xref: /freebsd-src/contrib/processor-trace/libipt/src/windows/pt_section_windows.c (revision 85f87cf491bec6f90948a85b10f5523ea24db9e3)
174fe6c29SRuslan Bukin /*
2*85f87cf4SRuslan Bukin  * Copyright (c) 2015-2019, Intel Corporation
374fe6c29SRuslan Bukin  *
474fe6c29SRuslan Bukin  * Redistribution and use in source and binary forms, with or without
574fe6c29SRuslan Bukin  * modification, are permitted provided that the following conditions are met:
674fe6c29SRuslan Bukin  *
774fe6c29SRuslan Bukin  *  * Redistributions of source code must retain the above copyright notice,
874fe6c29SRuslan Bukin  *    this list of conditions and the following disclaimer.
974fe6c29SRuslan Bukin  *  * Redistributions in binary form must reproduce the above copyright notice,
1074fe6c29SRuslan Bukin  *    this list of conditions and the following disclaimer in the documentation
1174fe6c29SRuslan Bukin  *    and/or other materials provided with the distribution.
1274fe6c29SRuslan Bukin  *  * Neither the name of Intel Corporation nor the names of its contributors
1374fe6c29SRuslan Bukin  *    may be used to endorse or promote products derived from this software
1474fe6c29SRuslan Bukin  *    without specific prior written permission.
1574fe6c29SRuslan Bukin  *
1674fe6c29SRuslan Bukin  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
1774fe6c29SRuslan Bukin  * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
1874fe6c29SRuslan Bukin  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
1974fe6c29SRuslan Bukin  * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
2074fe6c29SRuslan Bukin  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
2174fe6c29SRuslan Bukin  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
2274fe6c29SRuslan Bukin  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
2374fe6c29SRuslan Bukin  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
2474fe6c29SRuslan Bukin  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
2574fe6c29SRuslan Bukin  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
2674fe6c29SRuslan Bukin  * POSSIBILITY OF SUCH DAMAGE.
2774fe6c29SRuslan Bukin  */
2874fe6c29SRuslan Bukin 
2974fe6c29SRuslan Bukin #include "pt_section.h"
3074fe6c29SRuslan Bukin #include "pt_section_windows.h"
3174fe6c29SRuslan Bukin #include "pt_section_file.h"
3274fe6c29SRuslan Bukin 
3374fe6c29SRuslan Bukin #include "intel-pt.h"
3474fe6c29SRuslan Bukin 
3574fe6c29SRuslan Bukin #include <stdlib.h>
3674fe6c29SRuslan Bukin #include <stdio.h>
3774fe6c29SRuslan Bukin #include <fcntl.h>
3874fe6c29SRuslan Bukin #include <io.h>
3974fe6c29SRuslan Bukin 
4074fe6c29SRuslan Bukin 
pt_sec_windows_fstat(const char * filename,struct _stat * stat)4174fe6c29SRuslan Bukin static int pt_sec_windows_fstat(const char *filename, struct _stat *stat)
4274fe6c29SRuslan Bukin {
4374fe6c29SRuslan Bukin 	int fd, errcode;
4474fe6c29SRuslan Bukin 
4574fe6c29SRuslan Bukin 	if (!filename || !stat)
4674fe6c29SRuslan Bukin 		return -pte_internal;
4774fe6c29SRuslan Bukin 
4874fe6c29SRuslan Bukin 	fd = _open(filename, _O_RDONLY);
4974fe6c29SRuslan Bukin 	if (fd == -1)
50*85f87cf4SRuslan Bukin 		return -pte_bad_file;
5174fe6c29SRuslan Bukin 
5274fe6c29SRuslan Bukin 	errcode = _fstat(fd, stat);
5374fe6c29SRuslan Bukin 
5474fe6c29SRuslan Bukin 	_close(fd);
5574fe6c29SRuslan Bukin 
5674fe6c29SRuslan Bukin 	if (errcode)
57*85f87cf4SRuslan Bukin 		return -pte_bad_file;
5874fe6c29SRuslan Bukin 
5974fe6c29SRuslan Bukin 	return 0;
6074fe6c29SRuslan Bukin }
6174fe6c29SRuslan Bukin 
pt_section_mk_status(void ** pstatus,uint64_t * psize,const char * filename)6274fe6c29SRuslan Bukin int pt_section_mk_status(void **pstatus, uint64_t *psize, const char *filename)
6374fe6c29SRuslan Bukin {
6474fe6c29SRuslan Bukin 	struct pt_sec_windows_status *status;
6574fe6c29SRuslan Bukin 	struct _stat stat;
6674fe6c29SRuslan Bukin 	int errcode;
6774fe6c29SRuslan Bukin 
6874fe6c29SRuslan Bukin 	if (!pstatus || !psize)
6974fe6c29SRuslan Bukin 		return -pte_internal;
7074fe6c29SRuslan Bukin 
7174fe6c29SRuslan Bukin 	errcode = pt_sec_windows_fstat(filename, &stat);
7274fe6c29SRuslan Bukin 	if (errcode < 0)
7374fe6c29SRuslan Bukin 		return errcode;
7474fe6c29SRuslan Bukin 
7574fe6c29SRuslan Bukin 	if (stat.st_size < 0)
7674fe6c29SRuslan Bukin 		return -pte_bad_image;
7774fe6c29SRuslan Bukin 
7874fe6c29SRuslan Bukin 	status = malloc(sizeof(*status));
7974fe6c29SRuslan Bukin 	if (!status)
8074fe6c29SRuslan Bukin 		return -pte_nomem;
8174fe6c29SRuslan Bukin 
8274fe6c29SRuslan Bukin 	status->stat = stat;
8374fe6c29SRuslan Bukin 
8474fe6c29SRuslan Bukin 	*pstatus = status;
8574fe6c29SRuslan Bukin 	*psize = stat.st_size;
8674fe6c29SRuslan Bukin 
8774fe6c29SRuslan Bukin 	return 0;
8874fe6c29SRuslan Bukin }
8974fe6c29SRuslan Bukin 
check_file_status(struct pt_section * section,int fd)9074fe6c29SRuslan Bukin static int check_file_status(struct pt_section *section, int fd)
9174fe6c29SRuslan Bukin {
9274fe6c29SRuslan Bukin 	struct pt_sec_windows_status *status;
9374fe6c29SRuslan Bukin 	struct _stat stat;
9474fe6c29SRuslan Bukin 	int errcode;
9574fe6c29SRuslan Bukin 
9674fe6c29SRuslan Bukin 	if (!section)
9774fe6c29SRuslan Bukin 		return -pte_internal;
9874fe6c29SRuslan Bukin 
9974fe6c29SRuslan Bukin 	errcode = _fstat(fd, &stat);
10074fe6c29SRuslan Bukin 	if (errcode)
101*85f87cf4SRuslan Bukin 		return -pte_bad_file;
10274fe6c29SRuslan Bukin 
10374fe6c29SRuslan Bukin 	status = section->status;
10474fe6c29SRuslan Bukin 	if (!status)
10574fe6c29SRuslan Bukin 		return -pte_internal;
10674fe6c29SRuslan Bukin 
10774fe6c29SRuslan Bukin 	if (stat.st_size != status->stat.st_size)
10874fe6c29SRuslan Bukin 		return -pte_bad_image;
10974fe6c29SRuslan Bukin 
11074fe6c29SRuslan Bukin 	if (stat.st_mtime != status->stat.st_mtime)
11174fe6c29SRuslan Bukin 		return -pte_bad_image;
11274fe6c29SRuslan Bukin 
11374fe6c29SRuslan Bukin 	return 0;
11474fe6c29SRuslan Bukin }
11574fe6c29SRuslan Bukin 
granularity(void)11674fe6c29SRuslan Bukin static DWORD granularity(void)
11774fe6c29SRuslan Bukin {
11874fe6c29SRuslan Bukin 	struct _SYSTEM_INFO sysinfo;
11974fe6c29SRuslan Bukin 
12074fe6c29SRuslan Bukin 	GetSystemInfo(&sysinfo);
12174fe6c29SRuslan Bukin 
12274fe6c29SRuslan Bukin 	return sysinfo.dwAllocationGranularity;
12374fe6c29SRuslan Bukin }
12474fe6c29SRuslan Bukin 
pt_sec_windows_map(struct pt_section * section,int fd)12574fe6c29SRuslan Bukin int pt_sec_windows_map(struct pt_section *section, int fd)
12674fe6c29SRuslan Bukin {
12774fe6c29SRuslan Bukin 	struct pt_sec_windows_mapping *mapping;
12874fe6c29SRuslan Bukin 	uint64_t offset, size, adjustment;
12974fe6c29SRuslan Bukin 	HANDLE fh, mh;
13074fe6c29SRuslan Bukin 	DWORD dsize;
13174fe6c29SRuslan Bukin 	uint8_t *base;
13274fe6c29SRuslan Bukin 	int errcode;
13374fe6c29SRuslan Bukin 
13474fe6c29SRuslan Bukin 	if (!section)
13574fe6c29SRuslan Bukin 		return -pte_internal;
13674fe6c29SRuslan Bukin 
13774fe6c29SRuslan Bukin 	offset = section->offset;
13874fe6c29SRuslan Bukin 	size = section->size;
13974fe6c29SRuslan Bukin 
14074fe6c29SRuslan Bukin 	adjustment = offset % granularity();
14174fe6c29SRuslan Bukin 
14274fe6c29SRuslan Bukin 	offset -= adjustment;
14374fe6c29SRuslan Bukin 	size += adjustment;
14474fe6c29SRuslan Bukin 
14574fe6c29SRuslan Bukin 	/* The section is supposed to fit into the file so we shouldn't
14674fe6c29SRuslan Bukin 	 * see any overflows, here.
14774fe6c29SRuslan Bukin 	 */
14874fe6c29SRuslan Bukin 	if (size < section->size)
14974fe6c29SRuslan Bukin 		return -pte_internal;
15074fe6c29SRuslan Bukin 
15174fe6c29SRuslan Bukin 	dsize = (DWORD) size;
15274fe6c29SRuslan Bukin 	if ((uint64_t) dsize != size)
15374fe6c29SRuslan Bukin 		return -pte_internal;
15474fe6c29SRuslan Bukin 
15574fe6c29SRuslan Bukin 	fh = (HANDLE) _get_osfhandle(fd);
15674fe6c29SRuslan Bukin 
15774fe6c29SRuslan Bukin 	mh = CreateFileMapping(fh, NULL, PAGE_READONLY, 0, 0, NULL);
15874fe6c29SRuslan Bukin 	if (!mh)
15974fe6c29SRuslan Bukin 		return -pte_bad_image;
16074fe6c29SRuslan Bukin 
16174fe6c29SRuslan Bukin 	base = MapViewOfFile(mh, FILE_MAP_READ, (DWORD) (offset >> 32),
16274fe6c29SRuslan Bukin 			     (DWORD) (uint32_t) offset, dsize);
16374fe6c29SRuslan Bukin 	if (!base) {
16474fe6c29SRuslan Bukin 		errcode = -pte_bad_image;
16574fe6c29SRuslan Bukin 		goto out_mh;
16674fe6c29SRuslan Bukin 	}
16774fe6c29SRuslan Bukin 
16874fe6c29SRuslan Bukin 	mapping = malloc(sizeof(*mapping));
16974fe6c29SRuslan Bukin 	if (!mapping) {
17074fe6c29SRuslan Bukin 		errcode = -pte_nomem;
17174fe6c29SRuslan Bukin 		goto out_map;
17274fe6c29SRuslan Bukin 	}
17374fe6c29SRuslan Bukin 
17474fe6c29SRuslan Bukin 	mapping->fd = fd;
17574fe6c29SRuslan Bukin 	mapping->mh = mh;
17674fe6c29SRuslan Bukin 	mapping->base = base;
17774fe6c29SRuslan Bukin 	mapping->begin = base + adjustment;
17874fe6c29SRuslan Bukin 	mapping->end = base + size;
17974fe6c29SRuslan Bukin 
18074fe6c29SRuslan Bukin 	section->mapping = mapping;
18174fe6c29SRuslan Bukin 	section->unmap = pt_sec_windows_unmap;
18274fe6c29SRuslan Bukin 	section->read = pt_sec_windows_read;
18374fe6c29SRuslan Bukin 	section->memsize = pt_sec_windows_memsize;
18474fe6c29SRuslan Bukin 
18574fe6c29SRuslan Bukin 	return 0;
18674fe6c29SRuslan Bukin 
18774fe6c29SRuslan Bukin out_map:
18874fe6c29SRuslan Bukin 	UnmapViewOfFile(base);
18974fe6c29SRuslan Bukin 
19074fe6c29SRuslan Bukin out_mh:
19174fe6c29SRuslan Bukin 	CloseHandle(mh);
19274fe6c29SRuslan Bukin 	return errcode;
19374fe6c29SRuslan Bukin }
19474fe6c29SRuslan Bukin 
pt_sec_windows_map_success(struct pt_section * section)19574fe6c29SRuslan Bukin static int pt_sec_windows_map_success(struct pt_section *section)
19674fe6c29SRuslan Bukin {
19774fe6c29SRuslan Bukin 	uint16_t mcount;
19874fe6c29SRuslan Bukin 	int errcode, status;
19974fe6c29SRuslan Bukin 
20074fe6c29SRuslan Bukin 	if (!section)
20174fe6c29SRuslan Bukin 		return -pte_internal;
20274fe6c29SRuslan Bukin 
20374fe6c29SRuslan Bukin 	mcount = section->mcount + 1;
20474fe6c29SRuslan Bukin 	if (!mcount) {
20574fe6c29SRuslan Bukin 		(void) pt_section_unlock(section);
20674fe6c29SRuslan Bukin 		return -pte_overflow;
20774fe6c29SRuslan Bukin 	}
20874fe6c29SRuslan Bukin 
20974fe6c29SRuslan Bukin 	section->mcount = mcount;
21074fe6c29SRuslan Bukin 
21174fe6c29SRuslan Bukin 	errcode = pt_section_unlock(section);
21274fe6c29SRuslan Bukin 	if (errcode < 0)
21374fe6c29SRuslan Bukin 		return errcode;
21474fe6c29SRuslan Bukin 
21574fe6c29SRuslan Bukin 	status = pt_section_on_map(section);
21674fe6c29SRuslan Bukin 	if (status < 0) {
21774fe6c29SRuslan Bukin 		/* We had to release the section lock for pt_section_on_map() so
21874fe6c29SRuslan Bukin 		 * @section may have meanwhile been mapped by other threads.
21974fe6c29SRuslan Bukin 		 *
22074fe6c29SRuslan Bukin 		 * We still want to return the error so we release our mapping.
22174fe6c29SRuslan Bukin 		 * Our caller does not yet know whether pt_section_map()
22274fe6c29SRuslan Bukin 		 * succeeded.
22374fe6c29SRuslan Bukin 		 */
22474fe6c29SRuslan Bukin 		(void) pt_section_unmap(section);
22574fe6c29SRuslan Bukin 		return status;
22674fe6c29SRuslan Bukin 	}
22774fe6c29SRuslan Bukin 
22874fe6c29SRuslan Bukin 	return 0;
22974fe6c29SRuslan Bukin }
23074fe6c29SRuslan Bukin 
pt_section_map(struct pt_section * section)23174fe6c29SRuslan Bukin int pt_section_map(struct pt_section *section)
23274fe6c29SRuslan Bukin {
23374fe6c29SRuslan Bukin 	const char *filename;
23474fe6c29SRuslan Bukin 	HANDLE fh;
23574fe6c29SRuslan Bukin 	FILE *file;
23674fe6c29SRuslan Bukin 	int fd, errcode;
23774fe6c29SRuslan Bukin 
23874fe6c29SRuslan Bukin 	if (!section)
23974fe6c29SRuslan Bukin 		return -pte_internal;
24074fe6c29SRuslan Bukin 
24174fe6c29SRuslan Bukin 	errcode = pt_section_lock(section);
24274fe6c29SRuslan Bukin 	if (errcode < 0)
24374fe6c29SRuslan Bukin 		return errcode;
24474fe6c29SRuslan Bukin 
24574fe6c29SRuslan Bukin 	if (section->mcount)
24674fe6c29SRuslan Bukin 		return pt_sec_windows_map_success(section);
24774fe6c29SRuslan Bukin 
24874fe6c29SRuslan Bukin 	if (section->mapping) {
24974fe6c29SRuslan Bukin 		errcode = -pte_internal;
25074fe6c29SRuslan Bukin 		goto out_unlock;
25174fe6c29SRuslan Bukin 	}
25274fe6c29SRuslan Bukin 
25374fe6c29SRuslan Bukin 	filename = section->filename;
25474fe6c29SRuslan Bukin 	if (!filename) {
25574fe6c29SRuslan Bukin 		errcode = -pte_internal;
25674fe6c29SRuslan Bukin 		goto out_unlock;
25774fe6c29SRuslan Bukin 	}
25874fe6c29SRuslan Bukin 
259*85f87cf4SRuslan Bukin 	fh = CreateFileA(filename, GENERIC_READ, FILE_SHARE_READ, NULL,
26074fe6c29SRuslan Bukin 			 OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, NULL);
26174fe6c29SRuslan Bukin 	if (fh == INVALID_HANDLE_VALUE) {
26274fe6c29SRuslan Bukin 		/* We failed to open the file read-only.  Let's try to open it
26374fe6c29SRuslan Bukin 		 * read-write; maybe our user has the file open for writing.
26474fe6c29SRuslan Bukin 		 *
26574fe6c29SRuslan Bukin 		 * We will detect changes to the file via fstat().
26674fe6c29SRuslan Bukin 		 */
26774fe6c29SRuslan Bukin 
268*85f87cf4SRuslan Bukin 		fh = CreateFileA(filename, GENERIC_READ, FILE_SHARE_WRITE,
269*85f87cf4SRuslan Bukin 				 NULL, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL,
270*85f87cf4SRuslan Bukin 				 NULL);
27174fe6c29SRuslan Bukin 		if (fh == INVALID_HANDLE_VALUE) {
272*85f87cf4SRuslan Bukin 			errcode = -pte_bad_file;
27374fe6c29SRuslan Bukin 			goto out_unlock;
27474fe6c29SRuslan Bukin 		}
27574fe6c29SRuslan Bukin 	}
27674fe6c29SRuslan Bukin 
27774fe6c29SRuslan Bukin 	fd = _open_osfhandle((intptr_t) fh, _O_RDONLY);
27874fe6c29SRuslan Bukin 	if (fd == -1) {
279*85f87cf4SRuslan Bukin 		errcode = -pte_bad_file;
28074fe6c29SRuslan Bukin 		goto out_fh;
28174fe6c29SRuslan Bukin 	}
28274fe6c29SRuslan Bukin 
28374fe6c29SRuslan Bukin 	errcode = check_file_status(section, fd);
284*85f87cf4SRuslan Bukin 	if (errcode < 0)
28574fe6c29SRuslan Bukin 		goto out_fd;
28674fe6c29SRuslan Bukin 
28774fe6c29SRuslan Bukin 	/* We leave the file open on success.  It will be closed when the
28874fe6c29SRuslan Bukin 	 * section is unmapped.
28974fe6c29SRuslan Bukin 	 */
29074fe6c29SRuslan Bukin 	errcode = pt_sec_windows_map(section, fd);
29174fe6c29SRuslan Bukin 	if (!errcode)
29274fe6c29SRuslan Bukin 		return pt_sec_windows_map_success(section);
29374fe6c29SRuslan Bukin 
29474fe6c29SRuslan Bukin 	/* Fall back to file based sections - report the original error
29574fe6c29SRuslan Bukin 	 * if we fail to convert the file descriptor.
29674fe6c29SRuslan Bukin 	 */
29774fe6c29SRuslan Bukin 	file = _fdopen(fd, "rb");
29874fe6c29SRuslan Bukin 	if (!file) {
299*85f87cf4SRuslan Bukin 		errcode = -pte_bad_file;
30074fe6c29SRuslan Bukin 		goto out_fd;
30174fe6c29SRuslan Bukin 	}
30274fe6c29SRuslan Bukin 
30374fe6c29SRuslan Bukin 	/* We need to keep the file open on success.  It will be closed when
30474fe6c29SRuslan Bukin 	 * the section is unmapped.
30574fe6c29SRuslan Bukin 	 */
30674fe6c29SRuslan Bukin 	errcode = pt_sec_file_map(section, file);
30774fe6c29SRuslan Bukin 	if (!errcode)
30874fe6c29SRuslan Bukin 		return pt_sec_windows_map_success(section);
30974fe6c29SRuslan Bukin 
31074fe6c29SRuslan Bukin 	fclose(file);
31174fe6c29SRuslan Bukin 	goto out_unlock;
31274fe6c29SRuslan Bukin 
31374fe6c29SRuslan Bukin out_fd:
31474fe6c29SRuslan Bukin 	_close(fd);
31574fe6c29SRuslan Bukin 	return errcode;
31674fe6c29SRuslan Bukin 
31774fe6c29SRuslan Bukin out_fh:
31874fe6c29SRuslan Bukin 	CloseHandle(fh);
31974fe6c29SRuslan Bukin 
32074fe6c29SRuslan Bukin out_unlock:
32174fe6c29SRuslan Bukin 	(void) pt_section_unlock(section);
32274fe6c29SRuslan Bukin 	return errcode;
32374fe6c29SRuslan Bukin }
32474fe6c29SRuslan Bukin 
pt_sec_windows_unmap(struct pt_section * section)32574fe6c29SRuslan Bukin int pt_sec_windows_unmap(struct pt_section *section)
32674fe6c29SRuslan Bukin {
32774fe6c29SRuslan Bukin 	struct pt_sec_windows_mapping *mapping;
32874fe6c29SRuslan Bukin 
32974fe6c29SRuslan Bukin 	if (!section)
33074fe6c29SRuslan Bukin 		return -pte_internal;
33174fe6c29SRuslan Bukin 
33274fe6c29SRuslan Bukin 	mapping = section->mapping;
33374fe6c29SRuslan Bukin 	if (!mapping || !section->unmap || !section->read || !section->memsize)
33474fe6c29SRuslan Bukin 		return -pte_internal;
33574fe6c29SRuslan Bukin 
33674fe6c29SRuslan Bukin 	section->mapping = NULL;
33774fe6c29SRuslan Bukin 	section->unmap = NULL;
33874fe6c29SRuslan Bukin 	section->read = NULL;
33974fe6c29SRuslan Bukin 	section->memsize = NULL;
34074fe6c29SRuslan Bukin 
34174fe6c29SRuslan Bukin 	UnmapViewOfFile(mapping->begin);
34274fe6c29SRuslan Bukin 	CloseHandle(mapping->mh);
34374fe6c29SRuslan Bukin 	_close(mapping->fd);
34474fe6c29SRuslan Bukin 	free(mapping);
34574fe6c29SRuslan Bukin 
34674fe6c29SRuslan Bukin 	return 0;
34774fe6c29SRuslan Bukin }
34874fe6c29SRuslan Bukin 
pt_sec_windows_read(const struct pt_section * section,uint8_t * buffer,uint16_t size,uint64_t offset)34974fe6c29SRuslan Bukin int pt_sec_windows_read(const struct pt_section *section, uint8_t *buffer,
35074fe6c29SRuslan Bukin 		      uint16_t size, uint64_t offset)
35174fe6c29SRuslan Bukin {
35274fe6c29SRuslan Bukin 	struct pt_sec_windows_mapping *mapping;
35374fe6c29SRuslan Bukin 	const uint8_t *begin;
35474fe6c29SRuslan Bukin 
35574fe6c29SRuslan Bukin 	if (!buffer || !section)
35674fe6c29SRuslan Bukin 		return -pte_internal;
35774fe6c29SRuslan Bukin 
35874fe6c29SRuslan Bukin 	mapping = section->mapping;
35974fe6c29SRuslan Bukin 	if (!mapping)
36074fe6c29SRuslan Bukin 		return -pte_internal;
36174fe6c29SRuslan Bukin 
36274fe6c29SRuslan Bukin 	/* We already checked in pt_section_read() that the requested memory
36374fe6c29SRuslan Bukin 	 * lies within the section's boundaries.
36474fe6c29SRuslan Bukin 	 *
36574fe6c29SRuslan Bukin 	 * And we checked that the entire section was mapped.  There's no need
36674fe6c29SRuslan Bukin 	 * to check for overflows, again.
36774fe6c29SRuslan Bukin 	 */
36874fe6c29SRuslan Bukin 	begin = mapping->begin + offset;
36974fe6c29SRuslan Bukin 
37074fe6c29SRuslan Bukin 	memcpy(buffer, begin, size);
37174fe6c29SRuslan Bukin 	return (int) size;
37274fe6c29SRuslan Bukin }
37374fe6c29SRuslan Bukin 
37474fe6c29SRuslan Bukin 
pt_sec_windows_memsize(const struct pt_section * section,uint64_t * size)37574fe6c29SRuslan Bukin int pt_sec_windows_memsize(const struct pt_section *section, uint64_t *size)
37674fe6c29SRuslan Bukin {
37774fe6c29SRuslan Bukin 	struct pt_sec_windows_mapping *mapping;
37874fe6c29SRuslan Bukin 	const uint8_t *begin, *end;
37974fe6c29SRuslan Bukin 
38074fe6c29SRuslan Bukin 	if (!section || !size)
38174fe6c29SRuslan Bukin 		return -pte_internal;
38274fe6c29SRuslan Bukin 
38374fe6c29SRuslan Bukin 	mapping = section->mapping;
38474fe6c29SRuslan Bukin 	if (!mapping)
38574fe6c29SRuslan Bukin 		return -pte_internal;
38674fe6c29SRuslan Bukin 
38774fe6c29SRuslan Bukin 	begin = mapping->base;
38874fe6c29SRuslan Bukin 	end =  mapping->end;
38974fe6c29SRuslan Bukin 
39074fe6c29SRuslan Bukin 	if (!begin || !end || end < begin)
39174fe6c29SRuslan Bukin 		return -pte_internal;
39274fe6c29SRuslan Bukin 
39374fe6c29SRuslan Bukin 	*size = (uint64_t) (end - begin);
39474fe6c29SRuslan Bukin 
39574fe6c29SRuslan Bukin 	return 0;
39674fe6c29SRuslan Bukin }
397