LLDB mainline
DynamicLoaderMacOS.cpp
Go to the documentation of this file.
1//===-- DynamicLoaderMacOS.cpp --------------------------------------------===//
2//
3// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4// See https://llvm.org/LICENSE.txt for license information.
5// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6//
7//===----------------------------------------------------------------------===//
8
10#include "lldb/Core/Debugger.h"
11#include "lldb/Core/Module.h"
13#include "lldb/Core/Section.h"
16#include "lldb/Target/ABI.h"
19#include "lldb/Target/Target.h"
20#include "lldb/Target/Thread.h"
22#include "lldb/Utility/Log.h"
23#include "lldb/Utility/State.h"
24
25#include "DynamicLoaderDarwin.h"
26#include "DynamicLoaderMacOS.h"
27
29
30using namespace lldb;
31using namespace lldb_private;
32
33// Create an instance of this class. This function is filled into the plugin
34// info class that gets handed out by the plugin factory and allows the lldb to
35// instantiate an instance of this class.
37 bool force) {
38 bool create = force;
39 if (!create) {
40 create = true;
41 Module *exe_module = process->GetTarget().GetExecutableModulePointer();
42 if (exe_module) {
43 ObjectFile *object_file = exe_module->GetObjectFile();
44 if (object_file) {
45 create = (object_file->GetStrata() == ObjectFile::eStrataUser);
46 }
47 }
48
49 if (create) {
50 const llvm::Triple &triple_ref =
51 process->GetTarget().GetArchitecture().GetTriple();
52 switch (triple_ref.getOS()) {
53 case llvm::Triple::Darwin:
54 case llvm::Triple::MacOSX:
55 case llvm::Triple::IOS:
56 case llvm::Triple::TvOS:
57 case llvm::Triple::WatchOS:
58 case llvm::Triple::BridgeOS:
59 case llvm::Triple::DriverKit:
60 case llvm::Triple::XROS:
61 create = triple_ref.getVendor() == llvm::Triple::Apple;
62 break;
63 default:
64 create = false;
65 break;
66 }
67 }
68 }
69
70 if (!UseDYLDSPI(process)) {
71 create = false;
72 }
73
74 if (create)
75 return new DynamicLoaderMacOS(process);
76 return nullptr;
77}
78
79// Constructor
86
87// Destructor
94
96 std::lock_guard<std::recursive_mutex> baseclass_guard(GetMutex());
97 bool did_exec = false;
98 if (m_process) {
99 // If we are stopped after an exec, we will have only one thread...
100 if (m_process->GetThreadList().GetSize() == 1) {
101 // Maybe we still have an image infos address around? If so see
102 // if that has changed, and if so we have exec'ed.
104 lldb::addr_t image_infos_address = m_process->GetImageInfoAddress();
105 if (image_infos_address != m_maybe_image_infos_address) {
106 // We don't really have to reset this here, since we are going to
107 // call DoInitialImageFetch right away to handle the exec. But in
108 // case anybody looks at it in the meantime, it can't hurt.
109 m_maybe_image_infos_address = image_infos_address;
110 did_exec = true;
111 }
112 }
113
114 if (!did_exec) {
115 // See if we are stopped at '_dyld_start'
116 ThreadSP thread_sp(m_process->GetThreadList().GetThreadAtIndex(0));
117 if (thread_sp) {
118 lldb::StackFrameSP frame_sp(thread_sp->GetStackFrameAtIndex(0));
119 if (frame_sp) {
120 const Symbol *symbol =
121 frame_sp->GetSymbolContext(eSymbolContextSymbol).symbol;
122 if (symbol) {
123 if (symbol->GetName() == "_dyld_start")
124 did_exec = true;
125 }
126 }
127 }
128 }
129 }
130 }
131
132 if (did_exec) {
136 }
137 return did_exec;
138}
139
140// Clear out the state of this class.
142 std::lock_guard<std::recursive_mutex> guard(m_mutex);
143
145 m_process->GetTarget().RemoveBreakpointByID(m_break_id);
147 m_process->GetTarget().RemoveBreakpointByID(m_dyld_handover_break_id);
148
152}
153
156 return true;
157
158 StructuredData::ObjectSP process_state_sp(
159 m_process->GetDynamicLoaderProcessState());
160 if (!process_state_sp)
161 return true;
162 if (process_state_sp->GetAsDictionary()->HasKey("error"))
163 return true;
164 if (!process_state_sp->GetAsDictionary()->HasKey("process_state string"))
165 return true;
166 std::string proc_state = process_state_sp->GetAsDictionary()
167 ->GetValueForKey("process_state string")
168 ->GetAsString()
169 ->GetValue()
170 .str();
171 if (proc_state == "dyld_process_state_not_started" ||
172 proc_state == "dyld_process_state_dyld_initialized" ||
173 proc_state == "dyld_process_state_terminated_before_inits") {
174 return false;
175 }
177 return true;
178}
179
180// Check if we have found DYLD yet
184
191
192// Try and figure out where dyld is by first asking the Process if it knows
193// (which currently calls down in the lldb::Process to get the DYLD info
194// (available on SnowLeopard only). If that fails, then check in the default
195// addresses.
198
199 // Remove any binaries we pre-loaded in the Target before
200 // launching/attaching. If the same binaries are present in the process,
201 // we'll get them from the shared module cache, we won't need to re-load them
202 // from disk.
204
205 StructuredData::ObjectSP all_image_info_json_sp(
206 m_process->GetLoadedDynamicLibrariesInfos());
207 ImageInfo::collection image_infos;
208 if (all_image_info_json_sp.get() &&
209 all_image_info_json_sp->GetAsDictionary() &&
210 all_image_info_json_sp->GetAsDictionary()->HasKey("images") &&
211 all_image_info_json_sp->GetAsDictionary()
212 ->GetValueForKey("images")
213 ->GetAsArray()) {
214 if (JSONImageInformationIntoImageInfo(all_image_info_json_sp,
215 image_infos)) {
216 LLDB_LOGF(log, "Initial module fetch: Adding %" PRId64 " modules.\n",
217 (uint64_t)image_infos.size());
218
219 auto images = PreloadModulesFromImageInfos(image_infos);
222 }
223 }
224
226 m_maybe_image_infos_address = m_process->GetImageInfoAddress();
227}
228
230
231// Static callback function that gets called when our DYLD notification
232// breakpoint gets hit. We update all of our image infos and then let our super
233// class DynamicLoader class decide if we should stop or not (based on global
234// preference).
237 lldb::user_id_t break_id,
238 lldb::user_id_t break_loc_id) {
239 //
240 // Our breakpoint on
241 //
242 // void lldb_image_notifier(enum dyld_image_mode mode, uint32_t infoCount,
243 // const dyld_image_info info[])
244 //
245 // has been hit. We need to read the arguments.
246
247 DynamicLoaderMacOS *dyld_instance = (DynamicLoaderMacOS *)baton;
248
249 ExecutionContext exe_ctx(context->exe_ctx_ref);
250 Process *process = exe_ctx.GetProcessPtr();
251
252 // This is a sanity check just in case this dyld_instance is an old dyld
253 // plugin's breakpoint still lying around.
254 if (process != dyld_instance->m_process)
255 return false;
256
257 if (dyld_instance->m_image_infos_stop_id != UINT32_MAX &&
258 process->GetStopID() < dyld_instance->m_image_infos_stop_id) {
259 return false;
260 }
261
262 const lldb::ABISP &abi = process->GetABI();
263 if (abi) {
264 // Build up the value array to store the three arguments given above, then
265 // get the values from the ABI:
266
267 TypeSystemClangSP scratch_ts_sp =
269 if (!scratch_ts_sp)
270 return false;
271
272 ValueList argument_values;
273
274 Value mode_value; // enum dyld_notify_mode { dyld_notify_adding=0,
275 // dyld_notify_removing=1, dyld_notify_remove_all=2,
276 // dyld_notify_dyld_moved=3 };
277 Value count_value; // uint32_t
278 Value headers_value; // struct dyld_image_info machHeaders[]
279
280 CompilerType clang_void_ptr_type =
281 scratch_ts_sp->GetBasicType(eBasicTypeVoid).GetPointerType();
282 CompilerType clang_uint32_type =
283 scratch_ts_sp->GetBuiltinTypeForEncodingAndBitSize(lldb::eEncodingUint,
284 32);
285 CompilerType clang_uint64_type =
286 scratch_ts_sp->GetBuiltinTypeForEncodingAndBitSize(lldb::eEncodingUint,
287 32);
288
290 mode_value.SetCompilerType(clang_uint32_type);
291
293 count_value.SetCompilerType(clang_uint32_type);
294
296 headers_value.SetCompilerType(clang_void_ptr_type);
297
298 argument_values.PushValue(mode_value);
299 argument_values.PushValue(count_value);
300 argument_values.PushValue(headers_value);
301
302 if (abi->GetArgumentValues(exe_ctx.GetThreadRef(), argument_values)) {
303 uint32_t dyld_mode =
304 argument_values.GetValueAtIndex(0)->GetScalar().UInt(-1);
305 if (dyld_mode != static_cast<uint32_t>(-1)) {
306 // Okay the mode was right, now get the number of elements, and the
307 // array of new elements...
308 uint32_t image_infos_count =
309 argument_values.GetValueAtIndex(1)->GetScalar().UInt(-1);
310 if (image_infos_count != static_cast<uint32_t>(-1)) {
311 addr_t header_array =
312 argument_values.GetValueAtIndex(2)->GetScalar().ULongLong(-1);
313 if (header_array != static_cast<uint64_t>(-1)) {
314 std::vector<addr_t> image_load_addresses;
315 // header_array points to an array of image_infos_count elements,
316 // each is
317 // struct dyld_image_info {
318 // const struct mach_header* imageLoadAddress;
319 // const char* imageFilePath;
320 // uintptr_t imageFileModDate;
321 // };
322 //
323 // and we only need the imageLoadAddress fields.
324
325 const int addrsize =
327 for (uint64_t i = 0; i < image_infos_count; i++) {
329 addr_t dyld_image_info = header_array + (addrsize * 3 * i);
330 addr_t addr =
331 process->ReadPointerFromMemory(dyld_image_info, error);
332 if (error.Success()) {
333 image_load_addresses.push_back(addr);
334 } else {
336 "DynamicLoaderMacOS::NotifyBreakpointHit unable "
337 "to read binary mach-o load address at 0x%" PRIx64,
338 addr);
339 }
340 }
341 if (dyld_mode == 0) {
342 // dyld_notify_adding
343 if (process->GetTarget().GetImages().GetSize() == 0) {
344 // When all images have been removed, we're doing the
345 // dyld handover from a launch-dyld to a shared-cache-dyld,
346 // and we've just hit our one-shot address breakpoint in
347 // the sc-dyld. Note that the image addresses passed to
348 // this function are inferior sizeof(void*) not uint64_t's
349 // like our normal notification, so don't even look at
350 // image_load_addresses.
351
352 dyld_instance->ClearDYLDHandoverBreakpoint();
353
354 dyld_instance->DoInitialImageFetch();
355 dyld_instance->SetNotificationBreakpoint();
356 } else {
357 dyld_instance->AddBinaries(image_load_addresses);
358 }
359 } else if (dyld_mode == 1) {
360 // dyld_notify_removing
361 dyld_instance->UnloadImages(image_load_addresses);
362 } else if (dyld_mode == 2) {
363 // dyld_notify_remove_all
364 dyld_instance->UnloadAllImages();
365 } else if (dyld_mode == 3 && image_infos_count == 1) {
366 // dyld_image_dyld_moved
367
368 dyld_instance->ClearNotificationBreakpoint();
369 dyld_instance->UnloadAllImages();
370 dyld_instance->ClearDYLDModule();
371 process->GetTarget().GetImages().Clear();
372 process->GetTarget().ClearSectionLoadList();
373
374 addr_t all_image_infos = process->GetImageInfoAddress();
375 int addr_size =
377 addr_t notification_location = all_image_infos + 4 + // version
378 4 + // infoArrayCount
379 addr_size; // infoArray
381 addr_t notification_addr =
382 process->ReadPointerFromMemory(notification_location, error);
383 if (!error.Success()) {
385 "DynamicLoaderMacOS::NotifyBreakpointHit unable "
386 "to read address of dyld-handover notification function at "
387 "0x%" PRIx64,
388 notification_location);
389 } else {
390 notification_addr = process->FixCodeAddress(notification_addr);
391 dyld_instance->SetDYLDHandoverBreakpoint(notification_addr);
392 }
393 }
394 }
395 }
396 }
397 }
398 } else {
399 Target &target = process->GetTarget();
401 "no ABI plugin located for triple " +
402 target.GetArchitecture().GetTriple().getTriple() +
403 ": shared libraries will not be registered",
404 target.GetDebugger().GetID());
405 }
406
407 // Return true to stop the target, false to just let the target run
408 return dyld_instance->GetStopWhenImagesChange();
409}
410
412 const std::vector<lldb::addr_t> &load_addresses) {
414 ImageInfo::collection image_infos;
415
416 LLDB_LOGF(log, "Adding %" PRId64 " modules.",
417 (uint64_t)load_addresses.size());
418 StructuredData::ObjectSP binaries_info_sp =
419 m_process->GetLoadedDynamicLibrariesInfos(load_addresses);
420 if (binaries_info_sp.get() && binaries_info_sp->GetAsDictionary() &&
421 binaries_info_sp->GetAsDictionary()->HasKey("images") &&
422 binaries_info_sp->GetAsDictionary()
423 ->GetValueForKey("images")
424 ->GetAsArray() &&
425 binaries_info_sp->GetAsDictionary()
426 ->GetValueForKey("images")
427 ->GetAsArray()
428 ->GetSize() == load_addresses.size()) {
429 if (JSONImageInformationIntoImageInfo(binaries_info_sp, image_infos)) {
430 auto images = PreloadModulesFromImageInfos(image_infos);
433 }
435 }
436}
437
438// Dump the _dyld_all_image_infos members and all current image infos that we
439// have parsed to the file handle provided.
441 if (log == nullptr)
442 return;
443}
444
445// Look in dyld's dyld_all_image_infos structure for the address
446// of the notification function.
447// We can find the address of dyld_all_image_infos by a system
448// call, even if we don't have a dyld binary registered in lldb's
449// image list.
450// At process launch time - before dyld has executed any instructions -
451// the address of the notification function is not a resolved vm address
452// yet. dyld_all_image_infos also has a field with its own address
453// in it, and this will also be unresolved when we're at this state.
454// So we can compare the address of the object with this field and if
455// they differ, dyld hasn't started executing yet and we can't get the
456// notification address this way.
458 addr_t notification_addr = LLDB_INVALID_ADDRESS;
459 if (!m_process)
460 return notification_addr;
461
462 addr_t all_image_infos_addr = m_process->GetImageInfoAddress();
463 if (all_image_infos_addr == LLDB_INVALID_ADDRESS)
464 return notification_addr;
465
466 const uint32_t addr_size =
467 m_process->GetTarget().GetArchitecture().GetAddressByteSize();
468 offset_t registered_infos_addr_offset =
469 sizeof(uint32_t) + // version
470 sizeof(uint32_t) + // infoArrayCount
471 addr_size + // infoArray
472 addr_size + // notification
473 addr_size + // processDetachedFromSharedRegion +
474 // libSystemInitialized + pad
475 addr_size + // dyldImageLoadAddress
476 addr_size + // jitInfo
477 addr_size + // dyldVersion
478 addr_size + // errorMessage
479 addr_size + // terminationFlags
480 addr_size + // coreSymbolicationShmPage
481 addr_size + // systemOrderFlag
482 addr_size + // uuidArrayCount
483 addr_size; // uuidArray
484 // dyldAllImageInfosAddress
485
486 // If the dyldAllImageInfosAddress does not match
487 // the actual address of this struct, dyld has not started
488 // executing yet. The 'notification' field can't be used by
489 // lldb until it's resolved to an actual address.
491 addr_t registered_infos_addr = m_process->ReadPointerFromMemory(
492 all_image_infos_addr + registered_infos_addr_offset, error);
493 if (!error.Success())
494 return notification_addr;
495 if (registered_infos_addr != all_image_infos_addr)
496 return notification_addr;
497
498 offset_t notification_fptr_offset = sizeof(uint32_t) + // version
499 sizeof(uint32_t) + // infoArrayCount
500 addr_size; // infoArray
501
502 addr_t notification_fptr = m_process->ReadPointerFromMemory(
503 all_image_infos_addr + notification_fptr_offset, error);
504 if (error.Success())
505 notification_addr = m_process->FixCodeAddress(notification_fptr);
506 return notification_addr;
507}
508
509// We want to put a breakpoint on dyld's lldb_image_notifier()
510// but we may have attached to the process during the
511// transition from on-disk-dyld to shared-cache-dyld, so there's
512// officially no dyld binary loaded in the process (libdyld will
513// report none when asked), but the kernel can find the dyld_all_image_infos
514// struct and the function pointer for lldb_image_notifier is in
515// that struct.
517
518 // First try to find the notification breakpoint function by name
520 ModuleSP dyld_sp(GetDYLDModule());
521 if (dyld_sp) {
522 bool internal = true;
523 bool hardware = false;
524 LazyBool skip_prologue = eLazyBoolNo;
525 FileSpecList *source_files = nullptr;
526 FileSpecList dyld_filelist;
527 dyld_filelist.Append(dyld_sp->GetFileSpec());
528
529 Breakpoint *breakpoint =
530 m_process->GetTarget()
531 .CreateBreakpoint(&dyld_filelist, source_files,
532 "lldb_image_notifier", eFunctionNameTypeFull,
533 eLanguageTypeUnknown, 0, false, skip_prologue,
534 internal, hardware)
535 .get();
537 true);
538 breakpoint->SetBreakpointKind("shared-library-event");
539 if (breakpoint->HasResolvedLocations())
540 m_break_id = breakpoint->GetID();
541 else
542 m_process->GetTarget().RemoveBreakpointByID(breakpoint->GetID());
543
545 Breakpoint *breakpoint =
546 m_process->GetTarget()
547 .CreateBreakpoint(&dyld_filelist, source_files,
548 "gdb_image_notifier", eFunctionNameTypeFull,
550 /*offset_is_insn_count = */ false,
551 skip_prologue, internal, hardware)
552 .get();
554 true);
555 breakpoint->SetBreakpointKind("shared-library-event");
556 if (breakpoint->HasResolvedLocations())
557 m_break_id = breakpoint->GetID();
558 else
559 m_process->GetTarget().RemoveBreakpointByID(breakpoint->GetID());
560 }
561 }
562 }
563
564 // Failing that, find dyld_all_image_infos struct in memory,
565 // read the notification function pointer at the offset.
567 addr_t notification_addr = GetNotificationFuncAddrFromImageInfos();
568 if (notification_addr != LLDB_INVALID_ADDRESS) {
569 Address so_addr;
570 // We may not have a dyld binary mapped to this address yet;
571 // don't try to express the Address object as section+offset,
572 // only as a raw load address.
573 so_addr.SetRawAddress(notification_addr);
574 Breakpoint *dyld_break =
575 m_process->GetTarget().CreateBreakpoint(so_addr, true, false).get();
577 true);
578 dyld_break->SetBreakpointKind("shared-library-event");
579 if (dyld_break->HasResolvedLocations())
580 m_break_id = dyld_break->GetID();
581 else
582 m_process->GetTarget().RemoveBreakpointByID(dyld_break->GetID());
583 }
584 }
586}
587
589 addr_t notification_address) {
591 BreakpointSP dyld_handover_bp = m_process->GetTarget().CreateBreakpoint(
592 notification_address, true, false);
593 dyld_handover_bp->SetCallback(DynamicLoaderMacOS::NotifyBreakpointHit, this,
594 true);
595 dyld_handover_bp->SetOneShot(true);
596 m_dyld_handover_break_id = dyld_handover_bp->GetID();
597 return true;
598 }
599 return false;
600}
601
607
608addr_t
610 SymbolContext sc;
611 Target &target = m_process->GetTarget();
612 if (Symtab *symtab = module->GetSymtab()) {
613 std::vector<uint32_t> match_indexes;
614 ConstString g_symbol_name("_dyld_global_lock_held");
615 uint32_t num_matches = 0;
616 num_matches =
617 symtab->AppendSymbolIndexesWithName(g_symbol_name, match_indexes);
618 if (num_matches == 1) {
619 Symbol *symbol = symtab->SymbolAtIndex(match_indexes[0]);
620 if (symbol &&
621 (symbol->ValueIsAddress() || symbol->GetAddressRef().IsValid())) {
622 return symbol->GetAddressRef().GetOpcodeLoadAddress(&target);
623 }
624 }
625 }
627}
628
629// Look for this symbol:
630//
631// int __attribute__((visibility("hidden"))) _dyld_global_lock_held =
632// 0;
633//
634// in libdyld.dylib.
637 addr_t symbol_address = LLDB_INVALID_ADDRESS;
638 ConstString g_libdyld_name("libdyld.dylib");
639 Target &target = m_process->GetTarget();
640 const ModuleList &target_modules = target.GetImages();
641 std::lock_guard<std::recursive_mutex> guard(target_modules.GetMutex());
642
643 // Find any modules named "libdyld.dylib" and look for the symbol there first
644 for (ModuleSP module_sp : target.GetImages().ModulesNoLocking()) {
645 if (module_sp) {
646 if (module_sp->GetFileSpec().GetFilename() == g_libdyld_name) {
647 symbol_address = GetDyldLockVariableAddressFromModule(module_sp.get());
648 if (symbol_address != LLDB_INVALID_ADDRESS)
649 break;
650 }
651 }
652 }
653
654 // Search through all modules looking for the symbol in them
655 if (symbol_address == LLDB_INVALID_ADDRESS) {
656 for (ModuleSP module_sp : target.GetImages().Modules()) {
657 if (module_sp) {
658 addr_t symbol_address =
660 if (symbol_address != LLDB_INVALID_ADDRESS)
661 break;
662 }
663 }
664 }
665
666 // Default assumption is that it is OK to load images. Only say that we
667 // cannot load images if we find the symbol in libdyld and it indicates that
668 // we cannot.
669
670 if (symbol_address != LLDB_INVALID_ADDRESS) {
671 {
672 int lock_held =
673 m_process->ReadUnsignedIntegerFromMemory(symbol_address, 4, 0, error);
674 if (lock_held != 0) {
675 error =
676 Status::FromErrorString("dyld lock held - unsafe to load images.");
677 }
678 }
679 } else {
680 // If we were unable to find _dyld_global_lock_held in any modules, or it
681 // is not loaded into memory yet, we may be at process startup (sitting at
682 // _dyld_start) - so we should not allow dlopen calls. But if we found more
683 // than one module then we are clearly past _dyld_start so in that case
684 // we'll default to "it's safe".
685 if (target.GetImages().GetSize() <= 1)
686 error = Status::FromErrorString("could not find the dyld library or "
687 "the dyld lock symbol");
688 }
689 return error;
690}
691
693 lldb::addr_t &base_address, UUID &uuid, LazyBool &using_shared_cache,
694 LazyBool &private_shared_cache) {
695 base_address = LLDB_INVALID_ADDRESS;
696 uuid.Clear();
697 using_shared_cache = eLazyBoolCalculate;
698 private_shared_cache = eLazyBoolCalculate;
699
700 if (m_process) {
701 StructuredData::ObjectSP info = m_process->GetSharedCacheInfo();
702 StructuredData::Dictionary *info_dict = nullptr;
703 if (info.get() && info->GetAsDictionary()) {
704 info_dict = info->GetAsDictionary();
705 }
706
707 // {"shared_cache_base_address":140735683125248,"shared_cache_uuid
708 // ":"DDB8D70C-
709 // C9A2-3561-B2C8-BE48A4F33F96","no_shared_cache":false,"shared_cache_private_cache":false}
710
711 if (info_dict && info_dict->HasKey("shared_cache_uuid") &&
712 info_dict->HasKey("no_shared_cache") &&
713 info_dict->HasKey("shared_cache_base_address")) {
714 base_address = info_dict->GetValueForKey("shared_cache_base_address")
715 ->GetUnsignedIntegerValue(LLDB_INVALID_ADDRESS);
716 std::string uuid_str = std::string(
717 info_dict->GetValueForKey("shared_cache_uuid")->GetStringValue());
718 if (!uuid_str.empty())
719 uuid.SetFromStringRef(uuid_str);
720 if (!info_dict->GetValueForKey("no_shared_cache")->GetBooleanValue())
721 using_shared_cache = eLazyBoolYes;
722 else
723 using_shared_cache = eLazyBoolNo;
724 if (info_dict->GetValueForKey("shared_cache_private_cache")
725 ->GetBooleanValue())
726 private_shared_cache = eLazyBoolYes;
727 else
728 private_shared_cache = eLazyBoolNo;
729
730 return true;
731 }
732 }
733 return false;
734}
735
740
744
746 return "Dynamic loader plug-in that watches for shared library loads/unloads "
747 "in MacOSX user processes.";
748}
static llvm::raw_ostream & error(Stream &strm)
#define LLDB_LOGF(log,...)
Definition Log.h:376
bool SetNotificationBreakpoint() override
bool GetSharedCacheInformation(lldb::addr_t &base_address, lldb_private::UUID &uuid, lldb_private::LazyBool &using_shared_cache, lldb_private::LazyBool &private_shared_cache) override
Get information about the shared cache for a process, if possible.
static lldb_private::DynamicLoader * CreateInstance(lldb_private::Process *process, bool force)
lldb_private::Status CanLoadImage() override
Ask if it is ok to try and load or unload an shared library (image).
void PutToLog(lldb_private::Log *log) const
bool IsFullyInitialized() override
Return whether the dynamic loader is fully initialized and it's safe to call its APIs.
lldb::addr_t GetDyldLockVariableAddressFromModule(lldb_private::Module *module)
bool NeedToDoInitialImageFetch() override
std::recursive_mutex m_mutex
void DoInitialImageFetch() override
static llvm::StringRef GetPluginNameStatic()
static llvm::StringRef GetPluginDescriptionStatic()
lldb::user_id_t m_break_id
lldb::addr_t GetNotificationFuncAddrFromImageInfos()
bool SetDYLDHandoverBreakpoint(lldb::addr_t notification_address)
void AddBinaries(const std::vector< lldb::addr_t > &load_addresses)
void ClearNotificationBreakpoint() override
static bool NotifyBreakpointHit(void *baton, lldb_private::StoppointCallbackContext *context, lldb::user_id_t break_id, lldb::user_id_t break_loc_id)
lldb::addr_t m_maybe_image_infos_address
bool ProcessDidExec() override
Called after attaching a process.
lldb::user_id_t m_dyld_handover_break_id
DynamicLoaderMacOS(lldb_private::Process *process)
bool DidSetNotificationBreakpoint() override
A section + offset based address class.
Definition Address.h:62
lldb::addr_t GetOpcodeLoadAddress(Target *target, AddressClass addr_class=AddressClass::eInvalid) const
Get the load address as an opcode load address.
Definition Address.cpp:358
void SetRawAddress(lldb::addr_t addr)
Definition Address.h:447
bool IsValid() const
Check if the object state is valid.
Definition Address.h:355
uint32_t GetAddressByteSize() const
Returns the size in bytes of an address of the current architecture.
Definition ArchSpec.cpp:685
llvm::Triple & GetTriple()
Architecture triple accessor.
Definition ArchSpec.h:468
General Outline: A breakpoint has four main parts, a filter, a resolver, the list of breakpoint locat...
Definition Breakpoint.h:81
void SetBreakpointKind(const char *kind)
Set the "kind" description for a breakpoint.
Definition Breakpoint.h:448
bool HasResolvedLocations() const
Return whether this breakpoint has any resolved locations.
void SetCallback(BreakpointHitCallback callback, void *baton, bool is_synchronous=false)
Set the callback action invoked when the breakpoint is hit.
Generic representation of a type in a programming language.
CompilerType GetPointerType() const
Return a new CompilerType that is a pointer to this type.
A uniqued constant string class.
Definition ConstString.h:40
static void ReportWarning(std::string message, std::optional< lldb::user_id_t > debugger_id=std::nullopt, std::once_flag *once=nullptr)
Report warning events.
DynamicLoaderDarwin(lldb_private::Process *process)
std::recursive_mutex & GetMutex() const
std::vector< std::pair< ImageInfo, lldb::ModuleSP > > PreloadModulesFromImageInfos(const ImageInfo::collection &image_infos)
bool JSONImageInformationIntoImageInfo(lldb_private::StructuredData::ObjectSP image_details, ImageInfo::collection &image_infos)
void UpdateSpecialBinariesFromPreloadedModules(std::vector< std::pair< ImageInfo, lldb::ModuleSP > > &images)
bool AddModulesUsingPreloadedModules(std::vector< std::pair< ImageInfo, lldb::ModuleSP > > &images)
static bool UseDYLDSPI(lldb_private::Process *process)
lldb_private::Address m_pthread_getspecific_addr
void UnloadImages(const std::vector< lldb::addr_t > &solib_addresses)
Process * m_process
The process that this dynamic loader plug-in is tracking.
bool GetStopWhenImagesChange() const
Get whether the process should stop when images change.
DynamicLoader(Process *process)
Construct with a process.
"lldb/Target/ExecutionContext.h" A class that contains an execution context.
Process * GetProcessPtr() const
Returns a pointer to the process object.
Thread & GetThreadRef() const
Returns a reference to the thread object.
A file collection class.
void Append(const FileSpec &file)
Append a FileSpec object to the list.
A collection class for Module objects.
Definition ModuleList.h:104
ModuleIterableNoLocking ModulesNoLocking() const
Definition ModuleList.h:543
std::recursive_mutex & GetMutex() const
Definition ModuleList.h:231
void Clear()
Clear the object's state.
ModuleIterable Modules() const
Definition ModuleList.h:537
size_t GetSize() const
Gets the size of the module list.
A class that describes an executable image and its associated object and symbol files.
Definition Module.h:90
virtual ObjectFile * GetObjectFile()
Get the object file representation for the current architecture.
Definition Module.cpp:1177
Symtab * GetSymtab(bool can_create=true)
Get the module's symbol table.
Definition Module.cpp:1004
A plug-in interface definition class for object file parsers.
Definition ObjectFile.h:45
static bool RegisterPlugin(llvm::StringRef name, llvm::StringRef description, ABICreateInstance create_callback)
static bool UnregisterPlugin(ABICreateInstance create_callback)
A plug-in interface definition class for debugging a process.
Definition Process.h:357
virtual lldb::addr_t GetImageInfoAddress()
Get the image information address for the current process.
Definition Process.cpp:1479
lldb::addr_t ReadPointerFromMemory(lldb::addr_t vm_addr, Status &error)
Definition Process.cpp:2260
lldb::addr_t FixCodeAddress(lldb::addr_t pc)
Some targets might use bits in a code address to indicate a mode switch, ARM uses bit zero to signify...
Definition Process.cpp:5956
uint32_t GetStopID() const
Definition Process.h:1475
const lldb::ABISP & GetABI()
Definition Process.cpp:1481
Target & GetTarget()
Get the target object pointer for this module.
Definition Process.h:1270
unsigned int UInt(unsigned int fail_value=0) const
Definition Scalar.cpp:351
unsigned long long ULongLong(unsigned long long fail_value=0) const
Definition Scalar.cpp:365
static lldb::TypeSystemClangSP GetForTarget(Target &target, std::optional< IsolatedASTKind > ast_kind=DefaultAST, bool create_on_demand=true)
Returns the scratch TypeSystemClang for the given target.
An error handling class.
Definition Status.h:118
static Status FromErrorString(const char *str)
Definition Status.h:141
General Outline: When we hit a breakpoint we need to package up whatever information is needed to eva...
lldb::break_id_t GetID() const
Definition Stoppoint.cpp:22
ObjectSP GetValueForKey(llvm::StringRef key) const
bool HasKey(llvm::StringRef key) const
std::shared_ptr< Object > ObjectSP
Defines a symbol context baton that can be handed other debug core functions.
bool ValueIsAddress() const
Definition Symbol.cpp:165
Address & GetAddressRef()
Definition Symbol.h:73
ConstString GetName() const
Definition Symbol.cpp:511
Module * GetExecutableModulePointer()
Definition Target.cpp:1533
Debugger & GetDebugger() const
Definition Target.h:1097
void ClearSectionLoadList()
Definition Target.cpp:5239
const ModuleList & GetImages() const
Get accessor for the images for this process.
Definition Target.h:1014
const ArchSpec & GetArchitecture() const
Definition Target.h:1056
Represents UUID's of various sizes.
Definition UUID.h:27
bool SetFromStringRef(llvm::StringRef str)
Definition UUID.cpp:101
void Clear()
Definition UUID.h:62
void PushValue(const Value &value)
Definition Value.cpp:694
Value * GetValueAtIndex(size_t idx)
Definition Value.cpp:698
const Scalar & GetScalar() const
See comment on m_scalar to understand what GetScalar returns.
Definition Value.h:113
@ Scalar
A raw scalar value.
Definition Value.h:45
void SetCompilerType(const CompilerType &compiler_type)
Definition Value.cpp:276
void SetValueType(ValueType value_type)
Definition Value.h:89
#define LLDB_INVALID_BREAK_ID
#define LLDB_BREAK_ID_IS_VALID(bid)
#define LLDB_INVALID_ADDRESS
#define UINT32_MAX
A class that represents a running process on the host machine.
Log * GetLog(Cat mask)
Retrieve the Log object for the channel associated with the given log enum.
Definition Log.h:332
std::shared_ptr< lldb_private::ABI > ABISP
std::shared_ptr< lldb_private::StackFrame > StackFrameSP
std::shared_ptr< lldb_private::Thread > ThreadSP
uint64_t offset_t
Definition lldb-types.h:85
@ eLanguageTypeUnknown
Unknown or invalid language value.
std::shared_ptr< lldb_private::Breakpoint > BreakpointSP
@ eEncodingUint
unsigned integer
std::shared_ptr< lldb_private::TypeSystemClang > TypeSystemClangSP
uint64_t user_id_t
Definition lldb-types.h:82
uint64_t addr_t
Definition lldb-types.h:80
std::shared_ptr< lldb_private::Module > ModuleSP
lldb::user_id_t GetID() const
Get accessor for the user ID.
Definition UserID.h:47