Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
2dot5
ClickHouse
提交
3530f83c
C
ClickHouse
项目概览
2dot5
/
ClickHouse
通知
3
Star
0
Fork
0
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
DevOps
流水线
流水线任务
计划
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
C
ClickHouse
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
DevOps
DevOps
流水线
流水线任务
计划
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
流水线任务
提交
Issue看板
体验新版 GitCode,发现更多精彩内容 >>
提交
3530f83c
编写于
9月 14, 2020
作者:
A
Alexey Milovidov
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
Remove debug output
上级
2ac88ab4
变更
1
隐藏空白更改
内联
并排
Showing
1 changed file
with
0 addition
and
10 deletion
+0
-10
src/Common/remapExecutable.cpp
src/Common/remapExecutable.cpp
+0
-10
未找到文件。
src/Common/remapExecutable.cpp
浏览文件 @
3530f83c
...
...
@@ -115,26 +115,19 @@ __attribute__((__noinline__)) void remapToHugeStep2(void * begin, size_t size, v
int64_t
offset
=
reinterpret_cast
<
intptr_t
>
(
scratch
)
-
reinterpret_cast
<
intptr_t
>
(
begin
);
int64_t
(
*
syscall_func
)(...)
=
reinterpret_cast
<
int64_t
(
*
)(...)
>
(
reinterpret_cast
<
intptr_t
>
(
our_syscall
)
+
offset
);
//char dot = '.';
//syscall_func(SYS_write, 2, &dot, 1);
int64_t
munmap_res
=
syscall_func
(
SYS_munmap
,
begin
,
size
);
if
(
munmap_res
!=
0
)
return
;
//syscall_func(SYS_write, 2, &dot, 1);
/// Map new anonymous memory region in place of old region with code.
int64_t
mmap_res
=
syscall_func
(
SYS_mmap
,
begin
,
size
,
PROT_READ
|
PROT_WRITE
,
MAP_PRIVATE
|
MAP_ANONYMOUS
|
MAP_FIXED
,
-
1
,
0
);
if
(
-
1
==
mmap_res
)
syscall_func
(
SYS_exit
,
1
);
//syscall_func(SYS_write, 2, &dot, 1);
/// As the memory region is anonymous, we can do madvise with MADV_HUGEPAGE.
syscall_func
(
SYS_madvise
,
begin
,
size
,
MADV_HUGEPAGE
);
//syscall_func(SYS_write, 2, &dot, 1);
/// Copy the code from scratch area to the old memory location.
...
...
@@ -151,12 +144,9 @@ __attribute__((__noinline__)) void remapToHugeStep2(void * begin, size_t size, v
}
}
//syscall_func(SYS_write, 2, &dot, 1);
/// Make the memory area with the code executable and non-writable.
syscall_func
(
SYS_mprotect
,
begin
,
size
,
PROT_READ
|
PROT_EXEC
);
//syscall_func(SYS_write, 2, &dot, 1);
/** Step 3 function should unmap the scratch area.
* The currently executed code is located in the scratch area and cannot be removed here.
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录