X-Git-Url: http://info.iut-bm.univ-fcomte.fr/pub/gitweb/simgrid.git/blobdiff_plain/51127994e0f96d0667dd433a801a47a46f50eae7..586776316687c1b369137bdbcd2107761ed5ba9a:/src/xbt/memory_map.cpp diff --git a/src/xbt/memory_map.cpp b/src/xbt/memory_map.cpp index 61355f491c..73e2d8d487 100644 --- a/src/xbt/memory_map.cpp +++ b/src/xbt/memory_map.cpp @@ -1,5 +1,4 @@ -/* Copyright (c) 2008-2015. The SimGrid Team. - * All rights reserved. */ +/* Copyright (c) 2008-2017. The SimGrid Team. All rights reserved. */ /* This program is free software; you can redistribute it and/or modify it * under the terms of the license (GNU LGPL) which comes with this package. */ @@ -9,9 +8,31 @@ #include #include -#ifdef __linux__ + +#if defined __APPLE__ +# include +# include +# include +# include # include -#elif defined __FreeBSD__ +# include +# include +# if __MAC_OS_X_VERSION_MIN_REQUIRED < 1050 +# define mach_vm_address_t vm_address_t +# define mach_vm_size_t vm_size_t +# if defined __ppc64__ || defined __x86_64__ +# define mach_vm_region vm_region64 +# else +# define mach_vm_region vm_region +# endif +# endif +#endif + +#if defined __linux__ +# include +#endif + +#if defined __FreeBSD__ # include # include # include @@ -45,7 +66,106 @@ namespace xbt { XBT_PRIVATE std::vector get_memory_map(pid_t pid) { std::vector ret; -#ifdef __linux__ +#if defined __APPLE__ + vm_map_t map; + + /* Request authorization to read mappings */ + if (task_for_pid(mach_task_self(), pid, &map) != KERN_SUCCESS) { + std::perror("task_for_pid failed"); + xbt_die("Cannot request authorization for kernel information access"); + } + + /* + * Darwin do not give us the number of mappings, so we read entries until + * we get an KERN_INVALID_ADDRESS return. + */ + mach_vm_address_t address = VM_MIN_ADDRESS; + while (true) { + kern_return_t kr; + memory_object_name_t object; + mach_vm_size_t size; +#if defined __ppc64__ || defined __x86_64__ + vm_region_flavor_t flavor = VM_REGION_BASIC_INFO_64; + struct vm_region_basic_info_64 info; + mach_msg_type_number_t info_count = VM_REGION_BASIC_INFO_COUNT_64; +#else + vm_region_flavor_t flavor = VM_REGION_BASIC_INFO; + struct vm_region_basic_info info; + mach_msg_type_number_t info_count = VM_REGION_BASIC_INFO_COUNT; +#endif + + kr = + mach_vm_region( + map, + &address, + &size, + flavor, + (vm_region_info_t)&info, + &info_count, + &object); + if (kr == KERN_INVALID_ADDRESS) { + break; + } + else if (kr != KERN_SUCCESS) { + std::perror("mach_vm_region failed"); + xbt_die("Cannot request authorization for kernel information access"); + } + + VmMap memreg; + + /* Addresses */ + memreg.start_addr = address; + memreg.end_addr = address + size; + + /* Permissions */ + memreg.prot = PROT_NONE; + if (info.protection & VM_PROT_READ) + memreg.prot |= PROT_READ; + if (info.protection & VM_PROT_WRITE) + memreg.prot |= PROT_WRITE; + if (info.protection & VM_PROT_EXECUTE) + memreg.prot |= PROT_EXEC; + + /* Private (copy-on-write) or shared? */ + memreg.flags = 0; + if (info.shared) + memreg.flags |= MAP_SHARED; + else + memreg.flags |= MAP_PRIVATE; + + /* Offset */ + memreg.offset = info.offset; + + /* Device : not sure this can be mapped to something outside of Linux? */ + memreg.dev_major = 0; + memreg.dev_minor = 0; + + /* Inode */ + memreg.inode = 0; + + /* Path */ + char path[MAXPATHLEN]; + int pathlen; + pathlen = proc_regionfilename(pid, address, path, sizeof(path)); + path[pathlen] = '\0'; + memreg.pathname = path; + +#if 0 /* Display mappings for debug */ + fprintf(stderr, + "%#014llx - %#014llx | %c%c%c | %s\n", + memreg.start_addr, memreg.end_addr, + (memreg.prot & PROT_READ) ? 'r' : '-', + (memreg.prot & PROT_WRITE) ? 'w' : '-', + (memreg.prot & PROT_EXEC) ? 'x' : '-', + memreg.pathname.c_str()); +#endif + + ret.push_back(std::move(memreg)); + address += size; + } + + mach_port_deallocate(mach_task_self(), map); +#elif defined __linux__ /* Open the actual process's proc maps file and create the memory_map_t */ /* to be returned. */ char* path = bprintf("/proc/%i/maps", (int) pid); @@ -73,12 +193,13 @@ XBT_PRIVATE std::vector get_memory_map(pid_t pid) line[read - 1] = '\0'; /* Tokenize the line using spaces as delimiters and store each token in lfields array. We expect 5 tokens for 6 fields */ + char* saveptr = nullptr; // for strtok_r() char* lfields[6]; - lfields[0] = strtok(line, " "); + lfields[0] = strtok_r(line, " ", &saveptr); int i; for (i = 1; i < 6 && lfields[i - 1] != nullptr; i++) { - lfields[i] = std::strtok(nullptr, " "); + lfields[i] = strtok_r(nullptr, " ", &saveptr); } /* Check to see if we got the expected amount of columns */ @@ -87,7 +208,7 @@ XBT_PRIVATE std::vector get_memory_map(pid_t pid) /* Ok we are good enough to try to get the info we need */ /* First get the start and the end address of the map */ - char *tok = std::strtok(lfields[0], "-"); + char* tok = strtok_r(lfields[0], "-", &saveptr); if (tok == nullptr) xbt_die("Start and end address of the map are not concatenated by a hyphen (-). Recovery impossible."); @@ -98,7 +219,7 @@ XBT_PRIVATE std::vector get_memory_map(pid_t pid) if (*endptr != '\0') xbt_abort(); - tok = std::strtok(nullptr, "-"); + tok = strtok_r(nullptr, "-", &saveptr); if (tok == nullptr) xbt_abort(); @@ -112,7 +233,6 @@ XBT_PRIVATE std::vector get_memory_map(pid_t pid) xbt_abort(); memreg.prot = 0; - for (i = 0; i < 3; i++){ switch(lfields[1][i]){ case 'r': @@ -131,13 +251,15 @@ XBT_PRIVATE std::vector get_memory_map(pid_t pid) if (memreg.prot == 0) memreg.prot |= PROT_NONE; + memreg.flags = 0; if (lfields[1][3] == 'p') { memreg.flags |= MAP_PRIVATE; } else { memreg.flags |= MAP_SHARED; if (lfields[1][3] != 's') - XBT_WARN("The protection is neither 'p' (private) nor 's' (shared) but '%s'. Let's assume shared, as on b0rken win-ubuntu systems.\nFull line: %s\n", - lfields[1], line); + XBT_WARN("The protection is neither 'p' (private) nor 's' (shared) but '%s'. Let's assume shared, as on b0rken " + "win-ubuntu systems.\nFull line: %s\n", + lfields[1], line); } /* Get the offset value */ @@ -147,7 +269,7 @@ XBT_PRIVATE std::vector get_memory_map(pid_t pid) xbt_abort(); /* Get the device major:minor bytes */ - tok = std::strtok(lfields[3], ":"); + tok = strtok_r(lfields[3], ":", &saveptr); if (tok == nullptr) xbt_abort(); @@ -156,7 +278,7 @@ XBT_PRIVATE std::vector get_memory_map(pid_t pid) if (*endptr != '\0') xbt_abort(); - tok = std::strtok(nullptr, ":"); + tok = strtok_r(nullptr, ":", &saveptr); if (tok == nullptr) xbt_abort(); @@ -176,7 +298,7 @@ XBT_PRIVATE std::vector get_memory_map(pid_t pid) /* Create space for a new map region in the region's array and copy the */ /* parsed stuff from the temporal memreg variable */ - XBT_DEBUG("Found region for %s", !memreg.pathname.empty() ? memreg.pathname.c_str() : "(null)"); + XBT_DEBUG("Found region for %s", not memreg.pathname.empty() ? memreg.pathname.c_str() : "(null)"); ret.push_back(std::move(memreg)); } @@ -209,17 +331,16 @@ XBT_PRIVATE std::vector get_memory_map(pid_t pid) memreg.end_addr = vmentries[i].kve_end; /* Permissions */ - memreg.prot = 0; + memreg.prot = PROT_NONE; if (vmentries[i].kve_protection & KVME_PROT_READ) memreg.prot |= PROT_READ; if (vmentries[i].kve_protection & KVME_PROT_WRITE) memreg.prot |= PROT_WRITE; if (vmentries[i].kve_protection & KVME_PROT_EXEC) memreg.prot |= PROT_EXEC; - if (memreg.prot == 0) - memreg.prot |= PROT_NONE; /* Private (copy-on-write) or shared? */ + memreg.flags = 0; if (vmentries[i].kve_flags & KVME_FLAG_COW) memreg.flags |= MAP_PRIVATE; else @@ -235,16 +356,28 @@ XBT_PRIVATE std::vector get_memory_map(pid_t pid) /* Inode */ memreg.inode = vmentries[i].kve_vn_fileid; - /* - * Path. Linuxize result by giving an anonymous mapping a path from - * the previous mapping... provided previous is vnode and has a path. - */ + /* + * Path. Linuxize result by giving an anonymous mapping a path from + * the previous mapping, provided previous is vnode and has a path, + * and mark the stack. + */ if (vmentries[i].kve_path[0] != '\0') memreg.pathname = vmentries[i].kve_path; - else if (vmentries[i].kve_type == KVME_TYPE_DEFAULT - && vmentries[i-1].kve_type == KVME_TYPE_VNODE - && vmentries[i-1].kve_path[0] != '\0') + else if (vmentries[i].kve_type == KVME_TYPE_DEFAULT && vmentries[i - 1].kve_type == KVME_TYPE_VNODE && + vmentries[i - 1].kve_path[0] != '\0') memreg.pathname = vmentries[i-1].kve_path; + else if (vmentries[i].kve_type == KVME_TYPE_DEFAULT + && vmentries[i].kve_flags & KVME_FLAG_GROWS_DOWN) + memreg.pathname = "[stack]"; + + /* + * One last dirty modification: remove write permission from shared + * libraries private clean pages. This is necessary because simgrid + * later identifies mappings based on the permissions that are expected + * when running the Linux kernel. + */ + if (vmentries[i].kve_type == KVME_TYPE_VNODE && not(vmentries[i].kve_flags & KVME_FLAG_NEEDS_COPY)) + memreg.prot &= ~PROT_WRITE; ret.push_back(std::move(memreg)); }