After considering several other alternatives, it was decided to
adopt the mmap() definition found in SVR4 for mapping memory
objects into process address spaces. The SVR4 definition is
minimal, in that it describes only what has been built, and what
appears to be necessary for a general and portable mapping
facility.
Note that while mmap() was first designed for mapping files, it
is actually a general-purpose mapping facility. It can be used to
map any appropriate object, such as memory, files, devices, and
so on, into the address space of a process.
When a mapping is established, it is possible that the
implementation may need to map more than is requested into the
address space of the process because of hardware requirements. An
application, however, cannot count on this behavior.
Implementations that do not use a paged architecture may simply
allocate a common memory region and return the address of it;
such implementations probably do not allocate any more than is
necessary. References past the end of the requested area are
unspecified.
If an application requests a mapping that overlaps existing
mappings in the process, it might be desirable that an
implementation detect this and inform the application. However,
if the program specifies a fixed address mapping (which requires
some implementation knowledge to determine a suitable address, if
the function is supported at all), then the program is presumed
to be successfully managing its own address space and should be
trusted when it asks to map over existing data structures.
Furthermore, it is also desirable to make as few system calls as
possible, and it might be considered onerous to require an
munmap() before an mmap() to the same address range. This volume
of POSIX.1‐2017 specifies that the new mapping replaces any
existing mappings (implying an automatic munmap() on the address
range), following existing practice in this regard. The standard
developers also considered whether there should be a way for new
mappings to overlay existing mappings, but found no existing
practice for this.
It is not expected that all hardware implementations are able to
support all combinations of permissions at all addresses.
Implementations are required to disallow write access to mappings
without write permission and to disallow access to mappings
without any access permission. Other than these restrictions,
implementations may allow access types other than those requested
by the application. For example, if the application requests only
PROT_WRITE, the implementation may also allow read access. A call
to mmap() fails if the implementation cannot support allowing all
the access requested by the application. For example, some
implementations cannot support a request for both write access
and execute access simultaneously. All implementations must
support requests for no access, read access, write access, and
both read and write access. Strictly conforming code must only
rely on the required checks. These restrictions allow for
portability across a wide range of hardware.
The MAP_FIXED address treatment is likely to fail for non-page-
aligned values and for certain architecture-dependent address
ranges. Conforming implementations cannot count on being able to
choose address values for MAP_FIXED without utilizing non-
portable, implementation-defined knowledge. Nonetheless,
MAP_FIXED is provided as a standard interface conforming to
existing practice for utilizing such knowledge when it is
available.
Similarly, in order to allow implementations that do not support
virtual addresses, support for directly specifying any mapping
addresses via MAP_FIXED is not required and thus a conforming
application may not count on it.
The MAP_PRIVATE function can be implemented efficiently when
memory protection hardware is available. When such hardware is
not available, implementations can implement such ``mappings'' by
simply making a real copy of the relevant data into process
private memory, though this tends to behave similarly to read().
The function has been defined to allow for many different models
of using shared memory. However, all uses are not equally
portable across all machine architectures. In particular, the
mmap() function allows the system as well as the application to
specify the address at which to map a specific region of a memory
object. The most portable way to use the function is always to
let the system choose the address, specifying NULL as the value
for the argument addr and not to specify MAP_FIXED.
If it is intended that a particular region of a memory object be
mapped at the same address in a group of processes (on machines
where this is even possible), then MAP_FIXED can be used to pass
in the desired mapping address. The system can still be used to
choose the desired address if the first such mapping is made
without specifying MAP_FIXED, and then the resulting mapping
address can be passed to subsequent processes for them to pass in
via MAP_FIXED. The availability of a specific address range
cannot be guaranteed, in general.
The mmap() function can be used to map a region of memory that is
larger than the current size of the object. Memory access within
the mapping but beyond the current end of the underlying objects
may result in SIGBUS signals being sent to the process. The
reason for this is that the size of the object can be manipulated
by other processes and can change at any moment. The
implementation should tell the application that a memory
reference is outside the object where this can be detected;
otherwise, written data may be lost and read data may not reflect
actual data in the object.
Note that references beyond the end of the object do not extend
the object as the new end cannot be determined precisely by most
virtual memory hardware. Instead, the size can be directly
manipulated by ftruncate().
Process memory locking does apply to shared memory regions, and
the MCL_FUTURE argument to mlockall() can be relied upon to cause
new shared memory regions to be automatically locked.
Existing implementations of mmap() return the value -1 when
unsuccessful. Since the casting of this value to type void *
cannot be guaranteed by the ISO C standard to be distinct from a
successful value, this volume of POSIX.1‐2017 defines the symbol
MAP_FAILED, which a conforming implementation does not return as
the result of a successful call.