]> git.proxmox.com Git - qemu.git/blame - linux-user/mmap.c
initial x86-64 host support (Gwenole Beauchesne)
[qemu.git] / linux-user / mmap.c
CommitLineData
54936004
FB
1/*
2 * mmap support for qemu
3 *
4 * Copyright (c) 2003 Fabrice Bellard
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
19 */
20#include <stdlib.h>
21#include <stdio.h>
22#include <stdarg.h>
23#include <string.h>
24#include <unistd.h>
25#include <errno.h>
26#include <sys/mman.h>
27
28#include "qemu.h"
29
30//#define DEBUG_MMAP
31
32/* NOTE: all the constants are the HOST ones */
33int target_mprotect(unsigned long start, unsigned long len, int prot)
34{
35 unsigned long end, host_start, host_end, addr;
36 int prot1, ret;
37
38#ifdef DEBUG_MMAP
39 printf("mprotect: start=0x%lx len=0x%lx prot=%c%c%c\n", start, len,
40 prot & PROT_READ ? 'r' : '-',
41 prot & PROT_WRITE ? 'w' : '-',
42 prot & PROT_EXEC ? 'x' : '-');
43#endif
44
45 if ((start & ~TARGET_PAGE_MASK) != 0)
46 return -EINVAL;
47 len = TARGET_PAGE_ALIGN(len);
48 end = start + len;
49 if (end < start)
50 return -EINVAL;
51 if (prot & ~(PROT_READ | PROT_WRITE | PROT_EXEC))
52 return -EINVAL;
53 if (len == 0)
54 return 0;
55
56 host_start = start & host_page_mask;
57 host_end = HOST_PAGE_ALIGN(end);
58 if (start > host_start) {
59 /* handle host page containing start */
60 prot1 = prot;
61 for(addr = host_start; addr < start; addr += TARGET_PAGE_SIZE) {
62 prot1 |= page_get_flags(addr);
63 }
d418c81e
FB
64 if (host_end == host_start + host_page_size) {
65 for(addr = end; addr < host_end; addr += TARGET_PAGE_SIZE) {
66 prot1 |= page_get_flags(addr);
67 }
68 end = host_end;
69 }
54936004
FB
70 ret = mprotect((void *)host_start, host_page_size, prot1 & PAGE_BITS);
71 if (ret != 0)
72 return ret;
73 host_start += host_page_size;
74 }
75 if (end < host_end) {
54936004
FB
76 prot1 = prot;
77 for(addr = end; addr < host_end; addr += TARGET_PAGE_SIZE) {
78 prot1 |= page_get_flags(addr);
79 }
80 ret = mprotect((void *)(host_end - host_page_size), host_page_size,
81 prot1 & PAGE_BITS);
82 if (ret != 0)
83 return ret;
84 host_end -= host_page_size;
85 }
86
87 /* handle the pages in the middle */
88 if (host_start < host_end) {
89 ret = mprotect((void *)host_start, host_end - host_start, prot);
90 if (ret != 0)
91 return ret;
92 }
54936004
FB
93 page_set_flags(start, start + len, prot | PAGE_VALID);
94 return 0;
95}
96
97/* map an incomplete host page */
98int mmap_frag(unsigned long host_start,
99 unsigned long start, unsigned long end,
100 int prot, int flags, int fd, unsigned long offset)
101{
102 unsigned long host_end, ret, addr;
103 int prot1, prot_new;
104
105 host_end = host_start + host_page_size;
106
107 /* get the protection of the target pages outside the mapping */
108 prot1 = 0;
109 for(addr = host_start; addr < host_end; addr++) {
110 if (addr < start || addr >= end)
111 prot1 |= page_get_flags(addr);
112 }
113
114 if (prot1 == 0) {
115 /* no page was there, so we allocate one */
116 ret = (long)mmap((void *)host_start, host_page_size, prot,
117 flags | MAP_ANONYMOUS, -1, 0);
118 if (ret == -1)
119 return ret;
120 }
121 prot1 &= PAGE_BITS;
122
123 prot_new = prot | prot1;
124 if (!(flags & MAP_ANONYMOUS)) {
125 /* msync() won't work here, so we return an error if write is
126 possible while it is a shared mapping */
127 if ((flags & MAP_TYPE) == MAP_SHARED &&
128 (prot & PROT_WRITE))
129 return -EINVAL;
130
131 /* adjust protection to be able to read */
132 if (!(prot1 & PROT_WRITE))
133 mprotect((void *)host_start, host_page_size, prot1 | PROT_WRITE);
134
135 /* read the corresponding file data */
136 pread(fd, (void *)start, end - start, offset);
137
138 /* put final protection */
139 if (prot_new != (prot1 | PROT_WRITE))
140 mprotect((void *)host_start, host_page_size, prot_new);
141 } else {
142 /* just update the protection */
143 if (prot_new != prot1) {
144 mprotect((void *)host_start, host_page_size, prot_new);
145 }
146 }
147 return 0;
148}
149
150/* NOTE: all the constants are the HOST ones */
151long target_mmap(unsigned long start, unsigned long len, int prot,
152 int flags, int fd, unsigned long offset)
153{
154 unsigned long ret, end, host_start, host_end, retaddr, host_offset, host_len;
155
156#ifdef DEBUG_MMAP
157 {
158 printf("mmap: start=0x%lx len=0x%lx prot=%c%c%c flags=",
159 start, len,
160 prot & PROT_READ ? 'r' : '-',
161 prot & PROT_WRITE ? 'w' : '-',
162 prot & PROT_EXEC ? 'x' : '-');
163 if (flags & MAP_FIXED)
164 printf("MAP_FIXED ");
165 if (flags & MAP_ANONYMOUS)
166 printf("MAP_ANON ");
167 switch(flags & MAP_TYPE) {
168 case MAP_PRIVATE:
169 printf("MAP_PRIVATE ");
170 break;
171 case MAP_SHARED:
172 printf("MAP_SHARED ");
173 break;
174 default:
175 printf("[MAP_TYPE=0x%x] ", flags & MAP_TYPE);
176 break;
177 }
178 printf("fd=%d offset=%lx\n", fd, offset);
179 }
180#endif
181
182 if (offset & ~TARGET_PAGE_MASK)
183 return -EINVAL;
184
185 len = TARGET_PAGE_ALIGN(len);
186 if (len == 0)
187 return start;
188 host_start = start & host_page_mask;
189
190 if (!(flags & MAP_FIXED)) {
bc51c5c9 191#if defined(__alpha__) || defined(__sparc__) || defined(__x86_64__)
917f95fd
FB
192 /* tell the kenel to search at the same place as i386 */
193 if (host_start == 0)
194 host_start = 0x40000000;
195#endif
54936004
FB
196 if (host_page_size != real_host_page_size) {
197 /* NOTE: this code is only for debugging with '-p' option */
198 /* reserve a memory area */
199 host_len = HOST_PAGE_ALIGN(len) + host_page_size - TARGET_PAGE_SIZE;
200 host_start = (long)mmap((void *)host_start, host_len, PROT_NONE,
201 MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
202 if (host_start == -1)
203 return host_start;
204 host_end = host_start + host_len;
205 start = HOST_PAGE_ALIGN(host_start);
206 end = start + HOST_PAGE_ALIGN(len);
207 if (start > host_start)
208 munmap((void *)host_start, start - host_start);
209 if (end < host_end)
210 munmap((void *)end, host_end - end);
211 /* use it as a fixed mapping */
212 flags |= MAP_FIXED;
213 } else {
214 /* if not fixed, no need to do anything */
215 host_offset = offset & host_page_mask;
216 host_len = len + offset - host_offset;
217 start = (long)mmap((void *)host_start, host_len,
218 prot, flags, fd, host_offset);
219 if (start == -1)
220 return start;
221 /* update start so that it points to the file position at 'offset' */
222 if (!(flags & MAP_ANONYMOUS))
223 start += offset - host_offset;
224 goto the_end1;
225 }
226 }
227
228 if (start & ~TARGET_PAGE_MASK)
229 return -EINVAL;
230 end = start + len;
231 host_end = HOST_PAGE_ALIGN(end);
232
233 /* worst case: we cannot map the file because the offset is not
234 aligned, so we read it */
235 if (!(flags & MAP_ANONYMOUS) &&
236 (offset & ~host_page_mask) != (start & ~host_page_mask)) {
237 /* msync() won't work here, so we return an error if write is
238 possible while it is a shared mapping */
239 if ((flags & MAP_TYPE) == MAP_SHARED &&
240 (prot & PROT_WRITE))
241 return -EINVAL;
242 retaddr = target_mmap(start, len, prot | PROT_WRITE,
243 MAP_FIXED | MAP_PRIVATE | MAP_ANONYMOUS,
244 -1, 0);
245 if (retaddr == -1)
246 return retaddr;
247 pread(fd, (void *)start, len, offset);
248 if (!(prot & PROT_WRITE)) {
249 ret = target_mprotect(start, len, prot);
250 if (ret != 0)
251 return ret;
252 }
253 goto the_end;
254 }
255
256 /* handle the start of the mapping */
257 if (start > host_start) {
258 if (host_end == host_start + host_page_size) {
259 /* one single host page */
260 ret = mmap_frag(host_start, start, end,
261 prot, flags, fd, offset);
262 if (ret == -1)
263 return ret;
264 goto the_end1;
265 }
266 ret = mmap_frag(host_start, start, host_start + host_page_size,
267 prot, flags, fd, offset);
268 if (ret == -1)
269 return ret;
270 host_start += host_page_size;
271 }
272 /* handle the end of the mapping */
273 if (end < host_end) {
274 ret = mmap_frag(host_end - host_page_size,
275 host_end - host_page_size, host_end,
276 prot, flags, fd,
277 offset + host_end - host_page_size - start);
278 if (ret == -1)
279 return ret;
280 host_end -= host_page_size;
281 }
282
283 /* map the middle (easier) */
284 if (host_start < host_end) {
4a585ccb
FB
285 unsigned long offset1;
286 if (flags & MAP_ANONYMOUS)
287 offset1 = 0;
288 else
289 offset1 = offset + host_start - start;
54936004 290 ret = (long)mmap((void *)host_start, host_end - host_start,
4a585ccb 291 prot, flags, fd, offset1);
54936004
FB
292 if (ret == -1)
293 return ret;
294 }
295 the_end1:
296 page_set_flags(start, start + len, prot | PAGE_VALID);
297 the_end:
298#ifdef DEBUG_MMAP
917f95fd 299 printf("ret=0x%lx\n", (long)start);
54936004
FB
300 page_dump(stdout);
301 printf("\n");
302#endif
303 return start;
304}
305
306int target_munmap(unsigned long start, unsigned long len)
307{
308 unsigned long end, host_start, host_end, addr;
309 int prot, ret;
310
311#ifdef DEBUG_MMAP
312 printf("munmap: start=0x%lx len=0x%lx\n", start, len);
313#endif
314 if (start & ~TARGET_PAGE_MASK)
315 return -EINVAL;
316 len = TARGET_PAGE_ALIGN(len);
317 if (len == 0)
318 return -EINVAL;
319 end = start + len;
320 host_start = start & host_page_mask;
321 host_end = HOST_PAGE_ALIGN(end);
322
323 if (start > host_start) {
324 /* handle host page containing start */
325 prot = 0;
326 for(addr = host_start; addr < start; addr += TARGET_PAGE_SIZE) {
327 prot |= page_get_flags(addr);
328 }
d418c81e
FB
329 if (host_end == host_start + host_page_size) {
330 for(addr = end; addr < host_end; addr += TARGET_PAGE_SIZE) {
331 prot |= page_get_flags(addr);
332 }
333 end = host_end;
334 }
54936004
FB
335 if (prot != 0)
336 host_start += host_page_size;
337 }
338 if (end < host_end) {
54936004
FB
339 prot = 0;
340 for(addr = end; addr < host_end; addr += TARGET_PAGE_SIZE) {
341 prot |= page_get_flags(addr);
342 }
343 if (prot != 0)
344 host_end -= host_page_size;
345 }
346
347 /* unmap what we can */
348 if (host_start < host_end) {
349 ret = munmap((void *)host_start, host_end - host_start);
350 if (ret != 0)
351 return ret;
352 }
353
354 page_set_flags(start, start + len, 0);
355 return 0;
356}
357
358/* XXX: currently, we only handle MAP_ANONYMOUS and not MAP_FIXED
359 blocks which have been allocated starting on a host page */
360long target_mremap(unsigned long old_addr, unsigned long old_size,
361 unsigned long new_size, unsigned long flags,
362 unsigned long new_addr)
363{
364 int prot;
365
366 /* XXX: use 5 args syscall */
367 new_addr = (long)mremap((void *)old_addr, old_size, new_size, flags);
368 if (new_addr == -1)
369 return new_addr;
370 prot = page_get_flags(old_addr);
371 page_set_flags(old_addr, old_addr + old_size, 0);
372 page_set_flags(new_addr, new_addr + new_size, prot | PAGE_VALID);
373 return new_addr;
374}
375
376int target_msync(unsigned long start, unsigned long len, int flags)
377{
378 unsigned long end;
379
380 if (start & ~TARGET_PAGE_MASK)
381 return -EINVAL;
382 len = TARGET_PAGE_ALIGN(len);
54936004 383 end = start + len;
d418c81e
FB
384 if (end < start)
385 return -EINVAL;
386 if (end == start)
387 return 0;
54936004
FB
388
389 start &= host_page_mask;
d418c81e 390 return msync((void *)start, end - start, flags);
54936004
FB
391}
392