123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574 |
- // [AsmJit]
- // Machine Code Generation for C++.
- //
- // [License]
- // Zlib - See LICENSE.md file in the package.
- #define ASMJIT_EXPORTS
- #include "../core/build.h"
- #ifndef ASMJIT_NO_JIT
- #include "../core/osutils.h"
- #include "../core/string.h"
- #include "../core/support.h"
- #include "../core/virtmem.h"
- #if !defined(_WIN32)
- #include <errno.h>
- #include <fcntl.h>
- #include <sys/mman.h>
- #include <sys/stat.h>
- #include <sys/types.h>
- #include <unistd.h>
- // Linux has a `memfd_create` syscall that we would like to use, if available.
- #if defined(__linux__)
- #include <sys/syscall.h>
- #endif
- // Apple recently introduced MAP_JIT flag, which we want to use.
- #if defined(__APPLE__)
- #include <TargetConditionals.h>
- #if TARGET_OS_OSX
- #include <sys/utsname.h>
- #endif
- // Older SDK doesn't define `MAP_JIT`.
- #ifndef MAP_JIT
- #define MAP_JIT 0x800
- #endif
- #endif
- // BSD/OSX: `MAP_ANONYMOUS` is not defined, `MAP_ANON` is.
- #if !defined(MAP_ANONYMOUS)
- #define MAP_ANONYMOUS MAP_ANON
- #endif
- #endif
- #include <atomic>
- #if defined(__APPLE__)
- #define ASMJIT_VM_SHM_DETECT 0
- #else
- #define ASMJIT_VM_SHM_DETECT 1
- #endif
- ASMJIT_BEGIN_NAMESPACE
- // ============================================================================
- // [asmjit::VirtMem - Utilities]
- // ============================================================================
- static const uint32_t VirtMem_dualMappingFilter[2] = {
- VirtMem::kAccessWrite,
- VirtMem::kAccessExecute
- };
- // ============================================================================
- // [asmjit::VirtMem - Virtual Memory [Windows]]
- // ============================================================================
- #if defined(_WIN32)
- struct ScopedHandle {
- inline ScopedHandle() noexcept
- : value(nullptr) {}
- inline ~ScopedHandle() noexcept {
- if (value != nullptr)
- ::CloseHandle(value);
- }
- HANDLE value;
- };
- static void VirtMem_getInfo(VirtMem::Info& vmInfo) noexcept {
- SYSTEM_INFO systemInfo;
- ::GetSystemInfo(&systemInfo);
- vmInfo.pageSize = Support::alignUpPowerOf2<uint32_t>(systemInfo.dwPageSize);
- vmInfo.pageGranularity = systemInfo.dwAllocationGranularity;
- }
- // Windows specific implementation that uses `VirtualAlloc` and `VirtualFree`.
- static DWORD VirtMem_accessToWinProtectFlags(uint32_t flags) noexcept {
- DWORD protectFlags;
- // READ|WRITE|EXECUTE.
- if (flags & VirtMem::kAccessExecute)
- protectFlags = (flags & VirtMem::kAccessWrite) ? PAGE_EXECUTE_READWRITE : PAGE_EXECUTE_READ;
- else if (flags & VirtMem::kAccessReadWrite)
- protectFlags = (flags & VirtMem::kAccessWrite) ? PAGE_READWRITE : PAGE_READONLY;
- else
- protectFlags = PAGE_NOACCESS;
- // Any other flags to consider?
- return protectFlags;
- }
- static DWORD VirtMem_accessToWinDesiredAccess(uint32_t flags) noexcept {
- DWORD access = (flags & VirtMem::kAccessWrite) ? FILE_MAP_WRITE : FILE_MAP_READ;
- if (flags & VirtMem::kAccessExecute)
- access |= FILE_MAP_EXECUTE;
- return access;
- }
- Error VirtMem::alloc(void** p, size_t size, uint32_t flags) noexcept {
- *p = nullptr;
- if (size == 0)
- return DebugUtils::errored(kErrorInvalidArgument);
- DWORD protectFlags = VirtMem_accessToWinProtectFlags(flags);
- void* result = ::VirtualAlloc(nullptr, size, MEM_COMMIT | MEM_RESERVE, protectFlags);
- if (!result)
- return DebugUtils::errored(kErrorOutOfMemory);
- *p = result;
- return kErrorOk;
- }
- Error VirtMem::release(void* p, size_t size) noexcept {
- ASMJIT_UNUSED(size);
- if (ASMJIT_UNLIKELY(!::VirtualFree(p, 0, MEM_RELEASE)))
- return DebugUtils::errored(kErrorInvalidArgument);
- return kErrorOk;
- }
- Error VirtMem::protect(void* p, size_t size, uint32_t flags) noexcept {
- DWORD protectFlags = VirtMem_accessToWinProtectFlags(flags);
- DWORD oldFlags;
- if (::VirtualProtect(p, size, protectFlags, &oldFlags))
- return kErrorOk;
- return DebugUtils::errored(kErrorInvalidArgument);
- }
- Error VirtMem::allocDualMapping(DualMapping* dm, size_t size, uint32_t flags) noexcept {
- dm->ro = nullptr;
- dm->rw = nullptr;
- if (size == 0)
- return DebugUtils::errored(kErrorInvalidArgument);
- ScopedHandle handle;
- handle.value = ::CreateFileMappingW(
- INVALID_HANDLE_VALUE,
- nullptr,
- PAGE_EXECUTE_READWRITE,
- (DWORD)(uint64_t(size) >> 32),
- (DWORD)(size & 0xFFFFFFFFu),
- nullptr);
- if (ASMJIT_UNLIKELY(!handle.value))
- return DebugUtils::errored(kErrorOutOfMemory);
- void* ptr[2];
- for (uint32_t i = 0; i < 2; i++) {
- DWORD desiredAccess = VirtMem_accessToWinDesiredAccess(flags & ~VirtMem_dualMappingFilter[i]);
- ptr[i] = ::MapViewOfFile(handle.value, desiredAccess, 0, 0, size);
- if (ptr[i] == nullptr) {
- if (i == 0)
- ::UnmapViewOfFile(ptr[0]);
- return DebugUtils::errored(kErrorOutOfMemory);
- }
- }
- dm->ro = ptr[0];
- dm->rw = ptr[1];
- return kErrorOk;
- }
- Error VirtMem::releaseDualMapping(DualMapping* dm, size_t size) noexcept {
- ASMJIT_UNUSED(size);
- bool failed = false;
- if (!::UnmapViewOfFile(dm->ro))
- failed = true;
- if (dm->ro != dm->rw && !UnmapViewOfFile(dm->rw))
- failed = true;
- if (failed)
- return DebugUtils::errored(kErrorInvalidArgument);
- dm->ro = nullptr;
- dm->rw = nullptr;
- return kErrorOk;
- }
- #endif
- // ============================================================================
- // [asmjit::VirtMem - Virtual Memory [Posix]]
- // ============================================================================
- #if !defined(_WIN32)
- struct ScopedFD {
- inline ScopedFD() noexcept
- : value(-1) {}
- inline ~ScopedFD() noexcept {
- if (value != -1)
- close(value);
- }
- int value;
- };
- static void VirtMem_getInfo(VirtMem::Info& vmInfo) noexcept {
- uint32_t pageSize = uint32_t(::getpagesize());
- vmInfo.pageSize = pageSize;
- vmInfo.pageGranularity = Support::max<uint32_t>(pageSize, 65536);
- }
- // Some operating systems don't allow /dev/shm to be executable. On Linux this
- // happens when /dev/shm is mounted with 'noexec', which is enforced by systemd.
- // Other operating systems like OSX also restrict executable permissions regarding
- // /dev/shm, so we use a runtime detection before trying to allocate the requested
- // memory by the user. Sometimes we don't need the detection as we know it would
- // always result in 'kShmStrategyTmpDir'.
- enum ShmStrategy : uint32_t {
- kShmStrategyUnknown = 0,
- kShmStrategyDevShm = 1,
- kShmStrategyTmpDir = 2
- };
- // Posix specific implementation that uses `mmap()` and `munmap()`.
- static int VirtMem_accessToPosixProtection(uint32_t flags) noexcept {
- int protection = 0;
- if (flags & VirtMem::kAccessRead ) protection |= PROT_READ;
- if (flags & VirtMem::kAccessWrite ) protection |= PROT_READ | PROT_WRITE;
- if (flags & VirtMem::kAccessExecute) protection |= PROT_READ | PROT_EXEC;
- return protection;
- }
- // Translates libc errors specific to VirtualMemory mapping to `asmjit::Error`.
- static Error VirtMem_makeErrorFromErrno(int e) noexcept {
- switch (e) {
- case EACCES:
- case EAGAIN:
- case ENODEV:
- case EPERM:
- return kErrorInvalidState;
- case EFBIG:
- case ENOMEM:
- case EOVERFLOW:
- return kErrorOutOfMemory;
- case EMFILE:
- case ENFILE:
- return kErrorTooManyHandles;
- default:
- return kErrorInvalidArgument;
- }
- }
- #if defined(__APPLE__)
- // Detects whether the current process is hardened, which means that pages that
- // have WRITE and EXECUTABLE flags cannot be allocated without MAP_JIT flag.
- static ASMJIT_INLINE bool VirtMem_isHardened() noexcept {
- static volatile uint32_t globalHardenedFlag;
- enum HardenedFlag : uint32_t {
- kHardenedFlagUnknown = 0,
- kHardenedFlagDisabled = 1,
- kHardenedFlagEnabled = 2
- };
- uint32_t flag = globalHardenedFlag;
- if (flag == kHardenedFlagUnknown) {
- VirtMem::Info memInfo;
- VirtMem_getInfo(memInfo);
- void* ptr = mmap(nullptr, memInfo.pageSize, PROT_WRITE | PROT_EXEC, MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
- if (ptr == MAP_FAILED) {
- flag = kHardenedFlagEnabled;
- }
- else {
- flag = kHardenedFlagDisabled;
- munmap(ptr, memInfo.pageSize);
- }
- globalHardenedFlag = flag;
- }
- return flag == kHardenedFlagEnabled;
- }
- // MAP_JIT flag required to run unsigned JIT code is only supported by kernel
- // version 10.14+ (Mojave) and IOS.
- static ASMJIT_INLINE bool VirtMem_hasMapJitSupport() noexcept {
- #if TARGET_OS_OSX
- static volatile uint32_t globalVersion;
- uint32_t ver = globalVersion;
- if (!ver) {
- struct utsname osname;
- uname(&osname);
- ver = atoi(osname.release);
- globalVersion = ver;
- }
- return ver >= 18;
- #else
- // Assume it's available.
- return true;
- #endif
- }
- static ASMJIT_INLINE uint32_t VirtMem_appleSpecificMMapFlags(uint32_t flags) {
- // Always use MAP_JIT flag if user asked for it (could be used for testing
- // on non-hardened processes) and detect whether it must be used when the
- // process is actually hardened (in that case it doesn't make sense to rely
- // on user `flags`).
- bool useMapJit = ((flags & VirtMem::kMMapEnableMapJit) != 0) || VirtMem_isHardened();
- if (useMapJit)
- return VirtMem_hasMapJitSupport() ? MAP_JIT : 0u;
- else
- return 0;
- }
- #else
- static ASMJIT_INLINE uint32_t VirtMem_appleSpecificMMapFlags(uint32_t flags) {
- ASMJIT_UNUSED(flags);
- return 0;
- }
- #endif
- static const char* VirtMem_getTmpDir() noexcept {
- const char* tmpDir = getenv("TMPDIR");
- return tmpDir ? tmpDir : "/tmp";
- }
- static Error VirtMem_openAnonymousMemory(int* fd, bool preferTmpOverDevShm) noexcept {
- #if defined(SYS_memfd_create)
- // Linux specific 'memfd_create' - if the syscall returns `ENOSYS` it means
- // it's not available and we will never call it again (would be pointless).
- // Zero initialized, if ever changed to '1' that would mean the syscall is not
- // available and we must use `shm_open()` and `shm_unlink()`.
- static volatile uint32_t memfd_create_not_supported;
- if (!memfd_create_not_supported) {
- *fd = (int)syscall(SYS_memfd_create, "vmem", 0);
- if (ASMJIT_LIKELY(*fd >= 0))
- return kErrorOk;
- int e = errno;
- if (e == ENOSYS)
- memfd_create_not_supported = 1;
- else
- return DebugUtils::errored(VirtMem_makeErrorFromErrno(e));
- }
- #endif
- #if defined(SHM_ANON)
- // Originally FreeBSD extension, apparently works in other BSDs too.
- ASMJIT_UNUSED(preferTmpOverDevShm);
- *fd = shm_open(SHM_ANON, O_RDWR | O_CREAT | O_EXCL, S_IRUSR | S_IWUSR);
- if (ASMJIT_LIKELY(*fd >= 0))
- return kErrorOk;
- else
- return DebugUtils::errored(VirtMem_makeErrorFromErrno(errno));
- #else
- // POSIX API. We have to generate somehow a unique name. This is nothing
- // cryptographic, just using a bit from the stack address to always have
- // a different base for different threads (as threads have their own stack)
- // and retries for avoiding collisions. We use `shm_open()` with flags that
- // require creation of the file so we never open an existing shared memory.
- static std::atomic<uint32_t> internalCounter;
- StringTmp<128> uniqueName;
- const char* kShmFormat = "/shm-id-%08llX";
- uint32_t kRetryCount = 100;
- uint64_t bits = ((uintptr_t)(void*)&uniqueName) & 0x55555555u;
- for (uint32_t i = 0; i < kRetryCount; i++) {
- bits -= uint64_t(OSUtils::getTickCount()) * 773703683;
- bits = ((bits >> 14) ^ (bits << 6)) + uint64_t(++internalCounter) * 10619863;
- if (!ASMJIT_VM_SHM_DETECT || preferTmpOverDevShm) {
- uniqueName.assignString(VirtMem_getTmpDir());
- uniqueName.appendFormat(kShmFormat, (unsigned long long)bits);
- *fd = open(uniqueName.data(), O_RDWR | O_CREAT | O_EXCL, 0);
- if (ASMJIT_LIKELY(*fd >= 0)) {
- unlink(uniqueName.data());
- return kErrorOk;
- }
- }
- else {
- uniqueName.assignFormat(kShmFormat, (unsigned long long)bits);
- *fd = shm_open(uniqueName.data(), O_RDWR | O_CREAT | O_EXCL, S_IRUSR | S_IWUSR);
- if (ASMJIT_LIKELY(*fd >= 0)) {
- shm_unlink(uniqueName.data());
- return kErrorOk;
- }
- }
- int e = errno;
- if (e == EEXIST)
- continue;
- else
- return DebugUtils::errored(VirtMem_makeErrorFromErrno(e));
- }
- return kErrorOk;
- #endif
- }
- #if ASMJIT_VM_SHM_DETECT
- static Error VirtMem_detectShmStrategy(uint32_t* strategyOut) noexcept {
- ScopedFD fd;
- VirtMem::Info vmInfo = VirtMem::info();
- ASMJIT_PROPAGATE(VirtMem_openAnonymousMemory(&fd.value, false));
- if (ftruncate(fd.value, off_t(vmInfo.pageSize)) != 0)
- return DebugUtils::errored(VirtMem_makeErrorFromErrno(errno));
- void* ptr = mmap(nullptr, vmInfo.pageSize, PROT_READ | PROT_EXEC, MAP_SHARED, fd.value, 0);
- if (ptr == MAP_FAILED) {
- int e = errno;
- if (e == EINVAL) {
- *strategyOut = kShmStrategyTmpDir;
- return kErrorOk;
- }
- return DebugUtils::errored(VirtMem_makeErrorFromErrno(e));
- }
- else {
- munmap(ptr, vmInfo.pageSize);
- *strategyOut = kShmStrategyDevShm;
- return kErrorOk;
- }
- }
- #endif
- #if ASMJIT_VM_SHM_DETECT
- static Error VirtMem_getShmStrategy(uint32_t* strategyOut) noexcept {
- // Initially don't assume anything. It has to be tested whether
- // '/dev/shm' was mounted with 'noexec' flag or not.
- static volatile uint32_t globalShmStrategy = kShmStrategyUnknown;
- uint32_t strategy = globalShmStrategy;
- if (strategy == kShmStrategyUnknown) {
- ASMJIT_PROPAGATE(VirtMem_detectShmStrategy(&strategy));
- globalShmStrategy = strategy;
- }
- *strategyOut = strategy;
- return kErrorOk;
- }
- #else
- static Error VirtMem_getShmStrategy(uint32_t* strategyOut) noexcept {
- *strategyOut = kShmStrategyTmpDir;
- return kErrorOk;
- }
- #endif
- Error VirtMem::alloc(void** p, size_t size, uint32_t flags) noexcept {
- *p = nullptr;
- if (size == 0)
- return DebugUtils::errored(kErrorInvalidArgument);
- int protection = VirtMem_accessToPosixProtection(flags);
- int mmFlags = MAP_PRIVATE | MAP_ANONYMOUS | VirtMem_appleSpecificMMapFlags(flags);
- void* ptr = mmap(nullptr, size, protection, mmFlags, -1, 0);
- if (ptr == MAP_FAILED)
- return DebugUtils::errored(kErrorOutOfMemory);
- *p = ptr;
- return kErrorOk;
- }
- Error VirtMem::release(void* p, size_t size) noexcept {
- if (ASMJIT_UNLIKELY(munmap(p, size) != 0))
- return DebugUtils::errored(kErrorInvalidArgument);
- return kErrorOk;
- }
- Error VirtMem::protect(void* p, size_t size, uint32_t flags) noexcept {
- int protection = VirtMem_accessToPosixProtection(flags);
- if (mprotect(p, size, protection) == 0)
- return kErrorOk;
- return DebugUtils::errored(kErrorInvalidArgument);
- }
- Error VirtMem::allocDualMapping(DualMapping* dm, size_t size, uint32_t flags) noexcept {
- dm->ro = nullptr;
- dm->rw = nullptr;
- if (off_t(size) <= 0)
- return DebugUtils::errored(size == 0 ? kErrorInvalidArgument : kErrorTooLarge);
- bool preferTmpOverDevShm = (flags & kMappingPreferTmp) != 0;
- if (!preferTmpOverDevShm) {
- uint32_t strategy;
- ASMJIT_PROPAGATE(VirtMem_getShmStrategy(&strategy));
- preferTmpOverDevShm = (strategy == kShmStrategyTmpDir);
- }
- // ScopedFD will automatically close the file descriptor in its destructor.
- ScopedFD fd;
- ASMJIT_PROPAGATE(VirtMem_openAnonymousMemory(&fd.value, preferTmpOverDevShm));
- if (ftruncate(fd.value, off_t(size)) != 0)
- return DebugUtils::errored(VirtMem_makeErrorFromErrno(errno));
- void* ptr[2];
- for (uint32_t i = 0; i < 2; i++) {
- ptr[i] = mmap(nullptr, size, VirtMem_accessToPosixProtection(flags & ~VirtMem_dualMappingFilter[i]), MAP_SHARED, fd.value, 0);
- if (ptr[i] == MAP_FAILED) {
- // Get the error now before `munmap` has a chance to clobber it.
- int e = errno;
- if (i == 1)
- munmap(ptr[0], size);
- return DebugUtils::errored(VirtMem_makeErrorFromErrno(e));
- }
- }
- dm->ro = ptr[0];
- dm->rw = ptr[1];
- return kErrorOk;
- }
- Error VirtMem::releaseDualMapping(DualMapping* dm, size_t size) noexcept {
- Error err = release(dm->ro, size);
- if (dm->ro != dm->rw)
- err |= release(dm->rw, size);
- if (err)
- return DebugUtils::errored(kErrorInvalidArgument);
- dm->ro = nullptr;
- dm->rw = nullptr;
- return kErrorOk;
- }
- #endif
- // ============================================================================
- // [asmjit::VirtMem - Virtual Memory [Memory Info]]
- // ============================================================================
- VirtMem::Info VirtMem::info() noexcept {
- static VirtMem::Info vmInfo;
- static std::atomic<uint32_t> vmInfoInitialized;
- if (!vmInfoInitialized.load()) {
- VirtMem::Info localMemInfo;
- VirtMem_getInfo(localMemInfo);
- vmInfo = localMemInfo;
- vmInfoInitialized.store(1u);
- }
- return vmInfo;
- }
- ASMJIT_END_NAMESPACE
- #endif
|