xref: /openbmc/qemu/util/oslib-win32.c (revision d6fd5d83)
1 /*
2  * os-win32.c
3  *
4  * Copyright (c) 2003-2008 Fabrice Bellard
5  * Copyright (c) 2010-2016 Red Hat, Inc.
6  *
7  * QEMU library functions for win32 which are shared between QEMU and
8  * the QEMU tools.
9  *
10  * Permission is hereby granted, free of charge, to any person obtaining a copy
11  * of this software and associated documentation files (the "Software"), to deal
12  * in the Software without restriction, including without limitation the rights
13  * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
14  * copies of the Software, and to permit persons to whom the Software is
15  * furnished to do so, subject to the following conditions:
16  *
17  * The above copyright notice and this permission notice shall be included in
18  * all copies or substantial portions of the Software.
19  *
20  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
21  * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
22  * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
23  * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
24  * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
25  * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
26  * THE SOFTWARE.
27  */
28 
29 #include "qemu/osdep.h"
30 #include <windows.h>
31 #include "qapi/error.h"
32 #include "qemu/main-loop.h"
33 #include "trace.h"
34 #include "qemu/sockets.h"
35 #include "qemu/cutils.h"
36 #include "qemu/error-report.h"
37 #include <malloc.h>
38 
39 static int get_allocation_granularity(void)
40 {
41     SYSTEM_INFO system_info;
42 
43     GetSystemInfo(&system_info);
44     return system_info.dwAllocationGranularity;
45 }
46 
47 void *qemu_anon_ram_alloc(size_t size, uint64_t *align, bool shared,
48                           bool noreserve)
49 {
50     void *ptr;
51 
52     if (noreserve) {
53         /*
54          * We need a MEM_COMMIT before accessing any memory in a MEM_RESERVE
55          * area; we cannot easily mimic POSIX MAP_NORESERVE semantics.
56          */
57         error_report("Skipping reservation of swap space is not supported.");
58         return NULL;
59     }
60 
61     ptr = VirtualAlloc(NULL, size, MEM_COMMIT, PAGE_READWRITE);
62     trace_qemu_anon_ram_alloc(size, ptr);
63 
64     if (ptr && align) {
65         *align = MAX(get_allocation_granularity(), getpagesize());
66     }
67     return ptr;
68 }
69 
70 void qemu_anon_ram_free(void *ptr, size_t size)
71 {
72     trace_qemu_anon_ram_free(ptr, size);
73     if (ptr) {
74         VirtualFree(ptr, 0, MEM_RELEASE);
75     }
76 }
77 
78 #ifndef _POSIX_THREAD_SAFE_FUNCTIONS
79 /* FIXME: add proper locking */
80 struct tm *gmtime_r(const time_t *timep, struct tm *result)
81 {
82     struct tm *p = gmtime(timep);
83     memset(result, 0, sizeof(*result));
84     if (p) {
85         *result = *p;
86         p = result;
87     }
88     return p;
89 }
90 
91 /* FIXME: add proper locking */
92 struct tm *localtime_r(const time_t *timep, struct tm *result)
93 {
94     struct tm *p = localtime(timep);
95     memset(result, 0, sizeof(*result));
96     if (p) {
97         *result = *p;
98         p = result;
99     }
100     return p;
101 }
102 #endif /* _POSIX_THREAD_SAFE_FUNCTIONS */
103 
104 static int socket_error(void)
105 {
106     switch (WSAGetLastError()) {
107     case 0:
108         return 0;
109     case WSAEINTR:
110         return EINTR;
111     case WSAEINVAL:
112         return EINVAL;
113     case WSA_INVALID_HANDLE:
114         return EBADF;
115     case WSA_NOT_ENOUGH_MEMORY:
116         return ENOMEM;
117     case WSA_INVALID_PARAMETER:
118         return EINVAL;
119     case WSAENAMETOOLONG:
120         return ENAMETOOLONG;
121     case WSAENOTEMPTY:
122         return ENOTEMPTY;
123     case WSAEWOULDBLOCK:
124          /* not using EWOULDBLOCK as we don't want code to have
125           * to check both EWOULDBLOCK and EAGAIN */
126         return EAGAIN;
127     case WSAEINPROGRESS:
128         return EINPROGRESS;
129     case WSAEALREADY:
130         return EALREADY;
131     case WSAENOTSOCK:
132         return ENOTSOCK;
133     case WSAEDESTADDRREQ:
134         return EDESTADDRREQ;
135     case WSAEMSGSIZE:
136         return EMSGSIZE;
137     case WSAEPROTOTYPE:
138         return EPROTOTYPE;
139     case WSAENOPROTOOPT:
140         return ENOPROTOOPT;
141     case WSAEPROTONOSUPPORT:
142         return EPROTONOSUPPORT;
143     case WSAEOPNOTSUPP:
144         return EOPNOTSUPP;
145     case WSAEAFNOSUPPORT:
146         return EAFNOSUPPORT;
147     case WSAEADDRINUSE:
148         return EADDRINUSE;
149     case WSAEADDRNOTAVAIL:
150         return EADDRNOTAVAIL;
151     case WSAENETDOWN:
152         return ENETDOWN;
153     case WSAENETUNREACH:
154         return ENETUNREACH;
155     case WSAENETRESET:
156         return ENETRESET;
157     case WSAECONNABORTED:
158         return ECONNABORTED;
159     case WSAECONNRESET:
160         return ECONNRESET;
161     case WSAENOBUFS:
162         return ENOBUFS;
163     case WSAEISCONN:
164         return EISCONN;
165     case WSAENOTCONN:
166         return ENOTCONN;
167     case WSAETIMEDOUT:
168         return ETIMEDOUT;
169     case WSAECONNREFUSED:
170         return ECONNREFUSED;
171     case WSAELOOP:
172         return ELOOP;
173     case WSAEHOSTUNREACH:
174         return EHOSTUNREACH;
175     default:
176         return EIO;
177     }
178 }
179 
180 void qemu_socket_set_block(int fd)
181 {
182     unsigned long opt = 0;
183     qemu_socket_unselect(fd, NULL);
184     ioctlsocket(fd, FIONBIO, &opt);
185 }
186 
187 int qemu_socket_try_set_nonblock(int fd)
188 {
189     unsigned long opt = 1;
190     if (ioctlsocket(fd, FIONBIO, &opt) != NO_ERROR) {
191         return -socket_error();
192     }
193     return 0;
194 }
195 
196 void qemu_socket_set_nonblock(int fd)
197 {
198     (void)qemu_socket_try_set_nonblock(fd);
199 }
200 
201 int socket_set_fast_reuse(int fd)
202 {
203     /* Enabling the reuse of an endpoint that was used by a socket still in
204      * TIME_WAIT state is usually performed by setting SO_REUSEADDR. On Windows
205      * fast reuse is the default and SO_REUSEADDR does strange things. So we
206      * don't have to do anything here. More info can be found at:
207      * http://msdn.microsoft.com/en-us/library/windows/desktop/ms740621.aspx */
208     return 0;
209 }
210 
211 int inet_aton(const char *cp, struct in_addr *ia)
212 {
213     uint32_t addr = inet_addr(cp);
214     if (addr == 0xffffffff) {
215         return 0;
216     }
217     ia->s_addr = addr;
218     return 1;
219 }
220 
221 void qemu_set_cloexec(int fd)
222 {
223 }
224 
225 int qemu_get_thread_id(void)
226 {
227     return GetCurrentThreadId();
228 }
229 
230 char *
231 qemu_get_local_state_dir(void)
232 {
233     const char * const *data_dirs = g_get_system_data_dirs();
234 
235     g_assert(data_dirs && data_dirs[0]);
236 
237     return g_strdup(data_dirs[0]);
238 }
239 
240 void qemu_set_tty_echo(int fd, bool echo)
241 {
242     HANDLE handle = (HANDLE)_get_osfhandle(fd);
243     DWORD dwMode = 0;
244 
245     if (handle == INVALID_HANDLE_VALUE) {
246         return;
247     }
248 
249     GetConsoleMode(handle, &dwMode);
250 
251     if (echo) {
252         SetConsoleMode(handle, dwMode | ENABLE_ECHO_INPUT | ENABLE_LINE_INPUT);
253     } else {
254         SetConsoleMode(handle,
255                        dwMode & ~(ENABLE_ECHO_INPUT | ENABLE_LINE_INPUT));
256     }
257 }
258 
259 int getpagesize(void)
260 {
261     SYSTEM_INFO system_info;
262 
263     GetSystemInfo(&system_info);
264     return system_info.dwPageSize;
265 }
266 
267 bool qemu_prealloc_mem(int fd, char *area, size_t sz, int max_threads,
268                        ThreadContext *tc, bool async, Error **errp)
269 {
270     int i;
271     size_t pagesize = qemu_real_host_page_size();
272 
273     sz = (sz + pagesize - 1) & -pagesize;
274     for (i = 0; i < sz / pagesize; i++) {
275         memset(area + pagesize * i, 0, 1);
276     }
277 
278     return true;
279 }
280 
281 bool qemu_finish_async_prealloc_mem(Error **errp)
282 {
283     /* async prealloc not supported, there is nothing to finish */
284     return true;
285 }
286 
287 char *qemu_get_pid_name(pid_t pid)
288 {
289     /* XXX Implement me */
290     abort();
291 }
292 
293 
294 bool qemu_socket_select(int sockfd, WSAEVENT hEventObject,
295                         long lNetworkEvents, Error **errp)
296 {
297     SOCKET s = _get_osfhandle(sockfd);
298 
299     if (errp == NULL) {
300         errp = &error_warn;
301     }
302 
303     if (s == INVALID_SOCKET) {
304         error_setg(errp, "invalid socket fd=%d", sockfd);
305         return false;
306     }
307 
308     if (WSAEventSelect(s, hEventObject, lNetworkEvents) != 0) {
309         error_setg_win32(errp, WSAGetLastError(), "failed to WSAEventSelect()");
310         return false;
311     }
312 
313     return true;
314 }
315 
316 bool qemu_socket_unselect(int sockfd, Error **errp)
317 {
318     return qemu_socket_select(sockfd, NULL, 0, errp);
319 }
320 
321 int qemu_socketpair(int domain, int type, int protocol, int sv[2])
322 {
323     struct sockaddr_un addr = {
324         0,
325     };
326     socklen_t socklen;
327     int listener = -1;
328     int client = -1;
329     int server = -1;
330     g_autofree char *path = NULL;
331     int tmpfd;
332     u_long arg;
333     int ret = -1;
334 
335     g_return_val_if_fail(sv != NULL, -1);
336 
337     addr.sun_family = AF_UNIX;
338     socklen = sizeof(addr);
339 
340     tmpfd = g_file_open_tmp(NULL, &path, NULL);
341     if (tmpfd == -1 || !path) {
342         errno = EACCES;
343         goto out;
344     }
345 
346     close(tmpfd);
347 
348     if (strlen(path) >= sizeof(addr.sun_path)) {
349         errno = EINVAL;
350         goto out;
351     }
352 
353     strncpy(addr.sun_path, path, sizeof(addr.sun_path) - 1);
354 
355     listener = socket(domain, type, protocol);
356     if (listener == -1) {
357         goto out;
358     }
359 
360     if (DeleteFile(path) == 0 && GetLastError() != ERROR_FILE_NOT_FOUND) {
361         errno = EACCES;
362         goto out;
363     }
364     g_clear_pointer(&path, g_free);
365 
366     if (bind(listener, (struct sockaddr *)&addr, socklen) == -1) {
367         goto out;
368     }
369 
370     if (listen(listener, 1) == -1) {
371         goto out;
372     }
373 
374     client = socket(domain, type, protocol);
375     if (client == -1) {
376         goto out;
377     }
378 
379     arg = 1;
380     if (ioctlsocket(client, FIONBIO, &arg) != NO_ERROR) {
381         goto out;
382     }
383 
384     if (connect(client, (struct sockaddr *)&addr, socklen) == -1 &&
385         WSAGetLastError() != WSAEWOULDBLOCK) {
386         goto out;
387     }
388 
389     server = accept(listener, NULL, NULL);
390     if (server == -1) {
391         goto out;
392     }
393 
394     arg = 0;
395     if (ioctlsocket(client, FIONBIO, &arg) != NO_ERROR) {
396         goto out;
397     }
398 
399     arg = 0;
400     if (ioctlsocket(client, SIO_AF_UNIX_GETPEERPID, &arg) != NO_ERROR) {
401         goto out;
402     }
403 
404     if (arg != GetCurrentProcessId()) {
405         errno = EPERM;
406         goto out;
407     }
408 
409     sv[0] = server;
410     server = -1;
411     sv[1] = client;
412     client = -1;
413     ret = 0;
414 
415 out:
416     if (listener != -1) {
417         close(listener);
418     }
419     if (client != -1) {
420         close(client);
421     }
422     if (server != -1) {
423         close(server);
424     }
425     if (path) {
426         DeleteFile(path);
427     }
428     return ret;
429 }
430 
431 #undef connect
432 int qemu_connect_wrap(int sockfd, const struct sockaddr *addr,
433                       socklen_t addrlen)
434 {
435     int ret;
436     SOCKET s = _get_osfhandle(sockfd);
437 
438     if (s == INVALID_SOCKET) {
439         return -1;
440     }
441 
442     ret = connect(s, addr, addrlen);
443     if (ret < 0) {
444         if (WSAGetLastError() == WSAEWOULDBLOCK) {
445             errno = EINPROGRESS;
446         } else {
447             errno = socket_error();
448         }
449     }
450     return ret;
451 }
452 
453 
454 #undef listen
455 int qemu_listen_wrap(int sockfd, int backlog)
456 {
457     int ret;
458     SOCKET s = _get_osfhandle(sockfd);
459 
460     if (s == INVALID_SOCKET) {
461         return -1;
462     }
463 
464     ret = listen(s, backlog);
465     if (ret < 0) {
466         errno = socket_error();
467     }
468     return ret;
469 }
470 
471 
472 #undef bind
473 int qemu_bind_wrap(int sockfd, const struct sockaddr *addr,
474                    socklen_t addrlen)
475 {
476     int ret;
477     SOCKET s = _get_osfhandle(sockfd);
478 
479     if (s == INVALID_SOCKET) {
480         return -1;
481     }
482 
483     ret = bind(s, addr, addrlen);
484     if (ret < 0) {
485         errno = socket_error();
486     }
487     return ret;
488 }
489 
490 QEMU_USED EXCEPTION_DISPOSITION
491 win32_close_exception_handler(struct _EXCEPTION_RECORD *exception_record,
492                               void *registration, struct _CONTEXT *context,
493                               void *dispatcher)
494 {
495     return EXCEPTION_EXECUTE_HANDLER;
496 }
497 
498 #undef close
499 int qemu_close_socket_osfhandle(int fd)
500 {
501     SOCKET s = _get_osfhandle(fd);
502     DWORD flags = 0;
503 
504     /*
505      * If we were to just call _close on the descriptor, it would close the
506      * HANDLE, but it wouldn't free any of the resources associated to the
507      * SOCKET, and we can't call _close after calling closesocket, because
508      * closesocket has already closed the HANDLE, and _close would attempt to
509      * close the HANDLE again, resulting in a double free. We can however
510      * protect the HANDLE from actually being closed long enough to close the
511      * file descriptor, then close the socket itself.
512      */
513     if (!GetHandleInformation((HANDLE)s, &flags)) {
514         errno = EACCES;
515         return -1;
516     }
517 
518     if (!SetHandleInformation((HANDLE)s, HANDLE_FLAG_PROTECT_FROM_CLOSE, HANDLE_FLAG_PROTECT_FROM_CLOSE)) {
519         errno = EACCES;
520         return -1;
521     }
522 
523     __try1(win32_close_exception_handler) {
524         /*
525          * close() returns EBADF since we PROTECT_FROM_CLOSE the underlying
526          * handle, but the FD is actually freed
527          */
528         if (close(fd) < 0 && errno != EBADF) {
529             return -1;
530         }
531     }
532     __except1 {
533     }
534 
535     if (!SetHandleInformation((HANDLE)s, flags, flags)) {
536         errno = EACCES;
537         return -1;
538     }
539 
540     return 0;
541 }
542 
543 int qemu_close_wrap(int fd)
544 {
545     SOCKET s = INVALID_SOCKET;
546     int ret = -1;
547 
548     if (!fd_is_socket(fd)) {
549         return close(fd);
550     }
551 
552     s = _get_osfhandle(fd);
553     qemu_close_socket_osfhandle(fd);
554 
555     ret = closesocket(s);
556     if (ret < 0) {
557         errno = socket_error();
558     }
559 
560     return ret;
561 }
562 
563 
564 #undef socket
565 int qemu_socket_wrap(int domain, int type, int protocol)
566 {
567     SOCKET s;
568     int fd;
569 
570     s = socket(domain, type, protocol);
571     if (s == -1) {
572         errno = socket_error();
573         return -1;
574     }
575 
576     fd = _open_osfhandle(s, _O_BINARY);
577     if (fd < 0) {
578         closesocket(s);
579         /* _open_osfhandle may not set errno, and closesocket() may override it */
580         errno = ENOMEM;
581     }
582 
583     return fd;
584 }
585 
586 
587 #undef accept
588 int qemu_accept_wrap(int sockfd, struct sockaddr *addr,
589                      socklen_t *addrlen)
590 {
591     int fd;
592     SOCKET s = _get_osfhandle(sockfd);
593 
594     if (s == INVALID_SOCKET) {
595         return -1;
596     }
597 
598     s = accept(s, addr, addrlen);
599     if (s == -1) {
600         errno = socket_error();
601         return -1;
602     }
603 
604     fd = _open_osfhandle(s, _O_BINARY);
605     if (fd < 0) {
606         closesocket(s);
607         /* _open_osfhandle may not set errno, and closesocket() may override it */
608         errno = ENOMEM;
609     }
610 
611     return fd;
612 }
613 
614 
615 #undef shutdown
616 int qemu_shutdown_wrap(int sockfd, int how)
617 {
618     int ret;
619     SOCKET s = _get_osfhandle(sockfd);
620 
621     if (s == INVALID_SOCKET) {
622         return -1;
623     }
624 
625     ret = shutdown(s, how);
626     if (ret < 0) {
627         errno = socket_error();
628     }
629     return ret;
630 }
631 
632 
633 #undef ioctlsocket
634 int qemu_ioctlsocket_wrap(int fd, int req, void *val)
635 {
636     int ret;
637     SOCKET s = _get_osfhandle(fd);
638 
639     if (s == INVALID_SOCKET) {
640         return -1;
641     }
642 
643     ret = ioctlsocket(s, req, val);
644     if (ret < 0) {
645         errno = socket_error();
646     }
647     return ret;
648 }
649 
650 
651 #undef getsockopt
652 int qemu_getsockopt_wrap(int sockfd, int level, int optname,
653                          void *optval, socklen_t *optlen)
654 {
655     int ret;
656     SOCKET s = _get_osfhandle(sockfd);
657 
658     if (s == INVALID_SOCKET) {
659         return -1;
660     }
661 
662     ret = getsockopt(s, level, optname, optval, optlen);
663     if (ret < 0) {
664         errno = socket_error();
665     }
666     return ret;
667 }
668 
669 
670 #undef setsockopt
671 int qemu_setsockopt_wrap(int sockfd, int level, int optname,
672                          const void *optval, socklen_t optlen)
673 {
674     int ret;
675     SOCKET s = _get_osfhandle(sockfd);
676 
677     if (s == INVALID_SOCKET) {
678         return -1;
679     }
680 
681     ret = setsockopt(s, level, optname, optval, optlen);
682     if (ret < 0) {
683         errno = socket_error();
684     }
685     return ret;
686 }
687 
688 
689 #undef getpeername
690 int qemu_getpeername_wrap(int sockfd, struct sockaddr *addr,
691                           socklen_t *addrlen)
692 {
693     int ret;
694     SOCKET s = _get_osfhandle(sockfd);
695 
696     if (s == INVALID_SOCKET) {
697         return -1;
698     }
699 
700     ret = getpeername(s, addr, addrlen);
701     if (ret < 0) {
702         errno = socket_error();
703     }
704     return ret;
705 }
706 
707 
708 #undef getsockname
709 int qemu_getsockname_wrap(int sockfd, struct sockaddr *addr,
710                           socklen_t *addrlen)
711 {
712     int ret;
713     SOCKET s = _get_osfhandle(sockfd);
714 
715     if (s == INVALID_SOCKET) {
716         return -1;
717     }
718 
719     ret = getsockname(s, addr, addrlen);
720     if (ret < 0) {
721         errno = socket_error();
722     }
723     return ret;
724 }
725 
726 
727 #undef send
728 ssize_t qemu_send_wrap(int sockfd, const void *buf, size_t len, int flags)
729 {
730     int ret;
731     SOCKET s = _get_osfhandle(sockfd);
732 
733     if (s == INVALID_SOCKET) {
734         return -1;
735     }
736 
737     ret = send(s, buf, len, flags);
738     if (ret < 0) {
739         errno = socket_error();
740     }
741     return ret;
742 }
743 
744 
745 #undef sendto
746 ssize_t qemu_sendto_wrap(int sockfd, const void *buf, size_t len, int flags,
747                          const struct sockaddr *addr, socklen_t addrlen)
748 {
749     int ret;
750     SOCKET s = _get_osfhandle(sockfd);
751 
752     if (s == INVALID_SOCKET) {
753         return -1;
754     }
755 
756     ret = sendto(s, buf, len, flags, addr, addrlen);
757     if (ret < 0) {
758         errno = socket_error();
759     }
760     return ret;
761 }
762 
763 
764 #undef recv
765 ssize_t qemu_recv_wrap(int sockfd, void *buf, size_t len, int flags)
766 {
767     int ret;
768     SOCKET s = _get_osfhandle(sockfd);
769 
770     if (s == INVALID_SOCKET) {
771         return -1;
772     }
773 
774     ret = recv(s, buf, len, flags);
775     if (ret < 0) {
776         errno = socket_error();
777     }
778     return ret;
779 }
780 
781 
782 #undef recvfrom
783 ssize_t qemu_recvfrom_wrap(int sockfd, void *buf, size_t len, int flags,
784                            struct sockaddr *addr, socklen_t *addrlen)
785 {
786     int ret;
787     SOCKET s = _get_osfhandle(sockfd);
788 
789     if (s == INVALID_SOCKET) {
790         return -1;
791     }
792 
793     ret = recvfrom(s, buf, len, flags, addr, addrlen);
794     if (ret < 0) {
795         errno = socket_error();
796     }
797     return ret;
798 }
799 
800 bool qemu_write_pidfile(const char *filename, Error **errp)
801 {
802     char buffer[128];
803     int len;
804     HANDLE file;
805     OVERLAPPED overlap;
806     BOOL ret;
807     memset(&overlap, 0, sizeof(overlap));
808 
809     file = CreateFile(filename, GENERIC_WRITE, FILE_SHARE_READ, NULL,
810                       OPEN_ALWAYS, FILE_ATTRIBUTE_NORMAL, NULL);
811 
812     if (file == INVALID_HANDLE_VALUE) {
813         error_setg(errp, "Failed to create PID file");
814         return false;
815     }
816     len = snprintf(buffer, sizeof(buffer), FMT_pid "\n", (pid_t)getpid());
817     ret = WriteFile(file, (LPCVOID)buffer, (DWORD)len,
818                     NULL, &overlap);
819     CloseHandle(file);
820     if (ret == 0) {
821         error_setg(errp, "Failed to write PID file");
822         return false;
823     }
824     return true;
825 }
826 
827 size_t qemu_get_host_physmem(void)
828 {
829     MEMORYSTATUSEX statex;
830     statex.dwLength = sizeof(statex);
831 
832     if (GlobalMemoryStatusEx(&statex)) {
833         return statex.ullTotalPhys;
834     }
835     return 0;
836 }
837 
838 int qemu_msync(void *addr, size_t length, int fd)
839 {
840     /**
841      * Perform the sync based on the file descriptor
842      * The sync range will most probably be wider than the one
843      * requested - but it will still get the job done
844      */
845     return qemu_fdatasync(fd);
846 }
847 
848 void *qemu_win32_map_alloc(size_t size, HANDLE *h, Error **errp)
849 {
850     void *bits;
851 
852     trace_win32_map_alloc(size);
853 
854     *h = CreateFileMapping(INVALID_HANDLE_VALUE, NULL, PAGE_READWRITE, 0,
855                           size, NULL);
856     if (*h == NULL) {
857         error_setg_win32(errp, GetLastError(), "Failed to CreateFileMapping");
858         return NULL;
859     }
860 
861     bits = MapViewOfFile(*h, FILE_MAP_ALL_ACCESS, 0, 0, size);
862     if (bits == NULL) {
863         error_setg_win32(errp, GetLastError(), "Failed to MapViewOfFile");
864         CloseHandle(*h);
865         return NULL;
866     }
867 
868     return bits;
869 }
870 
871 void qemu_win32_map_free(void *ptr, HANDLE h, Error **errp)
872 {
873     trace_win32_map_free(ptr, h);
874 
875     if (UnmapViewOfFile(ptr) == 0) {
876         error_setg_win32(errp, GetLastError(), "Failed to UnmapViewOfFile");
877     }
878     CloseHandle(h);
879 }
880