12#include "llvm/Support/MathExtras.h"
13#include "llvm/Support/Threading.h"
55 return "Mach-O core file debugging plug-in.";
67 if (crash_file && !can_connect) {
68 const size_t header_size =
sizeof(llvm::MachO::mach_header);
70 crash_file->
GetPath(), header_size, 0);
71 if (data_sp && data_sp->GetByteSize() == header_size) {
75 llvm::MachO::mach_header mach_header;
77 if (mach_header.filetype == llvm::MachO::MH_CORE)
78 process_sp = std::make_shared<ProcessMachCore>(target_sp, listener_sp,
87 bool plugin_specified_by_name) {
88 if (plugin_specified_by_name)
135 llvm::MachO::mach_header header;
140 if (header.magic == llvm::MachO::MH_CIGAM ||
141 header.magic == llvm::MachO::MH_CIGAM_64) {
142 header.magic = llvm::byteswap<uint32_t>(header.magic);
143 header.cputype = llvm::byteswap<uint32_t>(header.cputype);
144 header.cpusubtype = llvm::byteswap<uint32_t>(header.cpusubtype);
145 header.filetype = llvm::byteswap<uint32_t>(header.filetype);
146 header.ncmds = llvm::byteswap<uint32_t>(header.ncmds);
147 header.sizeofcmds = llvm::byteswap<uint32_t>(header.sizeofcmds);
148 header.flags = llvm::byteswap<uint32_t>(header.flags);
151 if (header.magic == llvm::MachO::MH_MAGIC ||
152 header.magic == llvm::MachO::MH_MAGIC_64) {
157 switch (header.filetype) {
158 case llvm::MachO::MH_DYLINKER:
160 "ProcessMachCore::%s found a user "
161 "process dyld binary image at 0x%" PRIx64,
166 case llvm::MachO::MH_EXECUTE:
169 if ((header.flags & llvm::MachO::MH_DYLDLINK) == 0) {
171 "ProcessMachCore::%s found a mach "
172 "kernel binary image at 0x%" PRIx64,
189 bool ranges_are_sorted =
true;
191 for (uint32_t i = 0; i < num_sections; ++i) {
197 section_vm_addr, section->
GetByteSize(), file_range);
199 if (vm_addr > section_vm_addr)
200 ranges_are_sorted =
false;
206 last_entry->
data.GetRangeEnd() == range_entry.
data.GetRangeBase()) {
208 last_entry->
data.SetRangeEnd(range_entry.
data.GetRangeEnd());
217 if (permissions == 0)
218 permissions = lldb::ePermissionsReadable | lldb::ePermissionsExecutable;
220 section_vm_addr, section->
GetByteSize(), permissions));
223 if (!ranges_are_sorted) {
238 uint64_t lowmem_uuid_addresses[] = {0x2000204, 0x1000204, 0x1000020, 0x4204,
239 0x1204, 0x1020, 0x4020, 0xc00,
242 for (uint64_t addr : lowmem_uuid_addresses) {
245 if (core_memory_entry) {
249 if (bytes_left >= 32) {
252 core_memory_entry->
data.GetRangeBase() + offset, 4, &strbuf) &&
253 strncmp(
"uuid", (
char *)&strbuf, 4) == 0) {
255 if (core_objfile->
CopyData(core_memory_entry->
data.GetRangeBase() +
257 sizeof(
uuid_t), uuid_bytes)) {
261 "ProcessMachCore::LoadBinaryViaLowmemUUID: found "
262 "binary uuid %s at low memory address 0x%" PRIx64,
266 const bool value_is_offset =
true;
267 const bool force_symbol_search =
true;
268 const bool notify =
true;
269 const bool set_address_in_target =
true;
270 const bool allow_memory_image_last_resort =
false;
272 this, llvm::StringRef(), uuid, 0, value_is_offset,
273 force_symbol_search, notify, set_address_in_target,
274 allow_memory_image_last_resort)) {
293 addr_t objfile_binary_value;
294 bool objfile_binary_value_is_offset;
295 UUID objfile_binary_uuid;
301 bool found_binary_spec_in_metadata =
false;
304 objfile_binary_value_is_offset,
305 objfile_binary_uuid, type)) {
307 log->
Printf(
"ProcessMachCore::LoadBinariesViaMetadata: using binary hint "
308 "from 'main bin spec' "
309 "LC_NOTE with UUID %s value 0x%" PRIx64
310 " value is offset %d and type %d",
312 objfile_binary_value, objfile_binary_value_is_offset, type);
314 found_binary_spec_in_metadata =
true;
329 const bool force_symbol_search =
true;
330 const bool notify =
true;
331 const bool set_address_in_target =
true;
332 const bool allow_memory_image_last_resort =
false;
334 this, llvm::StringRef(), objfile_binary_uuid,
335 objfile_binary_value, objfile_binary_value_is_offset,
336 force_symbol_search, notify, set_address_in_target,
337 allow_memory_image_last_resort)) {
351 if (corefile_identifier.find(
"UUID=") != std::string::npos) {
352 size_t p = corefile_identifier.find(
"UUID=") + strlen(
"UUID=");
353 std::string uuid_str = corefile_identifier.substr(p, 36);
356 log->
Printf(
"Got a UUID from LC_IDENT/kern ver str LC_NOTE: %s",
358 found_binary_spec_in_metadata =
true;
360 if (corefile_identifier.find(
"stext=") != std::string::npos) {
361 size_t p = corefile_identifier.find(
"stext=") + strlen(
"stext=");
362 if (corefile_identifier[p] ==
'0' && corefile_identifier[p + 1] ==
'x') {
364 ::strtoul(corefile_identifier.c_str() + p,
nullptr, 16);
366 log->
Printf(
"Got a load address from LC_IDENT/kern ver str "
367 "LC_NOTE: 0x%" PRIx64,
369 found_binary_spec_in_metadata =
true;
375 if (corefile_identifier.find(
"Darwin Kernel") != std::string::npos &&
379 "ProcessMachCore::LoadBinariesViaMetadata: Found kernel binary via "
380 "LC_IDENT/kern ver str LC_NOTE");
382 found_binary_spec_in_metadata =
true;
383 }
else if (ident_uuid.
IsValid()) {
386 const bool value_is_offset =
false;
387 const bool force_symbol_search =
true;
388 const bool notify =
true;
389 const bool set_address_in_target =
true;
390 const bool allow_memory_image_last_resort =
false;
392 this, llvm::StringRef(), ident_uuid, ident_binary_addr,
393 value_is_offset, force_symbol_search, notify,
394 set_address_in_target, allow_memory_image_last_resort)) {
395 found_binary_spec_in_metadata =
true;
403 found_binary_spec_in_metadata =
true;
408 found_binary_spec_in_metadata =
true;
417 return found_binary_spec_in_metadata;
427 std::vector<addr_t> dylds_found;
428 std::vector<addr_t> kernels_found;
439 "ProcessMachCore::%s: Setting target ArchSpec based on "
440 "corefile mach-o cputype/cpusubtype",
447 for (
size_t i = 0; i < num_core_aranges; ++i) {
451 for (
lldb::addr_t section_vm_addr = section_vm_addr_start;
452 section_vm_addr < section_vm_addr_end; section_vm_addr += 0x1000) {
456 dylds_found.push_back(dyld);
458 kernels_found.push_back(kernel);
465 if (dylds_found.size() > 0)
467 if (kernels_found.size() > 0)
471 if (kernels_found.size() < 2)
492 addr_t better_kernel_address =
500 "ProcessMachCore::%s: Using "
501 "the kernel address "
502 "from DynamicLoaderDarwinKernel",
512 if (!found_binary_spec_in_metadata)
521 "ProcessMachCore::%s: Using kernel "
528 "ProcessMachCore::%s: Using user process dyld "
529 "image at 0x%" PRIx64,
534 "ProcessMachCore::%s: Using user process dyld "
535 "dyld_all_image_infos at 0x%" PRIx64,
542 "ProcessMachCore::%s: Using user process dyld "
543 "image at 0x%" PRIx64,
548 "ProcessMachCore::%s: Using user process dyld "
549 "dyld_all_image_infos at 0x%" PRIx64,
553 "ProcessMachCore::%s: Using kernel "
574 for (
size_t i = 0; i < core_range_infos_size; i++) {
577 ent->
data = lldb::ePermissionsReadable | lldb::ePermissionsExecutable;
592 if (core_objfile ==
nullptr) {
608 if (exe_module_sp && exe_module_sp->GetArchitecture().IsValid()) {
610 "ProcessMachCore::%s: Was given binary + corefile, setting "
611 "target ArchSpec to binary to start",
623 if (exe_module_sp && exe_module_sp->GetArchitecture().IsValid()) {
625 "ProcessMachCore::%s: have executable binary in the Target "
626 "after metadata/scan. Setting Target's ArchSpec based on "
635 "ProcessMachCore::%s: Setting target ArchSpec based on "
636 "corefile mach-o cputype/cpusubtype",
656 if (old_thread_list.
GetSize(
false) == 0) {
663 std::vector<lldb::tid_t> tids;
665 assert(tids.size() == num_threads);
669 for (uint32_t i = 0; i < num_threads; i++) {
671 highest_tid = tids[i];
674 for (uint32_t i = 0; i < num_threads; i++) {
676 tids[i] = current_unused_tid++;
681 for (uint32_t i = 0; i < num_threads; i++) {
686 for (uint32_t i = 0; i < num_threads; i++) {
688 std::make_shared<ThreadMachCore>(*
this, tids[i], i);
693 const uint32_t num_threads = old_thread_list.
GetSize(
false);
694 for (uint32_t i = 0; i < num_threads; ++i)
697 return new_thread_list.
GetSize(
false) > 0;
726 size_t bytes_read = 0;
745 while (bytes_read < size) {
746 const addr_t curr_addr = addr + bytes_read;
750 if (core_memory_entry) {
753 const size_t bytes_to_read =
754 std::min(size - bytes_read, (
size_t)bytes_left);
755 const size_t curr_bytes_read = core_objfile->
CopyData(
756 core_memory_entry->
data.GetRangeBase() + offset, bytes_to_read,
757 (
char *)buf + bytes_read);
758 if (curr_bytes_read == 0)
760 bytes_read += curr_bytes_read;
765 "core file does not contain 0x%" PRIx64, curr_addr);
779 if (permission_entry) {
780 if (permission_entry->
Contains(load_addr)) {
783 const Flags permissions(permission_entry->
data);
794 }
else if (load_addr < permission_entry->GetRangeBase()) {
812 section_sp->GetLoadBaseAddress(&
GetTarget()));
834 static llvm::once_flag g_once_flag;
836 llvm::call_once(g_once_flag, []() {
static llvm::raw_ostream & error(Stream &strm)
static llvm::Expected< lldb::addr_t > ResolveLoadAddress(ExecutionContext *exe_ctx, lldb::ModuleSP &module_sp, const char *dw_op_type, lldb::addr_t file_addr, Address &so_addr, bool check_sectionoffset=false)
Helper function to move common code used to resolve a file address and turn into a load address.
#define LLDB_LOGF(log,...)
#define LLDB_PLUGIN_DEFINE(PluginName)
static llvm::StringRef GetPluginNameStatic()
static lldb::addr_t SearchForDarwinKernel(lldb_private::Process *process)
static llvm::StringRef GetPluginNameStatic()
static llvm::StringRef GetPluginNameStatic()
bool ParseHeader() override
Attempts to parse the object header.
bool WarnBeforeDetach() const override
Before lldb detaches from a process, it warns the user that they are about to lose their debug sessio...
static llvm::StringRef GetPluginDescriptionStatic()
size_t ReadMemory(lldb::addr_t addr, void *buf, size_t size, lldb_private::Status &error) override
Read of memory from a process.
bool LoadBinaryViaLowmemUUID()
VMRangeToFileOffset m_core_aranges
bool LoadBinariesViaMetadata()
size_t DoReadMemory(lldb::addr_t addr, void *buf, size_t size, lldb_private::Status &error) override
Actually do the reading of memory from a process.
CorefilePreference GetCorefilePreference()
If a core file can be interpreted multiple ways, this establishes which style wins.
bool CanDebug(lldb::TargetSP target_sp, bool plugin_specified_by_name) override
Check if a plug-in instance can debug the file in module.
void CleanupMemoryRegionPermissions()
lldb_private::ObjectFile * GetCoreObjectFile()
ProcessMachCore(lldb::TargetSP target_sp, lldb::ListenerSP listener, const lldb_private::FileSpec &core_file)
llvm::StringRef m_dyld_plugin_name
lldb_private::DynamicLoader * GetDynamicLoader() override
Get the dynamic loader plug-in for this process.
lldb_private::Status DoDestroy() override
static lldb::ProcessSP CreateInstance(lldb::TargetSP target_sp, lldb::ListenerSP listener, const lldb_private::FileSpec *crash_file_path, bool can_connect)
lldb::addr_t m_dyld_all_image_infos_addr
void RefreshStateAfterStop() override
Currently called as part of ShouldStop.
bool DoUpdateThreadList(lldb_private::ThreadList &old_thread_list, lldb_private::ThreadList &new_thread_list) override
Update the thread list following process plug-in's specific logic.
static llvm::StringRef GetPluginNameStatic()
bool IsAlive() override
Check if a process is still alive.
void CreateMemoryRegions()
bool CheckAddressForDyldOrKernel(lldb::addr_t addr, lldb::addr_t &dyld, lldb::addr_t &kernel)
lldb_private::Range< lldb::addr_t, lldb::addr_t > FileRange
VMRangeToPermissions m_core_range_infos
lldb_private::Status DoLoadCore() override
void LoadBinariesViaExhaustiveSearch()
void LoadBinariesAndSetDYLD()
lldb::addr_t m_mach_kernel_addr
lldb::addr_t GetImageInfoAddress() override
Get the image information address for the current process.
~ProcessMachCore() override
lldb::ModuleSP m_core_module_sp
lldb_private::Status DoGetMemoryRegionInfo(lldb::addr_t load_addr, lldb_private::MemoryRegionInfo ®ion_info) override
DoGetMemoryRegionInfo is called by GetMemoryRegionInfo after it has removed non address bits from loa...
A section + offset based address class.
lldb::SectionSP GetSection() const
Get const accessor for the section.
A class which holds the metadata from a remote stub/corefile note about how many bits are used for ad...
An architecture specification class.
bool IsValid() const
Tests if this ArchSpec is valid.
A plug-in interface definition class for dynamic loaders.
static lldb::ModuleSP LoadBinaryWithUUIDAndAddress(Process *process, llvm::StringRef name, UUID uuid, lldb::addr_t value, bool value_is_offset, bool force_symbol_search, bool notify, bool set_address_in_target, bool allow_memory_image_last_resort)
Find/load a binary into lldb given a UUID and the address where it is loaded in memory,...
static DynamicLoader * FindPlugin(Process *process, llvm::StringRef plugin_name)
Find a dynamic loader plugin for a given process.
size_t GetPath(char *path, size_t max_path_length, bool denormalize=true) const
Extract the full path to the file.
static FileSystem & Instance()
std::shared_ptr< DataBuffer > CreateDataBuffer(const llvm::Twine &path, uint64_t size=0, uint64_t offset=0)
Create memory buffer from path.
bool Test(ValueType bit) const
Test a single flag bit.
void void Printf(const char *format,...) __attribute__((format(printf
Prefer using LLDB_LOGF whenever possible.
void SetMapped(OptionalBool val)
void SetReadable(OptionalBool val)
void SetExecutable(OptionalBool val)
void SetWritable(OptionalBool val)
void SetLLDBPermissions(uint32_t permissions)
static Status GetSharedModule(const ModuleSpec &module_spec, lldb::ModuleSP &module_sp, llvm::SmallVectorImpl< lldb::ModuleSP > *old_modules, bool *did_create_ptr, bool always_create=false, bool invoke_locate_callback=true)
void SetTarget(std::shared_ptr< Target > target)
Set the target to be used when resolving a module.
A plug-in interface definition class for object file parsers.
virtual bool GetCorefileThreadExtraInfos(std::vector< lldb::tid_t > &tids)
Get metadata about thread ids from the corefile.
virtual std::string GetIdentifierString()
Some object files may have an identifier string embedded in them, e.g.
virtual uint32_t GetNumThreadContexts()
virtual bool LoadCoreFileImages(lldb_private::Process &process)
Load binaries listed in a corefile.
@ eTypeCoreFile
A core file that has a checkpoint of a program's execution state.
virtual lldb_private::AddressableBits GetAddressableBits()
Some object files may have the number of bits used for addressing embedded in them,...
size_t CopyData(lldb::offset_t offset, size_t length, void *dst) const
virtual SectionList * GetSectionList(bool update_module_section_list=true)
Gets the section list for the currently selected architecture (and object for archives).
virtual bool GetCorefileMainBinaryInfo(lldb::addr_t &value, bool &value_is_offset, UUID &uuid, ObjectFile::BinaryType &type)
When the ObjectFile is a core file, lldb needs to locate the "binary" in the core file.
BinaryType
If we have a corefile binary hint, this enum specifies the binary type which we can use to select the...
@ eBinaryTypeKernel
kernel binary
@ eBinaryTypeUser
user process binary, dyld addr
@ eBinaryTypeUserAllImageInfos
user process binary, dyld_all_image_infos addr
virtual llvm::StringRef GetPluginName()=0
static bool RegisterPlugin(llvm::StringRef name, llvm::StringRef description, ABICreateInstance create_callback)
static bool UnregisterPlugin(ABICreateInstance create_callback)
PostMortemProcess(lldb::TargetSP target_sp, lldb::ListenerSP listener_sp, const FileSpec &core_file)
void SetAddressableBitMasks(AddressableBits bit_masks)
void SetCanJIT(bool can_jit)
Sets whether executing JIT-compiled code in this process is possible.
lldb::DynamicLoaderUP m_dyld_up
lldb::addr_t FixAnyAddress(lldb::addr_t pc)
Use this method when you do not know, or do not care what kind of address you are fixing.
bool IsValid() const
Return whether this object is valid (i.e.
virtual void Finalize(bool destructing)
This object is about to be destroyed, do any necessary cleanup.
ThreadList m_thread_list
The threads for this process as the user will see them.
Target & GetTarget()
Get the target object pointer for this module.
RangeData< lldb::addr_t, lldb::addr_t, FileRange > Entry
size_t GetNumSections(uint32_t depth) const
lldb::SectionSP GetSectionAtIndex(size_t idx) const
uint32_t GetPermissions() const
Get the permissions as OR'ed bits from lldb::Permissions.
lldb::offset_t GetFileOffset() const
lldb::addr_t GetFileAddress() const
lldb::addr_t GetByteSize() const
lldb::offset_t GetFileSize() const
static Status FromErrorStringWithFormat(const char *format,...) __attribute__((format(printf
static Status FromErrorString(const char *str)
bool SetArchitecture(const ArchSpec &arch_spec, bool set_platform=false, bool merge=true)
Set the architecture for this target.
lldb::ModuleSP GetExecutableModule()
Gets the module for the main executable.
void AddThread(const lldb::ThreadSP &thread_sp)
uint32_t GetSize(bool can_update=true)
lldb::ThreadSP GetThreadAtIndex(uint32_t idx, bool can_update=true)
Represents UUID's of various sizes.
bool SetFromStringRef(llvm::StringRef str)
std::string GetAsString(llvm::StringRef separator="-") const
#define LLDB_INVALID_THREAD_ID
#define LLDB_INVALID_ADDRESS
A class that represents a running process on the host machine.
Log * GetLog(Cat mask)
Retrieve the Log object for the channel associated with the given log enum.
std::shared_ptr< lldb_private::Thread > ThreadSP
std::shared_ptr< lldb_private::Process > ProcessSP
std::shared_ptr< lldb_private::Listener > ListenerSP
std::shared_ptr< lldb_private::Section > SectionSP
std::shared_ptr< lldb_private::Target > TargetSP
std::shared_ptr< lldb_private::Module > ModuleSP
bool Contains(BaseType r) const
BaseType GetRangeBase() const
void SetRangeEnd(BaseType end)
void SetRangeBase(BaseType b)
Set the start value for the range, and keep the same size.
BaseType GetRangeEnd() const
void SetByteSize(SizeType s)