]> git.ipfire.org Git - thirdparty/man-pages.git/blame - man2/mmap.2
ldd.1, localedef.1, add_key.2, chroot.2, clone.2, fork.2, futex.2, get_mempolicy...
[thirdparty/man-pages.git] / man2 / mmap.2
CommitLineData
a62f5121 1.\" Copyright (C) 1996 Andries Brouwer <aeb@cwi.nl>
c11b1abf 2.\" and Copyright (C) 2006, 2007 Michael Kerrisk <mtk.manpages@gmail.com>
fea681da 3.\"
93015253 4.\" %%%LICENSE_START(VERBATIM)
fea681da
MK
5.\" Permission is granted to make and distribute verbatim copies of this
6.\" manual provided the copyright notice and this permission notice are
7.\" preserved on all copies.
8.\"
9.\" Permission is granted to copy and distribute modified versions of this
10.\" manual under the conditions for verbatim copying, provided that the
11.\" entire resulting derived work is distributed under the terms of a
12.\" permission notice identical to this one.
c13182ef 13.\"
fea681da
MK
14.\" Since the Linux kernel and libraries are constantly changing, this
15.\" manual page may be incorrect or out-of-date. The author(s) assume no
16.\" responsibility for errors or omissions, or for damages resulting from
17.\" the use of the information contained herein. The author(s) may not
18.\" have taken the same level of care in the production of this manual,
19.\" which is licensed free of charge, as they might when working
20.\" professionally.
c13182ef 21.\"
fea681da
MK
22.\" Formatted or processed versions of this manual, if unaccompanied by
23.\" the source, must acknowledge the copyright and authors of this work.
4b72fb64 24.\" %%%LICENSE_END
fea681da
MK
25.\"
26.\" Modified 1997-01-31 by Eric S. Raymond <esr@thyrsus.com>
27.\" Modified 2000-03-25 by Jim Van Zandt <jrv@vanzandt.mv.com>
28.\" Modified 2001-10-04 by John Levon <moz@compsoc.man.ac.uk>
29.\" Modified 2003-02-02 by Andi Kleen <ak@muc.de>
c11b1abf 30.\" Modified 2003-05-21 by Michael Kerrisk <mtk.manpages@gmail.com>
fea681da 31.\" MAP_LOCKED works from 2.5.37
c11b1abf 32.\" Modified 2004-06-17 by Michael Kerrisk <mtk.manpages@gmail.com>
fea681da 33.\" Modified 2004-09-11 by aeb
1a956089
MK
34.\" Modified 2004-12-08, from Eric Estievenart <eric.estievenart@free.fr>
35.\" Modified 2004-12-08, mtk, formatting tidy-ups
a62f5121 36.\" Modified 2006-12-04, mtk, various parts rewritten
74fa61b7 37.\" 2007-07-10, mtk, Added an example program.
e6205b0c 38.\" 2008-11-18, mtk, document MAP_STACK
fea681da 39.\"
3df541c0 40.TH MMAP 2 2016-07-17 "Linux" "Linux Programmer's Manual"
fea681da
MK
41.SH NAME
42mmap, munmap \- map or unmap files or devices into memory
43.SH SYNOPSIS
e0037472 44.nf
fea681da
MK
45.B #include <sys/mman.h>
46.sp
14f5ae6d 47.BI "void *mmap(void *" addr ", size_t " length \
a62f5121 48", int " prot ", int " flags ,
e0037472 49.BI " int " fd ", off_t " offset );
14f5ae6d 50.BI "int munmap(void *" addr ", size_t " length );
e0037472 51.fi
45e97e2a
MK
52
53See NOTES for information on feature test macro requirements.
fea681da 54.SH DESCRIPTION
1a956089 55.BR mmap ()
c13182ef 56creates a new mapping in the virtual address space of
5e8cde2f
MK
57the calling process.
58The starting address for the new mapping is specified in
14f5ae6d 59.IR addr .
5e8cde2f
MK
60The
61.I length
62argument specifies the length of the mapping.
63
64If
14f5ae6d 65.I addr
5e8cde2f
MK
66is NULL,
67then the kernel chooses the address at which to create the mapping;
68this is the most portable method of creating a new mapping.
c13182ef 69If
14f5ae6d 70.I addr
5e8cde2f
MK
71is not NULL,
72then the kernel takes it as a hint about where to place the mapping;
6aa7db0a
MK
73on Linux, the mapping will be created at a nearby page boundary.
74.\" Before Linux 2.6.24, the address was rounded up to the next page
29328361 75.\" boundary; since 2.6.24, it is rounded down!
5e8cde2f
MK
76The address of the new mapping is returned as the result of the call.
77
78The contents of a file mapping (as opposed to an anonymous mapping; see
79.B MAP_ANONYMOUS
d9bfdb9c 80below), are initialized using
fea681da
MK
81.I length
82bytes starting at offset
83.I offset
5e8cde2f
MK
84in the file (or other object) referred to by the file descriptor
85.IR fd .
a62f5121
MK
86.I offset
87must be a multiple of the page size as returned by
88.IR sysconf(_SC_PAGE_SIZE) .
fea681da
MK
89.LP
90The
91.I prot
c13182ef 92argument describes the desired memory protection of the mapping
5e8cde2f
MK
93(and must not conflict with the open mode of the file).
94It is either
fea681da 95.B PROT_NONE
a62f5121 96or the bitwise OR of one or more of the following flags:
fea681da
MK
97.TP 1.1i
98.B PROT_EXEC
99Pages may be executed.
100.TP
101.B PROT_READ
102Pages may be read.
103.TP
104.B PROT_WRITE
105Pages may be written.
106.TP
107.B PROT_NONE
108Pages may not be accessed.
109.LP
110The
111.I flags
a62f5121
MK
112argument determines whether updates to the mapping
113are visible to other processes mapping the same region,
ba7cb080 114and whether updates are carried through to the underlying file.
d9bfdb9c 115This behavior is determined by including exactly one
a62f5121 116of the following values in
5e8cde2f 117.IR flags :
ca90e95a 118.TP
fea681da 119.B MAP_SHARED
c13182ef 120Share this mapping.
a62f5121
MK
121Updates to the mapping are visible to other processes that map this file,
122and are carried through to the underlying file.
72e8bdae
MK
123(To precisely control when updates are carried through
124to the underlying file requires the use of
125.BR msync (2).)
fea681da
MK
126.TP
127.B MAP_PRIVATE
128Create a private copy-on-write mapping.
a62f5121
MK
129Updates to the mapping are not visible to other processes
130mapping the same file, and are not carried through to
131the underlying file.
fea681da 132It is unspecified whether changes made to the file after the
1a956089 133.BR mmap ()
fea681da
MK
134call are visible in the mapped region.
135.LP
78cdbef7 136Both of these flags are described in POSIX.1-2001 and POSIX.1-2008.
a62f5121
MK
137
138In addition, zero or more of the following values can be ORed in
139.IR flags :
fea681da 140.TP
c368e7ca
MK
141.BR MAP_32BIT " (since Linux 2.4.20, 2.6)"
142Put the mapping into the first 2 Gigabytes of the process address space.
33a0ccb2 143This flag is supported only on x86-64, for 64-bit programs.
c368e7ca
MK
144It was added to allow thread stacks to be allocated somewhere
145in the first 2GB of memory,
146so as to improve context-switch performance on some early
14764-bit processors.
148.\" See http://lwn.net/Articles/294642 "Tangled up in threads", 19 Aug 08
149Modern x86-64 processors no longer have this performance problem,
150so use of this flag is not required on those systems.
151The
83314009 152.B MAP_32BIT
c368e7ca 153flag is ignored when
a62f5121 154.B MAP_FIXED
83314009 155is set.
fea681da 156.TP
a62f5121 157.B MAP_ANON
c13182ef
MK
158Synonym for
159.BR MAP_ANONYMOUS .
a62f5121
MK
160Deprecated.
161.TP
fea681da 162.B MAP_ANONYMOUS
5e8cde2f 163The mapping is not backed by any file;
d9bfdb9c 164its contents are initialized to zero.
5e8cde2f 165The
fea681da
MK
166.I fd
167and
168.I offset
a62f5121 169arguments are ignored;
c13182ef 170however, some implementations require
a62f5121 171.I fd
c13182ef
MK
172to be \-1 if
173.B MAP_ANONYMOUS
174(or
175.BR MAP_ANON )
a62f5121
MK
176is specified,
177and portable applications should ensure this.
c13182ef 178The use of
a62f5121 179.B MAP_ANONYMOUS
c13182ef 180in conjunction with
51ffcca0 181.B MAP_SHARED
33a0ccb2 182is supported on Linux only since kernel 2.4.
fea681da 183.TP
83314009
MK
184.B MAP_DENYWRITE
185This flag is ignored.
186.\" Introduced in 1.1.36, removed in 1.3.24.
d9bfdb9c 187(Long ago, it signaled that attempts to write to the underlying file
83314009
MK
188should fail with
189.BR ETXTBUSY .
190But this was a source of denial-of-service attacks.)
191.TP
192.B MAP_EXECUTABLE
193This flag is ignored.
194.\" Introduced in 1.1.38, removed in 1.3.24. Flag tested in proc_follow_link.
d9bfdb9c 195.\" (Long ago, it signaled that the underlying file is an executable.
83314009
MK
196.\" However, that information was not really used anywhere.)
197.\" Linus talked about DOS related to MAP_EXECUTABLE, but he was thinking of
198.\" MAP_DENYWRITE?
199.TP
fea681da 200.B MAP_FILE
c13182ef
MK
201Compatibility flag.
202Ignored.
988db661 203.\" On some systems, this was required as the opposite of
83314009 204.\" MAP_ANONYMOUS -- mtk, 1 May 2007
fea681da 205.TP
51ffcca0 206.B MAP_FIXED
83314009 207Don't interpret
14f5ae6d 208.I addr
83314009 209as a hint: place the mapping at exactly that address.
14f5ae6d 210.I addr
83314009
MK
211must be a multiple of the page size.
212If the memory region specified by
14f5ae6d 213.I addr
83314009
MK
214and
215.I len
216overlaps pages of any existing mapping(s), then the overlapped
217part of the existing mapping(s) will be discarded.
218If the specified address cannot be used,
219.BR mmap ()
220will fail.
221Because requiring a fixed address for a mapping is less portable,
222the use of this option is discouraged.
fea681da 223.TP
83314009
MK
224.B MAP_GROWSDOWN
225Used for stacks.
226Indicates to the kernel virtual memory system that the mapping
5fab2e7c 227should extend downward in memory.
83314009 228.TP
76a34baa
MK
229.BR MAP_HUGETLB " (since Linux 2.6.32)"
230Allocate the mapping using "huge pages."
66a9882e 231See the Linux kernel source file
76a34baa 232.I Documentation/vm/hugetlbpage.txt
f1461fe1 233for further information, as well as NOTES, below.
76a34baa 234.TP
5d2038b6
MK
235.BR MAP_HUGE_2MB ", " MAP_HUGE_1GB " (since Linux 3.8)"
236.\" See https://lwn.net/Articles/533499/
237Used in conjunction with
238.B MAP_HUGETLB
239to select alternative hugetlb page sizes (respectively, 2 MB and 1 GB)
240on systems that support multiple hugetlb page sizes.
241
242More generally, the desired huge page size can be configured by encoding
243the base-2 logarithm of the desired page size in the six bits at the offset
244.BR MAP_HUGE_SHIFT .
245(A value of zero in this bit field provides the default huge page size;
246the default huge page size can be discovered vie the
247.I Hugepagesize
248field exposed by
249.IR /proc/meminfo .)
250Thus, the above two constants are defined as:
251
252.nf
253.in +4n
254#define MAP_HUGE_2MB (21 << MAP_HUGE_SHIFT)
255#define MAP_HUGE_1GB (30 << MAP_HUGE_SHIFT)
256.in
257.fi
258
259The range of huge page sizes that are supported by the system
260can be discovered by listing the subdirectories in
261.IR /sys/kernel/mm/hugepages .
262.TP
83314009 263.BR MAP_LOCKED " (since Linux 2.5.37)"
7e3786bc 264Mark the mmaped region to be locked in the same way as
74d32233 265.BR mlock (2).
7e3786bc
MH
266This implementation will try to populate (prefault) the whole range but
267the mmap call doesn't fail with
268.B ENOMEM
911f1c7a
MK
269if this fails.
270Therefore major faults might happen later on.
271So the semantic is not as strong as
7e3786bc 272.BR mlock (2).
911f1c7a 273One should use
7e3786bc 274.BR mmap (2)
911f1c7a 275plus
7e3786bc 276.BR mlock (2)
911f1c7a
MK
277when major faults are not acceptable after the initialization of the mapping.
278The
279.BR MAP_LOCKED
280flag is ignored in older kernels.
83314009 281.\" If set, the mapped pages will not be swapped out.
fea681da
MK
282.TP
283.BR MAP_NONBLOCK " (since Linux 2.5.46)"
51ffcca0
MK
284Only meaningful in conjunction with
285.BR MAP_POPULATE .
c13182ef 286Don't perform read-ahead:
33a0ccb2 287create page tables entries only for pages
51ffcca0 288that are already present in RAM.
7c40de08 289Since Linux 2.6.23, this flag causes
f38fa944
MK
290.BR MAP_POPULATE
291to do nothing.
487c2f05 292One day, the combination of
f38fa944
MK
293.BR MAP_POPULATE
294and
295.BR MAP_NONBLOCK
3b777aff 296may be reimplemented.
83314009
MK
297.TP
298.B MAP_NORESERVE
299Do not reserve swap space for this mapping.
300When swap space is reserved, one has the guarantee
301that it is possible to modify the mapping.
8bd58774
MK
302When swap space is not reserved one might get
303.B SIGSEGV
304upon a write
83314009
MK
305if no physical memory is available.
306See also the discussion of the file
307.I /proc/sys/vm/overcommit_memory
308in
309.BR proc (5).
33a0ccb2 310In kernels before 2.6, this flag had effect only for
83314009
MK
311private writable mappings.
312.TP
313.BR MAP_POPULATE " (since Linux 2.5.46)"
f38fa944
MK
314Populate (prefault) page tables for a mapping.
315For a file mapping, this causes read-ahead on the file.
bbebbb6d 316This will help to reduce blocking on page faults later.
f38fa944 317.BR MAP_POPULATE
33a0ccb2 318is supported for private mappings only since Linux 2.6.23.
e6205b0c
MK
319.TP
320.BR MAP_STACK " (since Linux 2.6.27)"
321Allocate the mapping at an address suitable for a process
322or thread stack.
323This flag is currently a no-op,
324but is used in the glibc threading implementation so that
325if some architectures require special treatment for stack allocations,
326support can later be transparently implemented for glibc.
67b59ff5 327.\" See http://lwn.net/Articles/294642 "Tangled up in threads", 19 Aug 08
e6205b0c
MK
328.\" commit cd98a04a59e2f94fa64d5bf1e26498d27427d5e7
329.\" http://thread.gmane.org/gmane.linux.kernel/720412
330.\" "pthread_create() slow for many threads; also time to revisit 64b
331.\" context switch optimization?"
12062404
MK
332.TP
333.BR MAP_UNINITIALIZED " (since Linux 2.6.33)"
334Don't clear anonymous pages.
335This flag is intended to improve performance on embedded devices.
33a0ccb2 336This flag is honored only if the kernel was configured with the
12062404
MK
337.B CONFIG_MMAP_ALLOW_UNINITIALIZED
338option.
339Because of the security implications,
340that option is normally enabled only on embedded devices
341(i.e., devices where one has complete control of the contents of user memory).
a62f5121 342.LP
7c7adcbe
MK
343Of the above flags, only
344.B MAP_FIXED
78cdbef7 345is specified in POSIX.1-2001 and POSIX.1-2008.
7c7adcbe
MK
346However, most systems also support
347.B MAP_ANONYMOUS
348(or its synonym
349.BR MAP_ANON ).
350.LP
2d6cfc1a
MK
351Some systems document the additional flags
352.BR MAP_AUTOGROW ,
353.BR MAP_AUTORESRV ,
354.BR MAP_COPY ,
355and
356.BR MAP_LOCAL .
fea681da 357.LP
fea681da 358Memory mapped by
1a956089 359.BR mmap ()
fea681da
MK
360is preserved across
361.BR fork (2),
362with the same attributes.
363.LP
c13182ef
MK
364A file is mapped in multiples of the page size.
365For a file that is not
fea681da 366a multiple of the page size, the remaining memory is zeroed when mapped,
c13182ef
MK
367and writes to that region are not written out to the file.
368The effect of
fea681da
MK
369changing the size of the underlying file of a mapping on the pages that
370correspond to added or removed regions of the file is unspecified.
de5f7e28 371.SS munmap()
fea681da 372The
1a956089 373.BR munmap ()
fea681da
MK
374system call deletes the mappings for the specified address range, and
375causes further references to addresses within the range to generate
c13182ef
MK
376invalid memory references.
377The region is also automatically unmapped
378when the process is terminated.
379On the other hand, closing the file
fea681da
MK
380descriptor does not unmap the region.
381.LP
382The address
14f5ae6d 383.I addr
0e824bcb
MK
384must be a multiple of the page size (but
385.I length
386need not be).
c13182ef 387All pages containing a part
fea681da 388of the indicated range are unmapped, and subsequent references
8bd58774
MK
389to these pages will generate
390.BR SIGSEGV .
c13182ef 391It is not an error if the
fea681da 392indicated range does not contain any mapped pages.
47297adb 393.SH RETURN VALUE
fea681da 394On success,
1a956089 395.BR mmap ()
fea681da
MK
396returns a pointer to the mapped area.
397On error, the value
398.B MAP_FAILED
c13182ef 399(that is,
009df872 400.IR "(void\ *)\ \-1" )
5e8cde2f 401is returned, and
fea681da 402.I errno
80691a91
MK
403is set to indicate the cause of the error.
404
fea681da 405On success,
1a956089 406.BR munmap ()
80691a91
MK
407returns 0.
408On failure, it returns \-1, and
fea681da 409.I errno
80691a91 410is set to indicate the cause of the error (probably to
51ffcca0 411.BR EINVAL ).
fea681da
MK
412.SH ERRORS
413.TP
414.B EACCES
415A file descriptor refers to a non-regular file.
5e7c71f6 416Or a file mapping was requested, but
fea681da
MK
417.I fd
418is not open for reading.
c13182ef
MK
419Or
420.B MAP_SHARED
421was requested and
422.B PROT_WRITE
51ffcca0 423is set, but
fea681da 424.I fd
682edefb
MK
425is not open in read/write
426.RB ( O_RDWR )
427mode.
c13182ef
MK
428Or
429.B PROT_WRITE
51ffcca0 430is set, but the file is append-only.
fea681da
MK
431.TP
432.B EAGAIN
83cd3686
MK
433The file has been locked, or too much memory has been locked (see
434.BR setrlimit (2)).
fea681da
MK
435.TP
436.B EBADF
437.I fd
c13182ef 438is not a valid file descriptor (and
51ffcca0
MK
439.B MAP_ANONYMOUS
440was not set).
fea681da
MK
441.TP
442.B EINVAL
443We don't like
14f5ae6d 444.IR addr ,
62a04c81 445.IR length ,
fea681da 446or
0daa9e92 447.I offset
62a04c81
MK
448(e.g., they are too large, or not aligned on a page boundary).
449.TP
450.B EINVAL
f99fc197 451(since Linux 2.6.12)
fea681da 452.I length
62a04c81
MK
453was 0.
454.TP
455.B EINVAL
456.I flags
457contained neither
458.B MAP_PRIVATE
fea681da 459or
62a04c81
MK
460.BR MAP_SHARED ,
461or contained both of these values.
fea681da
MK
462.TP
463.B ENFILE
464.\" This is for shared anonymous segments
465.\" [2.6.7] shmem_zero_setup()-->shmem_file_setup()-->get_empty_filp()
e258766b 466The system-wide limit on the total number of open files has been reached.
fea681da
MK
467.\" .TP
468.\" .B ENOEXEC
469.\" A file could not be mapped for reading.
470.TP
471.B ENODEV
9ee4a2b6 472The underlying filesystem of the specified file does not support
fea681da
MK
473memory mapping.
474.TP
475.B ENOMEM
74309bed
MK
476No memory is available.
477.TP
478.B ENOMEM
479The process's maximum number of mappings would have been exceeded.
c0b89788
MK
480This error can also occur for
481.BR munmap (2),
482when unmapping a region in the middle of an existing mapping,
483since this results in two smaller mappings on either side of
484the region being unmapped.
fea681da
MK
485.TP
486.B EPERM
487The
488.I prot
489argument asks for
490.B PROT_EXEC
9ee4a2b6 491but the mapped area belongs to a file on a filesystem that
fea681da
MK
492was mounted no-exec.
493.\" (Since 2.4.25 / 2.6.0.)
494.TP
fbab10e5
MK
495.B EPERM
496The operation was prevented by a file seal; see
497.BR fcntl (2).
498.TP
fea681da 499.B ETXTBSY
c13182ef 500.B MAP_DENYWRITE
51ffcca0 501was set but the object specified by
fea681da
MK
502.I fd
503is open for writing.
da3ce098
CH
504.TP
505.B EOVERFLOW
42b437ca
MK
506On 32-bit architecture together with the large file extension
507(i.e., using 64-bit
508.IR off_t ):
509the number of pages used for
510.I length
511plus number of pages used for
512.I offset
513would overflow
514.I "unsigned long"
515(32 bits).
fea681da
MK
516.LP
517Use of a mapped region can result in these signals:
518.TP
519.B SIGSEGV
1e321034 520Attempted write into a region mapped as read-only.
fea681da
MK
521.TP
522.B SIGBUS
523Attempted access to a portion of the buffer that does not correspond
524to the file (for example, beyond the end of the file, including the
525case where another process has truncated the file).
8fddf95a
MS
526.SH ATTRIBUTES
527For an explanation of the terms used in this section, see
528.BR attributes (7).
529.TS
530allbox;
531lbw18 lb lb
532l l l.
533Interface Attribute Value
534T{
535.BR mmap (),
536.BR munmap ()
537T} Thread safety MT-Safe
538.TE
47297adb 539.SH CONFORMING TO
78cdbef7 540POSIX.1-2001, POSIX.1-2008, SVr4, 4.4BSD.
2b2581ee
MK
541.\" SVr4 documents additional error codes ENXIO and ENODEV.
542.\" SUSv2 documents additional error codes EMFILE and EOVERFLOW.
fea681da
MK
543.SH AVAILABILITY
544On POSIX systems on which
1a956089 545.BR mmap (),
9af134cd 546.BR msync (2),
fea681da 547and
1a956089 548.BR munmap ()
fea681da
MK
549are available,
550.B _POSIX_MAPPED_FILES
6387216b
MK
551is defined in \fI<unistd.h>\fP to a value greater than 0.
552(See also
fea681da 553.BR sysconf (3).)
97c1eac8 554.\" POSIX.1-2001: It shall be defined to -1 or 0 or 200112L.
fea681da
MK
555.\" -1: unavailable, 0: ask using sysconf().
556.\" glibc defines it to 1.
a1d5f77c 557.SH NOTES
34ccb744 558On some hardware architectures (e.g., i386),
0daa9e92 559.B PROT_WRITE
f3edaabb
MK
560implies
561.BR PROT_READ .
a1d5f77c
MK
562It is architecture dependent whether
563.B PROT_READ
564implies
565.B PROT_EXEC
566or not.
567Portable programs should always set
568.B PROT_EXEC
569if they intend to execute code in the new mapping.
80d17cfa
MK
570
571The portable way to create a mapping is to specify
572.I addr
573as 0 (NULL), and omit
574.B MAP_FIXED
575from
576.IR flags .
577In this case, the system chooses the address for the mapping;
46cdb997 578the address is chosen so as not to conflict with any existing mapping,
80d17cfa
MK
579and will not be 0.
580If the
581.B MAP_FIXED
582flag is specified, and
583.I addr
491cd2f0 584is 0 (NULL), then the mapped address will be 0 (NULL).
45e97e2a
MK
585
586Certain
587.I flags
f8619b6a
MK
588constants are defined only if suitable feature test macros are defined
589(possibly by default):
590.BR _DEFAULT_SOURCE
591with glibc 2.19 or later;
592or
45e97e2a
MK
593.BR _BSD_SOURCE
594or
595.BR _SVID_SOURCE
f8619b6a 596in glibc 2.19 and earlier.
45e97e2a
MK
597(Requiring
598.BR _GNU_SOURCE
599also suffices,
600and requiring that macro specifically would have been more logical,
76c637e1 601since these flags are all Linux-specific.)
45e97e2a
MK
602The relevant flags are:
603.BR MAP_32BIT ,
604.BR MAP_ANONYMOUS
605(and the synonym
606.BR MAP_ANON ),
607.BR MAP_DENYWRITE ,
608.BR MAP_EXECUTABLE ,
609.BR MAP_FILE ,
610.BR MAP_GROWSDOWN ,
611.BR MAP_HUGETLB ,
612.BR MAP_LOCKED ,
613.BR MAP_NONBLOCK ,
614.BR MAP_NORESERVE ,
615.BR MAP_POPULATE ,
616and
617.BR MAP_STACK .
35c189fb 618.\"
0f319769
MK
619.SS Timestamps changes for file-backed mappings
620For file-backed mappings, the
621.I st_atime
622field for the mapped file may be updated at any time between the
623.BR mmap ()
624and the corresponding unmapping; the first reference to a mapped
625page will update the field if it has not been already.
626.LP
627The
628.I st_ctime
629and
630.I st_mtime
631field for a file mapped with
632.B PROT_WRITE
633and
634.B MAP_SHARED
635will be updated after
636a write to the mapped region, and before a subsequent
637.BR msync (2)
638with the
639.B MS_SYNC
640or
641.B MS_ASYNC
642flag, if one occurs.
643.\"
f1461fe1
MK
644.SS Huge page (Huge TLB) mappings
645For mappings that employ huge pages, the requirements for the arguments of
646.BR mmap ()
647and
648.BR munmap ()
649differ somewhat from the requirements for mappings
650that use the native system page size.
651
652For
653.BR mmap (),
654.I offset
655must be a multiple of the underlying huge page size.
656The system automatically aligns
657.I length
658to be a multiple of the underlying huge page size.
659
660For
661.BR munmap (),
662.I addr
663and
664.I length
665must both be a multiple of the underlying huge page size.
666.\"
0722a578 667.SS C library/kernel differences
35c189fb
MK
668This page describes the interface provided by the glibc
669.BR mmap ()
670wrapper function.
671Originally, this function invoked a system call of the same name.
672Since kernel 2.4, that system call has been superseded by
673.BR mmap2 (2),
674and nowadays
675.\" Since around glibc 2.1/2.2, depending on the platform.
676the glibc
677.BR mmap ()
678wrapper function invokes
679.BR mmap2 (2)
680with a suitably adjusted value for
681.IR offset .
fea681da 682.SH BUGS
329ad271 683On Linux, there are no guarantees like those suggested above under
c13182ef 684.BR MAP_NORESERVE .
dbc53ca8 685By default, any process can be killed
fea681da 686at any moment when the system runs out of memory.
dbc53ca8
MK
687
688In kernels before 2.6.7, the
689.B MAP_POPULATE
33a0ccb2 690flag has effect only if
dbc53ca8
MK
691.I prot
692is specified as
693.BR PROT_NONE .
c8f3e580 694
c13182ef 695SUSv3 specifies that
c8f3e580
MK
696.BR mmap ()
697should fail if
698.I length
699is 0.
700However, in kernels before 2.6.12,
701.BR mmap ()
702succeeded in this case: no mapping was created and the call returned
14f5ae6d 703.IR addr .
c8f3e580
MK
704Since kernel 2.6.12,
705.BR mmap ()
706fails with the error
707.B EINVAL
708for this case.
2e43522f 709
a780f17b
MK
710POSIX specifies that the system shall always
711zero fill any partial page at the end
b072a788 712of the object and that system will never write any modification of the
a780f17b
MK
713object beyond its end.
714On Linux, when you write data to such partial page after the end
b072a788 715of the object, the data stays in the page cache even after the file
a780f17b
MK
716is closed and unmapped
717and even though the data is never written to the file itself,
718subsequent mappings may see the modified content.
719In some cases, this could be fixed by calling
720.BR msync (2)
721before the unmap takes place;
722however, this doesn't work on tmpfs
723(for example, when using POSIX shared memory interface documented in
724.BR shm_overview (7)).
74fa61b7 725.SH EXAMPLE
2e001ad4
MK
726.\" FIXME . Add an example here that uses an anonymous shared region for
727.\" IPC between parent and child.
74fa61b7
MK
728.PP
729The following program prints part of the file specified in
730its first command-line argument to standard output.
731The range of bytes to be printed is specified via offset and length
732values in the second and third command-line arguments.
733The program creates a memory mapping of the required
734pages of the file and then uses
735.BR write (2)
736to output the desired bytes.
f30b7415 737.SS Program source
74fa61b7 738.nf
74fa61b7
MK
739#include <sys/mman.h>
740#include <sys/stat.h>
741#include <fcntl.h>
742#include <stdio.h>
743#include <stdlib.h>
744#include <unistd.h>
745
4407d3d8
MK
746#define handle_error(msg) \\
747 do { perror(msg); exit(EXIT_FAILURE); } while (0)
748
74fa61b7
MK
749int
750main(int argc, char *argv[])
751{
752 char *addr;
753 int fd;
754 struct stat sb;
755 off_t offset, pa_offset;
756 size_t length;
757 ssize_t s;
758
fbbfa7ce 759 if (argc < 3 || argc > 4) {
74fa61b7
MK
760 fprintf(stderr, "%s file offset [length]\\n", argv[0]);
761 exit(EXIT_FAILURE);
762 }
763
764 fd = open(argv[1], O_RDONLY);
4407d3d8 765 if (fd == \-1)
8568021d 766 handle_error("open");
74fa61b7 767
4407d3d8
MK
768 if (fstat(fd, &sb) == \-1) /* To obtain file size */
769 handle_error("fstat");
74fa61b7
MK
770
771 offset = atoi(argv[2]);
772 pa_offset = offset & ~(sysconf(_SC_PAGE_SIZE) \- 1);
773 /* offset for mmap() must be page aligned */
774
775 if (offset >= sb.st_size) {
776 fprintf(stderr, "offset is past end of file\\n");
777 exit(EXIT_FAILURE);
778 }
779
780 if (argc == 4) {
781 length = atoi(argv[3]);
782 if (offset + length > sb.st_size)
783 length = sb.st_size \- offset;
f81fb444 784 /* Can\(aqt display bytes past end of file */
5b6adad1 785
74fa61b7
MK
786 } else { /* No length arg ==> display to end of file */
787 length = sb.st_size \- offset;
788 }
789
790 addr = mmap(NULL, length + offset \- pa_offset, PROT_READ,
791 MAP_PRIVATE, fd, pa_offset);
4407d3d8
MK
792 if (addr == MAP_FAILED)
793 handle_error("mmap");
74fa61b7
MK
794
795 s = write(STDOUT_FILENO, addr + offset \- pa_offset, length);
796 if (s != length) {
797 if (s == \-1)
4407d3d8
MK
798 handle_error("write");
799
800 fprintf(stderr, "partial write");
74fa61b7
MK
801 exit(EXIT_FAILURE);
802 }
803
40142309
MK
804 munmap(addr, length + offset \- pa_offset);
805 close(fd);
806
74fa61b7 807 exit(EXIT_SUCCESS);
c54ed37e 808}
74fa61b7 809.fi
47297adb 810.SH SEE ALSO
fea681da 811.BR getpagesize (2),
c4d76cd9 812.BR memfd_create (2),
f75c3a3b 813.BR mincore (2),
fea681da
MK
814.BR mlock (2),
815.BR mmap2 (2),
54504ac3 816.BR mprotect (2),
fea681da
MK
817.BR mremap (2),
818.BR msync (2),
931e4e25 819.BR remap_file_pages (2),
83cd3686 820.BR setrlimit (2),
7921f13b 821.BR shmat (2),
f93af9c6
MK
822.BR shm_open (3),
823.BR shm_overview (7)
173fe7e7 824
0bf14b87
MK
825The descriptions of the following files in
826.BR proc (5):
827.IR /proc/[pid]/maps ,
828.IR /proc/[pid]/map_files ,
829and
830.IR /proc/[pid]/smaps .
831
fea681da
MK
832B.O. Gallmeister, POSIX.4, O'Reilly, pp. 128-129 and 389-391.
833.\"
834.\" Repeat after me: private read-only mappings are 100% equivalent to
835.\" shared read-only mappings. No ifs, buts, or maybes. -- Linus