forked from szaydel/memcall
-
Notifications
You must be signed in to change notification settings - Fork 0
/
memcall_unix.go
96 lines (76 loc) · 2.43 KB
/
memcall_unix.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
//go:build !windows && !darwin && !openbsd && !freebsd && !aix && !netbsd
package memcall
import (
"errors"
"fmt"
"golang.org/x/sys/unix"
)
// Lock is a wrapper for mlock(2), with extra precautions.
func Lock(b []byte) error {
// Advise the kernel not to dump. Ignore failure.
unix.Madvise(b, unix.MADV_DONTDUMP)
// Call mlock.
if err := unix.Mlock(b); err != nil {
return fmt.Errorf("<memcall> could not acquire lock on %p, limit reached? [Err: %s]", _getStartPtr(b), err)
}
return nil
}
// Unlock is a wrapper for munlock(2).
func Unlock(b []byte) error {
if err := unix.Munlock(b); err != nil {
return fmt.Errorf("<memcall> could not free lock on %p [Err: %s]", _getStartPtr(b), err)
}
return nil
}
// Alloc allocates a byte slice of length n and returns it.
func Alloc(n int) ([]byte, error) {
// Allocate the memory.
b, err := unix.Mmap(-1, 0, n, unix.PROT_READ|unix.PROT_WRITE, unix.MAP_PRIVATE|unix.MAP_ANONYMOUS)
if err != nil {
return nil, fmt.Errorf("<memcall> could not allocate [Err: %s]", err)
}
// Wipe it just in case there is some remnant data.
wipe(b)
// Return the allocated memory.
return b, nil
}
// Free deallocates the byte slice specified.
func Free(b []byte) error {
// Make the memory region readable and writable.
if err := Protect(b, ReadWrite()); err != nil {
return err
}
// Wipe the memory region in case of remnant data.
wipe(b)
// Free the memory back to the kernel.
if err := unix.Munmap(b); err != nil {
return fmt.Errorf("<memcall> could not deallocate %p [Err: %s]", _getStartPtr(b), err)
}
return nil
}
// Protect modifies the protection state for a specified byte slice.
func Protect(b []byte, mpf MemoryProtectionFlag) error {
var prot int
if mpf.flag == ReadWrite().flag {
prot = unix.PROT_READ | unix.PROT_WRITE
} else if mpf.flag == ReadOnly().flag {
prot = unix.PROT_READ
} else if mpf.flag == NoAccess().flag {
prot = unix.PROT_NONE
} else {
return errors.New(ErrInvalidFlag)
}
// Change the protection value of the byte slice.
if err := unix.Mprotect(b, prot); err != nil {
return fmt.Errorf("<memcall> could not set %d on %p [Err: %s]", prot, _getStartPtr(b), err)
}
return nil
}
// DisableCoreDumps disables core dumps on Unix systems.
func DisableCoreDumps() error {
// Disable core dumps.
if err := unix.Setrlimit(unix.RLIMIT_CORE, &unix.Rlimit{Cur: 0, Max: 0}); err != nil {
return fmt.Errorf("<memcall> could not set rlimit [Err: %s]", err)
}
return nil
}