]> git.proxmox.com Git - mirror_qemu.git/blame - linux-user/mmap.c
linux-user: Sanitize interp_info and, for mips only, init field fp_abi
[mirror_qemu.git] / linux-user / mmap.c
CommitLineData
54936004
FB
1/*
2 * mmap support for qemu
5fafdf24 3 *
54936004
FB
4 * Copyright (c) 2003 Fabrice Bellard
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
8167ee88 17 * along with this program; if not, see <http://www.gnu.org/licenses/>.
54936004 18 */
d39594e9 19#include "qemu/osdep.h"
54936004
FB
20
21#include "qemu.h"
78f5bf1e 22#include "qemu-common.h"
54936004
FB
23
24//#define DEBUG_MMAP
25
1e6eec8b 26static pthread_mutex_t mmap_mutex = PTHREAD_MUTEX_INITIALIZER;
dfd3f85c 27static __thread int mmap_lock_count;
c8a706fe
PB
28
29void mmap_lock(void)
30{
31 if (mmap_lock_count++ == 0) {
32 pthread_mutex_lock(&mmap_mutex);
33 }
34}
35
36void mmap_unlock(void)
37{
38 if (--mmap_lock_count == 0) {
39 pthread_mutex_unlock(&mmap_mutex);
40 }
41}
d5975363 42
301e40ed
AB
43bool have_mmap_lock(void)
44{
45 return mmap_lock_count > 0 ? true : false;
46}
47
d5975363
PB
48/* Grab lock to make sure things are in a consistent state after fork(). */
49void mmap_fork_start(void)
50{
51 if (mmap_lock_count)
52 abort();
53 pthread_mutex_lock(&mmap_mutex);
54}
55
56void mmap_fork_end(int child)
57{
58 if (child)
59 pthread_mutex_init(&mmap_mutex, NULL);
60 else
61 pthread_mutex_unlock(&mmap_mutex);
62}
c8a706fe 63
53a5960a 64/* NOTE: all the constants are the HOST ones, but addresses are target. */
992f48a0 65int target_mprotect(abi_ulong start, abi_ulong len, int prot)
54936004 66{
992f48a0 67 abi_ulong end, host_start, host_end, addr;
54936004
FB
68 int prot1, ret;
69
70#ifdef DEBUG_MMAP
0bf9e31a
BS
71 printf("mprotect: start=0x" TARGET_ABI_FMT_lx
72 "len=0x" TARGET_ABI_FMT_lx " prot=%c%c%c\n", start, len,
54936004
FB
73 prot & PROT_READ ? 'r' : '-',
74 prot & PROT_WRITE ? 'w' : '-',
75 prot & PROT_EXEC ? 'x' : '-');
76#endif
77
78 if ((start & ~TARGET_PAGE_MASK) != 0)
78cf3390 79 return -TARGET_EINVAL;
54936004
FB
80 len = TARGET_PAGE_ALIGN(len);
81 end = start + len;
ebf9a363 82 if (!guest_range_valid(start, len)) {
78cf3390 83 return -TARGET_ENOMEM;
ebf9a363 84 }
171cd1cd 85 prot &= PROT_READ | PROT_WRITE | PROT_EXEC;
54936004
FB
86 if (len == 0)
87 return 0;
3b46e624 88
c8a706fe 89 mmap_lock();
83fb7adf 90 host_start = start & qemu_host_page_mask;
54936004
FB
91 host_end = HOST_PAGE_ALIGN(end);
92 if (start > host_start) {
93 /* handle host page containing start */
94 prot1 = prot;
95 for(addr = host_start; addr < start; addr += TARGET_PAGE_SIZE) {
96 prot1 |= page_get_flags(addr);
97 }
83fb7adf 98 if (host_end == host_start + qemu_host_page_size) {
d418c81e
FB
99 for(addr = end; addr < host_end; addr += TARGET_PAGE_SIZE) {
100 prot1 |= page_get_flags(addr);
101 }
102 end = host_end;
103 }
53a5960a 104 ret = mprotect(g2h(host_start), qemu_host_page_size, prot1 & PAGE_BITS);
54936004 105 if (ret != 0)
c8a706fe 106 goto error;
83fb7adf 107 host_start += qemu_host_page_size;
54936004
FB
108 }
109 if (end < host_end) {
54936004
FB
110 prot1 = prot;
111 for(addr = end; addr < host_end; addr += TARGET_PAGE_SIZE) {
112 prot1 |= page_get_flags(addr);
113 }
5fafdf24 114 ret = mprotect(g2h(host_end - qemu_host_page_size), qemu_host_page_size,
54936004
FB
115 prot1 & PAGE_BITS);
116 if (ret != 0)
c8a706fe 117 goto error;
83fb7adf 118 host_end -= qemu_host_page_size;
54936004 119 }
3b46e624 120
54936004
FB
121 /* handle the pages in the middle */
122 if (host_start < host_end) {
53a5960a 123 ret = mprotect(g2h(host_start), host_end - host_start, prot);
54936004 124 if (ret != 0)
c8a706fe 125 goto error;
54936004 126 }
54936004 127 page_set_flags(start, start + len, prot | PAGE_VALID);
c8a706fe 128 mmap_unlock();
54936004 129 return 0;
c8a706fe
PB
130error:
131 mmap_unlock();
132 return ret;
54936004
FB
133}
134
135/* map an incomplete host page */
992f48a0
BS
136static int mmap_frag(abi_ulong real_start,
137 abi_ulong start, abi_ulong end,
138 int prot, int flags, int fd, abi_ulong offset)
54936004 139{
80210bcd 140 abi_ulong real_end, addr;
53a5960a 141 void *host_start;
54936004
FB
142 int prot1, prot_new;
143
53a5960a
PB
144 real_end = real_start + qemu_host_page_size;
145 host_start = g2h(real_start);
54936004
FB
146
147 /* get the protection of the target pages outside the mapping */
148 prot1 = 0;
53a5960a 149 for(addr = real_start; addr < real_end; addr++) {
54936004
FB
150 if (addr < start || addr >= end)
151 prot1 |= page_get_flags(addr);
152 }
3b46e624 153
54936004
FB
154 if (prot1 == 0) {
155 /* no page was there, so we allocate one */
80210bcd
TS
156 void *p = mmap(host_start, qemu_host_page_size, prot,
157 flags | MAP_ANONYMOUS, -1, 0);
158 if (p == MAP_FAILED)
159 return -1;
53a5960a 160 prot1 = prot;
54936004
FB
161 }
162 prot1 &= PAGE_BITS;
163
164 prot_new = prot | prot1;
165 if (!(flags & MAP_ANONYMOUS)) {
166 /* msync() won't work here, so we return an error if write is
167 possible while it is a shared mapping */
168 if ((flags & MAP_TYPE) == MAP_SHARED &&
169 (prot & PROT_WRITE))
ee636500 170 return -1;
54936004
FB
171
172 /* adjust protection to be able to read */
173 if (!(prot1 & PROT_WRITE))
53a5960a 174 mprotect(host_start, qemu_host_page_size, prot1 | PROT_WRITE);
3b46e624 175
54936004 176 /* read the corresponding file data */
fb7e378c
KS
177 if (pread(fd, g2h(start), end - start, offset) == -1)
178 return -1;
3b46e624 179
54936004
FB
180 /* put final protection */
181 if (prot_new != (prot1 | PROT_WRITE))
53a5960a 182 mprotect(host_start, qemu_host_page_size, prot_new);
54936004 183 } else {
54936004 184 if (prot_new != prot1) {
53a5960a 185 mprotect(host_start, qemu_host_page_size, prot_new);
54936004 186 }
e6deac9c
CG
187 if (prot_new & PROT_WRITE) {
188 memset(g2h(start), 0, end - start);
189 }
54936004
FB
190 }
191 return 0;
192}
193
14f24e14
RH
194#if HOST_LONG_BITS == 64 && TARGET_ABI_BITS == 64
195# define TASK_UNMAPPED_BASE (1ul << 38)
a03e2d42 196#else
14f24e14 197# define TASK_UNMAPPED_BASE 0x40000000
a03e2d42 198#endif
59e9d91c 199abi_ulong mmap_next_start = TASK_UNMAPPED_BASE;
a03e2d42 200
0776590d
PB
201unsigned long last_brk;
202
68a1c816
PB
203/* Subroutine of mmap_find_vma, used when we have pre-allocated a chunk
204 of guest address space. */
205static abi_ulong mmap_find_vma_reserved(abi_ulong start, abi_ulong size)
206{
207 abi_ulong addr;
59e9d91c 208 abi_ulong end_addr;
68a1c816
PB
209 int prot;
210 int looped = 0;
211
b76f21a7 212 if (size > reserved_va) {
68a1c816
PB
213 return (abi_ulong)-1;
214 }
215
59e9d91c
PM
216 size = HOST_PAGE_ALIGN(size);
217 end_addr = start + size;
b76f21a7
LV
218 if (end_addr > reserved_va) {
219 end_addr = reserved_va;
59e9d91c
PM
220 }
221 addr = end_addr - qemu_host_page_size;
222
223 while (1) {
224 if (addr > end_addr) {
68a1c816
PB
225 if (looped) {
226 return (abi_ulong)-1;
227 }
b76f21a7 228 end_addr = reserved_va;
59e9d91c 229 addr = end_addr - qemu_host_page_size;
68a1c816
PB
230 looped = 1;
231 continue;
232 }
233 prot = page_get_flags(addr);
234 if (prot) {
59e9d91c
PM
235 end_addr = addr;
236 }
95e6d430 237 if (addr && addr + size == end_addr) {
59e9d91c 238 break;
68a1c816 239 }
59e9d91c 240 addr -= qemu_host_page_size;
68a1c816 241 }
59e9d91c
PM
242
243 if (start == mmap_next_start) {
244 mmap_next_start = addr;
245 }
246
247 return addr;
68a1c816
PB
248}
249
fe3b4152
KS
250/*
251 * Find and reserve a free memory area of size 'size'. The search
252 * starts at 'start'.
253 * It must be called with mmap_lock() held.
254 * Return -1 if error.
255 */
9ad197d9 256abi_ulong mmap_find_vma(abi_ulong start, abi_ulong size)
a03e2d42 257{
14f24e14 258 void *ptr, *prev;
fe3b4152 259 abi_ulong addr;
14f24e14 260 int wrapped, repeat;
fe3b4152
KS
261
262 /* If 'start' == 0, then a default start address is used. */
14f24e14 263 if (start == 0) {
fe3b4152 264 start = mmap_next_start;
14f24e14
RH
265 } else {
266 start &= qemu_host_page_mask;
267 }
268
269 size = HOST_PAGE_ALIGN(size);
fe3b4152 270
b76f21a7 271 if (reserved_va) {
68a1c816
PB
272 return mmap_find_vma_reserved(start, size);
273 }
274
a03e2d42 275 addr = start;
14f24e14
RH
276 wrapped = repeat = 0;
277 prev = 0;
fe3b4152 278
14f24e14 279 for (;; prev = ptr) {
fe3b4152
KS
280 /*
281 * Reserve needed memory area to avoid a race.
282 * It should be discarded using:
283 * - mmap() with MAP_FIXED flag
284 * - mremap() with MREMAP_FIXED flag
285 * - shmat() with SHM_REMAP flag
286 */
14f24e14 287 ptr = mmap(g2h(addr), size, PROT_NONE,
fe3b4152
KS
288 MAP_ANONYMOUS|MAP_PRIVATE|MAP_NORESERVE, -1, 0);
289
290 /* ENOMEM, if host address space has no memory */
14f24e14 291 if (ptr == MAP_FAILED) {
fe3b4152 292 return (abi_ulong)-1;
14f24e14
RH
293 }
294
295 /* Count the number of sequential returns of the same address.
296 This is used to modify the search algorithm below. */
297 repeat = (ptr == prev ? repeat + 1 : 0);
298
299 if (h2g_valid(ptr + size - 1)) {
300 addr = h2g(ptr);
fe3b4152 301
14f24e14
RH
302 if ((addr & ~TARGET_PAGE_MASK) == 0) {
303 /* Success. */
304 if (start == mmap_next_start && addr >= TASK_UNMAPPED_BASE) {
305 mmap_next_start = addr + size;
306 }
307 return addr;
308 }
fe3b4152 309
14f24e14
RH
310 /* The address is not properly aligned for the target. */
311 switch (repeat) {
312 case 0:
313 /* Assume the result that the kernel gave us is the
314 first with enough free space, so start again at the
315 next higher target page. */
316 addr = TARGET_PAGE_ALIGN(addr);
317 break;
318 case 1:
319 /* Sometimes the kernel decides to perform the allocation
320 at the top end of memory instead. */
321 addr &= TARGET_PAGE_MASK;
322 break;
323 case 2:
324 /* Start over at low memory. */
325 addr = 0;
326 break;
327 default:
328 /* Fail. This unaligned block must the last. */
329 addr = -1;
330 break;
331 }
332 } else {
333 /* Since the result the kernel gave didn't fit, start
334 again at low memory. If any repetition, fail. */
335 addr = (repeat ? -1 : 0);
336 }
337
338 /* Unmap and try again. */
fe3b4152 339 munmap(ptr, size);
fe3b4152 340
14f24e14 341 /* ENOMEM if we checked the whole of the target address space. */
d0b3e4f5 342 if (addr == (abi_ulong)-1) {
a03e2d42 343 return (abi_ulong)-1;
14f24e14
RH
344 } else if (addr == 0) {
345 if (wrapped) {
346 return (abi_ulong)-1;
347 }
348 wrapped = 1;
349 /* Don't actually use 0 when wrapping, instead indicate
8186e783 350 that we'd truly like an allocation in low memory. */
14f24e14
RH
351 addr = (mmap_min_addr > TARGET_PAGE_SIZE
352 ? TARGET_PAGE_ALIGN(mmap_min_addr)
353 : TARGET_PAGE_SIZE);
354 } else if (wrapped && addr >= start) {
355 return (abi_ulong)-1;
356 }
a03e2d42 357 }
a03e2d42
FB
358}
359
54936004 360/* NOTE: all the constants are the HOST ones */
992f48a0
BS
361abi_long target_mmap(abi_ulong start, abi_ulong len, int prot,
362 int flags, int fd, abi_ulong offset)
54936004 363{
992f48a0 364 abi_ulong ret, end, real_start, real_end, retaddr, host_offset, host_len;
54936004 365
c8a706fe 366 mmap_lock();
54936004
FB
367#ifdef DEBUG_MMAP
368 {
0bf9e31a
BS
369 printf("mmap: start=0x" TARGET_ABI_FMT_lx
370 " len=0x" TARGET_ABI_FMT_lx " prot=%c%c%c flags=",
5fafdf24 371 start, len,
54936004
FB
372 prot & PROT_READ ? 'r' : '-',
373 prot & PROT_WRITE ? 'w' : '-',
374 prot & PROT_EXEC ? 'x' : '-');
375 if (flags & MAP_FIXED)
376 printf("MAP_FIXED ");
377 if (flags & MAP_ANONYMOUS)
378 printf("MAP_ANON ");
379 switch(flags & MAP_TYPE) {
380 case MAP_PRIVATE:
381 printf("MAP_PRIVATE ");
382 break;
383 case MAP_SHARED:
384 printf("MAP_SHARED ");
385 break;
386 default:
387 printf("[MAP_TYPE=0x%x] ", flags & MAP_TYPE);
388 break;
389 }
0bf9e31a 390 printf("fd=%d offset=" TARGET_ABI_FMT_lx "\n", fd, offset);
54936004
FB
391 }
392#endif
393
38138fab 394 if (!len) {
e89f07d3 395 errno = EINVAL;
c8a706fe 396 goto fail;
e89f07d3 397 }
54936004 398
38138fab 399 /* Also check for overflows... */
54936004 400 len = TARGET_PAGE_ALIGN(len);
38138fab
AB
401 if (!len) {
402 errno = ENOMEM;
403 goto fail;
404 }
405
406 if (offset & ~TARGET_PAGE_MASK) {
407 errno = EINVAL;
408 goto fail;
409 }
410
53a5960a 411 real_start = start & qemu_host_page_mask;
a5e7ee46
RH
412 host_offset = offset & qemu_host_page_mask;
413
414 /* If the user is asking for the kernel to find a location, do that
415 before we truncate the length for mapping files below. */
416 if (!(flags & MAP_FIXED)) {
417 host_len = len + offset - host_offset;
418 host_len = HOST_PAGE_ALIGN(host_len);
419 start = mmap_find_vma(real_start, host_len);
420 if (start == (abi_ulong)-1) {
421 errno = ENOMEM;
422 goto fail;
423 }
424 }
54936004 425
54c5a2ae
EI
426 /* When mapping files into a memory area larger than the file, accesses
427 to pages beyond the file size will cause a SIGBUS.
428
429 For example, if mmaping a file of 100 bytes on a host with 4K pages
430 emulating a target with 8K pages, the target expects to be able to
431 access the first 8K. But the host will trap us on any access beyond
432 4K.
433
434 When emulating a target with a larger page-size than the hosts, we
435 may need to truncate file maps at EOF and add extra anonymous pages
436 up to the targets page boundary. */
437
35f2fd04
MAL
438 if ((qemu_real_host_page_size < qemu_host_page_size) &&
439 !(flags & MAP_ANONYMOUS)) {
440 struct stat sb;
54c5a2ae
EI
441
442 if (fstat (fd, &sb) == -1)
443 goto fail;
444
445 /* Are we trying to create a map beyond EOF?. */
446 if (offset + len > sb.st_size) {
447 /* If so, truncate the file map at eof aligned with
448 the hosts real pagesize. Additional anonymous maps
449 will be created beyond EOF. */
0c2d70c4 450 len = REAL_HOST_PAGE_ALIGN(sb.st_size - offset);
54c5a2ae
EI
451 }
452 }
453
54936004 454 if (!(flags & MAP_FIXED)) {
a5e7ee46 455 unsigned long host_start;
a03e2d42 456 void *p;
a5e7ee46 457
a03e2d42
FB
458 host_len = len + offset - host_offset;
459 host_len = HOST_PAGE_ALIGN(host_len);
a5e7ee46 460
a03e2d42
FB
461 /* Note: we prefer to control the mapping address. It is
462 especially important if qemu_host_page_size >
463 qemu_real_host_page_size */
a5e7ee46
RH
464 p = mmap(g2h(start), host_len, prot,
465 flags | MAP_FIXED | MAP_ANONYMOUS, -1, 0);
a03e2d42 466 if (p == MAP_FAILED)
c8a706fe 467 goto fail;
a03e2d42
FB
468 /* update start so that it points to the file position at 'offset' */
469 host_start = (unsigned long)p;
54c5a2ae 470 if (!(flags & MAP_ANONYMOUS)) {
a5e7ee46 471 p = mmap(g2h(start), len, prot,
54c5a2ae 472 flags | MAP_FIXED, fd, host_offset);
8384274e
JB
473 if (p == MAP_FAILED) {
474 munmap(g2h(start), host_len);
475 goto fail;
476 }
a03e2d42 477 host_start += offset - host_offset;
54c5a2ae 478 }
a03e2d42
FB
479 start = h2g(host_start);
480 } else {
481 if (start & ~TARGET_PAGE_MASK) {
e89f07d3 482 errno = EINVAL;
c8a706fe 483 goto fail;
e89f07d3 484 }
a03e2d42
FB
485 end = start + len;
486 real_end = HOST_PAGE_ALIGN(end);
7ab240ad 487
7d37435b
PB
488 /*
489 * Test if requested memory area fits target address space
490 * It can fail only on 64-bit host with 32-bit target.
491 * On any other target/host host mmap() handles this error correctly.
492 */
ebf9a363
MF
493 if (!guest_range_valid(start, len)) {
494 errno = ENOMEM;
45bc1f52
AJ
495 goto fail;
496 }
497
a03e2d42
FB
498 /* worst case: we cannot map the file because the offset is not
499 aligned, so we read it */
500 if (!(flags & MAP_ANONYMOUS) &&
501 (offset & ~qemu_host_page_mask) != (start & ~qemu_host_page_mask)) {
502 /* msync() won't work here, so we return an error if write is
503 possible while it is a shared mapping */
504 if ((flags & MAP_TYPE) == MAP_SHARED &&
505 (prot & PROT_WRITE)) {
506 errno = EINVAL;
c8a706fe 507 goto fail;
a03e2d42
FB
508 }
509 retaddr = target_mmap(start, len, prot | PROT_WRITE,
510 MAP_FIXED | MAP_PRIVATE | MAP_ANONYMOUS,
511 -1, 0);
512 if (retaddr == -1)
c8a706fe 513 goto fail;
fb7e378c
KS
514 if (pread(fd, g2h(start), len, offset) == -1)
515 goto fail;
a03e2d42
FB
516 if (!(prot & PROT_WRITE)) {
517 ret = target_mprotect(start, len, prot);
86abac06 518 assert(ret == 0);
a03e2d42
FB
519 }
520 goto the_end;
54936004 521 }
a03e2d42
FB
522
523 /* handle the start of the mapping */
524 if (start > real_start) {
525 if (real_end == real_start + qemu_host_page_size) {
526 /* one single host page */
527 ret = mmap_frag(real_start, start, end,
528 prot, flags, fd, offset);
529 if (ret == -1)
c8a706fe 530 goto fail;
a03e2d42
FB
531 goto the_end1;
532 }
533 ret = mmap_frag(real_start, start, real_start + qemu_host_page_size,
54936004
FB
534 prot, flags, fd, offset);
535 if (ret == -1)
c8a706fe 536 goto fail;
a03e2d42
FB
537 real_start += qemu_host_page_size;
538 }
539 /* handle the end of the mapping */
540 if (end < real_end) {
541 ret = mmap_frag(real_end - qemu_host_page_size,
530c0032 542 real_end - qemu_host_page_size, end,
a03e2d42
FB
543 prot, flags, fd,
544 offset + real_end - qemu_host_page_size - start);
545 if (ret == -1)
c8a706fe 546 goto fail;
a03e2d42 547 real_end -= qemu_host_page_size;
54936004 548 }
3b46e624 549
a03e2d42
FB
550 /* map the middle (easier) */
551 if (real_start < real_end) {
552 void *p;
553 unsigned long offset1;
554 if (flags & MAP_ANONYMOUS)
555 offset1 = 0;
556 else
557 offset1 = offset + real_start - start;
558 p = mmap(g2h(real_start), real_end - real_start,
559 prot, flags, fd, offset1);
560 if (p == MAP_FAILED)
c8a706fe 561 goto fail;
a03e2d42 562 }
54936004
FB
563 }
564 the_end1:
565 page_set_flags(start, start + len, prot | PAGE_VALID);
566 the_end:
567#ifdef DEBUG_MMAP
0bf9e31a 568 printf("ret=0x" TARGET_ABI_FMT_lx "\n", start);
54936004
FB
569 page_dump(stdout);
570 printf("\n");
571#endif
35865339 572 tb_invalidate_phys_range(start, start + len);
c8a706fe 573 mmap_unlock();
54936004 574 return start;
c8a706fe
PB
575fail:
576 mmap_unlock();
577 return -1;
54936004
FB
578}
579
68a1c816
PB
580static void mmap_reserve(abi_ulong start, abi_ulong size)
581{
582 abi_ulong real_start;
583 abi_ulong real_end;
584 abi_ulong addr;
585 abi_ulong end;
586 int prot;
587
588 real_start = start & qemu_host_page_mask;
589 real_end = HOST_PAGE_ALIGN(start + size);
590 end = start + size;
591 if (start > real_start) {
592 /* handle host page containing start */
593 prot = 0;
594 for (addr = real_start; addr < start; addr += TARGET_PAGE_SIZE) {
595 prot |= page_get_flags(addr);
596 }
597 if (real_end == real_start + qemu_host_page_size) {
598 for (addr = end; addr < real_end; addr += TARGET_PAGE_SIZE) {
599 prot |= page_get_flags(addr);
600 }
601 end = real_end;
602 }
603 if (prot != 0)
604 real_start += qemu_host_page_size;
605 }
606 if (end < real_end) {
607 prot = 0;
608 for (addr = end; addr < real_end; addr += TARGET_PAGE_SIZE) {
609 prot |= page_get_flags(addr);
610 }
611 if (prot != 0)
612 real_end -= qemu_host_page_size;
613 }
614 if (real_start != real_end) {
615 mmap(g2h(real_start), real_end - real_start, PROT_NONE,
616 MAP_FIXED | MAP_ANONYMOUS | MAP_PRIVATE | MAP_NORESERVE,
617 -1, 0);
618 }
619}
620
992f48a0 621int target_munmap(abi_ulong start, abi_ulong len)
54936004 622{
992f48a0 623 abi_ulong end, real_start, real_end, addr;
54936004
FB
624 int prot, ret;
625
626#ifdef DEBUG_MMAP
0bf9e31a
BS
627 printf("munmap: start=0x" TARGET_ABI_FMT_lx " len=0x"
628 TARGET_ABI_FMT_lx "\n",
629 start, len);
54936004
FB
630#endif
631 if (start & ~TARGET_PAGE_MASK)
78cf3390 632 return -TARGET_EINVAL;
54936004 633 len = TARGET_PAGE_ALIGN(len);
ebf9a363 634 if (len == 0 || !guest_range_valid(start, len)) {
78cf3390 635 return -TARGET_EINVAL;
ebf9a363
MF
636 }
637
c8a706fe 638 mmap_lock();
54936004 639 end = start + len;
53a5960a
PB
640 real_start = start & qemu_host_page_mask;
641 real_end = HOST_PAGE_ALIGN(end);
54936004 642
53a5960a 643 if (start > real_start) {
54936004
FB
644 /* handle host page containing start */
645 prot = 0;
53a5960a 646 for(addr = real_start; addr < start; addr += TARGET_PAGE_SIZE) {
54936004
FB
647 prot |= page_get_flags(addr);
648 }
53a5960a
PB
649 if (real_end == real_start + qemu_host_page_size) {
650 for(addr = end; addr < real_end; addr += TARGET_PAGE_SIZE) {
d418c81e
FB
651 prot |= page_get_flags(addr);
652 }
53a5960a 653 end = real_end;
d418c81e 654 }
54936004 655 if (prot != 0)
53a5960a 656 real_start += qemu_host_page_size;
54936004 657 }
53a5960a 658 if (end < real_end) {
54936004 659 prot = 0;
53a5960a 660 for(addr = end; addr < real_end; addr += TARGET_PAGE_SIZE) {
54936004
FB
661 prot |= page_get_flags(addr);
662 }
663 if (prot != 0)
53a5960a 664 real_end -= qemu_host_page_size;
54936004 665 }
3b46e624 666
c8a706fe 667 ret = 0;
54936004 668 /* unmap what we can */
53a5960a 669 if (real_start < real_end) {
b76f21a7 670 if (reserved_va) {
68a1c816
PB
671 mmap_reserve(real_start, real_end - real_start);
672 } else {
673 ret = munmap(g2h(real_start), real_end - real_start);
674 }
54936004
FB
675 }
676
77a8f1a5 677 if (ret == 0) {
c8a706fe 678 page_set_flags(start, start + len, 0);
35865339 679 tb_invalidate_phys_range(start, start + len);
77a8f1a5 680 }
c8a706fe
PB
681 mmap_unlock();
682 return ret;
54936004
FB
683}
684
992f48a0
BS
685abi_long target_mremap(abi_ulong old_addr, abi_ulong old_size,
686 abi_ulong new_size, unsigned long flags,
687 abi_ulong new_addr)
54936004
FB
688{
689 int prot;
f19412a2 690 void *host_addr;
54936004 691
ebf9a363
MF
692 if (!guest_range_valid(old_addr, old_size) ||
693 ((flags & MREMAP_FIXED) &&
694 !guest_range_valid(new_addr, new_size))) {
695 errno = ENOMEM;
696 return -1;
697 }
698
c8a706fe 699 mmap_lock();
f19412a2 700
68a1c816 701 if (flags & MREMAP_FIXED) {
52956a9b
FJ
702 host_addr = mremap(g2h(old_addr), old_size, new_size,
703 flags, g2h(new_addr));
68a1c816 704
b76f21a7 705 if (reserved_va && host_addr != MAP_FAILED) {
68a1c816
PB
706 /* If new and old addresses overlap then the above mremap will
707 already have failed with EINVAL. */
708 mmap_reserve(old_addr, old_size);
709 }
710 } else if (flags & MREMAP_MAYMOVE) {
f19412a2
AJ
711 abi_ulong mmap_start;
712
713 mmap_start = mmap_find_vma(0, new_size);
714
715 if (mmap_start == -1) {
716 errno = ENOMEM;
717 host_addr = MAP_FAILED;
68a1c816 718 } else {
52956a9b
FJ
719 host_addr = mremap(g2h(old_addr), old_size, new_size,
720 flags | MREMAP_FIXED, g2h(mmap_start));
b76f21a7 721 if (reserved_va) {
c65ffe6d 722 mmap_reserve(old_addr, old_size);
723 }
68a1c816 724 }
3af72a4d 725 } else {
68a1c816 726 int prot = 0;
b76f21a7 727 if (reserved_va && old_size < new_size) {
68a1c816
PB
728 abi_ulong addr;
729 for (addr = old_addr + old_size;
730 addr < old_addr + new_size;
731 addr++) {
732 prot |= page_get_flags(addr);
733 }
734 }
735 if (prot == 0) {
736 host_addr = mremap(g2h(old_addr), old_size, new_size, flags);
b76f21a7 737 if (host_addr != MAP_FAILED && reserved_va && old_size > new_size) {
68a1c816
PB
738 mmap_reserve(old_addr + old_size, new_size - old_size);
739 }
740 } else {
741 errno = ENOMEM;
742 host_addr = MAP_FAILED;
743 }
f19412a2
AJ
744 /* Check if address fits target address space */
745 if ((unsigned long)host_addr + new_size > (abi_ulong)-1) {
746 /* Revert mremap() changes */
747 host_addr = mremap(g2h(old_addr), new_size, old_size, flags);
748 errno = ENOMEM;
749 host_addr = MAP_FAILED;
750 }
751 }
752
753 if (host_addr == MAP_FAILED) {
c8a706fe
PB
754 new_addr = -1;
755 } else {
756 new_addr = h2g(host_addr);
757 prot = page_get_flags(old_addr);
758 page_set_flags(old_addr, old_addr + old_size, 0);
759 page_set_flags(new_addr, new_addr + new_size, prot | PAGE_VALID);
760 }
35865339 761 tb_invalidate_phys_range(new_addr, new_addr + new_size);
c8a706fe 762 mmap_unlock();
54936004
FB
763 return new_addr;
764}