
* proc/core: off-by-one error reading ELF core files core.(*splicedMemory).ReadMemory checked the entry interval erroneously when dealing with contiguous entries. * terminal,service,proc/*: adds dump command (gcore equivalent) Adds the `dump` command that creates a core file from the target process. Backends will need to implement a new, optional, method `MemoryMap` that returns a list of mapped memory regions. Additionally the method `DumpProcessNotes` can be implemented to write out to the core file notes describing the target process and its threads. If DumpProcessNotes is not implemented `proc.Dump` will write a description of the process and its threads in a OS/arch-independent format (that only Delve understands). Currently only linux/amd64 implements `DumpProcessNotes`. Core files are only written in ELF, there is no minidump or macho-o writers. # Conflicts: # pkg/proc/proc_test.go
92 lines
2.3 KiB
Go
92 lines
2.3 KiB
Go
package native
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
"unsafe"
|
|
|
|
"github.com/go-delve/delve/pkg/elfwriter"
|
|
"github.com/go-delve/delve/pkg/proc"
|
|
)
|
|
|
|
func (p *nativeProcess) MemoryMap() ([]proc.MemoryMapEntry, error) {
|
|
var memoryMapError error
|
|
r := []proc.MemoryMapEntry{}
|
|
|
|
p.execPtraceFunc(func() {
|
|
is64 := true
|
|
if isWow64 := uint32(0); _IsWow64Process(p.os.hProcess, &isWow64) != 0 {
|
|
if isWow64 != 0 {
|
|
is64 = false
|
|
}
|
|
}
|
|
|
|
maxaddr := uint64(1 << 48) // windows64 uses only 48 bit addresses
|
|
if !is64 {
|
|
maxaddr = uint64(^uint32(0))
|
|
}
|
|
|
|
var meminfo _MEMORY_BASIC_INFORMATION
|
|
|
|
for addr := uint64(0); addr < maxaddr; addr += meminfo.RegionSize {
|
|
size := _VirtualQueryEx(p.os.hProcess, uintptr(addr), &meminfo, unsafe.Sizeof(meminfo))
|
|
if size == 0 {
|
|
// size == 0 is an error and the only error returned by VirtualQueryEx
|
|
// is when addr is above the highest address allocated for the
|
|
// application.
|
|
return
|
|
}
|
|
if size != unsafe.Sizeof(meminfo) {
|
|
memoryMapError = fmt.Errorf("bad size returned by _VirtualQueryEx: %d (expected %d)", size, unsafe.Sizeof(meminfo))
|
|
return
|
|
}
|
|
if addr+meminfo.RegionSize <= addr {
|
|
// this shouldn't happen
|
|
memoryMapError = errors.New("VirtualQueryEx wrapped around the address space or stuck")
|
|
return
|
|
}
|
|
if meminfo.State == _MEM_FREE || meminfo.State == _MEM_RESERVE {
|
|
continue
|
|
}
|
|
if meminfo.Protect&_PAGE_GUARD != 0 {
|
|
// reading from this range will result in an error.
|
|
continue
|
|
}
|
|
|
|
var mme proc.MemoryMapEntry
|
|
mme.Addr = addr
|
|
mme.Size = meminfo.RegionSize
|
|
|
|
switch meminfo.Protect & 0xff {
|
|
case _PAGE_EXECUTE:
|
|
mme.Exec = true
|
|
case _PAGE_EXECUTE_READ:
|
|
mme.Exec = true
|
|
mme.Read = true
|
|
case _PAGE_EXECUTE_READWRITE:
|
|
mme.Exec = true
|
|
mme.Read = true
|
|
mme.Write = true
|
|
case _PAGE_EXECUTE_WRITECOPY:
|
|
mme.Exec = true
|
|
mme.Read = true
|
|
case _PAGE_NOACCESS:
|
|
case _PAGE_READONLY:
|
|
mme.Read = true
|
|
case _PAGE_READWRITE:
|
|
mme.Read = true
|
|
mme.Write = true
|
|
case _PAGE_WRITECOPY:
|
|
mme.Read = true
|
|
}
|
|
r = append(r, mme)
|
|
}
|
|
})
|
|
|
|
return r, memoryMapError
|
|
}
|
|
|
|
func (p *nativeProcess) DumpProcessNotes(notes []elfwriter.Note, threadDone func()) (threadsDone bool, out []elfwriter.Note, err error) {
|
|
return false, notes, nil
|
|
}
|