]> git.proxmox.com Git - mirror_qemu.git/blame - util/memfd.c
Merge remote-tracking branch 'remotes/vivier2/tags/linux-user-for-3.1-pull-request...
[mirror_qemu.git] / util / memfd.c
CommitLineData
f04cf923
MAL
1/*
2 * memfd.c
3 *
4 * Copyright (c) 2015 Red Hat, Inc.
5 *
6 * QEMU library functions on POSIX which are shared between QEMU and
7 * the QEMU tools.
8 *
9 * Permission is hereby granted, free of charge, to any person obtaining a copy
10 * of this software and associated documentation files (the "Software"), to deal
11 * in the Software without restriction, including without limitation the rights
12 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
13 * copies of the Software, and to permit persons to whom the Software is
14 * furnished to do so, subject to the following conditions:
15 *
16 * The above copyright notice and this permission notice shall be included in
17 * all copies or substantial portions of the Software.
18 *
19 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
20 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
21 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
22 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
23 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
24 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
25 * THE SOFTWARE.
26 */
27
28#include "qemu/osdep.h"
29
0f2956f9 30#include "qapi/error.h"
f04cf923 31#include "qemu/memfd.h"
2ef8c0c9 32#include "qemu/host-utils.h"
f04cf923 33
75e5b70e 34#if defined CONFIG_LINUX && !defined CONFIG_MEMFD
f04cf923
MAL
35#include <sys/syscall.h>
36#include <asm/unistd.h>
37
d3592199 38static int memfd_create(const char *name, unsigned int flags)
f04cf923
MAL
39{
40#ifdef __NR_memfd_create
41 return syscall(__NR_memfd_create, name, flags);
42#else
43 return -1;
44#endif
45}
46#endif
47
48#ifndef MFD_CLOEXEC
49#define MFD_CLOEXEC 0x0001U
50#endif
51
52#ifndef MFD_ALLOW_SEALING
53#define MFD_ALLOW_SEALING 0x0002U
54#endif
d3592199 55
c5b2a9e0
MAL
56#ifndef MFD_HUGETLB
57#define MFD_HUGETLB 0x0004U
58#endif
59
2ef8c0c9
MAL
60#ifndef MFD_HUGE_SHIFT
61#define MFD_HUGE_SHIFT 26
62#endif
63
c5b2a9e0 64int qemu_memfd_create(const char *name, size_t size, bool hugetlb,
2ef8c0c9 65 uint64_t hugetlbsize, unsigned int seals, Error **errp)
dcff1035 66{
2ef8c0c9
MAL
67 int htsize = hugetlbsize ? ctz64(hugetlbsize) : 0;
68
4f938cbd 69 if (htsize && 1ULL << htsize != hugetlbsize) {
2ef8c0c9
MAL
70 error_setg(errp, "Hugepage size must be a power of 2");
71 return -1;
72 }
73
74 htsize = htsize << MFD_HUGE_SHIFT;
75
dcff1035 76#ifdef CONFIG_LINUX
0f2956f9 77 int mfd = -1;
dcff1035
MAL
78 unsigned int flags = MFD_CLOEXEC;
79
80 if (seals) {
81 flags |= MFD_ALLOW_SEALING;
82 }
c5b2a9e0
MAL
83 if (hugetlb) {
84 flags |= MFD_HUGETLB;
2ef8c0c9 85 flags |= htsize;
c5b2a9e0 86 }
dcff1035
MAL
87 mfd = memfd_create(name, flags);
88 if (mfd < 0) {
0f2956f9 89 goto err;
dcff1035
MAL
90 }
91
92 if (ftruncate(mfd, size) == -1) {
0f2956f9 93 goto err;
dcff1035
MAL
94 }
95
96 if (seals && fcntl(mfd, F_ADD_SEALS, seals) == -1) {
0f2956f9 97 goto err;
dcff1035 98 }
dcff1035
MAL
99
100 return mfd;
0f2956f9
MAL
101
102err:
103 if (mfd >= 0) {
104 close(mfd);
105 }
106#endif
107 error_setg_errno(errp, errno, "failed to create memfd");
108 return -1;
dcff1035
MAL
109}
110
d3592199
MAL
111/*
112 * This is a best-effort helper for shared memory allocation, with
113 * optional sealing. The helper will do his best to allocate using
114 * memfd with sealing, but may fallback on other methods without
115 * sealing.
116 */
117void *qemu_memfd_alloc(const char *name, size_t size, unsigned int seals,
0f2956f9 118 int *fd, Error **errp)
d3592199
MAL
119{
120 void *ptr;
2ef8c0c9 121 int mfd = qemu_memfd_create(name, size, false, 0, seals, NULL);
d3592199 122
dcff1035 123 /* some systems have memfd without sealing */
d3592199 124 if (mfd == -1) {
2ef8c0c9 125 mfd = qemu_memfd_create(name, size, false, 0, 0, NULL);
d3592199 126 }
d3592199 127
dcff1035 128 if (mfd == -1) {
35f9b6ef
MAL
129 const char *tmpdir = g_get_tmp_dir();
130 gchar *fname;
131
132 fname = g_strdup_printf("%s/memfd-XXXXXX", tmpdir);
133 mfd = mkstemp(fname);
134 unlink(fname);
135 g_free(fname);
136
0f2956f9
MAL
137 if (mfd == -1 ||
138 ftruncate(mfd, size) == -1) {
139 goto err;
35f9b6ef 140 }
d3592199
MAL
141 }
142
143 ptr = mmap(0, size, PROT_READ | PROT_WRITE, MAP_SHARED, mfd, 0);
144 if (ptr == MAP_FAILED) {
0f2956f9 145 goto err;
d3592199
MAL
146 }
147
148 *fd = mfd;
149 return ptr;
0f2956f9
MAL
150
151err:
152 error_setg_errno(errp, errno, "failed to allocate shared memory");
153 if (mfd >= 0) {
154 close(mfd);
155 }
156 return NULL;
d3592199
MAL
157}
158
159void qemu_memfd_free(void *ptr, size_t size, int fd)
160{
161 if (ptr) {
162 munmap(ptr, size);
163 }
164
165 if (fd != -1) {
166 close(fd);
167 }
168}
31190ed7
MAL
169
170enum {
171 MEMFD_KO,
172 MEMFD_OK,
173 MEMFD_TODO
174};
175
648abbfb
MAL
176/**
177 * qemu_memfd_alloc_check():
178 *
179 * Check if qemu_memfd_alloc() can allocate, including using a
180 * fallback implementation when host doesn't support memfd.
181 */
182bool qemu_memfd_alloc_check(void)
31190ed7
MAL
183{
184 static int memfd_check = MEMFD_TODO;
185
186 if (memfd_check == MEMFD_TODO) {
187 int fd;
188 void *ptr;
189
1e7ec6cf 190 fd = -1;
0f2956f9 191 ptr = qemu_memfd_alloc("test", 4096, 0, &fd, NULL);
31190ed7
MAL
192 memfd_check = ptr ? MEMFD_OK : MEMFD_KO;
193 qemu_memfd_free(ptr, 4096, fd);
194 }
195
196 return memfd_check == MEMFD_OK;
197}
648abbfb
MAL
198
199/**
200 * qemu_memfd_check():
201 *
202 * Check if host supports memfd.
203 */
204bool qemu_memfd_check(void)
205{
206#ifdef CONFIG_LINUX
207 static int memfd_check = MEMFD_TODO;
208
209 if (memfd_check == MEMFD_TODO) {
210 int mfd = memfd_create("test", 0);
211 if (mfd >= 0) {
212 memfd_check = MEMFD_OK;
213 close(mfd);
214 } else {
215 memfd_check = MEMFD_KO;
216 }
217 }
218
219 return memfd_check == MEMFD_OK;
220#else
221 return false;
222#endif
223}