Home | History | Annotate | Line # | Download | only in dev
mm.c revision 1.19
      1  1.19  dholland /*	$NetBSD: mm.c,v 1.19 2014/07/25 08:10:35 dholland Exp $	*/
      2   1.1  christos 
      3   1.1  christos /*-
      4  1.14     rmind  * Copyright (c) 2002, 2008, 2010 The NetBSD Foundation, Inc.
      5   1.1  christos  * All rights reserved.
      6   1.1  christos  *
      7   1.1  christos  * This code is derived from software contributed to The NetBSD Foundation
      8  1.14     rmind  * by Christos Zoulas, Joerg Sonnenberger and Mindaugas Rasiukevicius.
      9   1.1  christos  *
     10   1.1  christos  * Redistribution and use in source and binary forms, with or without
     11   1.1  christos  * modification, are permitted provided that the following conditions
     12   1.1  christos  * are met:
     13   1.1  christos  * 1. Redistributions of source code must retain the above copyright
     14   1.1  christos  *    notice, this list of conditions and the following disclaimer.
     15   1.1  christos  * 2. Redistributions in binary form must reproduce the above copyright
     16   1.1  christos  *    notice, this list of conditions and the following disclaimer in the
     17   1.1  christos  *    documentation and/or other materials provided with the distribution.
     18   1.1  christos  *
     19   1.1  christos  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     20   1.1  christos  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     21   1.1  christos  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     22   1.1  christos  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     23   1.1  christos  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     24   1.1  christos  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     25   1.1  christos  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     26   1.1  christos  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     27   1.1  christos  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     28   1.1  christos  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     29   1.1  christos  * POSSIBILITY OF SUCH DAMAGE.
     30   1.1  christos  */
     31   1.1  christos 
     32  1.14     rmind /*
     33  1.14     rmind  * Special /dev/{mem,kmem,zero,null} memory devices.
     34  1.14     rmind  */
     35   1.1  christos 
     36   1.1  christos #include <sys/cdefs.h>
     37  1.19  dholland __KERNEL_RCSID(0, "$NetBSD: mm.c,v 1.19 2014/07/25 08:10:35 dholland Exp $");
     38   1.1  christos 
     39  1.14     rmind #include "opt_compat_netbsd.h"
     40   1.1  christos 
     41   1.1  christos #include <sys/param.h>
     42   1.1  christos #include <sys/conf.h>
     43  1.14     rmind #include <sys/ioctl.h>
     44  1.14     rmind #include <sys/mman.h>
     45   1.1  christos #include <sys/uio.h>
     46  1.13     oster #include <sys/termios.h>
     47   1.2   gehenna 
     48  1.14     rmind #include <dev/mm.h>
     49  1.14     rmind 
     50  1.14     rmind #include <uvm/uvm_extern.h>
     51  1.14     rmind 
     52  1.14     rmind static void *		dev_zero_page	__read_mostly;
     53  1.14     rmind static kmutex_t		dev_mem_lock	__cacheline_aligned;
     54  1.14     rmind static vaddr_t		dev_mem_addr	__read_mostly;
     55  1.14     rmind 
     56  1.14     rmind static dev_type_read(mm_readwrite);
     57  1.14     rmind static dev_type_ioctl(mm_ioctl);
     58  1.14     rmind static dev_type_mmap(mm_mmap);
     59  1.14     rmind static dev_type_ioctl(mm_ioctl);
     60  1.14     rmind 
     61  1.14     rmind const struct cdevsw mem_cdevsw = {
     62  1.14     rmind #ifdef __HAVE_MM_MD_OPEN
     63  1.18  dholland 	.d_open = mm_md_open,
     64  1.14     rmind #else
     65  1.18  dholland 	.d_open = nullopen,
     66  1.14     rmind #endif
     67  1.18  dholland 	.d_close = nullclose,
     68  1.18  dholland 	.d_read = mm_readwrite,
     69  1.18  dholland 	.d_write = mm_readwrite,
     70  1.18  dholland 	.d_ioctl = mm_ioctl,
     71  1.18  dholland 	.d_stop = nostop,
     72  1.18  dholland 	.d_tty = notty,
     73  1.18  dholland 	.d_poll = nopoll,
     74  1.18  dholland 	.d_mmap = mm_mmap,
     75  1.18  dholland 	.d_kqfilter = nokqfilter,
     76  1.19  dholland 	.d_discard = nodiscard,
     77  1.18  dholland 	.d_flag = D_MPSAFE
     78  1.14     rmind };
     79  1.14     rmind 
     80  1.14     rmind #ifdef pmax	/* XXX */
     81  1.14     rmind const struct cdevsw mem_ultrix_cdevsw = {
     82  1.18  dholland 	.d_open = nullopen,
     83  1.18  dholland 	.d_close = nullclose,
     84  1.18  dholland 	.d_read = mm_readwrite,
     85  1.18  dholland 	.d_write = mm_readwrite,
     86  1.18  dholland 	.d_ioctl = mm_ioctl,
     87  1.18  dholland 	.d_stop = nostop,
     88  1.18  dholland 	.d_tty = notty,
     89  1.18  dholland 	.d_poll = nopoll,
     90  1.18  dholland 	.d_mmap = mm_mmap,
     91  1.18  dholland 	.d_kqfilter = nokqfilter,
     92  1.19  dholland 	.d_discard = nodiscard,
     93  1.18  dholland 	.d_flag = D_MPSAFE
     94  1.14     rmind };
     95  1.14     rmind #endif
     96  1.14     rmind 
     97  1.14     rmind /*
     98  1.14     rmind  * mm_init: initialize memory device driver.
     99  1.14     rmind  */
    100  1.14     rmind void
    101  1.14     rmind mm_init(void)
    102  1.14     rmind {
    103  1.14     rmind 	vaddr_t pg;
    104  1.14     rmind 
    105  1.14     rmind 	mutex_init(&dev_mem_lock, MUTEX_DEFAULT, IPL_NONE);
    106  1.14     rmind 
    107  1.14     rmind 	/* Read-only zero-page. */
    108  1.14     rmind 	pg = uvm_km_alloc(kernel_map, PAGE_SIZE, 0, UVM_KMF_WIRED|UVM_KMF_ZERO);
    109  1.14     rmind 	KASSERT(pg != 0);
    110  1.14     rmind 	pmap_protect(pmap_kernel(), pg, pg + PAGE_SIZE, VM_PROT_READ);
    111  1.14     rmind 	pmap_update(pmap_kernel());
    112  1.14     rmind 	dev_zero_page = (void *)pg;
    113  1.14     rmind 
    114  1.14     rmind #ifndef __HAVE_MM_MD_CACHE_ALIASING
    115  1.14     rmind 	/* KVA for mappings during I/O. */
    116  1.14     rmind 	dev_mem_addr = uvm_km_alloc(kernel_map, PAGE_SIZE, 0,
    117  1.14     rmind 	    UVM_KMF_VAONLY|UVM_KMF_WAITVA);
    118  1.14     rmind 	KASSERT(dev_mem_addr != 0);
    119  1.14     rmind #else
    120  1.14     rmind 	dev_mem_addr = 0;
    121  1.14     rmind #endif
    122  1.14     rmind }
    123  1.14     rmind 
    124  1.14     rmind 
    125  1.14     rmind /*
    126  1.14     rmind  * dev_mem_getva: get a special virtual address.  If architecture requires,
    127  1.14     rmind  * allocate VA according to PA, which avoids cache-aliasing issues.  Use a
    128  1.14     rmind  * constant, general mapping address otherwise.
    129  1.14     rmind  */
    130  1.14     rmind static inline vaddr_t
    131  1.14     rmind dev_mem_getva(paddr_t pa)
    132  1.14     rmind {
    133  1.14     rmind #ifdef __HAVE_MM_MD_CACHE_ALIASING
    134  1.17      matt 	return uvm_km_alloc(kernel_map, PAGE_SIZE,
    135  1.17      matt 	    atop(pa) & uvmexp.colormask,
    136  1.17      matt 	    UVM_KMF_VAONLY | UVM_KMF_WAITVA | UVM_KMF_COLORMATCH);
    137  1.14     rmind #else
    138  1.14     rmind 	return dev_mem_addr;
    139  1.14     rmind #endif
    140  1.14     rmind }
    141  1.14     rmind 
    142  1.14     rmind static inline void
    143  1.14     rmind dev_mem_relva(paddr_t pa, vaddr_t va)
    144  1.14     rmind {
    145  1.14     rmind #ifdef __HAVE_MM_MD_CACHE_ALIASING
    146  1.17      matt 	uvm_km_free(kernel_map, va, PAGE_SIZE, UVM_KMF_VAONLY);
    147  1.14     rmind #else
    148  1.14     rmind 	KASSERT(dev_mem_addr == va);
    149  1.14     rmind #endif
    150  1.14     rmind }
    151  1.14     rmind 
    152  1.14     rmind /*
    153  1.14     rmind  * dev_kmem_readwrite: helper for DEV_MEM (/dev/mem) case of R/W.
    154  1.14     rmind  */
    155  1.14     rmind static int
    156  1.14     rmind dev_mem_readwrite(struct uio *uio, struct iovec *iov)
    157  1.14     rmind {
    158  1.14     rmind 	paddr_t paddr;
    159  1.14     rmind 	vaddr_t vaddr;
    160  1.14     rmind 	vm_prot_t prot;
    161  1.14     rmind 	size_t len, offset;
    162  1.14     rmind 	bool have_direct;
    163  1.14     rmind 	int error;
    164  1.14     rmind 
    165  1.14     rmind 	/* Check for wrap around. */
    166  1.14     rmind 	if ((intptr_t)uio->uio_offset != uio->uio_offset) {
    167  1.14     rmind 		return EFAULT;
    168  1.14     rmind 	}
    169  1.14     rmind 	paddr = uio->uio_offset & ~PAGE_MASK;
    170  1.14     rmind 	prot = (uio->uio_rw == UIO_WRITE) ? VM_PROT_WRITE : VM_PROT_READ;
    171  1.14     rmind 	error = mm_md_physacc(paddr, prot);
    172  1.14     rmind 	if (error) {
    173  1.14     rmind 		return error;
    174  1.14     rmind 	}
    175  1.14     rmind 	offset = uio->uio_offset & PAGE_MASK;
    176  1.14     rmind 	len = MIN(uio->uio_resid, PAGE_SIZE - offset);
    177  1.14     rmind 
    178  1.14     rmind #ifdef __HAVE_MM_MD_DIRECT_MAPPED_PHYS
    179  1.14     rmind 	/* Is physical address directly mapped?  Return VA. */
    180  1.14     rmind 	have_direct = mm_md_direct_mapped_phys(paddr, &vaddr);
    181  1.14     rmind #else
    182  1.15     joerg 	vaddr = 0;
    183  1.14     rmind 	have_direct = false;
    184  1.14     rmind #endif
    185  1.14     rmind 	if (!have_direct) {
    186  1.14     rmind 		/* Get a special virtual address. */
    187  1.14     rmind 		const vaddr_t va = dev_mem_getva(paddr);
    188  1.14     rmind 
    189  1.14     rmind 		/* Map selected KVA to physical address. */
    190  1.14     rmind 		mutex_enter(&dev_mem_lock);
    191  1.14     rmind 		pmap_kenter_pa(va, paddr, prot, 0);
    192  1.14     rmind 		pmap_update(pmap_kernel());
    193  1.14     rmind 
    194  1.14     rmind 		/* Perform I/O. */
    195  1.14     rmind 		vaddr = va + offset;
    196  1.14     rmind 		error = uiomove((void *)vaddr, len, uio);
    197  1.14     rmind 
    198  1.14     rmind 		/* Unmap, flush before unlock. */
    199  1.14     rmind 		pmap_kremove(va, PAGE_SIZE);
    200  1.14     rmind 		pmap_update(pmap_kernel());
    201  1.14     rmind 		mutex_exit(&dev_mem_lock);
    202  1.14     rmind 
    203  1.14     rmind 		/* "Release" the virtual address. */
    204  1.14     rmind 		dev_mem_relva(paddr, va);
    205  1.14     rmind 	} else {
    206  1.14     rmind 		/* Direct map, just perform I/O. */
    207  1.14     rmind 		vaddr += offset;
    208  1.14     rmind 		error = uiomove((void *)vaddr, len, uio);
    209  1.14     rmind 	}
    210  1.14     rmind 	return error;
    211  1.14     rmind }
    212  1.14     rmind 
    213  1.14     rmind /*
    214  1.14     rmind  * dev_kmem_readwrite: helper for DEV_KMEM (/dev/kmem) case of R/W.
    215  1.14     rmind  */
    216  1.14     rmind static int
    217  1.14     rmind dev_kmem_readwrite(struct uio *uio, struct iovec *iov)
    218  1.14     rmind {
    219  1.14     rmind 	void *addr;
    220  1.14     rmind 	size_t len, offset;
    221  1.14     rmind 	vm_prot_t prot;
    222  1.14     rmind 	int error;
    223  1.14     rmind 	bool md_kva;
    224  1.14     rmind 
    225  1.14     rmind 	/* Check for wrap around. */
    226  1.14     rmind 	addr = (void *)(intptr_t)uio->uio_offset;
    227  1.14     rmind 	if ((uintptr_t)addr != uio->uio_offset) {
    228  1.14     rmind 		return EFAULT;
    229  1.14     rmind 	}
    230  1.14     rmind 	/*
    231  1.14     rmind 	 * Handle non-page aligned offset.
    232  1.14     rmind 	 * Otherwise, we operate in page-by-page basis.
    233  1.14     rmind 	 */
    234  1.14     rmind 	offset = uio->uio_offset & PAGE_MASK;
    235  1.14     rmind 	len = MIN(uio->uio_resid, PAGE_SIZE - offset);
    236  1.14     rmind 	prot = (uio->uio_rw == UIO_WRITE) ? VM_PROT_WRITE : VM_PROT_READ;
    237  1.14     rmind 
    238  1.14     rmind 	md_kva = false;
    239  1.14     rmind 
    240  1.14     rmind #ifdef __HAVE_MM_MD_DIRECT_MAPPED_IO
    241  1.14     rmind 	paddr_t paddr;
    242  1.14     rmind 	/* MD case: is this is a directly mapped address? */
    243  1.14     rmind 	if (mm_md_direct_mapped_io(addr, &paddr)) {
    244  1.14     rmind 		/* If so, validate physical address. */
    245  1.14     rmind 		error = mm_md_physacc(paddr, prot);
    246  1.14     rmind 		if (error) {
    247  1.14     rmind 			return error;
    248  1.14     rmind 		}
    249  1.14     rmind 		md_kva = true;
    250  1.14     rmind 	}
    251  1.14     rmind #endif
    252  1.14     rmind 	if (!md_kva) {
    253  1.14     rmind 		bool checked = false;
    254  1.14     rmind 
    255  1.14     rmind #ifdef __HAVE_MM_MD_KERNACC
    256  1.14     rmind 		/* MD check for the address. */
    257  1.14     rmind 		error = mm_md_kernacc(addr, prot, &checked);
    258  1.14     rmind 		if (error) {
    259  1.14     rmind 			return error;
    260  1.14     rmind 		}
    261  1.14     rmind #endif
    262  1.14     rmind 		/* UVM check for the address (unless MD indicated to not). */
    263  1.14     rmind 		if (!checked && !uvm_kernacc(addr, len, prot)) {
    264  1.14     rmind 			return EFAULT;
    265  1.14     rmind 		}
    266  1.14     rmind 	}
    267  1.14     rmind 	error = uiomove(addr, len, uio);
    268  1.14     rmind 	return error;
    269  1.14     rmind }
    270  1.14     rmind 
    271  1.14     rmind /*
    272  1.14     rmind  * dev_zero_readwrite: helper for DEV_ZERO (/dev/null) case of R/W.
    273  1.14     rmind  */
    274  1.14     rmind static inline int
    275  1.14     rmind dev_zero_readwrite(struct uio *uio, struct iovec *iov)
    276  1.14     rmind {
    277  1.14     rmind 	size_t len;
    278  1.14     rmind 
    279  1.14     rmind 	/* Nothing to do for the write case. */
    280  1.14     rmind 	if (uio->uio_rw == UIO_WRITE) {
    281  1.14     rmind 		uio->uio_resid = 0;
    282  1.14     rmind 		return 0;
    283  1.14     rmind 	}
    284  1.14     rmind 	/*
    285  1.14     rmind 	 * Read in page-by-page basis, caller will continue.
    286  1.14     rmind 	 * Cut appropriately for a single/last-iteration cases.
    287  1.14     rmind 	 */
    288  1.14     rmind 	len = MIN(iov->iov_len, PAGE_SIZE);
    289  1.14     rmind 	return uiomove(dev_zero_page, len, uio);
    290  1.14     rmind }
    291   1.1  christos 
    292  1.14     rmind /*
    293  1.14     rmind  * mm_readwrite: general memory R/W function.
    294  1.14     rmind  */
    295  1.14     rmind static int
    296  1.14     rmind mm_readwrite(dev_t dev, struct uio *uio, int flags)
    297   1.1  christos {
    298  1.14     rmind 	struct iovec *iov;
    299  1.14     rmind 	int error;
    300  1.14     rmind 
    301  1.14     rmind #ifdef __HAVE_MM_MD_READWRITE
    302  1.14     rmind 	/* If defined - there are extra MD cases. */
    303   1.1  christos 	switch (minor(dev)) {
    304  1.14     rmind 	case DEV_MEM:
    305  1.14     rmind 	case DEV_KMEM:
    306  1.14     rmind 	case DEV_NULL:
    307  1.14     rmind 	case DEV_ZERO:
    308  1.14     rmind #if defined(COMPAT_16) && defined(__arm)
    309  1.14     rmind 	case _DEV_ZERO_oARM:
    310  1.14     rmind #endif
    311  1.14     rmind 		break;
    312   1.6  jdolecek 	default:
    313  1.14     rmind 		return mm_md_readwrite(dev, uio);
    314  1.14     rmind 	}
    315  1.14     rmind #endif
    316  1.14     rmind 	error = 0;
    317  1.14     rmind 	while (uio->uio_resid > 0 && error == 0) {
    318  1.14     rmind 		iov = uio->uio_iov;
    319  1.14     rmind 		if (iov->iov_len == 0) {
    320  1.14     rmind 			/* Processed; next I/O vector. */
    321  1.14     rmind 			uio->uio_iov++;
    322  1.14     rmind 			uio->uio_iovcnt--;
    323  1.14     rmind 			KASSERT(uio->uio_iovcnt >= 0);
    324  1.14     rmind 			continue;
    325  1.14     rmind 		}
    326  1.14     rmind 		/* Helper functions will process in page-by-page basis. */
    327  1.14     rmind 		switch (minor(dev)) {
    328  1.14     rmind 		case DEV_MEM:
    329  1.14     rmind 			error = dev_mem_readwrite(uio, iov);
    330  1.14     rmind 			break;
    331  1.14     rmind 		case DEV_KMEM:
    332  1.14     rmind 			error = dev_kmem_readwrite(uio, iov);
    333  1.14     rmind 			break;
    334  1.14     rmind 		case DEV_NULL:
    335  1.14     rmind 			if (uio->uio_rw == UIO_WRITE) {
    336  1.14     rmind 				uio->uio_resid = 0;
    337  1.14     rmind 			}
    338  1.14     rmind 			/* Break directly out of the loop. */
    339   1.1  christos 			return 0;
    340  1.14     rmind #if defined(COMPAT_16) && defined(__arm)
    341  1.14     rmind 		case _DEV_ZERO_oARM:
    342  1.14     rmind #endif
    343  1.14     rmind 		case DEV_ZERO:
    344  1.14     rmind 			error = dev_zero_readwrite(uio, iov);
    345  1.14     rmind 			break;
    346  1.14     rmind 		default:
    347  1.14     rmind 			error = ENXIO;
    348  1.14     rmind 			break;
    349   1.1  christos 		}
    350  1.14     rmind 	}
    351  1.14     rmind 	return error;
    352  1.14     rmind }
    353  1.14     rmind 
    354  1.14     rmind /*
    355  1.14     rmind  * mm_mmap: general mmap() handler.
    356  1.14     rmind  */
    357  1.14     rmind static paddr_t
    358  1.14     rmind mm_mmap(dev_t dev, off_t off, int acc)
    359  1.14     rmind {
    360  1.14     rmind 	vm_prot_t prot;
    361  1.14     rmind 
    362  1.14     rmind #ifdef __HAVE_MM_MD_MMAP
    363  1.14     rmind 	/* If defined - there are extra mmap() MD cases. */
    364  1.14     rmind 	switch (minor(dev)) {
    365  1.14     rmind 	case DEV_MEM:
    366  1.14     rmind 	case DEV_KMEM:
    367  1.14     rmind 	case DEV_NULL:
    368  1.14     rmind #if defined(COMPAT_16) && defined(__arm)
    369  1.14     rmind 	case _DEV_ZERO_oARM:
    370  1.14     rmind #endif
    371  1.14     rmind 	case DEV_ZERO:
    372  1.14     rmind 		break;
    373  1.14     rmind 	default:
    374  1.14     rmind 		return mm_md_mmap(dev, off, acc);
    375  1.14     rmind 	}
    376  1.14     rmind #endif
    377  1.14     rmind 	/*
    378  1.14     rmind 	 * /dev/null does not make sense, /dev/kmem is volatile and
    379  1.14     rmind 	 * /dev/zero is handled in mmap already.
    380  1.14     rmind 	 */
    381  1.14     rmind 	if (minor(dev) != DEV_MEM) {
    382  1.14     rmind 		return -1;
    383  1.14     rmind 	}
    384  1.14     rmind 
    385  1.14     rmind 	prot = 0;
    386  1.14     rmind 	if (acc & PROT_EXEC)
    387  1.14     rmind 		prot |= VM_PROT_EXECUTE;
    388  1.14     rmind 	if (acc & PROT_READ)
    389  1.14     rmind 		prot |= VM_PROT_READ;
    390  1.14     rmind 	if (acc & PROT_WRITE)
    391  1.14     rmind 		prot |= VM_PROT_WRITE;
    392  1.14     rmind 
    393  1.14     rmind 	/* Validate the physical address. */
    394  1.14     rmind 	if (mm_md_physacc(off, prot) != 0) {
    395  1.14     rmind 		return -1;
    396  1.14     rmind 	}
    397  1.14     rmind 	return off >> PGSHIFT;
    398  1.14     rmind }
    399  1.14     rmind 
    400  1.14     rmind static int
    401  1.14     rmind mm_ioctl(dev_t dev, u_long cmd, void *data, int flag, struct lwp *l)
    402  1.14     rmind {
    403  1.14     rmind 
    404  1.14     rmind 	switch (cmd) {
    405  1.14     rmind 	case FIONBIO:
    406  1.14     rmind 		/* We never block anyway. */
    407  1.14     rmind 		return 0;
    408  1.14     rmind 
    409  1.14     rmind 	case FIOSETOWN:
    410  1.14     rmind 	case FIOGETOWN:
    411  1.14     rmind 	case TIOCGPGRP:
    412  1.14     rmind 	case TIOCSPGRP:
    413  1.14     rmind 	case TIOCGETA:
    414  1.14     rmind 		return ENOTTY;
    415  1.14     rmind 
    416  1.14     rmind 	case FIOASYNC:
    417  1.14     rmind 		if ((*(int *)data) == 0) {
    418  1.14     rmind 			return 0;
    419  1.14     rmind 		}
    420  1.14     rmind 		/* FALLTHROUGH */
    421  1.14     rmind 	default:
    422   1.1  christos 		return EOPNOTSUPP;
    423   1.1  christos 	}
    424   1.1  christos }
    425