xmrig/win/memory_win.c

110 lines
3.2 KiB
C
Raw Normal View History

2017-04-15 06:02:08 +00:00
/* XMRig
* Copyright 2010 Jeff Garzik <jgarzik@pobox.com>
* Copyright 2012-2014 pooler <pooler@litecoinpool.org>
* Copyright 2014 Lucas Jones <https://github.com/lucasjones>
* Copyright 2014-2016 Wolf9466 <https://github.com/OhGodAPet>
* Copyright 2016 Jay D Dee <jayddee246@gmail.com>
* Copyright 2016-2017 XMRig <support@xmrig.com>
*
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
2017-04-21 08:56:11 +00:00
2017-04-15 06:02:08 +00:00
#ifndef __MEMORY_H__
#define __MEMORY_H__
#include <windows.h>
#include "options.h"
#include "persistent_memory.h"
char *persistent_memory;
int persistent_memory_flags = 0;
/*****************************************************************
SetLockPagesPrivilege: a function to obtain or
release the privilege of locking physical pages.
Inputs:
HANDLE hProcess: Handle for the process for which the
privilege is needed
BOOL bEnable: Enable (TRUE) or disable?
Return value: TRUE indicates success, FALSE failure.
*****************************************************************/
/**
* AWE Example: https://msdn.microsoft.com/en-us/library/windows/desktop/aa366531(v=vs.85).aspx
* Creating a File Mapping Using Large Pages: https://msdn.microsoft.com/en-us/library/aa366543(VS.85).aspx
*/
2017-05-04 11:18:14 +00:00
static BOOL SetLockPagesPrivilege() {
HANDLE token;
2017-04-15 06:02:08 +00:00
2017-05-04 11:18:14 +00:00
if (OpenProcessToken(GetCurrentProcess(), TOKEN_ADJUST_PRIVILEGES | TOKEN_QUERY, &token) != TRUE) {
2017-04-15 06:02:08 +00:00
return FALSE;
}
2017-05-04 11:18:14 +00:00
TOKEN_PRIVILEGES tp;
tp.PrivilegeCount = 1;
tp.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED;
2017-04-15 06:02:08 +00:00
2017-05-04 11:18:14 +00:00
if (LookupPrivilegeValue(NULL, SE_LOCK_MEMORY_NAME, &(tp.Privileges[0].Luid)) != TRUE) {
2017-04-15 06:02:08 +00:00
return FALSE;
}
2017-05-04 11:18:14 +00:00
BOOL rc = AdjustTokenPrivileges(token, FALSE, (PTOKEN_PRIVILEGES) &tp, 0, NULL, NULL);
if (rc != TRUE || GetLastError() != ERROR_SUCCESS) {
2017-04-15 06:02:08 +00:00
return FALSE;
}
2017-05-04 11:18:14 +00:00
CloseHandle(token);
2017-04-15 06:02:08 +00:00
return TRUE;
}
const char * persistent_memory_allocate() {
const int ratio = opt_double_hash ? 2 : 1;
const int size = MEMORY * (opt_n_threads * ratio + 1);
2017-04-15 06:02:08 +00:00
2017-05-04 11:18:14 +00:00
if (SetLockPagesPrivilege()) {
2017-04-15 06:02:08 +00:00
persistent_memory_flags |= MEMORY_HUGEPAGES_AVAILABLE;
}
persistent_memory = VirtualAlloc(NULL, size, MEM_COMMIT | MEM_RESERVE | MEM_LARGE_PAGES, PAGE_READWRITE);
if (!persistent_memory) {
2017-04-29 23:56:47 +00:00
persistent_memory = _mm_malloc(size, 16);
2017-04-15 06:02:08 +00:00
}
else {
persistent_memory_flags |= MEMORY_HUGEPAGES_ENABLED;
}
return persistent_memory;
}
void persistent_memory_free() {
if (persistent_memory_flags & MEMORY_HUGEPAGES_ENABLED) {
VirtualFree(persistent_memory, 0, MEM_RELEASE);
}
else {
_mm_free(persistent_memory);
}
}
#endif /* __MEMORY_H__ */