+ std::vector<VmMap> ret;
+#if defined __APPLE__
+ vm_map_t map;
+
+ /* Request authorization to read mappings */
+ if (task_for_pid(mach_task_self(), pid, &map) != KERN_SUCCESS) {
+ std::perror("task_for_pid failed");
+ std::fprintf(stderr, "Cannot request authorization for kernel information access\n");
+ abort();
+ }
+
+ /*
+ * Darwin do not give us the number of mappings, so we read entries until
+ * we get a KERN_INVALID_ADDRESS return.
+ */
+ mach_vm_address_t address = VM_MIN_ADDRESS;
+ while (true) {
+ kern_return_t kr;
+ memory_object_name_t object;
+ mach_vm_size_t size;
+#if defined __ppc64__ || defined __x86_64__
+ vm_region_flavor_t flavor = VM_REGION_BASIC_INFO_64;
+ struct vm_region_basic_info_64 info;
+ mach_msg_type_number_t info_count = VM_REGION_BASIC_INFO_COUNT_64;
+#else
+ vm_region_flavor_t flavor = VM_REGION_BASIC_INFO;
+ struct vm_region_basic_info info;
+ mach_msg_type_number_t info_count = VM_REGION_BASIC_INFO_COUNT;
+#endif
+
+ kr = mach_vm_region(map, &address, &size, flavor, (vm_region_info_t)&info, &info_count, &object);
+ if (kr == KERN_INVALID_ADDRESS) {
+ break;
+
+ } else if (kr != KERN_SUCCESS) {
+ const char* name = nullptr;
+ switch (kr) { // https://github.com/apple/darwin-xnu/blob/main/bsd/kern/stackshot.c#L42
+ case KERN_SUCCESS:
+ name = "kr=KERN_SUCCESS";
+ break;
+ case KERN_RESOURCE_SHORTAGE:
+ name = "kr=KERN_RESOURCE_SHORTAGE (ENOMEM)";
+ break;
+ case KERN_INSUFFICIENT_BUFFER_SIZE:
+ name = "kr=KERN_INSUFFICIENT_BUFFER_SIZE (ENOSPC)";
+ break;
+ case KERN_NO_SPACE:
+ name = "kr=KERN_NO_SPACE (ENOSPC)";
+ break;
+ case KERN_NO_ACCESS:
+ name = "kr=KERN_NO_ACCESS (EPERM)";
+ break;
+ case KERN_MEMORY_PRESENT:
+ name = "kr=KERN_MEMORY_PRESENT (EEXIST)";
+ break;
+ case KERN_NOT_SUPPORTED:
+ name = "kr=KERN_NOT_SUPPORTED (ENOTSUP)";
+ break;
+ case KERN_NOT_IN_SET:
+ name = "kr=KERN_NOT_IN_SET (ENOENT)";
+ break;
+ case KERN_ABORTED:
+ name = "kr=KERN_ABORTED (EINTR)";
+ break;
+ case KERN_FAILURE:
+ name = "kr=KERN_FAILURE (EBUSY)";
+ break;
+ case KERN_OPERATION_TIMED_OUT:
+ name = "kr=KERN_OPERATION_TIMED_OUT (ETIMEDOUT)";
+ break;
+ default:
+ name = "kr=default case (EINVAL)";
+ }
+ std::perror("mach_vm_region failed");
+ std::fprintf(stderr, "Cannot request authorization for kernel information access (kr=%d ; %s)\n", (int)kr, name);
+ abort();
+ }
+
+ VmMap memreg;
+
+ /* Addresses */
+ memreg.start_addr = address;
+ memreg.end_addr = address + size;
+
+ /* Permissions */
+ memreg.prot = PROT_NONE;
+ if (info.protection & VM_PROT_READ)
+ memreg.prot |= PROT_READ;
+ if (info.protection & VM_PROT_WRITE)
+ memreg.prot |= PROT_WRITE;
+ if (info.protection & VM_PROT_EXECUTE)
+ memreg.prot |= PROT_EXEC;
+
+ /* Private (copy-on-write) or shared? */
+ memreg.flags = 0;
+ if (info.shared)
+ memreg.flags |= MAP_SHARED;
+ else
+ memreg.flags |= MAP_PRIVATE;
+
+ /* Offset */
+ memreg.offset = info.offset;
+
+ /* Device : not sure this can be mapped to something outside of Linux? */
+ memreg.dev_major = 0;
+ memreg.dev_minor = 0;
+
+ /* Inode */
+ memreg.inode = 0;
+
+ /* Path */
+ Dl_info dlinfo;
+ if (dladdr(reinterpret_cast<void*>(address), &dlinfo))
+ memreg.pathname = dlinfo.dli_fname;
+
+ DEBUG_PRINT("Region: %016" PRIx64 "-%016" PRIx64 " | %c%c%c | %s\n", memreg.start_addr, memreg.end_addr,
+ (memreg.prot & PROT_READ) ? 'r' : '-', (memreg.prot & PROT_WRITE) ? 'w' : '-',
+ (memreg.prot & PROT_EXEC) ? 'x' : '-', memreg.pathname.c_str());
+
+ ret.push_back(std::move(memreg));
+ address += size;
+ }
+
+ mach_port_deallocate(mach_task_self(), map);
+#elif defined __linux__