]> git.proxmox.com Git - mirror_qemu.git/blame - linux-user/mmap.c
Fix input-linux reading from device
[mirror_qemu.git] / linux-user / mmap.c
CommitLineData
54936004
FB
1/*
2 * mmap support for qemu
5fafdf24 3 *
54936004
FB
4 * Copyright (c) 2003 Fabrice Bellard
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
8167ee88 17 * along with this program; if not, see <http://www.gnu.org/licenses/>.
54936004 18 */
d39594e9 19#include "qemu/osdep.h"
54936004
FB
20
21#include "qemu.h"
78f5bf1e 22#include "qemu-common.h"
1652b974 23#include "translate-all.h"
54936004
FB
24
25//#define DEBUG_MMAP
26
1e6eec8b 27static pthread_mutex_t mmap_mutex = PTHREAD_MUTEX_INITIALIZER;
dfd3f85c 28static __thread int mmap_lock_count;
c8a706fe
PB
29
30void mmap_lock(void)
31{
32 if (mmap_lock_count++ == 0) {
33 pthread_mutex_lock(&mmap_mutex);
34 }
35}
36
37void mmap_unlock(void)
38{
39 if (--mmap_lock_count == 0) {
40 pthread_mutex_unlock(&mmap_mutex);
41 }
42}
d5975363 43
301e40ed
AB
44bool have_mmap_lock(void)
45{
46 return mmap_lock_count > 0 ? true : false;
47}
48
d5975363
PB
49/* Grab lock to make sure things are in a consistent state after fork(). */
50void mmap_fork_start(void)
51{
52 if (mmap_lock_count)
53 abort();
54 pthread_mutex_lock(&mmap_mutex);
55}
56
57void mmap_fork_end(int child)
58{
59 if (child)
60 pthread_mutex_init(&mmap_mutex, NULL);
61 else
62 pthread_mutex_unlock(&mmap_mutex);
63}
c8a706fe 64
53a5960a 65/* NOTE: all the constants are the HOST ones, but addresses are target. */
992f48a0 66int target_mprotect(abi_ulong start, abi_ulong len, int prot)
54936004 67{
992f48a0 68 abi_ulong end, host_start, host_end, addr;
54936004
FB
69 int prot1, ret;
70
71#ifdef DEBUG_MMAP
0bf9e31a
BS
72 printf("mprotect: start=0x" TARGET_ABI_FMT_lx
73 "len=0x" TARGET_ABI_FMT_lx " prot=%c%c%c\n", start, len,
54936004
FB
74 prot & PROT_READ ? 'r' : '-',
75 prot & PROT_WRITE ? 'w' : '-',
76 prot & PROT_EXEC ? 'x' : '-');
77#endif
78
79 if ((start & ~TARGET_PAGE_MASK) != 0)
80 return -EINVAL;
81 len = TARGET_PAGE_ALIGN(len);
82 end = start + len;
83 if (end < start)
84 return -EINVAL;
171cd1cd 85 prot &= PROT_READ | PROT_WRITE | PROT_EXEC;
54936004
FB
86 if (len == 0)
87 return 0;
3b46e624 88
c8a706fe 89 mmap_lock();
83fb7adf 90 host_start = start & qemu_host_page_mask;
54936004
FB
91 host_end = HOST_PAGE_ALIGN(end);
92 if (start > host_start) {
93 /* handle host page containing start */
94 prot1 = prot;
95 for(addr = host_start; addr < start; addr += TARGET_PAGE_SIZE) {
96 prot1 |= page_get_flags(addr);
97 }
83fb7adf 98 if (host_end == host_start + qemu_host_page_size) {
d418c81e
FB
99 for(addr = end; addr < host_end; addr += TARGET_PAGE_SIZE) {
100 prot1 |= page_get_flags(addr);
101 }
102 end = host_end;
103 }
53a5960a 104 ret = mprotect(g2h(host_start), qemu_host_page_size, prot1 & PAGE_BITS);
54936004 105 if (ret != 0)
c8a706fe 106 goto error;
83fb7adf 107 host_start += qemu_host_page_size;
54936004
FB
108 }
109 if (end < host_end) {
54936004
FB
110 prot1 = prot;
111 for(addr = end; addr < host_end; addr += TARGET_PAGE_SIZE) {
112 prot1 |= page_get_flags(addr);
113 }
5fafdf24 114 ret = mprotect(g2h(host_end - qemu_host_page_size), qemu_host_page_size,
54936004
FB
115 prot1 & PAGE_BITS);
116 if (ret != 0)
c8a706fe 117 goto error;
83fb7adf 118 host_end -= qemu_host_page_size;
54936004 119 }
3b46e624 120
54936004
FB
121 /* handle the pages in the middle */
122 if (host_start < host_end) {
53a5960a 123 ret = mprotect(g2h(host_start), host_end - host_start, prot);
54936004 124 if (ret != 0)
c8a706fe 125 goto error;
54936004 126 }
54936004 127 page_set_flags(start, start + len, prot | PAGE_VALID);
c8a706fe 128 mmap_unlock();
54936004 129 return 0;
c8a706fe
PB
130error:
131 mmap_unlock();
132 return ret;
54936004
FB
133}
134
135/* map an incomplete host page */
992f48a0
BS
136static int mmap_frag(abi_ulong real_start,
137 abi_ulong start, abi_ulong end,
138 int prot, int flags, int fd, abi_ulong offset)
54936004 139{
80210bcd 140 abi_ulong real_end, addr;
53a5960a 141 void *host_start;
54936004
FB
142 int prot1, prot_new;
143
53a5960a
PB
144 real_end = real_start + qemu_host_page_size;
145 host_start = g2h(real_start);
54936004
FB
146
147 /* get the protection of the target pages outside the mapping */
148 prot1 = 0;
53a5960a 149 for(addr = real_start; addr < real_end; addr++) {
54936004
FB
150 if (addr < start || addr >= end)
151 prot1 |= page_get_flags(addr);
152 }
3b46e624 153
54936004
FB
154 if (prot1 == 0) {
155 /* no page was there, so we allocate one */
80210bcd
TS
156 void *p = mmap(host_start, qemu_host_page_size, prot,
157 flags | MAP_ANONYMOUS, -1, 0);
158 if (p == MAP_FAILED)
159 return -1;
53a5960a 160 prot1 = prot;
54936004
FB
161 }
162 prot1 &= PAGE_BITS;
163
164 prot_new = prot | prot1;
165 if (!(flags & MAP_ANONYMOUS)) {
166 /* msync() won't work here, so we return an error if write is
167 possible while it is a shared mapping */
168 if ((flags & MAP_TYPE) == MAP_SHARED &&
169 (prot & PROT_WRITE))
ee636500 170 return -1;
54936004
FB
171
172 /* adjust protection to be able to read */
173 if (!(prot1 & PROT_WRITE))
53a5960a 174 mprotect(host_start, qemu_host_page_size, prot1 | PROT_WRITE);
3b46e624 175
54936004 176 /* read the corresponding file data */
fb7e378c
KS
177 if (pread(fd, g2h(start), end - start, offset) == -1)
178 return -1;
3b46e624 179
54936004
FB
180 /* put final protection */
181 if (prot_new != (prot1 | PROT_WRITE))
53a5960a 182 mprotect(host_start, qemu_host_page_size, prot_new);
54936004 183 } else {
54936004 184 if (prot_new != prot1) {
53a5960a 185 mprotect(host_start, qemu_host_page_size, prot_new);
54936004 186 }
e6deac9c
CG
187 if (prot_new & PROT_WRITE) {
188 memset(g2h(start), 0, end - start);
189 }
54936004
FB
190 }
191 return 0;
192}
193
14f24e14
RH
194#if HOST_LONG_BITS == 64 && TARGET_ABI_BITS == 64
195# define TASK_UNMAPPED_BASE (1ul << 38)
a03e2d42 196#else
14f24e14 197# define TASK_UNMAPPED_BASE 0x40000000
a03e2d42 198#endif
59e9d91c 199abi_ulong mmap_next_start = TASK_UNMAPPED_BASE;
a03e2d42 200
0776590d
PB
201unsigned long last_brk;
202
68a1c816
PB
203/* Subroutine of mmap_find_vma, used when we have pre-allocated a chunk
204 of guest address space. */
205static abi_ulong mmap_find_vma_reserved(abi_ulong start, abi_ulong size)
206{
207 abi_ulong addr;
59e9d91c 208 abi_ulong end_addr;
68a1c816
PB
209 int prot;
210 int looped = 0;
211
b76f21a7 212 if (size > reserved_va) {
68a1c816
PB
213 return (abi_ulong)-1;
214 }
215
59e9d91c
PM
216 size = HOST_PAGE_ALIGN(size);
217 end_addr = start + size;
b76f21a7
LV
218 if (end_addr > reserved_va) {
219 end_addr = reserved_va;
59e9d91c
PM
220 }
221 addr = end_addr - qemu_host_page_size;
222
223 while (1) {
224 if (addr > end_addr) {
68a1c816
PB
225 if (looped) {
226 return (abi_ulong)-1;
227 }
b76f21a7 228 end_addr = reserved_va;
59e9d91c 229 addr = end_addr - qemu_host_page_size;
68a1c816
PB
230 looped = 1;
231 continue;
232 }
233 prot = page_get_flags(addr);
234 if (prot) {
59e9d91c
PM
235 end_addr = addr;
236 }
237 if (addr + size == end_addr) {
238 break;
68a1c816 239 }
59e9d91c 240 addr -= qemu_host_page_size;
68a1c816 241 }
59e9d91c
PM
242
243 if (start == mmap_next_start) {
244 mmap_next_start = addr;
245 }
246
247 return addr;
68a1c816
PB
248}
249
fe3b4152
KS
250/*
251 * Find and reserve a free memory area of size 'size'. The search
252 * starts at 'start'.
253 * It must be called with mmap_lock() held.
254 * Return -1 if error.
255 */
9ad197d9 256abi_ulong mmap_find_vma(abi_ulong start, abi_ulong size)
a03e2d42 257{
14f24e14 258 void *ptr, *prev;
fe3b4152 259 abi_ulong addr;
14f24e14 260 int wrapped, repeat;
fe3b4152
KS
261
262 /* If 'start' == 0, then a default start address is used. */
14f24e14 263 if (start == 0) {
fe3b4152 264 start = mmap_next_start;
14f24e14
RH
265 } else {
266 start &= qemu_host_page_mask;
267 }
268
269 size = HOST_PAGE_ALIGN(size);
fe3b4152 270
b76f21a7 271 if (reserved_va) {
68a1c816
PB
272 return mmap_find_vma_reserved(start, size);
273 }
274
a03e2d42 275 addr = start;
14f24e14
RH
276 wrapped = repeat = 0;
277 prev = 0;
fe3b4152 278
14f24e14 279 for (;; prev = ptr) {
fe3b4152
KS
280 /*
281 * Reserve needed memory area to avoid a race.
282 * It should be discarded using:
283 * - mmap() with MAP_FIXED flag
284 * - mremap() with MREMAP_FIXED flag
285 * - shmat() with SHM_REMAP flag
286 */
14f24e14 287 ptr = mmap(g2h(addr), size, PROT_NONE,
fe3b4152
KS
288 MAP_ANONYMOUS|MAP_PRIVATE|MAP_NORESERVE, -1, 0);
289
290 /* ENOMEM, if host address space has no memory */
14f24e14 291 if (ptr == MAP_FAILED) {
fe3b4152 292 return (abi_ulong)-1;
14f24e14
RH
293 }
294
295 /* Count the number of sequential returns of the same address.
296 This is used to modify the search algorithm below. */
297 repeat = (ptr == prev ? repeat + 1 : 0);
298
299 if (h2g_valid(ptr + size - 1)) {
300 addr = h2g(ptr);
fe3b4152 301
14f24e14
RH
302 if ((addr & ~TARGET_PAGE_MASK) == 0) {
303 /* Success. */
304 if (start == mmap_next_start && addr >= TASK_UNMAPPED_BASE) {
305 mmap_next_start = addr + size;
306 }
307 return addr;
308 }
fe3b4152 309
14f24e14
RH
310 /* The address is not properly aligned for the target. */
311 switch (repeat) {
312 case 0:
313 /* Assume the result that the kernel gave us is the
314 first with enough free space, so start again at the
315 next higher target page. */
316 addr = TARGET_PAGE_ALIGN(addr);
317 break;
318 case 1:
319 /* Sometimes the kernel decides to perform the allocation
320 at the top end of memory instead. */
321 addr &= TARGET_PAGE_MASK;
322 break;
323 case 2:
324 /* Start over at low memory. */
325 addr = 0;
326 break;
327 default:
328 /* Fail. This unaligned block must the last. */
329 addr = -1;
330 break;
331 }
332 } else {
333 /* Since the result the kernel gave didn't fit, start
334 again at low memory. If any repetition, fail. */
335 addr = (repeat ? -1 : 0);
336 }
337
338 /* Unmap and try again. */
fe3b4152 339 munmap(ptr, size);
fe3b4152 340
14f24e14 341 /* ENOMEM if we checked the whole of the target address space. */
d0b3e4f5 342 if (addr == (abi_ulong)-1) {
a03e2d42 343 return (abi_ulong)-1;
14f24e14
RH
344 } else if (addr == 0) {
345 if (wrapped) {
346 return (abi_ulong)-1;
347 }
348 wrapped = 1;
349 /* Don't actually use 0 when wrapping, instead indicate
8186e783 350 that we'd truly like an allocation in low memory. */
14f24e14
RH
351 addr = (mmap_min_addr > TARGET_PAGE_SIZE
352 ? TARGET_PAGE_ALIGN(mmap_min_addr)
353 : TARGET_PAGE_SIZE);
354 } else if (wrapped && addr >= start) {
355 return (abi_ulong)-1;
356 }
a03e2d42 357 }
a03e2d42
FB
358}
359
54936004 360/* NOTE: all the constants are the HOST ones */
992f48a0
BS
361abi_long target_mmap(abi_ulong start, abi_ulong len, int prot,
362 int flags, int fd, abi_ulong offset)
54936004 363{
992f48a0 364 abi_ulong ret, end, real_start, real_end, retaddr, host_offset, host_len;
54936004 365
c8a706fe 366 mmap_lock();
54936004
FB
367#ifdef DEBUG_MMAP
368 {
0bf9e31a
BS
369 printf("mmap: start=0x" TARGET_ABI_FMT_lx
370 " len=0x" TARGET_ABI_FMT_lx " prot=%c%c%c flags=",
5fafdf24 371 start, len,
54936004
FB
372 prot & PROT_READ ? 'r' : '-',
373 prot & PROT_WRITE ? 'w' : '-',
374 prot & PROT_EXEC ? 'x' : '-');
375 if (flags & MAP_FIXED)
376 printf("MAP_FIXED ");
377 if (flags & MAP_ANONYMOUS)
378 printf("MAP_ANON ");
379 switch(flags & MAP_TYPE) {
380 case MAP_PRIVATE:
381 printf("MAP_PRIVATE ");
382 break;
383 case MAP_SHARED:
384 printf("MAP_SHARED ");
385 break;
386 default:
387 printf("[MAP_TYPE=0x%x] ", flags & MAP_TYPE);
388 break;
389 }
0bf9e31a 390 printf("fd=%d offset=" TARGET_ABI_FMT_lx "\n", fd, offset);
54936004
FB
391 }
392#endif
393
e89f07d3
PB
394 if (offset & ~TARGET_PAGE_MASK) {
395 errno = EINVAL;
c8a706fe 396 goto fail;
e89f07d3 397 }
54936004
FB
398
399 len = TARGET_PAGE_ALIGN(len);
400 if (len == 0)
c8a706fe 401 goto the_end;
53a5960a 402 real_start = start & qemu_host_page_mask;
a5e7ee46
RH
403 host_offset = offset & qemu_host_page_mask;
404
405 /* If the user is asking for the kernel to find a location, do that
406 before we truncate the length for mapping files below. */
407 if (!(flags & MAP_FIXED)) {
408 host_len = len + offset - host_offset;
409 host_len = HOST_PAGE_ALIGN(host_len);
410 start = mmap_find_vma(real_start, host_len);
411 if (start == (abi_ulong)-1) {
412 errno = ENOMEM;
413 goto fail;
414 }
415 }
54936004 416
54c5a2ae
EI
417 /* When mapping files into a memory area larger than the file, accesses
418 to pages beyond the file size will cause a SIGBUS.
419
420 For example, if mmaping a file of 100 bytes on a host with 4K pages
421 emulating a target with 8K pages, the target expects to be able to
422 access the first 8K. But the host will trap us on any access beyond
423 4K.
424
425 When emulating a target with a larger page-size than the hosts, we
426 may need to truncate file maps at EOF and add extra anonymous pages
427 up to the targets page boundary. */
428
35f2fd04
MAL
429 if ((qemu_real_host_page_size < qemu_host_page_size) &&
430 !(flags & MAP_ANONYMOUS)) {
431 struct stat sb;
54c5a2ae
EI
432
433 if (fstat (fd, &sb) == -1)
434 goto fail;
435
436 /* Are we trying to create a map beyond EOF?. */
437 if (offset + len > sb.st_size) {
438 /* If so, truncate the file map at eof aligned with
439 the hosts real pagesize. Additional anonymous maps
440 will be created beyond EOF. */
0c2d70c4 441 len = REAL_HOST_PAGE_ALIGN(sb.st_size - offset);
54c5a2ae
EI
442 }
443 }
444
54936004 445 if (!(flags & MAP_FIXED)) {
a5e7ee46 446 unsigned long host_start;
a03e2d42 447 void *p;
a5e7ee46 448
a03e2d42
FB
449 host_len = len + offset - host_offset;
450 host_len = HOST_PAGE_ALIGN(host_len);
a5e7ee46 451
a03e2d42
FB
452 /* Note: we prefer to control the mapping address. It is
453 especially important if qemu_host_page_size >
454 qemu_real_host_page_size */
a5e7ee46
RH
455 p = mmap(g2h(start), host_len, prot,
456 flags | MAP_FIXED | MAP_ANONYMOUS, -1, 0);
a03e2d42 457 if (p == MAP_FAILED)
c8a706fe 458 goto fail;
a03e2d42
FB
459 /* update start so that it points to the file position at 'offset' */
460 host_start = (unsigned long)p;
54c5a2ae 461 if (!(flags & MAP_ANONYMOUS)) {
a5e7ee46 462 p = mmap(g2h(start), len, prot,
54c5a2ae 463 flags | MAP_FIXED, fd, host_offset);
8384274e
JB
464 if (p == MAP_FAILED) {
465 munmap(g2h(start), host_len);
466 goto fail;
467 }
a03e2d42 468 host_start += offset - host_offset;
54c5a2ae 469 }
a03e2d42
FB
470 start = h2g(host_start);
471 } else {
472 if (start & ~TARGET_PAGE_MASK) {
e89f07d3 473 errno = EINVAL;
c8a706fe 474 goto fail;
e89f07d3 475 }
a03e2d42
FB
476 end = start + len;
477 real_end = HOST_PAGE_ALIGN(end);
7ab240ad 478
45bc1f52
AJ
479 /*
480 * Test if requested memory area fits target address space
481 * It can fail only on 64-bit host with 32-bit target.
482 * On any other target/host host mmap() handles this error correctly.
483 */
484 if ((unsigned long)start + len - 1 > (abi_ulong) -1) {
485 errno = EINVAL;
486 goto fail;
487 }
488
a03e2d42
FB
489 /* worst case: we cannot map the file because the offset is not
490 aligned, so we read it */
491 if (!(flags & MAP_ANONYMOUS) &&
492 (offset & ~qemu_host_page_mask) != (start & ~qemu_host_page_mask)) {
493 /* msync() won't work here, so we return an error if write is
494 possible while it is a shared mapping */
495 if ((flags & MAP_TYPE) == MAP_SHARED &&
496 (prot & PROT_WRITE)) {
497 errno = EINVAL;
c8a706fe 498 goto fail;
a03e2d42
FB
499 }
500 retaddr = target_mmap(start, len, prot | PROT_WRITE,
501 MAP_FIXED | MAP_PRIVATE | MAP_ANONYMOUS,
502 -1, 0);
503 if (retaddr == -1)
c8a706fe 504 goto fail;
fb7e378c
KS
505 if (pread(fd, g2h(start), len, offset) == -1)
506 goto fail;
a03e2d42
FB
507 if (!(prot & PROT_WRITE)) {
508 ret = target_mprotect(start, len, prot);
86abac06 509 assert(ret == 0);
a03e2d42
FB
510 }
511 goto the_end;
54936004 512 }
a03e2d42
FB
513
514 /* handle the start of the mapping */
515 if (start > real_start) {
516 if (real_end == real_start + qemu_host_page_size) {
517 /* one single host page */
518 ret = mmap_frag(real_start, start, end,
519 prot, flags, fd, offset);
520 if (ret == -1)
c8a706fe 521 goto fail;
a03e2d42
FB
522 goto the_end1;
523 }
524 ret = mmap_frag(real_start, start, real_start + qemu_host_page_size,
54936004
FB
525 prot, flags, fd, offset);
526 if (ret == -1)
c8a706fe 527 goto fail;
a03e2d42
FB
528 real_start += qemu_host_page_size;
529 }
530 /* handle the end of the mapping */
531 if (end < real_end) {
532 ret = mmap_frag(real_end - qemu_host_page_size,
530c0032 533 real_end - qemu_host_page_size, end,
a03e2d42
FB
534 prot, flags, fd,
535 offset + real_end - qemu_host_page_size - start);
536 if (ret == -1)
c8a706fe 537 goto fail;
a03e2d42 538 real_end -= qemu_host_page_size;
54936004 539 }
3b46e624 540
a03e2d42
FB
541 /* map the middle (easier) */
542 if (real_start < real_end) {
543 void *p;
544 unsigned long offset1;
545 if (flags & MAP_ANONYMOUS)
546 offset1 = 0;
547 else
548 offset1 = offset + real_start - start;
549 p = mmap(g2h(real_start), real_end - real_start,
550 prot, flags, fd, offset1);
551 if (p == MAP_FAILED)
c8a706fe 552 goto fail;
a03e2d42 553 }
54936004
FB
554 }
555 the_end1:
556 page_set_flags(start, start + len, prot | PAGE_VALID);
557 the_end:
558#ifdef DEBUG_MMAP
0bf9e31a 559 printf("ret=0x" TARGET_ABI_FMT_lx "\n", start);
54936004
FB
560 page_dump(stdout);
561 printf("\n");
562#endif
35865339 563 tb_invalidate_phys_range(start, start + len);
c8a706fe 564 mmap_unlock();
54936004 565 return start;
c8a706fe
PB
566fail:
567 mmap_unlock();
568 return -1;
54936004
FB
569}
570
68a1c816
PB
571static void mmap_reserve(abi_ulong start, abi_ulong size)
572{
573 abi_ulong real_start;
574 abi_ulong real_end;
575 abi_ulong addr;
576 abi_ulong end;
577 int prot;
578
579 real_start = start & qemu_host_page_mask;
580 real_end = HOST_PAGE_ALIGN(start + size);
581 end = start + size;
582 if (start > real_start) {
583 /* handle host page containing start */
584 prot = 0;
585 for (addr = real_start; addr < start; addr += TARGET_PAGE_SIZE) {
586 prot |= page_get_flags(addr);
587 }
588 if (real_end == real_start + qemu_host_page_size) {
589 for (addr = end; addr < real_end; addr += TARGET_PAGE_SIZE) {
590 prot |= page_get_flags(addr);
591 }
592 end = real_end;
593 }
594 if (prot != 0)
595 real_start += qemu_host_page_size;
596 }
597 if (end < real_end) {
598 prot = 0;
599 for (addr = end; addr < real_end; addr += TARGET_PAGE_SIZE) {
600 prot |= page_get_flags(addr);
601 }
602 if (prot != 0)
603 real_end -= qemu_host_page_size;
604 }
605 if (real_start != real_end) {
606 mmap(g2h(real_start), real_end - real_start, PROT_NONE,
607 MAP_FIXED | MAP_ANONYMOUS | MAP_PRIVATE | MAP_NORESERVE,
608 -1, 0);
609 }
610}
611
992f48a0 612int target_munmap(abi_ulong start, abi_ulong len)
54936004 613{
992f48a0 614 abi_ulong end, real_start, real_end, addr;
54936004
FB
615 int prot, ret;
616
617#ifdef DEBUG_MMAP
0bf9e31a
BS
618 printf("munmap: start=0x" TARGET_ABI_FMT_lx " len=0x"
619 TARGET_ABI_FMT_lx "\n",
620 start, len);
54936004
FB
621#endif
622 if (start & ~TARGET_PAGE_MASK)
623 return -EINVAL;
624 len = TARGET_PAGE_ALIGN(len);
625 if (len == 0)
626 return -EINVAL;
c8a706fe 627 mmap_lock();
54936004 628 end = start + len;
53a5960a
PB
629 real_start = start & qemu_host_page_mask;
630 real_end = HOST_PAGE_ALIGN(end);
54936004 631
53a5960a 632 if (start > real_start) {
54936004
FB
633 /* handle host page containing start */
634 prot = 0;
53a5960a 635 for(addr = real_start; addr < start; addr += TARGET_PAGE_SIZE) {
54936004
FB
636 prot |= page_get_flags(addr);
637 }
53a5960a
PB
638 if (real_end == real_start + qemu_host_page_size) {
639 for(addr = end; addr < real_end; addr += TARGET_PAGE_SIZE) {
d418c81e
FB
640 prot |= page_get_flags(addr);
641 }
53a5960a 642 end = real_end;
d418c81e 643 }
54936004 644 if (prot != 0)
53a5960a 645 real_start += qemu_host_page_size;
54936004 646 }
53a5960a 647 if (end < real_end) {
54936004 648 prot = 0;
53a5960a 649 for(addr = end; addr < real_end; addr += TARGET_PAGE_SIZE) {
54936004
FB
650 prot |= page_get_flags(addr);
651 }
652 if (prot != 0)
53a5960a 653 real_end -= qemu_host_page_size;
54936004 654 }
3b46e624 655
c8a706fe 656 ret = 0;
54936004 657 /* unmap what we can */
53a5960a 658 if (real_start < real_end) {
b76f21a7 659 if (reserved_va) {
68a1c816
PB
660 mmap_reserve(real_start, real_end - real_start);
661 } else {
662 ret = munmap(g2h(real_start), real_end - real_start);
663 }
54936004
FB
664 }
665
77a8f1a5 666 if (ret == 0) {
c8a706fe 667 page_set_flags(start, start + len, 0);
35865339 668 tb_invalidate_phys_range(start, start + len);
77a8f1a5 669 }
c8a706fe
PB
670 mmap_unlock();
671 return ret;
54936004
FB
672}
673
992f48a0
BS
674abi_long target_mremap(abi_ulong old_addr, abi_ulong old_size,
675 abi_ulong new_size, unsigned long flags,
676 abi_ulong new_addr)
54936004
FB
677{
678 int prot;
f19412a2 679 void *host_addr;
54936004 680
c8a706fe 681 mmap_lock();
f19412a2 682
68a1c816 683 if (flags & MREMAP_FIXED) {
52956a9b
FJ
684 host_addr = mremap(g2h(old_addr), old_size, new_size,
685 flags, g2h(new_addr));
68a1c816 686
b76f21a7 687 if (reserved_va && host_addr != MAP_FAILED) {
68a1c816
PB
688 /* If new and old addresses overlap then the above mremap will
689 already have failed with EINVAL. */
690 mmap_reserve(old_addr, old_size);
691 }
692 } else if (flags & MREMAP_MAYMOVE) {
f19412a2
AJ
693 abi_ulong mmap_start;
694
695 mmap_start = mmap_find_vma(0, new_size);
696
697 if (mmap_start == -1) {
698 errno = ENOMEM;
699 host_addr = MAP_FAILED;
68a1c816 700 } else {
52956a9b
FJ
701 host_addr = mremap(g2h(old_addr), old_size, new_size,
702 flags | MREMAP_FIXED, g2h(mmap_start));
b76f21a7 703 if (reserved_va) {
c65ffe6d 704 mmap_reserve(old_addr, old_size);
705 }
68a1c816 706 }
3af72a4d 707 } else {
68a1c816 708 int prot = 0;
b76f21a7 709 if (reserved_va && old_size < new_size) {
68a1c816
PB
710 abi_ulong addr;
711 for (addr = old_addr + old_size;
712 addr < old_addr + new_size;
713 addr++) {
714 prot |= page_get_flags(addr);
715 }
716 }
717 if (prot == 0) {
718 host_addr = mremap(g2h(old_addr), old_size, new_size, flags);
b76f21a7 719 if (host_addr != MAP_FAILED && reserved_va && old_size > new_size) {
68a1c816
PB
720 mmap_reserve(old_addr + old_size, new_size - old_size);
721 }
722 } else {
723 errno = ENOMEM;
724 host_addr = MAP_FAILED;
725 }
f19412a2
AJ
726 /* Check if address fits target address space */
727 if ((unsigned long)host_addr + new_size > (abi_ulong)-1) {
728 /* Revert mremap() changes */
729 host_addr = mremap(g2h(old_addr), new_size, old_size, flags);
730 errno = ENOMEM;
731 host_addr = MAP_FAILED;
732 }
733 }
734
735 if (host_addr == MAP_FAILED) {
c8a706fe
PB
736 new_addr = -1;
737 } else {
738 new_addr = h2g(host_addr);
739 prot = page_get_flags(old_addr);
740 page_set_flags(old_addr, old_addr + old_size, 0);
741 page_set_flags(new_addr, new_addr + new_size, prot | PAGE_VALID);
742 }
35865339 743 tb_invalidate_phys_range(new_addr, new_addr + new_size);
c8a706fe 744 mmap_unlock();
54936004
FB
745 return new_addr;
746}
747
992f48a0 748int target_msync(abi_ulong start, abi_ulong len, int flags)
54936004 749{
992f48a0 750 abi_ulong end;
54936004
FB
751
752 if (start & ~TARGET_PAGE_MASK)
753 return -EINVAL;
754 len = TARGET_PAGE_ALIGN(len);
54936004 755 end = start + len;
d418c81e
FB
756 if (end < start)
757 return -EINVAL;
758 if (end == start)
759 return 0;
3b46e624 760
83fb7adf 761 start &= qemu_host_page_mask;
53a5960a 762 return msync(g2h(start), end - start, flags);
54936004 763}