/dev/mem: Use more consistent data types
The xlate_dev_{kmem,mem}_ptr() functions take either a physical address or a kernel virtual address, so data types should be phys_addr_t and void *. They both return a kernel virtual address which is only ever used in calls to copy_{from,to}_user(), so make variables that store it void * rather than char * for consistency. Also only define a weak unxlate_dev_mem_ptr() function if architectures haven't overridden them in the asm/io.h header file. Signed-off-by: Thierry Reding <treding@nvidia.com>
This commit is contained in:
@@ -84,9 +84,12 @@ static inline int range_is_allowed(unsigned long pfn, unsigned long size)
|
||||
}
|
||||
#endif
|
||||
|
||||
void __weak unxlate_dev_mem_ptr(unsigned long phys, void *addr)
|
||||
#ifndef unxlate_dev_mem_ptr
|
||||
#define unxlate_dev_mem_ptr unxlate_dev_mem_ptr
|
||||
void __weak unxlate_dev_mem_ptr(phys_addr_t phys, void *addr)
|
||||
{
|
||||
}
|
||||
#endif
|
||||
|
||||
/*
|
||||
* This funcion reads the *physical* memory. The f_pos points directly to the
|
||||
@@ -97,7 +100,7 @@ static ssize_t read_mem(struct file *file, char __user *buf,
|
||||
{
|
||||
phys_addr_t p = *ppos;
|
||||
ssize_t read, sz;
|
||||
char *ptr;
|
||||
void *ptr;
|
||||
|
||||
if (p != *ppos)
|
||||
return 0;
|
||||
@@ -400,7 +403,7 @@ static ssize_t read_kmem(struct file *file, char __user *buf,
|
||||
* uncached, then it must also be accessed uncached
|
||||
* by the kernel or data corruption may occur
|
||||
*/
|
||||
kbuf = xlate_dev_kmem_ptr((char *)p);
|
||||
kbuf = xlate_dev_kmem_ptr((void *)p);
|
||||
|
||||
if (copy_to_user(buf, kbuf, sz))
|
||||
return -EFAULT;
|
||||
@@ -461,7 +464,7 @@ static ssize_t do_write_kmem(unsigned long p, const char __user *buf,
|
||||
#endif
|
||||
|
||||
while (count > 0) {
|
||||
char *ptr;
|
||||
void *ptr;
|
||||
|
||||
sz = size_inside_page(p, count);
|
||||
|
||||
@@ -470,7 +473,7 @@ static ssize_t do_write_kmem(unsigned long p, const char __user *buf,
|
||||
* it must also be accessed uncached by the kernel or data
|
||||
* corruption may occur.
|
||||
*/
|
||||
ptr = xlate_dev_kmem_ptr((char *)p);
|
||||
ptr = xlate_dev_kmem_ptr((void *)p);
|
||||
|
||||
copied = copy_from_user(ptr, buf, sz);
|
||||
if (copied) {
|
||||
|
Reference in New Issue
Block a user