/*- * Copyright (c) 1988 University of Utah. * Copyright (c) 1982, 1986, 1990 The Regents of the University of California. * All rights reserved. * * This code is derived from software contributed to Berkeley by * the Systems Programming Group of the University of Utah Computer * Science Department, and code derived from software contributed to * Berkeley by William Jolitz. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software * must display the following acknowledgement: * This product includes software developed by the University of * California, Berkeley and its contributors. * 4. Neither the name of the University nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * * from: Utah $Hdr: mem.c 1.13 89/10/08$ * from: @(#)mem.c 7.2 (Berkeley) 5/9/91 * $Id: mem.c,v 1.18 1995/11/04 13:52:30 bde Exp $ */ /* * Memory special file */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #ifdef DEVFS #include #include "sys/kernel.h" static void memdev_init __P((void *)); SYSINIT(memdev,SI_SUB_DEVFS, SI_ORDER_ANY, memdev_init, NULL) static void memdev_init(dummy) void *dummy; { void * x; /* path name devsw minor type uid gid perm*/ x=dev_add("/misc", "mem", mmopen, 0, DV_CHR, 0, 2, 0640); x=dev_add("/misc", "kmem", mmopen, 1, DV_CHR, 0, 2, 0640); x=dev_add("/misc", "null", mmopen, 2, DV_CHR, 0, 0, 0666); x=dev_add("/misc", "random", mmopen, 3, DV_CHR, 0, 0, 0666); x=dev_add("/misc", "urandom", mmopen, 4, DV_CHR, 0, 0, 0666); x=dev_add("/misc", "zero", mmopen, 12, DV_CHR, 0, 0, 0666); x=dev_add("/misc", "io", mmopen, 14, DV_CHR, 0, 2, 0640); } #endif /* DEVFS */ extern char *ptvmmap; /* poor name! */ int mmclose(dev, flags, fmt, p) dev_t dev; int flags; int fmt; struct proc *p; { struct trapframe *fp; switch (minor(dev)) { case 14: fp = (struct trapframe *)curproc->p_md.md_regs; fp->tf_eflags &= ~PSL_IOPL; break; default: break; } return(0); } int mmopen(dev, flags, fmt, p) dev_t dev; int flags; int fmt; struct proc *p; { struct trapframe *fp; switch (minor(dev)) { case 14: fp = (struct trapframe *)curproc->p_md.md_regs; fp->tf_eflags |= PSL_IOPL; break; default: break; } return(0); } int mmrw(dev, uio, flags) dev_t dev; struct uio *uio; int flags; { register int o; register u_int c, v; u_int poolsize; register struct iovec *iov; int error = 0; caddr_t buf = NULL; while (uio->uio_resid > 0 && error == 0) { iov = uio->uio_iov; if (iov->iov_len == 0) { uio->uio_iov++; uio->uio_iovcnt--; if (uio->uio_iovcnt < 0) panic("mmrw"); continue; } switch (minor(dev)) { /* minor device 0 is physical memory */ case 0: v = uio->uio_offset; pmap_enter(kernel_pmap, (vm_offset_t)ptvmmap, v, uio->uio_rw == UIO_READ ? VM_PROT_READ : VM_PROT_WRITE, TRUE); o = (int)uio->uio_offset & PGOFSET; c = (u_int)(NBPG - ((int)iov->iov_base & PGOFSET)); c = min(c, (u_int)(NBPG - o)); c = min(c, (u_int)iov->iov_len); error = uiomove((caddr_t)&ptvmmap[o], (int)c, uio); pmap_remove(kernel_pmap, (vm_offset_t)ptvmmap, (vm_offset_t)&ptvmmap[NBPG]); continue; /* minor device 1 is kernel memory */ case 1: { vm_offset_t addr, eaddr; c = iov->iov_len; /* * Make sure that all of the pages are currently resident so * that we don't create any zero-fill pages. */ addr = trunc_page(uio->uio_offset); eaddr = round_page(uio->uio_offset + c); for (; addr < eaddr; addr += PAGE_SIZE) if (pmap_extract(kernel_pmap, addr) == 0) return EFAULT; if (!kernacc((caddr_t)(int)uio->uio_offset, c, uio->uio_rw == UIO_READ ? B_READ : B_WRITE)) return(EFAULT); error = uiomove((caddr_t)(int)uio->uio_offset, (int)c, uio); continue; } /* minor device 2 is EOF/RATHOLE */ case 2: if (uio->uio_rw == UIO_READ) return (0); c = iov->iov_len; break; /* minor device 3 (/dev/random) is source of filth on read, rathole on write */ case 3: if (uio->uio_rw == UIO_WRITE) { c = iov->iov_len; break; } if (buf == NULL) buf = (caddr_t) malloc(CLBYTES, M_TEMP, M_WAITOK); c = min(iov->iov_len, CLBYTES); poolsize = read_random(buf, c); if (poolsize == 0) { if (buf) free(buf, M_TEMP); return (0); } c = min(c, poolsize); error = uiomove(buf, (int)c, uio); continue; /* minor device 4 (/dev/urandom) is source of muck on read, rathole on write */ case 4: if (uio->uio_rw == UIO_WRITE) { c = iov->iov_len; break; } if (buf == NULL) buf = (caddr_t) malloc(CLBYTES, M_TEMP, M_WAITOK); c = min(iov->iov_len, CLBYTES); poolsize = read_random_unlimited(buf, c); c = min(c, poolsize); error = uiomove(buf, (int)c, uio); continue; /* minor device 12 (/dev/zero) is source of nulls on read, rathole on write */ case 12: if (uio->uio_rw == UIO_WRITE) { c = iov->iov_len; break; } if (buf == NULL) { buf = (caddr_t) malloc(CLBYTES, M_TEMP, M_WAITOK); bzero(buf, CLBYTES); } c = min(iov->iov_len, CLBYTES); error = uiomove(buf, (int)c, uio); continue; #ifdef notyet /* 386 I/O address space (/dev/ioport[bwl]) is a read/write access to seperate i/o device address bus, different than memory bus. Semantics here are very different than ordinary read/write, as if iov_len is a multiple an implied string move from a single port will be done. Note that lseek must be used to set the port number reliably. */ case 14: if (iov->iov_len == 1) { u_char tmp; tmp = inb(uio->uio_offset); error = uiomove (&tmp, iov->iov_len, uio); } else { if (!useracc((caddr_t)iov->iov_base, iov->iov_len, uio->uio_rw)) return (EFAULT); insb(uio->uio_offset, iov->iov_base, iov->iov_len); } break; case 15: if (iov->iov_len == sizeof (short)) { u_short tmp; tmp = inw(uio->uio_offset); error = uiomove (&tmp, iov->iov_len, uio); } else { if (!useracc((caddr_t)iov->iov_base, iov->iov_len, uio->uio_rw)) return (EFAULT); insw(uio->uio_offset, iov->iov_base, iov->iov_len/ sizeof (short)); } break; case 16: if (iov->iov_len == sizeof (long)) { u_long tmp; tmp = inl(uio->uio_offset); error = uiomove (&tmp, iov->iov_len, uio); } else { if (!useracc((caddr_t)iov->iov_base, iov->iov_len, uio->uio_rw)) return (EFAULT); insl(uio->uio_offset, iov->iov_base, iov->iov_len/ sizeof (long)); } break; #endif default: return (ENXIO); } if (error) break; iov->iov_base += c; iov->iov_len -= c; uio->uio_offset += c; uio->uio_resid -= c; } if (buf) free(buf, M_TEMP); return (error); } /*******************************************************\ * allow user processes to MMAP some memory sections * * instead of going through read/write * \*******************************************************/ int memmmap(dev_t dev, int offset, int nprot) { switch (minor(dev)) { /* minor device 0 is physical memory */ case 0: return i386_btop(offset); /* minor device 1 is kernel memory */ case 1: return i386_btop(vtophys(offset)); default: return -1; } } /* * Allow userland to select which interrupts will be used in the muck * gathering business. */ int mmioctl(dev, cmd, cmdarg, flags, p) dev_t dev; int cmd; caddr_t cmdarg; int flags; struct proc *p; { int error; if (minor(dev) != 3 && minor(dev) != 4) return (ENODEV); if (*(u_int16_t *)cmdarg >= 16) return (EINVAL); /* Only root can do this */ error = suser(p->p_ucred, &p->p_acflag); if (error != 0) { return (error); } switch (cmd){ case MEM_SETIRQ: interrupt_allowed |= 1 << *(u_int16_t *)cmdarg; break; case MEM_CLEARIRQ: interrupt_allowed &= ~(1 << *(u_int16_t *)cmdarg); break; case MEM_RETURNIRQ: *(u_int16_t *)cmdarg = interrupt_allowed; break; default: return (ENOTTY); } return (0); }