123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145 |
- #[cfg(test)]
- pub mod fake;
- use crate::{Error, Result, PAGE_SIZE};
- use core::{marker::PhantomData, ptr::NonNull};
- /// A physical address as used for virtio.
- pub type PhysAddr = usize;
- /// A region of contiguous physical memory used for DMA.
- #[derive(Debug)]
- pub struct Dma<H: Hal> {
- paddr: usize,
- vaddr: NonNull<u8>,
- pages: usize,
- _hal: PhantomData<H>,
- }
- impl<H: Hal> Dma<H> {
- /// Allocates the given number of pages of physically contiguous memory to be used for DMA in
- /// the given direction.
- ///
- /// The pages will be zeroed.
- pub fn new(pages: usize, direction: BufferDirection) -> Result<Self> {
- let (paddr, vaddr) = H::dma_alloc(pages, direction);
- if paddr == 0 {
- return Err(Error::DmaError);
- }
- Ok(Self {
- paddr,
- vaddr,
- pages,
- _hal: PhantomData,
- })
- }
- /// Returns the physical address of the start of the DMA region, as seen by devices.
- pub fn paddr(&self) -> usize {
- self.paddr
- }
- /// Returns a pointer to the given offset within the DMA region.
- pub fn vaddr(&self, offset: usize) -> NonNull<u8> {
- assert!(offset < self.pages * PAGE_SIZE);
- NonNull::new((self.vaddr.as_ptr() as usize + offset) as _).unwrap()
- }
- /// Returns a pointer to the entire DMA region as a slice.
- pub fn raw_slice(&self) -> NonNull<[u8]> {
- let raw_slice =
- core::ptr::slice_from_raw_parts_mut(self.vaddr(0).as_ptr(), self.pages * PAGE_SIZE);
- NonNull::new(raw_slice).unwrap()
- }
- }
- impl<H: Hal> Drop for Dma<H> {
- fn drop(&mut self) {
- // Safe because the memory was previously allocated by `dma_alloc` in `Dma::new`, not yet
- // deallocated, and we are passing the values from then.
- let err = unsafe { H::dma_dealloc(self.paddr, self.vaddr, self.pages) };
- assert_eq!(err, 0, "failed to deallocate DMA");
- }
- }
- /// The interface which a particular hardware implementation must implement.
- ///
- /// # Safety
- ///
- /// Implementations of this trait must follow the "implementation safety" requirements documented
- /// for each method. Callers must follow the safety requirements documented for the unsafe methods.
- pub unsafe trait Hal {
- /// Allocates and zeroes the given number of contiguous physical pages of DMA memory for VirtIO
- /// use.
- ///
- /// Returns both the physical address which the device can use to access the memory, and a
- /// pointer to the start of it which the driver can use to access it.
- ///
- /// # Implementation safety
- ///
- /// Implementations of this method must ensure that the `NonNull<u8>` returned is a
- /// [_valid_](https://doc.rust-lang.org/std/ptr/index.html#safety) pointer, aligned to
- /// [`PAGE_SIZE`], and won't alias any other allocations or references in the program until it
- /// is deallocated by `dma_dealloc`. The pages must be zeroed.
- fn dma_alloc(pages: usize, direction: BufferDirection) -> (PhysAddr, NonNull<u8>);
- /// Deallocates the given contiguous physical DMA memory pages.
- ///
- /// # Safety
- ///
- /// The memory must have been allocated by `dma_alloc` on the same `Hal` implementation, and not
- /// yet deallocated. `pages` must be the same number passed to `dma_alloc` originally, and both
- /// `paddr` and `vaddr` must be the values returned by `dma_alloc`.
- unsafe fn dma_dealloc(paddr: PhysAddr, vaddr: NonNull<u8>, pages: usize) -> i32;
- /// Converts a physical address used for MMIO to a virtual address which the driver can access.
- ///
- /// This is only used for MMIO addresses within BARs read from the device, for the PCI
- /// transport. It may check that the address range up to the given size is within the region
- /// expected for MMIO.
- ///
- /// # Implementation safety
- ///
- /// Implementations of this method must ensure that the `NonNull<u8>` returned is a
- /// [_valid_](https://doc.rust-lang.org/std/ptr/index.html#safety) pointer, and won't alias any
- /// other allocations or references in the program.
- ///
- /// # Safety
- ///
- /// The `paddr` and `size` must describe a valid MMIO region. The implementation may validate it
- /// in some way (and panic if it is invalid) but is not guaranteed to.
- unsafe fn mmio_phys_to_virt(paddr: PhysAddr, size: usize) -> NonNull<u8>;
- /// Shares the given memory range with the device, and returns the physical address that the
- /// device can use to access it.
- ///
- /// This may involve mapping the buffer into an IOMMU, giving the host permission to access the
- /// memory, or copying it to a special region where it can be accessed.
- ///
- /// # Safety
- ///
- /// The buffer must be a valid pointer to a non-empty memory range which will not be accessed by
- /// any other thread for the duration of this method call.
- unsafe fn share(buffer: NonNull<[u8]>, direction: BufferDirection) -> PhysAddr;
- /// Unshares the given memory range from the device and (if necessary) copies it back to the
- /// original buffer.
- ///
- /// # Safety
- ///
- /// The buffer must be a valid pointer to a non-empty memory range which will not be accessed by
- /// any other thread for the duration of this method call. The `paddr` must be the value
- /// previously returned by the corresponding `share` call.
- unsafe fn unshare(paddr: PhysAddr, buffer: NonNull<[u8]>, direction: BufferDirection);
- }
- /// The direction in which a buffer is passed.
- #[derive(Copy, Clone, Debug, Eq, PartialEq)]
- pub enum BufferDirection {
- /// The buffer may be read or written by the driver, but only read by the device.
- DriverToDevice,
- /// The buffer may be read or written by the device, but only read by the driver.
- DeviceToDriver,
- /// The buffer may be read or written by both the device and the driver.
- Both,
- }
|