forked from chromium/chromium
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathmemory_mapped_file_win.cc
144 lines (117 loc) · 4.5 KB
/
memory_mapped_file_win.cc
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
// Copyright 2013 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "base/files/memory_mapped_file.h"
#include <stddef.h>
#include <stdint.h>
#include <limits>
#include "base/files/file_path.h"
#include "base/logging.h"
#include "base/strings/string16.h"
#include "base/threading/scoped_blocking_call.h"
#include "base/win/pe_image.h"
#include <windows.h>
#include <winnt.h> // NOLINT(build/include_order)
namespace base {
MemoryMappedFile::MemoryMappedFile() : data_(nullptr), length_(0) {}
bool MemoryMappedFile::MapImageToMemory(Access access) {
ScopedBlockingCall scoped_blocking_call(FROM_HERE, BlockingType::MAY_BLOCK);
// The arguments to the calls of ::CreateFile(), ::CreateFileMapping(), and
// ::MapViewOfFile() need to be self consistent as far as access rights and
// type of mapping or one or more of them will fail in non-obvious ways.
if (!file_.IsValid())
return false;
file_mapping_.Set(::CreateFileMapping(file_.GetPlatformFile(), nullptr,
PAGE_READONLY | SEC_IMAGE_NO_EXECUTE, 0,
0, NULL));
if (!file_mapping_.IsValid())
return false;
data_ = static_cast<uint8_t*>(
::MapViewOfFile(file_mapping_.Get(), FILE_MAP_READ, 0, 0, 0));
if (!data_)
return false;
// We need to know how large the mapped file is in some cases
base::win::PEImage pe_image(data_);
length_ = pe_image.GetNTHeaders()->OptionalHeader.SizeOfImage;
return true;
}
bool MemoryMappedFile::MapFileRegionToMemory(
const MemoryMappedFile::Region& region,
Access access) {
ScopedBlockingCall scoped_blocking_call(FROM_HERE, BlockingType::MAY_BLOCK);
DCHECK(access != READ_CODE_IMAGE || region == Region::kWholeFile);
if (!file_.IsValid())
return false;
int flags = 0;
ULARGE_INTEGER size = {};
switch (access) {
case READ_ONLY:
flags |= PAGE_READONLY;
break;
case READ_WRITE:
flags |= PAGE_READWRITE;
break;
case READ_WRITE_EXTEND:
flags |= PAGE_READWRITE;
size.QuadPart = region.size;
break;
case READ_CODE_IMAGE:
return MapImageToMemory(access);
}
file_mapping_.Set(::CreateFileMapping(file_.GetPlatformFile(), NULL, flags,
size.HighPart, size.LowPart, NULL));
if (!file_mapping_.IsValid())
return false;
LARGE_INTEGER map_start = {};
SIZE_T map_size = 0;
int32_t data_offset = 0;
if (region == MemoryMappedFile::Region::kWholeFile) {
DCHECK_NE(READ_WRITE_EXTEND, access);
int64_t file_len = file_.GetLength();
if (file_len <= 0 || !IsValueInRangeForNumericType<size_t>(file_len))
return false;
length_ = static_cast<size_t>(file_len);
} else {
// The region can be arbitrarily aligned. MapViewOfFile, instead, requires
// that the start address is aligned to the VM granularity (which is
// typically larger than a page size, for instance 32k).
// Also, conversely to POSIX's mmap, the |map_size| doesn't have to be
// aligned and must be less than or equal the mapped file size.
// We map here the outer region [|aligned_start|, |aligned_start+size|]
// which contains |region| and then add up the |data_offset| displacement.
int64_t aligned_start = 0;
size_t ignored = 0U;
CalculateVMAlignedBoundaries(region.offset, region.size, &aligned_start,
&ignored, &data_offset);
int64_t full_map_size = region.size + data_offset;
// Ensure that the casts below in the MapViewOfFile call are sane.
if (aligned_start < 0 || full_map_size < 0 ||
!IsValueInRangeForNumericType<SIZE_T>(
static_cast<uint64_t>(full_map_size))) {
DLOG(ERROR) << "Region bounds are not valid for MapViewOfFile";
return false;
}
map_start.QuadPart = aligned_start;
map_size = static_cast<SIZE_T>(full_map_size);
length_ = region.size;
}
data_ = static_cast<uint8_t*>(
::MapViewOfFile(file_mapping_.Get(),
(flags & PAGE_READONLY) ? FILE_MAP_READ : FILE_MAP_WRITE,
map_start.HighPart, map_start.LowPart, map_size));
if (data_ == nullptr)
return false;
data_ += data_offset;
return true;
}
void MemoryMappedFile::CloseHandles() {
if (data_)
::UnmapViewOfFile(data_);
if (file_mapping_.IsValid())
file_mapping_.Close();
if (file_.IsValid())
file_.Close();
data_ = nullptr;
length_ = 0;
}
} // namespace base