18c2ecf20Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 28c2ecf20Sopenharmony_ci/* 38c2ecf20Sopenharmony_ci * linux/arch/arm/mm/mmap.c 48c2ecf20Sopenharmony_ci */ 58c2ecf20Sopenharmony_ci#include <linux/fs.h> 68c2ecf20Sopenharmony_ci#include <linux/mm.h> 78c2ecf20Sopenharmony_ci#include <linux/mman.h> 88c2ecf20Sopenharmony_ci#include <linux/shm.h> 98c2ecf20Sopenharmony_ci#include <linux/sched/signal.h> 108c2ecf20Sopenharmony_ci#include <linux/sched/mm.h> 118c2ecf20Sopenharmony_ci#include <linux/io.h> 128c2ecf20Sopenharmony_ci#include <linux/personality.h> 138c2ecf20Sopenharmony_ci#include <linux/random.h> 148c2ecf20Sopenharmony_ci#include <asm/cachetype.h> 158c2ecf20Sopenharmony_ci 168c2ecf20Sopenharmony_ci#define COLOUR_ALIGN(addr,pgoff) \ 178c2ecf20Sopenharmony_ci ((((addr)+SHMLBA-1)&~(SHMLBA-1)) + \ 188c2ecf20Sopenharmony_ci (((pgoff)<<PAGE_SHIFT) & (SHMLBA-1))) 198c2ecf20Sopenharmony_ci 208c2ecf20Sopenharmony_ci/* 218c2ecf20Sopenharmony_ci * We need to ensure that shared mappings are correctly aligned to 228c2ecf20Sopenharmony_ci * avoid aliasing issues with VIPT caches. We need to ensure that 238c2ecf20Sopenharmony_ci * a specific page of an object is always mapped at a multiple of 248c2ecf20Sopenharmony_ci * SHMLBA bytes. 258c2ecf20Sopenharmony_ci * 268c2ecf20Sopenharmony_ci * We unconditionally provide this function for all cases, however 278c2ecf20Sopenharmony_ci * in the VIVT case, we optimise out the alignment rules. 288c2ecf20Sopenharmony_ci */ 298c2ecf20Sopenharmony_ciunsigned long 308c2ecf20Sopenharmony_ciarch_get_unmapped_area(struct file *filp, unsigned long addr, 318c2ecf20Sopenharmony_ci unsigned long len, unsigned long pgoff, unsigned long flags) 328c2ecf20Sopenharmony_ci{ 338c2ecf20Sopenharmony_ci struct mm_struct *mm = current->mm; 348c2ecf20Sopenharmony_ci struct vm_area_struct *vma; 358c2ecf20Sopenharmony_ci int do_align = 0; 368c2ecf20Sopenharmony_ci int aliasing = cache_is_vipt_aliasing(); 378c2ecf20Sopenharmony_ci struct vm_unmapped_area_info info; 388c2ecf20Sopenharmony_ci 398c2ecf20Sopenharmony_ci /* 408c2ecf20Sopenharmony_ci * We only need to do colour alignment if either the I or D 418c2ecf20Sopenharmony_ci * caches alias. 428c2ecf20Sopenharmony_ci */ 438c2ecf20Sopenharmony_ci if (aliasing) 448c2ecf20Sopenharmony_ci do_align = filp || (flags & MAP_SHARED); 458c2ecf20Sopenharmony_ci 468c2ecf20Sopenharmony_ci /* 478c2ecf20Sopenharmony_ci * We enforce the MAP_FIXED case. 488c2ecf20Sopenharmony_ci */ 498c2ecf20Sopenharmony_ci if (flags & MAP_FIXED) { 508c2ecf20Sopenharmony_ci if (aliasing && flags & MAP_SHARED && 518c2ecf20Sopenharmony_ci (addr - (pgoff << PAGE_SHIFT)) & (SHMLBA - 1)) 528c2ecf20Sopenharmony_ci return -EINVAL; 538c2ecf20Sopenharmony_ci return addr; 548c2ecf20Sopenharmony_ci } 558c2ecf20Sopenharmony_ci 568c2ecf20Sopenharmony_ci if (len > TASK_SIZE) 578c2ecf20Sopenharmony_ci return -ENOMEM; 588c2ecf20Sopenharmony_ci 598c2ecf20Sopenharmony_ci if (addr) { 608c2ecf20Sopenharmony_ci if (do_align) 618c2ecf20Sopenharmony_ci addr = COLOUR_ALIGN(addr, pgoff); 628c2ecf20Sopenharmony_ci else 638c2ecf20Sopenharmony_ci addr = PAGE_ALIGN(addr); 648c2ecf20Sopenharmony_ci 658c2ecf20Sopenharmony_ci vma = find_vma(mm, addr); 668c2ecf20Sopenharmony_ci if (TASK_SIZE - len >= addr && 678c2ecf20Sopenharmony_ci (!vma || addr + len <= vm_start_gap(vma))) 688c2ecf20Sopenharmony_ci return addr; 698c2ecf20Sopenharmony_ci } 708c2ecf20Sopenharmony_ci 718c2ecf20Sopenharmony_ci info.flags = 0; 728c2ecf20Sopenharmony_ci info.length = len; 738c2ecf20Sopenharmony_ci info.low_limit = mm->mmap_base; 748c2ecf20Sopenharmony_ci info.high_limit = TASK_SIZE; 758c2ecf20Sopenharmony_ci info.align_mask = do_align ? (PAGE_MASK & (SHMLBA - 1)) : 0; 768c2ecf20Sopenharmony_ci info.align_offset = pgoff << PAGE_SHIFT; 778c2ecf20Sopenharmony_ci return vm_unmapped_area(&info); 788c2ecf20Sopenharmony_ci} 798c2ecf20Sopenharmony_ci 808c2ecf20Sopenharmony_ciunsigned long 818c2ecf20Sopenharmony_ciarch_get_unmapped_area_topdown(struct file *filp, const unsigned long addr0, 828c2ecf20Sopenharmony_ci const unsigned long len, const unsigned long pgoff, 838c2ecf20Sopenharmony_ci const unsigned long flags) 848c2ecf20Sopenharmony_ci{ 858c2ecf20Sopenharmony_ci struct vm_area_struct *vma; 868c2ecf20Sopenharmony_ci struct mm_struct *mm = current->mm; 878c2ecf20Sopenharmony_ci unsigned long addr = addr0; 888c2ecf20Sopenharmony_ci int do_align = 0; 898c2ecf20Sopenharmony_ci int aliasing = cache_is_vipt_aliasing(); 908c2ecf20Sopenharmony_ci struct vm_unmapped_area_info info; 918c2ecf20Sopenharmony_ci 928c2ecf20Sopenharmony_ci /* 938c2ecf20Sopenharmony_ci * We only need to do colour alignment if either the I or D 948c2ecf20Sopenharmony_ci * caches alias. 958c2ecf20Sopenharmony_ci */ 968c2ecf20Sopenharmony_ci if (aliasing) 978c2ecf20Sopenharmony_ci do_align = filp || (flags & MAP_SHARED); 988c2ecf20Sopenharmony_ci 998c2ecf20Sopenharmony_ci /* requested length too big for entire address space */ 1008c2ecf20Sopenharmony_ci if (len > TASK_SIZE) 1018c2ecf20Sopenharmony_ci return -ENOMEM; 1028c2ecf20Sopenharmony_ci 1038c2ecf20Sopenharmony_ci if (flags & MAP_FIXED) { 1048c2ecf20Sopenharmony_ci if (aliasing && flags & MAP_SHARED && 1058c2ecf20Sopenharmony_ci (addr - (pgoff << PAGE_SHIFT)) & (SHMLBA - 1)) 1068c2ecf20Sopenharmony_ci return -EINVAL; 1078c2ecf20Sopenharmony_ci return addr; 1088c2ecf20Sopenharmony_ci } 1098c2ecf20Sopenharmony_ci 1108c2ecf20Sopenharmony_ci /* requesting a specific address */ 1118c2ecf20Sopenharmony_ci if (addr) { 1128c2ecf20Sopenharmony_ci if (do_align) 1138c2ecf20Sopenharmony_ci addr = COLOUR_ALIGN(addr, pgoff); 1148c2ecf20Sopenharmony_ci else 1158c2ecf20Sopenharmony_ci addr = PAGE_ALIGN(addr); 1168c2ecf20Sopenharmony_ci vma = find_vma(mm, addr); 1178c2ecf20Sopenharmony_ci if (TASK_SIZE - len >= addr && 1188c2ecf20Sopenharmony_ci (!vma || addr + len <= vm_start_gap(vma))) 1198c2ecf20Sopenharmony_ci return addr; 1208c2ecf20Sopenharmony_ci } 1218c2ecf20Sopenharmony_ci 1228c2ecf20Sopenharmony_ci info.flags = VM_UNMAPPED_AREA_TOPDOWN; 1238c2ecf20Sopenharmony_ci info.length = len; 1248c2ecf20Sopenharmony_ci info.low_limit = FIRST_USER_ADDRESS; 1258c2ecf20Sopenharmony_ci info.high_limit = mm->mmap_base; 1268c2ecf20Sopenharmony_ci info.align_mask = do_align ? (PAGE_MASK & (SHMLBA - 1)) : 0; 1278c2ecf20Sopenharmony_ci info.align_offset = pgoff << PAGE_SHIFT; 1288c2ecf20Sopenharmony_ci addr = vm_unmapped_area(&info); 1298c2ecf20Sopenharmony_ci 1308c2ecf20Sopenharmony_ci /* 1318c2ecf20Sopenharmony_ci * A failed mmap() very likely causes application failure, 1328c2ecf20Sopenharmony_ci * so fall back to the bottom-up function here. This scenario 1338c2ecf20Sopenharmony_ci * can happen with large stack limits and large mmap() 1348c2ecf20Sopenharmony_ci * allocations. 1358c2ecf20Sopenharmony_ci */ 1368c2ecf20Sopenharmony_ci if (addr & ~PAGE_MASK) { 1378c2ecf20Sopenharmony_ci VM_BUG_ON(addr != -ENOMEM); 1388c2ecf20Sopenharmony_ci info.flags = 0; 1398c2ecf20Sopenharmony_ci info.low_limit = mm->mmap_base; 1408c2ecf20Sopenharmony_ci info.high_limit = TASK_SIZE; 1418c2ecf20Sopenharmony_ci addr = vm_unmapped_area(&info); 1428c2ecf20Sopenharmony_ci } 1438c2ecf20Sopenharmony_ci 1448c2ecf20Sopenharmony_ci return addr; 1458c2ecf20Sopenharmony_ci} 1468c2ecf20Sopenharmony_ci 1478c2ecf20Sopenharmony_ci/* 1488c2ecf20Sopenharmony_ci * You really shouldn't be using read() or write() on /dev/mem. This 1498c2ecf20Sopenharmony_ci * might go away in the future. 1508c2ecf20Sopenharmony_ci */ 1518c2ecf20Sopenharmony_ciint valid_phys_addr_range(phys_addr_t addr, size_t size) 1528c2ecf20Sopenharmony_ci{ 1538c2ecf20Sopenharmony_ci if (addr < PHYS_OFFSET) 1548c2ecf20Sopenharmony_ci return 0; 1558c2ecf20Sopenharmony_ci if (addr + size > __pa(high_memory - 1) + 1) 1568c2ecf20Sopenharmony_ci return 0; 1578c2ecf20Sopenharmony_ci 1588c2ecf20Sopenharmony_ci return 1; 1598c2ecf20Sopenharmony_ci} 1608c2ecf20Sopenharmony_ci 1618c2ecf20Sopenharmony_ci/* 1628c2ecf20Sopenharmony_ci * Do not allow /dev/mem mappings beyond the supported physical range. 1638c2ecf20Sopenharmony_ci */ 1648c2ecf20Sopenharmony_ciint valid_mmap_phys_addr_range(unsigned long pfn, size_t size) 1658c2ecf20Sopenharmony_ci{ 1668c2ecf20Sopenharmony_ci return (pfn + (size >> PAGE_SHIFT)) <= (1 + (PHYS_MASK >> PAGE_SHIFT)); 1678c2ecf20Sopenharmony_ci} 1688c2ecf20Sopenharmony_ci 1698c2ecf20Sopenharmony_ci#ifdef CONFIG_STRICT_DEVMEM 1708c2ecf20Sopenharmony_ci 1718c2ecf20Sopenharmony_ci#include <linux/ioport.h> 1728c2ecf20Sopenharmony_ci 1738c2ecf20Sopenharmony_ci/* 1748c2ecf20Sopenharmony_ci * devmem_is_allowed() checks to see if /dev/mem access to a certain 1758c2ecf20Sopenharmony_ci * address is valid. The argument is a physical page number. 1768c2ecf20Sopenharmony_ci * We mimic x86 here by disallowing access to system RAM as well as 1778c2ecf20Sopenharmony_ci * device-exclusive MMIO regions. This effectively disable read()/write() 1788c2ecf20Sopenharmony_ci * on /dev/mem. 1798c2ecf20Sopenharmony_ci */ 1808c2ecf20Sopenharmony_ciint devmem_is_allowed(unsigned long pfn) 1818c2ecf20Sopenharmony_ci{ 1828c2ecf20Sopenharmony_ci if (iomem_is_exclusive(PFN_PHYS(pfn))) 1838c2ecf20Sopenharmony_ci return 0; 1848c2ecf20Sopenharmony_ci if (!page_is_ram(pfn)) 1858c2ecf20Sopenharmony_ci return 1; 1868c2ecf20Sopenharmony_ci return 0; 1878c2ecf20Sopenharmony_ci} 1888c2ecf20Sopenharmony_ci 1898c2ecf20Sopenharmony_ci#endif 190