2015-05-23 22:55:12 -06:00
|
|
|
// Copyright 2008 Dolphin Emulator Project
|
2021-07-04 19:22:19 -06:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-or-later
|
2014-02-23 00:22:32 -07:00
|
|
|
|
2021-12-09 19:22:16 -07:00
|
|
|
#include "Common/MemoryUtil.h"
|
|
|
|
|
2014-02-23 00:22:32 -07:00
|
|
|
#include <cstddef>
|
|
|
|
#include <cstdlib>
|
|
|
|
#include <string>
|
|
|
|
|
2014-09-18 22:17:41 -06:00
|
|
|
#include "Common/CommonFuncs.h"
|
2014-09-07 19:06:58 -06:00
|
|
|
#include "Common/CommonTypes.h"
|
2014-09-18 22:17:41 -06:00
|
|
|
#include "Common/Logging/Log.h"
|
|
|
|
#include "Common/MsgHandler.h"
|
2014-02-23 00:22:32 -07:00
|
|
|
|
|
|
|
#ifdef _WIN32
|
|
|
|
#include <windows.h>
|
|
|
|
#include "Common/StringUtil.h"
|
|
|
|
#else
|
2021-01-13 07:23:57 -07:00
|
|
|
#include <pthread.h>
|
2014-02-23 00:22:32 -07:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <sys/mman.h>
|
2015-05-16 07:26:11 -06:00
|
|
|
#include <sys/types.h>
|
2020-12-04 09:09:42 -07:00
|
|
|
#if defined __APPLE__ || defined __FreeBSD__ || defined __OpenBSD__ || defined __NetBSD__
|
2015-05-16 07:26:11 -06:00
|
|
|
#include <sys/sysctl.h>
|
2017-02-22 10:21:10 -07:00
|
|
|
#elif defined __HAIKU__
|
|
|
|
#include <OS.h>
|
2015-05-16 07:26:11 -06:00
|
|
|
#else
|
|
|
|
#include <sys/sysinfo.h>
|
|
|
|
#endif
|
2014-02-23 00:22:32 -07:00
|
|
|
#endif
|
|
|
|
|
2016-08-07 11:03:07 -06:00
|
|
|
namespace Common
|
|
|
|
{
|
2015-06-13 22:06:26 -06:00
|
|
|
// This is purposely not a full wrapper for virtualalloc/mmap, but it
|
|
|
|
// provides exactly the primitive operations that Dolphin needs.
|
|
|
|
|
2017-04-14 04:53:32 -06:00
|
|
|
void* AllocateExecutableMemory(size_t size)
|
2014-02-23 00:22:32 -07:00
|
|
|
{
|
|
|
|
#if defined(_WIN32)
|
2017-04-14 06:46:11 -06:00
|
|
|
void* ptr = VirtualAlloc(nullptr, size, MEM_COMMIT, PAGE_EXECUTE_READWRITE);
|
2014-02-23 00:22:32 -07:00
|
|
|
#else
|
2021-01-16 21:31:48 -07:00
|
|
|
int map_flags = MAP_ANON | MAP_PRIVATE;
|
2021-04-17 16:53:27 -06:00
|
|
|
#if defined(__APPLE__)
|
2022-06-01 20:51:10 -06:00
|
|
|
map_flags |= MAP_JIT;
|
2021-01-13 07:23:57 -07:00
|
|
|
#endif
|
2021-01-16 21:31:48 -07:00
|
|
|
void* ptr = mmap(nullptr, size, PROT_READ | PROT_WRITE | PROT_EXEC, map_flags, -1, 0);
|
2014-07-30 23:47:44 -06:00
|
|
|
if (ptr == MAP_FAILED)
|
2015-05-02 03:57:17 -06:00
|
|
|
ptr = nullptr;
|
2015-06-13 22:06:26 -06:00
|
|
|
#endif
|
2014-02-23 00:22:32 -07:00
|
|
|
|
2017-04-14 04:53:32 -06:00
|
|
|
if (ptr == nullptr)
|
2020-12-02 11:17:27 -07:00
|
|
|
PanicAlertFmt("Failed to allocate executable memory");
|
2014-02-23 00:22:32 -07:00
|
|
|
|
|
|
|
return ptr;
|
|
|
|
}
|
2021-01-16 21:31:48 -07:00
|
|
|
// This function is used to provide a counter for the JITPageWrite*Execute*
|
|
|
|
// functions to enable nesting. The static variable is wrapped in a a function
|
|
|
|
// to allow those functions to be called inside of the constructor of a static
|
|
|
|
// variable portably.
|
|
|
|
//
|
|
|
|
// The variable is thread_local as the W^X mode is specific to each running thread.
|
|
|
|
static int& JITPageWriteNestCounter()
|
|
|
|
{
|
|
|
|
static thread_local int nest_counter = 0;
|
|
|
|
return nest_counter;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Certain platforms (Mac OS on ARM) enforce that a single thread can only have write or
|
2021-01-13 07:23:57 -07:00
|
|
|
// execute permissions to pages at any given point of time. The two below functions
|
|
|
|
// are used to toggle between having write permissions or execute permissions.
|
|
|
|
//
|
|
|
|
// The default state of these allocations in Dolphin is for them to be executable,
|
|
|
|
// but not writeable. So, functions that are updating these pages should wrap their
|
|
|
|
// writes like below:
|
|
|
|
|
|
|
|
// JITPageWriteEnableExecuteDisable();
|
|
|
|
// PrepareInstructionStreamForJIT();
|
|
|
|
// JITPageWriteDisableExecuteEnable();
|
|
|
|
|
2021-01-16 21:31:48 -07:00
|
|
|
// These functions can be nested, in which case execution will only be enabled
|
|
|
|
// after the call to the JITPageWriteDisableExecuteEnable from the top most
|
|
|
|
// nesting level. Example:
|
|
|
|
|
|
|
|
// [JIT page is in execute mode for the thread]
|
|
|
|
// JITPageWriteEnableExecuteDisable();
|
|
|
|
// [JIT page is in write mode for the thread]
|
|
|
|
// JITPageWriteEnableExecuteDisable();
|
|
|
|
// [JIT page is in write mode for the thread]
|
|
|
|
// JITPageWriteDisableExecuteEnable();
|
|
|
|
// [JIT page is in write mode for the thread]
|
|
|
|
// JITPageWriteDisableExecuteEnable();
|
|
|
|
// [JIT page is in execute mode for the thread]
|
|
|
|
|
|
|
|
// Allows a thread to write to executable memory, but not execute the data.
|
|
|
|
void JITPageWriteEnableExecuteDisable()
|
|
|
|
{
|
2021-01-13 07:23:57 -07:00
|
|
|
#if defined(_M_ARM_64) && defined(__APPLE__)
|
2021-01-16 21:31:48 -07:00
|
|
|
if (JITPageWriteNestCounter() == 0)
|
|
|
|
{
|
|
|
|
if (__builtin_available(macOS 11.0, *))
|
|
|
|
{
|
|
|
|
pthread_jit_write_protect_np(0);
|
|
|
|
}
|
2021-01-13 07:23:57 -07:00
|
|
|
}
|
|
|
|
#endif
|
2021-01-16 21:31:48 -07:00
|
|
|
JITPageWriteNestCounter()++;
|
2021-01-13 07:23:57 -07:00
|
|
|
}
|
2021-01-16 21:31:48 -07:00
|
|
|
// Allows a thread to execute memory allocated for execution, but not write to it.
|
|
|
|
void JITPageWriteDisableExecuteEnable()
|
|
|
|
{
|
|
|
|
JITPageWriteNestCounter()--;
|
|
|
|
|
|
|
|
// Sanity check the NestCounter to identify underflow
|
|
|
|
// This can indicate the calls to JITPageWriteDisableExecuteEnable()
|
|
|
|
// are not matched with previous calls to JITPageWriteEnableExecuteDisable()
|
|
|
|
if (JITPageWriteNestCounter() < 0)
|
|
|
|
PanicAlertFmt("JITPageWriteNestCounter() underflowed");
|
|
|
|
|
2021-01-13 07:23:57 -07:00
|
|
|
#if defined(_M_ARM_64) && defined(__APPLE__)
|
2021-01-16 21:31:48 -07:00
|
|
|
if (JITPageWriteNestCounter() == 0)
|
|
|
|
{
|
|
|
|
if (__builtin_available(macOS 11.0, *))
|
|
|
|
{
|
|
|
|
pthread_jit_write_protect_np(1);
|
|
|
|
}
|
2021-01-13 07:23:57 -07:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
2014-02-23 00:22:32 -07:00
|
|
|
|
|
|
|
void* AllocateMemoryPages(size_t size)
|
|
|
|
{
|
|
|
|
#ifdef _WIN32
|
2017-04-14 06:46:11 -06:00
|
|
|
void* ptr = VirtualAlloc(nullptr, size, MEM_COMMIT, PAGE_READWRITE);
|
2014-02-23 00:22:32 -07:00
|
|
|
#else
|
2014-03-09 14:14:26 -06:00
|
|
|
void* ptr = mmap(nullptr, size, PROT_READ | PROT_WRITE, MAP_ANON | MAP_PRIVATE, -1, 0);
|
2014-02-23 00:22:32 -07:00
|
|
|
|
2014-08-10 02:50:58 -06:00
|
|
|
if (ptr == MAP_FAILED)
|
|
|
|
ptr = nullptr;
|
|
|
|
#endif
|
2014-02-23 00:22:32 -07:00
|
|
|
|
2014-03-09 14:14:26 -06:00
|
|
|
if (ptr == nullptr)
|
2020-12-02 11:17:27 -07:00
|
|
|
PanicAlertFmt("Failed to allocate raw memory");
|
2014-02-23 00:22:32 -07:00
|
|
|
|
|
|
|
return ptr;
|
|
|
|
}
|
|
|
|
|
2015-02-15 12:43:31 -07:00
|
|
|
void* AllocateAlignedMemory(size_t size, size_t alignment)
|
2014-02-23 00:22:32 -07:00
|
|
|
{
|
|
|
|
#ifdef _WIN32
|
2015-06-13 22:06:26 -06:00
|
|
|
void* ptr = _aligned_malloc(size, alignment);
|
2014-02-23 00:22:32 -07:00
|
|
|
#else
|
2015-06-13 22:06:26 -06:00
|
|
|
void* ptr = nullptr;
|
|
|
|
if (posix_memalign(&ptr, alignment, size) != 0)
|
2020-10-23 12:41:30 -06:00
|
|
|
ERROR_LOG_FMT(MEMMAP, "Failed to allocate aligned memory");
|
2014-02-23 00:22:32 -07:00
|
|
|
#endif
|
2015-06-13 22:06:26 -06:00
|
|
|
|
|
|
|
if (ptr == nullptr)
|
2020-12-02 11:17:27 -07:00
|
|
|
PanicAlertFmt("Failed to allocate aligned memory");
|
2014-02-23 00:22:32 -07:00
|
|
|
|
|
|
|
return ptr;
|
|
|
|
}
|
|
|
|
|
2023-07-31 06:37:35 -06:00
|
|
|
bool FreeMemoryPages(void* ptr, size_t size)
|
2014-02-23 00:22:32 -07:00
|
|
|
{
|
2015-06-13 22:06:26 -06:00
|
|
|
if (ptr)
|
|
|
|
{
|
2014-02-23 00:22:32 -07:00
|
|
|
#ifdef _WIN32
|
2015-06-13 22:06:26 -06:00
|
|
|
if (!VirtualFree(ptr, 0, MEM_RELEASE))
|
2023-07-31 06:37:35 -06:00
|
|
|
{
|
2020-12-02 11:17:27 -07:00
|
|
|
PanicAlertFmt("FreeMemoryPages failed!\nVirtualFree: {}", GetLastErrorString());
|
2023-07-31 06:37:35 -06:00
|
|
|
return false;
|
|
|
|
}
|
2014-02-23 00:22:32 -07:00
|
|
|
#else
|
2017-08-17 13:12:44 -06:00
|
|
|
if (munmap(ptr, size) != 0)
|
2023-07-31 06:37:35 -06:00
|
|
|
{
|
2020-12-02 11:17:27 -07:00
|
|
|
PanicAlertFmt("FreeMemoryPages failed!\nmunmap: {}", LastStrerrorString());
|
2023-07-31 06:37:35 -06:00
|
|
|
return false;
|
|
|
|
}
|
2014-02-23 00:22:32 -07:00
|
|
|
#endif
|
2015-06-13 22:06:26 -06:00
|
|
|
}
|
2023-07-31 06:37:35 -06:00
|
|
|
return true;
|
2014-02-23 00:22:32 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
void FreeAlignedMemory(void* ptr)
|
|
|
|
{
|
|
|
|
if (ptr)
|
|
|
|
{
|
|
|
|
#ifdef _WIN32
|
2014-02-23 15:03:39 -07:00
|
|
|
_aligned_free(ptr);
|
2014-02-23 00:22:32 -07:00
|
|
|
#else
|
2014-02-23 15:03:39 -07:00
|
|
|
free(ptr);
|
2014-02-23 00:22:32 -07:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-07-31 06:37:35 -06:00
|
|
|
bool ReadProtectMemory(void* ptr, size_t size)
|
2014-09-15 21:03:07 -06:00
|
|
|
{
|
|
|
|
#ifdef _WIN32
|
|
|
|
DWORD oldValue;
|
|
|
|
if (!VirtualProtect(ptr, size, PAGE_NOACCESS, &oldValue))
|
2023-07-31 06:37:35 -06:00
|
|
|
{
|
2020-12-02 11:17:27 -07:00
|
|
|
PanicAlertFmt("ReadProtectMemory failed!\nVirtualProtect: {}", GetLastErrorString());
|
2023-07-31 06:37:35 -06:00
|
|
|
return false;
|
|
|
|
}
|
2014-09-15 21:03:07 -06:00
|
|
|
#else
|
2017-08-17 13:12:44 -06:00
|
|
|
if (mprotect(ptr, size, PROT_NONE) != 0)
|
2023-07-31 06:37:35 -06:00
|
|
|
{
|
2020-12-02 11:17:27 -07:00
|
|
|
PanicAlertFmt("ReadProtectMemory failed!\nmprotect: {}", LastStrerrorString());
|
2023-07-31 06:37:35 -06:00
|
|
|
return false;
|
|
|
|
}
|
2014-09-15 21:03:07 -06:00
|
|
|
#endif
|
2023-07-31 06:37:35 -06:00
|
|
|
return true;
|
2014-09-15 21:03:07 -06:00
|
|
|
}
|
|
|
|
|
2023-07-31 06:37:35 -06:00
|
|
|
bool WriteProtectMemory(void* ptr, size_t size, bool allowExecute)
|
2014-02-23 00:22:32 -07:00
|
|
|
{
|
|
|
|
#ifdef _WIN32
|
|
|
|
DWORD oldValue;
|
|
|
|
if (!VirtualProtect(ptr, size, allowExecute ? PAGE_EXECUTE_READ : PAGE_READONLY, &oldValue))
|
2023-07-31 06:37:35 -06:00
|
|
|
{
|
2020-12-02 11:17:27 -07:00
|
|
|
PanicAlertFmt("WriteProtectMemory failed!\nVirtualProtect: {}", GetLastErrorString());
|
2023-07-31 06:37:35 -06:00
|
|
|
return false;
|
|
|
|
}
|
2021-02-03 08:11:30 -07:00
|
|
|
#elif !(defined(_M_ARM_64) && defined(__APPLE__))
|
|
|
|
// MacOS 11.2 on ARM does not allow for changing the access permissions of pages
|
|
|
|
// that were marked executable, instead it uses the protections offered by MAP_JIT
|
|
|
|
// for write protection.
|
2017-08-17 13:12:44 -06:00
|
|
|
if (mprotect(ptr, size, allowExecute ? (PROT_READ | PROT_EXEC) : PROT_READ) != 0)
|
2023-07-31 06:37:35 -06:00
|
|
|
{
|
2020-12-02 11:17:27 -07:00
|
|
|
PanicAlertFmt("WriteProtectMemory failed!\nmprotect: {}", LastStrerrorString());
|
2023-07-31 06:37:35 -06:00
|
|
|
return false;
|
|
|
|
}
|
2014-02-23 00:22:32 -07:00
|
|
|
#endif
|
2023-07-31 06:37:35 -06:00
|
|
|
return true;
|
2014-02-23 00:22:32 -07:00
|
|
|
}
|
|
|
|
|
2023-07-31 06:37:35 -06:00
|
|
|
bool UnWriteProtectMemory(void* ptr, size_t size, bool allowExecute)
|
2014-02-23 00:22:32 -07:00
|
|
|
{
|
|
|
|
#ifdef _WIN32
|
|
|
|
DWORD oldValue;
|
|
|
|
if (!VirtualProtect(ptr, size, allowExecute ? PAGE_EXECUTE_READWRITE : PAGE_READWRITE, &oldValue))
|
2023-07-31 06:37:35 -06:00
|
|
|
{
|
2020-12-02 11:17:27 -07:00
|
|
|
PanicAlertFmt("UnWriteProtectMemory failed!\nVirtualProtect: {}", GetLastErrorString());
|
2023-07-31 06:37:35 -06:00
|
|
|
return false;
|
|
|
|
}
|
2021-02-03 08:11:30 -07:00
|
|
|
#elif !(defined(_M_ARM_64) && defined(__APPLE__))
|
|
|
|
// MacOS 11.2 on ARM does not allow for changing the access permissions of pages
|
|
|
|
// that were marked executable, instead it uses the protections offered by MAP_JIT
|
|
|
|
// for write protection.
|
2017-08-17 13:12:44 -06:00
|
|
|
if (mprotect(ptr, size,
|
|
|
|
allowExecute ? (PROT_READ | PROT_WRITE | PROT_EXEC) : PROT_WRITE | PROT_READ) != 0)
|
|
|
|
{
|
2020-12-02 11:17:27 -07:00
|
|
|
PanicAlertFmt("UnWriteProtectMemory failed!\nmprotect: {}", LastStrerrorString());
|
2023-07-31 06:37:35 -06:00
|
|
|
return false;
|
2017-08-17 13:12:44 -06:00
|
|
|
}
|
2014-02-23 00:22:32 -07:00
|
|
|
#endif
|
2023-07-31 06:37:35 -06:00
|
|
|
return true;
|
2014-02-23 00:22:32 -07:00
|
|
|
}
|
|
|
|
|
2015-05-16 07:26:11 -06:00
|
|
|
size_t MemPhysical()
|
|
|
|
{
|
|
|
|
#ifdef _WIN32
|
|
|
|
MEMORYSTATUSEX memInfo;
|
|
|
|
memInfo.dwLength = sizeof(MEMORYSTATUSEX);
|
|
|
|
GlobalMemoryStatusEx(&memInfo);
|
|
|
|
return memInfo.ullTotalPhys;
|
2020-12-04 09:09:42 -07:00
|
|
|
#elif defined __APPLE__ || defined __FreeBSD__ || defined __OpenBSD__ || defined __NetBSD__
|
2015-05-16 07:26:11 -06:00
|
|
|
int mib[2];
|
|
|
|
size_t physical_memory;
|
|
|
|
mib[0] = CTL_HW;
|
2015-06-10 23:15:11 -06:00
|
|
|
#ifdef __APPLE__
|
2015-05-16 07:26:11 -06:00
|
|
|
mib[1] = HW_MEMSIZE;
|
2015-06-10 23:15:11 -06:00
|
|
|
#elif defined __FreeBSD__
|
|
|
|
mib[1] = HW_REALMEM;
|
2020-12-04 09:09:42 -07:00
|
|
|
#elif defined __OpenBSD__ || defined __NetBSD__
|
2020-12-20 15:25:36 -07:00
|
|
|
mib[1] = HW_PHYSMEM64;
|
2015-06-10 23:15:11 -06:00
|
|
|
#endif
|
2015-05-16 07:26:11 -06:00
|
|
|
size_t length = sizeof(size_t);
|
2023-04-14 22:55:53 -06:00
|
|
|
sysctl(mib, 2, &physical_memory, &length, nullptr, 0);
|
2015-05-16 07:26:11 -06:00
|
|
|
return physical_memory;
|
2017-02-22 10:21:10 -07:00
|
|
|
#elif defined __HAIKU__
|
|
|
|
system_info sysinfo;
|
|
|
|
get_system_info(&sysinfo);
|
|
|
|
return static_cast<size_t>(sysinfo.max_pages * B_PAGE_SIZE);
|
2015-05-16 07:26:11 -06:00
|
|
|
#else
|
|
|
|
struct sysinfo memInfo;
|
|
|
|
sysinfo(&memInfo);
|
|
|
|
return (size_t)memInfo.totalram * memInfo.mem_unit;
|
|
|
|
#endif
|
|
|
|
}
|
2016-08-07 11:03:07 -06:00
|
|
|
|
|
|
|
} // namespace Common
|