2015-05-24 04:55:12 +00:00
|
|
|
// Copyright 2008 Dolphin Emulator Project
|
2015-05-17 23:08:10 +00:00
|
|
|
// Licensed under GPLv2+
|
2014-02-23 07:22:32 +00:00
|
|
|
// Refer to the license.txt file included.
|
|
|
|
|
|
|
|
#include <cstddef>
|
|
|
|
#include <cstdlib>
|
|
|
|
#include <string>
|
|
|
|
|
2014-09-19 04:17:41 +00:00
|
|
|
#include "Common/CommonFuncs.h"
|
2014-09-08 01:06:58 +00:00
|
|
|
#include "Common/CommonTypes.h"
|
2014-09-19 04:17:41 +00:00
|
|
|
#include "Common/Logging/Log.h"
|
2014-07-08 12:29:26 +00:00
|
|
|
#include "Common/MemoryUtil.h"
|
2014-09-19 04:17:41 +00:00
|
|
|
#include "Common/MsgHandler.h"
|
2014-02-23 07:22:32 +00:00
|
|
|
|
|
|
|
#ifdef _WIN32
|
|
|
|
#include <windows.h>
|
|
|
|
#include "Common/StringUtil.h"
|
|
|
|
#else
|
2021-01-13 14:23:57 +00:00
|
|
|
#include <pthread.h>
|
2014-02-23 07:22:32 +00:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <sys/mman.h>
|
2015-05-16 13:26:11 +00:00
|
|
|
#include <sys/types.h>
|
2020-12-04 16:09:42 +00:00
|
|
|
#if defined __APPLE__ || defined __FreeBSD__ || defined __OpenBSD__ || defined __NetBSD__
|
2015-05-16 13:26:11 +00:00
|
|
|
#include <sys/sysctl.h>
|
2017-02-22 17:21:10 +00:00
|
|
|
#elif defined __HAIKU__
|
|
|
|
#include <OS.h>
|
2015-05-16 13:26:11 +00:00
|
|
|
#else
|
|
|
|
#include <sys/sysinfo.h>
|
|
|
|
#endif
|
2014-02-23 07:22:32 +00:00
|
|
|
#endif
|
|
|
|
|
2016-08-07 17:03:07 +00:00
|
|
|
namespace Common
|
|
|
|
{
|
2015-06-14 04:06:26 +00:00
|
|
|
// This is purposely not a full wrapper for virtualalloc/mmap, but it
|
|
|
|
// provides exactly the primitive operations that Dolphin needs.
|
|
|
|
|
2017-04-14 10:53:32 +00:00
|
|
|
void* AllocateExecutableMemory(size_t size)
|
2014-02-23 07:22:32 +00:00
|
|
|
{
|
|
|
|
#if defined(_WIN32)
|
2017-04-14 12:46:11 +00:00
|
|
|
void* ptr = VirtualAlloc(nullptr, size, MEM_COMMIT, PAGE_EXECUTE_READWRITE);
|
2014-02-23 07:22:32 +00:00
|
|
|
#else
|
2021-01-17 04:31:48 +00:00
|
|
|
int map_flags = MAP_ANON | MAP_PRIVATE;
|
2021-04-17 22:53:27 +00:00
|
|
|
#if defined(__APPLE__)
|
2021-02-03 15:11:30 +00:00
|
|
|
// This check is in place to prepare for x86_64 MAP_JIT support. While MAP_JIT did exist
|
|
|
|
// prior to 10.14, it had restrictions on the number of JIT allocations that were removed
|
|
|
|
// in 10.14.
|
2021-04-17 23:18:18 +00:00
|
|
|
if (__builtin_available(macOS 10.14, *))
|
|
|
|
map_flags |= MAP_JIT;
|
2021-01-13 14:23:57 +00:00
|
|
|
#endif
|
2021-01-17 04:31:48 +00:00
|
|
|
void* ptr = mmap(nullptr, size, PROT_READ | PROT_WRITE | PROT_EXEC, map_flags, -1, 0);
|
2014-07-31 05:47:44 +00:00
|
|
|
if (ptr == MAP_FAILED)
|
2015-05-02 09:57:17 +00:00
|
|
|
ptr = nullptr;
|
2015-06-14 04:06:26 +00:00
|
|
|
#endif
|
2014-02-23 07:22:32 +00:00
|
|
|
|
2017-04-14 10:53:32 +00:00
|
|
|
if (ptr == nullptr)
|
2020-12-02 18:17:27 +00:00
|
|
|
PanicAlertFmt("Failed to allocate executable memory");
|
2014-02-23 07:22:32 +00:00
|
|
|
|
|
|
|
return ptr;
|
|
|
|
}
|
2021-01-17 04:31:48 +00:00
|
|
|
// This function is used to provide a counter for the JITPageWrite*Execute*
|
|
|
|
// functions to enable nesting. The static variable is wrapped in a a function
|
|
|
|
// to allow those functions to be called inside of the constructor of a static
|
|
|
|
// variable portably.
|
|
|
|
//
|
|
|
|
// The variable is thread_local as the W^X mode is specific to each running thread.
|
|
|
|
static int& JITPageWriteNestCounter()
|
|
|
|
{
|
|
|
|
static thread_local int nest_counter = 0;
|
|
|
|
return nest_counter;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Certain platforms (Mac OS on ARM) enforce that a single thread can only have write or
|
2021-01-13 14:23:57 +00:00
|
|
|
// execute permissions to pages at any given point of time. The two below functions
|
|
|
|
// are used to toggle between having write permissions or execute permissions.
|
|
|
|
//
|
|
|
|
// The default state of these allocations in Dolphin is for them to be executable,
|
|
|
|
// but not writeable. So, functions that are updating these pages should wrap their
|
|
|
|
// writes like below:
|
|
|
|
|
|
|
|
// JITPageWriteEnableExecuteDisable();
|
|
|
|
// PrepareInstructionStreamForJIT();
|
|
|
|
// JITPageWriteDisableExecuteEnable();
|
|
|
|
|
2021-01-17 04:31:48 +00:00
|
|
|
// These functions can be nested, in which case execution will only be enabled
|
|
|
|
// after the call to the JITPageWriteDisableExecuteEnable from the top most
|
|
|
|
// nesting level. Example:
|
|
|
|
|
|
|
|
// [JIT page is in execute mode for the thread]
|
|
|
|
// JITPageWriteEnableExecuteDisable();
|
|
|
|
// [JIT page is in write mode for the thread]
|
|
|
|
// JITPageWriteEnableExecuteDisable();
|
|
|
|
// [JIT page is in write mode for the thread]
|
|
|
|
// JITPageWriteDisableExecuteEnable();
|
|
|
|
// [JIT page is in write mode for the thread]
|
|
|
|
// JITPageWriteDisableExecuteEnable();
|
|
|
|
// [JIT page is in execute mode for the thread]
|
|
|
|
|
|
|
|
// Allows a thread to write to executable memory, but not execute the data.
|
|
|
|
void JITPageWriteEnableExecuteDisable()
|
|
|
|
{
|
2021-01-13 14:23:57 +00:00
|
|
|
#if defined(_M_ARM_64) && defined(__APPLE__)
|
2021-01-17 04:31:48 +00:00
|
|
|
if (JITPageWriteNestCounter() == 0)
|
|
|
|
{
|
|
|
|
if (__builtin_available(macOS 11.0, *))
|
|
|
|
{
|
|
|
|
pthread_jit_write_protect_np(0);
|
|
|
|
}
|
2021-01-13 14:23:57 +00:00
|
|
|
}
|
|
|
|
#endif
|
2021-01-17 04:31:48 +00:00
|
|
|
JITPageWriteNestCounter()++;
|
2021-01-13 14:23:57 +00:00
|
|
|
}
|
2021-01-17 04:31:48 +00:00
|
|
|
// Allows a thread to execute memory allocated for execution, but not write to it.
|
|
|
|
void JITPageWriteDisableExecuteEnable()
|
|
|
|
{
|
|
|
|
JITPageWriteNestCounter()--;
|
|
|
|
|
|
|
|
// Sanity check the NestCounter to identify underflow
|
|
|
|
// This can indicate the calls to JITPageWriteDisableExecuteEnable()
|
|
|
|
// are not matched with previous calls to JITPageWriteEnableExecuteDisable()
|
|
|
|
if (JITPageWriteNestCounter() < 0)
|
|
|
|
PanicAlertFmt("JITPageWriteNestCounter() underflowed");
|
|
|
|
|
2021-01-13 14:23:57 +00:00
|
|
|
#if defined(_M_ARM_64) && defined(__APPLE__)
|
2021-01-17 04:31:48 +00:00
|
|
|
if (JITPageWriteNestCounter() == 0)
|
|
|
|
{
|
|
|
|
if (__builtin_available(macOS 11.0, *))
|
|
|
|
{
|
|
|
|
pthread_jit_write_protect_np(1);
|
|
|
|
}
|
2021-01-13 14:23:57 +00:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
2014-02-23 07:22:32 +00:00
|
|
|
|
|
|
|
void* AllocateMemoryPages(size_t size)
|
|
|
|
{
|
|
|
|
#ifdef _WIN32
|
2017-04-14 12:46:11 +00:00
|
|
|
void* ptr = VirtualAlloc(nullptr, size, MEM_COMMIT, PAGE_READWRITE);
|
2014-02-23 07:22:32 +00:00
|
|
|
#else
|
2014-03-09 20:14:26 +00:00
|
|
|
void* ptr = mmap(nullptr, size, PROT_READ | PROT_WRITE, MAP_ANON | MAP_PRIVATE, -1, 0);
|
2014-02-23 07:22:32 +00:00
|
|
|
|
2014-08-10 08:50:58 +00:00
|
|
|
if (ptr == MAP_FAILED)
|
|
|
|
ptr = nullptr;
|
|
|
|
#endif
|
2014-02-23 07:22:32 +00:00
|
|
|
|
2014-03-09 20:14:26 +00:00
|
|
|
if (ptr == nullptr)
|
2020-12-02 18:17:27 +00:00
|
|
|
PanicAlertFmt("Failed to allocate raw memory");
|
2014-02-23 07:22:32 +00:00
|
|
|
|
|
|
|
return ptr;
|
|
|
|
}
|
|
|
|
|
2015-02-15 19:43:31 +00:00
|
|
|
void* AllocateAlignedMemory(size_t size, size_t alignment)
|
2014-02-23 07:22:32 +00:00
|
|
|
{
|
|
|
|
#ifdef _WIN32
|
2015-06-14 04:06:26 +00:00
|
|
|
void* ptr = _aligned_malloc(size, alignment);
|
2014-02-23 07:22:32 +00:00
|
|
|
#else
|
2015-06-14 04:06:26 +00:00
|
|
|
void* ptr = nullptr;
|
|
|
|
if (posix_memalign(&ptr, alignment, size) != 0)
|
2020-10-23 18:41:30 +00:00
|
|
|
ERROR_LOG_FMT(MEMMAP, "Failed to allocate aligned memory");
|
2014-02-23 07:22:32 +00:00
|
|
|
#endif
|
2015-06-14 04:06:26 +00:00
|
|
|
|
|
|
|
if (ptr == nullptr)
|
2020-12-02 18:17:27 +00:00
|
|
|
PanicAlertFmt("Failed to allocate aligned memory");
|
2014-02-23 07:22:32 +00:00
|
|
|
|
|
|
|
return ptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
void FreeMemoryPages(void* ptr, size_t size)
|
|
|
|
{
|
2015-06-14 04:06:26 +00:00
|
|
|
if (ptr)
|
|
|
|
{
|
2014-02-23 07:22:32 +00:00
|
|
|
#ifdef _WIN32
|
2015-06-14 04:06:26 +00:00
|
|
|
if (!VirtualFree(ptr, 0, MEM_RELEASE))
|
2020-12-02 18:17:27 +00:00
|
|
|
PanicAlertFmt("FreeMemoryPages failed!\nVirtualFree: {}", GetLastErrorString());
|
2014-02-23 07:22:32 +00:00
|
|
|
#else
|
2017-08-17 19:12:44 +00:00
|
|
|
if (munmap(ptr, size) != 0)
|
2020-12-02 18:17:27 +00:00
|
|
|
PanicAlertFmt("FreeMemoryPages failed!\nmunmap: {}", LastStrerrorString());
|
2014-02-23 07:22:32 +00:00
|
|
|
#endif
|
2015-06-14 04:06:26 +00:00
|
|
|
}
|
2014-02-23 07:22:32 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void FreeAlignedMemory(void* ptr)
|
|
|
|
{
|
|
|
|
if (ptr)
|
|
|
|
{
|
|
|
|
#ifdef _WIN32
|
2014-02-23 22:03:39 +00:00
|
|
|
_aligned_free(ptr);
|
2014-02-23 07:22:32 +00:00
|
|
|
#else
|
2014-02-23 22:03:39 +00:00
|
|
|
free(ptr);
|
2014-02-23 07:22:32 +00:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-09-16 03:03:07 +00:00
|
|
|
void ReadProtectMemory(void* ptr, size_t size)
|
|
|
|
{
|
|
|
|
#ifdef _WIN32
|
|
|
|
DWORD oldValue;
|
|
|
|
if (!VirtualProtect(ptr, size, PAGE_NOACCESS, &oldValue))
|
2020-12-02 18:17:27 +00:00
|
|
|
PanicAlertFmt("ReadProtectMemory failed!\nVirtualProtect: {}", GetLastErrorString());
|
2014-09-16 03:03:07 +00:00
|
|
|
#else
|
2017-08-17 19:12:44 +00:00
|
|
|
if (mprotect(ptr, size, PROT_NONE) != 0)
|
2020-12-02 18:17:27 +00:00
|
|
|
PanicAlertFmt("ReadProtectMemory failed!\nmprotect: {}", LastStrerrorString());
|
2014-09-16 03:03:07 +00:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2014-02-23 07:22:32 +00:00
|
|
|
void WriteProtectMemory(void* ptr, size_t size, bool allowExecute)
|
|
|
|
{
|
|
|
|
#ifdef _WIN32
|
|
|
|
DWORD oldValue;
|
|
|
|
if (!VirtualProtect(ptr, size, allowExecute ? PAGE_EXECUTE_READ : PAGE_READONLY, &oldValue))
|
2020-12-02 18:17:27 +00:00
|
|
|
PanicAlertFmt("WriteProtectMemory failed!\nVirtualProtect: {}", GetLastErrorString());
|
2021-02-03 15:11:30 +00:00
|
|
|
#elif !(defined(_M_ARM_64) && defined(__APPLE__))
|
|
|
|
// MacOS 11.2 on ARM does not allow for changing the access permissions of pages
|
|
|
|
// that were marked executable, instead it uses the protections offered by MAP_JIT
|
|
|
|
// for write protection.
|
2017-08-17 19:12:44 +00:00
|
|
|
if (mprotect(ptr, size, allowExecute ? (PROT_READ | PROT_EXEC) : PROT_READ) != 0)
|
2020-12-02 18:17:27 +00:00
|
|
|
PanicAlertFmt("WriteProtectMemory failed!\nmprotect: {}", LastStrerrorString());
|
2014-02-23 07:22:32 +00:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
void UnWriteProtectMemory(void* ptr, size_t size, bool allowExecute)
|
|
|
|
{
|
|
|
|
#ifdef _WIN32
|
|
|
|
DWORD oldValue;
|
|
|
|
if (!VirtualProtect(ptr, size, allowExecute ? PAGE_EXECUTE_READWRITE : PAGE_READWRITE, &oldValue))
|
2020-12-02 18:17:27 +00:00
|
|
|
PanicAlertFmt("UnWriteProtectMemory failed!\nVirtualProtect: {}", GetLastErrorString());
|
2021-02-03 15:11:30 +00:00
|
|
|
#elif !(defined(_M_ARM_64) && defined(__APPLE__))
|
|
|
|
// MacOS 11.2 on ARM does not allow for changing the access permissions of pages
|
|
|
|
// that were marked executable, instead it uses the protections offered by MAP_JIT
|
|
|
|
// for write protection.
|
2017-08-17 19:12:44 +00:00
|
|
|
if (mprotect(ptr, size,
|
|
|
|
allowExecute ? (PROT_READ | PROT_WRITE | PROT_EXEC) : PROT_WRITE | PROT_READ) != 0)
|
|
|
|
{
|
2020-12-02 18:17:27 +00:00
|
|
|
PanicAlertFmt("UnWriteProtectMemory failed!\nmprotect: {}", LastStrerrorString());
|
2017-08-17 19:12:44 +00:00
|
|
|
}
|
2014-02-23 07:22:32 +00:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2015-05-16 13:26:11 +00:00
|
|
|
size_t MemPhysical()
|
|
|
|
{
|
|
|
|
#ifdef _WIN32
|
|
|
|
MEMORYSTATUSEX memInfo;
|
|
|
|
memInfo.dwLength = sizeof(MEMORYSTATUSEX);
|
|
|
|
GlobalMemoryStatusEx(&memInfo);
|
|
|
|
return memInfo.ullTotalPhys;
|
2020-12-04 16:09:42 +00:00
|
|
|
#elif defined __APPLE__ || defined __FreeBSD__ || defined __OpenBSD__ || defined __NetBSD__
|
2015-05-16 13:26:11 +00:00
|
|
|
int mib[2];
|
|
|
|
size_t physical_memory;
|
|
|
|
mib[0] = CTL_HW;
|
2015-06-11 05:15:11 +00:00
|
|
|
#ifdef __APPLE__
|
2015-05-16 13:26:11 +00:00
|
|
|
mib[1] = HW_MEMSIZE;
|
2015-06-11 05:15:11 +00:00
|
|
|
#elif defined __FreeBSD__
|
|
|
|
mib[1] = HW_REALMEM;
|
2020-12-04 16:09:42 +00:00
|
|
|
#elif defined __OpenBSD__ || defined __NetBSD__
|
2020-12-20 22:25:36 +00:00
|
|
|
mib[1] = HW_PHYSMEM64;
|
2015-06-11 05:15:11 +00:00
|
|
|
#endif
|
2015-05-16 13:26:11 +00:00
|
|
|
size_t length = sizeof(size_t);
|
|
|
|
sysctl(mib, 2, &physical_memory, &length, NULL, 0);
|
|
|
|
return physical_memory;
|
2017-02-22 17:21:10 +00:00
|
|
|
#elif defined __HAIKU__
|
|
|
|
system_info sysinfo;
|
|
|
|
get_system_info(&sysinfo);
|
|
|
|
return static_cast<size_t>(sysinfo.max_pages * B_PAGE_SIZE);
|
2015-05-16 13:26:11 +00:00
|
|
|
#else
|
|
|
|
struct sysinfo memInfo;
|
|
|
|
sysinfo(&memInfo);
|
|
|
|
return (size_t)memInfo.totalram * memInfo.mem_unit;
|
|
|
|
#endif
|
|
|
|
}
|
2016-08-07 17:03:07 +00:00
|
|
|
|
|
|
|
} // namespace Common
|