]>
Commit | Line | Data |
---|---|---|
54936004 FB |
1 | /* |
2 | * mmap support for qemu | |
3 | * | |
4 | * Copyright (c) 2003 Fabrice Bellard | |
5 | * | |
6 | * This program is free software; you can redistribute it and/or modify | |
7 | * it under the terms of the GNU General Public License as published by | |
8 | * the Free Software Foundation; either version 2 of the License, or | |
9 | * (at your option) any later version. | |
10 | * | |
11 | * This program is distributed in the hope that it will be useful, | |
12 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
13 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
14 | * GNU General Public License for more details. | |
15 | * | |
16 | * You should have received a copy of the GNU General Public License | |
17 | * along with this program; if not, write to the Free Software | |
18 | * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. | |
19 | */ | |
20 | #include <stdlib.h> | |
21 | #include <stdio.h> | |
22 | #include <stdarg.h> | |
23 | #include <string.h> | |
24 | #include <unistd.h> | |
25 | #include <errno.h> | |
26 | #include <sys/mman.h> | |
27 | ||
28 | #include "qemu.h" | |
29 | ||
30 | //#define DEBUG_MMAP | |
31 | ||
32 | /* NOTE: all the constants are the HOST ones */ | |
33 | int target_mprotect(unsigned long start, unsigned long len, int prot) | |
34 | { | |
35 | unsigned long end, host_start, host_end, addr; | |
36 | int prot1, ret; | |
37 | ||
38 | #ifdef DEBUG_MMAP | |
39 | printf("mprotect: start=0x%lx len=0x%lx prot=%c%c%c\n", start, len, | |
40 | prot & PROT_READ ? 'r' : '-', | |
41 | prot & PROT_WRITE ? 'w' : '-', | |
42 | prot & PROT_EXEC ? 'x' : '-'); | |
43 | #endif | |
44 | ||
45 | if ((start & ~TARGET_PAGE_MASK) != 0) | |
46 | return -EINVAL; | |
47 | len = TARGET_PAGE_ALIGN(len); | |
48 | end = start + len; | |
49 | if (end < start) | |
50 | return -EINVAL; | |
51 | if (prot & ~(PROT_READ | PROT_WRITE | PROT_EXEC)) | |
52 | return -EINVAL; | |
53 | if (len == 0) | |
54 | return 0; | |
55 | ||
56 | host_start = start & host_page_mask; | |
57 | host_end = HOST_PAGE_ALIGN(end); | |
58 | if (start > host_start) { | |
59 | /* handle host page containing start */ | |
60 | prot1 = prot; | |
61 | for(addr = host_start; addr < start; addr += TARGET_PAGE_SIZE) { | |
62 | prot1 |= page_get_flags(addr); | |
63 | } | |
d418c81e FB |
64 | if (host_end == host_start + host_page_size) { |
65 | for(addr = end; addr < host_end; addr += TARGET_PAGE_SIZE) { | |
66 | prot1 |= page_get_flags(addr); | |
67 | } | |
68 | end = host_end; | |
69 | } | |
54936004 FB |
70 | ret = mprotect((void *)host_start, host_page_size, prot1 & PAGE_BITS); |
71 | if (ret != 0) | |
72 | return ret; | |
73 | host_start += host_page_size; | |
74 | } | |
75 | if (end < host_end) { | |
54936004 FB |
76 | prot1 = prot; |
77 | for(addr = end; addr < host_end; addr += TARGET_PAGE_SIZE) { | |
78 | prot1 |= page_get_flags(addr); | |
79 | } | |
80 | ret = mprotect((void *)(host_end - host_page_size), host_page_size, | |
81 | prot1 & PAGE_BITS); | |
82 | if (ret != 0) | |
83 | return ret; | |
84 | host_end -= host_page_size; | |
85 | } | |
86 | ||
87 | /* handle the pages in the middle */ | |
88 | if (host_start < host_end) { | |
89 | ret = mprotect((void *)host_start, host_end - host_start, prot); | |
90 | if (ret != 0) | |
91 | return ret; | |
92 | } | |
54936004 FB |
93 | page_set_flags(start, start + len, prot | PAGE_VALID); |
94 | return 0; | |
95 | } | |
96 | ||
97 | /* map an incomplete host page */ | |
98 | int mmap_frag(unsigned long host_start, | |
99 | unsigned long start, unsigned long end, | |
100 | int prot, int flags, int fd, unsigned long offset) | |
101 | { | |
102 | unsigned long host_end, ret, addr; | |
103 | int prot1, prot_new; | |
104 | ||
105 | host_end = host_start + host_page_size; | |
106 | ||
107 | /* get the protection of the target pages outside the mapping */ | |
108 | prot1 = 0; | |
109 | for(addr = host_start; addr < host_end; addr++) { | |
110 | if (addr < start || addr >= end) | |
111 | prot1 |= page_get_flags(addr); | |
112 | } | |
113 | ||
114 | if (prot1 == 0) { | |
115 | /* no page was there, so we allocate one */ | |
116 | ret = (long)mmap((void *)host_start, host_page_size, prot, | |
117 | flags | MAP_ANONYMOUS, -1, 0); | |
118 | if (ret == -1) | |
119 | return ret; | |
120 | } | |
121 | prot1 &= PAGE_BITS; | |
122 | ||
123 | prot_new = prot | prot1; | |
124 | if (!(flags & MAP_ANONYMOUS)) { | |
125 | /* msync() won't work here, so we return an error if write is | |
126 | possible while it is a shared mapping */ | |
127 | if ((flags & MAP_TYPE) == MAP_SHARED && | |
128 | (prot & PROT_WRITE)) | |
129 | return -EINVAL; | |
130 | ||
131 | /* adjust protection to be able to read */ | |
132 | if (!(prot1 & PROT_WRITE)) | |
133 | mprotect((void *)host_start, host_page_size, prot1 | PROT_WRITE); | |
134 | ||
135 | /* read the corresponding file data */ | |
136 | pread(fd, (void *)start, end - start, offset); | |
137 | ||
138 | /* put final protection */ | |
139 | if (prot_new != (prot1 | PROT_WRITE)) | |
140 | mprotect((void *)host_start, host_page_size, prot_new); | |
141 | } else { | |
142 | /* just update the protection */ | |
143 | if (prot_new != prot1) { | |
144 | mprotect((void *)host_start, host_page_size, prot_new); | |
145 | } | |
146 | } | |
147 | return 0; | |
148 | } | |
149 | ||
150 | /* NOTE: all the constants are the HOST ones */ | |
151 | long target_mmap(unsigned long start, unsigned long len, int prot, | |
152 | int flags, int fd, unsigned long offset) | |
153 | { | |
154 | unsigned long ret, end, host_start, host_end, retaddr, host_offset, host_len; | |
4f2ac237 FB |
155 | #if defined(__alpha__) || defined(__sparc__) || defined(__x86_64__) |
156 | static unsigned long last_start = 0x40000000; | |
157 | #endif | |
54936004 FB |
158 | |
159 | #ifdef DEBUG_MMAP | |
160 | { | |
161 | printf("mmap: start=0x%lx len=0x%lx prot=%c%c%c flags=", | |
162 | start, len, | |
163 | prot & PROT_READ ? 'r' : '-', | |
164 | prot & PROT_WRITE ? 'w' : '-', | |
165 | prot & PROT_EXEC ? 'x' : '-'); | |
166 | if (flags & MAP_FIXED) | |
167 | printf("MAP_FIXED "); | |
168 | if (flags & MAP_ANONYMOUS) | |
169 | printf("MAP_ANON "); | |
170 | switch(flags & MAP_TYPE) { | |
171 | case MAP_PRIVATE: | |
172 | printf("MAP_PRIVATE "); | |
173 | break; | |
174 | case MAP_SHARED: | |
175 | printf("MAP_SHARED "); | |
176 | break; | |
177 | default: | |
178 | printf("[MAP_TYPE=0x%x] ", flags & MAP_TYPE); | |
179 | break; | |
180 | } | |
181 | printf("fd=%d offset=%lx\n", fd, offset); | |
182 | } | |
183 | #endif | |
184 | ||
185 | if (offset & ~TARGET_PAGE_MASK) | |
186 | return -EINVAL; | |
187 | ||
188 | len = TARGET_PAGE_ALIGN(len); | |
189 | if (len == 0) | |
190 | return start; | |
191 | host_start = start & host_page_mask; | |
192 | ||
193 | if (!(flags & MAP_FIXED)) { | |
bc51c5c9 | 194 | #if defined(__alpha__) || defined(__sparc__) || defined(__x86_64__) |
917f95fd | 195 | /* tell the kenel to search at the same place as i386 */ |
4f2ac237 FB |
196 | if (host_start == 0) { |
197 | host_start = last_start; | |
198 | last_start += HOST_PAGE_ALIGN(len); | |
199 | } | |
917f95fd | 200 | #endif |
54936004 FB |
201 | if (host_page_size != real_host_page_size) { |
202 | /* NOTE: this code is only for debugging with '-p' option */ | |
203 | /* reserve a memory area */ | |
204 | host_len = HOST_PAGE_ALIGN(len) + host_page_size - TARGET_PAGE_SIZE; | |
205 | host_start = (long)mmap((void *)host_start, host_len, PROT_NONE, | |
206 | MAP_PRIVATE | MAP_ANONYMOUS, -1, 0); | |
207 | if (host_start == -1) | |
208 | return host_start; | |
209 | host_end = host_start + host_len; | |
210 | start = HOST_PAGE_ALIGN(host_start); | |
211 | end = start + HOST_PAGE_ALIGN(len); | |
212 | if (start > host_start) | |
213 | munmap((void *)host_start, start - host_start); | |
214 | if (end < host_end) | |
215 | munmap((void *)end, host_end - end); | |
216 | /* use it as a fixed mapping */ | |
217 | flags |= MAP_FIXED; | |
218 | } else { | |
219 | /* if not fixed, no need to do anything */ | |
220 | host_offset = offset & host_page_mask; | |
221 | host_len = len + offset - host_offset; | |
222 | start = (long)mmap((void *)host_start, host_len, | |
223 | prot, flags, fd, host_offset); | |
224 | if (start == -1) | |
225 | return start; | |
226 | /* update start so that it points to the file position at 'offset' */ | |
227 | if (!(flags & MAP_ANONYMOUS)) | |
228 | start += offset - host_offset; | |
229 | goto the_end1; | |
230 | } | |
231 | } | |
232 | ||
233 | if (start & ~TARGET_PAGE_MASK) | |
234 | return -EINVAL; | |
235 | end = start + len; | |
236 | host_end = HOST_PAGE_ALIGN(end); | |
237 | ||
238 | /* worst case: we cannot map the file because the offset is not | |
239 | aligned, so we read it */ | |
240 | if (!(flags & MAP_ANONYMOUS) && | |
241 | (offset & ~host_page_mask) != (start & ~host_page_mask)) { | |
242 | /* msync() won't work here, so we return an error if write is | |
243 | possible while it is a shared mapping */ | |
244 | if ((flags & MAP_TYPE) == MAP_SHARED && | |
245 | (prot & PROT_WRITE)) | |
246 | return -EINVAL; | |
247 | retaddr = target_mmap(start, len, prot | PROT_WRITE, | |
248 | MAP_FIXED | MAP_PRIVATE | MAP_ANONYMOUS, | |
249 | -1, 0); | |
250 | if (retaddr == -1) | |
251 | return retaddr; | |
252 | pread(fd, (void *)start, len, offset); | |
253 | if (!(prot & PROT_WRITE)) { | |
254 | ret = target_mprotect(start, len, prot); | |
255 | if (ret != 0) | |
256 | return ret; | |
257 | } | |
258 | goto the_end; | |
259 | } | |
260 | ||
261 | /* handle the start of the mapping */ | |
262 | if (start > host_start) { | |
263 | if (host_end == host_start + host_page_size) { | |
264 | /* one single host page */ | |
265 | ret = mmap_frag(host_start, start, end, | |
266 | prot, flags, fd, offset); | |
267 | if (ret == -1) | |
268 | return ret; | |
269 | goto the_end1; | |
270 | } | |
271 | ret = mmap_frag(host_start, start, host_start + host_page_size, | |
272 | prot, flags, fd, offset); | |
273 | if (ret == -1) | |
274 | return ret; | |
275 | host_start += host_page_size; | |
276 | } | |
277 | /* handle the end of the mapping */ | |
278 | if (end < host_end) { | |
279 | ret = mmap_frag(host_end - host_page_size, | |
280 | host_end - host_page_size, host_end, | |
281 | prot, flags, fd, | |
282 | offset + host_end - host_page_size - start); | |
283 | if (ret == -1) | |
284 | return ret; | |
285 | host_end -= host_page_size; | |
286 | } | |
287 | ||
288 | /* map the middle (easier) */ | |
289 | if (host_start < host_end) { | |
4a585ccb FB |
290 | unsigned long offset1; |
291 | if (flags & MAP_ANONYMOUS) | |
292 | offset1 = 0; | |
293 | else | |
294 | offset1 = offset + host_start - start; | |
54936004 | 295 | ret = (long)mmap((void *)host_start, host_end - host_start, |
4a585ccb | 296 | prot, flags, fd, offset1); |
54936004 FB |
297 | if (ret == -1) |
298 | return ret; | |
299 | } | |
300 | the_end1: | |
301 | page_set_flags(start, start + len, prot | PAGE_VALID); | |
302 | the_end: | |
303 | #ifdef DEBUG_MMAP | |
917f95fd | 304 | printf("ret=0x%lx\n", (long)start); |
54936004 FB |
305 | page_dump(stdout); |
306 | printf("\n"); | |
307 | #endif | |
308 | return start; | |
309 | } | |
310 | ||
311 | int target_munmap(unsigned long start, unsigned long len) | |
312 | { | |
313 | unsigned long end, host_start, host_end, addr; | |
314 | int prot, ret; | |
315 | ||
316 | #ifdef DEBUG_MMAP | |
317 | printf("munmap: start=0x%lx len=0x%lx\n", start, len); | |
318 | #endif | |
319 | if (start & ~TARGET_PAGE_MASK) | |
320 | return -EINVAL; | |
321 | len = TARGET_PAGE_ALIGN(len); | |
322 | if (len == 0) | |
323 | return -EINVAL; | |
324 | end = start + len; | |
325 | host_start = start & host_page_mask; | |
326 | host_end = HOST_PAGE_ALIGN(end); | |
327 | ||
328 | if (start > host_start) { | |
329 | /* handle host page containing start */ | |
330 | prot = 0; | |
331 | for(addr = host_start; addr < start; addr += TARGET_PAGE_SIZE) { | |
332 | prot |= page_get_flags(addr); | |
333 | } | |
d418c81e FB |
334 | if (host_end == host_start + host_page_size) { |
335 | for(addr = end; addr < host_end; addr += TARGET_PAGE_SIZE) { | |
336 | prot |= page_get_flags(addr); | |
337 | } | |
338 | end = host_end; | |
339 | } | |
54936004 FB |
340 | if (prot != 0) |
341 | host_start += host_page_size; | |
342 | } | |
343 | if (end < host_end) { | |
54936004 FB |
344 | prot = 0; |
345 | for(addr = end; addr < host_end; addr += TARGET_PAGE_SIZE) { | |
346 | prot |= page_get_flags(addr); | |
347 | } | |
348 | if (prot != 0) | |
349 | host_end -= host_page_size; | |
350 | } | |
351 | ||
352 | /* unmap what we can */ | |
353 | if (host_start < host_end) { | |
354 | ret = munmap((void *)host_start, host_end - host_start); | |
355 | if (ret != 0) | |
356 | return ret; | |
357 | } | |
358 | ||
359 | page_set_flags(start, start + len, 0); | |
360 | return 0; | |
361 | } | |
362 | ||
363 | /* XXX: currently, we only handle MAP_ANONYMOUS and not MAP_FIXED | |
364 | blocks which have been allocated starting on a host page */ | |
365 | long target_mremap(unsigned long old_addr, unsigned long old_size, | |
366 | unsigned long new_size, unsigned long flags, | |
367 | unsigned long new_addr) | |
368 | { | |
369 | int prot; | |
370 | ||
371 | /* XXX: use 5 args syscall */ | |
372 | new_addr = (long)mremap((void *)old_addr, old_size, new_size, flags); | |
373 | if (new_addr == -1) | |
374 | return new_addr; | |
375 | prot = page_get_flags(old_addr); | |
376 | page_set_flags(old_addr, old_addr + old_size, 0); | |
377 | page_set_flags(new_addr, new_addr + new_size, prot | PAGE_VALID); | |
378 | return new_addr; | |
379 | } | |
380 | ||
381 | int target_msync(unsigned long start, unsigned long len, int flags) | |
382 | { | |
383 | unsigned long end; | |
384 | ||
385 | if (start & ~TARGET_PAGE_MASK) | |
386 | return -EINVAL; | |
387 | len = TARGET_PAGE_ALIGN(len); | |
54936004 | 388 | end = start + len; |
d418c81e FB |
389 | if (end < start) |
390 | return -EINVAL; | |
391 | if (end == start) | |
392 | return 0; | |
54936004 FB |
393 | |
394 | start &= host_page_mask; | |
d418c81e | 395 | return msync((void *)start, end - start, flags); |
54936004 FB |
396 | } |
397 |