aboutsummaryrefslogtreecommitdiff
path: root/gdb/procfs.h
diff options
context:
space:
mode:
authorLuis Machado <luis.machado@linaro.org>2020-06-15 14:24:53 -0300
committerLuis Machado <luis.machado@linaro.org>2020-06-25 13:23:38 -0300
commit0c7c65e12f384d7035bf79e37ccbbc5d11cdc447 (patch)
treea9536df8f405757f841709c820d27977fec4e7ee /gdb/procfs.h
parente5f4e60d4955ba94516ef91d86f0f429a2c12612 (diff)
downloadgdb-0c7c65e12f384d7035bf79e37ccbbc5d11cdc447.zip
gdb-0c7c65e12f384d7035bf79e37ccbbc5d11cdc447.tar.gz
gdb-0c7c65e12f384d7035bf79e37ccbbc5d11cdc447.tar.bz2
Refactor parsing of /proc/<pid>/smaps
The Linux kernel exposes the information about MTE-protected pages via the proc filesystem, more specifically through the smaps file. What we're looking for is a mapping with the 'mt' flag, which tells us that mapping was created with a PROT_MTE flag and, thus, is capable of using memory tagging. We already parse that file for other purposes (core file generation/filtering), so this patch refactors the code to make the parsing of the smaps file reusable for memory tagging. The function linux_address_in_memtag_page uses the refactored code to allow querying for memory tag support in a particular address, and it gets used in the next patch. gdb/ChangeLog: YYYY-MM-DD Luis Machado <luis.machado@linaro.org> * linux-tdep.c (struct smaps_vmflags) <memory_tagging>: New flag bit. (struct smaps_data): New struct. (decode_vmflags): Handle the 'mt' flag. (parse_smaps_data): New function, refactored from linux_find_memory_regions_full. (linux_address_in_memtag_page): New function. (linux_find_memory_regions_full): Refactor into parse_smaps_data. * linux-tdep.h (linux_address_in_memtag_page): New prototype.
Diffstat (limited to 'gdb/procfs.h')
0 files changed, 0 insertions, 0 deletions