12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576 |
- //===-- sanitizer_procmaps_solaris.cpp ------------------------------------===//
- //
- // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
- // See https://llvm.org/LICENSE.txt for license information.
- // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
- //
- //===----------------------------------------------------------------------===//
- //
- // Information about the process mappings (Solaris-specific parts).
- //===----------------------------------------------------------------------===//
- // Before Solaris 11.4, <procfs.h> doesn't work in a largefile environment.
- #undef _FILE_OFFSET_BITS
- #include "sanitizer_platform.h"
- #if SANITIZER_SOLARIS
- #include "sanitizer_common.h"
- #include "sanitizer_procmaps.h"
- #error #include <procfs.h>
- #include <limits.h>
- namespace __sanitizer {
- void ReadProcMaps(ProcSelfMapsBuff *proc_maps) {
- if (!ReadFileToBuffer("/proc/self/xmap", &proc_maps->data,
- &proc_maps->mmaped_size, &proc_maps->len)) {
- proc_maps->data = nullptr;
- proc_maps->mmaped_size = 0;
- proc_maps->len = 0;
- }
- }
- bool MemoryMappingLayout::Next(MemoryMappedSegment *segment) {
- if (Error()) return false; // simulate empty maps
- char *last = data_.proc_self_maps.data + data_.proc_self_maps.len;
- if (data_.current >= last) return false;
- prxmap_t *xmapentry =
- const_cast<prxmap_t *>(reinterpret_cast<const prxmap_t *>(data_.current));
- segment->start = (uptr)xmapentry->pr_vaddr;
- segment->end = (uptr)(xmapentry->pr_vaddr + xmapentry->pr_size);
- segment->offset = (uptr)xmapentry->pr_offset;
- segment->protection = 0;
- if ((xmapentry->pr_mflags & MA_READ) != 0)
- segment->protection |= kProtectionRead;
- if ((xmapentry->pr_mflags & MA_WRITE) != 0)
- segment->protection |= kProtectionWrite;
- if ((xmapentry->pr_mflags & MA_EXEC) != 0)
- segment->protection |= kProtectionExecute;
- if (segment->filename != NULL && segment->filename_size > 0) {
- char proc_path[PATH_MAX + 1];
- internal_snprintf(proc_path, sizeof(proc_path), "/proc/self/path/%s",
- xmapentry->pr_mapname);
- ssize_t sz = internal_readlink(proc_path, segment->filename,
- segment->filename_size - 1);
- // If readlink failed, the map is anonymous.
- if (sz == -1) {
- segment->filename[0] = '\0';
- } else if ((size_t)sz < segment->filename_size)
- // readlink doesn't NUL-terminate.
- segment->filename[sz] = '\0';
- }
- data_.current += sizeof(prxmap_t);
- return true;
- }
- } // namespace __sanitizer
- #endif // SANITIZER_SOLARIS
|