*
|
|
* Handle non-page aligned offset.
|
|
* Otherwise, we operate in page-by-page basis.
|
|
*/
|
|
offset = uio->uio_offset & PAGE_MASK;
|
|
len = MIN(uio->uio_resid, PAGE_SIZE - offset);
|
|
prot = (uio->uio_rw == UIO_WRITE) ? VM_PROT_WRITE : VM_PROT_READ;
|
|
|
|
md_kva = false;
|
|
|
|
#ifdef __HAVE_MM_MD_DIRECT_MAPPED_IO
|
|
paddr_t paddr;
|
|
/* MD case: is this is a directly mapped address? */
|
|
if (mm_md_direct_mapped_io(addr, &paddr)) {
|
|
/* If so, validate physical address. */
|
|
error = mm_md_physacc(paddr, prot);
|
|
if (error) {
|
|
return error;
|
|
}
|
|
md_kva = true;
|
|
}
|
|
#endif
|
|
if (!md_kva) {
|
|
bool checked = false;
|
|
|
|
#ifdef __HAVE_MM_MD_KERNACC
|
|
/* MD check for the address. */
|
|
error = mm_md_kernacc(addr, prot, &checked);
|
|
if (error) {
|
|
return error;
|
|
}
|
|
#endif
|
|
/* UVM check for the address (unless MD indicated to not). */
|
|
if (!checked && !uvm_kernacc(addr, len, prot)) {
|
|
return EFAULT;
|
|
}
|
|
}
|
|
error = uiomove(addr, len, uio);
|
|
return error;
|
|
}
|
|
|
|
/*
|
|
* dev_zero_readwrite: helper for DEV_ZERO (/dev/null) case of R/W.
|
|
*/
|
|
static inline int
|
|
dev_zero_readwrite(struct uio *uio, struct iovec *iov)
|
|
{
|
|
size_t len;
|
|
|
|
/* Nothing to do for the write case. */
|
|
if (uio->uio_rw == UIO_WRITE) {
|
|
uio->uio_resid = 0;
|
|
return 0;
|
|
}
|
|
/*
|
|
* Read in page-by-page basis, caller will continue.
|
|
* Cut appropriately for a single/last-iteration cases.
|
|
*/
|
|
len = MIN(iov->iov_len, PAGE_SIZE);
|
|
return uiomove(dev_zero_page, len, uio);
|
|
}
|
|
|
|
/*
|
|
* mm_readwrite: general memory R/W function.
|
|
*/
|
|
static int
|
|
mm_readwrite(dev_t dev, struct uio *uio, int flags)
|
|
{
|
|
struct iovec *iov;
|
|
int error;
|
|
|
|
#ifdef __HAVE_MM_MD_READWRITE
|
|
/* If defined - there are extra MD cases. */
|
|
switch (minor(dev)) {
|
|
case DEV_MEM:
|
|
case DEV_KMEM:
|
|
case DEV_NULL:
|
|
case DEV_ZERO:
|
|
#if defined(COMPAT_16) && defined(__arm)
|
|
case _DEV_ZERO_oARM:
|
|
#endif
|
|
break;
|
|
default:
|
|
return mm_md_readwrite(dev, uio);
|
|
}
|
|
#endif
|
|
error = 0;
|
|
while (uio->uio_resid > 0 && error == 0) {
|
|
iov = uio->uio_iov;
|
|
if (iov->iov_len == 0) {
|
|
/* Processed; next I/O vector. */
|
|
uio->uio_iov++;
|
|
uio->uio_iovcnt--;
|
|
KASSERT(uio->uio_iovcnt >= 0);
|
|
continue;
|
|
}
|
|
/* Helper functions will process in page-by-page basis. */
|
|
switch (minor(dev)) {
|
|
case DEV_MEM:
|
|
error = dev_mem_readwrite(uio, iov);
|
|
break;
|
|
case DEV_KMEM:
|
|
error = dev_kmem_readwrite(uio, iov);
|
|
break;
|
|
case DEV_NULL:
|
|
if (uio->uio_rw == UIO_WRITE) {
|
|
uio->uio_resid = 0;
|
|
}
|
|
/* Break directly out of the loop. */
|
|
return 0;
|
|
#if defined(COMPAT_16) && defined(__arm)
|
|
case _DEV_ZERO_oARM:
|
|
#endif
|
|
case DEV_ZERO:
|
|
error = dev_zero_readwrite(uio, iov);
|
|
break;
|
|
default:
|
|
error = ENXIO;
|
|
break;
|
|
}
|
|
}
|
|
return error;
|
|
}
|
|
|
|
/*
|
|
* mm_mmap: general mmap() handler.
|
|
*/
|
|
static paddr_t
|
|
mm_mmap(dev_t dev, off_t off, int acc)
|
|
{
|
|
vm_prot_t prot;
|
|
|
|
#ifdef __HAVE_MM_MD_MMAP
|
|
/* If defined - there are extra mmap() MD cases. */
|
|
switch (minor(dev)) {
|
|
case DEV_MEM:
|
|
case DEV_KMEM:
|
|
case DEV_NULL:
|
|
#if defined(COMPAT_16) && defined(__arm)
|
|
case _DEV_ZERO_oARM:
|
|
#endif
|
|
case DEV_ZERO:
|
|
break;
|
|
default:
|
|
return mm_md_mmap(dev, off, acc);
|
|
}
|
|
#endif
|
|
/*
|
|
* /dev/null does not make sense, /dev/kmem is volatile and
|
|
* /dev/zero is handled in mmap already.
|
|
*/
|
|
if (minor(dev) != DEV_MEM) {
|
|
return -1;
|
|
}
|
|
|
|
prot = 0;
|
|
if (acc & PROT_EXEC)
|
|
prot |= VM_PROT_EXECUTE;
|
|
if (acc & PROT_READ)
|
|
prot |= VM_PROT_READ;
|
|
if (acc & PROT_WRITE)
|
|
prot |= VM_PROT_WRITE;
|
|
|
|
/* Validate the physical address. */
|
|
if (mm_md_physacc(off, prot) != 0) {
|
|
return -1;
|
|
}
|
|
return off >> PGSHIFT;
|
|
}
|
|
|
|
static int
|
|
mm_ioctl(dev_t dev, u_long cmd, void *data, int flag, struct lwp *l)
|
|
{
|
|
|
|
switch (cmd) {
|
|
case FIONBIO:
|
|
/* We never block anyway. */
|
|
return 0;
|
|
|
|
case FIOSETOWN:
|
|
case FIOGETOWN:
|
|
case TIOCGPGRP:
|
|
case TIOCSPGRP:
|
|
case TIOCGETA:
|
|
return ENOTTY;
|
|
|
|
case FIOASYNC:
|
|
if ((*(int *)data) == 0) {
|
|
return 0;
|
|
}
|
|
/* FALLTHROUGH */
|
|
default:
|
|
return EOPNOTSUPP;
|
|
}
|
|
}
|