privcmd-buf.c 4.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192
  1. // SPDX-License-Identifier: GPL-2.0 OR MIT
  2. /******************************************************************************
  3. * privcmd-buf.c
  4. *
  5. * Mmap of hypercall buffers.
  6. *
  7. * Copyright (c) 2018 Juergen Gross
  8. */
  9. #define pr_fmt(fmt) "xen:" KBUILD_MODNAME ": " fmt
  10. #include <linux/kernel.h>
  11. #include <linux/module.h>
  12. #include <linux/list.h>
  13. #include <linux/miscdevice.h>
  14. #include <linux/mm.h>
  15. #include <linux/slab.h>
  16. #include "privcmd.h"
  17. MODULE_DESCRIPTION("Xen Mmap of hypercall buffers");
  18. MODULE_LICENSE("GPL");
  19. struct privcmd_buf_private {
  20. struct mutex lock;
  21. struct list_head list;
  22. };
  23. struct privcmd_buf_vma_private {
  24. struct privcmd_buf_private *file_priv;
  25. struct list_head list;
  26. unsigned int users;
  27. unsigned int n_pages;
  28. struct page *pages[];
  29. };
  30. static int privcmd_buf_open(struct inode *ino, struct file *file)
  31. {
  32. struct privcmd_buf_private *file_priv;
  33. file_priv = kzalloc(sizeof(*file_priv), GFP_KERNEL);
  34. if (!file_priv)
  35. return -ENOMEM;
  36. mutex_init(&file_priv->lock);
  37. INIT_LIST_HEAD(&file_priv->list);
  38. file->private_data = file_priv;
  39. return 0;
  40. }
  41. static void privcmd_buf_vmapriv_free(struct privcmd_buf_vma_private *vma_priv)
  42. {
  43. unsigned int i;
  44. list_del(&vma_priv->list);
  45. for (i = 0; i < vma_priv->n_pages; i++)
  46. __free_page(vma_priv->pages[i]);
  47. kfree(vma_priv);
  48. }
  49. static int privcmd_buf_release(struct inode *ino, struct file *file)
  50. {
  51. struct privcmd_buf_private *file_priv = file->private_data;
  52. struct privcmd_buf_vma_private *vma_priv;
  53. mutex_lock(&file_priv->lock);
  54. while (!list_empty(&file_priv->list)) {
  55. vma_priv = list_first_entry(&file_priv->list,
  56. struct privcmd_buf_vma_private,
  57. list);
  58. privcmd_buf_vmapriv_free(vma_priv);
  59. }
  60. mutex_unlock(&file_priv->lock);
  61. kfree(file_priv);
  62. return 0;
  63. }
  64. static void privcmd_buf_vma_open(struct vm_area_struct *vma)
  65. {
  66. struct privcmd_buf_vma_private *vma_priv = vma->vm_private_data;
  67. if (!vma_priv)
  68. return;
  69. mutex_lock(&vma_priv->file_priv->lock);
  70. vma_priv->users++;
  71. mutex_unlock(&vma_priv->file_priv->lock);
  72. }
  73. static void privcmd_buf_vma_close(struct vm_area_struct *vma)
  74. {
  75. struct privcmd_buf_vma_private *vma_priv = vma->vm_private_data;
  76. struct privcmd_buf_private *file_priv;
  77. if (!vma_priv)
  78. return;
  79. file_priv = vma_priv->file_priv;
  80. mutex_lock(&file_priv->lock);
  81. vma_priv->users--;
  82. if (!vma_priv->users)
  83. privcmd_buf_vmapriv_free(vma_priv);
  84. mutex_unlock(&file_priv->lock);
  85. }
  86. static vm_fault_t privcmd_buf_vma_fault(struct vm_fault *vmf)
  87. {
  88. pr_debug("fault: vma=%p %lx-%lx, pgoff=%lx, uv=%p\n",
  89. vmf->vma, vmf->vma->vm_start, vmf->vma->vm_end,
  90. vmf->pgoff, (void *)vmf->address);
  91. return VM_FAULT_SIGBUS;
  92. }
  93. static const struct vm_operations_struct privcmd_buf_vm_ops = {
  94. .open = privcmd_buf_vma_open,
  95. .close = privcmd_buf_vma_close,
  96. .fault = privcmd_buf_vma_fault,
  97. };
  98. static int privcmd_buf_mmap(struct file *file, struct vm_area_struct *vma)
  99. {
  100. struct privcmd_buf_private *file_priv = file->private_data;
  101. struct privcmd_buf_vma_private *vma_priv;
  102. unsigned long count = vma_pages(vma);
  103. unsigned int i;
  104. int ret = 0;
  105. if (!(vma->vm_flags & VM_SHARED))
  106. return -EINVAL;
  107. vma_priv = kzalloc(struct_size(vma_priv, pages, count), GFP_KERNEL);
  108. if (!vma_priv)
  109. return -ENOMEM;
  110. for (i = 0; i < count; i++) {
  111. vma_priv->pages[i] = alloc_page(GFP_KERNEL | __GFP_ZERO);
  112. if (!vma_priv->pages[i])
  113. break;
  114. vma_priv->n_pages++;
  115. }
  116. mutex_lock(&file_priv->lock);
  117. vma_priv->file_priv = file_priv;
  118. vma_priv->users = 1;
  119. vm_flags_set(vma, VM_IO | VM_DONTEXPAND);
  120. vma->vm_ops = &privcmd_buf_vm_ops;
  121. vma->vm_private_data = vma_priv;
  122. list_add(&vma_priv->list, &file_priv->list);
  123. if (vma_priv->n_pages != count)
  124. ret = -ENOMEM;
  125. else
  126. ret = vm_map_pages_zero(vma, vma_priv->pages,
  127. vma_priv->n_pages);
  128. if (ret)
  129. privcmd_buf_vmapriv_free(vma_priv);
  130. mutex_unlock(&file_priv->lock);
  131. return ret;
  132. }
  133. const struct file_operations xen_privcmdbuf_fops = {
  134. .owner = THIS_MODULE,
  135. .open = privcmd_buf_open,
  136. .release = privcmd_buf_release,
  137. .mmap = privcmd_buf_mmap,
  138. };
  139. EXPORT_SYMBOL_GPL(xen_privcmdbuf_fops);
  140. struct miscdevice xen_privcmdbuf_dev = {
  141. .minor = MISC_DYNAMIC_MINOR,
  142. .name = "xen/hypercall",
  143. .fops = &xen_privcmdbuf_fops,
  144. };