12#include "llvm/Support/MathExtras.h"
13#include "llvm/Support/Threading.h"
55 return "Mach-O core file debugging plug-in.";
67 if (crash_file && !can_connect) {
68 const size_t header_size =
sizeof(llvm::MachO::mach_header);
70 crash_file->
GetPath(), header_size, 0);
71 if (data_sp && data_sp->GetByteSize() == header_size) {
76 llvm::MachO::mach_header mach_header;
79 if (mach_header.filetype == llvm::MachO::MH_CORE)
80 process_sp = std::make_shared<ProcessMachCore>(target_sp, listener_sp,
89 bool plugin_specified_by_name) {
90 if (plugin_specified_by_name)
137 llvm::MachO::mach_header header;
142 if (header.magic == llvm::MachO::MH_CIGAM ||
143 header.magic == llvm::MachO::MH_CIGAM_64) {
144 header.magic = llvm::byteswap<uint32_t>(header.magic);
145 header.cputype = llvm::byteswap<uint32_t>(header.cputype);
146 header.cpusubtype = llvm::byteswap<uint32_t>(header.cpusubtype);
147 header.filetype = llvm::byteswap<uint32_t>(header.filetype);
148 header.ncmds = llvm::byteswap<uint32_t>(header.ncmds);
149 header.sizeofcmds = llvm::byteswap<uint32_t>(header.sizeofcmds);
150 header.flags = llvm::byteswap<uint32_t>(header.flags);
153 if (header.magic == llvm::MachO::MH_MAGIC ||
154 header.magic == llvm::MachO::MH_MAGIC_64) {
159 switch (header.filetype) {
160 case llvm::MachO::MH_DYLINKER:
162 "ProcessMachCore::%s found a user "
163 "process dyld binary image at 0x%" PRIx64,
168 case llvm::MachO::MH_EXECUTE:
171 if ((header.flags & llvm::MachO::MH_DYLDLINK) == 0) {
173 "ProcessMachCore::%s found a mach "
174 "kernel binary image at 0x%" PRIx64,
191 bool ranges_are_sorted =
true;
193 for (uint32_t i = 0; i < num_sections; ++i) {
199 section_vm_addr, section->
GetByteSize(), file_range);
201 if (vm_addr > section_vm_addr)
202 ranges_are_sorted =
false;
208 last_entry->
data.GetRangeEnd() == range_entry.
data.GetRangeBase()) {
210 last_entry->
data.SetRangeEnd(range_entry.
data.GetRangeEnd());
219 if (permissions == 0)
220 permissions = lldb::ePermissionsReadable | lldb::ePermissionsExecutable;
222 section_vm_addr, section->
GetByteSize(), permissions));
225 if (!ranges_are_sorted) {
240 uint64_t lowmem_uuid_addresses[] = {0x2000204, 0x1000204, 0x1000020, 0x4204,
241 0x1204, 0x1020, 0x4020, 0xc00,
244 for (uint64_t addr : lowmem_uuid_addresses) {
247 if (core_memory_entry) {
251 if (bytes_left >= 32) {
254 core_memory_entry->
data.GetRangeBase() + offset, 4, &strbuf) &&
255 strncmp(
"uuid", (
char *)&strbuf, 4) == 0) {
257 if (core_objfile->
CopyData(core_memory_entry->
data.GetRangeBase() +
259 sizeof(
uuid_t), uuid_bytes)) {
263 "ProcessMachCore::LoadBinaryViaLowmemUUID: found "
264 "binary uuid %s at low memory address 0x%" PRIx64,
268 const bool value_is_offset =
true;
269 const bool force_symbol_search =
true;
270 const bool notify =
true;
271 const bool set_address_in_target =
true;
272 const bool allow_memory_image_last_resort =
false;
274 this, llvm::StringRef(), uuid, 0, value_is_offset,
275 force_symbol_search, notify, set_address_in_target,
276 allow_memory_image_last_resort)) {
295 addr_t objfile_binary_value;
296 bool objfile_binary_value_is_offset;
297 UUID objfile_binary_uuid;
303 bool found_binary_spec_in_metadata =
false;
306 objfile_binary_value_is_offset,
307 objfile_binary_uuid, type)) {
309 log->
Printf(
"ProcessMachCore::LoadBinariesViaMetadata: using binary hint "
310 "from 'main bin spec' "
311 "LC_NOTE with UUID %s value 0x%" PRIx64
312 " value is offset %d and type %d",
314 objfile_binary_value, objfile_binary_value_is_offset, type);
316 found_binary_spec_in_metadata =
true;
331 const bool force_symbol_search =
true;
332 const bool notify =
true;
333 const bool set_address_in_target =
true;
334 const bool allow_memory_image_last_resort =
false;
336 this, llvm::StringRef(), objfile_binary_uuid,
337 objfile_binary_value, objfile_binary_value_is_offset,
338 force_symbol_search, notify, set_address_in_target,
339 allow_memory_image_last_resort)) {
353 if (corefile_identifier.find(
"UUID=") != std::string::npos) {
354 size_t p = corefile_identifier.find(
"UUID=") + strlen(
"UUID=");
355 std::string uuid_str = corefile_identifier.substr(p, 36);
358 log->
Printf(
"Got a UUID from LC_IDENT/kern ver str LC_NOTE: %s",
360 found_binary_spec_in_metadata =
true;
362 if (corefile_identifier.find(
"stext=") != std::string::npos) {
363 size_t p = corefile_identifier.find(
"stext=") + strlen(
"stext=");
364 if (corefile_identifier[p] ==
'0' && corefile_identifier[p + 1] ==
'x') {
366 ::strtoul(corefile_identifier.c_str() + p,
nullptr, 16);
368 log->
Printf(
"Got a load address from LC_IDENT/kern ver str "
369 "LC_NOTE: 0x%" PRIx64,
371 found_binary_spec_in_metadata =
true;
377 if (corefile_identifier.find(
"Darwin Kernel") != std::string::npos &&
381 "ProcessMachCore::LoadBinariesViaMetadata: Found kernel binary via "
382 "LC_IDENT/kern ver str LC_NOTE");
384 found_binary_spec_in_metadata =
true;
385 }
else if (ident_uuid.
IsValid()) {
388 const bool value_is_offset =
false;
389 const bool force_symbol_search =
true;
390 const bool notify =
true;
391 const bool set_address_in_target =
true;
392 const bool allow_memory_image_last_resort =
false;
394 this, llvm::StringRef(), ident_uuid, ident_binary_addr,
395 value_is_offset, force_symbol_search, notify,
396 set_address_in_target, allow_memory_image_last_resort)) {
397 found_binary_spec_in_metadata =
true;
405 found_binary_spec_in_metadata =
true;
410 found_binary_spec_in_metadata =
true;
419 return found_binary_spec_in_metadata;
429 std::vector<addr_t> dylds_found;
430 std::vector<addr_t> kernels_found;
441 "ProcessMachCore::%s: Setting target ArchSpec based on "
442 "corefile mach-o cputype/cpusubtype",
449 for (
size_t i = 0; i < num_core_aranges; ++i) {
453 for (
lldb::addr_t section_vm_addr = section_vm_addr_start;
454 section_vm_addr < section_vm_addr_end; section_vm_addr += 0x1000) {
458 dylds_found.push_back(dyld);
460 kernels_found.push_back(kernel);
467 if (dylds_found.size() > 0)
469 if (kernels_found.size() > 0)
473 if (kernels_found.size() < 2)
494 addr_t better_kernel_address =
502 "ProcessMachCore::%s: Using "
503 "the kernel address "
504 "from DynamicLoaderDarwinKernel",
514 if (!found_binary_spec_in_metadata)
523 "ProcessMachCore::%s: Using kernel "
530 "ProcessMachCore::%s: Using user process dyld "
531 "image at 0x%" PRIx64,
536 "ProcessMachCore::%s: Using user process dyld "
537 "dyld_all_image_infos at 0x%" PRIx64,
544 "ProcessMachCore::%s: Using user process dyld "
545 "image at 0x%" PRIx64,
550 "ProcessMachCore::%s: Using user process dyld "
551 "dyld_all_image_infos at 0x%" PRIx64,
555 "ProcessMachCore::%s: Using kernel "
576 for (
size_t i = 0; i < core_range_infos_size; i++) {
579 ent->
data = lldb::ePermissionsReadable | lldb::ePermissionsExecutable;
594 if (core_objfile ==
nullptr) {
610 if (exe_module_sp && exe_module_sp->GetArchitecture().IsValid()) {
612 "ProcessMachCore::%s: Was given binary + corefile, setting "
613 "target ArchSpec to binary to start",
625 if (exe_module_sp && exe_module_sp->GetArchitecture().IsValid()) {
627 "ProcessMachCore::%s: have executable binary in the Target "
628 "after metadata/scan. Setting Target's ArchSpec based on "
637 "ProcessMachCore::%s: Setting target ArchSpec based on "
638 "corefile mach-o cputype/cpusubtype",
658 if (old_thread_list.
GetSize(
false) == 0) {
665 std::vector<lldb::tid_t> tids;
667 assert(tids.size() == num_threads);
671 for (uint32_t i = 0; i < num_threads; i++) {
673 highest_tid = tids[i];
676 for (uint32_t i = 0; i < num_threads; i++) {
678 tids[i] = current_unused_tid++;
683 for (uint32_t i = 0; i < num_threads; i++) {
688 for (uint32_t i = 0; i < num_threads; i++) {
690 std::make_shared<ThreadMachCore>(*
this, tids[i], i);
695 const uint32_t num_threads = old_thread_list.
GetSize(
false);
696 for (uint32_t i = 0; i < num_threads; ++i)
699 return new_thread_list.
GetSize(
false) > 0;
728 size_t bytes_read = 0;
747 while (bytes_read < size) {
748 const addr_t curr_addr = addr + bytes_read;
752 if (core_memory_entry) {
755 const size_t bytes_to_read =
756 std::min(size - bytes_read, (
size_t)bytes_left);
757 const size_t curr_bytes_read = core_objfile->
CopyData(
758 core_memory_entry->
data.GetRangeBase() + offset, bytes_to_read,
759 (
char *)buf + bytes_read);
760 if (curr_bytes_read == 0)
762 bytes_read += curr_bytes_read;
767 "core file does not contain 0x%" PRIx64, curr_addr);
781 if (permission_entry) {
782 if (permission_entry->
Contains(load_addr)) {
785 const Flags permissions(permission_entry->
data);
796 }
else if (load_addr < permission_entry->GetRangeBase()) {
814 section_sp->GetLoadBaseAddress(&
GetTarget()));
836 static llvm::once_flag g_once_flag;
838 llvm::call_once(g_once_flag, []() {
static llvm::raw_ostream & error(Stream &strm)
static llvm::Expected< lldb::addr_t > ResolveLoadAddress(ExecutionContext *exe_ctx, lldb::ModuleSP &module_sp, const char *dw_op_type, lldb::addr_t file_addr, Address &so_addr, bool check_sectionoffset=false)
Helper function to move common code used to resolve a file address and turn into a load address.
#define LLDB_LOGF(log,...)
#define LLDB_PLUGIN_DEFINE(PluginName)
static llvm::StringRef GetPluginNameStatic()
static lldb::addr_t SearchForDarwinKernel(lldb_private::Process *process)
static llvm::StringRef GetPluginNameStatic()
static llvm::StringRef GetPluginNameStatic()
bool ParseHeader() override
Attempts to parse the object header.
bool WarnBeforeDetach() const override
Before lldb detaches from a process, it warns the user that they are about to lose their debug sessio...
static llvm::StringRef GetPluginDescriptionStatic()
size_t ReadMemory(lldb::addr_t addr, void *buf, size_t size, lldb_private::Status &error) override
Read of memory from a process.
bool LoadBinaryViaLowmemUUID()
VMRangeToFileOffset m_core_aranges
bool LoadBinariesViaMetadata()
size_t DoReadMemory(lldb::addr_t addr, void *buf, size_t size, lldb_private::Status &error) override
Actually do the reading of memory from a process.
CorefilePreference GetCorefilePreference()
If a core file can be interpreted multiple ways, this establishes which style wins.
bool CanDebug(lldb::TargetSP target_sp, bool plugin_specified_by_name) override
Check if a plug-in instance can debug the file in module.
void CleanupMemoryRegionPermissions()
lldb_private::ObjectFile * GetCoreObjectFile()
ProcessMachCore(lldb::TargetSP target_sp, lldb::ListenerSP listener, const lldb_private::FileSpec &core_file)
llvm::StringRef m_dyld_plugin_name
lldb_private::DynamicLoader * GetDynamicLoader() override
Get the dynamic loader plug-in for this process.
lldb_private::Status DoDestroy() override
static lldb::ProcessSP CreateInstance(lldb::TargetSP target_sp, lldb::ListenerSP listener, const lldb_private::FileSpec *crash_file_path, bool can_connect)
lldb::addr_t m_dyld_all_image_infos_addr
void RefreshStateAfterStop() override
Currently called as part of ShouldStop.
bool DoUpdateThreadList(lldb_private::ThreadList &old_thread_list, lldb_private::ThreadList &new_thread_list) override
Update the thread list following process plug-in's specific logic.
static llvm::StringRef GetPluginNameStatic()
bool IsAlive() override
Check if a process is still alive.
void CreateMemoryRegions()
bool CheckAddressForDyldOrKernel(lldb::addr_t addr, lldb::addr_t &dyld, lldb::addr_t &kernel)
lldb_private::Range< lldb::addr_t, lldb::addr_t > FileRange
VMRangeToPermissions m_core_range_infos
lldb_private::Status DoLoadCore() override
void LoadBinariesViaExhaustiveSearch()
void LoadBinariesAndSetDYLD()
lldb::addr_t m_mach_kernel_addr
lldb::addr_t GetImageInfoAddress() override
Get the image information address for the current process.
~ProcessMachCore() override
lldb::ModuleSP m_core_module_sp
lldb_private::Status DoGetMemoryRegionInfo(lldb::addr_t load_addr, lldb_private::MemoryRegionInfo ®ion_info) override
DoGetMemoryRegionInfo is called by GetMemoryRegionInfo after it has removed non address bits from loa...
A section + offset based address class.
lldb::SectionSP GetSection() const
Get const accessor for the section.
A class which holds the metadata from a remote stub/corefile note about how many bits are used for ad...
An architecture specification class.
bool IsValid() const
Tests if this ArchSpec is valid.
A plug-in interface definition class for dynamic loaders.
static lldb::ModuleSP LoadBinaryWithUUIDAndAddress(Process *process, llvm::StringRef name, UUID uuid, lldb::addr_t value, bool value_is_offset, bool force_symbol_search, bool notify, bool set_address_in_target, bool allow_memory_image_last_resort)
Find/load a binary into lldb given a UUID and the address where it is loaded in memory,...
static DynamicLoader * FindPlugin(Process *process, llvm::StringRef plugin_name)
Find a dynamic loader plugin for a given process.
size_t GetPath(char *path, size_t max_path_length, bool denormalize=true) const
Extract the full path to the file.
static FileSystem & Instance()
std::shared_ptr< DataBuffer > CreateDataBuffer(const llvm::Twine &path, uint64_t size=0, uint64_t offset=0)
Create memory buffer from path.
bool Test(ValueType bit) const
Test a single flag bit.
void void Printf(const char *format,...) __attribute__((format(printf
Prefer using LLDB_LOGF whenever possible.
void SetMapped(OptionalBool val)
void SetReadable(OptionalBool val)
void SetExecutable(OptionalBool val)
void SetWritable(OptionalBool val)
void SetLLDBPermissions(uint32_t permissions)
static Status GetSharedModule(const ModuleSpec &module_spec, lldb::ModuleSP &module_sp, llvm::SmallVectorImpl< lldb::ModuleSP > *old_modules, bool *did_create_ptr, bool invoke_locate_callback=true)
void SetTarget(lldb::TargetSP target)
Set the target to be used when resolving a module.
A plug-in interface definition class for object file parsers.
virtual bool GetCorefileThreadExtraInfos(std::vector< lldb::tid_t > &tids)
Get metadata about thread ids from the corefile.
virtual std::string GetIdentifierString()
Some object files may have an identifier string embedded in them, e.g.
virtual uint32_t GetNumThreadContexts()
virtual bool LoadCoreFileImages(lldb_private::Process &process)
Load binaries listed in a corefile.
@ eTypeCoreFile
A core file that has a checkpoint of a program's execution state.
virtual lldb_private::AddressableBits GetAddressableBits()
Some object files may have the number of bits used for addressing embedded in them,...
size_t CopyData(lldb::offset_t offset, size_t length, void *dst) const
virtual SectionList * GetSectionList(bool update_module_section_list=true)
Gets the section list for the currently selected architecture (and object for archives).
virtual bool GetCorefileMainBinaryInfo(lldb::addr_t &value, bool &value_is_offset, UUID &uuid, ObjectFile::BinaryType &type)
When the ObjectFile is a core file, lldb needs to locate the "binary" in the core file.
BinaryType
If we have a corefile binary hint, this enum specifies the binary type which we can use to select the...
@ eBinaryTypeKernel
kernel binary
@ eBinaryTypeUser
user process binary, dyld addr
@ eBinaryTypeUserAllImageInfos
user process binary, dyld_all_image_infos addr
virtual llvm::StringRef GetPluginName()=0
static bool RegisterPlugin(llvm::StringRef name, llvm::StringRef description, ABICreateInstance create_callback)
static bool UnregisterPlugin(ABICreateInstance create_callback)
PostMortemProcess(lldb::TargetSP target_sp, lldb::ListenerSP listener_sp, const FileSpec &core_file)
void SetAddressableBitMasks(AddressableBits bit_masks)
void SetCanJIT(bool can_jit)
Sets whether executing JIT-compiled code in this process is possible.
lldb::DynamicLoaderUP m_dyld_up
lldb::addr_t FixAnyAddress(lldb::addr_t pc)
Use this method when you do not know, or do not care what kind of address you are fixing.
bool IsValid() const
Return whether this object is valid (i.e.
virtual void Finalize(bool destructing)
This object is about to be destroyed, do any necessary cleanup.
ThreadList m_thread_list
The threads for this process as the user will see them.
Target & GetTarget()
Get the target object pointer for this module.
RangeData< lldb::addr_t, lldb::addr_t, FileRange > Entry
size_t GetNumSections(uint32_t depth) const
lldb::SectionSP GetSectionAtIndex(size_t idx) const
uint32_t GetPermissions() const
Get the permissions as OR'ed bits from lldb::Permissions.
lldb::offset_t GetFileOffset() const
lldb::addr_t GetFileAddress() const
lldb::addr_t GetByteSize() const
lldb::offset_t GetFileSize() const
static Status FromErrorStringWithFormat(const char *format,...) __attribute__((format(printf
static Status FromErrorString(const char *str)
bool SetArchitecture(const ArchSpec &arch_spec, bool set_platform=false, bool merge=true)
Set the architecture for this target.
lldb::ModuleSP GetExecutableModule()
Gets the module for the main executable.
void AddThread(const lldb::ThreadSP &thread_sp)
uint32_t GetSize(bool can_update=true)
lldb::ThreadSP GetThreadAtIndex(uint32_t idx, bool can_update=true)
Represents UUID's of various sizes.
bool SetFromStringRef(llvm::StringRef str)
std::string GetAsString(llvm::StringRef separator="-") const
#define LLDB_INVALID_THREAD_ID
#define LLDB_INVALID_ADDRESS
A class that represents a running process on the host machine.
Log * GetLog(Cat mask)
Retrieve the Log object for the channel associated with the given log enum.
std::shared_ptr< lldb_private::Thread > ThreadSP
std::shared_ptr< lldb_private::Process > ProcessSP
std::shared_ptr< lldb_private::Listener > ListenerSP
std::shared_ptr< lldb_private::Section > SectionSP
std::shared_ptr< lldb_private::Target > TargetSP
std::shared_ptr< lldb_private::DataExtractor > DataExtractorSP
std::shared_ptr< lldb_private::Module > ModuleSP
bool Contains(BaseType r) const
BaseType GetRangeBase() const
void SetRangeEnd(BaseType end)
void SetRangeBase(BaseType b)
Set the start value for the range, and keep the same size.
BaseType GetRangeEnd() const
void SetByteSize(SizeType s)