aboutsummaryrefslogtreecommitdiffstats
path: root/src/libs/3rdparty/botan/src/lib/utils/os_utils.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'src/libs/3rdparty/botan/src/lib/utils/os_utils.cpp')
-rw-r--r--src/libs/3rdparty/botan/src/lib/utils/os_utils.cpp461
1 files changed, 0 insertions, 461 deletions
diff --git a/src/libs/3rdparty/botan/src/lib/utils/os_utils.cpp b/src/libs/3rdparty/botan/src/lib/utils/os_utils.cpp
deleted file mode 100644
index 86e5443c30..0000000000
--- a/src/libs/3rdparty/botan/src/lib/utils/os_utils.cpp
+++ /dev/null
@@ -1,461 +0,0 @@
-/*
-* OS and machine specific utility functions
-* (C) 2015,2016,2017 Jack Lloyd
-* (C) 2016 Daniel Neus
-*
-* Botan is released under the Simplified BSD License (see license.txt)
-*/
-
-#include <botan/internal/os_utils.h>
-#include <botan/cpuid.h>
-#include <botan/exceptn.h>
-#include <botan/mem_ops.h>
-
-#include <chrono>
-#include <cstdlib>
-
-#if defined(BOTAN_TARGET_OS_HAS_EXPLICIT_BZERO)
- #include <string.h>
-#endif
-
-#if defined(BOTAN_TARGET_OS_HAS_POSIX1)
- #include <sys/types.h>
- #include <sys/resource.h>
- #include <sys/mman.h>
- #include <signal.h>
- #include <setjmp.h>
- #include <unistd.h>
- #include <errno.h>
-#endif
-
-#if defined(BOTAN_TARGET_OS_HAS_GETAUXVAL)
- #include <sys/auxv.h>
-#endif
-
-#if defined(BOTAN_TARGET_OS_HAS_WIN32)
- #define NOMINMAX 1
- #include <windows.h>
-#endif
-
-namespace Botan {
-
-// Not defined in OS namespace for historical reasons
-void secure_scrub_memory(void* ptr, size_t n)
- {
-#if defined(BOTAN_TARGET_OS_HAS_RTLSECUREZEROMEMORY)
- ::RtlSecureZeroMemory(ptr, n);
-
-#elif defined(BOTAN_TARGET_OS_HAS_EXPLICIT_BZERO)
- ::explicit_bzero(ptr, n);
-
-#elif defined(BOTAN_USE_VOLATILE_MEMSET_FOR_ZERO) && (BOTAN_USE_VOLATILE_MEMSET_FOR_ZERO == 1)
- /*
- Call memset through a static volatile pointer, which the compiler
- should not elide. This construct should be safe in conforming
- compilers, but who knows. I did confirm that on x86-64 GCC 6.1 and
- Clang 3.8 both create code that saves the memset address in the
- data segment and uncondtionally loads and jumps to that address.
- */
- static void* (*const volatile memset_ptr)(void*, int, size_t) = std::memset;
- (memset_ptr)(ptr, 0, n);
-#else
-
- volatile uint8_t* p = reinterpret_cast<volatile uint8_t*>(ptr);
-
- for(size_t i = 0; i != n; ++i)
- p[i] = 0;
-#endif
- }
-
-uint32_t OS::get_process_id()
- {
-#if defined(BOTAN_TARGET_OS_HAS_POSIX1)
- return ::getpid();
-#elif defined(BOTAN_TARGET_OS_HAS_WIN32)
- return ::GetCurrentProcessId();
-#elif defined(BOTAN_TARGET_OS_IS_INCLUDEOS) || defined(BOTAN_TARGET_OS_IS_LLVM)
- return 0; // truly no meaningful value
-#else
- #error "Missing get_process_id"
-#endif
- }
-
-bool OS::running_in_privileged_state()
- {
-#if defined(BOTAN_TARGET_OS_HAS_GETAUXVAL) && defined(AT_SECURE)
- return ::getauxval(AT_SECURE) != 0;
-#elif defined(BOTAN_TARGET_OS_HAS_POSIX1)
- return (::getuid() != ::geteuid()) || (::getgid() != ::getegid());
-#else
- return false;
-#endif
- }
-
-uint64_t OS::get_processor_timestamp()
- {
- uint64_t rtc = 0;
-
-#if defined(BOTAN_TARGET_OS_HAS_WIN32)
- LARGE_INTEGER tv;
- ::QueryPerformanceCounter(&tv);
- rtc = tv.QuadPart;
-
-#elif defined(BOTAN_USE_GCC_INLINE_ASM)
-
-#if defined(BOTAN_TARGET_CPU_IS_X86_FAMILY)
-
- if(CPUID::has_rdtsc())
- {
- uint32_t rtc_low = 0, rtc_high = 0;
- asm volatile("rdtsc" : "=d" (rtc_high), "=a" (rtc_low));
- rtc = (static_cast<uint64_t>(rtc_high) << 32) | rtc_low;
- }
-
-#elif defined(BOTAN_TARGET_ARCH_IS_PPC64)
-
- for(;;)
- {
- uint32_t rtc_low = 0, rtc_high = 0, rtc_high2 = 0;
- asm volatile("mftbu %0" : "=r" (rtc_high));
- asm volatile("mftb %0" : "=r" (rtc_low));
- asm volatile("mftbu %0" : "=r" (rtc_high2));
-
- if(rtc_high == rtc_high2)
- {
- rtc = (static_cast<uint64_t>(rtc_high) << 32) | rtc_low;
- break;
- }
- }
-
-#elif defined(BOTAN_TARGET_ARCH_IS_ALPHA)
- asm volatile("rpcc %0" : "=r" (rtc));
-
- // OpenBSD does not trap access to the %tick register
-#elif defined(BOTAN_TARGET_ARCH_IS_SPARC64) && !defined(BOTAN_TARGET_OS_IS_OPENBSD)
- asm volatile("rd %%tick, %0" : "=r" (rtc));
-
-#elif defined(BOTAN_TARGET_ARCH_IS_IA64)
- asm volatile("mov %0=ar.itc" : "=r" (rtc));
-
-#elif defined(BOTAN_TARGET_ARCH_IS_S390X)
- asm volatile("stck 0(%0)" : : "a" (&rtc) : "memory", "cc");
-
-#elif defined(BOTAN_TARGET_ARCH_IS_HPPA)
- asm volatile("mfctl 16,%0" : "=r" (rtc)); // 64-bit only?
-
-#else
- //#warning "OS::get_processor_timestamp not implemented"
-#endif
-
-#endif
-
- return rtc;
- }
-
-uint64_t OS::get_high_resolution_clock()
- {
- if(uint64_t cpu_clock = OS::get_processor_timestamp())
- return cpu_clock;
-
- /*
- If we got here either we either don't have an asm instruction
- above, or (for x86) RDTSC is not available at runtime. Try some
- clock_gettimes and return the first one that works, or otherwise
- fall back to std::chrono.
- */
-
-#if defined(BOTAN_TARGET_OS_HAS_CLOCK_GETTIME)
-
- // The ordering here is somewhat arbitrary...
- const clockid_t clock_types[] = {
-#if defined(CLOCK_MONOTONIC_HR)
- CLOCK_MONOTONIC_HR,
-#endif
-#if defined(CLOCK_MONOTONIC_RAW)
- CLOCK_MONOTONIC_RAW,
-#endif
-#if defined(CLOCK_MONOTONIC)
- CLOCK_MONOTONIC,
-#endif
-#if defined(CLOCK_PROCESS_CPUTIME_ID)
- CLOCK_PROCESS_CPUTIME_ID,
-#endif
-#if defined(CLOCK_THREAD_CPUTIME_ID)
- CLOCK_THREAD_CPUTIME_ID,
-#endif
- };
-
- for(clockid_t clock : clock_types)
- {
- struct timespec ts;
- if(::clock_gettime(clock, &ts) == 0)
- {
- return (static_cast<uint64_t>(ts.tv_sec) * 1000000000) + static_cast<uint64_t>(ts.tv_nsec);
- }
- }
-#endif
-
- // Plain C++11 fallback
- auto now = std::chrono::high_resolution_clock::now().time_since_epoch();
- return std::chrono::duration_cast<std::chrono::nanoseconds>(now).count();
- }
-
-uint64_t OS::get_system_timestamp_ns()
- {
-#if defined(BOTAN_TARGET_OS_HAS_CLOCK_GETTIME)
- struct timespec ts;
- if(::clock_gettime(CLOCK_REALTIME, &ts) == 0)
- {
- return (static_cast<uint64_t>(ts.tv_sec) * 1000000000) + static_cast<uint64_t>(ts.tv_nsec);
- }
-#endif
-
- auto now = std::chrono::system_clock::now().time_since_epoch();
- return std::chrono::duration_cast<std::chrono::nanoseconds>(now).count();
- }
-
-size_t OS::system_page_size()
- {
- const size_t default_page_size = 4096;
-
-#if defined(BOTAN_TARGET_OS_HAS_POSIX1)
- long p = ::sysconf(_SC_PAGESIZE);
- if(p > 1)
- return static_cast<size_t>(p);
- else
- return default_page_size;
-#elif defined(BOTAN_TARGET_OS_HAS_VIRTUAL_LOCK)
- SYSTEM_INFO sys_info;
- ::GetSystemInfo(&sys_info);
- return sys_info.dwPageSize;
-#else
- return default_page_size;
-#endif
- }
-
-size_t OS::get_memory_locking_limit()
- {
-#if defined(BOTAN_TARGET_OS_HAS_POSIX1) && defined(RLIMIT_MEMLOCK)
- /*
- * If RLIMIT_MEMLOCK is not defined, likely the OS does not support
- * unprivileged mlock calls.
- *
- * Linux defaults to only 64 KiB of mlockable memory per process
- * (too small) but BSDs offer a small fraction of total RAM (more
- * than we need). Bound the total mlock size to 512 KiB which is
- * enough to run the entire test suite without spilling to non-mlock
- * memory (and thus presumably also enough for many useful
- * programs), but small enough that we should not cause problems
- * even if many processes are mlocking on the same machine.
- */
- size_t mlock_requested = BOTAN_MLOCK_ALLOCATOR_MAX_LOCKED_KB;
-
- /*
- * Allow override via env variable
- */
- if(OS::running_in_privileged_state() == false)
- {
- if(const char* env = std::getenv("BOTAN_MLOCK_POOL_SIZE"))
- {
- try
- {
- const size_t user_req = std::stoul(env, nullptr);
- mlock_requested = std::min(user_req, mlock_requested);
- }
- catch(std::exception&) { /* ignore it */ }
- }
- }
-
- if(mlock_requested > 0)
- {
- struct ::rlimit limits;
-
- ::getrlimit(RLIMIT_MEMLOCK, &limits);
-
- if(limits.rlim_cur < limits.rlim_max)
- {
- limits.rlim_cur = limits.rlim_max;
- ::setrlimit(RLIMIT_MEMLOCK, &limits);
- ::getrlimit(RLIMIT_MEMLOCK, &limits);
- }
-
- return std::min<size_t>(limits.rlim_cur, mlock_requested * 1024);
- }
-
-#elif defined(BOTAN_TARGET_OS_HAS_VIRTUAL_LOCK)
- SIZE_T working_min = 0, working_max = 0;
- if(!::GetProcessWorkingSetSize(::GetCurrentProcess(), &working_min, &working_max))
- {
- return 0;
- }
-
- // According to Microsoft MSDN:
- // The maximum number of pages that a process can lock is equal to the number of pages in its minimum working set minus a small overhead
- // In the book "Windows Internals Part 2": the maximum lockable pages are minimum working set size - 8 pages
- // But the information in the book seems to be inaccurate/outdated
- // I've tested this on Windows 8.1 x64, Windows 10 x64 and Windows 7 x86
- // On all three OS the value is 11 instead of 8
- size_t overhead = OS::system_page_size() * 11ULL;
- if(working_min > overhead)
- {
- size_t lockable_bytes = working_min - overhead;
- if(lockable_bytes < (BOTAN_MLOCK_ALLOCATOR_MAX_LOCKED_KB * 1024ULL))
- {
- return lockable_bytes;
- }
- else
- {
- return BOTAN_MLOCK_ALLOCATOR_MAX_LOCKED_KB * 1024ULL;
- }
- }
-#endif
-
- // Not supported on this platform
- return 0;
- }
-
-void* OS::allocate_locked_pages(size_t length)
- {
-#if defined(BOTAN_TARGET_OS_HAS_POSIX1) && defined(BOTAN_TARGET_OS_HAS_POSIX_MLOCK)
-
-#if !defined(MAP_NOCORE)
- #define MAP_NOCORE 0
-#endif
-
-#if !defined(MAP_ANONYMOUS)
- #define MAP_ANONYMOUS MAP_ANON
-#endif
-
- void* ptr = ::mmap(nullptr,
- length,
- PROT_READ | PROT_WRITE,
- MAP_ANONYMOUS | MAP_SHARED | MAP_NOCORE,
- /*fd*/-1,
- /*offset*/0);
-
- if(ptr == MAP_FAILED)
- {
- return nullptr;
- }
-
-#if defined(MADV_DONTDUMP)
- ::madvise(ptr, length, MADV_DONTDUMP);
-#endif
-
- if(::mlock(ptr, length) != 0)
- {
- ::munmap(ptr, length);
- return nullptr; // failed to lock
- }
-
- ::memset(ptr, 0, length);
-
- return ptr;
-#elif defined(BOTAN_TARGET_OS_HAS_VIRTUAL_LOCK)
- LPVOID ptr = ::VirtualAlloc(nullptr, length, MEM_RESERVE | MEM_COMMIT, PAGE_READWRITE);
- if(!ptr)
- {
- return nullptr;
- }
-
- if(::VirtualLock(ptr, length) == 0)
- {
- ::VirtualFree(ptr, 0, MEM_RELEASE);
- return nullptr; // failed to lock
- }
-
- return ptr;
-#else
- BOTAN_UNUSED(length);
- return nullptr; /* not implemented */
-#endif
- }
-
-void OS::free_locked_pages(void* ptr, size_t length)
- {
- if(ptr == nullptr || length == 0)
- return;
-
-#if defined(BOTAN_TARGET_OS_HAS_POSIX1) && defined(BOTAN_TARGET_OS_HAS_POSIX_MLOCK)
- secure_scrub_memory(ptr, length);
- ::munlock(ptr, length);
- ::munmap(ptr, length);
-
-#elif defined(BOTAN_TARGET_OS_HAS_VIRTUAL_LOCK)
- secure_scrub_memory(ptr, length);
- ::VirtualUnlock(ptr, length);
- ::VirtualFree(ptr, 0, MEM_RELEASE);
-
-#else
- // Invalid argument because no way this pointer was allocated by us
- throw Invalid_Argument("Invalid ptr to free_locked_pages");
-#endif
- }
-
-#if defined(BOTAN_TARGET_OS_HAS_POSIX1)
-namespace {
-
-static ::sigjmp_buf g_sigill_jmp_buf;
-
-void botan_sigill_handler(int)
- {
- siglongjmp(g_sigill_jmp_buf, /*non-zero return value*/1);
- }
-
-}
-#endif
-
-int OS::run_cpu_instruction_probe(std::function<int ()> probe_fn)
- {
- volatile int probe_result = -3;
-
-#if defined(BOTAN_TARGET_OS_HAS_POSIX1)
- struct sigaction old_sigaction;
- struct sigaction sigaction;
-
- sigaction.sa_handler = botan_sigill_handler;
- sigemptyset(&sigaction.sa_mask);
- sigaction.sa_flags = 0;
-
- int rc = ::sigaction(SIGILL, &sigaction, &old_sigaction);
-
- if(rc != 0)
- throw Exception("run_cpu_instruction_probe sigaction failed");
-
- rc = sigsetjmp(g_sigill_jmp_buf, /*save sigs*/1);
-
- if(rc == 0)
- {
- // first call to sigsetjmp
- probe_result = probe_fn();
- }
- else if(rc == 1)
- {
- // non-local return from siglongjmp in signal handler: return error
- probe_result = -1;
- }
-
- // Restore old SIGILL handler, if any
- rc = ::sigaction(SIGILL, &old_sigaction, nullptr);
- if(rc != 0)
- throw Exception("run_cpu_instruction_probe sigaction restore failed");
-
-#elif defined(BOTAN_TARGET_OS_IS_WINDOWS) && defined(BOTAN_TARGET_COMPILER_IS_MSVC)
-
- // Windows SEH
- __try
- {
- probe_result = probe_fn();
- }
- __except(::GetExceptionCode() == EXCEPTION_ILLEGAL_INSTRUCTION ?
- EXCEPTION_EXECUTE_HANDLER : EXCEPTION_CONTINUE_SEARCH)
- {
- probe_result = -1;
- }
-
-#endif
-
- return probe_result;
- }
-
-}