/* $NetBSD: vmalloc.h,v 1.4.12.1 2018/08/31 17:43:03 martin Exp $ */ /*- * Copyright (c) 2013, 2018 The NetBSD Foundation, Inc. * All rights reserved. * * This code is derived from software contributed to The NetBSD Foundation * by Taylor R. Campbell. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE * POSSIBILITY OF SUCH DAMAGE. */ #ifndef _LINUX_VMALLOC_H_ #define _LINUX_VMALLOC_H_ #include #include #include #include static inline bool is_vmalloc_addr(void *addr) { /* XXX Assumes vmalloc and kmalloc both use malloc(9). */ return true; } static inline void * vmalloc(unsigned long size) { return malloc(size, M_TEMP, M_WAITOK); } static inline void * vmalloc_user(unsigned long size) { return malloc(size, M_TEMP, (M_WAITOK | M_ZERO)); } static inline void * vzalloc(unsigned long size) { return malloc(size, M_TEMP, (M_WAITOK | M_ZERO)); } static inline void vfree(void *ptr) { return free(ptr, M_TEMP); } #define PAGE_KERNEL UVM_PROT_RW /* * vmap(pages, npages, flags, prot) * * Map pages[0], pages[1], ..., pages[npages-1] into contiguous * kernel virtual address space with the specified protection, and * return a KVA pointer to the start. * * prot may be a bitwise ior of UVM_PROT_READ/WRITE/EXEC and * PMAP_* cache flags accepted by pmap_enter(). */ static inline void * vmap(struct page **pages, unsigned npages, unsigned long flags, pgprot_t protflags) { vm_prot_t justprot = protflags & UVM_PROT_ALL; vaddr_t va; unsigned i; /* Allocate some KVA, or return NULL if we can't. */ va = uvm_km_alloc(kernel_map, (vsize_t)npages << PAGE_SHIFT, PAGE_SIZE, UVM_KMF_VAONLY|UVM_KMF_NOWAIT); if (va == 0) return NULL; /* Ask pmap to map the KVA to the specified page addresses. */ for (i = 0; i < npages; i++) { pmap_kenter_pa(va + i*PAGE_SIZE, page_to_phys(pages[i]), justprot, protflags); } /* Commit the pmap updates. */ pmap_update(pmap_kernel()); return (void *)va; } /* * vunmap(ptr, npages) * * Unmap the KVA pages starting at ptr that were mapped by a call * to vmap with the same npages parameter. */ static inline void vunmap(void *ptr, unsigned npages) { vaddr_t va = (vaddr_t)ptr; /* Ask pmap to unmap the KVA. */ pmap_kremove(va, (vsize_t)npages << PAGE_SHIFT); /* Commit the pmap updates. */ pmap_update(pmap_kernel()); /* * Now that the pmap is no longer mapping the KVA we allocated * on any CPU, it is safe to free the KVA. */ uvm_km_free(kernel_map, va, (vsize_t)npages << PAGE_SHIFT, UVM_KMF_VAONLY); } #endif /* _LINUX_VMALLOC_H_ */