LLDB mainline
DynamicLoaderFreeBSDKernel.cpp
Go to the documentation of this file.
1//===-- DynamicLoaderFreeBSDKernel.cpp
2//------------------------------------------===//
3//
4// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
5// See https://llvm.org/LICENSE.txt for license information.
6// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7//
8//===----------------------------------------------------------------------===//
9
11#include "lldb/Core/Debugger.h"
12#include "lldb/Core/Module.h"
15#include "lldb/Core/Section.h"
22#include "lldb/Target/Target.h"
23#include "lldb/Target/Thread.h"
28#include "lldb/Utility/Log.h"
29#include "lldb/Utility/State.h"
30
32
34#include <memory>
35#include <mutex>
36
37using namespace lldb;
38using namespace lldb_private;
39
41
47
51
53 return "The Dynamic Loader Plugin For FreeBSD Kernel";
54}
55
56static bool is_kernel(Module *module) {
57 if (!module)
58 return false;
59
60 ObjectFile *objfile = module->GetObjectFile();
61 if (!objfile)
62 return false;
63 if (objfile->GetType() != ObjectFile::eTypeExecutable)
64 return false;
65 if (objfile->GetStrata() != ObjectFile::eStrataUnknown &&
67 return false;
68
69 return true;
70}
71
72static bool is_kmod(Module *module) {
73 if (!module)
74 return false;
75 if (!module->GetObjectFile())
76 return false;
77 ObjectFile *objfile = module->GetObjectFile();
78 if (objfile->GetType() != ObjectFile::eTypeObjectFile &&
80 return false;
81
82 return true;
83}
84
85static bool is_reloc(Module *module) {
86 if (!module)
87 return false;
88 if (!module->GetObjectFile())
89 return false;
90 ObjectFile *objfile = module->GetObjectFile();
91 if (objfile->GetType() != ObjectFile::eTypeObjectFile)
92 return false;
93
94 return true;
95}
96
97// Instantiate Function of the FreeBSD Kernel Dynamic Loader Plugin called when
98// Register the Plugin
101 bool force) {
102 // Check the environment when the plugin is not force loaded
103 Module *exec = process->GetTarget().GetExecutableModulePointer();
104 if (exec && !is_kernel(exec)) {
105 return nullptr;
106 }
107 if (!force) {
108 // Check if the target is kernel
109 const llvm::Triple &triple_ref =
110 process->GetTarget().GetArchitecture().GetTriple();
111 if (!triple_ref.isOSFreeBSD()) {
112 return nullptr;
113 }
114 }
115
116 // At this point we have checked the target is a FreeBSD kernel and all we
117 // have to do is to find the kernel address
118 const addr_t kernel_address = FindFreeBSDKernel(process);
119
120 if (CheckForKernelImageAtAddress(process, kernel_address).IsValid())
121 return new DynamicLoaderFreeBSDKernel(process, kernel_address);
122
123 return nullptr;
124}
125
126addr_t
128 addr_t kernel_addr = process->GetImageInfoAddress();
129 if (kernel_addr == LLDB_INVALID_ADDRESS)
130 kernel_addr = FindKernelAtLoadAddress(process);
131 return kernel_addr;
132}
133
134// Get the kernel address if the kernel is not loaded with a slide
136 lldb_private::Process *process) {
137 Module *exe_module = process->GetTarget().GetExecutableModulePointer();
138
139 if (!is_kernel(exe_module))
141
142 ObjectFile *exe_objfile = exe_module->GetObjectFile();
143
144 if (!exe_objfile->GetBaseAddress().IsValid())
146
148 process, exe_objfile->GetBaseAddress().GetFileAddress())
149 .IsValid())
150 return exe_objfile->GetBaseAddress().GetFileAddress();
151
153}
154
155// Read ELF header from memry and return
157 lldb::addr_t addr,
158 llvm::ELF::Elf32_Ehdr &header,
159 bool *read_error) {
161 if (read_error)
162 *read_error = false;
163
164 if (process->ReadMemory(addr, &header, sizeof(header), error) !=
165 sizeof(header) ||
166 error.Fail()) {
167 if (read_error)
168 *read_error = true;
169 return false;
170 }
171
172 if (!header.checkMagic())
173 return false;
174
175 return true;
176}
177
178// Check the correctness of Kernel and return UUID
180 Process *process, lldb::addr_t addr, bool *read_error) {
182
183 if (addr == LLDB_INVALID_ADDRESS) {
184 if (read_error)
185 *read_error = true;
186 return UUID();
187 }
188
189 LLDB_LOGF(log,
190 "DynamicLoaderFreeBSDKernel::CheckForKernelImageAtAddress: "
191 "looking for kernel binary at 0x%" PRIx64,
192 addr);
193
194 llvm::ELF::Elf32_Ehdr header;
195 if (!ReadELFHeader(process, addr, header)) {
196 *read_error = true;
197 return UUID();
198 }
199
200 // Check header type
201 if (header.e_type != llvm::ELF::ET_EXEC)
202 return UUID();
203
204 llvm::Expected<ModuleSP> memory_module_sp_or_err =
205 process->ReadModuleFromMemory(FileSpec("temp_freebsd_kernel"), addr);
206 if (auto err = memory_module_sp_or_err.takeError()) {
207 LLDB_LOG_ERROR(log, std::move(err),
208 "DynamicLoaderFreeBSDKernel::CheckForKernelImageAtAddress: "
209 "Failed to read module in memory -- {0}");
210 *read_error = true;
211 return UUID();
212 }
213
214 ModuleSP memory_module_sp = *memory_module_sp_or_err;
215 if (!memory_module_sp.get()) {
216 *read_error = true;
217 return UUID();
218 }
219
220 ObjectFile *exe_objfile = memory_module_sp->GetObjectFile();
221 if (exe_objfile == nullptr) {
222 LLDB_LOGF(log,
223 "DynamicLoaderFreeBSDKernel::CheckForKernelImageAtAddress "
224 "found a binary at 0x%" PRIx64
225 " but could not create an object file from memory",
226 addr);
227 return UUID();
228 }
229
230 // In here, I should check is_kernel for memory_module_sp
231 // However, the ReadModuleFromMemory reads wrong section so that this check
232 // will failed
233 ArchSpec kernel_arch(llvm::ELF::convertEMachineToArchName(header.e_machine));
234
235 if (!process->GetTarget().GetArchitecture().IsCompatibleMatch(kernel_arch))
236 process->GetTarget().SetArchitecture(kernel_arch);
237
238 std::string uuid_str;
239 if (memory_module_sp->GetUUID().IsValid()) {
240 uuid_str = "with UUID ";
241 uuid_str += memory_module_sp->GetUUID().GetAsString();
242 } else {
243 uuid_str = "and no LC_UUID found in load commands ";
244 }
245 LLDB_LOGF(log,
246 "DynamicLoaderFreeBSDKernel::CheckForKernelImageAtAddress: "
247 "kernel binary image found at 0x%" PRIx64 " with arch '%s' %s",
248 addr, kernel_arch.GetTriple().str().c_str(), uuid_str.c_str());
249
250 return memory_module_sp->GetUUID();
251}
252
255
257 addr_t kernel_address)
258 : DynamicLoader(process), m_process(process),
259 m_kernel_load_address(kernel_address), m_mutex() {
260 process->SetCanRunCode(false);
261}
262
264
269
270// Create in memory Module at the load address
272 lldb_private::Process *process) {
275 return true;
277 return false;
278
279 FileSpec file_spec(m_name);
280
281 ModuleSP memory_module_sp;
282
283 llvm::ELF::Elf32_Ehdr elf_eheader;
284 size_t size_to_read = 512;
285
286 if (ReadELFHeader(process, m_load_address, elf_eheader)) {
287 if (elf_eheader.e_ident[llvm::ELF::EI_CLASS] == llvm::ELF::ELFCLASS32) {
288 size_to_read = sizeof(llvm::ELF::Elf32_Ehdr) +
289 elf_eheader.e_phnum * elf_eheader.e_phentsize;
290 } else if (elf_eheader.e_ident[llvm::ELF::EI_CLASS] ==
291 llvm::ELF::ELFCLASS64) {
292 llvm::ELF::Elf64_Ehdr elf_eheader;
294 if (process->ReadMemory(m_load_address, &elf_eheader, sizeof(elf_eheader),
295 error) == sizeof(elf_eheader) &&
296 error.Success())
297 size_to_read = sizeof(llvm::ELF::Elf64_Ehdr) +
298 elf_eheader.e_phnum * elf_eheader.e_phentsize;
299 }
300 }
301
302 llvm::Expected<ModuleSP> memory_module_sp_or_err =
303 process->ReadModuleFromMemory(file_spec, m_load_address, size_to_read);
304 if (auto err = memory_module_sp_or_err.takeError()) {
305 LLDB_LOG_ERROR(log, std::move(err),
306 "KextImageInfo::ReadMemoryModule: Failed to read module "
307 "from memory -- {0}");
308 return false;
309 }
310 memory_module_sp = *memory_module_sp_or_err;
311
312 if (!memory_module_sp)
313 return false;
314
315 bool this_is_kernel = is_kernel(memory_module_sp.get());
316
317 if (!m_uuid.IsValid() && memory_module_sp->GetUUID().IsValid())
318 m_uuid = memory_module_sp->GetUUID();
319
320 m_memory_module_sp = memory_module_sp;
321 m_is_kernel = this_is_kernel;
322
323 // The kernel binary is from memory
324 if (this_is_kernel) {
325 LLDB_LOGF(log, "KextImageInfo::ReadMemoryModule read the kernel binary out "
326 "of memory");
327
328 if (memory_module_sp->GetArchitecture().IsValid())
329 process->GetTarget().SetArchitecture(memory_module_sp->GetArchitecture());
330 }
331
332 return true;
333}
334
336 lldb_private::Process *process) {
338
339 if (IsLoaded())
340 return true;
341
342 Target &target = process->GetTarget();
343
344 if (IsKernel() && m_uuid.IsValid()) {
346 s->Printf("Kernel UUID: %s\n", m_uuid.GetAsString().c_str());
347 s->Printf("Load Address: 0x%" PRIx64 "\n", m_load_address);
348 }
349
350 // Test if the module is loaded into the taget,
351 // maybe the module is loaded manually by user by doing target module add
352 // So that we have to create the module manually
353 if (!m_module_sp) {
354 const ModuleList &target_images = target.GetImages();
355 m_module_sp = target_images.FindModule(m_uuid);
356
357 // Search in the file system
358 if (!m_module_sp) {
359 ModuleSpec module_spec(FileSpec(GetPath()), target.GetArchitecture());
360 if (IsKernel()) {
363 true) &&
364 error.Success()) {
365 if (FileSystem::Instance().Exists(module_spec.GetFileSpec()))
366 m_module_sp = std::make_shared<Module>(module_spec.GetFileSpec(),
367 target.GetArchitecture());
368 }
369 }
370
371 if (!m_module_sp)
372 m_module_sp = target.GetOrCreateModule(module_spec, true);
373 if (IsKernel() && !m_module_sp) {
374 target.GetDebugger().GetAsyncOutputStream()->Printf(
375 "WARNING: Unable to locate kernel binary on the debugger "
376 "system.\n");
377 }
378 }
379
380 if (m_module_sp) {
381 // If the file is not kernel or kmod, the target should be loaded once and
382 // don't reload again
383 if (!IsKernel() && !is_kmod(m_module_sp.get())) {
384 ModuleSP existing_module_sp = target.GetImages().FindModule(m_uuid);
385 if (existing_module_sp &&
386 existing_module_sp->IsLoadedInTarget(&target)) {
387 LLDB_LOGF(log,
388 "'%s' with UUID %s is not a kmod or kernel, and is "
389 "already registered in target, not loading.",
390 m_name.c_str(), m_uuid.GetAsString().c_str());
391 return true;
392 }
393 }
394 m_uuid = m_module_sp->GetUUID();
395
396 // or append to the images
397 target.GetImages().AppendIfNeeded(m_module_sp, false);
398 }
399 }
400
401 // If this file is relocatable kernel module(x86_64), adjust it's
402 // section(PT_LOAD segment) and return Because the kernel module's load
403 // address is the text section. lldb cannot create full memory module upon
404 // relocatable file So what we do is to set the load address only.
405 if (is_kmod(m_module_sp.get()) && is_reloc(m_module_sp.get())) {
406 m_stop_id = process->GetStopID();
407 bool changed = false;
408 m_module_sp->SetLoadAddress(target, m_load_address, true, changed);
409 return true;
410 }
411
412 if (m_module_sp)
413 ReadMemoryModule(process);
414
415 // Calculate the slides of in memory module
417 m_module_sp.reset();
418 return false;
419 }
420
421 ObjectFile *ondisk_object_file = m_module_sp->GetObjectFile();
422 ObjectFile *memory_object_file = m_memory_module_sp->GetObjectFile();
423
424 if (!ondisk_object_file || !memory_object_file)
425 m_module_sp.reset();
426
427 // Find the slide address
428 addr_t fixed_slide = LLDB_INVALID_ADDRESS;
429 if (llvm::dyn_cast<ObjectFileELF>(memory_object_file)) {
430 addr_t load_address = memory_object_file->GetBaseAddress().GetFileAddress();
431
432 if (load_address != LLDB_INVALID_ADDRESS &&
433 m_load_address != load_address) {
434 fixed_slide = m_load_address - load_address;
435 LLDB_LOGF(log,
436 "kmod %s in-memory LOAD vmaddr is not correct, using a "
437 "fixed slide of 0x%" PRIx64,
438 m_name.c_str(), fixed_slide);
439 }
440 }
441
442 SectionList *ondisk_section_list = ondisk_object_file->GetSectionList();
443 SectionList *memory_section_list = memory_object_file->GetSectionList();
444
445 if (memory_section_list && ondisk_object_file) {
446 const uint32_t num_ondisk_sections = ondisk_section_list->GetSize();
447 uint32_t num_load_sections = 0;
448
449 for (uint32_t section_idx = 0; section_idx < num_ondisk_sections;
450 ++section_idx) {
451 SectionSP on_disk_section_sp =
452 ondisk_section_list->GetSectionAtIndex(section_idx);
453
454 if (!on_disk_section_sp)
455 continue;
456 if (fixed_slide != LLDB_INVALID_ADDRESS) {
457 target.SetSectionLoadAddress(on_disk_section_sp,
458 on_disk_section_sp->GetFileAddress() +
459 fixed_slide);
460
461 } else {
462 const Section *memory_section =
463 memory_section_list
464 ->FindSectionByName(on_disk_section_sp->GetName())
465 .get();
466 if (memory_section) {
467 target.SetSectionLoadAddress(on_disk_section_sp,
468 memory_section->GetFileAddress());
469 ++num_load_sections;
470 }
471 }
472 }
473
474 if (num_load_sections)
475 m_stop_id = process->GetStopID();
476 else
477 m_module_sp.reset();
478 } else {
479 m_module_sp.reset();
480 }
481
482 if (IsLoaded() && m_module_sp && IsKernel()) {
484 ObjectFile *kernel_object_file = m_module_sp->GetObjectFile();
485 if (kernel_object_file) {
486 addr_t file_address =
487 kernel_object_file->GetBaseAddress().GetFileAddress();
489 file_address != LLDB_INVALID_ADDRESS) {
490 s->Printf("Kernel slide 0x%" PRIx64 " in memory.\n",
491 m_load_address - file_address);
492 s->Printf("Loaded kernel file %s\n",
493 m_module_sp->GetFileSpec().GetPath().c_str());
494 }
495 }
496 }
497
498 return IsLoaded();
499}
500
501// This function is work for kernel file, others it wil reset load address and
502// return false
504 lldb_private::Process *process) {
505 if (IsLoaded())
506 return true;
507
508 if (m_module_sp) {
509 bool changed = false;
510 if (m_module_sp->SetLoadAddress(process->GetTarget(), 0, true, changed))
511 m_stop_id = process->GetStopID();
512 }
513
514 return false;
515}
516
517// Get the head of found_list
519 std::lock_guard<decltype(m_mutex)> guard(m_mutex);
520
521 if (m_linker_file_list_struct_addr.IsValid()) {
522 // Get tqh_first struct element from linker_files
524 addr_t address = m_process->ReadPointerFromMemory(
525 m_linker_file_list_struct_addr.GetLoadAddress(&m_process->GetTarget()),
526 error);
527 if (address != LLDB_INVALID_ADDRESS && error.Success()) {
529 } else {
531 return false;
532 }
533
534 if (!m_linker_file_head_addr.IsValid() ||
535 m_linker_file_head_addr.GetFileAddress() == 0) {
537 return false;
538 }
539 }
540 return true;
541}
542
543// Parse Kmod info in found_list
545 std::lock_guard<decltype(m_mutex)> guard(m_mutex);
546 KModImageInfo::collection_type linker_files_list;
548
549 if (!ReadAllKmods(linker_files_head_addr, linker_files_list))
550 return false;
551 LLDB_LOGF(
552 log,
553 "Kmod-changed breakpoint hit, there are %zu kernel modules currently.\n",
554 linker_files_list.size());
555
556 ModuleList &modules = m_process->GetTarget().GetImages();
557 ModuleList remove_modules;
558 ModuleList add_modules;
559
560 for (ModuleSP module : modules.Modules()) {
561 if (is_kernel(module.get()))
562 continue;
563 if (is_kmod(module.get()))
564 remove_modules.AppendIfNeeded(module);
565 }
566
567 m_process->GetTarget().ModulesDidUnload(remove_modules, false);
568
569 for (KModImageInfo &image_info : linker_files_list) {
570 auto it = m_kld_name_to_uuid.find(image_info.GetName());
571 if (it != m_kld_name_to_uuid.end())
572 image_info.SetUUID(it->second);
573 bool failed_to_load = false;
574 if (!image_info.LoadImageUsingMemoryModule(m_process)) {
575 image_info.LoadImageUsingFileAddress(m_process);
576 failed_to_load = true;
577 } else {
578 m_linker_files_list.push_back(image_info);
579 m_kld_name_to_uuid[image_info.GetName()] = image_info.GetUUID();
580 }
581
582 if (!failed_to_load)
583 add_modules.AppendIfNeeded(image_info.GetModule());
584 }
585 m_process->GetTarget().ModulesDidLoad(add_modules);
586 return true;
587}
588
589// Read all kmod from a given arrays of list
591 Address linker_files_head_addr,
592 KModImageInfo::collection_type &kmods_list) {
593
594 // Get offset of next member and load address symbol
595 static ConstString kld_off_address_symbol_name("kld_off_address");
596 static ConstString kld_off_next_symbol_name("kld_off_next");
597 static ConstString kld_off_filename_symbol_name("kld_off_filename");
598 static ConstString kld_off_pathname_symbol_name("kld_off_pathname");
599 const Symbol *kld_off_address_symbol =
600 m_kernel_image_info.GetModule()->FindFirstSymbolWithNameAndType(
601 kld_off_address_symbol_name, eSymbolTypeData);
602 const Symbol *kld_off_next_symbol =
603 m_kernel_image_info.GetModule()->FindFirstSymbolWithNameAndType(
604 kld_off_next_symbol_name, eSymbolTypeData);
605 const Symbol *kld_off_filename_symbol =
606 m_kernel_image_info.GetModule()->FindFirstSymbolWithNameAndType(
607 kld_off_filename_symbol_name, eSymbolTypeData);
608 const Symbol *kld_off_pathname_symbol =
609 m_kernel_image_info.GetModule()->FindFirstSymbolWithNameAndType(
610 kld_off_pathname_symbol_name, eSymbolTypeData);
611
612 if (!kld_off_address_symbol || !kld_off_next_symbol ||
613 !kld_off_filename_symbol || !kld_off_pathname_symbol)
614 return false;
615
617 const int32_t kld_off_address = m_process->ReadSignedIntegerFromMemory(
618 kld_off_address_symbol->GetAddress().GetLoadAddress(
619 &m_process->GetTarget()),
620 4, 0, error);
621 if (error.Fail())
622 return false;
623 const int32_t kld_off_next = m_process->ReadSignedIntegerFromMemory(
624 kld_off_next_symbol->GetAddress().GetLoadAddress(&m_process->GetTarget()),
625 4, 0, error);
626 if (error.Fail())
627 return false;
628 const int32_t kld_off_filename = m_process->ReadSignedIntegerFromMemory(
629 kld_off_filename_symbol->GetAddress().GetLoadAddress(
630 &m_process->GetTarget()),
631 4, 0, error);
632 if (error.Fail())
633 return false;
634
635 const int32_t kld_off_pathname = m_process->ReadSignedIntegerFromMemory(
636 kld_off_pathname_symbol->GetAddress().GetLoadAddress(
637 &m_process->GetTarget()),
638 4, 0, error);
639 if (error.Fail())
640 return false;
641
642 // Parse KMods
643 addr_t kld_load_addr(LLDB_INVALID_ADDRESS);
644 char kld_filename[255];
645 char kld_pathname[255];
646 addr_t current_kld =
647 linker_files_head_addr.GetLoadAddress(&m_process->GetTarget());
648
649 while (current_kld != 0) {
650 addr_t kld_filename_addr =
651 m_process->ReadPointerFromMemory(current_kld + kld_off_filename, error);
652 if (error.Fail())
653 return false;
654 addr_t kld_pathname_addr =
655 m_process->ReadPointerFromMemory(current_kld + kld_off_pathname, error);
656 if (error.Fail())
657 return false;
658
659 m_process->ReadCStringFromMemory(kld_filename_addr, kld_filename,
660 sizeof(kld_filename), error);
661 if (error.Fail())
662 return false;
663 m_process->ReadCStringFromMemory(kld_pathname_addr, kld_pathname,
664 sizeof(kld_pathname), error);
665 if (error.Fail())
666 return false;
667 kld_load_addr =
668 m_process->ReadPointerFromMemory(current_kld + kld_off_address, error);
669 if (error.Fail())
670 return false;
671
672 kmods_list.emplace_back();
673 KModImageInfo &kmod_info = kmods_list.back();
674 kmod_info.SetName(kld_filename);
675 kmod_info.SetLoadAddress(kld_load_addr);
676 kmod_info.SetPath(kld_pathname);
677
678 current_kld =
679 m_process->ReadPointerFromMemory(current_kld + kld_off_next, error);
680 if (kmod_info.GetName() == "kernel")
681 kmods_list.pop_back();
682 if (error.Fail())
683 return false;
684 }
685
686 return true;
687}
688
689// Read all kmods
691 std::lock_guard<decltype(m_mutex)> guard(m_mutex);
692
693 if (ReadKmodsListHeader()) {
694 if (m_linker_file_head_addr.IsValid()) {
696 m_linker_files_list.clear();
697 }
698 }
699}
700
701// Load all Kernel Modules
704 LLDB_LOGF(log, "DynamicLoaderFreeBSDKernel::LoadKernelModules "
705 "Start loading Kernel Module");
706
707 // Initialize Kernel Image Information at the first time
708 if (m_kernel_image_info.GetLoadAddress() == LLDB_INVALID_ADDRESS) {
709 ModuleSP module_sp = m_process->GetTarget().GetExecutableModule();
710 if (is_kernel(module_sp.get())) {
711 m_kernel_image_info.SetModule(module_sp);
712 m_kernel_image_info.SetIsKernel(true);
713 }
714
715 // Set name for kernel
716 llvm::StringRef kernel_name("freebsd_kernel");
717 module_sp = m_kernel_image_info.GetModule();
718 if (module_sp.get() && module_sp->GetObjectFile() &&
719 !module_sp->GetObjectFile()->GetFileSpec().GetFilename().IsEmpty())
720 kernel_name = module_sp->GetObjectFile()
721 ->GetFileSpec()
722 .GetFilename()
723 .GetStringRef();
724 m_kernel_image_info.SetName(kernel_name.data());
725
726 if (m_kernel_image_info.GetLoadAddress() == LLDB_INVALID_ADDRESS) {
728 }
729
730 // Build In memory Module
731 if (m_kernel_image_info.GetLoadAddress() != LLDB_INVALID_ADDRESS) {
732 // If the kernel is not loaded in the memory, use file to load
733 if (!m_kernel_image_info.LoadImageUsingMemoryModule(m_process))
734 m_kernel_image_info.LoadImageUsingFileAddress(m_process);
735 }
736 }
737
739
740 if (!m_kernel_image_info.IsLoaded() || !m_kernel_image_info.GetModule()) {
741 m_kernel_image_info.Clear();
742 return;
743 }
744
745 static ConstString modlist_symbol_name("linker_files");
746
747 const Symbol *symbol =
748 m_kernel_image_info.GetModule()->FindFirstSymbolWithNameAndType(
749 modlist_symbol_name, lldb::eSymbolTypeData);
750
751 if (symbol) {
753 ReadAllKmods();
754 } else {
755 LLDB_LOGF(log, "DynamicLoaderFreeBSDKernel::LoadKernelModules "
756 "cannot file modlist symbol");
757 }
758}
759
760// Update symbol when use kldload by setting callback function on kldload
762
763// Hook called when attach to a process
768
769// Hook called after attach to a process
774
775// Clear all member except kernel address
776void DynamicLoaderFreeBSDKernel::Clear(bool clear_process) {
777 std::lock_guard<decltype(m_mutex)> guard(m_mutex);
778 if (clear_process)
779 m_process = nullptr;
782 m_kernel_image_info.Clear();
783 m_linker_files_list.clear();
784}
785
786// Reinitialize class
788 Clear(true);
789 m_process = process;
790}
791
793 lldb_private::Thread &thread, bool stop_others) {
794 Log *log = GetLog(LLDBLog::Step);
795 LLDB_LOGF(log, "DynamicLoaderFreeBSDKernel::GetStepThroughTrampolinePlan is "
796 "not yet implemented.");
797 return {};
798}
799
801 return Status::FromErrorString("shared object cannot be loaded into kernel");
802}
static llvm::raw_ostream & error(Stream &strm)
static bool is_kernel(Module *module)
static bool is_reloc(Module *module)
static bool is_kernel(Module *module)
static bool is_kmod(Module *module)
#define LLDB_LOGF(log,...)
Definition Log.h:383
#define LLDB_LOG_ERROR(log, error,...)
Definition Log.h:399
#define LLDB_PLUGIN_DEFINE(PluginName)
bool LoadImageUsingFileAddress(lldb_private::Process *process)
bool ReadMemoryModule(lldb_private::Process *process)
bool LoadImageUsingMemoryModule(lldb_private::Process *process)
void DidAttach() override
Called after attaching a process.
DynamicLoaderFreeBSDKernel(lldb_private::Process *process, lldb::addr_t kernel_addr)
KModImageInfo::collection_type m_linker_files_list
static llvm::StringRef GetPluginNameStatic()
lldb_private::Address m_linker_file_list_struct_addr
void PrivateInitialize(lldb_private::Process *process)
lldb_private::Address m_linker_file_head_addr
lldb::ThreadPlanSP GetStepThroughTrampolinePlan(lldb_private::Thread &thread, bool stop_others) override
Provides a plan to step through the dynamic loader trampoline for the current state of thread.
bool ParseKmods(lldb_private::Address linker_files_head_address)
static void DebuggerInit(lldb_private::Debugger &debugger)
static lldb::addr_t FindFreeBSDKernel(lldb_private::Process *process)
lldb_private::Status CanLoadImage() override
Ask if it is ok to try and load or unload an shared library (image).
std::unordered_map< std::string, lldb_private::UUID > m_kld_name_to_uuid
void DidLaunch() override
Called after launching a process.
static lldb::addr_t FindKernelAtLoadAddress(lldb_private::Process *process)
static llvm::StringRef GetPluginDescriptionStatic()
static lldb_private::UUID CheckForKernelImageAtAddress(lldb_private::Process *process, lldb::addr_t address, bool *read_error=nullptr)
static lldb_private::DynamicLoader * CreateInstance(lldb_private::Process *process, bool force)
static bool ReadELFHeader(lldb_private::Process *process, lldb::addr_t address, llvm::ELF::Elf32_Ehdr &header, bool *read_error=nullptr)
A section + offset based address class.
Definition Address.h:62
lldb::addr_t GetLoadAddress(Target *target) const
Get the load address.
Definition Address.cpp:301
lldb::addr_t GetFileAddress() const
Get the file address.
Definition Address.cpp:281
bool IsValid() const
Check if the object state is valid.
Definition Address.h:355
An architecture specification class.
Definition ArchSpec.h:32
llvm::Triple & GetTriple()
Architecture triple accessor.
Definition ArchSpec.h:457
bool IsCompatibleMatch(const ArchSpec &rhs) const
Shorthand for IsMatch(rhs, CompatibleMatch).
Definition ArchSpec.h:509
A uniqued constant string class.
Definition ConstString.h:40
A class to manage flag bits.
Definition Debugger.h:101
lldb::StreamUP GetAsyncOutputStream()
A plug-in interface definition class for dynamic loaders.
void LoadOperatingSystemPlugin(bool flush)
DynamicLoader(Process *process)
Construct with a process.
A file utility class.
Definition FileSpec.h:57
static FileSystem & Instance()
A collection class for Module objects.
Definition ModuleList.h:125
bool AppendIfNeeded(const lldb::ModuleSP &new_module, bool notify=true)
Append a module to the module list, if it is not already there.
lldb::ModuleSP FindModule(const Module *module_ptr) const
ModuleIterable Modules() const
Definition ModuleList.h:565
FileSpec & GetFileSpec()
Definition ModuleSpec.h:57
A class that describes an executable image and its associated object and symbol files.
Definition Module.h:90
virtual ObjectFile * GetObjectFile()
Get the object file representation for the current architecture.
Definition Module.cpp:1184
A plug-in interface definition class for object file parsers.
Definition ObjectFile.h:46
@ eTypeExecutable
A normal executable.
Definition ObjectFile.h:55
@ eTypeObjectFile
An intermediate object file.
Definition ObjectFile.h:61
@ eTypeSharedLibrary
A shared library that can be used during execution.
Definition ObjectFile.h:63
virtual SectionList * GetSectionList(bool update_module_section_list=true)
Gets the section list for the currently selected architecture (and object for archives).
virtual lldb_private::Address GetBaseAddress()
Returns base address of this object file.
Definition ObjectFile.h:462
static bool DownloadObjectAndSymbolFile(ModuleSpec &module_spec, Status &error, bool force_lookup=true, bool copy_executable=true)
static bool RegisterPlugin(llvm::StringRef name, llvm::StringRef description, ABICreateInstance create_callback)
static bool UnregisterPlugin(ABICreateInstance create_callback)
A plug-in interface definition class for debugging a process.
Definition Process.h:354
virtual size_t ReadMemory(lldb::addr_t vm_addr, void *buf, size_t size, Status &error)
Read of memory from a process.
Definition Process.cpp:1902
llvm::Expected< lldb::ModuleSP > ReadModuleFromMemory(const FileSpec &file_spec, lldb::addr_t header_addr, size_t size_to_read=512)
Creates and populates a module using an in-memory object file.
Definition Process.cpp:2594
virtual lldb::addr_t GetImageInfoAddress()
Get the image information address for the current process.
Definition Process.cpp:1450
void SetCanRunCode(bool can_run_code)
Sets whether executing code in this process is possible.
Definition Process.cpp:2561
uint32_t GetStopID() const
Definition Process.h:1455
Target & GetTarget()
Get the target object pointer for this module.
Definition Process.h:1250
lldb::SectionSP FindSectionByName(ConstString section_dstr) const
Definition Section.cpp:559
size_t GetSize() const
Definition Section.h:77
lldb::SectionSP GetSectionAtIndex(size_t idx) const
Definition Section.cpp:552
lldb::addr_t GetFileAddress() const
Definition Section.cpp:194
An error handling class.
Definition Status.h:118
static Status FromErrorString(const char *str)
Definition Status.h:141
Address GetAddress() const
Definition Symbol.h:89
Module * GetExecutableModulePointer()
Definition Target.cpp:1541
Debugger & GetDebugger() const
Definition Target.h:1223
lldb::ModuleSP GetOrCreateModule(const ModuleSpec &module_spec, bool notify, Status *error_ptr=nullptr)
Find a binary on the system and return its Module, or return an existing Module that is already in th...
Definition Target.cpp:2347
bool SetArchitecture(const ArchSpec &arch_spec, bool set_platform=false, bool merge=true)
Set the architecture for this target.
Definition Target.cpp:1700
const ModuleList & GetImages() const
Get accessor for the images for this process.
Definition Target.h:1140
const ArchSpec & GetArchitecture() const
Definition Target.h:1182
bool SetSectionLoadAddress(const lldb::SectionSP &section, lldb::addr_t load_addr, bool warn_multiple=false)
Definition Target.cpp:3339
Represents UUID's of various sizes.
Definition UUID.h:27
bool IsValid() const
Definition UUID.h:69
#define LLDB_INVALID_ADDRESS
A class that represents a running process on the host machine.
Log * GetLog(Cat mask)
Retrieve the Log object for the channel associated with the given log enum.
Definition Log.h:332
std::shared_ptr< lldb_private::ThreadPlan > ThreadPlanSP
std::shared_ptr< lldb_private::Section > SectionSP
uint64_t addr_t
Definition lldb-types.h:80
std::unique_ptr< lldb_private::Stream > StreamUP
std::shared_ptr< lldb_private::Module > ModuleSP