mirror of
https://gcc.gnu.org/git/gcc.git
synced 2024-11-30 15:24:07 +08:00
3c6331c29f
Merged from revision b638b63b99d66786cb37336292604a2ae3490cfd. The patch successfully bootstraps on x86_64-linux-gnu and ppc64le-linux-gnu. I also tested ppc64-linux-gnu that exposed: https://reviews.llvm.org/D80864 (which is fixed on master). Abidiff looks happy and I made UBSAN and ASAN bootstrap on x86_64-linux-gnu. I'm planning to do merge from master twice a year, once now and next time short before stage1 closes. I am going to install the patches as merge from master is obvious and I haven't made anything special. libsanitizer/ChangeLog: * MERGE: Merge from master.
81 lines
2.5 KiB
C++
81 lines
2.5 KiB
C++
//===-- sanitizer_procmaps_fuchsia.cpp
|
|
//----------------------------------------===//
|
|
//
|
|
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
|
|
// See https://llvm.org/LICENSE.txt for license information.
|
|
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
//
|
|
// Information about the process mappings (Fuchsia-specific parts).
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
#include "sanitizer_platform.h"
|
|
#if SANITIZER_FUCHSIA
|
|
#include <zircon/process.h>
|
|
#include <zircon/syscalls.h>
|
|
|
|
#include "sanitizer_common.h"
|
|
#include "sanitizer_procmaps.h"
|
|
|
|
namespace __sanitizer {
|
|
|
|
// The cache flag is ignored on Fuchsia because a process can always get this
|
|
// information via its process-self handle.
|
|
MemoryMappingLayout::MemoryMappingLayout(bool) { Reset(); }
|
|
|
|
void MemoryMappingLayout::Reset() {
|
|
data_.data.clear();
|
|
data_.current = 0;
|
|
|
|
size_t count;
|
|
zx_status_t status = _zx_object_get_info(
|
|
_zx_process_self(), ZX_INFO_PROCESS_MAPS, nullptr, 0, nullptr, &count);
|
|
if (status != ZX_OK) {
|
|
return;
|
|
}
|
|
|
|
size_t filled;
|
|
do {
|
|
data_.data.resize(count);
|
|
status = _zx_object_get_info(
|
|
_zx_process_self(), ZX_INFO_PROCESS_MAPS, data_.data.data(),
|
|
count * sizeof(zx_info_maps_t), &filled, &count);
|
|
if (status != ZX_OK) {
|
|
data_.data.clear();
|
|
return;
|
|
}
|
|
} while (filled < count);
|
|
}
|
|
|
|
MemoryMappingLayout::~MemoryMappingLayout() {}
|
|
|
|
bool MemoryMappingLayout::Error() const { return data_.data.empty(); }
|
|
|
|
bool MemoryMappingLayout::Next(MemoryMappedSegment *segment) {
|
|
while (data_.current < data_.data.size()) {
|
|
const auto &entry = data_.data[data_.current++];
|
|
if (entry.type == ZX_INFO_MAPS_TYPE_MAPPING) {
|
|
segment->start = entry.base;
|
|
segment->end = entry.base + entry.size;
|
|
segment->offset = entry.u.mapping.vmo_offset;
|
|
const auto flags = entry.u.mapping.mmu_flags;
|
|
segment->protection =
|
|
((flags & ZX_VM_PERM_READ) ? kProtectionRead : 0) |
|
|
((flags & ZX_VM_PERM_WRITE) ? kProtectionWrite : 0) |
|
|
((flags & ZX_VM_PERM_EXECUTE) ? kProtectionExecute : 0);
|
|
if (segment->filename && segment->filename_size > 0) {
|
|
uptr len = Min(sizeof(entry.name), segment->filename_size) - 1;
|
|
internal_strncpy(segment->filename, entry.name, len);
|
|
segment->filename[len] = 0;
|
|
}
|
|
return true;
|
|
}
|
|
}
|
|
return false;
|
|
}
|
|
|
|
} // namespace __sanitizer
|
|
|
|
#endif // SANITIZER_FUCHSIA
|