9#include <botan/internal/os_utils.h>
11#include <botan/exceptn.h>
12#include <botan/mem_ops.h>
13#include <botan/internal/cpuid.h>
21#if defined(BOTAN_TARGET_OS_HAS_EXPLICIT_BZERO)
25#if defined(BOTAN_TARGET_OS_HAS_POSIX1)
32 #include <sys/resource.h>
33 #include <sys/types.h>
39#if defined(BOTAN_TARGET_OS_IS_EMSCRIPTEN)
40 #include <emscripten/emscripten.h>
43#if defined(BOTAN_TARGET_OS_HAS_GETAUXVAL) || defined(BOTAN_TARGET_OS_HAS_ELF_AUX_INFO)
47#if defined(BOTAN_TARGET_OS_HAS_AUXINFO)
52#if defined(BOTAN_TARGET_OS_HAS_WIN32)
56 #if defined(BOTAN_BUILD_COMPILER_IS_MSVC)
57 #include <libloaderapi.h>
58 #include <stringapiset.h>
62#if defined(BOTAN_TARGET_OS_IS_IOS) || defined(BOTAN_TARGET_OS_IS_MACOS)
63 #include <mach/vm_statistics.h>
64 #include <sys/sysctl.h>
65 #include <sys/types.h>
68#if defined(BOTAN_TARGET_OS_HAS_PRCTL)
69 #include <sys/prctl.h>
72#if defined(BOTAN_TARGET_OS_IS_FREEBSD) || defined(BOTAN_TARGET_OS_IS_OPENBSD) || defined(BOTAN_TARGET_OS_IS_DRAGONFLY)
73 #include <pthread_np.h>
76#if defined(BOTAN_TARGET_OS_IS_HAIKU)
77 #include <kernel/OS.h>
83#if defined(BOTAN_TARGET_OS_HAS_POSIX1)
85#elif defined(BOTAN_TARGET_OS_HAS_WIN32)
86 return ::GetCurrentProcessId();
87#elif defined(BOTAN_TARGET_OS_IS_LLVM) || defined(BOTAN_TARGET_OS_IS_NONE)
90 #error "Missing get_process_id"
96#if defined(BOTAN_TARGET_OS_HAS_GETAUXVAL) || defined(BOTAN_TARGET_OS_HAS_ELF_AUX_INFO) || \
97 defined(BOTAN_TARGET_OS_HAS_AUXINFO)
99 #define BOTAN_TARGET_HAS_AUXVAL_INTERFACE
102std::optional<unsigned long> auxval_hwcap() {
105#elif defined(BOTAN_TARGET_HAS_AUXVAL_INTERFACE)
114std::optional<unsigned long> auxval_hwcap2() {
115#if defined(AT_HWCAP2)
117#elif defined(BOTAN_TARGET_HAS_AUXVAL_INTERFACE)
126std::optional<unsigned long> get_auxval(std::optional<unsigned long>
id) {
128#if defined(BOTAN_TARGET_OS_HAS_GETAUXVAL)
129 return ::getauxval(*
id);
130#elif defined(BOTAN_TARGET_OS_HAS_ELF_AUX_INFO)
131 unsigned long auxinfo = 0;
132 if(::elf_aux_info(
static_cast<int>(*
id), &auxinfo,
sizeof(auxinfo)) == 0) {
135#elif defined(BOTAN_TARGET_OS_HAS_AUXINFO)
136 for(
const AuxInfo* auxinfo =
static_cast<AuxInfo*
>(::_dlauxinfo()); auxinfo != AT_NULL; ++auxinfo) {
137 if(*
id == auxinfo->a_type) {
151 if(
const auto hwcap = get_auxval(auxval_hwcap())) {
154 auto hwcap2 = get_auxval(auxval_hwcap2()).value_or(0);
155 return std::make_pair(*hwcap, hwcap2);
167bool running_in_privileged_state() {
168#if defined(AT_SECURE)
169 if(
auto at_secure = get_auxval(AT_SECURE)) {
170 return at_secure != 0;
174#if defined(BOTAN_TARGET_OS_HAS_POSIX1)
175 return (::getuid() != ::geteuid()) || (::getgid() != ::getegid());
186#if defined(BOTAN_TARGET_OS_HAS_WIN32)
188 ::QueryPerformanceCounter(&tv);
191#elif defined(BOTAN_USE_GCC_INLINE_ASM)
193 #if defined(BOTAN_TARGET_CPU_IS_X86_FAMILY)
195 if(CPUID::has_rdtsc()) {
196 uint32_t rtc_low = 0, rtc_high = 0;
197 asm volatile(
"rdtsc" :
"=d"(rtc_high),
"=a"(rtc_low));
198 rtc = (
static_cast<uint64_t
>(rtc_high) << 32) | rtc_low;
201 #elif defined(BOTAN_TARGET_ARCH_IS_PPC64)
204 uint32_t rtc_low = 0, rtc_high = 0, rtc_high2 = 0;
205 asm volatile(
"mftbu %0" :
"=r"(rtc_high));
206 asm volatile(
"mftb %0" :
"=r"(rtc_low));
207 asm volatile(
"mftbu %0" :
"=r"(rtc_high2));
209 if(rtc_high == rtc_high2) {
210 rtc = (
static_cast<uint64_t
>(rtc_high) << 32) | rtc_low;
215 #elif defined(BOTAN_TARGET_ARCH_IS_ALPHA)
216 asm volatile(
"rpcc %0" :
"=r"(rtc));
219 #elif defined(BOTAN_TARGET_ARCH_IS_SPARC64) && !defined(BOTAN_TARGET_OS_IS_OPENBSD)
220 asm volatile(
"rd %%tick, %0" :
"=r"(rtc));
222 #elif defined(BOTAN_TARGET_ARCH_IS_IA64)
223 asm volatile(
"mov %0=ar.itc" :
"=r"(rtc));
225 #elif defined(BOTAN_TARGET_ARCH_IS_S390X)
226 asm volatile(
"stck 0(%0)" : :
"a"(&rtc) :
"memory",
"cc");
228 #elif defined(BOTAN_TARGET_ARCH_IS_HPPA)
229 asm volatile(
"mfctl 16,%0" :
"=r"(rtc));
241#if defined(BOTAN_TARGET_OS_HAS_POSIX1)
243 #if defined(_SC_NPROCESSORS_ONLN)
244 const long cpu_online = ::sysconf(_SC_NPROCESSORS_ONLN);
246 return static_cast<size_t>(cpu_online);
250 #if defined(_SC_NPROCESSORS_CONF)
251 const long cpu_conf = ::sysconf(_SC_NPROCESSORS_CONF);
253 return static_cast<size_t>(cpu_conf);
259#if defined(BOTAN_TARGET_OS_HAS_THREADS)
262 const size_t hw_concur = std::thread::hardware_concurrency();
277#if defined(BOTAN_TARGET_OS_IS_EMSCRIPTEN)
278 return emscripten_get_now();
288#if defined(BOTAN_TARGET_OS_HAS_CLOCK_GETTIME)
291 const clockid_t clock_types[] = {
292 #if defined(CLOCK_MONOTONIC_HR)
295 #if defined(CLOCK_MONOTONIC_RAW)
298 #if defined(CLOCK_MONOTONIC)
301 #if defined(CLOCK_PROCESS_CPUTIME_ID)
302 CLOCK_PROCESS_CPUTIME_ID,
304 #if defined(CLOCK_THREAD_CPUTIME_ID)
305 CLOCK_THREAD_CPUTIME_ID,
309 for(clockid_t clock : clock_types) {
311 if(::clock_gettime(clock, &ts) == 0) {
312 return (
static_cast<uint64_t
>(ts.tv_sec) * 1000000000) +
static_cast<uint64_t
>(ts.tv_nsec);
317#if defined(BOTAN_TARGET_OS_HAS_SYSTEM_CLOCK)
319 auto now = std::chrono::high_resolution_clock::now().time_since_epoch();
320 return std::chrono::duration_cast<std::chrono::nanoseconds>(now).count();
327#if defined(BOTAN_TARGET_OS_HAS_CLOCK_GETTIME)
329 if(::clock_gettime(CLOCK_REALTIME, &ts) == 0) {
330 return (
static_cast<uint64_t
>(ts.tv_sec) * 1000000000) +
static_cast<uint64_t
>(ts.tv_nsec);
334#if defined(BOTAN_TARGET_OS_HAS_SYSTEM_CLOCK)
335 auto now = std::chrono::system_clock::now().time_since_epoch();
336 return std::chrono::duration_cast<std::chrono::nanoseconds>(now).count();
338 throw Not_Implemented(
"OS::get_system_timestamp_ns this system does not support a clock");
345#if defined(BOTAN_TARGET_OS_HAS_WIN32)
346 localtime_s(&tm, &time);
347#elif defined(BOTAN_TARGET_OS_HAS_POSIX1)
348 localtime_r(&time, &tm);
350 if(
auto tmp = std::localtime(&time)) {
357 std::ostringstream oss;
358 oss << std::put_time(&tm, format.c_str());
363 const size_t default_page_size = 4096;
365#if defined(BOTAN_TARGET_OS_HAS_POSIX1)
366 long p = ::sysconf(_SC_PAGESIZE);
368 return static_cast<size_t>(p);
370 return default_page_size;
372#elif defined(BOTAN_TARGET_OS_HAS_VIRTUAL_LOCK)
374 SYSTEM_INFO sys_info;
375 ::GetSystemInfo(&sys_info);
376 return sys_info.dwPageSize;
378 return default_page_size;
391 const size_t max_locked_kb = 512;
397#if defined(RLIMIT_MEMLOCK) && defined(BOTAN_TARGET_OS_HAS_POSIX1) && defined(BOTAN_TARGET_OS_HAS_POSIX_MLOCK)
398 const size_t mlock_requested =
401 if(mlock_requested > 0) {
402 struct ::rlimit limits;
404 ::getrlimit(RLIMIT_MEMLOCK, &limits);
406 if(limits.rlim_cur < limits.rlim_max) {
407 limits.rlim_cur = limits.rlim_max;
408 ::setrlimit(RLIMIT_MEMLOCK, &limits);
409 ::getrlimit(RLIMIT_MEMLOCK, &limits);
412 return std::min<size_t>(limits.rlim_cur, mlock_requested * 1024);
415#elif defined(BOTAN_TARGET_OS_HAS_VIRTUAL_LOCK)
416 const size_t mlock_requested =
419 SIZE_T working_min = 0, working_max = 0;
420 if(!::GetProcessWorkingSetSize(::GetCurrentProcess(), &working_min, &working_max)) {
431 if(working_min > overhead) {
432 const size_t lockable_bytes = working_min - overhead;
433 return std::min<size_t>(lockable_bytes, mlock_requested * 1024);
446 if(running_in_privileged_state()) {
450#if defined(BOTAN_TARGET_OS_HAS_WIN32) && defined(BOTAN_BUILD_COMPILER_IS_MSVC)
451 const std::string
name(name_view);
454 if(getenv_s(&req_size, val,
sizeof(val),
name.c_str()) == 0) {
458 if(req_size > 0 && val[req_size - 1] ==
'\0') {
459 value_out = std::string(val);
461 value_out = std::string(val, req_size);
466 const std::string
name(name_view);
467 if(
const char* val = std::getenv(
name.c_str())) {
480 const size_t val = std::stoul(value,
nullptr);
482 }
catch(std::exception&) {
489#if defined(BOTAN_TARGET_OS_HAS_POSIX1) && defined(BOTAN_TARGET_OS_HAS_POSIX_MLOCK)
494 #if defined(BOTAN_TARGET_OS_IS_IOS) || defined(BOTAN_TARGET_OS_IS_MACOS)
497 static constexpr int default_locked_fd = 255;
498 int locked_fd = default_locked_fd;
500 if(
size_t locked_fdl = OS::read_env_variable_sz(
"BOTAN_LOCKED_FD", default_locked_fd)) {
501 if(locked_fdl < 240 || locked_fdl > 255) {
502 locked_fdl = default_locked_fd;
504 locked_fd =
static_cast<int>(locked_fdl);
506 return VM_MAKE_TAG(locked_fd);
517 std::vector<void*> result;
519#if(defined(BOTAN_TARGET_OS_HAS_POSIX1) && defined(BOTAN_TARGET_OS_HAS_POSIX_MLOCK)) || \
520 defined(BOTAN_TARGET_OS_HAS_VIRTUAL_LOCK)
522 result.reserve(count);
526 #if defined(BOTAN_TARGET_OS_HAS_POSIX1) && defined(BOTAN_TARGET_OS_HAS_POSIX_MLOCK)
527 static const int locked_fd = get_locked_fd();
530 for(
size_t i = 0; i != count; ++i) {
533 #if defined(BOTAN_TARGET_OS_HAS_POSIX1) && defined(BOTAN_TARGET_OS_HAS_POSIX_MLOCK)
535 int mmap_flags = MAP_PRIVATE;
537 #if defined(MAP_ANONYMOUS)
538 mmap_flags |= MAP_ANONYMOUS;
539 #elif defined(MAP_ANON)
540 mmap_flags |= MAP_ANON;
543 #if defined(MAP_CONCEAL)
544 mmap_flags |= MAP_CONCEAL;
545 #elif defined(MAP_NOCORE)
546 mmap_flags |= MAP_NOCORE;
549 int mmap_prot = PROT_READ | PROT_WRITE;
551 #if defined(PROT_MAX)
552 mmap_prot |= PROT_MAX(mmap_prot);
555 ptr = ::mmap(
nullptr,
562 if(ptr == MAP_FAILED) {
567 if(::mlock(
static_cast<uint8_t*
>(ptr) + page_size, page_size) != 0) {
568 ::munmap(ptr, 3 * page_size);
572 #if defined(MADV_DONTDUMP)
574 ::madvise(
static_cast<uint8_t*
>(ptr) + page_size, page_size, MADV_DONTDUMP);
577 #elif defined(BOTAN_TARGET_OS_HAS_VIRTUAL_LOCK)
578 ptr = ::VirtualAlloc(
nullptr, 3 * page_size, MEM_RESERVE | MEM_COMMIT, PAGE_READWRITE);
583 if(::VirtualLock(
static_cast<uint8_t*
>(ptr) + page_size, page_size) == 0) {
584 ::VirtualFree(ptr, 0, MEM_RELEASE);
589 std::memset(ptr, 0, 3 * page_size);
598 result.push_back(
static_cast<uint8_t*
>(ptr) + page_size);
608#if defined(BOTAN_TARGET_OS_HAS_POSIX1)
610 ::mprotect(page, page_size, PROT_READ | PROT_WRITE);
611#elif defined(BOTAN_TARGET_OS_HAS_VIRTUAL_LOCK)
614 ::VirtualProtect(page, page_size, PAGE_READWRITE, &old_perms);
622#if defined(BOTAN_TARGET_OS_HAS_POSIX1)
624 ::mprotect(page, page_size, PROT_NONE);
625#elif defined(BOTAN_TARGET_OS_HAS_VIRTUAL_LOCK)
628 ::VirtualProtect(page, page_size, PAGE_NOACCESS, &old_perms);
638 for(
size_t i = 0; i != pages.size(); ++i) {
639 void* ptr = pages[i];
647#if defined(BOTAN_TARGET_OS_HAS_POSIX1) && defined(BOTAN_TARGET_OS_HAS_POSIX_MLOCK)
648 ::munlock(ptr, page_size);
649 ::munmap(
static_cast<uint8_t*
>(ptr) - page_size, 3 * page_size);
650#elif defined(BOTAN_TARGET_OS_HAS_VIRTUAL_LOCK)
651 ::VirtualUnlock(ptr, page_size);
652 ::VirtualFree(
static_cast<uint8_t*
>(ptr) - page_size, 0, MEM_RELEASE);
658#if defined(BOTAN_TARGET_OS_HAS_PRCTL) && defined(PR_SET_VMA) && defined(PR_SET_VMA_ANON_NAME)
659 static constexpr char name[] =
"Botan mlock pool";
660 int r = prctl(PR_SET_VMA, PR_SET_VMA_ANON_NAME,
reinterpret_cast<uintptr_t
>(page), size,
name);
667#if defined(BOTAN_TARGET_OS_HAS_THREADS)
668void OS::set_thread_name(std::thread& thread,
const std::string&
name) {
669 #if defined(BOTAN_TARGET_OS_IS_LINUX) || defined(BOTAN_TARGET_OS_IS_FREEBSD) || defined(BOTAN_TARGET_OS_IS_DRAGONFLY)
670 static_cast<void>(pthread_setname_np(thread.native_handle(),
name.c_str()));
671 #elif defined(BOTAN_TARGET_OS_IS_OPENBSD)
672 static_cast<void>(pthread_set_name_np(thread.native_handle(),
name.c_str()));
673 #elif defined(BOTAN_TARGET_OS_IS_NETBSD)
674 static_cast<void>(pthread_setname_np(thread.native_handle(),
"%s",
const_cast<char*
>(
name.c_str())));
675 #elif defined(BOTAN_TARGET_OS_HAS_WIN32) && defined(_LIBCPP_HAS_THREAD_API_PTHREAD)
676 static_cast<void>(pthread_setname_np(thread.native_handle(),
name.c_str()));
677 #elif defined(BOTAN_TARGET_OS_HAS_WIN32) && defined(BOTAN_BUILD_COMPILER_IS_MSVC)
678 typedef HRESULT(WINAPI * std_proc)(HANDLE, PCWSTR);
679 HMODULE kern = GetModuleHandleA(
"KernelBase.dll");
680 std_proc set_thread_name =
reinterpret_cast<std_proc
>(GetProcAddress(kern,
"SetThreadDescription"));
681 if(set_thread_name) {
683 auto sz = MultiByteToWideChar(CP_UTF8, 0,
name.data(), -1,
nullptr, 0);
686 if(MultiByteToWideChar(CP_UTF8, 0,
name.data(), -1, &w[0], sz) > 0) {
687 (void)set_thread_name(thread.native_handle(), w.c_str());
691 #elif defined(BOTAN_TARGET_OS_IF_HAIKU)
692 auto thread_id = get_pthread_thread_id(thread.native_handle());
693 static_cast<void>(rename_thread(thread_id,
name.c_str()));
702#if defined(BOTAN_TARGET_OS_HAS_POSIX1) && !defined(BOTAN_TARGET_OS_IS_EMSCRIPTEN)
707::sigjmp_buf g_sigill_jmp_buf;
709void botan_sigill_handler(
int ) {
710 siglongjmp(g_sigill_jmp_buf, 1);
718 volatile int probe_result = -3;
720#if defined(BOTAN_TARGET_OS_HAS_POSIX1) && !defined(BOTAN_TARGET_OS_IS_EMSCRIPTEN)
721 struct sigaction old_sigaction;
722 struct sigaction sigaction;
724 sigaction.sa_handler = botan_sigill_handler;
725 sigemptyset(&sigaction.sa_mask);
726 sigaction.sa_flags = 0;
728 int rc = ::sigaction(SIGILL, &sigaction, &old_sigaction);
731 throw System_Error(
"run_cpu_instruction_probe sigaction failed", errno);
734 rc = sigsetjmp(g_sigill_jmp_buf, 1);
738 probe_result = probe_fn();
745 rc = ::sigaction(SIGILL, &old_sigaction,
nullptr);
747 throw System_Error(
"run_cpu_instruction_probe sigaction restore failed", errno);
758#if defined(BOTAN_TARGET_OS_HAS_POSIX1)
761 POSIX_Echo_Suppression() {
762 m_stdin_fd = fileno(stdin);
763 if(::tcgetattr(m_stdin_fd, &m_old_termios) != 0) {
764 throw System_Error(
"Getting terminal status failed", errno);
767 struct termios noecho_flags = m_old_termios;
768 noecho_flags.c_lflag &= ~ECHO;
769 noecho_flags.c_lflag |= ECHONL;
771 if(::tcsetattr(m_stdin_fd, TCSANOW, &noecho_flags) != 0) {
772 throw System_Error(
"Clearing terminal echo bit failed", errno);
776 void reenable_echo()
override {
778 if(::tcsetattr(m_stdin_fd, TCSANOW, &m_old_termios) != 0) {
779 throw System_Error(
"Restoring terminal echo bit failed", errno);
785 ~POSIX_Echo_Suppression()
override {
791 POSIX_Echo_Suppression(
const POSIX_Echo_Suppression& other) =
delete;
792 POSIX_Echo_Suppression(POSIX_Echo_Suppression&& other) =
delete;
793 POSIX_Echo_Suppression& operator=(
const POSIX_Echo_Suppression& other) =
delete;
794 POSIX_Echo_Suppression& operator=(POSIX_Echo_Suppression&& other) =
delete;
798 struct termios m_old_termios;
801 return std::make_unique<POSIX_Echo_Suppression>();
803#elif defined(BOTAN_TARGET_OS_HAS_WIN32)
807 Win32_Echo_Suppression() {
808 m_input_handle = ::GetStdHandle(STD_INPUT_HANDLE);
809 if(::GetConsoleMode(m_input_handle, &m_console_state) == 0)
810 throw System_Error(
"Getting console mode failed", ::GetLastError());
812 DWORD new_mode = ENABLE_LINE_INPUT | ENABLE_PROCESSED_INPUT;
813 if(::SetConsoleMode(m_input_handle, new_mode) == 0)
814 throw System_Error(
"Setting console mode failed", ::GetLastError());
817 void reenable_echo()
override {
818 if(m_input_handle != INVALID_HANDLE_VALUE) {
819 if(::SetConsoleMode(m_input_handle, m_console_state) == 0)
820 throw System_Error(
"Setting console mode failed", ::GetLastError());
821 m_input_handle = INVALID_HANDLE_VALUE;
825 ~Win32_Echo_Suppression()
override {
831 Win32_Echo_Suppression(
const Win32_Echo_Suppression& other) =
delete;
832 Win32_Echo_Suppression(Win32_Echo_Suppression&& other) =
delete;
833 Win32_Echo_Suppression& operator=(
const Win32_Echo_Suppression& other) =
delete;
834 Win32_Echo_Suppression& operator=(Win32_Echo_Suppression&& other) =
delete;
837 HANDLE m_input_handle;
838 DWORD m_console_state;
841 return std::make_unique<Win32_Echo_Suppression>();
size_t get_memory_locking_limit()
uint64_t BOTAN_TEST_API get_high_resolution_clock()
size_t BOTAN_TEST_API get_cpu_available()
std::unique_ptr< Echo_Suppression > BOTAN_UNSTABLE_API suppress_echo_on_terminal()
size_t read_env_variable_sz(std::string_view var_name, size_t def_value=0)
void page_allow_access(void *page)
std::string BOTAN_TEST_API format_time(time_t time, const std::string &format)
bool read_env_variable(std::string &value_out, std::string_view var_name)
void page_prohibit_access(void *page)
std::optional< std::pair< unsigned long, unsigned long > > get_auxval_hwcap()
int BOTAN_TEST_API run_cpu_instruction_probe(const std::function< int()> &probe_fn)
std::vector< void * > allocate_locked_pages(size_t count)
size_t system_page_size()
uint64_t BOTAN_TEST_API get_system_timestamp_ns()
void free_locked_pages(const std::vector< void * > &pages)
void page_named(void *page, size_t size)
uint32_t BOTAN_TEST_API get_process_id()
uint64_t BOTAN_TEST_API get_cpu_cycle_counter()
void secure_scrub_memory(void *ptr, size_t n)