You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
94 lines
2.4 KiB
94 lines
2.4 KiB
/*
|
|
* Copyright 2002-2019 Intel Corporation.
|
|
*
|
|
* This software is provided to you as Sample Source Code as defined in the accompanying
|
|
* End User License Agreement for the Intel(R) Software Development Products ("Agreement")
|
|
* section 1.L.
|
|
*
|
|
* This software and the related documents are provided as is, with no express or implied
|
|
* warranties, other than those that are expressly stated in the License.
|
|
*/
|
|
|
|
|
|
/*! @file
|
|
* Implementation of the memory management API in Unix.
|
|
*/
|
|
#include "sys_memory.h"
|
|
#include <unistd.h>
|
|
#include <sys/mman.h>
|
|
#if defined(TARGET_MAC)
|
|
# include <stdbool.h>
|
|
# include <mach/mach.h>
|
|
#endif
|
|
|
|
/*!
|
|
* Given a MEM_PROTECTION attribute, return corresponding Unix protection flags.
|
|
*/
|
|
static int SysProtection(MEM_PROTECTION protect)
|
|
{
|
|
switch (protect)
|
|
{
|
|
case MEM_READ_EXEC:
|
|
return PROT_READ|PROT_EXEC;
|
|
case MEM_READ_WRITE_EXEC:
|
|
return PROT_READ|PROT_WRITE|PROT_EXEC;
|
|
default:
|
|
return PROT_NONE;
|
|
}
|
|
}
|
|
|
|
/*!
|
|
* Implementation of the memory management API.
|
|
*/
|
|
size_t GetPageSize()
|
|
{
|
|
return (size_t)getpagesize();
|
|
}
|
|
|
|
void MemFree(void * addr, size_t size)
|
|
{
|
|
munmap(addr, size);
|
|
}
|
|
|
|
int MemProtect(void * addr, size_t size, MEM_PROTECTION protect)
|
|
{
|
|
|
|
int res = mprotect(addr, size, SysProtection(protect));
|
|
#if defined(TARGET_MAC)
|
|
if (-1 == res)
|
|
{
|
|
// When a caller finds that he cannot obtain write permission on a mapped entry, the following VM_PROT_COPY flag
|
|
// can be used.
|
|
// The entry will be made "needs copy" effectively copying the object (using COW), and write permission will be added
|
|
// to the maximum protections for the associated entry.
|
|
kern_return_t kret = vm_protect(mach_task_self(), (unsigned long)addr, size, false, SysProtection(protect) | VM_PROT_COPY);
|
|
if (kret != KERN_SUCCESS)
|
|
{
|
|
return 0;
|
|
}
|
|
}
|
|
return 1;
|
|
|
|
#else
|
|
return (-1 != res);
|
|
#endif
|
|
}
|
|
|
|
void * MemAlloc(size_t size, MEM_PROTECTION protect)
|
|
{
|
|
#if defined(TARGET_MAC) || defined(TARGET_BSD)
|
|
void * addr = mmap(0, size, SysProtection(protect), MAP_ANON | MAP_PRIVATE, -1, 0);
|
|
#else
|
|
void * addr = mmap(0, size, SysProtection(protect), MAP_ANONYMOUS | MAP_PRIVATE, -1, 0);
|
|
#endif
|
|
if (addr != MAP_FAILED)
|
|
{
|
|
return addr;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
/* ===================================================================== */
|
|
/* eof */
|
|
/* ===================================================================== */
|