1994-05-27 05:00:24 +00:00
|
|
|
.\" Copyright (c) 1991, 1993
|
|
|
|
.\" The Regents of the University of California. All rights reserved.
|
|
|
|
.\"
|
|
|
|
.\" Redistribution and use in source and binary forms, with or without
|
|
|
|
.\" modification, are permitted provided that the following conditions
|
|
|
|
.\" are met:
|
|
|
|
.\" 1. Redistributions of source code must retain the above copyright
|
|
|
|
.\" notice, this list of conditions and the following disclaimer.
|
|
|
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
.\" notice, this list of conditions and the following disclaimer in the
|
|
|
|
.\" documentation and/or other materials provided with the distribution.
|
2017-02-28 23:42:47 +00:00
|
|
|
.\" 3. Neither the name of the University nor the names of its contributors
|
1994-05-27 05:00:24 +00:00
|
|
|
.\" may be used to endorse or promote products derived from this software
|
|
|
|
.\" without specific prior written permission.
|
|
|
|
.\"
|
|
|
|
.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
.\" SUCH DAMAGE.
|
|
|
|
.\"
|
1997-03-11 11:35:56 +00:00
|
|
|
.\" @(#)mmap.2 8.4 (Berkeley) 5/11/95
|
1999-08-28 00:22:10 +00:00
|
|
|
.\" $FreeBSD$
|
1994-05-27 05:00:24 +00:00
|
|
|
.\"
|
2020-10-27 18:08:33 +00:00
|
|
|
.Dd October 27, 2020
|
1994-05-27 05:00:24 +00:00
|
|
|
.Dt MMAP 2
|
2001-07-10 13:41:46 +00:00
|
|
|
.Os
|
1994-05-27 05:00:24 +00:00
|
|
|
.Sh NAME
|
|
|
|
.Nm mmap
|
2001-02-11 18:51:17 +00:00
|
|
|
.Nd allocate memory, or map files or devices into memory
|
2000-04-21 09:42:15 +00:00
|
|
|
.Sh LIBRARY
|
|
|
|
.Lb libc
|
1994-05-27 05:00:24 +00:00
|
|
|
.Sh SYNOPSIS
|
2001-10-01 16:09:29 +00:00
|
|
|
.In sys/mman.h
|
1997-12-31 01:22:01 +00:00
|
|
|
.Ft void *
|
2001-02-12 10:14:15 +00:00
|
|
|
.Fn mmap "void *addr" "size_t len" "int prot" "int flags" "int fd" "off_t offset"
|
1994-05-27 05:00:24 +00:00
|
|
|
.Sh DESCRIPTION
|
|
|
|
The
|
1996-08-22 23:31:07 +00:00
|
|
|
.Fn mmap
|
2002-12-18 09:22:32 +00:00
|
|
|
system call causes the pages starting at
|
1994-05-27 05:00:24 +00:00
|
|
|
.Fa addr
|
|
|
|
and continuing for at most
|
|
|
|
.Fa len
|
|
|
|
bytes to be mapped from the object described by
|
|
|
|
.Fa fd ,
|
|
|
|
starting at byte offset
|
|
|
|
.Fa offset .
|
|
|
|
If
|
|
|
|
.Fa len
|
2017-02-12 21:05:44 +00:00
|
|
|
is not a multiple of the page size, the mapped region may extend past the
|
1994-05-27 05:00:24 +00:00
|
|
|
specified range.
|
1997-03-11 11:35:56 +00:00
|
|
|
Any such extension beyond the end of the mapped object will be zero-filled.
|
1994-05-27 05:00:24 +00:00
|
|
|
.Pp
|
|
|
|
If
|
2017-02-12 21:05:44 +00:00
|
|
|
.Fa fd
|
|
|
|
references a regular file or a shared memory object, the range of
|
|
|
|
bytes starting at
|
|
|
|
.Fa offset
|
|
|
|
and continuing for
|
|
|
|
.Fa len
|
|
|
|
bytes must be legitimate for the possible (not necessarily
|
|
|
|
current) offsets in the object.
|
|
|
|
In particular, the
|
|
|
|
.Fa offset
|
|
|
|
value cannot be negative.
|
2017-06-24 16:21:34 +00:00
|
|
|
If the object is truncated and the process later accesses a page that
|
2017-02-12 21:05:44 +00:00
|
|
|
is wholly within the truncated region, the access is aborted and a
|
|
|
|
.Dv SIGBUS
|
|
|
|
signal is delivered to the process.
|
|
|
|
.Pp
|
|
|
|
If
|
|
|
|
.Fa fd
|
|
|
|
references a device file, the interpretation of the
|
|
|
|
.Fa offset
|
|
|
|
value is device specific and defined by the device driver.
|
2020-12-24 14:08:34 +00:00
|
|
|
The virtual memory subsystem does not impose any restrictions on the
|
2017-02-12 21:05:44 +00:00
|
|
|
.Fa offset
|
|
|
|
value in this case, passing it unchanged to the driver.
|
|
|
|
.Pp
|
|
|
|
If
|
1994-05-27 05:00:24 +00:00
|
|
|
.Fa addr
|
|
|
|
is non-zero, it is used as a hint to the system.
|
|
|
|
(As a convenience to the system, the actual address of the region may differ
|
|
|
|
from the address supplied.)
|
|
|
|
If
|
|
|
|
.Fa addr
|
|
|
|
is zero, an address will be selected by the system.
|
|
|
|
The actual starting address of the region is returned.
|
|
|
|
A successful
|
|
|
|
.Fa mmap
|
|
|
|
deletes any previous mapping in the allocated address range.
|
|
|
|
.Pp
|
|
|
|
The protections (region accessibility) are specified in the
|
|
|
|
.Fa prot
|
|
|
|
argument by
|
|
|
|
.Em or Ns 'ing
|
|
|
|
the following values:
|
|
|
|
.Pp
|
2001-02-12 10:14:15 +00:00
|
|
|
.Bl -tag -width PROT_WRITE -compact
|
|
|
|
.It Dv PROT_NONE
|
|
|
|
Pages may not be accessed.
|
1994-05-27 05:00:24 +00:00
|
|
|
.It Dv PROT_READ
|
|
|
|
Pages may be read.
|
|
|
|
.It Dv PROT_WRITE
|
|
|
|
Pages may be written.
|
2001-02-12 10:14:15 +00:00
|
|
|
.It Dv PROT_EXEC
|
|
|
|
Pages may be executed.
|
1994-05-27 05:00:24 +00:00
|
|
|
.El
|
|
|
|
.Pp
|
2019-06-20 18:24:16 +00:00
|
|
|
In addition to these protection flags,
|
|
|
|
.Fx
|
|
|
|
provides the ability to set the maximum protection of a region allocated by
|
|
|
|
.Nm
|
|
|
|
and later altered by
|
|
|
|
.Xr mprotect 2 .
|
|
|
|
This is accomplished by
|
|
|
|
.Em or Ns 'ing
|
|
|
|
one or more
|
|
|
|
.Dv PROT_
|
|
|
|
values wrapped in the
|
|
|
|
.Dv PROT_MAX()
|
|
|
|
macro into the
|
|
|
|
.Fa prot
|
|
|
|
argument.
|
|
|
|
.Pp
|
1994-05-27 05:00:24 +00:00
|
|
|
The
|
|
|
|
.Fa flags
|
2002-12-19 09:40:28 +00:00
|
|
|
argument specifies the type of the mapped object, mapping options and
|
1994-05-27 05:00:24 +00:00
|
|
|
whether modifications made to the mapped copy of the page are private
|
|
|
|
to the process or are to be shared with other references.
|
|
|
|
Sharing, mapping type and options are specified in the
|
|
|
|
.Fa flags
|
|
|
|
argument by
|
|
|
|
.Em or Ns 'ing
|
|
|
|
the following values:
|
2013-08-16 21:13:55 +00:00
|
|
|
.Bl -tag -width MAP_PREFAULT_READ
|
2013-09-09 18:11:59 +00:00
|
|
|
.It Dv MAP_32BIT
|
|
|
|
Request a region in the first 2GB of the current process's address space.
|
|
|
|
If a suitable region cannot be found,
|
|
|
|
.Fn mmap
|
|
|
|
will fail.
|
|
|
|
This flag is only available on 64-bit platforms.
|
2013-08-16 21:13:55 +00:00
|
|
|
.It Dv MAP_ALIGNED Ns Pq Fa n
|
|
|
|
Align the region on a requested boundary.
|
|
|
|
If a suitable region cannot be found,
|
|
|
|
.Fn mmap
|
|
|
|
will fail.
|
|
|
|
The
|
|
|
|
.Fa n
|
|
|
|
argument specifies the binary logarithm of the desired alignment.
|
|
|
|
.It Dv MAP_ALIGNED_SUPER
|
|
|
|
Align the region to maximize the potential use of large
|
|
|
|
.Pq Dq super
|
|
|
|
pages.
|
|
|
|
If a suitable region cannot be found,
|
|
|
|
.Fn mmap
|
|
|
|
will fail.
|
|
|
|
The system will choose a suitable page size based on the size of
|
|
|
|
mapping.
|
|
|
|
The page size used as well as the alignment of the region may both be
|
|
|
|
affected by properties of the file being mapped.
|
|
|
|
In particular,
|
|
|
|
the physical address of existing pages of a file may require a specific
|
|
|
|
alignment.
|
|
|
|
The region is not guaranteed to be aligned on any specific boundary.
|
1994-05-27 05:00:24 +00:00
|
|
|
.It Dv MAP_ANON
|
|
|
|
Map anonymous memory not associated with any specific file.
|
|
|
|
The file descriptor used for creating
|
|
|
|
.Dv MAP_ANON
|
1997-03-11 11:35:56 +00:00
|
|
|
must be \-1.
|
|
|
|
The
|
|
|
|
.Fa offset
|
2010-03-23 21:08:07 +00:00
|
|
|
argument must be 0.
|
1994-05-27 05:00:24 +00:00
|
|
|
.\".It Dv MAP_FILE
|
|
|
|
.\"Mapped from a regular file or character-special device memory.
|
2009-11-06 07:17:31 +00:00
|
|
|
.It Dv MAP_ANONYMOUS
|
|
|
|
This flag is identical to
|
|
|
|
.Dv MAP_ANON
|
|
|
|
and is provided for compatibility.
|
2014-06-19 05:00:39 +00:00
|
|
|
.It Dv MAP_EXCL
|
|
|
|
This flag can only be used in combination with
|
|
|
|
.Dv MAP_FIXED .
|
|
|
|
Please see the definition of
|
|
|
|
.Dv MAP_FIXED
|
|
|
|
for the description of its effect.
|
1994-05-27 05:00:24 +00:00
|
|
|
.It Dv MAP_FIXED
|
|
|
|
Do not permit the system to select a different address than the one
|
|
|
|
specified.
|
|
|
|
If the specified address cannot be used,
|
1996-08-22 23:31:07 +00:00
|
|
|
.Fn mmap
|
1994-05-27 05:00:24 +00:00
|
|
|
will fail.
|
2001-02-12 10:14:15 +00:00
|
|
|
If
|
|
|
|
.Dv MAP_FIXED
|
|
|
|
is specified,
|
1994-05-27 05:00:24 +00:00
|
|
|
.Fa addr
|
2017-02-12 21:05:44 +00:00
|
|
|
must be a multiple of the page size.
|
2014-06-19 05:00:39 +00:00
|
|
|
If
|
|
|
|
.Dv MAP_EXCL
|
2015-02-19 01:51:17 +00:00
|
|
|
is not specified, a successful
|
2005-11-17 13:00:00 +00:00
|
|
|
.Dv MAP_FIXED
|
2014-06-19 05:00:39 +00:00
|
|
|
request replaces any previous mappings for the process'
|
|
|
|
pages in the range from
|
2005-07-15 11:37:25 +00:00
|
|
|
.Fa addr
|
|
|
|
to
|
2005-11-17 13:00:00 +00:00
|
|
|
.Fa addr
|
|
|
|
+
|
2005-07-15 11:37:25 +00:00
|
|
|
.Fa len .
|
2014-06-19 05:00:39 +00:00
|
|
|
In contrast, if
|
|
|
|
.Dv MAP_EXCL
|
|
|
|
is specified, the request will fail if a mapping
|
|
|
|
already exists within the range.
|
Implement address space guards.
Guard, requested by the MAP_GUARD mmap(2) flag, prevents the reuse of
the allocated address space, but does not allow instantiation of the
pages in the range. It is useful for more explicit support for usual
two-stage reserve then commit allocators, since it prevents accidental
instantiation of the mapping, e.g. by mprotect(2).
Use guards to reimplement stack grow code. Explicitely track stack
grow area with the guard, including the stack guard page. On stack
grow, trivial shift of the guard map entry and stack map entry limits
makes the stack expansion. Move the code to detect stack grow and
call vm_map_growstack(), from vm_fault() into vm_map_lookup().
As result, it is impossible to get random mapping to occur in the
stack grow area, or to overlap the stack guard page.
Enable stack guard page by default.
Reviewed by: alc, markj
Man page update reviewed by: alc, bjk, emaste, markj, pho
Tested by: pho, Qualys
Sponsored by: The FreeBSD Foundation
MFC after: 1 week
Differential revision: https://reviews.freebsd.org/D11306 (man pages)
2017-06-24 17:01:11 +00:00
|
|
|
.It Dv MAP_GUARD
|
|
|
|
Instead of a mapping, create a guard of the specified size.
|
|
|
|
Guards allow a process to create reservations in its address space,
|
|
|
|
which can later be replaced by actual mappings.
|
|
|
|
.Pp
|
|
|
|
.Fa mmap
|
|
|
|
will not create mappings in the address range of a guard unless
|
|
|
|
the request specifies
|
|
|
|
.Dv MAP_FIXED .
|
|
|
|
Guards can be destroyed with
|
|
|
|
.Xr munmap 2 .
|
|
|
|
Any memory access by a thread to the guarded range results
|
|
|
|
in the delivery of a
|
|
|
|
.Dv SIGSEGV
|
|
|
|
signal to that thread.
|
2001-02-12 10:14:15 +00:00
|
|
|
.It Dv MAP_NOCORE
|
|
|
|
Region is not included in a core file.
|
1999-12-12 03:19:33 +00:00
|
|
|
.It Dv MAP_NOSYNC
|
|
|
|
Causes data dirtied via this VM map to be flushed to physical media
|
2002-12-24 16:52:31 +00:00
|
|
|
only when necessary (usually by the pager) rather than gratuitously.
|
2001-07-15 07:53:42 +00:00
|
|
|
Typically this prevents the update daemons from flushing pages dirtied
|
1999-12-12 03:19:33 +00:00
|
|
|
through such maps and thus allows efficient sharing of memory across
|
2002-03-15 18:04:00 +00:00
|
|
|
unassociated processes using a file-backed shared memory map.
|
|
|
|
Without
|
1999-12-12 03:19:33 +00:00
|
|
|
this option any VM pages you dirty may be flushed to disk every so often
|
|
|
|
(every 30-60 seconds usually) which can create performance problems if you
|
|
|
|
do not need that to occur (such as when you are using shared file-backed
|
2002-03-15 18:04:00 +00:00
|
|
|
mmap regions for IPC purposes).
|
2016-11-26 21:00:27 +00:00
|
|
|
Dirty data will be flushed automatically when all mappings of an object are
|
|
|
|
removed and all descriptors referencing the object are closed.
|
2002-12-12 17:26:04 +00:00
|
|
|
Note that VM/file system coherency is
|
2001-02-12 10:14:15 +00:00
|
|
|
maintained whether you use
|
|
|
|
.Dv MAP_NOSYNC
|
2002-03-15 18:04:00 +00:00
|
|
|
or not.
|
|
|
|
This option is not portable
|
2001-02-12 10:14:15 +00:00
|
|
|
across
|
|
|
|
.Ux
|
|
|
|
platforms (yet), though some may implement the same behavior
|
1999-12-12 03:19:33 +00:00
|
|
|
by default.
|
|
|
|
.Pp
|
2001-02-12 10:14:15 +00:00
|
|
|
.Em WARNING !
|
2000-12-04 08:11:50 +00:00
|
|
|
Extending a file with
|
|
|
|
.Xr ftruncate 2 ,
|
|
|
|
thus creating a big hole, and then filling the hole by modifying a shared
|
|
|
|
.Fn mmap
|
|
|
|
can lead to severe file fragmentation.
|
|
|
|
In order to avoid such fragmentation you should always pre-allocate the
|
|
|
|
file's backing store by
|
|
|
|
.Fn write Ns ing
|
|
|
|
zero's into the newly extended area prior to modifying the area via your
|
|
|
|
.Fn mmap .
|
|
|
|
The fragmentation problem is especially sensitive to
|
|
|
|
.Dv MAP_NOSYNC
|
|
|
|
pages, because pages may be flushed to disk in a totally random order.
|
2000-12-03 20:17:36 +00:00
|
|
|
.Pp
|
2000-12-04 08:11:50 +00:00
|
|
|
The same applies when using
|
|
|
|
.Dv MAP_NOSYNC
|
|
|
|
to implement a file-based shared memory store.
|
|
|
|
It is recommended that you create the backing store by
|
|
|
|
.Fn write Ns ing
|
2002-12-24 16:52:31 +00:00
|
|
|
zero's to the backing file rather than
|
2000-12-04 08:11:50 +00:00
|
|
|
.Fn ftruncate Ns ing
|
|
|
|
it.
|
|
|
|
You can test file fragmentation by observing the KB/t (kilobytes per
|
|
|
|
transfer) results from an
|
|
|
|
.Dq Li iostat 1
|
2015-02-19 01:51:17 +00:00
|
|
|
while reading a large file sequentially, e.g.,\& using
|
2000-12-04 08:11:50 +00:00
|
|
|
.Dq Li dd if=filename of=/dev/null bs=32k .
|
2000-12-03 20:17:36 +00:00
|
|
|
.Pp
|
1999-12-12 03:19:33 +00:00
|
|
|
The
|
|
|
|
.Xr fsync 2
|
2002-12-18 09:22:32 +00:00
|
|
|
system call will flush all dirty data and metadata associated with a file,
|
2002-03-15 18:04:00 +00:00
|
|
|
including dirty NOSYNC VM data, to physical media.
|
|
|
|
The
|
2000-06-23 20:47:50 +00:00
|
|
|
.Xr sync 8
|
1999-12-12 03:19:33 +00:00
|
|
|
command and
|
|
|
|
.Xr sync 2
|
|
|
|
system call generally do not flush dirty NOSYNC VM data.
|
|
|
|
The
|
|
|
|
.Xr msync 2
|
2012-03-17 23:55:18 +00:00
|
|
|
system call is usually not needed since
|
2000-02-14 01:34:15 +00:00
|
|
|
.Bx
|
2002-12-12 17:26:04 +00:00
|
|
|
implements a coherent file system buffer cache.
|
2002-03-15 18:04:00 +00:00
|
|
|
However, it may be
|
2002-12-12 17:26:04 +00:00
|
|
|
used to associate dirty VM pages with file system buffers and thus cause
|
2002-12-24 16:52:31 +00:00
|
|
|
them to be flushed to physical media sooner rather than later.
|
2010-08-28 16:57:07 +00:00
|
|
|
.It Dv MAP_PREFAULT_READ
|
|
|
|
Immediately update the calling process's lowest-level virtual address
|
|
|
|
translation structures, such as its page table, so that every memory
|
|
|
|
resident page within the region is mapped for read access.
|
|
|
|
Ordinarily these structures are updated lazily.
|
|
|
|
The effect of this option is to eliminate any soft faults that would
|
|
|
|
otherwise occur on the initial read accesses to the region.
|
|
|
|
Although this option does not preclude
|
|
|
|
.Fa prot
|
|
|
|
from including
|
|
|
|
.Dv PROT_WRITE ,
|
|
|
|
it does not eliminate soft faults on the initial write accesses to the
|
|
|
|
region.
|
2001-02-12 10:14:15 +00:00
|
|
|
.It Dv MAP_PRIVATE
|
|
|
|
Modifications are private.
|
|
|
|
.It Dv MAP_SHARED
|
|
|
|
Modifications are shared.
|
|
|
|
.It Dv MAP_STACK
|
2020-10-27 18:08:33 +00:00
|
|
|
Creates both a mapped region that grows downward on demand and an
|
|
|
|
adjoining guard that both reserves address space for the mapped region
|
|
|
|
to grow into and limits the mapped region's growth.
|
|
|
|
Together, the mapped region and the guard occupy
|
|
|
|
.Fa len
|
|
|
|
bytes of the address space.
|
|
|
|
The guard starts at the returned address, and the mapped region ends at
|
|
|
|
the returned address plus
|
|
|
|
.Fa len
|
|
|
|
bytes.
|
|
|
|
Upon access to the guard, the mapped region automatically grows in size,
|
|
|
|
and the guard shrinks by an equal amount.
|
|
|
|
Essentially, the boundary between the guard and the mapped region moves
|
|
|
|
downward so that the access falls within the enlarged mapped region.
|
|
|
|
However, the guard will never shrink to less than the number of pages
|
|
|
|
specified by the sysctl
|
|
|
|
.Dv security.bsd.stack_guard_page ,
|
|
|
|
thereby ensuring that a gap for detecting stack overflow always exists
|
|
|
|
between the downward growing mapped region and the closest mapped region
|
|
|
|
beneath it.
|
|
|
|
.Pp
|
2001-02-12 10:14:15 +00:00
|
|
|
.Dv MAP_STACK
|
|
|
|
implies
|
2020-10-27 18:08:33 +00:00
|
|
|
.Dv MAP_ANON
|
2001-02-12 10:14:15 +00:00
|
|
|
and
|
2001-07-15 07:53:42 +00:00
|
|
|
.Fa offset
|
|
|
|
of 0.
|
2002-12-19 09:40:28 +00:00
|
|
|
The
|
2001-07-15 07:53:42 +00:00
|
|
|
.Fa fd
|
2002-12-19 09:40:28 +00:00
|
|
|
argument
|
2001-07-15 07:53:42 +00:00
|
|
|
must be -1 and
|
|
|
|
.Fa prot
|
2001-02-12 10:14:15 +00:00
|
|
|
must include at least
|
|
|
|
.Dv PROT_READ
|
|
|
|
and
|
|
|
|
.Dv PROT_WRITE .
|
2020-10-21 21:40:33 +00:00
|
|
|
The size of the guard, in pages, is specified by sysctl
|
|
|
|
.Dv security.bsd.stack_guard_page .
|
1994-05-27 05:00:24 +00:00
|
|
|
.El
|
|
|
|
.Pp
|
2001-07-15 07:53:42 +00:00
|
|
|
The
|
1994-05-27 05:00:24 +00:00
|
|
|
.Xr close 2
|
2002-12-18 09:22:32 +00:00
|
|
|
system call does not unmap pages, see
|
1994-05-27 05:00:24 +00:00
|
|
|
.Xr munmap 2
|
|
|
|
for further information.
|
2008-10-24 14:40:13 +00:00
|
|
|
.Sh NOTES
|
|
|
|
Although this implementation does not impose any alignment restrictions on
|
|
|
|
the
|
|
|
|
.Fa offset
|
|
|
|
argument, a portable program must only use page-aligned values.
|
2013-08-16 21:13:55 +00:00
|
|
|
.Pp
|
|
|
|
Large page mappings require that the pages backing an object be
|
|
|
|
aligned in matching blocks in both the virtual address space and RAM.
|
|
|
|
The system will automatically attempt to use large page mappings when
|
|
|
|
mapping an object that is already backed by large pages in RAM by
|
|
|
|
aligning the mapping request in the virtual address space to match the
|
|
|
|
alignment of the large physical pages.
|
|
|
|
The system may also use large page mappings when mapping portions of an
|
|
|
|
object that are not yet backed by pages in RAM.
|
|
|
|
The
|
|
|
|
.Dv MAP_ALIGNED_SUPER
|
|
|
|
flag is an optimization that will align the mapping request to the
|
|
|
|
size of a large page similar to
|
|
|
|
.Dv MAP_ALIGNED ,
|
|
|
|
except that the system will override this alignment if an object already
|
|
|
|
uses large pages so that the mapping will be consistent with the existing
|
|
|
|
large pages.
|
|
|
|
This flag is mostly useful for maximizing the use of large pages on the
|
|
|
|
first mapping of objects that do not yet have pages present in RAM.
|
1994-05-27 05:00:24 +00:00
|
|
|
.Sh RETURN VALUES
|
|
|
|
Upon successful completion,
|
1996-08-22 23:31:07 +00:00
|
|
|
.Fn mmap
|
1994-05-27 05:00:24 +00:00
|
|
|
returns a pointer to the mapped region.
|
2001-02-12 10:14:15 +00:00
|
|
|
Otherwise, a value of
|
|
|
|
.Dv MAP_FAILED
|
|
|
|
is returned and
|
1994-05-27 05:00:24 +00:00
|
|
|
.Va errno
|
|
|
|
is set to indicate the error.
|
|
|
|
.Sh ERRORS
|
2002-12-18 09:22:32 +00:00
|
|
|
The
|
|
|
|
.Fn mmap
|
|
|
|
system call
|
1994-05-27 05:00:24 +00:00
|
|
|
will fail if:
|
|
|
|
.Bl -tag -width Er
|
|
|
|
.It Bq Er EACCES
|
|
|
|
The flag
|
|
|
|
.Dv PROT_READ
|
|
|
|
was specified as part of the
|
|
|
|
.Fa prot
|
2002-12-19 09:40:28 +00:00
|
|
|
argument and
|
1994-05-27 05:00:24 +00:00
|
|
|
.Fa fd
|
|
|
|
was not open for reading.
|
|
|
|
The flags
|
|
|
|
.Dv MAP_SHARED
|
|
|
|
and
|
1997-03-11 11:35:56 +00:00
|
|
|
.Dv PROT_WRITE
|
|
|
|
were specified as part of the
|
1994-05-27 05:00:24 +00:00
|
|
|
.Fa flags
|
|
|
|
and
|
|
|
|
.Fa prot
|
2002-12-19 09:40:28 +00:00
|
|
|
argument and
|
1994-05-27 05:00:24 +00:00
|
|
|
.Fa fd
|
|
|
|
was not open for writing.
|
|
|
|
.It Bq Er EBADF
|
2002-12-19 09:40:28 +00:00
|
|
|
The
|
2000-12-29 14:08:20 +00:00
|
|
|
.Fa fd
|
2002-12-19 09:40:28 +00:00
|
|
|
argument
|
1994-05-27 05:00:24 +00:00
|
|
|
is not a valid open file descriptor.
|
1997-01-08 12:02:15 +00:00
|
|
|
.It Bq Er EINVAL
|
2017-02-12 21:05:44 +00:00
|
|
|
An invalid (negative) value was passed in the
|
|
|
|
.Fa offset
|
|
|
|
argument, when
|
|
|
|
.Fa fd
|
|
|
|
referenced a regular file or shared memory.
|
|
|
|
.It Bq Er EINVAL
|
2014-09-15 17:20:13 +00:00
|
|
|
An invalid value was passed in the
|
|
|
|
.Fa prot
|
|
|
|
argument.
|
|
|
|
.It Bq Er EINVAL
|
|
|
|
An undefined option was set in the
|
|
|
|
.Fa flags
|
|
|
|
argument.
|
|
|
|
.It Bq Er EINVAL
|
|
|
|
Both
|
|
|
|
.Dv MAP_PRIVATE
|
|
|
|
and
|
|
|
|
.Dv MAP_SHARED
|
|
|
|
were specified.
|
|
|
|
.It Bq Er EINVAL
|
|
|
|
None of
|
|
|
|
.Dv MAP_ANON ,
|
Implement address space guards.
Guard, requested by the MAP_GUARD mmap(2) flag, prevents the reuse of
the allocated address space, but does not allow instantiation of the
pages in the range. It is useful for more explicit support for usual
two-stage reserve then commit allocators, since it prevents accidental
instantiation of the mapping, e.g. by mprotect(2).
Use guards to reimplement stack grow code. Explicitely track stack
grow area with the guard, including the stack guard page. On stack
grow, trivial shift of the guard map entry and stack map entry limits
makes the stack expansion. Move the code to detect stack grow and
call vm_map_growstack(), from vm_fault() into vm_map_lookup().
As result, it is impossible to get random mapping to occur in the
stack grow area, or to overlap the stack guard page.
Enable stack guard page by default.
Reviewed by: alc, markj
Man page update reviewed by: alc, bjk, emaste, markj, pho
Tested by: pho, Qualys
Sponsored by: The FreeBSD Foundation
MFC after: 1 week
Differential revision: https://reviews.freebsd.org/D11306 (man pages)
2017-06-24 17:01:11 +00:00
|
|
|
.Dv MAP_GUARD ,
|
2014-09-15 17:20:13 +00:00
|
|
|
.Dv MAP_PRIVATE ,
|
|
|
|
.Dv MAP_SHARED ,
|
|
|
|
or
|
|
|
|
.Dv MAP_STACK
|
|
|
|
was specified.
|
|
|
|
At least one of these flags must be included.
|
|
|
|
.It Bq Er EINVAL
|
2020-10-21 21:40:33 +00:00
|
|
|
.Dv MAP_STACK
|
|
|
|
was specified and
|
|
|
|
.Va len
|
|
|
|
is less than or equal to the guard size.
|
|
|
|
.It Bq Er EINVAL
|
1994-05-27 05:00:24 +00:00
|
|
|
.Dv MAP_FIXED
|
|
|
|
was specified and the
|
1997-03-12 15:18:28 +00:00
|
|
|
.Fa addr
|
2002-12-19 09:40:28 +00:00
|
|
|
argument was not page aligned, or part of the desired address space
|
1997-01-08 12:02:15 +00:00
|
|
|
resides out of the valid address space for a user process.
|
|
|
|
.It Bq Er EINVAL
|
2013-09-09 18:11:59 +00:00
|
|
|
Both
|
|
|
|
.Dv MAP_FIXED
|
|
|
|
and
|
|
|
|
.Dv MAP_32BIT
|
|
|
|
were specified and part of the desired address space resides outside
|
|
|
|
of the first 2GB of user address space.
|
|
|
|
.It Bq Er EINVAL
|
2002-12-19 09:40:28 +00:00
|
|
|
The
|
|
|
|
.Fa len
|
|
|
|
argument
|
2009-07-14 19:45:36 +00:00
|
|
|
was equal to zero.
|
1997-01-08 12:02:15 +00:00
|
|
|
.It Bq Er EINVAL
|
2013-08-16 21:13:55 +00:00
|
|
|
.Dv MAP_ALIGNED
|
|
|
|
was specified and the desired alignment was either larger than the
|
|
|
|
virtual address size of the machine or smaller than a page.
|
|
|
|
.It Bq Er EINVAL
|
1997-01-08 12:02:15 +00:00
|
|
|
.Dv MAP_ANON
|
|
|
|
was specified and the
|
|
|
|
.Fa fd
|
2002-12-19 09:40:28 +00:00
|
|
|
argument was not -1.
|
2010-03-23 21:08:07 +00:00
|
|
|
.It Bq Er EINVAL
|
|
|
|
.Dv MAP_ANON
|
|
|
|
was specified and the
|
|
|
|
.Fa offset
|
|
|
|
argument was not 0.
|
2014-06-19 05:00:39 +00:00
|
|
|
.It Bq Er EINVAL
|
|
|
|
Both
|
|
|
|
.Dv MAP_FIXED
|
|
|
|
and
|
|
|
|
.Dv MAP_EXCL
|
|
|
|
were specified, but the requested region is already used by a mapping.
|
|
|
|
.It Bq Er EINVAL
|
|
|
|
.Dv MAP_EXCL
|
|
|
|
was specified, but
|
|
|
|
.Dv MAP_FIXED
|
|
|
|
was not.
|
Implement address space guards.
Guard, requested by the MAP_GUARD mmap(2) flag, prevents the reuse of
the allocated address space, but does not allow instantiation of the
pages in the range. It is useful for more explicit support for usual
two-stage reserve then commit allocators, since it prevents accidental
instantiation of the mapping, e.g. by mprotect(2).
Use guards to reimplement stack grow code. Explicitely track stack
grow area with the guard, including the stack guard page. On stack
grow, trivial shift of the guard map entry and stack map entry limits
makes the stack expansion. Move the code to detect stack grow and
call vm_map_growstack(), from vm_fault() into vm_map_lookup().
As result, it is impossible to get random mapping to occur in the
stack grow area, or to overlap the stack guard page.
Enable stack guard page by default.
Reviewed by: alc, markj
Man page update reviewed by: alc, bjk, emaste, markj, pho
Tested by: pho, Qualys
Sponsored by: The FreeBSD Foundation
MFC after: 1 week
Differential revision: https://reviews.freebsd.org/D11306 (man pages)
2017-06-24 17:01:11 +00:00
|
|
|
.It Bq Er EINVAL
|
|
|
|
.Dv MAP_GUARD
|
|
|
|
was specified, but the
|
|
|
|
.Fa offset
|
|
|
|
argument was not zero, the
|
|
|
|
.Fa fd
|
|
|
|
argument was not -1, or the
|
|
|
|
.Fa prot
|
|
|
|
argument was not
|
|
|
|
.Dv PROT_NONE .
|
|
|
|
.It Bq Er EINVAL
|
|
|
|
.Dv MAP_GUARD
|
|
|
|
was specified together with one of the flags
|
|
|
|
.Dv MAP_ANON ,
|
|
|
|
.Dv MAP_PREFAULT ,
|
|
|
|
.Dv MAP_PREFAULT_READ ,
|
|
|
|
.Dv MAP_PRIVATE ,
|
|
|
|
.Dv MAP_SHARED ,
|
|
|
|
.Dv MAP_STACK .
|
2006-04-21 07:22:55 +00:00
|
|
|
.It Bq Er ENODEV
|
|
|
|
.Dv MAP_ANON
|
|
|
|
has not been specified and
|
|
|
|
.Fa fd
|
|
|
|
did not reference a regular or character special file.
|
1994-05-27 05:00:24 +00:00
|
|
|
.It Bq Er ENOMEM
|
|
|
|
.Dv MAP_FIXED
|
|
|
|
was specified and the
|
|
|
|
.Fa addr
|
2002-12-19 09:40:28 +00:00
|
|
|
argument was not available.
|
1994-05-27 05:00:24 +00:00
|
|
|
.Dv MAP_ANON
|
|
|
|
was specified and insufficient memory was available.
|
2020-02-26 20:03:43 +00:00
|
|
|
.It Bq Er ENOTSUP
|
|
|
|
The
|
|
|
|
.Fa prot
|
2020-06-03 20:42:52 +00:00
|
|
|
argument contains protections which are not a subset of the specified
|
|
|
|
maximum protections.
|
2000-12-29 14:08:20 +00:00
|
|
|
.El
|
2001-02-12 10:14:15 +00:00
|
|
|
.Sh SEE ALSO
|
1994-05-27 05:00:24 +00:00
|
|
|
.Xr madvise 2 ,
|
1996-02-02 05:06:29 +00:00
|
|
|
.Xr mincore 2 ,
|
2001-08-27 08:12:37 +00:00
|
|
|
.Xr minherit 2 ,
|
1996-02-02 05:06:29 +00:00
|
|
|
.Xr mlock 2 ,
|
1997-01-20 23:23:22 +00:00
|
|
|
.Xr mprotect 2 ,
|
|
|
|
.Xr msync 2 ,
|
1996-02-11 22:38:05 +00:00
|
|
|
.Xr munlock 2 ,
|
1997-01-20 23:23:22 +00:00
|
|
|
.Xr munmap 2 ,
|
2013-08-16 21:13:55 +00:00
|
|
|
.Xr getpagesize 3 ,
|
|
|
|
.Xr getpagesizes 3
|
2019-06-20 21:52:30 +00:00
|
|
|
.Sh HISTORY
|
|
|
|
The
|
|
|
|
.Nm
|
|
|
|
system call was first documented in
|
|
|
|
.Bx 4.2
|
|
|
|
and implemented in
|
|
|
|
.Bx 4.4 .
|
|
|
|
.\" XXX: lots of missing history of FreeBSD additions.
|
|
|
|
.Pp
|
|
|
|
The
|
|
|
|
.Dv PROT_MAX
|
|
|
|
functionality was introduced in
|
|
|
|
.Fx 13 .
|