+#elif defined __FreeBSD__
+ struct procstat *prstat;
+ struct kinfo_proc *proc;
+ struct kinfo_vmentry *vmentries;
+ unsigned int cnt;
+
+ if ((prstat = procstat_open_sysctl()) == NULL) {
+ std::perror("procstat_open_sysctl failed");
+ xbt_die("Cannot access kernel state information");
+ }
+ if ((proc = procstat_getprocs(prstat, KERN_PROC_PID, pid, &cnt)) == NULL) {
+ std::perror("procstat_open_sysctl failed");
+ xbt_die("Cannot access process information");
+ }
+ if ((vmentries = procstat_getvmmap(prstat, proc, &cnt)) == NULL) {
+ std::perror("procstat_getvmmap failed");
+ xbt_die("Cannot access process memory mappings");
+ }
+ for (unsigned int i = 0; i < cnt; i++) {
+ VmMap memreg;
+
+ /* Addresses */
+ memreg.start_addr = vmentries[i].kve_start;
+ memreg.end_addr = vmentries[i].kve_end;
+
+ /* Permissions */
+ memreg.prot = PROT_NONE;
+ if (vmentries[i].kve_protection & KVME_PROT_READ)
+ memreg.prot |= PROT_READ;
+ if (vmentries[i].kve_protection & KVME_PROT_WRITE)
+ memreg.prot |= PROT_WRITE;
+ if (vmentries[i].kve_protection & KVME_PROT_EXEC)
+ memreg.prot |= PROT_EXEC;
+
+ /* Private (copy-on-write) or shared? */
+ if (vmentries[i].kve_flags & KVME_FLAG_COW)
+ memreg.flags |= MAP_PRIVATE;
+ else
+ memreg.flags |= MAP_SHARED;
+
+ /* Offset */
+ memreg.offset = vmentries[i].kve_offset;
+
+ /* Device : not sure this can be mapped to something outside of Linux? */
+ memreg.dev_major = 0;
+ memreg.dev_minor = 0;
+
+ /* Inode */
+ memreg.inode = vmentries[i].kve_vn_fileid;
+
+ /*
+ * Path. Linuxize result by giving an anonymous mapping a path from
+ * the previous mapping, provided previous is vnode and has a path,
+ * and mark the stack.
+ */
+ if (vmentries[i].kve_path[0] != '\0')
+ memreg.pathname = vmentries[i].kve_path;
+ else if (vmentries[i].kve_type == KVME_TYPE_DEFAULT
+ && vmentries[i-1].kve_type == KVME_TYPE_VNODE
+ && vmentries[i-1].kve_path[0] != '\0')
+ memreg.pathname = vmentries[i-1].kve_path;
+ else if (vmentries[i].kve_type == KVME_TYPE_DEFAULT
+ && vmentries[i].kve_flags & KVME_FLAG_GROWS_DOWN)
+ memreg.pathname = "[stack]";
+
+ /*
+ * One last dirty modification: remove write permission from shared
+ * libraries private clean pages. This is necessary because simgrid
+ * later identifies mappings based on the permissions that are expected
+ * when running the Linux kernel.
+ */
+ if (vmentries[i].kve_type == KVME_TYPE_VNODE
+ && ! (vmentries[i].kve_flags & KVME_FLAG_NEEDS_COPY))
+ memreg.prot &= ~PROT_WRITE;
+
+ ret.push_back(std::move(memreg));
+ }
+ procstat_freevmmap(prstat, vmentries);
+ procstat_freeprocs(prstat, proc);
+ procstat_close(prstat);