cranelift_jit/memory/
mod.rs1use cranelift_module::{ModuleError, ModuleResult};
2use std::io;
3
4mod arena;
5mod system;
6
7pub use arena::ArenaMemoryProvider;
8pub use system::SystemMemoryProvider;
9
10#[derive(Clone, Copy, Debug, PartialEq)]
12pub enum BranchProtection {
13 None,
15 BTI,
17}
18
19pub enum JITMemoryKind {
20 Executable,
22 Writable,
24 ReadOnly,
26}
27
28pub trait JITMemoryProvider {
30 fn allocate(&mut self, size: usize, align: u64, kind: JITMemoryKind) -> io::Result<*mut u8>;
32
33 unsafe fn free_memory(&mut self);
35 fn finalize(&mut self, branch_protection: BranchProtection) -> ModuleResult<()>;
37}
38
39pub(crate) fn set_readable_and_executable(
46 ptr: *mut u8,
47 len: usize,
48 branch_protection: BranchProtection,
49) -> ModuleResult<()> {
50 unsafe {
55 wasmtime_jit_icache_coherence::clear_cache(ptr as *const libc::c_void, len)
56 .expect("Failed cache clear")
57 };
58
59 unsafe {
60 region::protect(ptr, len, region::Protection::READ_EXECUTE).map_err(|e| {
61 ModuleError::Backend(
62 anyhow::Error::new(e).context("unable to make memory readable+executable"),
63 )
64 })?;
65 }
66
67 if branch_protection == BranchProtection::BTI {
69 #[cfg(all(target_arch = "aarch64", target_os = "linux"))]
70 if std::arch::is_aarch64_feature_detected!("bti") {
71 let prot = libc::PROT_EXEC | libc::PROT_READ | 0x10;
72
73 unsafe {
74 if libc::mprotect(ptr as *mut libc::c_void, len, prot) < 0 {
75 return Err(ModuleError::Backend(
76 anyhow::Error::new(io::Error::last_os_error())
77 .context("unable to make memory readable+executable"),
78 ));
79 }
80 }
81 }
82 }
83
84 Ok(())
85}