mirror of
				https://github.com/go-delve/delve.git
				synced 2025-10-30 10:17:03 +08:00 
			
		
		
		
	 0631684f99
			
		
	
	0631684f99
	
	
	
		
			
			Only Linux and Windows are affected but it's better to do this for all platforms for consistency.
		
			
				
	
	
		
			637 lines
		
	
	
		
			15 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			637 lines
		
	
	
		
			15 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package native
 | |
| 
 | |
| /*
 | |
| #cgo LDFLAGS: -lprocstat
 | |
| 
 | |
| #include <sys/types.h>
 | |
| #include <sys/sysctl.h>
 | |
| #include <sys/user.h>
 | |
| 
 | |
| #include <limits.h>
 | |
| #include <stdlib.h>
 | |
| 
 | |
| #include <libprocstat.h>
 | |
| #include <libutil.h>
 | |
| 
 | |
| uintptr_t elf_aux_info_ptr(Elf_Auxinfo *aux_info) {
 | |
| 	return (uintptr_t)aux_info->a_un.a_ptr;
 | |
| }
 | |
| */
 | |
| import "C"
 | |
| import (
 | |
| 	"errors"
 | |
| 	"fmt"
 | |
| 	"os/exec"
 | |
| 	"os/signal"
 | |
| 	"strings"
 | |
| 	"syscall"
 | |
| 	"unsafe"
 | |
| 
 | |
| 	sys "golang.org/x/sys/unix"
 | |
| 
 | |
| 	"github.com/go-delve/delve/pkg/logflags"
 | |
| 	"github.com/go-delve/delve/pkg/proc"
 | |
| 	"github.com/go-delve/delve/pkg/proc/internal/ebpf"
 | |
| 
 | |
| 	isatty "github.com/mattn/go-isatty"
 | |
| )
 | |
| 
 | |
| const (
 | |
| 	_PL_FLAG_BORN   = 0x100
 | |
| 	_PL_FLAG_EXITED = 0x200
 | |
| 	_PL_FLAG_SI     = 0x20
 | |
| )
 | |
| 
 | |
| // Process statuses
 | |
| const (
 | |
| 	statusIdle     = 1
 | |
| 	statusRunning  = 2
 | |
| 	statusSleeping = 3
 | |
| 	statusStopped  = 4
 | |
| 	statusZombie   = 5
 | |
| 	statusWaiting  = 6
 | |
| 	statusLocked   = 7
 | |
| )
 | |
| 
 | |
| // osProcessDetails contains FreeBSD specific
 | |
| // process details.
 | |
| type osProcessDetails struct {
 | |
| 	comm string
 | |
| 	tid  int
 | |
| 
 | |
| 	delayedSignal  syscall.Signal
 | |
| 	trapThreads    []int
 | |
| 	selectedThread *nativeThread
 | |
| }
 | |
| 
 | |
| func (os *osProcessDetails) Close() {}
 | |
| 
 | |
| // Launch creates and begins debugging a new process. First entry in
 | |
| // `cmd` is the program to run, and then rest are the arguments
 | |
| // to be supplied to that process. `wd` is working directory of the program.
 | |
| // If the DWARF information cannot be found in the binary, Delve will look
 | |
| // for external debug files in the directories passed in.
 | |
| func Launch(cmd []string, wd string, flags proc.LaunchFlags, debugInfoDirs []string, tty string, stdinPath string, stdoutOR proc.OutputRedirect, stderrOR proc.OutputRedirect) (*proc.TargetGroup, error) {
 | |
| 	var (
 | |
| 		process *exec.Cmd
 | |
| 		err     error
 | |
| 	)
 | |
| 
 | |
| 	foreground := flags&proc.LaunchForeground != 0
 | |
| 
 | |
| 	stdin, stdout, stderr, closefn, err := openRedirects(stdinPath, stdoutOR, stderrOR, foreground)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	if stdin == nil || !isatty.IsTerminal(stdin.Fd()) {
 | |
| 		// exec.(*Process).Start will fail if we try to send a process to
 | |
| 		// foreground but we are not attached to a terminal.
 | |
| 		foreground = false
 | |
| 	}
 | |
| 
 | |
| 	dbp := newProcess(0)
 | |
| 	defer func() {
 | |
| 		if err != nil && dbp.pid != 0 {
 | |
| 			_ = detachWithoutGroup(dbp, true)
 | |
| 		}
 | |
| 	}()
 | |
| 	dbp.execPtraceFunc(func() {
 | |
| 		process = exec.Command(cmd[0])
 | |
| 		process.Args = cmd
 | |
| 		process.Stdin = stdin
 | |
| 		process.Stdout = stdout
 | |
| 		process.Stderr = stderr
 | |
| 		process.SysProcAttr = &syscall.SysProcAttr{Ptrace: true, Setpgid: true, Foreground: foreground}
 | |
| 		if foreground {
 | |
| 			signal.Ignore(syscall.SIGTTOU, syscall.SIGTTIN)
 | |
| 		}
 | |
| 		if tty != "" {
 | |
| 			dbp.ctty, err = attachProcessToTTY(process, tty)
 | |
| 			if err != nil {
 | |
| 				return
 | |
| 			}
 | |
| 		}
 | |
| 		if wd != "" {
 | |
| 			process.Dir = wd
 | |
| 		}
 | |
| 		err = process.Start()
 | |
| 	})
 | |
| 	closefn()
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	dbp.pid = process.Process.Pid
 | |
| 	dbp.childProcess = true
 | |
| 	_, _, err = dbp.wait(process.Process.Pid, 0)
 | |
| 	if err != nil {
 | |
| 		return nil, fmt.Errorf("waiting for target execve failed: %s", err)
 | |
| 	}
 | |
| 	tgt, err := dbp.initialize(cmd[0], debugInfoDirs)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return tgt, nil
 | |
| }
 | |
| 
 | |
| // Attach to an existing process with the given PID. Once attached, if
 | |
| // the DWARF information cannot be found in the binary, Delve will look
 | |
| // for external debug files in the directories passed in.
 | |
| func Attach(pid int, waitFor *proc.WaitFor, debugInfoDirs []string) (*proc.TargetGroup, error) {
 | |
| 	if waitFor.Valid() {
 | |
| 		var err error
 | |
| 		pid, err = WaitFor(waitFor)
 | |
| 		if err != nil {
 | |
| 			return nil, err
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	dbp := newProcess(pid)
 | |
| 
 | |
| 	var err error
 | |
| 	dbp.execPtraceFunc(func() { err = ptraceAttach(dbp.pid) })
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	_, _, err = dbp.wait(dbp.pid, 0)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	tgt, err := dbp.initialize(findExecutable("", dbp.pid), debugInfoDirs)
 | |
| 	if err != nil {
 | |
| 		detachWithoutGroup(dbp, false)
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return tgt, nil
 | |
| }
 | |
| 
 | |
| func waitForSearchProcess(pfx string, seen map[int]struct{}) (int, error) {
 | |
| 	log := logflags.DebuggerLogger()
 | |
| 	ps := C.procstat_open_sysctl()
 | |
| 	defer C.procstat_close(ps)
 | |
| 	var cnt C.uint
 | |
| 	procs := C.procstat_getprocs(ps, C.KERN_PROC_PROC, 0, &cnt)
 | |
| 	defer C.procstat_freeprocs(ps, procs)
 | |
| 	proc := procs
 | |
| 	for i := 0; i < int(cnt); i++ {
 | |
| 		if _, isseen := seen[int(proc.ki_pid)]; isseen {
 | |
| 			continue
 | |
| 		}
 | |
| 		seen[int(proc.ki_pid)] = struct{}{}
 | |
| 
 | |
| 		argv := strings.Join(getCmdLineInternal(ps, proc), " ")
 | |
| 		log.Debugf("waitfor: new process %q", argv)
 | |
| 		if strings.HasPrefix(argv, pfx) {
 | |
| 			return int(proc.ki_pid), nil
 | |
| 		}
 | |
| 
 | |
| 		proc = (*C.struct_kinfo_proc)(unsafe.Pointer(uintptr(unsafe.Pointer(proc)) + unsafe.Sizeof(*proc)))
 | |
| 	}
 | |
| 	return 0, nil
 | |
| }
 | |
| 
 | |
| func initialize(dbp *nativeProcess) (string, error) {
 | |
| 	kp, err := C.kinfo_getproc(C.int(dbp.pid))
 | |
| 	if err != nil {
 | |
| 		return "", fmt.Errorf("kinfo_getproc failed: %v", err)
 | |
| 	}
 | |
| 	defer C.free(unsafe.Pointer(kp))
 | |
| 
 | |
| 	comm := C.GoString(&kp.ki_comm[0])
 | |
| 	dbp.os.comm = strings.ReplaceAll(string(comm), "%", "%%")
 | |
| 
 | |
| 	return getCmdLine(dbp.pid), nil
 | |
| }
 | |
| 
 | |
| // kill kills the target process.
 | |
| func (procgrp *processGroup) kill(dbp *nativeProcess) (err error) {
 | |
| 	if ok, _ := dbp.Valid(); !ok {
 | |
| 		return nil
 | |
| 	}
 | |
| 	dbp.execPtraceFunc(func() {
 | |
| 		for _, th := range dbp.threads {
 | |
| 			ptraceResume(th.ID)
 | |
| 		}
 | |
| 		err = ptraceCont(dbp.pid, int(sys.SIGKILL))
 | |
| 	})
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	if _, _, err = dbp.wait(dbp.pid, 0); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	dbp.postExit()
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // Used by RequestManualStop
 | |
| func (dbp *nativeProcess) requestManualStop() (err error) {
 | |
| 	return sys.Kill(dbp.pid, sys.SIGSTOP)
 | |
| }
 | |
| 
 | |
| // Attach to a newly created thread, and store that thread in our list of
 | |
| // known threads.
 | |
| func (dbp *nativeProcess) addThread(tid int, attach bool) (*nativeThread, error) {
 | |
| 	if thread, ok := dbp.threads[tid]; ok {
 | |
| 		return thread, nil
 | |
| 	}
 | |
| 
 | |
| 	var err error
 | |
| 	dbp.execPtraceFunc(func() { err = sys.PtraceLwpEvents(dbp.pid, 1) })
 | |
| 	if err == syscall.ESRCH {
 | |
| 		if _, _, err = dbp.wait(dbp.pid, 0); err != nil {
 | |
| 			return nil, fmt.Errorf("error while waiting after adding process: %d %s", dbp.pid, err)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	dbp.threads[tid] = &nativeThread{
 | |
| 		ID:  tid,
 | |
| 		dbp: dbp,
 | |
| 		os:  new(osSpecificDetails),
 | |
| 	}
 | |
| 
 | |
| 	if dbp.memthread == nil {
 | |
| 		dbp.memthread = dbp.threads[tid]
 | |
| 	}
 | |
| 
 | |
| 	return dbp.threads[tid], nil
 | |
| }
 | |
| 
 | |
| // Used by initialize
 | |
| func (dbp *nativeProcess) updateThreadList() error {
 | |
| 	var tids []int32
 | |
| 	dbp.execPtraceFunc(func() { tids = ptraceGetLwpList(dbp.pid) })
 | |
| 	for _, tid := range tids {
 | |
| 		if _, err := dbp.addThread(int(tid), false); err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 	dbp.os.tid = int(tids[0])
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func findExecutable(path string, pid int) string {
 | |
| 	if path != "" {
 | |
| 		return path
 | |
| 	}
 | |
| 
 | |
| 	ps := C.procstat_open_sysctl()
 | |
| 	if ps == nil {
 | |
| 		panic("procstat_open_sysctl failed")
 | |
| 	}
 | |
| 	defer C.procstat_close(ps)
 | |
| 
 | |
| 	kp := C.kinfo_getproc(C.int(pid))
 | |
| 	if kp == nil {
 | |
| 		panic("kinfo_getproc failed")
 | |
| 	}
 | |
| 	defer C.free(unsafe.Pointer(kp))
 | |
| 
 | |
| 	var pathname [C.PATH_MAX]C.char
 | |
| 	if C.procstat_getpathname(ps, kp, (*C.char)(unsafe.Pointer(&pathname[0])), C.PATH_MAX) != 0 {
 | |
| 		panic("procstat_getpathname failed")
 | |
| 	}
 | |
| 
 | |
| 	return C.GoString(&pathname[0])
 | |
| }
 | |
| 
 | |
| func getCmdLine(pid int) string {
 | |
| 	ps := C.procstat_open_sysctl()
 | |
| 	kp := C.kinfo_getproc(C.int(pid))
 | |
| 	goargv := getCmdLineInternal(ps, kp)
 | |
| 	C.free(unsafe.Pointer(kp))
 | |
| 	C.procstat_close(ps)
 | |
| 	return strings.Join(goargv, " ")
 | |
| }
 | |
| 
 | |
| func getCmdLineInternal(ps *C.struct_procstat, kp *C.struct_kinfo_proc) []string {
 | |
| 	argv := C.procstat_getargv(ps, kp, 0)
 | |
| 	if argv == nil {
 | |
| 		return nil
 | |
| 	}
 | |
| 	goargv := []string{}
 | |
| 	for {
 | |
| 		arg := *argv
 | |
| 		if arg == nil {
 | |
| 			break
 | |
| 		}
 | |
| 		argv = (**C.char)(unsafe.Pointer(uintptr(unsafe.Pointer(argv)) + unsafe.Sizeof(*argv)))
 | |
| 		goargv = append(goargv, C.GoString(arg))
 | |
| 	}
 | |
| 	C.procstat_freeargv(ps)
 | |
| 	return goargv
 | |
| }
 | |
| 
 | |
| func trapWait(procgrp *processGroup, pid int) (*nativeThread, error) {
 | |
| 	return procgrp.procs[0].trapWaitInternal(pid, trapWaitNormal)
 | |
| }
 | |
| 
 | |
| type trapWaitMode uint8
 | |
| 
 | |
| const (
 | |
| 	trapWaitNormal trapWaitMode = iota
 | |
| 	trapWaitStepping
 | |
| )
 | |
| 
 | |
| // Used by stop and trapWait
 | |
| func (dbp *nativeProcess) trapWaitInternal(pid int, mode trapWaitMode) (*nativeThread, error) {
 | |
| 	if dbp.os.selectedThread != nil {
 | |
| 		th := dbp.os.selectedThread
 | |
| 		dbp.os.selectedThread = nil
 | |
| 		return th, nil
 | |
| 	}
 | |
| 	for {
 | |
| 		wpid, status, err := dbp.wait(pid, 0)
 | |
| 		if wpid != dbp.pid {
 | |
| 			// possibly a delayed notification from a process we just detached and killed, freebsd bug?
 | |
| 			continue
 | |
| 		}
 | |
| 		if err != nil {
 | |
| 			return nil, fmt.Errorf("wait err %s %d", err, pid)
 | |
| 		}
 | |
| 		if status.Killed() {
 | |
| 			// "Killed" status may arrive as a result of a Process.Kill() of some other process in
 | |
| 			// the system performed by the same tracer (e.g. in the previous test)
 | |
| 			continue
 | |
| 		}
 | |
| 		if status.Exited() {
 | |
| 			dbp.postExit()
 | |
| 			return nil, proc.ErrProcessExited{Pid: wpid, Status: status.ExitStatus()}
 | |
| 		}
 | |
| 		if status.Signaled() {
 | |
| 			// Killed by a signal
 | |
| 			dbp.postExit()
 | |
| 			return nil, proc.ErrProcessExited{Pid: wpid, Status: -int(status.Signal())}
 | |
| 		}
 | |
| 
 | |
| 		var info sys.PtraceLwpInfoStruct
 | |
| 		dbp.execPtraceFunc(func() { info, err = ptraceGetLwpInfo(wpid) })
 | |
| 		if err != nil {
 | |
| 			return nil, fmt.Errorf("ptraceGetLwpInfo err %s %d", err, pid)
 | |
| 		}
 | |
| 		tid := int(info.Lwpid)
 | |
| 		pl_flags := int(info.Flags)
 | |
| 		th, ok := dbp.threads[tid]
 | |
| 		if ok {
 | |
| 			th.Status = (*waitStatus)(status)
 | |
| 		}
 | |
| 
 | |
| 		if status.StopSignal() == sys.SIGTRAP {
 | |
| 			if pl_flags&_PL_FLAG_EXITED != 0 {
 | |
| 				delete(dbp.threads, tid)
 | |
| 				dbp.execPtraceFunc(func() { err = ptraceCont(tid, 0) })
 | |
| 				if err != nil {
 | |
| 					return nil, err
 | |
| 				}
 | |
| 				continue
 | |
| 			} else if pl_flags&_PL_FLAG_BORN != 0 {
 | |
| 				th, err = dbp.addThread(int(tid), false)
 | |
| 				if err != nil {
 | |
| 					if err == sys.ESRCH {
 | |
| 						// process died while we were adding it
 | |
| 						continue
 | |
| 					}
 | |
| 					return nil, err
 | |
| 				}
 | |
| 				if mode == trapWaitStepping {
 | |
| 					dbp.execPtraceFunc(func() { ptraceSuspend(tid) })
 | |
| 				}
 | |
| 				if err = dbp.ptraceCont(0); err != nil {
 | |
| 					if err == sys.ESRCH {
 | |
| 						// thread died while we were adding it
 | |
| 						delete(dbp.threads, int(tid))
 | |
| 						continue
 | |
| 					}
 | |
| 					return nil, fmt.Errorf("could not continue new thread %d %s", tid, err)
 | |
| 				}
 | |
| 				continue
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		if th == nil {
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		if mode == trapWaitStepping {
 | |
| 			return th, nil
 | |
| 		}
 | |
| 		if status.StopSignal() == sys.SIGTRAP || status.Continued() {
 | |
| 			// Continued in this case means we received the SIGSTOP signal
 | |
| 			return th, nil
 | |
| 		}
 | |
| 
 | |
| 		// TODO(dp) alert user about unexpected signals here.
 | |
| 		if err := dbp.ptraceCont(int(status.StopSignal())); err != nil {
 | |
| 			if err == sys.ESRCH {
 | |
| 				return nil, proc.ErrProcessExited{Pid: dbp.pid}
 | |
| 			}
 | |
| 			return nil, err
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // status returns the status code for the given process.
 | |
| func status(pid int) int {
 | |
| 	kp, err := C.kinfo_getproc(C.int(pid))
 | |
| 	if err != nil {
 | |
| 		return -1
 | |
| 	}
 | |
| 	defer C.free(unsafe.Pointer(kp))
 | |
| 	return int(kp.ki_stat)
 | |
| }
 | |
| 
 | |
| // Only used in this file
 | |
| func (dbp *nativeProcess) wait(pid, options int) (int, *sys.WaitStatus, error) {
 | |
| 	var s sys.WaitStatus
 | |
| 	wpid, err := sys.Wait4(pid, &s, options, nil)
 | |
| 	return wpid, &s, err
 | |
| }
 | |
| 
 | |
| // Only used in this file
 | |
| func (dbp *nativeProcess) exitGuard(err error) error {
 | |
| 	if err != sys.ESRCH {
 | |
| 		return err
 | |
| 	}
 | |
| 	if status(dbp.pid) == statusZombie {
 | |
| 		_, err := dbp.trapWaitInternal(-1, trapWaitNormal)
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	return err
 | |
| }
 | |
| 
 | |
| // Used by ContinueOnce
 | |
| func (procgrp *processGroup) resume() error {
 | |
| 	dbp := procgrp.procs[0]
 | |
| 	// all threads stopped over a breakpoint are made to step over it
 | |
| 	for _, thread := range dbp.threads {
 | |
| 		if thread.CurrentBreakpoint.Breakpoint != nil {
 | |
| 			if err := procgrp.stepInstruction(thread); err != nil {
 | |
| 				return err
 | |
| 			}
 | |
| 			thread.CurrentBreakpoint.Clear()
 | |
| 		}
 | |
| 	}
 | |
| 	if len(dbp.os.trapThreads) > 0 {
 | |
| 		// On these threads we have already received a SIGTRAP while stepping on a different thread,
 | |
| 		// do not resume the process, instead record the breakpoint hits on them.
 | |
| 		tt := dbp.os.trapThreads
 | |
| 		dbp.os.trapThreads = dbp.os.trapThreads[:0]
 | |
| 		var err error
 | |
| 		dbp.os.selectedThread, err = dbp.postStop(tt...)
 | |
| 		return err
 | |
| 	}
 | |
| 	// all threads are resumed
 | |
| 	var err error
 | |
| 	dbp.execPtraceFunc(func() {
 | |
| 		for _, th := range dbp.threads {
 | |
| 			err = ptraceResume(th.ID)
 | |
| 			if err != nil {
 | |
| 				return
 | |
| 			}
 | |
| 		}
 | |
| 		sig := int(dbp.os.delayedSignal)
 | |
| 		dbp.os.delayedSignal = 0
 | |
| 		for _, thread := range dbp.threads {
 | |
| 			thread.Status = nil
 | |
| 		}
 | |
| 		err = ptraceCont(dbp.pid, sig)
 | |
| 	})
 | |
| 	return err
 | |
| }
 | |
| 
 | |
| // Used by ContinueOnce
 | |
| // stop stops all running threads and sets breakpoints
 | |
| func (procgrp *processGroup) stop(cctx *proc.ContinueOnceContext, trapthread *nativeThread) (*nativeThread, error) {
 | |
| 	return procgrp.procs[0].stop(trapthread)
 | |
| }
 | |
| 
 | |
| func (dbp *nativeProcess) stop(trapthread *nativeThread) (*nativeThread, error) {
 | |
| 	if ok, err := dbp.Valid(); !ok {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	var err error
 | |
| 	dbp.execPtraceFunc(func() {
 | |
| 		for _, th := range dbp.threads {
 | |
| 			err = ptraceSuspend(th.ID)
 | |
| 			if err != nil {
 | |
| 				return
 | |
| 			}
 | |
| 		}
 | |
| 	})
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	if trapthread.Status == nil || (*sys.WaitStatus)(trapthread.Status).StopSignal() != sys.SIGTRAP {
 | |
| 		return trapthread, nil
 | |
| 	}
 | |
| 
 | |
| 	return dbp.postStop(trapthread.ID)
 | |
| }
 | |
| 
 | |
| func (dbp *nativeProcess) postStop(tids ...int) (*nativeThread, error) {
 | |
| 	var pickedTrapThread *nativeThread
 | |
| 	for _, tid := range tids {
 | |
| 		trapthread := dbp.threads[tid]
 | |
| 		if trapthread == nil {
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		// Must either be a hardcoded breakpoint, a currently set breakpoint or a
 | |
| 		// phantom breakpoint hit caused by a SIGTRAP that was delayed.
 | |
| 		// If someone sent a SIGTRAP directly to the process this will fail, but we
 | |
| 		// can't do better.
 | |
| 
 | |
| 		err := trapthread.SetCurrentBreakpoint(true)
 | |
| 		if err != nil {
 | |
| 			return nil, err
 | |
| 		}
 | |
| 
 | |
| 		if trapthread.CurrentBreakpoint.Breakpoint == nil {
 | |
| 			// hardcoded breakpoint or phantom breakpoint hit
 | |
| 			if dbp.BinInfo().Arch.BreakInstrMovesPC() {
 | |
| 				pc, _ := trapthread.PC()
 | |
| 				if !trapthread.atHardcodedBreakpoint(pc) {
 | |
| 					// phantom breakpoint hit
 | |
| 					_ = trapthread.setPC(pc - uint64(len(dbp.BinInfo().Arch.BreakpointInstruction())))
 | |
| 					trapthread = nil
 | |
| 				}
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		if pickedTrapThread == nil && trapthread != nil {
 | |
| 			pickedTrapThread = trapthread
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return pickedTrapThread, nil
 | |
| }
 | |
| 
 | |
| // Used by Detach
 | |
| func (dbp *nativeProcess) detach(kill bool) error {
 | |
| 	if !kill {
 | |
| 		for _, th := range dbp.threads {
 | |
| 			ptraceResume(th.ID)
 | |
| 		}
 | |
| 	}
 | |
| 	return ptraceDetach(dbp.pid)
 | |
| }
 | |
| 
 | |
| // EntryPoint returns the entry point address of the process.
 | |
| func (dbp *nativeProcess) EntryPoint() (uint64, error) {
 | |
| 	ps, err := C.procstat_open_sysctl()
 | |
| 	if err != nil {
 | |
| 		return 0, fmt.Errorf("procstat_open_sysctl failed: %v", err)
 | |
| 	}
 | |
| 	defer C.procstat_close(ps)
 | |
| 
 | |
| 	var count C.uint
 | |
| 	kipp, err := C.procstat_getprocs(ps, C.KERN_PROC_PID, C.int(dbp.pid), &count)
 | |
| 	if err != nil {
 | |
| 		return 0, fmt.Errorf("procstat_getprocs failed: %v", err)
 | |
| 	}
 | |
| 	defer C.procstat_freeprocs(ps, kipp)
 | |
| 	if count == 0 {
 | |
| 		return 0, errors.New("procstat_getprocs returned no processes")
 | |
| 	}
 | |
| 
 | |
| 	auxv, err := C.procstat_getauxv(ps, kipp, &count)
 | |
| 	if err != nil {
 | |
| 		return 0, fmt.Errorf("procstat_getauxv failed: %v", err)
 | |
| 	}
 | |
| 	defer C.procstat_freeauxv(ps, auxv)
 | |
| 
 | |
| 	for i := 0; i < int(count); i++ {
 | |
| 		if auxv.a_type == C.AT_ENTRY {
 | |
| 			return uint64(C.elf_aux_info_ptr(auxv)), nil
 | |
| 		}
 | |
| 		auxv = (*C.Elf_Auxinfo)(unsafe.Pointer(uintptr(unsafe.Pointer(auxv)) + unsafe.Sizeof(*auxv)))
 | |
| 	}
 | |
| 	return 0, errors.New("entry point not found")
 | |
| }
 | |
| 
 | |
| func (dbp *nativeProcess) SupportsBPF() bool {
 | |
| 	return false
 | |
| }
 | |
| 
 | |
| func (dbp *nativeProcess) SetUProbe(fnName string, goidOffset int64, args []ebpf.UProbeArgMap) error {
 | |
| 	panic("not implemented")
 | |
| }
 | |
| 
 | |
| func (dbp *nativeProcess) GetBufferedTracepoints() []ebpf.RawUProbeParams {
 | |
| 	panic("not implemented")
 | |
| }
 | |
| 
 | |
| func (dbp *nativeProcess) ptraceCont(sig int) error {
 | |
| 	var err error
 | |
| 	dbp.execPtraceFunc(func() { err = ptraceCont(dbp.pid, sig) })
 | |
| 	return err
 | |
| }
 | |
| 
 | |
| func killProcess(pid int) error {
 | |
| 	return sys.Kill(pid, sys.SIGINT)
 | |
| }
 |