18c2ecf20Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0
28c2ecf20Sopenharmony_ci/*
38c2ecf20Sopenharmony_ci *  linux/arch/arm/mm/mmap.c
48c2ecf20Sopenharmony_ci */
58c2ecf20Sopenharmony_ci#include <linux/fs.h>
68c2ecf20Sopenharmony_ci#include <linux/mm.h>
78c2ecf20Sopenharmony_ci#include <linux/mman.h>
88c2ecf20Sopenharmony_ci#include <linux/shm.h>
98c2ecf20Sopenharmony_ci#include <linux/sched/signal.h>
108c2ecf20Sopenharmony_ci#include <linux/sched/mm.h>
118c2ecf20Sopenharmony_ci#include <linux/io.h>
128c2ecf20Sopenharmony_ci#include <linux/personality.h>
138c2ecf20Sopenharmony_ci#include <linux/random.h>
148c2ecf20Sopenharmony_ci#include <asm/cachetype.h>
158c2ecf20Sopenharmony_ci
168c2ecf20Sopenharmony_ci#define COLOUR_ALIGN(addr,pgoff)		\
178c2ecf20Sopenharmony_ci	((((addr)+SHMLBA-1)&~(SHMLBA-1)) +	\
188c2ecf20Sopenharmony_ci	 (((pgoff)<<PAGE_SHIFT) & (SHMLBA-1)))
198c2ecf20Sopenharmony_ci
208c2ecf20Sopenharmony_ci/*
218c2ecf20Sopenharmony_ci * We need to ensure that shared mappings are correctly aligned to
228c2ecf20Sopenharmony_ci * avoid aliasing issues with VIPT caches.  We need to ensure that
238c2ecf20Sopenharmony_ci * a specific page of an object is always mapped at a multiple of
248c2ecf20Sopenharmony_ci * SHMLBA bytes.
258c2ecf20Sopenharmony_ci *
268c2ecf20Sopenharmony_ci * We unconditionally provide this function for all cases, however
278c2ecf20Sopenharmony_ci * in the VIVT case, we optimise out the alignment rules.
288c2ecf20Sopenharmony_ci */
298c2ecf20Sopenharmony_ciunsigned long
308c2ecf20Sopenharmony_ciarch_get_unmapped_area(struct file *filp, unsigned long addr,
318c2ecf20Sopenharmony_ci		unsigned long len, unsigned long pgoff, unsigned long flags)
328c2ecf20Sopenharmony_ci{
338c2ecf20Sopenharmony_ci	struct mm_struct *mm = current->mm;
348c2ecf20Sopenharmony_ci	struct vm_area_struct *vma;
358c2ecf20Sopenharmony_ci	int do_align = 0;
368c2ecf20Sopenharmony_ci	int aliasing = cache_is_vipt_aliasing();
378c2ecf20Sopenharmony_ci	struct vm_unmapped_area_info info;
388c2ecf20Sopenharmony_ci
398c2ecf20Sopenharmony_ci	/*
408c2ecf20Sopenharmony_ci	 * We only need to do colour alignment if either the I or D
418c2ecf20Sopenharmony_ci	 * caches alias.
428c2ecf20Sopenharmony_ci	 */
438c2ecf20Sopenharmony_ci	if (aliasing)
448c2ecf20Sopenharmony_ci		do_align = filp || (flags & MAP_SHARED);
458c2ecf20Sopenharmony_ci
468c2ecf20Sopenharmony_ci	/*
478c2ecf20Sopenharmony_ci	 * We enforce the MAP_FIXED case.
488c2ecf20Sopenharmony_ci	 */
498c2ecf20Sopenharmony_ci	if (flags & MAP_FIXED) {
508c2ecf20Sopenharmony_ci		if (aliasing && flags & MAP_SHARED &&
518c2ecf20Sopenharmony_ci		    (addr - (pgoff << PAGE_SHIFT)) & (SHMLBA - 1))
528c2ecf20Sopenharmony_ci			return -EINVAL;
538c2ecf20Sopenharmony_ci		return addr;
548c2ecf20Sopenharmony_ci	}
558c2ecf20Sopenharmony_ci
568c2ecf20Sopenharmony_ci	if (len > TASK_SIZE)
578c2ecf20Sopenharmony_ci		return -ENOMEM;
588c2ecf20Sopenharmony_ci
598c2ecf20Sopenharmony_ci	if (addr) {
608c2ecf20Sopenharmony_ci		if (do_align)
618c2ecf20Sopenharmony_ci			addr = COLOUR_ALIGN(addr, pgoff);
628c2ecf20Sopenharmony_ci		else
638c2ecf20Sopenharmony_ci			addr = PAGE_ALIGN(addr);
648c2ecf20Sopenharmony_ci
658c2ecf20Sopenharmony_ci		vma = find_vma(mm, addr);
668c2ecf20Sopenharmony_ci		if (TASK_SIZE - len >= addr &&
678c2ecf20Sopenharmony_ci		    (!vma || addr + len <= vm_start_gap(vma)))
688c2ecf20Sopenharmony_ci			return addr;
698c2ecf20Sopenharmony_ci	}
708c2ecf20Sopenharmony_ci
718c2ecf20Sopenharmony_ci	info.flags = 0;
728c2ecf20Sopenharmony_ci	info.length = len;
738c2ecf20Sopenharmony_ci	info.low_limit = mm->mmap_base;
748c2ecf20Sopenharmony_ci	info.high_limit = TASK_SIZE;
758c2ecf20Sopenharmony_ci	info.align_mask = do_align ? (PAGE_MASK & (SHMLBA - 1)) : 0;
768c2ecf20Sopenharmony_ci	info.align_offset = pgoff << PAGE_SHIFT;
778c2ecf20Sopenharmony_ci	return vm_unmapped_area(&info);
788c2ecf20Sopenharmony_ci}
798c2ecf20Sopenharmony_ci
808c2ecf20Sopenharmony_ciunsigned long
818c2ecf20Sopenharmony_ciarch_get_unmapped_area_topdown(struct file *filp, const unsigned long addr0,
828c2ecf20Sopenharmony_ci			const unsigned long len, const unsigned long pgoff,
838c2ecf20Sopenharmony_ci			const unsigned long flags)
848c2ecf20Sopenharmony_ci{
858c2ecf20Sopenharmony_ci	struct vm_area_struct *vma;
868c2ecf20Sopenharmony_ci	struct mm_struct *mm = current->mm;
878c2ecf20Sopenharmony_ci	unsigned long addr = addr0;
888c2ecf20Sopenharmony_ci	int do_align = 0;
898c2ecf20Sopenharmony_ci	int aliasing = cache_is_vipt_aliasing();
908c2ecf20Sopenharmony_ci	struct vm_unmapped_area_info info;
918c2ecf20Sopenharmony_ci
928c2ecf20Sopenharmony_ci	/*
938c2ecf20Sopenharmony_ci	 * We only need to do colour alignment if either the I or D
948c2ecf20Sopenharmony_ci	 * caches alias.
958c2ecf20Sopenharmony_ci	 */
968c2ecf20Sopenharmony_ci	if (aliasing)
978c2ecf20Sopenharmony_ci		do_align = filp || (flags & MAP_SHARED);
988c2ecf20Sopenharmony_ci
998c2ecf20Sopenharmony_ci	/* requested length too big for entire address space */
1008c2ecf20Sopenharmony_ci	if (len > TASK_SIZE)
1018c2ecf20Sopenharmony_ci		return -ENOMEM;
1028c2ecf20Sopenharmony_ci
1038c2ecf20Sopenharmony_ci	if (flags & MAP_FIXED) {
1048c2ecf20Sopenharmony_ci		if (aliasing && flags & MAP_SHARED &&
1058c2ecf20Sopenharmony_ci		    (addr - (pgoff << PAGE_SHIFT)) & (SHMLBA - 1))
1068c2ecf20Sopenharmony_ci			return -EINVAL;
1078c2ecf20Sopenharmony_ci		return addr;
1088c2ecf20Sopenharmony_ci	}
1098c2ecf20Sopenharmony_ci
1108c2ecf20Sopenharmony_ci	/* requesting a specific address */
1118c2ecf20Sopenharmony_ci	if (addr) {
1128c2ecf20Sopenharmony_ci		if (do_align)
1138c2ecf20Sopenharmony_ci			addr = COLOUR_ALIGN(addr, pgoff);
1148c2ecf20Sopenharmony_ci		else
1158c2ecf20Sopenharmony_ci			addr = PAGE_ALIGN(addr);
1168c2ecf20Sopenharmony_ci		vma = find_vma(mm, addr);
1178c2ecf20Sopenharmony_ci		if (TASK_SIZE - len >= addr &&
1188c2ecf20Sopenharmony_ci				(!vma || addr + len <= vm_start_gap(vma)))
1198c2ecf20Sopenharmony_ci			return addr;
1208c2ecf20Sopenharmony_ci	}
1218c2ecf20Sopenharmony_ci
1228c2ecf20Sopenharmony_ci	info.flags = VM_UNMAPPED_AREA_TOPDOWN;
1238c2ecf20Sopenharmony_ci	info.length = len;
1248c2ecf20Sopenharmony_ci	info.low_limit = FIRST_USER_ADDRESS;
1258c2ecf20Sopenharmony_ci	info.high_limit = mm->mmap_base;
1268c2ecf20Sopenharmony_ci	info.align_mask = do_align ? (PAGE_MASK & (SHMLBA - 1)) : 0;
1278c2ecf20Sopenharmony_ci	info.align_offset = pgoff << PAGE_SHIFT;
1288c2ecf20Sopenharmony_ci	addr = vm_unmapped_area(&info);
1298c2ecf20Sopenharmony_ci
1308c2ecf20Sopenharmony_ci	/*
1318c2ecf20Sopenharmony_ci	 * A failed mmap() very likely causes application failure,
1328c2ecf20Sopenharmony_ci	 * so fall back to the bottom-up function here. This scenario
1338c2ecf20Sopenharmony_ci	 * can happen with large stack limits and large mmap()
1348c2ecf20Sopenharmony_ci	 * allocations.
1358c2ecf20Sopenharmony_ci	 */
1368c2ecf20Sopenharmony_ci	if (addr & ~PAGE_MASK) {
1378c2ecf20Sopenharmony_ci		VM_BUG_ON(addr != -ENOMEM);
1388c2ecf20Sopenharmony_ci		info.flags = 0;
1398c2ecf20Sopenharmony_ci		info.low_limit = mm->mmap_base;
1408c2ecf20Sopenharmony_ci		info.high_limit = TASK_SIZE;
1418c2ecf20Sopenharmony_ci		addr = vm_unmapped_area(&info);
1428c2ecf20Sopenharmony_ci	}
1438c2ecf20Sopenharmony_ci
1448c2ecf20Sopenharmony_ci	return addr;
1458c2ecf20Sopenharmony_ci}
1468c2ecf20Sopenharmony_ci
1478c2ecf20Sopenharmony_ci/*
1488c2ecf20Sopenharmony_ci * You really shouldn't be using read() or write() on /dev/mem.  This
1498c2ecf20Sopenharmony_ci * might go away in the future.
1508c2ecf20Sopenharmony_ci */
1518c2ecf20Sopenharmony_ciint valid_phys_addr_range(phys_addr_t addr, size_t size)
1528c2ecf20Sopenharmony_ci{
1538c2ecf20Sopenharmony_ci	if (addr < PHYS_OFFSET)
1548c2ecf20Sopenharmony_ci		return 0;
1558c2ecf20Sopenharmony_ci	if (addr + size > __pa(high_memory - 1) + 1)
1568c2ecf20Sopenharmony_ci		return 0;
1578c2ecf20Sopenharmony_ci
1588c2ecf20Sopenharmony_ci	return 1;
1598c2ecf20Sopenharmony_ci}
1608c2ecf20Sopenharmony_ci
1618c2ecf20Sopenharmony_ci/*
1628c2ecf20Sopenharmony_ci * Do not allow /dev/mem mappings beyond the supported physical range.
1638c2ecf20Sopenharmony_ci */
1648c2ecf20Sopenharmony_ciint valid_mmap_phys_addr_range(unsigned long pfn, size_t size)
1658c2ecf20Sopenharmony_ci{
1668c2ecf20Sopenharmony_ci	return (pfn + (size >> PAGE_SHIFT)) <= (1 + (PHYS_MASK >> PAGE_SHIFT));
1678c2ecf20Sopenharmony_ci}
1688c2ecf20Sopenharmony_ci
1698c2ecf20Sopenharmony_ci#ifdef CONFIG_STRICT_DEVMEM
1708c2ecf20Sopenharmony_ci
1718c2ecf20Sopenharmony_ci#include <linux/ioport.h>
1728c2ecf20Sopenharmony_ci
1738c2ecf20Sopenharmony_ci/*
1748c2ecf20Sopenharmony_ci * devmem_is_allowed() checks to see if /dev/mem access to a certain
1758c2ecf20Sopenharmony_ci * address is valid. The argument is a physical page number.
1768c2ecf20Sopenharmony_ci * We mimic x86 here by disallowing access to system RAM as well as
1778c2ecf20Sopenharmony_ci * device-exclusive MMIO regions. This effectively disable read()/write()
1788c2ecf20Sopenharmony_ci * on /dev/mem.
1798c2ecf20Sopenharmony_ci */
1808c2ecf20Sopenharmony_ciint devmem_is_allowed(unsigned long pfn)
1818c2ecf20Sopenharmony_ci{
1828c2ecf20Sopenharmony_ci	if (iomem_is_exclusive(PFN_PHYS(pfn)))
1838c2ecf20Sopenharmony_ci		return 0;
1848c2ecf20Sopenharmony_ci	if (!page_is_ram(pfn))
1858c2ecf20Sopenharmony_ci		return 1;
1868c2ecf20Sopenharmony_ci	return 0;
1878c2ecf20Sopenharmony_ci}
1888c2ecf20Sopenharmony_ci
1898c2ecf20Sopenharmony_ci#endif
190