mirror of
				https://github.com/go-delve/delve.git
				synced 2025-10-31 18:57:18 +08:00 
			
		
		
		
	 2c1a822632
			
		
	
	2c1a822632
	
	
	
		
			
			* proc/core: off-by-one error reading ELF core files core.(*splicedMemory).ReadMemory checked the entry interval erroneously when dealing with contiguous entries. * terminal,service,proc/*: adds dump command (gcore equivalent) Adds the `dump` command that creates a core file from the target process. Backends will need to implement a new, optional, method `MemoryMap` that returns a list of mapped memory regions. Additionally the method `DumpProcessNotes` can be implemented to write out to the core file notes describing the target process and its threads. If DumpProcessNotes is not implemented `proc.Dump` will write a description of the process and its threads in a OS/arch-independent format (that only Delve understands). Currently only linux/amd64 implements `DumpProcessNotes`. Core files are only written in ELF, there is no minidump or macho-o writers. # Conflicts: # pkg/proc/proc_test.go
		
			
				
	
	
		
			43 lines
		
	
	
		
			1.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			43 lines
		
	
	
		
			1.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package native
 | ||
| 
 | ||
| import (
 | ||
| 	"syscall"
 | ||
| 	"unsafe"
 | ||
| 
 | ||
| 	sys "golang.org/x/sys/unix"
 | ||
| 
 | ||
| 	"github.com/go-delve/delve/pkg/proc/amd64util"
 | ||
| )
 | ||
| 
 | ||
| // ptraceGetRegset returns floating point registers of the specified thread
 | ||
| // using PTRACE.
 | ||
| // See amd64_linux_fetch_inferior_registers in gdb/amd64-linux-nat.c.html
 | ||
| // and amd64_supply_xsave in gdb/amd64-tdep.c.html
 | ||
| // and Section 13.1 (and following) of Intel® 64 and IA-32 Architectures Software Developer’s Manual, Volume 1: Basic Architecture
 | ||
| func ptraceGetRegset(tid int) (regset amd64util.AMD64Xstate, err error) {
 | ||
| 	_, _, err = syscall.Syscall6(syscall.SYS_PTRACE, sys.PTRACE_GETFPREGS, uintptr(tid), uintptr(0), uintptr(unsafe.Pointer(®set.AMD64PtraceFpRegs)), 0, 0)
 | ||
| 	if err == syscall.Errno(0) || err == syscall.ENODEV {
 | ||
| 		// ignore ENODEV, it just means this CPU doesn't have X87 registers (??)
 | ||
| 		err = nil
 | ||
| 	}
 | ||
| 
 | ||
| 	xstateargs := make([]byte, amd64util.AMD64XstateMaxSize())
 | ||
| 	iov := sys.Iovec{Base: &xstateargs[0], Len: uint64(len(xstateargs))}
 | ||
| 	_, _, err = syscall.Syscall6(syscall.SYS_PTRACE, sys.PTRACE_GETREGSET, uintptr(tid), _NT_X86_XSTATE, uintptr(unsafe.Pointer(&iov)), 0, 0)
 | ||
| 	if err != syscall.Errno(0) {
 | ||
| 		if err == syscall.ENODEV || err == syscall.EIO || err == syscall.EINVAL {
 | ||
| 			// ignore ENODEV, it just means this CPU or kernel doesn't support XSTATE, see https://github.com/go-delve/delve/issues/1022
 | ||
| 			// also ignore EIO, it means that we are running on an old kernel (pre 2.6.34) and PTRACE_GETREGSET is not implemented
 | ||
| 			// also ignore EINVAL, it means the kernel itself does not support the NT_X86_XSTATE argument (but does support PTRACE_GETREGSET)
 | ||
| 			err = nil
 | ||
| 		}
 | ||
| 		return
 | ||
| 	} else {
 | ||
| 		err = nil
 | ||
| 	}
 | ||
| 
 | ||
| 	regset.Xsave = xstateargs[:iov.Len]
 | ||
| 	err = amd64util.AMD64XstateRead(regset.Xsave, false, ®set)
 | ||
| 	return
 | ||
| }
 |