mm.c revision 1.14 1 1.14 rmind /* $NetBSD: mm.c,v 1.14 2011/06/12 03:35:51 rmind Exp $ */
2 1.1 christos
3 1.1 christos /*-
4 1.14 rmind * Copyright (c) 2002, 2008, 2010 The NetBSD Foundation, Inc.
5 1.1 christos * All rights reserved.
6 1.1 christos *
7 1.1 christos * This code is derived from software contributed to The NetBSD Foundation
8 1.14 rmind * by Christos Zoulas, Joerg Sonnenberger and Mindaugas Rasiukevicius.
9 1.1 christos *
10 1.1 christos * Redistribution and use in source and binary forms, with or without
11 1.1 christos * modification, are permitted provided that the following conditions
12 1.1 christos * are met:
13 1.1 christos * 1. Redistributions of source code must retain the above copyright
14 1.1 christos * notice, this list of conditions and the following disclaimer.
15 1.1 christos * 2. Redistributions in binary form must reproduce the above copyright
16 1.1 christos * notice, this list of conditions and the following disclaimer in the
17 1.1 christos * documentation and/or other materials provided with the distribution.
18 1.1 christos *
19 1.1 christos * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20 1.1 christos * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21 1.1 christos * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22 1.1 christos * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23 1.1 christos * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24 1.1 christos * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25 1.1 christos * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26 1.1 christos * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27 1.1 christos * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28 1.1 christos * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29 1.1 christos * POSSIBILITY OF SUCH DAMAGE.
30 1.1 christos */
31 1.1 christos
32 1.14 rmind /*
33 1.14 rmind * Special /dev/{mem,kmem,zero,null} memory devices.
34 1.14 rmind */
35 1.1 christos
36 1.1 christos #include <sys/cdefs.h>
37 1.14 rmind __KERNEL_RCSID(0, "$NetBSD: mm.c,v 1.14 2011/06/12 03:35:51 rmind Exp $");
38 1.1 christos
39 1.14 rmind #include "opt_compat_netbsd.h"
40 1.1 christos
41 1.1 christos #include <sys/param.h>
42 1.1 christos #include <sys/conf.h>
43 1.14 rmind #include <sys/ioctl.h>
44 1.14 rmind #include <sys/mman.h>
45 1.1 christos #include <sys/uio.h>
46 1.13 oster #include <sys/termios.h>
47 1.2 gehenna
48 1.14 rmind #include <dev/mm.h>
49 1.14 rmind
50 1.14 rmind #include <uvm/uvm_extern.h>
51 1.14 rmind
52 1.14 rmind static void * dev_zero_page __read_mostly;
53 1.14 rmind static kmutex_t dev_mem_lock __cacheline_aligned;
54 1.14 rmind static vaddr_t dev_mem_addr __read_mostly;
55 1.14 rmind
56 1.14 rmind static dev_type_read(mm_readwrite);
57 1.14 rmind static dev_type_ioctl(mm_ioctl);
58 1.14 rmind static dev_type_mmap(mm_mmap);
59 1.14 rmind static dev_type_ioctl(mm_ioctl);
60 1.14 rmind
61 1.14 rmind const struct cdevsw mem_cdevsw = {
62 1.14 rmind #ifdef __HAVE_MM_MD_OPEN
63 1.14 rmind mm_md_open,
64 1.14 rmind #else
65 1.14 rmind nullopen,
66 1.14 rmind #endif
67 1.14 rmind nullclose, mm_readwrite, mm_readwrite,
68 1.14 rmind mm_ioctl, nostop, notty, nopoll, mm_mmap, nokqfilter,
69 1.14 rmind D_MPSAFE
70 1.14 rmind };
71 1.14 rmind
72 1.14 rmind #ifdef pmax /* XXX */
73 1.14 rmind const struct cdevsw mem_ultrix_cdevsw = {
74 1.14 rmind nullopen, nullclose, mm_readwrite, mm_readwrite, mm_ioctl,
75 1.14 rmind nostop, notty, nopoll, mm_mmap, nokqfilter, D_MPSAFE
76 1.14 rmind };
77 1.14 rmind #endif
78 1.14 rmind
79 1.14 rmind /*
80 1.14 rmind * mm_init: initialize memory device driver.
81 1.14 rmind */
82 1.14 rmind void
83 1.14 rmind mm_init(void)
84 1.14 rmind {
85 1.14 rmind vaddr_t pg;
86 1.14 rmind
87 1.14 rmind mutex_init(&dev_mem_lock, MUTEX_DEFAULT, IPL_NONE);
88 1.14 rmind
89 1.14 rmind /* Read-only zero-page. */
90 1.14 rmind pg = uvm_km_alloc(kernel_map, PAGE_SIZE, 0, UVM_KMF_WIRED|UVM_KMF_ZERO);
91 1.14 rmind KASSERT(pg != 0);
92 1.14 rmind #if 0
93 1.14 rmind pmap_protect(pmap_kernel(), pg, pg + PAGE_SIZE, VM_PROT_READ);
94 1.14 rmind #endif
95 1.14 rmind pmap_update(pmap_kernel());
96 1.14 rmind dev_zero_page = (void *)pg;
97 1.14 rmind
98 1.14 rmind #ifndef __HAVE_MM_MD_CACHE_ALIASING
99 1.14 rmind /* KVA for mappings during I/O. */
100 1.14 rmind dev_mem_addr = uvm_km_alloc(kernel_map, PAGE_SIZE, 0,
101 1.14 rmind UVM_KMF_VAONLY|UVM_KMF_WAITVA);
102 1.14 rmind KASSERT(dev_mem_addr != 0);
103 1.14 rmind #else
104 1.14 rmind dev_mem_addr = 0;
105 1.14 rmind #endif
106 1.14 rmind }
107 1.14 rmind
108 1.14 rmind
109 1.14 rmind /*
110 1.14 rmind * dev_mem_getva: get a special virtual address. If architecture requires,
111 1.14 rmind * allocate VA according to PA, which avoids cache-aliasing issues. Use a
112 1.14 rmind * constant, general mapping address otherwise.
113 1.14 rmind */
114 1.14 rmind static inline vaddr_t
115 1.14 rmind dev_mem_getva(paddr_t pa)
116 1.14 rmind {
117 1.14 rmind #ifdef __HAVE_MM_MD_CACHE_ALIASING
118 1.14 rmind const vsize_t coloroff = trunc_page(pa) & ptoa(uvmexp.colormask);
119 1.14 rmind const vaddr_t kva = uvm_km_alloc(kernel_map, PAGE_SIZE + coloroff,
120 1.14 rmind ptoa(uvmexp.ncolors), UVM_KMF_VAONLY | UVM_KMF_WAITVA);
121 1.14 rmind
122 1.14 rmind return kva + coloroff;
123 1.14 rmind #else
124 1.14 rmind return dev_mem_addr;
125 1.14 rmind #endif
126 1.14 rmind }
127 1.14 rmind
128 1.14 rmind static inline void
129 1.14 rmind dev_mem_relva(paddr_t pa, vaddr_t va)
130 1.14 rmind {
131 1.14 rmind #ifdef __HAVE_MM_MD_CACHE_ALIASING
132 1.14 rmind const vsize_t coloroff = trunc_page(pa) & ptoa(uvmexp.colormask);
133 1.14 rmind const vaddr_t origva = va - coloroff;
134 1.14 rmind
135 1.14 rmind uvm_km_free(kernel_map, origva, PAGE_SIZE + coloroff, UVM_KMF_VAONLY);
136 1.14 rmind #else
137 1.14 rmind KASSERT(dev_mem_addr == va);
138 1.14 rmind #endif
139 1.14 rmind }
140 1.14 rmind
141 1.14 rmind /*
142 1.14 rmind * dev_kmem_readwrite: helper for DEV_MEM (/dev/mem) case of R/W.
143 1.14 rmind */
144 1.14 rmind static int
145 1.14 rmind dev_mem_readwrite(struct uio *uio, struct iovec *iov)
146 1.14 rmind {
147 1.14 rmind paddr_t paddr;
148 1.14 rmind vaddr_t vaddr;
149 1.14 rmind vm_prot_t prot;
150 1.14 rmind size_t len, offset;
151 1.14 rmind bool have_direct;
152 1.14 rmind int error;
153 1.14 rmind
154 1.14 rmind /* Check for wrap around. */
155 1.14 rmind if ((intptr_t)uio->uio_offset != uio->uio_offset) {
156 1.14 rmind return EFAULT;
157 1.14 rmind }
158 1.14 rmind paddr = uio->uio_offset & ~PAGE_MASK;
159 1.14 rmind prot = (uio->uio_rw == UIO_WRITE) ? VM_PROT_WRITE : VM_PROT_READ;
160 1.14 rmind error = mm_md_physacc(paddr, prot);
161 1.14 rmind if (error) {
162 1.14 rmind return error;
163 1.14 rmind }
164 1.14 rmind offset = uio->uio_offset & PAGE_MASK;
165 1.14 rmind len = MIN(uio->uio_resid, PAGE_SIZE - offset);
166 1.14 rmind
167 1.14 rmind #ifdef __HAVE_MM_MD_DIRECT_MAPPED_PHYS
168 1.14 rmind /* Is physical address directly mapped? Return VA. */
169 1.14 rmind have_direct = mm_md_direct_mapped_phys(paddr, &vaddr);
170 1.14 rmind #else
171 1.14 rmind have_direct = false;
172 1.14 rmind #endif
173 1.14 rmind if (!have_direct) {
174 1.14 rmind /* Get a special virtual address. */
175 1.14 rmind const vaddr_t va = dev_mem_getva(paddr);
176 1.14 rmind
177 1.14 rmind /* Map selected KVA to physical address. */
178 1.14 rmind mutex_enter(&dev_mem_lock);
179 1.14 rmind pmap_kenter_pa(va, paddr, prot, 0);
180 1.14 rmind pmap_update(pmap_kernel());
181 1.14 rmind
182 1.14 rmind /* Perform I/O. */
183 1.14 rmind vaddr = va + offset;
184 1.14 rmind error = uiomove((void *)vaddr, len, uio);
185 1.14 rmind
186 1.14 rmind /* Unmap, flush before unlock. */
187 1.14 rmind pmap_kremove(va, PAGE_SIZE);
188 1.14 rmind pmap_update(pmap_kernel());
189 1.14 rmind mutex_exit(&dev_mem_lock);
190 1.14 rmind
191 1.14 rmind /* "Release" the virtual address. */
192 1.14 rmind dev_mem_relva(paddr, va);
193 1.14 rmind } else {
194 1.14 rmind /* Direct map, just perform I/O. */
195 1.14 rmind vaddr += offset;
196 1.14 rmind error = uiomove((void *)vaddr, len, uio);
197 1.14 rmind }
198 1.14 rmind return error;
199 1.14 rmind }
200 1.14 rmind
201 1.14 rmind /*
202 1.14 rmind * dev_kmem_readwrite: helper for DEV_KMEM (/dev/kmem) case of R/W.
203 1.14 rmind */
204 1.14 rmind static int
205 1.14 rmind dev_kmem_readwrite(struct uio *uio, struct iovec *iov)
206 1.14 rmind {
207 1.14 rmind void *addr;
208 1.14 rmind size_t len, offset;
209 1.14 rmind vm_prot_t prot;
210 1.14 rmind int error;
211 1.14 rmind bool md_kva;
212 1.14 rmind
213 1.14 rmind /* Check for wrap around. */
214 1.14 rmind addr = (void *)(intptr_t)uio->uio_offset;
215 1.14 rmind if ((uintptr_t)addr != uio->uio_offset) {
216 1.14 rmind return EFAULT;
217 1.14 rmind }
218 1.14 rmind /*
219 1.14 rmind * Handle non-page aligned offset.
220 1.14 rmind * Otherwise, we operate in page-by-page basis.
221 1.14 rmind */
222 1.14 rmind offset = uio->uio_offset & PAGE_MASK;
223 1.14 rmind len = MIN(uio->uio_resid, PAGE_SIZE - offset);
224 1.14 rmind prot = (uio->uio_rw == UIO_WRITE) ? VM_PROT_WRITE : VM_PROT_READ;
225 1.14 rmind
226 1.14 rmind md_kva = false;
227 1.14 rmind
228 1.14 rmind #ifdef __HAVE_MM_MD_DIRECT_MAPPED_IO
229 1.14 rmind paddr_t paddr;
230 1.14 rmind /* MD case: is this is a directly mapped address? */
231 1.14 rmind if (mm_md_direct_mapped_io(addr, &paddr)) {
232 1.14 rmind /* If so, validate physical address. */
233 1.14 rmind error = mm_md_physacc(paddr, prot);
234 1.14 rmind if (error) {
235 1.14 rmind return error;
236 1.14 rmind }
237 1.14 rmind md_kva = true;
238 1.14 rmind }
239 1.14 rmind #endif
240 1.14 rmind if (!md_kva) {
241 1.14 rmind bool checked = false;
242 1.14 rmind
243 1.14 rmind #ifdef __HAVE_MM_MD_KERNACC
244 1.14 rmind /* MD check for the address. */
245 1.14 rmind error = mm_md_kernacc(addr, prot, &checked);
246 1.14 rmind if (error) {
247 1.14 rmind return error;
248 1.14 rmind }
249 1.14 rmind #endif
250 1.14 rmind /* UVM check for the address (unless MD indicated to not). */
251 1.14 rmind if (!checked && !uvm_kernacc(addr, len, prot)) {
252 1.14 rmind return EFAULT;
253 1.14 rmind }
254 1.14 rmind }
255 1.14 rmind error = uiomove(addr, len, uio);
256 1.14 rmind return error;
257 1.14 rmind }
258 1.14 rmind
259 1.14 rmind /*
260 1.14 rmind * dev_zero_readwrite: helper for DEV_ZERO (/dev/null) case of R/W.
261 1.14 rmind */
262 1.14 rmind static inline int
263 1.14 rmind dev_zero_readwrite(struct uio *uio, struct iovec *iov)
264 1.14 rmind {
265 1.14 rmind size_t len;
266 1.14 rmind
267 1.14 rmind /* Nothing to do for the write case. */
268 1.14 rmind if (uio->uio_rw == UIO_WRITE) {
269 1.14 rmind uio->uio_resid = 0;
270 1.14 rmind return 0;
271 1.14 rmind }
272 1.14 rmind /*
273 1.14 rmind * Read in page-by-page basis, caller will continue.
274 1.14 rmind * Cut appropriately for a single/last-iteration cases.
275 1.14 rmind */
276 1.14 rmind len = MIN(iov->iov_len, PAGE_SIZE);
277 1.14 rmind return uiomove(dev_zero_page, len, uio);
278 1.14 rmind }
279 1.1 christos
280 1.14 rmind /*
281 1.14 rmind * mm_readwrite: general memory R/W function.
282 1.14 rmind */
283 1.14 rmind static int
284 1.14 rmind mm_readwrite(dev_t dev, struct uio *uio, int flags)
285 1.1 christos {
286 1.14 rmind struct iovec *iov;
287 1.14 rmind int error;
288 1.14 rmind
289 1.14 rmind #ifdef __HAVE_MM_MD_READWRITE
290 1.14 rmind /* If defined - there are extra MD cases. */
291 1.1 christos switch (minor(dev)) {
292 1.14 rmind case DEV_MEM:
293 1.14 rmind case DEV_KMEM:
294 1.14 rmind case DEV_NULL:
295 1.14 rmind case DEV_ZERO:
296 1.14 rmind #if defined(COMPAT_16) && defined(__arm)
297 1.14 rmind case _DEV_ZERO_oARM:
298 1.14 rmind #endif
299 1.14 rmind break;
300 1.6 jdolecek default:
301 1.14 rmind return mm_md_readwrite(dev, uio);
302 1.14 rmind }
303 1.14 rmind #endif
304 1.14 rmind error = 0;
305 1.14 rmind while (uio->uio_resid > 0 && error == 0) {
306 1.14 rmind iov = uio->uio_iov;
307 1.14 rmind if (iov->iov_len == 0) {
308 1.14 rmind /* Processed; next I/O vector. */
309 1.14 rmind uio->uio_iov++;
310 1.14 rmind uio->uio_iovcnt--;
311 1.14 rmind KASSERT(uio->uio_iovcnt >= 0);
312 1.14 rmind continue;
313 1.14 rmind }
314 1.14 rmind /* Helper functions will process in page-by-page basis. */
315 1.14 rmind switch (minor(dev)) {
316 1.14 rmind case DEV_MEM:
317 1.14 rmind error = dev_mem_readwrite(uio, iov);
318 1.14 rmind break;
319 1.14 rmind case DEV_KMEM:
320 1.14 rmind error = dev_kmem_readwrite(uio, iov);
321 1.14 rmind break;
322 1.14 rmind case DEV_NULL:
323 1.14 rmind if (uio->uio_rw == UIO_WRITE) {
324 1.14 rmind uio->uio_resid = 0;
325 1.14 rmind }
326 1.14 rmind /* Break directly out of the loop. */
327 1.1 christos return 0;
328 1.14 rmind #if defined(COMPAT_16) && defined(__arm)
329 1.14 rmind case _DEV_ZERO_oARM:
330 1.14 rmind #endif
331 1.14 rmind case DEV_ZERO:
332 1.14 rmind error = dev_zero_readwrite(uio, iov);
333 1.14 rmind break;
334 1.14 rmind default:
335 1.14 rmind error = ENXIO;
336 1.14 rmind break;
337 1.1 christos }
338 1.14 rmind }
339 1.14 rmind return error;
340 1.14 rmind }
341 1.14 rmind
342 1.14 rmind /*
343 1.14 rmind * mm_mmap: general mmap() handler.
344 1.14 rmind */
345 1.14 rmind static paddr_t
346 1.14 rmind mm_mmap(dev_t dev, off_t off, int acc)
347 1.14 rmind {
348 1.14 rmind vm_prot_t prot;
349 1.14 rmind
350 1.14 rmind #ifdef __HAVE_MM_MD_MMAP
351 1.14 rmind /* If defined - there are extra mmap() MD cases. */
352 1.14 rmind switch (minor(dev)) {
353 1.14 rmind case DEV_MEM:
354 1.14 rmind case DEV_KMEM:
355 1.14 rmind case DEV_NULL:
356 1.14 rmind #if defined(COMPAT_16) && defined(__arm)
357 1.14 rmind case _DEV_ZERO_oARM:
358 1.14 rmind #endif
359 1.14 rmind case DEV_ZERO:
360 1.14 rmind break;
361 1.14 rmind default:
362 1.14 rmind return mm_md_mmap(dev, off, acc);
363 1.14 rmind }
364 1.14 rmind #endif
365 1.14 rmind /*
366 1.14 rmind * /dev/null does not make sense, /dev/kmem is volatile and
367 1.14 rmind * /dev/zero is handled in mmap already.
368 1.14 rmind */
369 1.14 rmind if (minor(dev) != DEV_MEM) {
370 1.14 rmind return -1;
371 1.14 rmind }
372 1.14 rmind
373 1.14 rmind prot = 0;
374 1.14 rmind if (acc & PROT_EXEC)
375 1.14 rmind prot |= VM_PROT_EXECUTE;
376 1.14 rmind if (acc & PROT_READ)
377 1.14 rmind prot |= VM_PROT_READ;
378 1.14 rmind if (acc & PROT_WRITE)
379 1.14 rmind prot |= VM_PROT_WRITE;
380 1.14 rmind
381 1.14 rmind /* Validate the physical address. */
382 1.14 rmind if (mm_md_physacc(off, prot) != 0) {
383 1.14 rmind return -1;
384 1.14 rmind }
385 1.14 rmind return off >> PGSHIFT;
386 1.14 rmind }
387 1.14 rmind
388 1.14 rmind static int
389 1.14 rmind mm_ioctl(dev_t dev, u_long cmd, void *data, int flag, struct lwp *l)
390 1.14 rmind {
391 1.14 rmind
392 1.14 rmind switch (cmd) {
393 1.14 rmind case FIONBIO:
394 1.14 rmind /* We never block anyway. */
395 1.14 rmind return 0;
396 1.14 rmind
397 1.14 rmind case FIOSETOWN:
398 1.14 rmind case FIOGETOWN:
399 1.14 rmind case TIOCGPGRP:
400 1.14 rmind case TIOCSPGRP:
401 1.14 rmind case TIOCGETA:
402 1.14 rmind return ENOTTY;
403 1.14 rmind
404 1.14 rmind case FIOASYNC:
405 1.14 rmind if ((*(int *)data) == 0) {
406 1.14 rmind return 0;
407 1.14 rmind }
408 1.14 rmind /* FALLTHROUGH */
409 1.14 rmind default:
410 1.1 christos return EOPNOTSUPP;
411 1.1 christos }
412 1.1 christos }
413