mirror of
https://github.com/astaxie/beego.git
synced 2024-11-05 12:40:56 +00:00
126 lines
3.7 KiB
Go
126 lines
3.7 KiB
Go
// Copyright 2011 Evan Shaw. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style
|
|
// license that can be found in the LICENSE file.
|
|
|
|
package mmap
|
|
|
|
import (
|
|
"errors"
|
|
"os"
|
|
"sync"
|
|
"syscall"
|
|
)
|
|
|
|
// mmap on Windows is a two-step process.
|
|
// First, we call CreateFileMapping to get a handle.
|
|
// Then, we call MapviewToFile to get an actual pointer into memory.
|
|
// Because we want to emulate a POSIX-style mmap, we don't want to expose
|
|
// the handle -- only the pointer. We also want to return only a byte slice,
|
|
// not a struct, so it's convenient to manipulate.
|
|
|
|
// We keep this map so that we can get back the original handle from the memory address.
|
|
var handleLock sync.Mutex
|
|
var handleMap = map[uintptr]syscall.Handle{}
|
|
|
|
func mmap(len int, prot, flags, hfile uintptr, off int64) ([]byte, error) {
|
|
flProtect := uint32(syscall.PAGE_READONLY)
|
|
dwDesiredAccess := uint32(syscall.FILE_MAP_READ)
|
|
switch {
|
|
case prot© != 0:
|
|
flProtect = syscall.PAGE_WRITECOPY
|
|
dwDesiredAccess = syscall.FILE_MAP_COPY
|
|
case prot&RDWR != 0:
|
|
flProtect = syscall.PAGE_READWRITE
|
|
dwDesiredAccess = syscall.FILE_MAP_WRITE
|
|
}
|
|
if prot&EXEC != 0 {
|
|
flProtect <<= 4
|
|
dwDesiredAccess |= syscall.FILE_MAP_EXECUTE
|
|
}
|
|
|
|
// The maximum size is the area of the file, starting from 0,
|
|
// that we wish to allow to be mappable. It is the sum of
|
|
// the length the user requested, plus the offset where that length
|
|
// is starting from. This does not map the data into memory.
|
|
maxSizeHigh := uint32((off + int64(len)) >> 32)
|
|
maxSizeLow := uint32((off + int64(len)) & 0xFFFFFFFF)
|
|
// TODO: Do we need to set some security attributes? It might help portability.
|
|
h, errno := syscall.CreateFileMapping(syscall.Handle(hfile), nil, flProtect, maxSizeHigh, maxSizeLow, nil)
|
|
if h == 0 {
|
|
return nil, os.NewSyscallError("CreateFileMapping", errno)
|
|
}
|
|
|
|
// Actually map a view of the data into memory. The view's size
|
|
// is the length the user requested.
|
|
fileOffsetHigh := uint32(off >> 32)
|
|
fileOffsetLow := uint32(off & 0xFFFFFFFF)
|
|
addr, errno := syscall.MapViewOfFile(h, dwDesiredAccess, fileOffsetHigh, fileOffsetLow, uintptr(len))
|
|
if addr == 0 {
|
|
return nil, os.NewSyscallError("MapViewOfFile", errno)
|
|
}
|
|
handleLock.Lock()
|
|
handleMap[addr] = h
|
|
handleLock.Unlock()
|
|
|
|
m := MMap{}
|
|
dh := m.header()
|
|
dh.Data = addr
|
|
dh.Len = len
|
|
dh.Cap = dh.Len
|
|
|
|
return m, nil
|
|
}
|
|
|
|
func flush(addr, len uintptr) error {
|
|
errno := syscall.FlushViewOfFile(addr, len)
|
|
if errno != nil {
|
|
return os.NewSyscallError("FlushViewOfFile", errno)
|
|
}
|
|
|
|
handleLock.Lock()
|
|
defer handleLock.Unlock()
|
|
handle, ok := handleMap[addr]
|
|
if !ok {
|
|
// should be impossible; we would've errored above
|
|
return errors.New("unknown base address")
|
|
}
|
|
|
|
errno = syscall.FlushFileBuffers(handle)
|
|
return os.NewSyscallError("FlushFileBuffers", errno)
|
|
}
|
|
|
|
func lock(addr, len uintptr) error {
|
|
errno := syscall.VirtualLock(addr, len)
|
|
return os.NewSyscallError("VirtualLock", errno)
|
|
}
|
|
|
|
func unlock(addr, len uintptr) error {
|
|
errno := syscall.VirtualUnlock(addr, len)
|
|
return os.NewSyscallError("VirtualUnlock", errno)
|
|
}
|
|
|
|
func unmap(addr, len uintptr) error {
|
|
flush(addr, len)
|
|
// Lock the UnmapViewOfFile along with the handleMap deletion.
|
|
// As soon as we unmap the view, the OS is free to give the
|
|
// same addr to another new map. We don't want another goroutine
|
|
// to insert and remove the same addr into handleMap while
|
|
// we're trying to remove our old addr/handle pair.
|
|
handleLock.Lock()
|
|
defer handleLock.Unlock()
|
|
err := syscall.UnmapViewOfFile(addr)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
handle, ok := handleMap[addr]
|
|
if !ok {
|
|
// should be impossible; we would've errored above
|
|
return errors.New("unknown base address")
|
|
}
|
|
delete(handleMap, addr)
|
|
|
|
e := syscall.CloseHandle(syscall.Handle(handle))
|
|
return os.NewSyscallError("CloseHandle", e)
|
|
}
|