[testsuite] require pic for pr103074.c
[official-gcc.git] / libsanitizer / sanitizer_common / sanitizer_procmaps_fuchsia.cpp
blobcc3e9be06458e4999f46105ac5a0bfab5776d9b1
1 //===-- sanitizer_procmaps_fuchsia.cpp
2 //----------------------------------------===//
3 //
4 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
5 // See https://llvm.org/LICENSE.txt for license information.
6 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7 //
8 //===----------------------------------------------------------------------===//
9 //
10 // Information about the process mappings (Fuchsia-specific parts).
11 //===----------------------------------------------------------------------===//
13 #include "sanitizer_platform.h"
14 #if SANITIZER_FUCHSIA
15 #include <zircon/process.h>
16 #include <zircon/syscalls.h>
18 #include "sanitizer_common.h"
19 #include "sanitizer_procmaps.h"
21 namespace __sanitizer {
23 // The cache flag is ignored on Fuchsia because a process can always get this
24 // information via its process-self handle.
25 MemoryMappingLayout::MemoryMappingLayout(bool) { Reset(); }
27 void MemoryMappingLayout::Reset() {
28 data_.data.clear();
29 data_.current = 0;
31 size_t count;
32 zx_status_t status = _zx_object_get_info(
33 _zx_process_self(), ZX_INFO_PROCESS_MAPS, nullptr, 0, nullptr, &count);
34 if (status != ZX_OK) {
35 return;
38 size_t filled;
39 do {
40 data_.data.resize(count);
41 status = _zx_object_get_info(
42 _zx_process_self(), ZX_INFO_PROCESS_MAPS, data_.data.data(),
43 count * sizeof(zx_info_maps_t), &filled, &count);
44 if (status != ZX_OK) {
45 data_.data.clear();
46 return;
48 } while (filled < count);
51 MemoryMappingLayout::~MemoryMappingLayout() {}
53 bool MemoryMappingLayout::Error() const { return data_.data.empty(); }
55 bool MemoryMappingLayout::Next(MemoryMappedSegment *segment) {
56 while (data_.current < data_.data.size()) {
57 const auto &entry = data_.data[data_.current++];
58 if (entry.type == ZX_INFO_MAPS_TYPE_MAPPING) {
59 segment->start = entry.base;
60 segment->end = entry.base + entry.size;
61 segment->offset = entry.u.mapping.vmo_offset;
62 const auto flags = entry.u.mapping.mmu_flags;
63 segment->protection =
64 ((flags & ZX_VM_PERM_READ) ? kProtectionRead : 0) |
65 ((flags & ZX_VM_PERM_WRITE) ? kProtectionWrite : 0) |
66 ((flags & ZX_VM_PERM_EXECUTE) ? kProtectionExecute : 0);
67 if (segment->filename && segment->filename_size > 0) {
68 uptr len = Min(sizeof(entry.name), segment->filename_size) - 1;
69 internal_strncpy(segment->filename, entry.name, len);
70 segment->filename[len] = 0;
72 return true;
75 return false;
78 } // namespace __sanitizer
80 #endif // SANITIZER_FUCHSIA