
When the system calls return `NumericLimits<ptrdiff_t>::min()`, negating the return code would produce `NumericLimits<ptrdiff_t>::max() + 1` since we are on a two's complement architecture. Because this value cannot be stored, signed overflow occurs which is UB. This can be fixed by applying the negation to `EMAXERRNO` since that's known to contain a relatively small value. Found when running tests with Clang.
92 lines
2.4 KiB
C++
92 lines
2.4 KiB
C++
/*
|
|
* Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
|
|
*
|
|
* SPDX-License-Identifier: BSD-2-Clause
|
|
*/
|
|
|
|
#include <AK/Format.h>
|
|
#include <errno.h>
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <sys/mman.h>
|
|
#include <syscall.h>
|
|
|
|
extern "C" {
|
|
|
|
void* serenity_mmap(void* addr, size_t size, int prot, int flags, int fd, off_t offset, size_t alignment, const char* name)
|
|
{
|
|
Syscall::SC_mmap_params params { (uintptr_t)addr, size, alignment, prot, flags, fd, offset, { name, name ? strlen(name) : 0 } };
|
|
ptrdiff_t rc = syscall(SC_mmap, ¶ms);
|
|
if (rc < 0 && rc > -EMAXERRNO) {
|
|
errno = -rc;
|
|
return MAP_FAILED;
|
|
}
|
|
return (void*)rc;
|
|
}
|
|
|
|
void* mmap(void* addr, size_t size, int prot, int flags, int fd, off_t offset)
|
|
{
|
|
return serenity_mmap(addr, size, prot, flags, fd, offset, PAGE_SIZE, nullptr);
|
|
}
|
|
|
|
void* mmap_with_name(void* addr, size_t size, int prot, int flags, int fd, off_t offset, const char* name)
|
|
{
|
|
return serenity_mmap(addr, size, prot, flags, fd, offset, PAGE_SIZE, name);
|
|
}
|
|
|
|
void* mremap(void* old_address, size_t old_size, size_t new_size, int flags)
|
|
{
|
|
Syscall::SC_mremap_params params { (uintptr_t)old_address, old_size, new_size, flags };
|
|
ptrdiff_t rc = syscall(SC_mremap, ¶ms);
|
|
if (rc < 0 && rc > -EMAXERRNO) {
|
|
errno = -rc;
|
|
return MAP_FAILED;
|
|
}
|
|
return (void*)rc;
|
|
}
|
|
|
|
int munmap(void* addr, size_t size)
|
|
{
|
|
int rc = syscall(SC_munmap, addr, size);
|
|
__RETURN_WITH_ERRNO(rc, rc, -1);
|
|
}
|
|
|
|
int mprotect(void* addr, size_t size, int prot)
|
|
{
|
|
int rc = syscall(SC_mprotect, addr, size, prot);
|
|
__RETURN_WITH_ERRNO(rc, rc, -1);
|
|
}
|
|
|
|
int set_mmap_name(void* addr, size_t size, const char* name)
|
|
{
|
|
if (!name) {
|
|
errno = EFAULT;
|
|
return -1;
|
|
}
|
|
Syscall::SC_set_mmap_name_params params { addr, size, { name, strlen(name) } };
|
|
int rc = syscall(SC_set_mmap_name, ¶ms);
|
|
__RETURN_WITH_ERRNO(rc, rc, -1);
|
|
}
|
|
|
|
int madvise(void* address, size_t size, int advice)
|
|
{
|
|
int rc = syscall(SC_madvise, address, size, advice);
|
|
__RETURN_WITH_ERRNO(rc, rc, -1);
|
|
}
|
|
|
|
void* allocate_tls(const char* initial_data, size_t size)
|
|
{
|
|
ptrdiff_t rc = syscall(SC_allocate_tls, initial_data, size);
|
|
if (rc < 0 && rc > -EMAXERRNO) {
|
|
errno = -rc;
|
|
return MAP_FAILED;
|
|
}
|
|
return (void*)rc;
|
|
}
|
|
|
|
int mlock(const void*, size_t)
|
|
{
|
|
dbgln("FIXME: Implement mlock()");
|
|
return 0;
|
|
}
|
|
}
|