X-Git-Url: http://info.iut-bm.univ-fcomte.fr/pub/gitweb/simgrid.git/blobdiff_plain/b40ad21be7ae73b3daa39f626c00bed2587622dd..da8e6028a3178309a56db8bbf5e10f84f3791140:/src/xbt/memory_map.cpp diff --git a/src/xbt/memory_map.cpp b/src/xbt/memory_map.cpp index cd1ca7b996..fed4b2c572 100644 --- a/src/xbt/memory_map.cpp +++ b/src/xbt/memory_map.cpp @@ -11,6 +11,15 @@ #include #ifdef __linux__ # include +#elif defined __FreeBSD__ +# include +# include +# include +# include +# include +# include +# include +# include #endif #include @@ -27,8 +36,15 @@ XBT_LOG_NEW_DEFAULT_SUBCATEGORY(xbt_memory_map, xbt, "Logging specific to algori namespace simgrid { namespace xbt { +/** + * \todo This function contains many cases that do not allow for a + * recovery. Currently, xbt_abort() is called but we should + * much rather die with the specific reason so that it's easier + * to find out what's going on. + */ XBT_PRIVATE std::vector get_memory_map(pid_t pid) { + std::vector ret; #ifdef __linux__ /* Open the actual process's proc maps file and create the memory_map_t */ /* to be returned. */ @@ -41,20 +57,22 @@ XBT_PRIVATE std::vector get_memory_map(pid_t pid) free(path); setbuf(fp, nullptr); - std::vector ret; - /* Read one line at the time, parse it and add it to the memory map to be returned */ ssize_t read; /* Number of bytes readed */ char* line = nullptr; std::size_t n = 0; /* Amount of bytes to read by xbt_getline */ while ((read = xbt_getline(&line, &n, fp)) != -1) { + /** + * The lines that we read have this format: (This is just an example) + * 00602000-00603000 rw-p 00002000 00:28 1837264 + */ //fprintf(stderr,"%s", line); /* Wipeout the new line character */ line[read - 1] = '\0'; - /* Tokenize the line using spaces as delimiters and store each token in lfields array. We expect 5 tokens/fields */ + /* Tokenize the line using spaces as delimiters and store each token in lfields array. We expect 5 tokens for 6 fields */ char* lfields[6]; lfields[0] = strtok(line, " "); @@ -65,13 +83,13 @@ XBT_PRIVATE std::vector get_memory_map(pid_t pid) /* Check to see if we got the expected amount of columns */ if (i < 6) - xbt_abort(); + xbt_die("The memory map apparently only supplied less than 6 columns. Recovery impossible."); /* Ok we are good enough to try to get the info we need */ /* First get the start and the end address of the map */ char *tok = std::strtok(lfields[0], "-"); if (tok == nullptr) - xbt_abort(); + xbt_die("Start and end address of the map are not concatenated by a hyphen (-). Recovery impossible."); VmMap memreg; char *endptr; @@ -113,10 +131,14 @@ XBT_PRIVATE std::vector get_memory_map(pid_t pid) if (memreg.prot == 0) memreg.prot |= PROT_NONE; - if (lfields[1][4] == 'p') + if (lfields[1][3] == 'p') { memreg.flags |= MAP_PRIVATE; - else if (lfields[1][4] == 's') + } else { memreg.flags |= MAP_SHARED; + if (lfields[1][3] != 's') + XBT_WARN("The protection is neither 'p' (private) nor 's' (shared) but '%s'. Let's assume shared, as on b0rken win-ubuntu systems.\nFull line: %s\n", + lfields[1], line); + } /* Get the offset value */ memreg.offset = std::strtoull(lfields[2], &endptr, 16); @@ -161,11 +183,82 @@ XBT_PRIVATE std::vector get_memory_map(pid_t pid) std::free(line); std::fclose(fp); - return ret; +#elif defined __FreeBSD__ + struct procstat *prstat; + struct kinfo_proc *proc; + struct kinfo_vmentry *vmentries; + unsigned int cnt; + + if ((prstat = procstat_open_sysctl()) == NULL) { + std::perror("procstat_open_sysctl failed"); + xbt_die("Cannot access kernel state information"); + } + if ((proc = procstat_getprocs(prstat, KERN_PROC_PID, pid, &cnt)) == NULL) { + std::perror("procstat_open_sysctl failed"); + xbt_die("Cannot access process information"); + } + if ((vmentries = procstat_getvmmap(prstat, proc, &cnt)) == NULL) { + std::perror("procstat_getvmmap failed"); + xbt_die("Cannot access process memory mappings"); + } + for (unsigned int i = 0; i < cnt; i++) { + VmMap memreg; + + /* Addresses */ + memreg.start_addr = vmentries[i].kve_start; + memreg.end_addr = vmentries[i].kve_end; + + /* Permissions */ + memreg.prot = 0; + if (vmentries[i].kve_protection & KVME_PROT_READ) + memreg.prot |= PROT_READ; + if (vmentries[i].kve_protection & KVME_PROT_WRITE) + memreg.prot |= PROT_WRITE; + if (vmentries[i].kve_protection & KVME_PROT_EXEC) + memreg.prot |= PROT_EXEC; + if (memreg.prot == 0) + memreg.prot |= PROT_NONE; + + /* Private (copy-on-write) or shared? */ + if (vmentries[i].kve_flags & KVME_FLAG_COW) + memreg.flags |= MAP_PRIVATE; + else + memreg.flags |= MAP_SHARED; + + /* Offset */ + memreg.offset = vmentries[i].kve_offset; + + /* Device : not sure this can be mapped to something outside of Linux? */ + memreg.dev_major = 0; + memreg.dev_minor = 0; + + /* Inode */ + memreg.inode = vmentries[i].kve_vn_fileid; + + /* + * Path. Linuxize result by giving an anonymous mapping a path from + * the previous mapping, provided previous is vnode and has a path, + * and mark the stack. + */ + if (vmentries[i].kve_path[0] != '\0') + memreg.pathname = vmentries[i].kve_path; + else if (vmentries[i].kve_type == KVME_TYPE_DEFAULT + && vmentries[i-1].kve_type == KVME_TYPE_VNODE + && vmentries[i-1].kve_path[0] != '\0') + memreg.pathname = vmentries[i-1].kve_path; + else if (vmentries[i].kve_type == KVME_TYPE_DEFAULT + && vmentries[i].kve_flags & KVME_FLAG_GROWS_DOWN) + memreg.pathname = "[stack]"; + + ret.push_back(std::move(memreg)); + } + procstat_freevmmap(prstat, vmentries); + procstat_freeprocs(prstat, proc); + procstat_close(prstat); #else - /* On FreeBSD, kinfo_getvmmap() could be used but mmap() support is disabled anyway. */ xbt_die("Could not get memory map from process %lli", (long long int) pid); #endif + return ret; } }