uvm_mmap.c revision 1.114.8.2 1 1.114.8.2 pooka /* $NetBSD: uvm_mmap.c,v 1.114.8.2 2007/07/27 08:26:39 pooka Exp $ */
2 1.114.8.2 pooka
3 1.114.8.2 pooka /*
4 1.114.8.2 pooka * Copyright (c) 1997 Charles D. Cranor and Washington University.
5 1.114.8.2 pooka * Copyright (c) 1991, 1993 The Regents of the University of California.
6 1.114.8.2 pooka * Copyright (c) 1988 University of Utah.
7 1.114.8.2 pooka *
8 1.114.8.2 pooka * All rights reserved.
9 1.114.8.2 pooka *
10 1.114.8.2 pooka * This code is derived from software contributed to Berkeley by
11 1.114.8.2 pooka * the Systems Programming Group of the University of Utah Computer
12 1.114.8.2 pooka * Science Department.
13 1.114.8.2 pooka *
14 1.114.8.2 pooka * Redistribution and use in source and binary forms, with or without
15 1.114.8.2 pooka * modification, are permitted provided that the following conditions
16 1.114.8.2 pooka * are met:
17 1.114.8.2 pooka * 1. Redistributions of source code must retain the above copyright
18 1.114.8.2 pooka * notice, this list of conditions and the following disclaimer.
19 1.114.8.2 pooka * 2. Redistributions in binary form must reproduce the above copyright
20 1.114.8.2 pooka * notice, this list of conditions and the following disclaimer in the
21 1.114.8.2 pooka * documentation and/or other materials provided with the distribution.
22 1.114.8.2 pooka * 3. All advertising materials mentioning features or use of this software
23 1.114.8.2 pooka * must display the following acknowledgement:
24 1.114.8.2 pooka * This product includes software developed by the Charles D. Cranor,
25 1.114.8.2 pooka * Washington University, University of California, Berkeley and
26 1.114.8.2 pooka * its contributors.
27 1.114.8.2 pooka * 4. Neither the name of the University nor the names of its contributors
28 1.114.8.2 pooka * may be used to endorse or promote products derived from this software
29 1.114.8.2 pooka * without specific prior written permission.
30 1.114.8.2 pooka *
31 1.114.8.2 pooka * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
32 1.114.8.2 pooka * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
33 1.114.8.2 pooka * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
34 1.114.8.2 pooka * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
35 1.114.8.2 pooka * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
36 1.114.8.2 pooka * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
37 1.114.8.2 pooka * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
38 1.114.8.2 pooka * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
39 1.114.8.2 pooka * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
40 1.114.8.2 pooka * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
41 1.114.8.2 pooka * SUCH DAMAGE.
42 1.114.8.2 pooka *
43 1.114.8.2 pooka * from: Utah $Hdr: vm_mmap.c 1.6 91/10/21$
44 1.114.8.2 pooka * @(#)vm_mmap.c 8.5 (Berkeley) 5/19/94
45 1.114.8.2 pooka * from: Id: uvm_mmap.c,v 1.1.2.14 1998/01/05 21:04:26 chuck Exp
46 1.114.8.2 pooka */
47 1.114.8.2 pooka
48 1.114.8.2 pooka /*
49 1.114.8.2 pooka * uvm_mmap.c: system call interface into VM system, plus kernel vm_mmap
50 1.114.8.2 pooka * function.
51 1.114.8.2 pooka */
52 1.114.8.2 pooka
53 1.114.8.2 pooka #include <sys/cdefs.h>
54 1.114.8.2 pooka __KERNEL_RCSID(0, "$NetBSD: uvm_mmap.c,v 1.114.8.2 2007/07/27 08:26:39 pooka Exp $");
55 1.114.8.2 pooka
56 1.114.8.2 pooka #include "opt_compat_netbsd.h"
57 1.114.8.2 pooka #include "opt_pax.h"
58 1.114.8.2 pooka #include "veriexec.h"
59 1.114.8.2 pooka
60 1.114.8.2 pooka #include <sys/param.h>
61 1.114.8.2 pooka #include <sys/systm.h>
62 1.114.8.2 pooka #include <sys/file.h>
63 1.114.8.2 pooka #include <sys/filedesc.h>
64 1.114.8.2 pooka #include <sys/resourcevar.h>
65 1.114.8.2 pooka #include <sys/mman.h>
66 1.114.8.2 pooka #include <sys/mount.h>
67 1.114.8.2 pooka #include <sys/proc.h>
68 1.114.8.2 pooka #include <sys/malloc.h>
69 1.114.8.2 pooka #include <sys/vnode.h>
70 1.114.8.2 pooka #include <sys/conf.h>
71 1.114.8.2 pooka #include <sys/stat.h>
72 1.114.8.2 pooka
73 1.114.8.2 pooka #if NVERIEXEC > 0
74 1.114.8.2 pooka #include <sys/verified_exec.h>
75 1.114.8.2 pooka #endif /* NVERIEXEC > 0 */
76 1.114.8.2 pooka
77 1.114.8.2 pooka #ifdef PAX_MPROTECT
78 1.114.8.2 pooka #include <sys/pax.h>
79 1.114.8.2 pooka #endif /* PAX_MPROTECT */
80 1.114.8.2 pooka
81 1.114.8.2 pooka #include <miscfs/specfs/specdev.h>
82 1.114.8.2 pooka
83 1.114.8.2 pooka #include <sys/syscallargs.h>
84 1.114.8.2 pooka
85 1.114.8.2 pooka #include <uvm/uvm.h>
86 1.114.8.2 pooka #include <uvm/uvm_device.h>
87 1.114.8.2 pooka
88 1.114.8.2 pooka #ifndef COMPAT_ZERODEV
89 1.114.8.2 pooka #define COMPAT_ZERODEV(dev) (0)
90 1.114.8.2 pooka #endif
91 1.114.8.2 pooka
92 1.114.8.2 pooka #define RANGE_TEST(addr, size, ismmap) \
93 1.114.8.2 pooka do { \
94 1.114.8.2 pooka vaddr_t vm_min_address = VM_MIN_ADDRESS; \
95 1.114.8.2 pooka vaddr_t vm_max_address = VM_MAXUSER_ADDRESS; \
96 1.114.8.2 pooka vaddr_t eaddr = addr + size; \
97 1.114.8.2 pooka \
98 1.114.8.2 pooka if (addr < vm_min_address) \
99 1.114.8.2 pooka return EINVAL; \
100 1.114.8.2 pooka if (eaddr > vm_max_address) \
101 1.114.8.2 pooka return /*CONSTCOND*/ \
102 1.114.8.2 pooka ismmap ? EFBIG : EINVAL; \
103 1.114.8.2 pooka if (addr > eaddr) /* no wrapping! */ \
104 1.114.8.2 pooka return /*CONSTCOND*/ \
105 1.114.8.2 pooka ismmap ? EOVERFLOW : EINVAL; \
106 1.114.8.2 pooka } while (/*CONSTCOND*/0)
107 1.114.8.2 pooka
108 1.114.8.2 pooka /*
109 1.114.8.2 pooka * unimplemented VM system calls:
110 1.114.8.2 pooka */
111 1.114.8.2 pooka
112 1.114.8.2 pooka /*
113 1.114.8.2 pooka * sys_sbrk: sbrk system call.
114 1.114.8.2 pooka */
115 1.114.8.2 pooka
116 1.114.8.2 pooka /* ARGSUSED */
117 1.114.8.2 pooka int
118 1.114.8.2 pooka sys_sbrk(struct lwp *l, void *v, register_t *retval)
119 1.114.8.2 pooka {
120 1.114.8.2 pooka #if 0
121 1.114.8.2 pooka struct sys_sbrk_args /* {
122 1.114.8.2 pooka syscallarg(intptr_t) incr;
123 1.114.8.2 pooka } */ *uap = v;
124 1.114.8.2 pooka #endif
125 1.114.8.2 pooka
126 1.114.8.2 pooka return (ENOSYS);
127 1.114.8.2 pooka }
128 1.114.8.2 pooka
129 1.114.8.2 pooka /*
130 1.114.8.2 pooka * sys_sstk: sstk system call.
131 1.114.8.2 pooka */
132 1.114.8.2 pooka
133 1.114.8.2 pooka /* ARGSUSED */
134 1.114.8.2 pooka int
135 1.114.8.2 pooka sys_sstk(struct lwp *l, void *v, register_t *retval)
136 1.114.8.2 pooka {
137 1.114.8.2 pooka #if 0
138 1.114.8.2 pooka struct sys_sstk_args /* {
139 1.114.8.2 pooka syscallarg(int) incr;
140 1.114.8.2 pooka } */ *uap = v;
141 1.114.8.2 pooka #endif
142 1.114.8.2 pooka
143 1.114.8.2 pooka return (ENOSYS);
144 1.114.8.2 pooka }
145 1.114.8.2 pooka
146 1.114.8.2 pooka /*
147 1.114.8.2 pooka * sys_mincore: determine if pages are in core or not.
148 1.114.8.2 pooka */
149 1.114.8.2 pooka
150 1.114.8.2 pooka /* ARGSUSED */
151 1.114.8.2 pooka int
152 1.114.8.2 pooka sys_mincore(struct lwp *l, void *v, register_t *retval)
153 1.114.8.2 pooka {
154 1.114.8.2 pooka struct sys_mincore_args /* {
155 1.114.8.2 pooka syscallarg(void *) addr;
156 1.114.8.2 pooka syscallarg(size_t) len;
157 1.114.8.2 pooka syscallarg(char *) vec;
158 1.114.8.2 pooka } */ *uap = v;
159 1.114.8.2 pooka struct proc *p = l->l_proc;
160 1.114.8.2 pooka struct vm_page *pg;
161 1.114.8.2 pooka char *vec, pgi;
162 1.114.8.2 pooka struct uvm_object *uobj;
163 1.114.8.2 pooka struct vm_amap *amap;
164 1.114.8.2 pooka struct vm_anon *anon;
165 1.114.8.2 pooka struct vm_map_entry *entry;
166 1.114.8.2 pooka vaddr_t start, end, lim;
167 1.114.8.2 pooka struct vm_map *map;
168 1.114.8.2 pooka vsize_t len;
169 1.114.8.2 pooka int error = 0, npgs;
170 1.114.8.2 pooka
171 1.114.8.2 pooka map = &p->p_vmspace->vm_map;
172 1.114.8.2 pooka
173 1.114.8.2 pooka start = (vaddr_t)SCARG(uap, addr);
174 1.114.8.2 pooka len = SCARG(uap, len);
175 1.114.8.2 pooka vec = SCARG(uap, vec);
176 1.114.8.2 pooka
177 1.114.8.2 pooka if (start & PAGE_MASK)
178 1.114.8.2 pooka return (EINVAL);
179 1.114.8.2 pooka len = round_page(len);
180 1.114.8.2 pooka end = start + len;
181 1.114.8.2 pooka if (end <= start)
182 1.114.8.2 pooka return (EINVAL);
183 1.114.8.2 pooka
184 1.114.8.2 pooka /*
185 1.114.8.2 pooka * Lock down vec, so our returned status isn't outdated by
186 1.114.8.2 pooka * storing the status byte for a page.
187 1.114.8.2 pooka */
188 1.114.8.2 pooka
189 1.114.8.2 pooka npgs = len >> PAGE_SHIFT;
190 1.114.8.2 pooka error = uvm_vslock(p->p_vmspace, vec, npgs, VM_PROT_WRITE);
191 1.114.8.2 pooka if (error) {
192 1.114.8.2 pooka return error;
193 1.114.8.2 pooka }
194 1.114.8.2 pooka vm_map_lock_read(map);
195 1.114.8.2 pooka
196 1.114.8.2 pooka if (uvm_map_lookup_entry(map, start, &entry) == false) {
197 1.114.8.2 pooka error = ENOMEM;
198 1.114.8.2 pooka goto out;
199 1.114.8.2 pooka }
200 1.114.8.2 pooka
201 1.114.8.2 pooka for (/* nothing */;
202 1.114.8.2 pooka entry != &map->header && entry->start < end;
203 1.114.8.2 pooka entry = entry->next) {
204 1.114.8.2 pooka KASSERT(!UVM_ET_ISSUBMAP(entry));
205 1.114.8.2 pooka KASSERT(start >= entry->start);
206 1.114.8.2 pooka
207 1.114.8.2 pooka /* Make sure there are no holes. */
208 1.114.8.2 pooka if (entry->end < end &&
209 1.114.8.2 pooka (entry->next == &map->header ||
210 1.114.8.2 pooka entry->next->start > entry->end)) {
211 1.114.8.2 pooka error = ENOMEM;
212 1.114.8.2 pooka goto out;
213 1.114.8.2 pooka }
214 1.114.8.2 pooka
215 1.114.8.2 pooka lim = end < entry->end ? end : entry->end;
216 1.114.8.2 pooka
217 1.114.8.2 pooka /*
218 1.114.8.2 pooka * Special case for objects with no "real" pages. Those
219 1.114.8.2 pooka * are always considered resident (mapped devices).
220 1.114.8.2 pooka */
221 1.114.8.2 pooka
222 1.114.8.2 pooka if (UVM_ET_ISOBJ(entry)) {
223 1.114.8.2 pooka KASSERT(!UVM_OBJ_IS_KERN_OBJECT(entry->object.uvm_obj));
224 1.114.8.2 pooka if (UVM_OBJ_IS_DEVICE(entry->object.uvm_obj)) {
225 1.114.8.2 pooka for (/* nothing */; start < lim;
226 1.114.8.2 pooka start += PAGE_SIZE, vec++)
227 1.114.8.2 pooka subyte(vec, 1);
228 1.114.8.2 pooka continue;
229 1.114.8.2 pooka }
230 1.114.8.2 pooka }
231 1.114.8.2 pooka
232 1.114.8.2 pooka amap = entry->aref.ar_amap; /* top layer */
233 1.114.8.2 pooka uobj = entry->object.uvm_obj; /* bottom layer */
234 1.114.8.2 pooka
235 1.114.8.2 pooka if (amap != NULL)
236 1.114.8.2 pooka amap_lock(amap);
237 1.114.8.2 pooka if (uobj != NULL)
238 1.114.8.2 pooka simple_lock(&uobj->vmobjlock);
239 1.114.8.2 pooka
240 1.114.8.2 pooka for (/* nothing */; start < lim; start += PAGE_SIZE, vec++) {
241 1.114.8.2 pooka pgi = 0;
242 1.114.8.2 pooka if (amap != NULL) {
243 1.114.8.2 pooka /* Check the top layer first. */
244 1.114.8.2 pooka anon = amap_lookup(&entry->aref,
245 1.114.8.2 pooka start - entry->start);
246 1.114.8.2 pooka /* Don't need to lock anon here. */
247 1.114.8.2 pooka if (anon != NULL && anon->an_page != NULL) {
248 1.114.8.2 pooka
249 1.114.8.2 pooka /*
250 1.114.8.2 pooka * Anon has the page for this entry
251 1.114.8.2 pooka * offset.
252 1.114.8.2 pooka */
253 1.114.8.2 pooka
254 1.114.8.2 pooka pgi = 1;
255 1.114.8.2 pooka }
256 1.114.8.2 pooka }
257 1.114.8.2 pooka if (uobj != NULL && pgi == 0) {
258 1.114.8.2 pooka /* Check the bottom layer. */
259 1.114.8.2 pooka pg = uvm_pagelookup(uobj,
260 1.114.8.2 pooka entry->offset + (start - entry->start));
261 1.114.8.2 pooka if (pg != NULL) {
262 1.114.8.2 pooka
263 1.114.8.2 pooka /*
264 1.114.8.2 pooka * Object has the page for this entry
265 1.114.8.2 pooka * offset.
266 1.114.8.2 pooka */
267 1.114.8.2 pooka
268 1.114.8.2 pooka pgi = 1;
269 1.114.8.2 pooka }
270 1.114.8.2 pooka }
271 1.114.8.2 pooka (void) subyte(vec, pgi);
272 1.114.8.2 pooka }
273 1.114.8.2 pooka if (uobj != NULL)
274 1.114.8.2 pooka simple_unlock(&uobj->vmobjlock);
275 1.114.8.2 pooka if (amap != NULL)
276 1.114.8.2 pooka amap_unlock(amap);
277 1.114.8.2 pooka }
278 1.114.8.2 pooka
279 1.114.8.2 pooka out:
280 1.114.8.2 pooka vm_map_unlock_read(map);
281 1.114.8.2 pooka uvm_vsunlock(p->p_vmspace, SCARG(uap, vec), npgs);
282 1.114.8.2 pooka return (error);
283 1.114.8.2 pooka }
284 1.114.8.2 pooka
285 1.114.8.2 pooka /*
286 1.114.8.2 pooka * sys_mmap: mmap system call.
287 1.114.8.2 pooka *
288 1.114.8.2 pooka * => file offset and address may not be page aligned
289 1.114.8.2 pooka * - if MAP_FIXED, offset and address must have remainder mod PAGE_SIZE
290 1.114.8.2 pooka * - if address isn't page aligned the mapping starts at trunc_page(addr)
291 1.114.8.2 pooka * and the return value is adjusted up by the page offset.
292 1.114.8.2 pooka */
293 1.114.8.2 pooka
294 1.114.8.2 pooka int
295 1.114.8.2 pooka sys_mmap(l, v, retval)
296 1.114.8.2 pooka struct lwp *l;
297 1.114.8.2 pooka void *v;
298 1.114.8.2 pooka register_t *retval;
299 1.114.8.2 pooka {
300 1.114.8.2 pooka struct sys_mmap_args /* {
301 1.114.8.2 pooka syscallarg(void *) addr;
302 1.114.8.2 pooka syscallarg(size_t) len;
303 1.114.8.2 pooka syscallarg(int) prot;
304 1.114.8.2 pooka syscallarg(int) flags;
305 1.114.8.2 pooka syscallarg(int) fd;
306 1.114.8.2 pooka syscallarg(long) pad;
307 1.114.8.2 pooka syscallarg(off_t) pos;
308 1.114.8.2 pooka } */ *uap = v;
309 1.114.8.2 pooka struct proc *p = l->l_proc;
310 1.114.8.2 pooka vaddr_t addr;
311 1.114.8.2 pooka struct vattr va;
312 1.114.8.2 pooka off_t pos;
313 1.114.8.2 pooka vsize_t size, pageoff;
314 1.114.8.2 pooka vm_prot_t prot, maxprot;
315 1.114.8.2 pooka int flags, fd;
316 1.114.8.2 pooka vaddr_t defaddr;
317 1.114.8.2 pooka struct filedesc *fdp = p->p_fd;
318 1.114.8.2 pooka struct file *fp;
319 1.114.8.2 pooka struct vnode *vp;
320 1.114.8.2 pooka void *handle;
321 1.114.8.2 pooka int error;
322 1.114.8.2 pooka
323 1.114.8.2 pooka /*
324 1.114.8.2 pooka * first, extract syscall args from the uap.
325 1.114.8.2 pooka */
326 1.114.8.2 pooka
327 1.114.8.2 pooka addr = (vaddr_t)SCARG(uap, addr);
328 1.114.8.2 pooka size = (vsize_t)SCARG(uap, len);
329 1.114.8.2 pooka prot = SCARG(uap, prot) & VM_PROT_ALL;
330 1.114.8.2 pooka flags = SCARG(uap, flags);
331 1.114.8.2 pooka fd = SCARG(uap, fd);
332 1.114.8.2 pooka pos = SCARG(uap, pos);
333 1.114.8.2 pooka
334 1.114.8.2 pooka /*
335 1.114.8.2 pooka * Fixup the old deprecated MAP_COPY into MAP_PRIVATE, and
336 1.114.8.2 pooka * validate the flags.
337 1.114.8.2 pooka */
338 1.114.8.2 pooka if (flags & MAP_COPY)
339 1.114.8.2 pooka flags = (flags & ~MAP_COPY) | MAP_PRIVATE;
340 1.114.8.2 pooka if ((flags & (MAP_SHARED|MAP_PRIVATE)) == (MAP_SHARED|MAP_PRIVATE))
341 1.114.8.2 pooka return (EINVAL);
342 1.114.8.2 pooka
343 1.114.8.2 pooka /*
344 1.114.8.2 pooka * align file position and save offset. adjust size.
345 1.114.8.2 pooka */
346 1.114.8.2 pooka
347 1.114.8.2 pooka pageoff = (pos & PAGE_MASK);
348 1.114.8.2 pooka pos -= pageoff;
349 1.114.8.2 pooka size += pageoff; /* add offset */
350 1.114.8.2 pooka size = (vsize_t)round_page(size); /* round up */
351 1.114.8.2 pooka
352 1.114.8.2 pooka /*
353 1.114.8.2 pooka * now check (MAP_FIXED) or get (!MAP_FIXED) the "addr"
354 1.114.8.2 pooka */
355 1.114.8.2 pooka if (flags & MAP_FIXED) {
356 1.114.8.2 pooka
357 1.114.8.2 pooka /* ensure address and file offset are aligned properly */
358 1.114.8.2 pooka addr -= pageoff;
359 1.114.8.2 pooka if (addr & PAGE_MASK)
360 1.114.8.2 pooka return (EINVAL);
361 1.114.8.2 pooka
362 1.114.8.2 pooka RANGE_TEST(addr, size, 1);
363 1.114.8.2 pooka
364 1.114.8.2 pooka } else if (addr == 0 || !(flags & MAP_TRYFIXED)) {
365 1.114.8.2 pooka
366 1.114.8.2 pooka /*
367 1.114.8.2 pooka * not fixed: make sure we skip over the largest
368 1.114.8.2 pooka * possible heap for non-topdown mapping arrangements.
369 1.114.8.2 pooka * we will refine our guess later (e.g. to account for
370 1.114.8.2 pooka * VAC, etc)
371 1.114.8.2 pooka */
372 1.114.8.2 pooka
373 1.114.8.2 pooka defaddr = p->p_emul->e_vm_default_addr(p,
374 1.114.8.2 pooka (vaddr_t)p->p_vmspace->vm_daddr, size);
375 1.114.8.2 pooka
376 1.114.8.2 pooka if (addr == 0 ||
377 1.114.8.2 pooka !(p->p_vmspace->vm_map.flags & VM_MAP_TOPDOWN))
378 1.114.8.2 pooka addr = MAX(addr, defaddr);
379 1.114.8.2 pooka else
380 1.114.8.2 pooka addr = MIN(addr, defaddr);
381 1.114.8.2 pooka }
382 1.114.8.2 pooka
383 1.114.8.2 pooka /*
384 1.114.8.2 pooka * check for file mappings (i.e. not anonymous) and verify file.
385 1.114.8.2 pooka */
386 1.114.8.2 pooka
387 1.114.8.2 pooka if ((flags & MAP_ANON) == 0) {
388 1.114.8.2 pooka
389 1.114.8.2 pooka if ((fp = fd_getfile(fdp, fd)) == NULL)
390 1.114.8.2 pooka return (EBADF);
391 1.114.8.2 pooka
392 1.114.8.2 pooka simple_unlock(&fp->f_slock);
393 1.114.8.2 pooka
394 1.114.8.2 pooka if (fp->f_type != DTYPE_VNODE)
395 1.114.8.2 pooka return (ENODEV); /* only mmap vnodes! */
396 1.114.8.2 pooka vp = (struct vnode *)fp->f_data; /* convert to vnode */
397 1.114.8.2 pooka
398 1.114.8.2 pooka if (vp->v_type != VREG && vp->v_type != VCHR &&
399 1.114.8.2 pooka vp->v_type != VBLK)
400 1.114.8.2 pooka return (ENODEV); /* only REG/CHR/BLK support mmap */
401 1.114.8.2 pooka
402 1.114.8.2 pooka if (vp->v_type != VCHR && pos < 0)
403 1.114.8.2 pooka return (EINVAL);
404 1.114.8.2 pooka
405 1.114.8.2 pooka if (vp->v_type != VCHR && (pos + size) < pos)
406 1.114.8.2 pooka return (EOVERFLOW); /* no offset wrapping */
407 1.114.8.2 pooka
408 1.114.8.2 pooka /* special case: catch SunOS style /dev/zero */
409 1.114.8.2 pooka if (vp->v_type == VCHR
410 1.114.8.2 pooka && (vp->v_rdev == zerodev || COMPAT_ZERODEV(vp->v_rdev))) {
411 1.114.8.2 pooka flags |= MAP_ANON;
412 1.114.8.2 pooka goto is_anon;
413 1.114.8.2 pooka }
414 1.114.8.2 pooka
415 1.114.8.2 pooka /*
416 1.114.8.2 pooka * Old programs may not select a specific sharing type, so
417 1.114.8.2 pooka * default to an appropriate one.
418 1.114.8.2 pooka *
419 1.114.8.2 pooka * XXX: how does MAP_ANON fit in the picture?
420 1.114.8.2 pooka */
421 1.114.8.2 pooka if ((flags & (MAP_SHARED|MAP_PRIVATE)) == 0) {
422 1.114.8.2 pooka #if defined(DEBUG)
423 1.114.8.2 pooka printf("WARNING: defaulted mmap() share type to "
424 1.114.8.2 pooka "%s (pid %d command %s)\n", vp->v_type == VCHR ?
425 1.114.8.2 pooka "MAP_SHARED" : "MAP_PRIVATE", p->p_pid,
426 1.114.8.2 pooka p->p_comm);
427 1.114.8.2 pooka #endif
428 1.114.8.2 pooka if (vp->v_type == VCHR)
429 1.114.8.2 pooka flags |= MAP_SHARED; /* for a device */
430 1.114.8.2 pooka else
431 1.114.8.2 pooka flags |= MAP_PRIVATE; /* for a file */
432 1.114.8.2 pooka }
433 1.114.8.2 pooka
434 1.114.8.2 pooka /*
435 1.114.8.2 pooka * MAP_PRIVATE device mappings don't make sense (and aren't
436 1.114.8.2 pooka * supported anyway). However, some programs rely on this,
437 1.114.8.2 pooka * so just change it to MAP_SHARED.
438 1.114.8.2 pooka */
439 1.114.8.2 pooka if (vp->v_type == VCHR && (flags & MAP_PRIVATE) != 0) {
440 1.114.8.2 pooka flags = (flags & ~MAP_PRIVATE) | MAP_SHARED;
441 1.114.8.2 pooka }
442 1.114.8.2 pooka
443 1.114.8.2 pooka /*
444 1.114.8.2 pooka * now check protection
445 1.114.8.2 pooka */
446 1.114.8.2 pooka
447 1.114.8.2 pooka maxprot = VM_PROT_EXECUTE;
448 1.114.8.2 pooka
449 1.114.8.2 pooka /* check read access */
450 1.114.8.2 pooka if (fp->f_flag & FREAD)
451 1.114.8.2 pooka maxprot |= VM_PROT_READ;
452 1.114.8.2 pooka else if (prot & PROT_READ)
453 1.114.8.2 pooka return (EACCES);
454 1.114.8.2 pooka
455 1.114.8.2 pooka /* check write access, shared case first */
456 1.114.8.2 pooka if (flags & MAP_SHARED) {
457 1.114.8.2 pooka /*
458 1.114.8.2 pooka * if the file is writable, only add PROT_WRITE to
459 1.114.8.2 pooka * maxprot if the file is not immutable, append-only.
460 1.114.8.2 pooka * otherwise, if we have asked for PROT_WRITE, return
461 1.114.8.2 pooka * EPERM.
462 1.114.8.2 pooka */
463 1.114.8.2 pooka if (fp->f_flag & FWRITE) {
464 1.114.8.2 pooka if ((error =
465 1.114.8.2 pooka VOP_GETATTR(vp, &va, l->l_cred, l)))
466 1.114.8.2 pooka return (error);
467 1.114.8.2 pooka if ((va.va_flags &
468 1.114.8.2 pooka (SF_SNAPSHOT|IMMUTABLE|APPEND)) == 0)
469 1.114.8.2 pooka maxprot |= VM_PROT_WRITE;
470 1.114.8.2 pooka else if (prot & PROT_WRITE)
471 1.114.8.2 pooka return (EPERM);
472 1.114.8.2 pooka }
473 1.114.8.2 pooka else if (prot & PROT_WRITE)
474 1.114.8.2 pooka return (EACCES);
475 1.114.8.2 pooka } else {
476 1.114.8.2 pooka /* MAP_PRIVATE mappings can always write to */
477 1.114.8.2 pooka maxprot |= VM_PROT_WRITE;
478 1.114.8.2 pooka }
479 1.114.8.2 pooka handle = vp;
480 1.114.8.2 pooka
481 1.114.8.2 pooka } else { /* MAP_ANON case */
482 1.114.8.2 pooka /*
483 1.114.8.2 pooka * XXX What do we do about (MAP_SHARED|MAP_PRIVATE) == 0?
484 1.114.8.2 pooka */
485 1.114.8.2 pooka if (fd != -1)
486 1.114.8.2 pooka return (EINVAL);
487 1.114.8.2 pooka
488 1.114.8.2 pooka is_anon: /* label for SunOS style /dev/zero */
489 1.114.8.2 pooka handle = NULL;
490 1.114.8.2 pooka maxprot = VM_PROT_ALL;
491 1.114.8.2 pooka pos = 0;
492 1.114.8.2 pooka }
493 1.114.8.2 pooka
494 1.114.8.2 pooka /*
495 1.114.8.2 pooka * XXX (in)sanity check. We don't do proper datasize checking
496 1.114.8.2 pooka * XXX for anonymous (or private writable) mmap(). However,
497 1.114.8.2 pooka * XXX know that if we're trying to allocate more than the amount
498 1.114.8.2 pooka * XXX remaining under our current data size limit, _that_ should
499 1.114.8.2 pooka * XXX be disallowed.
500 1.114.8.2 pooka */
501 1.114.8.2 pooka if ((flags & MAP_ANON) != 0 ||
502 1.114.8.2 pooka ((flags & MAP_PRIVATE) != 0 && (prot & PROT_WRITE) != 0)) {
503 1.114.8.2 pooka if (size >
504 1.114.8.2 pooka (p->p_rlimit[RLIMIT_DATA].rlim_cur -
505 1.114.8.2 pooka ctob(p->p_vmspace->vm_dsize))) {
506 1.114.8.2 pooka return (ENOMEM);
507 1.114.8.2 pooka }
508 1.114.8.2 pooka }
509 1.114.8.2 pooka
510 1.114.8.2 pooka #if NVERIEXEC > 0
511 1.114.8.2 pooka if (handle != NULL) {
512 1.114.8.2 pooka /*
513 1.114.8.2 pooka * Check if the file can be executed indirectly.
514 1.114.8.2 pooka *
515 1.114.8.2 pooka * XXX: This gives false warnings about "Incorrect access type"
516 1.114.8.2 pooka * XXX: if the mapping is not executable. Harmless, but will be
517 1.114.8.2 pooka * XXX: fixed as part of other changes.
518 1.114.8.2 pooka */
519 1.114.8.2 pooka if (veriexec_verify(l, handle, "(mmap)", VERIEXEC_INDIRECT,
520 1.114.8.2 pooka NULL)) {
521 1.114.8.2 pooka /*
522 1.114.8.2 pooka * Don't allow executable mappings if we can't
523 1.114.8.2 pooka * indirectly execute the file.
524 1.114.8.2 pooka */
525 1.114.8.2 pooka if (prot & VM_PROT_EXECUTE)
526 1.114.8.2 pooka return (EPERM);
527 1.114.8.2 pooka
528 1.114.8.2 pooka /*
529 1.114.8.2 pooka * Strip the executable bit from 'maxprot' to make sure
530 1.114.8.2 pooka * it can't be made executable later.
531 1.114.8.2 pooka */
532 1.114.8.2 pooka maxprot &= ~VM_PROT_EXECUTE;
533 1.114.8.2 pooka }
534 1.114.8.2 pooka }
535 1.114.8.2 pooka #endif /* NVERIEXEC > 0 */
536 1.114.8.2 pooka
537 1.114.8.2 pooka #ifdef PAX_MPROTECT
538 1.114.8.2 pooka pax_mprotect(l, &prot, &maxprot);
539 1.114.8.2 pooka #endif /* PAX_MPROTECT */
540 1.114.8.2 pooka
541 1.114.8.2 pooka /*
542 1.114.8.2 pooka * now let kernel internal function uvm_mmap do the work.
543 1.114.8.2 pooka */
544 1.114.8.2 pooka
545 1.114.8.2 pooka error = uvm_mmap(&p->p_vmspace->vm_map, &addr, size, prot, maxprot,
546 1.114.8.2 pooka flags, handle, pos, p->p_rlimit[RLIMIT_MEMLOCK].rlim_cur);
547 1.114.8.2 pooka
548 1.114.8.2 pooka if (error == 0)
549 1.114.8.2 pooka /* remember to add offset */
550 1.114.8.2 pooka *retval = (register_t)(addr + pageoff);
551 1.114.8.2 pooka
552 1.114.8.2 pooka return (error);
553 1.114.8.2 pooka }
554 1.114.8.2 pooka
555 1.114.8.2 pooka /*
556 1.114.8.2 pooka * sys___msync13: the msync system call (a front-end for flush)
557 1.114.8.2 pooka */
558 1.114.8.2 pooka
559 1.114.8.2 pooka int
560 1.114.8.2 pooka sys___msync13(struct lwp *l, void *v, register_t *retval)
561 1.114.8.2 pooka {
562 1.114.8.2 pooka struct sys___msync13_args /* {
563 1.114.8.2 pooka syscallarg(void *) addr;
564 1.114.8.2 pooka syscallarg(size_t) len;
565 1.114.8.2 pooka syscallarg(int) flags;
566 1.114.8.2 pooka } */ *uap = v;
567 1.114.8.2 pooka struct proc *p = l->l_proc;
568 1.114.8.2 pooka vaddr_t addr;
569 1.114.8.2 pooka vsize_t size, pageoff;
570 1.114.8.2 pooka struct vm_map *map;
571 1.114.8.2 pooka int error, rv, flags, uvmflags;
572 1.114.8.2 pooka
573 1.114.8.2 pooka /*
574 1.114.8.2 pooka * extract syscall args from the uap
575 1.114.8.2 pooka */
576 1.114.8.2 pooka
577 1.114.8.2 pooka addr = (vaddr_t)SCARG(uap, addr);
578 1.114.8.2 pooka size = (vsize_t)SCARG(uap, len);
579 1.114.8.2 pooka flags = SCARG(uap, flags);
580 1.114.8.2 pooka
581 1.114.8.2 pooka /* sanity check flags */
582 1.114.8.2 pooka if ((flags & ~(MS_ASYNC | MS_SYNC | MS_INVALIDATE)) != 0 ||
583 1.114.8.2 pooka (flags & (MS_ASYNC | MS_SYNC | MS_INVALIDATE)) == 0 ||
584 1.114.8.2 pooka (flags & (MS_ASYNC | MS_SYNC)) == (MS_ASYNC | MS_SYNC))
585 1.114.8.2 pooka return (EINVAL);
586 1.114.8.2 pooka if ((flags & (MS_ASYNC | MS_SYNC)) == 0)
587 1.114.8.2 pooka flags |= MS_SYNC;
588 1.114.8.2 pooka
589 1.114.8.2 pooka /*
590 1.114.8.2 pooka * align the address to a page boundary and adjust the size accordingly.
591 1.114.8.2 pooka */
592 1.114.8.2 pooka
593 1.114.8.2 pooka pageoff = (addr & PAGE_MASK);
594 1.114.8.2 pooka addr -= pageoff;
595 1.114.8.2 pooka size += pageoff;
596 1.114.8.2 pooka size = (vsize_t)round_page(size);
597 1.114.8.2 pooka
598 1.114.8.2 pooka RANGE_TEST(addr, size, 0);
599 1.114.8.2 pooka
600 1.114.8.2 pooka /*
601 1.114.8.2 pooka * get map
602 1.114.8.2 pooka */
603 1.114.8.2 pooka
604 1.114.8.2 pooka map = &p->p_vmspace->vm_map;
605 1.114.8.2 pooka
606 1.114.8.2 pooka /*
607 1.114.8.2 pooka * XXXCDC: do we really need this semantic?
608 1.114.8.2 pooka *
609 1.114.8.2 pooka * XXX Gak! If size is zero we are supposed to sync "all modified
610 1.114.8.2 pooka * pages with the region containing addr". Unfortunately, we
611 1.114.8.2 pooka * don't really keep track of individual mmaps so we approximate
612 1.114.8.2 pooka * by flushing the range of the map entry containing addr.
613 1.114.8.2 pooka * This can be incorrect if the region splits or is coalesced
614 1.114.8.2 pooka * with a neighbor.
615 1.114.8.2 pooka */
616 1.114.8.2 pooka
617 1.114.8.2 pooka if (size == 0) {
618 1.114.8.2 pooka struct vm_map_entry *entry;
619 1.114.8.2 pooka
620 1.114.8.2 pooka vm_map_lock_read(map);
621 1.114.8.2 pooka rv = uvm_map_lookup_entry(map, addr, &entry);
622 1.114.8.2 pooka if (rv == true) {
623 1.114.8.2 pooka addr = entry->start;
624 1.114.8.2 pooka size = entry->end - entry->start;
625 1.114.8.2 pooka }
626 1.114.8.2 pooka vm_map_unlock_read(map);
627 1.114.8.2 pooka if (rv == false)
628 1.114.8.2 pooka return (EINVAL);
629 1.114.8.2 pooka }
630 1.114.8.2 pooka
631 1.114.8.2 pooka /*
632 1.114.8.2 pooka * translate MS_ flags into PGO_ flags
633 1.114.8.2 pooka */
634 1.114.8.2 pooka
635 1.114.8.2 pooka uvmflags = PGO_CLEANIT;
636 1.114.8.2 pooka if (flags & MS_INVALIDATE)
637 1.114.8.2 pooka uvmflags |= PGO_FREE;
638 1.114.8.2 pooka if (flags & MS_SYNC)
639 1.114.8.2 pooka uvmflags |= PGO_SYNCIO;
640 1.114.8.2 pooka
641 1.114.8.2 pooka error = uvm_map_clean(map, addr, addr+size, uvmflags);
642 1.114.8.2 pooka return error;
643 1.114.8.2 pooka }
644 1.114.8.2 pooka
645 1.114.8.2 pooka /*
646 1.114.8.2 pooka * sys_munmap: unmap a users memory
647 1.114.8.2 pooka */
648 1.114.8.2 pooka
649 1.114.8.2 pooka int
650 1.114.8.2 pooka sys_munmap(struct lwp *l, void *v, register_t *retval)
651 1.114.8.2 pooka {
652 1.114.8.2 pooka struct sys_munmap_args /* {
653 1.114.8.2 pooka syscallarg(void *) addr;
654 1.114.8.2 pooka syscallarg(size_t) len;
655 1.114.8.2 pooka } */ *uap = v;
656 1.114.8.2 pooka struct proc *p = l->l_proc;
657 1.114.8.2 pooka vaddr_t addr;
658 1.114.8.2 pooka vsize_t size, pageoff;
659 1.114.8.2 pooka struct vm_map *map;
660 1.114.8.2 pooka struct vm_map_entry *dead_entries;
661 1.114.8.2 pooka
662 1.114.8.2 pooka /*
663 1.114.8.2 pooka * get syscall args.
664 1.114.8.2 pooka */
665 1.114.8.2 pooka
666 1.114.8.2 pooka addr = (vaddr_t)SCARG(uap, addr);
667 1.114.8.2 pooka size = (vsize_t)SCARG(uap, len);
668 1.114.8.2 pooka
669 1.114.8.2 pooka /*
670 1.114.8.2 pooka * align the address to a page boundary and adjust the size accordingly.
671 1.114.8.2 pooka */
672 1.114.8.2 pooka
673 1.114.8.2 pooka pageoff = (addr & PAGE_MASK);
674 1.114.8.2 pooka addr -= pageoff;
675 1.114.8.2 pooka size += pageoff;
676 1.114.8.2 pooka size = (vsize_t)round_page(size);
677 1.114.8.2 pooka
678 1.114.8.2 pooka if (size == 0)
679 1.114.8.2 pooka return (0);
680 1.114.8.2 pooka
681 1.114.8.2 pooka RANGE_TEST(addr, size, 0);
682 1.114.8.2 pooka
683 1.114.8.2 pooka map = &p->p_vmspace->vm_map;
684 1.114.8.2 pooka
685 1.114.8.2 pooka /*
686 1.114.8.2 pooka * interesting system call semantic: make sure entire range is
687 1.114.8.2 pooka * allocated before allowing an unmap.
688 1.114.8.2 pooka */
689 1.114.8.2 pooka
690 1.114.8.2 pooka vm_map_lock(map);
691 1.114.8.2 pooka #if 0
692 1.114.8.2 pooka if (!uvm_map_checkprot(map, addr, addr + size, VM_PROT_NONE)) {
693 1.114.8.2 pooka vm_map_unlock(map);
694 1.114.8.2 pooka return (EINVAL);
695 1.114.8.2 pooka }
696 1.114.8.2 pooka #endif
697 1.114.8.2 pooka uvm_unmap_remove(map, addr, addr + size, &dead_entries, NULL, 0);
698 1.114.8.2 pooka vm_map_unlock(map);
699 1.114.8.2 pooka if (dead_entries != NULL)
700 1.114.8.2 pooka uvm_unmap_detach(dead_entries, 0);
701 1.114.8.2 pooka return (0);
702 1.114.8.2 pooka }
703 1.114.8.2 pooka
704 1.114.8.2 pooka /*
705 1.114.8.2 pooka * sys_mprotect: the mprotect system call
706 1.114.8.2 pooka */
707 1.114.8.2 pooka
708 1.114.8.2 pooka int
709 1.114.8.2 pooka sys_mprotect(struct lwp *l, void *v, register_t *retval)
710 1.114.8.2 pooka {
711 1.114.8.2 pooka struct sys_mprotect_args /* {
712 1.114.8.2 pooka syscallarg(void *) addr;
713 1.114.8.2 pooka syscallarg(size_t) len;
714 1.114.8.2 pooka syscallarg(int) prot;
715 1.114.8.2 pooka } */ *uap = v;
716 1.114.8.2 pooka struct proc *p = l->l_proc;
717 1.114.8.2 pooka vaddr_t addr;
718 1.114.8.2 pooka vsize_t size, pageoff;
719 1.114.8.2 pooka vm_prot_t prot;
720 1.114.8.2 pooka int error;
721 1.114.8.2 pooka
722 1.114.8.2 pooka /*
723 1.114.8.2 pooka * extract syscall args from uap
724 1.114.8.2 pooka */
725 1.114.8.2 pooka
726 1.114.8.2 pooka addr = (vaddr_t)SCARG(uap, addr);
727 1.114.8.2 pooka size = (vsize_t)SCARG(uap, len);
728 1.114.8.2 pooka prot = SCARG(uap, prot) & VM_PROT_ALL;
729 1.114.8.2 pooka
730 1.114.8.2 pooka /*
731 1.114.8.2 pooka * align the address to a page boundary and adjust the size accordingly.
732 1.114.8.2 pooka */
733 1.114.8.2 pooka
734 1.114.8.2 pooka pageoff = (addr & PAGE_MASK);
735 1.114.8.2 pooka addr -= pageoff;
736 1.114.8.2 pooka size += pageoff;
737 1.114.8.2 pooka size = round_page(size);
738 1.114.8.2 pooka
739 1.114.8.2 pooka RANGE_TEST(addr, size, 0);
740 1.114.8.2 pooka
741 1.114.8.2 pooka error = uvm_map_protect(&p->p_vmspace->vm_map, addr, addr + size, prot,
742 1.114.8.2 pooka false);
743 1.114.8.2 pooka return error;
744 1.114.8.2 pooka }
745 1.114.8.2 pooka
746 1.114.8.2 pooka /*
747 1.114.8.2 pooka * sys_minherit: the minherit system call
748 1.114.8.2 pooka */
749 1.114.8.2 pooka
750 1.114.8.2 pooka int
751 1.114.8.2 pooka sys_minherit(struct lwp *l, void *v, register_t *retval)
752 1.114.8.2 pooka {
753 1.114.8.2 pooka struct sys_minherit_args /* {
754 1.114.8.2 pooka syscallarg(void *) addr;
755 1.114.8.2 pooka syscallarg(int) len;
756 1.114.8.2 pooka syscallarg(int) inherit;
757 1.114.8.2 pooka } */ *uap = v;
758 1.114.8.2 pooka struct proc *p = l->l_proc;
759 1.114.8.2 pooka vaddr_t addr;
760 1.114.8.2 pooka vsize_t size, pageoff;
761 1.114.8.2 pooka vm_inherit_t inherit;
762 1.114.8.2 pooka int error;
763 1.114.8.2 pooka
764 1.114.8.2 pooka addr = (vaddr_t)SCARG(uap, addr);
765 1.114.8.2 pooka size = (vsize_t)SCARG(uap, len);
766 1.114.8.2 pooka inherit = SCARG(uap, inherit);
767 1.114.8.2 pooka
768 1.114.8.2 pooka /*
769 1.114.8.2 pooka * align the address to a page boundary and adjust the size accordingly.
770 1.114.8.2 pooka */
771 1.114.8.2 pooka
772 1.114.8.2 pooka pageoff = (addr & PAGE_MASK);
773 1.114.8.2 pooka addr -= pageoff;
774 1.114.8.2 pooka size += pageoff;
775 1.114.8.2 pooka size = (vsize_t)round_page(size);
776 1.114.8.2 pooka
777 1.114.8.2 pooka RANGE_TEST(addr, size, 0);
778 1.114.8.2 pooka
779 1.114.8.2 pooka error = uvm_map_inherit(&p->p_vmspace->vm_map, addr, addr + size,
780 1.114.8.2 pooka inherit);
781 1.114.8.2 pooka return error;
782 1.114.8.2 pooka }
783 1.114.8.2 pooka
784 1.114.8.2 pooka /*
785 1.114.8.2 pooka * sys_madvise: give advice about memory usage.
786 1.114.8.2 pooka */
787 1.114.8.2 pooka
788 1.114.8.2 pooka /* ARGSUSED */
789 1.114.8.2 pooka int
790 1.114.8.2 pooka sys_madvise(struct lwp *l, void *v, register_t *retval)
791 1.114.8.2 pooka {
792 1.114.8.2 pooka struct sys_madvise_args /* {
793 1.114.8.2 pooka syscallarg(void *) addr;
794 1.114.8.2 pooka syscallarg(size_t) len;
795 1.114.8.2 pooka syscallarg(int) behav;
796 1.114.8.2 pooka } */ *uap = v;
797 1.114.8.2 pooka struct proc *p = l->l_proc;
798 1.114.8.2 pooka vaddr_t addr;
799 1.114.8.2 pooka vsize_t size, pageoff;
800 1.114.8.2 pooka int advice, error;
801 1.114.8.2 pooka
802 1.114.8.2 pooka addr = (vaddr_t)SCARG(uap, addr);
803 1.114.8.2 pooka size = (vsize_t)SCARG(uap, len);
804 1.114.8.2 pooka advice = SCARG(uap, behav);
805 1.114.8.2 pooka
806 1.114.8.2 pooka /*
807 1.114.8.2 pooka * align the address to a page boundary, and adjust the size accordingly
808 1.114.8.2 pooka */
809 1.114.8.2 pooka
810 1.114.8.2 pooka pageoff = (addr & PAGE_MASK);
811 1.114.8.2 pooka addr -= pageoff;
812 1.114.8.2 pooka size += pageoff;
813 1.114.8.2 pooka size = (vsize_t)round_page(size);
814 1.114.8.2 pooka
815 1.114.8.2 pooka RANGE_TEST(addr, size, 0);
816 1.114.8.2 pooka
817 1.114.8.2 pooka switch (advice) {
818 1.114.8.2 pooka case MADV_NORMAL:
819 1.114.8.2 pooka case MADV_RANDOM:
820 1.114.8.2 pooka case MADV_SEQUENTIAL:
821 1.114.8.2 pooka error = uvm_map_advice(&p->p_vmspace->vm_map, addr, addr + size,
822 1.114.8.2 pooka advice);
823 1.114.8.2 pooka break;
824 1.114.8.2 pooka
825 1.114.8.2 pooka case MADV_WILLNEED:
826 1.114.8.2 pooka
827 1.114.8.2 pooka /*
828 1.114.8.2 pooka * Activate all these pages, pre-faulting them in if
829 1.114.8.2 pooka * necessary.
830 1.114.8.2 pooka */
831 1.114.8.2 pooka /*
832 1.114.8.2 pooka * XXX IMPLEMENT ME.
833 1.114.8.2 pooka * Should invent a "weak" mode for uvm_fault()
834 1.114.8.2 pooka * which would only do the PGO_LOCKED pgo_get().
835 1.114.8.2 pooka */
836 1.114.8.2 pooka
837 1.114.8.2 pooka return (0);
838 1.114.8.2 pooka
839 1.114.8.2 pooka case MADV_DONTNEED:
840 1.114.8.2 pooka
841 1.114.8.2 pooka /*
842 1.114.8.2 pooka * Deactivate all these pages. We don't need them
843 1.114.8.2 pooka * any more. We don't, however, toss the data in
844 1.114.8.2 pooka * the pages.
845 1.114.8.2 pooka */
846 1.114.8.2 pooka
847 1.114.8.2 pooka error = uvm_map_clean(&p->p_vmspace->vm_map, addr, addr + size,
848 1.114.8.2 pooka PGO_DEACTIVATE);
849 1.114.8.2 pooka break;
850 1.114.8.2 pooka
851 1.114.8.2 pooka case MADV_FREE:
852 1.114.8.2 pooka
853 1.114.8.2 pooka /*
854 1.114.8.2 pooka * These pages contain no valid data, and may be
855 1.114.8.2 pooka * garbage-collected. Toss all resources, including
856 1.114.8.2 pooka * any swap space in use.
857 1.114.8.2 pooka */
858 1.114.8.2 pooka
859 1.114.8.2 pooka error = uvm_map_clean(&p->p_vmspace->vm_map, addr, addr + size,
860 1.114.8.2 pooka PGO_FREE);
861 1.114.8.2 pooka break;
862 1.114.8.2 pooka
863 1.114.8.2 pooka case MADV_SPACEAVAIL:
864 1.114.8.2 pooka
865 1.114.8.2 pooka /*
866 1.114.8.2 pooka * XXXMRG What is this? I think it's:
867 1.114.8.2 pooka *
868 1.114.8.2 pooka * Ensure that we have allocated backing-store
869 1.114.8.2 pooka * for these pages.
870 1.114.8.2 pooka *
871 1.114.8.2 pooka * This is going to require changes to the page daemon,
872 1.114.8.2 pooka * as it will free swap space allocated to pages in core.
873 1.114.8.2 pooka * There's also what to do for device/file/anonymous memory.
874 1.114.8.2 pooka */
875 1.114.8.2 pooka
876 1.114.8.2 pooka return (EINVAL);
877 1.114.8.2 pooka
878 1.114.8.2 pooka default:
879 1.114.8.2 pooka return (EINVAL);
880 1.114.8.2 pooka }
881 1.114.8.2 pooka
882 1.114.8.2 pooka return error;
883 1.114.8.2 pooka }
884 1.114.8.2 pooka
885 1.114.8.2 pooka /*
886 1.114.8.2 pooka * sys_mlock: memory lock
887 1.114.8.2 pooka */
888 1.114.8.2 pooka
889 1.114.8.2 pooka int
890 1.114.8.2 pooka sys_mlock(struct lwp *l, void *v, register_t *retval)
891 1.114.8.2 pooka {
892 1.114.8.2 pooka struct sys_mlock_args /* {
893 1.114.8.2 pooka syscallarg(const void *) addr;
894 1.114.8.2 pooka syscallarg(size_t) len;
895 1.114.8.2 pooka } */ *uap = v;
896 1.114.8.2 pooka struct proc *p = l->l_proc;
897 1.114.8.2 pooka vaddr_t addr;
898 1.114.8.2 pooka vsize_t size, pageoff;
899 1.114.8.2 pooka int error;
900 1.114.8.2 pooka
901 1.114.8.2 pooka /*
902 1.114.8.2 pooka * extract syscall args from uap
903 1.114.8.2 pooka */
904 1.114.8.2 pooka
905 1.114.8.2 pooka addr = (vaddr_t)SCARG(uap, addr);
906 1.114.8.2 pooka size = (vsize_t)SCARG(uap, len);
907 1.114.8.2 pooka
908 1.114.8.2 pooka /*
909 1.114.8.2 pooka * align the address to a page boundary and adjust the size accordingly
910 1.114.8.2 pooka */
911 1.114.8.2 pooka
912 1.114.8.2 pooka pageoff = (addr & PAGE_MASK);
913 1.114.8.2 pooka addr -= pageoff;
914 1.114.8.2 pooka size += pageoff;
915 1.114.8.2 pooka size = (vsize_t)round_page(size);
916 1.114.8.2 pooka
917 1.114.8.2 pooka RANGE_TEST(addr, size, 0);
918 1.114.8.2 pooka
919 1.114.8.2 pooka if (atop(size) + uvmexp.wired > uvmexp.wiredmax)
920 1.114.8.2 pooka return (EAGAIN);
921 1.114.8.2 pooka
922 1.114.8.2 pooka if (size + ptoa(pmap_wired_count(vm_map_pmap(&p->p_vmspace->vm_map))) >
923 1.114.8.2 pooka p->p_rlimit[RLIMIT_MEMLOCK].rlim_cur)
924 1.114.8.2 pooka return (EAGAIN);
925 1.114.8.2 pooka
926 1.114.8.2 pooka error = uvm_map_pageable(&p->p_vmspace->vm_map, addr, addr+size, false,
927 1.114.8.2 pooka 0);
928 1.114.8.2 pooka if (error == EFAULT)
929 1.114.8.2 pooka error = ENOMEM;
930 1.114.8.2 pooka return error;
931 1.114.8.2 pooka }
932 1.114.8.2 pooka
933 1.114.8.2 pooka /*
934 1.114.8.2 pooka * sys_munlock: unlock wired pages
935 1.114.8.2 pooka */
936 1.114.8.2 pooka
937 1.114.8.2 pooka int
938 1.114.8.2 pooka sys_munlock(struct lwp *l, void *v, register_t *retval)
939 1.114.8.2 pooka {
940 1.114.8.2 pooka struct sys_munlock_args /* {
941 1.114.8.2 pooka syscallarg(const void *) addr;
942 1.114.8.2 pooka syscallarg(size_t) len;
943 1.114.8.2 pooka } */ *uap = v;
944 1.114.8.2 pooka struct proc *p = l->l_proc;
945 1.114.8.2 pooka vaddr_t addr;
946 1.114.8.2 pooka vsize_t size, pageoff;
947 1.114.8.2 pooka int error;
948 1.114.8.2 pooka
949 1.114.8.2 pooka /*
950 1.114.8.2 pooka * extract syscall args from uap
951 1.114.8.2 pooka */
952 1.114.8.2 pooka
953 1.114.8.2 pooka addr = (vaddr_t)SCARG(uap, addr);
954 1.114.8.2 pooka size = (vsize_t)SCARG(uap, len);
955 1.114.8.2 pooka
956 1.114.8.2 pooka /*
957 1.114.8.2 pooka * align the address to a page boundary, and adjust the size accordingly
958 1.114.8.2 pooka */
959 1.114.8.2 pooka
960 1.114.8.2 pooka pageoff = (addr & PAGE_MASK);
961 1.114.8.2 pooka addr -= pageoff;
962 1.114.8.2 pooka size += pageoff;
963 1.114.8.2 pooka size = (vsize_t)round_page(size);
964 1.114.8.2 pooka
965 1.114.8.2 pooka RANGE_TEST(addr, size, 0);
966 1.114.8.2 pooka
967 1.114.8.2 pooka error = uvm_map_pageable(&p->p_vmspace->vm_map, addr, addr+size, true,
968 1.114.8.2 pooka 0);
969 1.114.8.2 pooka if (error == EFAULT)
970 1.114.8.2 pooka error = ENOMEM;
971 1.114.8.2 pooka return error;
972 1.114.8.2 pooka }
973 1.114.8.2 pooka
974 1.114.8.2 pooka /*
975 1.114.8.2 pooka * sys_mlockall: lock all pages mapped into an address space.
976 1.114.8.2 pooka */
977 1.114.8.2 pooka
978 1.114.8.2 pooka int
979 1.114.8.2 pooka sys_mlockall(struct lwp *l, void *v, register_t *retval)
980 1.114.8.2 pooka {
981 1.114.8.2 pooka struct sys_mlockall_args /* {
982 1.114.8.2 pooka syscallarg(int) flags;
983 1.114.8.2 pooka } */ *uap = v;
984 1.114.8.2 pooka struct proc *p = l->l_proc;
985 1.114.8.2 pooka int error, flags;
986 1.114.8.2 pooka
987 1.114.8.2 pooka flags = SCARG(uap, flags);
988 1.114.8.2 pooka
989 1.114.8.2 pooka if (flags == 0 ||
990 1.114.8.2 pooka (flags & ~(MCL_CURRENT|MCL_FUTURE)) != 0)
991 1.114.8.2 pooka return (EINVAL);
992 1.114.8.2 pooka
993 1.114.8.2 pooka error = uvm_map_pageable_all(&p->p_vmspace->vm_map, flags,
994 1.114.8.2 pooka p->p_rlimit[RLIMIT_MEMLOCK].rlim_cur);
995 1.114.8.2 pooka return (error);
996 1.114.8.2 pooka }
997 1.114.8.2 pooka
998 1.114.8.2 pooka /*
999 1.114.8.2 pooka * sys_munlockall: unlock all pages mapped into an address space.
1000 1.114.8.2 pooka */
1001 1.114.8.2 pooka
1002 1.114.8.2 pooka int
1003 1.114.8.2 pooka sys_munlockall(struct lwp *l, void *v, register_t *retval)
1004 1.114.8.2 pooka {
1005 1.114.8.2 pooka struct proc *p = l->l_proc;
1006 1.114.8.2 pooka
1007 1.114.8.2 pooka (void) uvm_map_pageable_all(&p->p_vmspace->vm_map, 0, 0);
1008 1.114.8.2 pooka return (0);
1009 1.114.8.2 pooka }
1010 1.114.8.2 pooka
1011 1.114.8.2 pooka /*
1012 1.114.8.2 pooka * uvm_mmap: internal version of mmap
1013 1.114.8.2 pooka *
1014 1.114.8.2 pooka * - used by sys_mmap and various framebuffers
1015 1.114.8.2 pooka * - handle is a vnode pointer or NULL for MAP_ANON
1016 1.114.8.2 pooka * - caller must page-align the file offset
1017 1.114.8.2 pooka */
1018 1.114.8.2 pooka
1019 1.114.8.2 pooka int
1020 1.114.8.2 pooka uvm_mmap(map, addr, size, prot, maxprot, flags, handle, foff, locklimit)
1021 1.114.8.2 pooka struct vm_map *map;
1022 1.114.8.2 pooka vaddr_t *addr;
1023 1.114.8.2 pooka vsize_t size;
1024 1.114.8.2 pooka vm_prot_t prot, maxprot;
1025 1.114.8.2 pooka int flags;
1026 1.114.8.2 pooka void *handle;
1027 1.114.8.2 pooka voff_t foff;
1028 1.114.8.2 pooka vsize_t locklimit;
1029 1.114.8.2 pooka {
1030 1.114.8.2 pooka struct uvm_object *uobj;
1031 1.114.8.2 pooka struct vnode *vp;
1032 1.114.8.2 pooka vaddr_t align = 0;
1033 1.114.8.2 pooka int error;
1034 1.114.8.2 pooka int advice = UVM_ADV_NORMAL;
1035 1.114.8.2 pooka uvm_flag_t uvmflag = 0;
1036 1.114.8.2 pooka bool needwritemap;
1037 1.114.8.2 pooka
1038 1.114.8.2 pooka /*
1039 1.114.8.2 pooka * check params
1040 1.114.8.2 pooka */
1041 1.114.8.2 pooka
1042 1.114.8.2 pooka if (size == 0)
1043 1.114.8.2 pooka return(0);
1044 1.114.8.2 pooka if (foff & PAGE_MASK)
1045 1.114.8.2 pooka return(EINVAL);
1046 1.114.8.2 pooka if ((prot & maxprot) != prot)
1047 1.114.8.2 pooka return(EINVAL);
1048 1.114.8.2 pooka
1049 1.114.8.2 pooka /*
1050 1.114.8.2 pooka * for non-fixed mappings, round off the suggested address.
1051 1.114.8.2 pooka * for fixed mappings, check alignment and zap old mappings.
1052 1.114.8.2 pooka */
1053 1.114.8.2 pooka
1054 1.114.8.2 pooka if ((flags & MAP_FIXED) == 0) {
1055 1.114.8.2 pooka *addr = round_page(*addr);
1056 1.114.8.2 pooka } else {
1057 1.114.8.2 pooka if (*addr & PAGE_MASK)
1058 1.114.8.2 pooka return(EINVAL);
1059 1.114.8.2 pooka uvmflag |= UVM_FLAG_FIXED;
1060 1.114.8.2 pooka (void) uvm_unmap(map, *addr, *addr + size);
1061 1.114.8.2 pooka }
1062 1.114.8.2 pooka
1063 1.114.8.2 pooka /*
1064 1.114.8.2 pooka * Try to see if any requested alignment can even be attemped.
1065 1.114.8.2 pooka * Make sure we can express the alignment (asking for a >= 4GB
1066 1.114.8.2 pooka * alignment on an ILP32 architecure make no sense) and the
1067 1.114.8.2 pooka * alignment is at least for a page sized quanitiy. If the
1068 1.114.8.2 pooka * request was for a fixed mapping, make sure supplied address
1069 1.114.8.2 pooka * adheres to the request alignment.
1070 1.114.8.2 pooka */
1071 1.114.8.2 pooka align = (flags & MAP_ALIGNMENT_MASK) >> MAP_ALIGNMENT_SHIFT;
1072 1.114.8.2 pooka if (align) {
1073 1.114.8.2 pooka if (align >= sizeof(vaddr_t) * NBBY)
1074 1.114.8.2 pooka return(EINVAL);
1075 1.114.8.2 pooka align = 1L << align;
1076 1.114.8.2 pooka if (align < PAGE_SIZE)
1077 1.114.8.2 pooka return(EINVAL);
1078 1.114.8.2 pooka if (align >= vm_map_max(map))
1079 1.114.8.2 pooka return(ENOMEM);
1080 1.114.8.2 pooka if (flags & MAP_FIXED) {
1081 1.114.8.2 pooka if ((*addr & (align-1)) != 0)
1082 1.114.8.2 pooka return(EINVAL);
1083 1.114.8.2 pooka align = 0;
1084 1.114.8.2 pooka }
1085 1.114.8.2 pooka }
1086 1.114.8.2 pooka
1087 1.114.8.2 pooka /*
1088 1.114.8.2 pooka * handle anon vs. non-anon mappings. for non-anon mappings attach
1089 1.114.8.2 pooka * to underlying vm object.
1090 1.114.8.2 pooka */
1091 1.114.8.2 pooka
1092 1.114.8.2 pooka if (flags & MAP_ANON) {
1093 1.114.8.2 pooka KASSERT(handle == NULL);
1094 1.114.8.2 pooka foff = UVM_UNKNOWN_OFFSET;
1095 1.114.8.2 pooka uobj = NULL;
1096 1.114.8.2 pooka if ((flags & MAP_SHARED) == 0)
1097 1.114.8.2 pooka /* XXX: defer amap create */
1098 1.114.8.2 pooka uvmflag |= UVM_FLAG_COPYONW;
1099 1.114.8.2 pooka else
1100 1.114.8.2 pooka /* shared: create amap now */
1101 1.114.8.2 pooka uvmflag |= UVM_FLAG_OVERLAY;
1102 1.114.8.2 pooka
1103 1.114.8.2 pooka } else {
1104 1.114.8.2 pooka KASSERT(handle != NULL);
1105 1.114.8.2 pooka vp = (struct vnode *)handle;
1106 1.114.8.2 pooka
1107 1.114.8.2 pooka /*
1108 1.114.8.2 pooka * Don't allow mmap for EXEC if the file system
1109 1.114.8.2 pooka * is mounted NOEXEC.
1110 1.114.8.2 pooka */
1111 1.114.8.2 pooka if ((prot & PROT_EXEC) != 0 &&
1112 1.114.8.2 pooka (vp->v_mount->mnt_flag & MNT_NOEXEC) != 0)
1113 1.114.8.2 pooka return (EACCES);
1114 1.114.8.2 pooka
1115 1.114.8.2 pooka if (vp->v_type != VCHR) {
1116 1.114.8.2 pooka error = VOP_MMAP(vp, prot, curlwp->l_cred, curlwp);
1117 1.114.8.2 pooka if (error) {
1118 1.114.8.2 pooka return error;
1119 1.114.8.2 pooka }
1120 1.114.8.2 pooka vref(vp);
1121 1.114.8.2 pooka uobj = &vp->v_uobj;
1122 1.114.8.2 pooka
1123 1.114.8.2 pooka /*
1124 1.114.8.2 pooka * If the vnode is being mapped with PROT_EXEC,
1125 1.114.8.2 pooka * then mark it as text.
1126 1.114.8.2 pooka */
1127 1.114.8.2 pooka if (prot & PROT_EXEC)
1128 1.114.8.2 pooka vn_markexec(vp);
1129 1.114.8.2 pooka } else {
1130 1.114.8.2 pooka int i = maxprot;
1131 1.114.8.2 pooka
1132 1.114.8.2 pooka /*
1133 1.114.8.2 pooka * XXX Some devices don't like to be mapped with
1134 1.114.8.2 pooka * XXX PROT_EXEC or PROT_WRITE, but we don't really
1135 1.114.8.2 pooka * XXX have a better way of handling this, right now
1136 1.114.8.2 pooka */
1137 1.114.8.2 pooka do {
1138 1.114.8.2 pooka uobj = udv_attach((void *) &vp->v_rdev,
1139 1.114.8.2 pooka (flags & MAP_SHARED) ? i :
1140 1.114.8.2 pooka (i & ~VM_PROT_WRITE), foff, size);
1141 1.114.8.2 pooka i--;
1142 1.114.8.2 pooka } while ((uobj == NULL) && (i > 0));
1143 1.114.8.2 pooka advice = UVM_ADV_RANDOM;
1144 1.114.8.2 pooka }
1145 1.114.8.2 pooka if (uobj == NULL)
1146 1.114.8.2 pooka return((vp->v_type == VREG) ? ENOMEM : EINVAL);
1147 1.114.8.2 pooka if ((flags & MAP_SHARED) == 0) {
1148 1.114.8.2 pooka uvmflag |= UVM_FLAG_COPYONW;
1149 1.114.8.2 pooka }
1150 1.114.8.2 pooka
1151 1.114.8.2 pooka /*
1152 1.114.8.2 pooka * Set vnode flags to indicate the new kinds of mapping.
1153 1.114.8.2 pooka * We take the vnode lock in exclusive mode here to serialize
1154 1.114.8.2 pooka * with direct I/O.
1155 1.114.8.2 pooka */
1156 1.114.8.2 pooka
1157 1.114.8.2 pooka needwritemap = (vp->v_flag & VWRITEMAP) == 0 &&
1158 1.114.8.2 pooka (flags & MAP_SHARED) != 0 &&
1159 1.114.8.2 pooka (maxprot & VM_PROT_WRITE) != 0;
1160 1.114.8.2 pooka if ((vp->v_flag & VMAPPED) == 0 || needwritemap) {
1161 1.114.8.2 pooka vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
1162 1.114.8.2 pooka simple_lock(&vp->v_interlock);
1163 1.114.8.2 pooka vp->v_flag |= VMAPPED;
1164 1.114.8.2 pooka if (needwritemap) {
1165 1.114.8.2 pooka vp->v_flag |= VWRITEMAP;
1166 1.114.8.2 pooka }
1167 1.114.8.2 pooka simple_unlock(&vp->v_interlock);
1168 1.114.8.2 pooka VOP_UNLOCK(vp, 0);
1169 1.114.8.2 pooka }
1170 1.114.8.2 pooka }
1171 1.114.8.2 pooka
1172 1.114.8.2 pooka uvmflag = UVM_MAPFLAG(prot, maxprot,
1173 1.114.8.2 pooka (flags & MAP_SHARED) ? UVM_INH_SHARE : UVM_INH_COPY,
1174 1.114.8.2 pooka advice, uvmflag);
1175 1.114.8.2 pooka error = uvm_map(map, addr, size, uobj, foff, align, uvmflag);
1176 1.114.8.2 pooka if (error) {
1177 1.114.8.2 pooka if (uobj)
1178 1.114.8.2 pooka uobj->pgops->pgo_detach(uobj);
1179 1.114.8.2 pooka return error;
1180 1.114.8.2 pooka }
1181 1.114.8.2 pooka
1182 1.114.8.2 pooka /*
1183 1.114.8.2 pooka * POSIX 1003.1b -- if our address space was configured
1184 1.114.8.2 pooka * to lock all future mappings, wire the one we just made.
1185 1.114.8.2 pooka *
1186 1.114.8.2 pooka * Also handle the MAP_WIRED flag here.
1187 1.114.8.2 pooka */
1188 1.114.8.2 pooka
1189 1.114.8.2 pooka if (prot == VM_PROT_NONE) {
1190 1.114.8.2 pooka
1191 1.114.8.2 pooka /*
1192 1.114.8.2 pooka * No more work to do in this case.
1193 1.114.8.2 pooka */
1194 1.114.8.2 pooka
1195 1.114.8.2 pooka return (0);
1196 1.114.8.2 pooka }
1197 1.114.8.2 pooka vm_map_lock(map);
1198 1.114.8.2 pooka if ((flags & MAP_WIRED) != 0 || (map->flags & VM_MAP_WIREFUTURE) != 0) {
1199 1.114.8.2 pooka if (atop(size) + uvmexp.wired > uvmexp.wiredmax ||
1200 1.114.8.2 pooka (locklimit != 0 &&
1201 1.114.8.2 pooka size + ptoa(pmap_wired_count(vm_map_pmap(map))) >
1202 1.114.8.2 pooka locklimit)) {
1203 1.114.8.2 pooka vm_map_unlock(map);
1204 1.114.8.2 pooka uvm_unmap(map, *addr, *addr + size);
1205 1.114.8.2 pooka return ENOMEM;
1206 1.114.8.2 pooka }
1207 1.114.8.2 pooka
1208 1.114.8.2 pooka /*
1209 1.114.8.2 pooka * uvm_map_pageable() always returns the map unlocked.
1210 1.114.8.2 pooka */
1211 1.114.8.2 pooka
1212 1.114.8.2 pooka error = uvm_map_pageable(map, *addr, *addr + size,
1213 1.114.8.2 pooka false, UVM_LK_ENTER);
1214 1.114.8.2 pooka if (error) {
1215 1.114.8.2 pooka uvm_unmap(map, *addr, *addr + size);
1216 1.114.8.2 pooka return error;
1217 1.114.8.2 pooka }
1218 1.114.8.2 pooka return (0);
1219 1.114.8.2 pooka }
1220 1.114.8.2 pooka vm_map_unlock(map);
1221 1.114.8.2 pooka return 0;
1222 1.114.8.2 pooka }
1223 1.114.8.2 pooka
1224 1.114.8.2 pooka vaddr_t
1225 1.114.8.2 pooka uvm_default_mapaddr(struct proc *p, vaddr_t base, vsize_t sz)
1226 1.114.8.2 pooka {
1227 1.114.8.2 pooka
1228 1.114.8.2 pooka return VM_DEFAULT_ADDRESS(base, sz);
1229 1.114.8.2 pooka }
1230