]> git.proxmox.com Git - mirror_qemu.git/blame - linux-user/mmap.c
virtio-pci: add missing 'static'
[mirror_qemu.git] / linux-user / mmap.c
CommitLineData
54936004
FB
1/*
2 * mmap support for qemu
5fafdf24 3 *
54936004
FB
4 * Copyright (c) 2003 Fabrice Bellard
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
8167ee88 17 * along with this program; if not, see <http://www.gnu.org/licenses/>.
54936004
FB
18 */
19#include <stdlib.h>
20#include <stdio.h>
21#include <stdarg.h>
22#include <string.h>
23#include <unistd.h>
24#include <errno.h>
54c5a2ae
EI
25#include <sys/types.h>
26#include <sys/stat.h>
54936004 27#include <sys/mman.h>
3af72a4d
BS
28#include <linux/mman.h>
29#include <linux/unistd.h>
54936004
FB
30
31#include "qemu.h"
78f5bf1e 32#include "qemu-common.h"
54936004
FB
33
34//#define DEBUG_MMAP
35
2f7bb878 36#if defined(CONFIG_USE_NPTL)
1e6eec8b 37static pthread_mutex_t mmap_mutex = PTHREAD_MUTEX_INITIALIZER;
dfd3f85c 38static __thread int mmap_lock_count;
c8a706fe
PB
39
40void mmap_lock(void)
41{
42 if (mmap_lock_count++ == 0) {
43 pthread_mutex_lock(&mmap_mutex);
44 }
45}
46
47void mmap_unlock(void)
48{
49 if (--mmap_lock_count == 0) {
50 pthread_mutex_unlock(&mmap_mutex);
51 }
52}
d5975363
PB
53
54/* Grab lock to make sure things are in a consistent state after fork(). */
55void mmap_fork_start(void)
56{
57 if (mmap_lock_count)
58 abort();
59 pthread_mutex_lock(&mmap_mutex);
60}
61
62void mmap_fork_end(int child)
63{
64 if (child)
65 pthread_mutex_init(&mmap_mutex, NULL);
66 else
67 pthread_mutex_unlock(&mmap_mutex);
68}
c8a706fe
PB
69#else
70/* We aren't threadsafe to start with, so no need to worry about locking. */
71void mmap_lock(void)
72{
73}
74
75void mmap_unlock(void)
76{
77}
78#endif
79
53a5960a 80/* NOTE: all the constants are the HOST ones, but addresses are target. */
992f48a0 81int target_mprotect(abi_ulong start, abi_ulong len, int prot)
54936004 82{
992f48a0 83 abi_ulong end, host_start, host_end, addr;
54936004
FB
84 int prot1, ret;
85
86#ifdef DEBUG_MMAP
0bf9e31a
BS
87 printf("mprotect: start=0x" TARGET_ABI_FMT_lx
88 "len=0x" TARGET_ABI_FMT_lx " prot=%c%c%c\n", start, len,
54936004
FB
89 prot & PROT_READ ? 'r' : '-',
90 prot & PROT_WRITE ? 'w' : '-',
91 prot & PROT_EXEC ? 'x' : '-');
92#endif
93
94 if ((start & ~TARGET_PAGE_MASK) != 0)
95 return -EINVAL;
96 len = TARGET_PAGE_ALIGN(len);
97 end = start + len;
98 if (end < start)
99 return -EINVAL;
171cd1cd 100 prot &= PROT_READ | PROT_WRITE | PROT_EXEC;
54936004
FB
101 if (len == 0)
102 return 0;
3b46e624 103
c8a706fe 104 mmap_lock();
83fb7adf 105 host_start = start & qemu_host_page_mask;
54936004
FB
106 host_end = HOST_PAGE_ALIGN(end);
107 if (start > host_start) {
108 /* handle host page containing start */
109 prot1 = prot;
110 for(addr = host_start; addr < start; addr += TARGET_PAGE_SIZE) {
111 prot1 |= page_get_flags(addr);
112 }
83fb7adf 113 if (host_end == host_start + qemu_host_page_size) {
d418c81e
FB
114 for(addr = end; addr < host_end; addr += TARGET_PAGE_SIZE) {
115 prot1 |= page_get_flags(addr);
116 }
117 end = host_end;
118 }
53a5960a 119 ret = mprotect(g2h(host_start), qemu_host_page_size, prot1 & PAGE_BITS);
54936004 120 if (ret != 0)
c8a706fe 121 goto error;
83fb7adf 122 host_start += qemu_host_page_size;
54936004
FB
123 }
124 if (end < host_end) {
54936004
FB
125 prot1 = prot;
126 for(addr = end; addr < host_end; addr += TARGET_PAGE_SIZE) {
127 prot1 |= page_get_flags(addr);
128 }
5fafdf24 129 ret = mprotect(g2h(host_end - qemu_host_page_size), qemu_host_page_size,
54936004
FB
130 prot1 & PAGE_BITS);
131 if (ret != 0)
c8a706fe 132 goto error;
83fb7adf 133 host_end -= qemu_host_page_size;
54936004 134 }
3b46e624 135
54936004
FB
136 /* handle the pages in the middle */
137 if (host_start < host_end) {
53a5960a 138 ret = mprotect(g2h(host_start), host_end - host_start, prot);
54936004 139 if (ret != 0)
c8a706fe 140 goto error;
54936004 141 }
54936004 142 page_set_flags(start, start + len, prot | PAGE_VALID);
c8a706fe 143 mmap_unlock();
54936004 144 return 0;
c8a706fe
PB
145error:
146 mmap_unlock();
147 return ret;
54936004
FB
148}
149
150/* map an incomplete host page */
992f48a0
BS
151static int mmap_frag(abi_ulong real_start,
152 abi_ulong start, abi_ulong end,
153 int prot, int flags, int fd, abi_ulong offset)
54936004 154{
80210bcd 155 abi_ulong real_end, addr;
53a5960a 156 void *host_start;
54936004
FB
157 int prot1, prot_new;
158
53a5960a
PB
159 real_end = real_start + qemu_host_page_size;
160 host_start = g2h(real_start);
54936004
FB
161
162 /* get the protection of the target pages outside the mapping */
163 prot1 = 0;
53a5960a 164 for(addr = real_start; addr < real_end; addr++) {
54936004
FB
165 if (addr < start || addr >= end)
166 prot1 |= page_get_flags(addr);
167 }
3b46e624 168
54936004
FB
169 if (prot1 == 0) {
170 /* no page was there, so we allocate one */
80210bcd
TS
171 void *p = mmap(host_start, qemu_host_page_size, prot,
172 flags | MAP_ANONYMOUS, -1, 0);
173 if (p == MAP_FAILED)
174 return -1;
53a5960a 175 prot1 = prot;
54936004
FB
176 }
177 prot1 &= PAGE_BITS;
178
179 prot_new = prot | prot1;
180 if (!(flags & MAP_ANONYMOUS)) {
181 /* msync() won't work here, so we return an error if write is
182 possible while it is a shared mapping */
183 if ((flags & MAP_TYPE) == MAP_SHARED &&
184 (prot & PROT_WRITE))
ee636500 185 return -1;
54936004
FB
186
187 /* adjust protection to be able to read */
188 if (!(prot1 & PROT_WRITE))
53a5960a 189 mprotect(host_start, qemu_host_page_size, prot1 | PROT_WRITE);
3b46e624 190
54936004 191 /* read the corresponding file data */
fb7e378c
KS
192 if (pread(fd, g2h(start), end - start, offset) == -1)
193 return -1;
3b46e624 194
54936004
FB
195 /* put final protection */
196 if (prot_new != (prot1 | PROT_WRITE))
53a5960a 197 mprotect(host_start, qemu_host_page_size, prot_new);
54936004
FB
198 } else {
199 /* just update the protection */
200 if (prot_new != prot1) {
53a5960a 201 mprotect(host_start, qemu_host_page_size, prot_new);
54936004
FB
202 }
203 }
204 return 0;
205}
206
14f24e14
RH
207#if HOST_LONG_BITS == 64 && TARGET_ABI_BITS == 64
208# define TASK_UNMAPPED_BASE (1ul << 38)
209#elif defined(__CYGWIN__)
a03e2d42 210/* Cygwin doesn't have a whole lot of address space. */
14f24e14 211# define TASK_UNMAPPED_BASE 0x18000000
a03e2d42 212#else
14f24e14 213# define TASK_UNMAPPED_BASE 0x40000000
a03e2d42 214#endif
59e9d91c 215abi_ulong mmap_next_start = TASK_UNMAPPED_BASE;
a03e2d42 216
0776590d
PB
217unsigned long last_brk;
218
4e655712 219#ifdef CONFIG_USE_GUEST_BASE
68a1c816
PB
220/* Subroutine of mmap_find_vma, used when we have pre-allocated a chunk
221 of guest address space. */
222static abi_ulong mmap_find_vma_reserved(abi_ulong start, abi_ulong size)
223{
224 abi_ulong addr;
59e9d91c 225 abi_ulong end_addr;
68a1c816
PB
226 int prot;
227 int looped = 0;
228
18e9ea8a 229 if (size > RESERVED_VA) {
68a1c816
PB
230 return (abi_ulong)-1;
231 }
232
59e9d91c
PM
233 size = HOST_PAGE_ALIGN(size);
234 end_addr = start + size;
235 if (end_addr > RESERVED_VA) {
236 end_addr = RESERVED_VA;
237 }
238 addr = end_addr - qemu_host_page_size;
239
240 while (1) {
241 if (addr > end_addr) {
68a1c816
PB
242 if (looped) {
243 return (abi_ulong)-1;
244 }
59e9d91c
PM
245 end_addr = RESERVED_VA;
246 addr = end_addr - qemu_host_page_size;
68a1c816
PB
247 looped = 1;
248 continue;
249 }
250 prot = page_get_flags(addr);
251 if (prot) {
59e9d91c
PM
252 end_addr = addr;
253 }
254 if (addr + size == end_addr) {
255 break;
68a1c816 256 }
59e9d91c 257 addr -= qemu_host_page_size;
68a1c816 258 }
59e9d91c
PM
259
260 if (start == mmap_next_start) {
261 mmap_next_start = addr;
262 }
263
264 return addr;
68a1c816 265}
4e655712 266#endif
68a1c816 267
fe3b4152
KS
268/*
269 * Find and reserve a free memory area of size 'size'. The search
270 * starts at 'start'.
271 * It must be called with mmap_lock() held.
272 * Return -1 if error.
273 */
9ad197d9 274abi_ulong mmap_find_vma(abi_ulong start, abi_ulong size)
a03e2d42 275{
14f24e14 276 void *ptr, *prev;
fe3b4152 277 abi_ulong addr;
14f24e14 278 int wrapped, repeat;
fe3b4152
KS
279
280 /* If 'start' == 0, then a default start address is used. */
14f24e14 281 if (start == 0) {
fe3b4152 282 start = mmap_next_start;
14f24e14
RH
283 } else {
284 start &= qemu_host_page_mask;
285 }
286
287 size = HOST_PAGE_ALIGN(size);
fe3b4152 288
4e655712 289#ifdef CONFIG_USE_GUEST_BASE
18e9ea8a 290 if (RESERVED_VA) {
68a1c816
PB
291 return mmap_find_vma_reserved(start, size);
292 }
4e655712 293#endif
68a1c816 294
a03e2d42 295 addr = start;
14f24e14
RH
296 wrapped = repeat = 0;
297 prev = 0;
fe3b4152 298
14f24e14 299 for (;; prev = ptr) {
fe3b4152
KS
300 /*
301 * Reserve needed memory area to avoid a race.
302 * It should be discarded using:
303 * - mmap() with MAP_FIXED flag
304 * - mremap() with MREMAP_FIXED flag
305 * - shmat() with SHM_REMAP flag
306 */
14f24e14 307 ptr = mmap(g2h(addr), size, PROT_NONE,
fe3b4152
KS
308 MAP_ANONYMOUS|MAP_PRIVATE|MAP_NORESERVE, -1, 0);
309
310 /* ENOMEM, if host address space has no memory */
14f24e14 311 if (ptr == MAP_FAILED) {
fe3b4152 312 return (abi_ulong)-1;
14f24e14
RH
313 }
314
315 /* Count the number of sequential returns of the same address.
316 This is used to modify the search algorithm below. */
317 repeat = (ptr == prev ? repeat + 1 : 0);
318
319 if (h2g_valid(ptr + size - 1)) {
320 addr = h2g(ptr);
fe3b4152 321
14f24e14
RH
322 if ((addr & ~TARGET_PAGE_MASK) == 0) {
323 /* Success. */
324 if (start == mmap_next_start && addr >= TASK_UNMAPPED_BASE) {
325 mmap_next_start = addr + size;
326 }
327 return addr;
328 }
fe3b4152 329
14f24e14
RH
330 /* The address is not properly aligned for the target. */
331 switch (repeat) {
332 case 0:
333 /* Assume the result that the kernel gave us is the
334 first with enough free space, so start again at the
335 next higher target page. */
336 addr = TARGET_PAGE_ALIGN(addr);
337 break;
338 case 1:
339 /* Sometimes the kernel decides to perform the allocation
340 at the top end of memory instead. */
341 addr &= TARGET_PAGE_MASK;
342 break;
343 case 2:
344 /* Start over at low memory. */
345 addr = 0;
346 break;
347 default:
348 /* Fail. This unaligned block must the last. */
349 addr = -1;
350 break;
351 }
352 } else {
353 /* Since the result the kernel gave didn't fit, start
354 again at low memory. If any repetition, fail. */
355 addr = (repeat ? -1 : 0);
356 }
357
358 /* Unmap and try again. */
fe3b4152 359 munmap(ptr, size);
fe3b4152 360
14f24e14 361 /* ENOMEM if we checked the whole of the target address space. */
d0b3e4f5 362 if (addr == (abi_ulong)-1) {
a03e2d42 363 return (abi_ulong)-1;
14f24e14
RH
364 } else if (addr == 0) {
365 if (wrapped) {
366 return (abi_ulong)-1;
367 }
368 wrapped = 1;
369 /* Don't actually use 0 when wrapping, instead indicate
8186e783 370 that we'd truly like an allocation in low memory. */
14f24e14
RH
371 addr = (mmap_min_addr > TARGET_PAGE_SIZE
372 ? TARGET_PAGE_ALIGN(mmap_min_addr)
373 : TARGET_PAGE_SIZE);
374 } else if (wrapped && addr >= start) {
375 return (abi_ulong)-1;
376 }
a03e2d42 377 }
a03e2d42
FB
378}
379
54936004 380/* NOTE: all the constants are the HOST ones */
992f48a0
BS
381abi_long target_mmap(abi_ulong start, abi_ulong len, int prot,
382 int flags, int fd, abi_ulong offset)
54936004 383{
992f48a0 384 abi_ulong ret, end, real_start, real_end, retaddr, host_offset, host_len;
a5b85f79 385 unsigned long host_start;
54936004 386
c8a706fe 387 mmap_lock();
54936004
FB
388#ifdef DEBUG_MMAP
389 {
0bf9e31a
BS
390 printf("mmap: start=0x" TARGET_ABI_FMT_lx
391 " len=0x" TARGET_ABI_FMT_lx " prot=%c%c%c flags=",
5fafdf24 392 start, len,
54936004
FB
393 prot & PROT_READ ? 'r' : '-',
394 prot & PROT_WRITE ? 'w' : '-',
395 prot & PROT_EXEC ? 'x' : '-');
396 if (flags & MAP_FIXED)
397 printf("MAP_FIXED ");
398 if (flags & MAP_ANONYMOUS)
399 printf("MAP_ANON ");
400 switch(flags & MAP_TYPE) {
401 case MAP_PRIVATE:
402 printf("MAP_PRIVATE ");
403 break;
404 case MAP_SHARED:
405 printf("MAP_SHARED ");
406 break;
407 default:
408 printf("[MAP_TYPE=0x%x] ", flags & MAP_TYPE);
409 break;
410 }
0bf9e31a 411 printf("fd=%d offset=" TARGET_ABI_FMT_lx "\n", fd, offset);
54936004
FB
412 }
413#endif
414
e89f07d3
PB
415 if (offset & ~TARGET_PAGE_MASK) {
416 errno = EINVAL;
c8a706fe 417 goto fail;
e89f07d3 418 }
54936004
FB
419
420 len = TARGET_PAGE_ALIGN(len);
421 if (len == 0)
c8a706fe 422 goto the_end;
53a5960a 423 real_start = start & qemu_host_page_mask;
54936004 424
54c5a2ae
EI
425 /* When mapping files into a memory area larger than the file, accesses
426 to pages beyond the file size will cause a SIGBUS.
427
428 For example, if mmaping a file of 100 bytes on a host with 4K pages
429 emulating a target with 8K pages, the target expects to be able to
430 access the first 8K. But the host will trap us on any access beyond
431 4K.
432
433 When emulating a target with a larger page-size than the hosts, we
434 may need to truncate file maps at EOF and add extra anonymous pages
435 up to the targets page boundary. */
436
437 if ((qemu_real_host_page_size < TARGET_PAGE_SIZE)
438 && !(flags & MAP_ANONYMOUS)) {
439 struct stat sb;
440
441 if (fstat (fd, &sb) == -1)
442 goto fail;
443
444 /* Are we trying to create a map beyond EOF?. */
445 if (offset + len > sb.st_size) {
446 /* If so, truncate the file map at eof aligned with
447 the hosts real pagesize. Additional anonymous maps
448 will be created beyond EOF. */
449 len = (sb.st_size - offset);
450 len += qemu_real_host_page_size - 1;
451 len &= ~(qemu_real_host_page_size - 1);
452 }
453 }
454
54936004 455 if (!(flags & MAP_FIXED)) {
a03e2d42
FB
456 abi_ulong mmap_start;
457 void *p;
458 host_offset = offset & qemu_host_page_mask;
459 host_len = len + offset - host_offset;
460 host_len = HOST_PAGE_ALIGN(host_len);
461 mmap_start = mmap_find_vma(real_start, host_len);
462 if (mmap_start == (abi_ulong)-1) {
463 errno = ENOMEM;
c8a706fe 464 goto fail;
54936004 465 }
a03e2d42
FB
466 /* Note: we prefer to control the mapping address. It is
467 especially important if qemu_host_page_size >
468 qemu_real_host_page_size */
469 p = mmap(g2h(mmap_start),
54c5a2ae 470 host_len, prot, flags | MAP_FIXED | MAP_ANONYMOUS, -1, 0);
a03e2d42 471 if (p == MAP_FAILED)
c8a706fe 472 goto fail;
a03e2d42
FB
473 /* update start so that it points to the file position at 'offset' */
474 host_start = (unsigned long)p;
54c5a2ae
EI
475 if (!(flags & MAP_ANONYMOUS)) {
476 p = mmap(g2h(mmap_start), len, prot,
477 flags | MAP_FIXED, fd, host_offset);
a03e2d42 478 host_start += offset - host_offset;
54c5a2ae 479 }
a03e2d42
FB
480 start = h2g(host_start);
481 } else {
482 if (start & ~TARGET_PAGE_MASK) {
e89f07d3 483 errno = EINVAL;
c8a706fe 484 goto fail;
e89f07d3 485 }
a03e2d42
FB
486 end = start + len;
487 real_end = HOST_PAGE_ALIGN(end);
7ab240ad 488
45bc1f52
AJ
489 /*
490 * Test if requested memory area fits target address space
491 * It can fail only on 64-bit host with 32-bit target.
492 * On any other target/host host mmap() handles this error correctly.
493 */
494 if ((unsigned long)start + len - 1 > (abi_ulong) -1) {
495 errno = EINVAL;
496 goto fail;
497 }
498
a03e2d42
FB
499 /* worst case: we cannot map the file because the offset is not
500 aligned, so we read it */
501 if (!(flags & MAP_ANONYMOUS) &&
502 (offset & ~qemu_host_page_mask) != (start & ~qemu_host_page_mask)) {
503 /* msync() won't work here, so we return an error if write is
504 possible while it is a shared mapping */
505 if ((flags & MAP_TYPE) == MAP_SHARED &&
506 (prot & PROT_WRITE)) {
507 errno = EINVAL;
c8a706fe 508 goto fail;
a03e2d42
FB
509 }
510 retaddr = target_mmap(start, len, prot | PROT_WRITE,
511 MAP_FIXED | MAP_PRIVATE | MAP_ANONYMOUS,
512 -1, 0);
513 if (retaddr == -1)
c8a706fe 514 goto fail;
fb7e378c
KS
515 if (pread(fd, g2h(start), len, offset) == -1)
516 goto fail;
a03e2d42
FB
517 if (!(prot & PROT_WRITE)) {
518 ret = target_mprotect(start, len, prot);
c8a706fe
PB
519 if (ret != 0) {
520 start = ret;
521 goto the_end;
522 }
a03e2d42
FB
523 }
524 goto the_end;
54936004 525 }
a03e2d42
FB
526
527 /* handle the start of the mapping */
528 if (start > real_start) {
529 if (real_end == real_start + qemu_host_page_size) {
530 /* one single host page */
531 ret = mmap_frag(real_start, start, end,
532 prot, flags, fd, offset);
533 if (ret == -1)
c8a706fe 534 goto fail;
a03e2d42
FB
535 goto the_end1;
536 }
537 ret = mmap_frag(real_start, start, real_start + qemu_host_page_size,
54936004
FB
538 prot, flags, fd, offset);
539 if (ret == -1)
c8a706fe 540 goto fail;
a03e2d42
FB
541 real_start += qemu_host_page_size;
542 }
543 /* handle the end of the mapping */
544 if (end < real_end) {
545 ret = mmap_frag(real_end - qemu_host_page_size,
546 real_end - qemu_host_page_size, real_end,
547 prot, flags, fd,
548 offset + real_end - qemu_host_page_size - start);
549 if (ret == -1)
c8a706fe 550 goto fail;
a03e2d42 551 real_end -= qemu_host_page_size;
54936004 552 }
3b46e624 553
a03e2d42
FB
554 /* map the middle (easier) */
555 if (real_start < real_end) {
556 void *p;
557 unsigned long offset1;
558 if (flags & MAP_ANONYMOUS)
559 offset1 = 0;
560 else
561 offset1 = offset + real_start - start;
562 p = mmap(g2h(real_start), real_end - real_start,
563 prot, flags, fd, offset1);
564 if (p == MAP_FAILED)
c8a706fe 565 goto fail;
a03e2d42 566 }
54936004
FB
567 }
568 the_end1:
569 page_set_flags(start, start + len, prot | PAGE_VALID);
570 the_end:
571#ifdef DEBUG_MMAP
0bf9e31a 572 printf("ret=0x" TARGET_ABI_FMT_lx "\n", start);
54936004
FB
573 page_dump(stdout);
574 printf("\n");
575#endif
c8a706fe 576 mmap_unlock();
54936004 577 return start;
c8a706fe
PB
578fail:
579 mmap_unlock();
580 return -1;
54936004
FB
581}
582
68a1c816
PB
583static void mmap_reserve(abi_ulong start, abi_ulong size)
584{
585 abi_ulong real_start;
586 abi_ulong real_end;
587 abi_ulong addr;
588 abi_ulong end;
589 int prot;
590
591 real_start = start & qemu_host_page_mask;
592 real_end = HOST_PAGE_ALIGN(start + size);
593 end = start + size;
594 if (start > real_start) {
595 /* handle host page containing start */
596 prot = 0;
597 for (addr = real_start; addr < start; addr += TARGET_PAGE_SIZE) {
598 prot |= page_get_flags(addr);
599 }
600 if (real_end == real_start + qemu_host_page_size) {
601 for (addr = end; addr < real_end; addr += TARGET_PAGE_SIZE) {
602 prot |= page_get_flags(addr);
603 }
604 end = real_end;
605 }
606 if (prot != 0)
607 real_start += qemu_host_page_size;
608 }
609 if (end < real_end) {
610 prot = 0;
611 for (addr = end; addr < real_end; addr += TARGET_PAGE_SIZE) {
612 prot |= page_get_flags(addr);
613 }
614 if (prot != 0)
615 real_end -= qemu_host_page_size;
616 }
617 if (real_start != real_end) {
618 mmap(g2h(real_start), real_end - real_start, PROT_NONE,
619 MAP_FIXED | MAP_ANONYMOUS | MAP_PRIVATE | MAP_NORESERVE,
620 -1, 0);
621 }
622}
623
992f48a0 624int target_munmap(abi_ulong start, abi_ulong len)
54936004 625{
992f48a0 626 abi_ulong end, real_start, real_end, addr;
54936004
FB
627 int prot, ret;
628
629#ifdef DEBUG_MMAP
0bf9e31a
BS
630 printf("munmap: start=0x" TARGET_ABI_FMT_lx " len=0x"
631 TARGET_ABI_FMT_lx "\n",
632 start, len);
54936004
FB
633#endif
634 if (start & ~TARGET_PAGE_MASK)
635 return -EINVAL;
636 len = TARGET_PAGE_ALIGN(len);
637 if (len == 0)
638 return -EINVAL;
c8a706fe 639 mmap_lock();
54936004 640 end = start + len;
53a5960a
PB
641 real_start = start & qemu_host_page_mask;
642 real_end = HOST_PAGE_ALIGN(end);
54936004 643
53a5960a 644 if (start > real_start) {
54936004
FB
645 /* handle host page containing start */
646 prot = 0;
53a5960a 647 for(addr = real_start; addr < start; addr += TARGET_PAGE_SIZE) {
54936004
FB
648 prot |= page_get_flags(addr);
649 }
53a5960a
PB
650 if (real_end == real_start + qemu_host_page_size) {
651 for(addr = end; addr < real_end; addr += TARGET_PAGE_SIZE) {
d418c81e
FB
652 prot |= page_get_flags(addr);
653 }
53a5960a 654 end = real_end;
d418c81e 655 }
54936004 656 if (prot != 0)
53a5960a 657 real_start += qemu_host_page_size;
54936004 658 }
53a5960a 659 if (end < real_end) {
54936004 660 prot = 0;
53a5960a 661 for(addr = end; addr < real_end; addr += TARGET_PAGE_SIZE) {
54936004
FB
662 prot |= page_get_flags(addr);
663 }
664 if (prot != 0)
53a5960a 665 real_end -= qemu_host_page_size;
54936004 666 }
3b46e624 667
c8a706fe 668 ret = 0;
54936004 669 /* unmap what we can */
53a5960a 670 if (real_start < real_end) {
18e9ea8a 671 if (RESERVED_VA) {
68a1c816
PB
672 mmap_reserve(real_start, real_end - real_start);
673 } else {
674 ret = munmap(g2h(real_start), real_end - real_start);
675 }
54936004
FB
676 }
677
c8a706fe
PB
678 if (ret == 0)
679 page_set_flags(start, start + len, 0);
680 mmap_unlock();
681 return ret;
54936004
FB
682}
683
992f48a0
BS
684abi_long target_mremap(abi_ulong old_addr, abi_ulong old_size,
685 abi_ulong new_size, unsigned long flags,
686 abi_ulong new_addr)
54936004
FB
687{
688 int prot;
f19412a2 689 void *host_addr;
54936004 690
c8a706fe 691 mmap_lock();
f19412a2 692
68a1c816 693 if (flags & MREMAP_FIXED) {
3af72a4d
BS
694 host_addr = (void *) syscall(__NR_mremap, g2h(old_addr),
695 old_size, new_size,
696 flags,
68a1c816
PB
697 g2h(new_addr));
698
18e9ea8a 699 if (RESERVED_VA && host_addr != MAP_FAILED) {
68a1c816
PB
700 /* If new and old addresses overlap then the above mremap will
701 already have failed with EINVAL. */
702 mmap_reserve(old_addr, old_size);
703 }
704 } else if (flags & MREMAP_MAYMOVE) {
f19412a2
AJ
705 abi_ulong mmap_start;
706
707 mmap_start = mmap_find_vma(0, new_size);
708
709 if (mmap_start == -1) {
710 errno = ENOMEM;
711 host_addr = MAP_FAILED;
68a1c816 712 } else {
3af72a4d
BS
713 host_addr = (void *) syscall(__NR_mremap, g2h(old_addr),
714 old_size, new_size,
715 flags | MREMAP_FIXED,
716 g2h(mmap_start));
c65ffe6d 717 if ( RESERVED_VA ) {
718 mmap_reserve(old_addr, old_size);
719 }
68a1c816 720 }
3af72a4d 721 } else {
68a1c816 722 int prot = 0;
18e9ea8a 723 if (RESERVED_VA && old_size < new_size) {
68a1c816
PB
724 abi_ulong addr;
725 for (addr = old_addr + old_size;
726 addr < old_addr + new_size;
727 addr++) {
728 prot |= page_get_flags(addr);
729 }
730 }
731 if (prot == 0) {
732 host_addr = mremap(g2h(old_addr), old_size, new_size, flags);
18e9ea8a 733 if (host_addr != MAP_FAILED && RESERVED_VA && old_size > new_size) {
68a1c816
PB
734 mmap_reserve(old_addr + old_size, new_size - old_size);
735 }
736 } else {
737 errno = ENOMEM;
738 host_addr = MAP_FAILED;
739 }
f19412a2
AJ
740 /* Check if address fits target address space */
741 if ((unsigned long)host_addr + new_size > (abi_ulong)-1) {
742 /* Revert mremap() changes */
743 host_addr = mremap(g2h(old_addr), new_size, old_size, flags);
744 errno = ENOMEM;
745 host_addr = MAP_FAILED;
746 }
747 }
748
749 if (host_addr == MAP_FAILED) {
c8a706fe
PB
750 new_addr = -1;
751 } else {
752 new_addr = h2g(host_addr);
753 prot = page_get_flags(old_addr);
754 page_set_flags(old_addr, old_addr + old_size, 0);
755 page_set_flags(new_addr, new_addr + new_size, prot | PAGE_VALID);
756 }
757 mmap_unlock();
54936004
FB
758 return new_addr;
759}
760
992f48a0 761int target_msync(abi_ulong start, abi_ulong len, int flags)
54936004 762{
992f48a0 763 abi_ulong end;
54936004
FB
764
765 if (start & ~TARGET_PAGE_MASK)
766 return -EINVAL;
767 len = TARGET_PAGE_ALIGN(len);
54936004 768 end = start + len;
d418c81e
FB
769 if (end < start)
770 return -EINVAL;
771 if (end == start)
772 return 0;
3b46e624 773
83fb7adf 774 start &= qemu_host_page_mask;
53a5960a 775 return msync(g2h(start), end - start, flags);
54936004 776}