180814287SRaphael Isemann //===-- DynamicLoaderDarwinKernel.cpp -------------------------------------===//
2d4bfbc9aSGreg Clayton //
32946cd70SChandler Carruth // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
42946cd70SChandler Carruth // See https://llvm.org/LICENSE.txt for license information.
52946cd70SChandler Carruth // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6d4bfbc9aSGreg Clayton //
7d4bfbc9aSGreg Clayton //===----------------------------------------------------------------------===//
8d4bfbc9aSGreg Clayton 
9b9c1b51eSKate Stone #include "Plugins/Platform/MacOSX/PlatformDarwinKernel.h"
10d4bfbc9aSGreg Clayton #include "lldb/Breakpoint/StoppointCallbackContext.h"
11d4bfbc9aSGreg Clayton #include "lldb/Core/Debugger.h"
12d4bfbc9aSGreg Clayton #include "lldb/Core/Module.h"
131f746071SGreg Clayton #include "lldb/Core/ModuleSpec.h"
14d4bfbc9aSGreg Clayton #include "lldb/Core/PluginManager.h"
151f746071SGreg Clayton #include "lldb/Core/Section.h"
1644d93782SGreg Clayton #include "lldb/Core/StreamFile.h"
1741204d09SIlia K #include "lldb/Interpreter/OptionValueProperties.h"
1880552918SZachary Turner #include "lldb/Symbol/LocateSymbolFile.h"
19d4bfbc9aSGreg Clayton #include "lldb/Symbol/ObjectFile.h"
20519b0816SJim Ingham #include "lldb/Target/OperatingSystem.h"
21d4bfbc9aSGreg Clayton #include "lldb/Target/RegisterContext.h"
22b57e4a1bSJason Molenda #include "lldb/Target/StackFrame.h"
23d4bfbc9aSGreg Clayton #include "lldb/Target/Target.h"
24d4bfbc9aSGreg Clayton #include "lldb/Target/Thread.h"
25d4bfbc9aSGreg Clayton #include "lldb/Target/ThreadPlanRunToAddress.h"
26666cc0b2SZachary Turner #include "lldb/Utility/DataBuffer.h"
27666cc0b2SZachary Turner #include "lldb/Utility/DataBufferHeap.h"
28c34698a8SPavel Labath #include "lldb/Utility/LLDBLog.h"
296f9e6901SZachary Turner #include "lldb/Utility/Log.h"
30d821c997SPavel Labath #include "lldb/Utility/State.h"
31d4bfbc9aSGreg Clayton 
32944b828aSGreg Clayton #include "DynamicLoaderDarwinKernel.h"
33d4bfbc9aSGreg Clayton 
34c02b95e4SJason Molenda #include <algorithm>
35e063ecccSJonas Devlieghere #include <memory>
36796ac80bSJonas Devlieghere 
37d4bfbc9aSGreg Clayton //#define ENABLE_DEBUG_PRINTF // COMMENT THIS LINE OUT PRIOR TO CHECKIN
38d4bfbc9aSGreg Clayton #ifdef ENABLE_DEBUG_PRINTF
3976e47d48SRaphael Isemann #include <cstdio>
40d4bfbc9aSGreg Clayton #define DEBUG_PRINTF(fmt, ...) printf(fmt, ##__VA_ARGS__)
41d4bfbc9aSGreg Clayton #else
42d4bfbc9aSGreg Clayton #define DEBUG_PRINTF(fmt, ...)
43d4bfbc9aSGreg Clayton #endif
44d4bfbc9aSGreg Clayton 
45d4bfbc9aSGreg Clayton using namespace lldb;
46d4bfbc9aSGreg Clayton using namespace lldb_private;
47d4bfbc9aSGreg Clayton 
48bba9ba8dSJonas Devlieghere LLDB_PLUGIN_DEFINE(DynamicLoaderDarwinKernel)
49fbb4d1e4SJonas Devlieghere 
5005097246SAdrian Prantl // Progressively greater amounts of scanning we will allow For some targets
5105097246SAdrian Prantl // very early in startup, we can't do any random reads of memory or we can
5205097246SAdrian Prantl // crash the device so a setting is needed that can completely disable the
5305097246SAdrian Prantl // KASLR scans.
546ba6d3d1SJason Molenda 
55b9c1b51eSKate Stone enum KASLRScanType {
566ba6d3d1SJason Molenda   eKASLRScanNone = 0,        // No reading into the inferior at all
57b9c1b51eSKate Stone   eKASLRScanLowgloAddresses, // Check one word of memory for a possible kernel
58b9c1b51eSKate Stone                              // addr, then see if a kernel is there
59b9c1b51eSKate Stone   eKASLRScanNearPC, // Scan backwards from the current $pc looking for kernel;
60b9c1b51eSKate Stone                     // checking at 96 locations total
61b9c1b51eSKate Stone   eKASLRScanExhaustiveScan // Scan through the entire possible kernel address
62b9c1b51eSKate Stone                            // range looking for a kernel
636ba6d3d1SJason Molenda };
646ba6d3d1SJason Molenda 
658fe53c49STatyana Krasnukha static constexpr OptionEnumValueElement g_kaslr_kernel_scan_enum_values[] = {
66e063ecccSJonas Devlieghere     {
67e063ecccSJonas Devlieghere         eKASLRScanNone,
68e063ecccSJonas Devlieghere         "none",
69e063ecccSJonas Devlieghere         "Do not read memory looking for a Darwin kernel when attaching.",
70e063ecccSJonas Devlieghere     },
71e063ecccSJonas Devlieghere     {
72e063ecccSJonas Devlieghere         eKASLRScanLowgloAddresses,
73e063ecccSJonas Devlieghere         "basic",
74e063ecccSJonas Devlieghere         "Check for the Darwin kernel's load addr in the lowglo page "
75e063ecccSJonas Devlieghere         "(boot-args=debug) only.",
76e063ecccSJonas Devlieghere     },
77e063ecccSJonas Devlieghere     {
78e063ecccSJonas Devlieghere         eKASLRScanNearPC,
79e063ecccSJonas Devlieghere         "fast-scan",
80e063ecccSJonas Devlieghere         "Scan near the pc value on attach to find the Darwin kernel's load "
81e063ecccSJonas Devlieghere         "address.",
82e063ecccSJonas Devlieghere     },
83e063ecccSJonas Devlieghere     {
84e063ecccSJonas Devlieghere         eKASLRScanExhaustiveScan,
85e063ecccSJonas Devlieghere         "exhaustive-scan",
86e063ecccSJonas Devlieghere         "Scan through the entire potential address range of Darwin kernel "
87e063ecccSJonas Devlieghere         "(only on 32-bit targets).",
88e063ecccSJonas Devlieghere     },
89e063ecccSJonas Devlieghere };
906ba6d3d1SJason Molenda 
91971f9ca6SJonas Devlieghere #define LLDB_PROPERTIES_dynamicloaderdarwinkernel
926a253d37SJordan Rupprecht #include "DynamicLoaderDarwinKernelProperties.inc"
93e8cd0c98SGreg Clayton 
94971f9ca6SJonas Devlieghere enum {
95971f9ca6SJonas Devlieghere #define LLDB_PROPERTIES_dynamicloaderdarwinkernel
966a253d37SJordan Rupprecht #include "DynamicLoaderDarwinKernelPropertiesEnum.inc"
97971f9ca6SJonas Devlieghere };
98e8cd0c98SGreg Clayton 
99b9c1b51eSKate Stone class DynamicLoaderDarwinKernelProperties : public Properties {
100e8cd0c98SGreg Clayton public:
GetSettingName()101b9c1b51eSKate Stone   static ConstString &GetSettingName() {
102468ea4ebSGreg Clayton     static ConstString g_setting_name("darwin-kernel");
103e8cd0c98SGreg Clayton     return g_setting_name;
104e8cd0c98SGreg Clayton   }
105e8cd0c98SGreg Clayton 
DynamicLoaderDarwinKernelProperties()106b9c1b51eSKate Stone   DynamicLoaderDarwinKernelProperties() : Properties() {
107796ac80bSJonas Devlieghere     m_collection_sp = std::make_shared<OptionValueProperties>(GetSettingName());
108a8ea5955SJonas Devlieghere     m_collection_sp->Initialize(g_dynamicloaderdarwinkernel_properties);
109e8cd0c98SGreg Clayton   }
110e8cd0c98SGreg Clayton 
111fd2433e1SJonas Devlieghere   ~DynamicLoaderDarwinKernelProperties() override = default;
112e8cd0c98SGreg Clayton 
GetLoadKexts() const113b9c1b51eSKate Stone   bool GetLoadKexts() const {
11466763eedSGreg Clayton     const uint32_t idx = ePropertyLoadKexts;
115b9c1b51eSKate Stone     return m_collection_sp->GetPropertyAtIndexAsBoolean(
116a8ea5955SJonas Devlieghere         nullptr, idx,
117a8ea5955SJonas Devlieghere         g_dynamicloaderdarwinkernel_properties[idx].default_uint_value != 0);
118e8cd0c98SGreg Clayton   }
119e8cd0c98SGreg Clayton 
GetScanType() const120b9c1b51eSKate Stone   KASLRScanType GetScanType() const {
1216ba6d3d1SJason Molenda     const uint32_t idx = ePropertyScanType;
122b9c1b51eSKate Stone     return (KASLRScanType)m_collection_sp->GetPropertyAtIndexAsEnumeration(
123a8ea5955SJonas Devlieghere         nullptr, idx,
124a8ea5955SJonas Devlieghere         g_dynamicloaderdarwinkernel_properties[idx].default_uint_value);
1256ba6d3d1SJason Molenda   }
126e8cd0c98SGreg Clayton };
127e8cd0c98SGreg Clayton 
GetGlobalProperties()1283d7161e3SPavel Labath static DynamicLoaderDarwinKernelProperties &GetGlobalProperties() {
1293d7161e3SPavel Labath   static DynamicLoaderDarwinKernelProperties g_settings;
1303d7161e3SPavel Labath   return g_settings;
131e8cd0c98SGreg Clayton }
132e8cd0c98SGreg Clayton 
13305097246SAdrian Prantl // Create an instance of this class. This function is filled into the plugin
13405097246SAdrian Prantl // info class that gets handed out by the plugin factory and allows the lldb to
13505097246SAdrian Prantl // instantiate an instance of this class.
CreateInstance(Process * process,bool force)136b9c1b51eSKate Stone DynamicLoader *DynamicLoaderDarwinKernel::CreateInstance(Process *process,
137b9c1b51eSKate Stone                                                          bool force) {
138b9c1b51eSKate Stone   if (!force) {
13905097246SAdrian Prantl     // If the user provided an executable binary and it is not a kernel, this
14005097246SAdrian Prantl     // plugin should not create an instance.
141d4bfbc9aSGreg Clayton     Module *exe_module = process->GetTarget().GetExecutableModulePointer();
142b9c1b51eSKate Stone     if (exe_module) {
143d4bfbc9aSGreg Clayton       ObjectFile *object_file = exe_module->GetObjectFile();
144b9c1b51eSKate Stone       if (object_file) {
145b9c1b51eSKate Stone         if (object_file->GetStrata() != ObjectFile::eStrataKernel) {
146248a1305SKonrad Kleine           return nullptr;
1476ba6d3d1SJason Molenda         }
148d4bfbc9aSGreg Clayton       }
149d4bfbc9aSGreg Clayton     }
150d4bfbc9aSGreg Clayton 
1516ba6d3d1SJason Molenda     // If the target's architecture does not look like an Apple environment,
1526ba6d3d1SJason Molenda     // this plugin should not create an instance.
153b9c1b51eSKate Stone     const llvm::Triple &triple_ref =
154b9c1b51eSKate Stone         process->GetTarget().GetArchitecture().GetTriple();
155b9c1b51eSKate Stone     switch (triple_ref.getOS()) {
15670512317SGreg Clayton     case llvm::Triple::Darwin:
15770512317SGreg Clayton     case llvm::Triple::MacOSX:
15870512317SGreg Clayton     case llvm::Triple::IOS:
159a814f704SJason Molenda     case llvm::Triple::TvOS:
160a814f704SJason Molenda     case llvm::Triple::WatchOS:
16132762fd2SJason Molenda     // NEED_BRIDGEOS_TRIPLE case llvm::Triple::BridgeOS:
162b9c1b51eSKate Stone       if (triple_ref.getVendor() != llvm::Triple::Apple) {
163248a1305SKonrad Kleine         return nullptr;
1646ba6d3d1SJason Molenda       }
1656ba6d3d1SJason Molenda       break;
16605097246SAdrian Prantl     // If we have triple like armv7-unknown-unknown, we should try looking for
16705097246SAdrian Prantl     // a Darwin kernel.
1686ba6d3d1SJason Molenda     case llvm::Triple::UnknownOS:
16970512317SGreg Clayton       break;
17070512317SGreg Clayton     default:
171248a1305SKonrad Kleine       return nullptr;
17270512317SGreg Clayton       break;
17370512317SGreg Clayton     }
174d4bfbc9aSGreg Clayton   }
1756ba6d3d1SJason Molenda 
176b9c1b51eSKate Stone   // At this point if there is an ExecutableModule, it is a kernel and the
17705097246SAdrian Prantl   // Target is some variant of an Apple system. If the Process hasn't provided
17805097246SAdrian Prantl   // the kernel load address, we need to look around in memory to find it.
1796ba6d3d1SJason Molenda 
180c44bcec6SGreg Clayton   const addr_t kernel_load_address = SearchForDarwinKernel(process);
181b9c1b51eSKate Stone   if (CheckForKernelImageAtAddress(kernel_load_address, process).IsValid()) {
18290ff7911SEwan Crawford     process->SetCanRunCode(false);
183503d0181SJason Molenda     return new DynamicLoaderDarwinKernel(process, kernel_load_address);
184503d0181SJason Molenda   }
185248a1305SKonrad Kleine   return nullptr;
186503d0181SJason Molenda }
187503d0181SJason Molenda 
188503d0181SJason Molenda lldb::addr_t
SearchForDarwinKernel(Process * process)189b9c1b51eSKate Stone DynamicLoaderDarwinKernel::SearchForDarwinKernel(Process *process) {
1906ba6d3d1SJason Molenda   addr_t kernel_load_address = process->GetImageInfoAddress();
191b9c1b51eSKate Stone   if (kernel_load_address == LLDB_INVALID_ADDRESS) {
1926ba6d3d1SJason Molenda     kernel_load_address = SearchForKernelAtSameLoadAddr(process);
193b9c1b51eSKate Stone     if (kernel_load_address == LLDB_INVALID_ADDRESS) {
1946ba6d3d1SJason Molenda       kernel_load_address = SearchForKernelWithDebugHints(process);
195b9c1b51eSKate Stone       if (kernel_load_address == LLDB_INVALID_ADDRESS) {
1966ba6d3d1SJason Molenda         kernel_load_address = SearchForKernelNearPC(process);
197b9c1b51eSKate Stone         if (kernel_load_address == LLDB_INVALID_ADDRESS) {
1986ba6d3d1SJason Molenda           kernel_load_address = SearchForKernelViaExhaustiveSearch(process);
1996ba6d3d1SJason Molenda         }
2006ba6d3d1SJason Molenda       }
2016ba6d3d1SJason Molenda     }
202d4bfbc9aSGreg Clayton   }
203503d0181SJason Molenda   return kernel_load_address;
204d4bfbc9aSGreg Clayton }
205d4bfbc9aSGreg Clayton 
20605097246SAdrian Prantl // Check if the kernel binary is loaded in memory without a slide. First verify
20705097246SAdrian Prantl // that the ExecutableModule is a kernel before we proceed. Returns the address
20805097246SAdrian Prantl // of the kernel if one was found, else LLDB_INVALID_ADDRESS.
2096ba6d3d1SJason Molenda lldb::addr_t
SearchForKernelAtSameLoadAddr(Process * process)210b9c1b51eSKate Stone DynamicLoaderDarwinKernel::SearchForKernelAtSameLoadAddr(Process *process) {
2116ba6d3d1SJason Molenda   Module *exe_module = process->GetTarget().GetExecutableModulePointer();
212248a1305SKonrad Kleine   if (exe_module == nullptr)
2136ba6d3d1SJason Molenda     return LLDB_INVALID_ADDRESS;
2146ba6d3d1SJason Molenda 
2156ba6d3d1SJason Molenda   ObjectFile *exe_objfile = exe_module->GetObjectFile();
216248a1305SKonrad Kleine   if (exe_objfile == nullptr)
2176ba6d3d1SJason Molenda     return LLDB_INVALID_ADDRESS;
2186ba6d3d1SJason Molenda 
219b9c1b51eSKate Stone   if (exe_objfile->GetType() != ObjectFile::eTypeExecutable ||
220b9c1b51eSKate Stone       exe_objfile->GetStrata() != ObjectFile::eStrataKernel)
2216ba6d3d1SJason Molenda     return LLDB_INVALID_ADDRESS;
2226ba6d3d1SJason Molenda 
223d1e3fe21SPavel Labath   if (!exe_objfile->GetBaseAddress().IsValid())
2246ba6d3d1SJason Molenda     return LLDB_INVALID_ADDRESS;
2256ba6d3d1SJason Molenda 
226b9c1b51eSKate Stone   if (CheckForKernelImageAtAddress(
227d1e3fe21SPavel Labath           exe_objfile->GetBaseAddress().GetFileAddress(), process) ==
228b9c1b51eSKate Stone       exe_module->GetUUID())
229d1e3fe21SPavel Labath     return exe_objfile->GetBaseAddress().GetFileAddress();
2306ba6d3d1SJason Molenda 
2316ba6d3d1SJason Molenda   return LLDB_INVALID_ADDRESS;
2326ba6d3d1SJason Molenda }
2336ba6d3d1SJason Molenda 
234b9c1b51eSKate Stone // If the debug flag is included in the boot-args nvram setting, the kernel's
23505097246SAdrian Prantl // load address will be noted in the lowglo page at a fixed address Returns the
23605097246SAdrian Prantl // address of the kernel if one was found, else LLDB_INVALID_ADDRESS.
2376ba6d3d1SJason Molenda lldb::addr_t
SearchForKernelWithDebugHints(Process * process)238b9c1b51eSKate Stone DynamicLoaderDarwinKernel::SearchForKernelWithDebugHints(Process *process) {
2393d7161e3SPavel Labath   if (GetGlobalProperties().GetScanType() == eKASLRScanNone)
2406ba6d3d1SJason Molenda     return LLDB_INVALID_ADDRESS;
2416ba6d3d1SJason Molenda 
24297206d57SZachary Turner   Status read_err;
243b9c1b51eSKate Stone   addr_t kernel_addresses_64[] = {
2443e11d84dSDavide Italiano       0xfffffff000002010ULL,
245b9c1b51eSKate Stone       0xfffffff000004010ULL, // newest arm64 devices
24657086ed7SJason Molenda       0xffffff8000004010ULL, // 2014-2015-ish arm64 devices
24757086ed7SJason Molenda       0xffffff8000002010ULL, // oldest arm64 devices
248880988afSJason Molenda       LLDB_INVALID_ADDRESS};
24961a8e53bSJason Molenda   addr_t kernel_addresses_32[] = {0xffff0110, // 2016 and earlier armv7 devices
250a54d5803SJonas Devlieghere                                   0xffff1010, LLDB_INVALID_ADDRESS};
2512b0a7be9SJason Molenda 
2522b0a7be9SJason Molenda   uint8_t uval[8];
2532b0a7be9SJason Molenda   if (process->GetAddressByteSize() == 8) {
254b9c1b51eSKate Stone   for (size_t i = 0; kernel_addresses_64[i] != LLDB_INVALID_ADDRESS; i++) {
2552b0a7be9SJason Molenda       if (process->ReadMemoryFromInferior (kernel_addresses_64[i], uval, 8, read_err) == 8)
2562b0a7be9SJason Molenda       {
2572b0a7be9SJason Molenda           DataExtractor data (&uval, 8, process->GetByteOrder(), process->GetAddressByteSize());
2582b0a7be9SJason Molenda           offset_t offset = 0;
2592b0a7be9SJason Molenda           uint64_t addr = data.GetU64 (&offset);
260b9c1b51eSKate Stone           if (CheckForKernelImageAtAddress(addr, process).IsValid()) {
261ec504238SJason Molenda               return addr;
262ec504238SJason Molenda           }
2636ba6d3d1SJason Molenda       }
2642b0a7be9SJason Molenda   }
2652b0a7be9SJason Molenda   }
266880988afSJason Molenda 
2672b0a7be9SJason Molenda   if (process->GetAddressByteSize() == 4) {
268b9c1b51eSKate Stone   for (size_t i = 0; kernel_addresses_32[i] != LLDB_INVALID_ADDRESS; i++) {
2692b0a7be9SJason Molenda       if (process->ReadMemoryFromInferior (kernel_addresses_32[i], uval, 4, read_err) == 4)
2702b0a7be9SJason Molenda       {
2712b0a7be9SJason Molenda           DataExtractor data (&uval, 4, process->GetByteOrder(), process->GetAddressByteSize());
2722b0a7be9SJason Molenda           offset_t offset = 0;
2732b0a7be9SJason Molenda           uint32_t addr = data.GetU32 (&offset);
274b9c1b51eSKate Stone           if (CheckForKernelImageAtAddress(addr, process).IsValid()) {
2756ba6d3d1SJason Molenda               return addr;
2766ba6d3d1SJason Molenda           }
2777dd29390SJason Molenda       }
2782b0a7be9SJason Molenda   }
2792b0a7be9SJason Molenda   }
280880988afSJason Molenda 
2816ba6d3d1SJason Molenda   return LLDB_INVALID_ADDRESS;
2826ba6d3d1SJason Molenda }
2836ba6d3d1SJason Molenda 
28405097246SAdrian Prantl // If the kernel is currently executing when lldb attaches, and we don't have a
28505097246SAdrian Prantl // better way of finding the kernel's load address, try searching backwards
2866ba6d3d1SJason Molenda // from the current pc value looking for the kernel's Mach header in memory.
287b9c1b51eSKate Stone // Returns the address of the kernel if one was found, else
288b9c1b51eSKate Stone // LLDB_INVALID_ADDRESS.
2896ba6d3d1SJason Molenda lldb::addr_t
SearchForKernelNearPC(Process * process)290b9c1b51eSKate Stone DynamicLoaderDarwinKernel::SearchForKernelNearPC(Process *process) {
2913d7161e3SPavel Labath   if (GetGlobalProperties().GetScanType() == eKASLRScanNone ||
2923d7161e3SPavel Labath       GetGlobalProperties().GetScanType() == eKASLRScanLowgloAddresses) {
2936ba6d3d1SJason Molenda     return LLDB_INVALID_ADDRESS;
2946ba6d3d1SJason Molenda   }
2956ba6d3d1SJason Molenda 
2966ba6d3d1SJason Molenda   ThreadSP thread = process->GetThreadList().GetSelectedThread();
297248a1305SKonrad Kleine   if (thread.get() == nullptr)
2986ba6d3d1SJason Molenda     return LLDB_INVALID_ADDRESS;
2996ba6d3d1SJason Molenda   addr_t pc = thread->GetRegisterContext()->GetPC(LLDB_INVALID_ADDRESS);
3006ba6d3d1SJason Molenda 
3014cc9ff12SJason Molenda   int ptrsize = process->GetTarget().GetArchitecture().GetAddressByteSize();
3024cc9ff12SJason Molenda 
30303d0b058SJason Molenda   // The kernel is always loaded in high memory, if the top bit is zero,
30403d0b058SJason Molenda   // this isn't a kernel.
3054cc9ff12SJason Molenda   if (ptrsize == 8) {
30603d0b058SJason Molenda     if ((pc & (1ULL << 63)) == 0) {
30703d0b058SJason Molenda       return LLDB_INVALID_ADDRESS;
30803d0b058SJason Molenda     }
30903d0b058SJason Molenda   } else {
31003d0b058SJason Molenda     if ((pc & (1ULL << 31)) == 0) {
31103d0b058SJason Molenda       return LLDB_INVALID_ADDRESS;
31203d0b058SJason Molenda     }
31303d0b058SJason Molenda   }
31403d0b058SJason Molenda 
3156ba6d3d1SJason Molenda   if (pc == LLDB_INVALID_ADDRESS)
3166ba6d3d1SJason Molenda     return LLDB_INVALID_ADDRESS;
3176ba6d3d1SJason Molenda 
3184cc9ff12SJason Molenda   int pagesize = 0x4000;  // 16k pages on 64-bit targets
3194cc9ff12SJason Molenda   if (ptrsize == 4)
3204cc9ff12SJason Molenda     pagesize = 0x1000;    // 4k pages on 32-bit targets
3216ba6d3d1SJason Molenda 
3224cc9ff12SJason Molenda   // The kernel will be loaded on a page boundary.
3234cc9ff12SJason Molenda   // Round the current pc down to the nearest page boundary.
3244cc9ff12SJason Molenda   addr_t addr = pc & ~(pagesize - 1ULL);
3256ba6d3d1SJason Molenda 
3264cc9ff12SJason Molenda   // Search backwards for 32 megabytes, or first memory read error.
3274cc9ff12SJason Molenda   while (pc - addr < 32 * 0x100000) {
3284cc9ff12SJason Molenda     bool read_error;
3294cc9ff12SJason Molenda     if (CheckForKernelImageAtAddress(addr, process, &read_error).IsValid())
3306ba6d3d1SJason Molenda       return addr;
3314cc9ff12SJason Molenda 
3324cc9ff12SJason Molenda     // Stop scanning on the first read error we encounter; we've walked
3334cc9ff12SJason Molenda     // past this executable block of memory.
3344cc9ff12SJason Molenda     if (read_error == true)
3354cc9ff12SJason Molenda       break;
3364cc9ff12SJason Molenda 
3374cc9ff12SJason Molenda     addr -= pagesize;
3386ba6d3d1SJason Molenda   }
3396ba6d3d1SJason Molenda 
3406ba6d3d1SJason Molenda   return LLDB_INVALID_ADDRESS;
3416ba6d3d1SJason Molenda }
3426ba6d3d1SJason Molenda 
34305097246SAdrian Prantl // Scan through the valid address range for a kernel binary. This is uselessly
34405097246SAdrian Prantl // slow in 64-bit environments so we don't even try it. This scan is not
34505097246SAdrian Prantl // enabled by default even for 32-bit targets. Returns the address of the
34605097246SAdrian Prantl // kernel if one was found, else LLDB_INVALID_ADDRESS.
SearchForKernelViaExhaustiveSearch(Process * process)347b9c1b51eSKate Stone lldb::addr_t DynamicLoaderDarwinKernel::SearchForKernelViaExhaustiveSearch(
348b9c1b51eSKate Stone     Process *process) {
3493d7161e3SPavel Labath   if (GetGlobalProperties().GetScanType() != eKASLRScanExhaustiveScan) {
3506ba6d3d1SJason Molenda     return LLDB_INVALID_ADDRESS;
3516ba6d3d1SJason Molenda   }
3526ba6d3d1SJason Molenda 
3536ba6d3d1SJason Molenda   addr_t kernel_range_low, kernel_range_high;
354b9c1b51eSKate Stone   if (process->GetTarget().GetArchitecture().GetAddressByteSize() == 8) {
3556ba6d3d1SJason Molenda     kernel_range_low = 1ULL << 63;
3566ba6d3d1SJason Molenda     kernel_range_high = UINT64_MAX;
357b9c1b51eSKate Stone   } else {
3586ba6d3d1SJason Molenda     kernel_range_low = 1ULL << 31;
3596ba6d3d1SJason Molenda     kernel_range_high = UINT32_MAX;
3606ba6d3d1SJason Molenda   }
3616ba6d3d1SJason Molenda 
3626ba6d3d1SJason Molenda   // Stepping through memory at one-megabyte resolution looking for a kernel
3636ba6d3d1SJason Molenda   // rarely works (fast enough) with a 64-bit address space -- for now, let's
3646ba6d3d1SJason Molenda   // not even bother.  We may be attaching to something which *isn't* a kernel
3656ba6d3d1SJason Molenda   // and we don't want to spin for minutes on-end looking for a kernel.
3666ba6d3d1SJason Molenda   if (process->GetTarget().GetArchitecture().GetAddressByteSize() == 8)
3676ba6d3d1SJason Molenda     return LLDB_INVALID_ADDRESS;
3686ba6d3d1SJason Molenda 
3696ba6d3d1SJason Molenda   addr_t addr = kernel_range_low;
3706ba6d3d1SJason Molenda 
371b9c1b51eSKate Stone   while (addr >= kernel_range_low && addr < kernel_range_high) {
37203d0b058SJason Molenda     // x86_64 kernels are at offset 0
3736ba6d3d1SJason Molenda     if (CheckForKernelImageAtAddress(addr, process).IsValid())
3746ba6d3d1SJason Molenda       return addr;
37503d0b058SJason Molenda     // 32-bit arm kernels are at offset 0x1000 (one 4k page)
3766ba6d3d1SJason Molenda     if (CheckForKernelImageAtAddress(addr + 0x1000, process).IsValid())
3776ba6d3d1SJason Molenda       return addr + 0x1000;
37803d0b058SJason Molenda     // 64-bit arm kernels are at offset 0x4000 (one 16k page)
379a02869deSJason Molenda     if (CheckForKernelImageAtAddress(addr + 0x4000, process).IsValid())
380a02869deSJason Molenda       return addr + 0x4000;
3816ba6d3d1SJason Molenda     addr += 0x100000;
3826ba6d3d1SJason Molenda   }
3836ba6d3d1SJason Molenda   return LLDB_INVALID_ADDRESS;
3846ba6d3d1SJason Molenda }
3856ba6d3d1SJason Molenda 
38687f0f95eSJason Molenda // Read the mach_header struct out of memory and return it.
38787f0f95eSJason Molenda // Returns true if the mach_header was successfully read,
38887f0f95eSJason Molenda // Returns false if there was a problem reading the header, or it was not
38987f0f95eSJason Molenda // a Mach-O header.
39087f0f95eSJason Molenda 
39187f0f95eSJason Molenda bool
ReadMachHeader(addr_t addr,Process * process,llvm::MachO::mach_header & header,bool * read_error)3924cc9ff12SJason Molenda DynamicLoaderDarwinKernel::ReadMachHeader(addr_t addr, Process *process, llvm::MachO::mach_header &header,
3934cc9ff12SJason Molenda                                           bool *read_error) {
3944cc9ff12SJason Molenda   Status error;
3954cc9ff12SJason Molenda   if (read_error)
3964cc9ff12SJason Molenda     *read_error = false;
39787f0f95eSJason Molenda 
39887f0f95eSJason Molenda   // Read the mach header and see whether it looks like a kernel
39957e0cd35SJonas Devlieghere   if (process->ReadMemory(addr, &header, sizeof(header), error) !=
4004cc9ff12SJason Molenda       sizeof(header)) {
4014cc9ff12SJason Molenda     if (read_error)
4024cc9ff12SJason Molenda       *read_error = true;
40387f0f95eSJason Molenda     return false;
4044cc9ff12SJason Molenda   }
40587f0f95eSJason Molenda 
40687f0f95eSJason Molenda   const uint32_t magicks[] = { llvm::MachO::MH_MAGIC_64, llvm::MachO::MH_MAGIC, llvm::MachO::MH_CIGAM, llvm::MachO::MH_CIGAM_64};
40787f0f95eSJason Molenda 
40887f0f95eSJason Molenda   bool found_matching_pattern = false;
409f15014ffSBenjamin Kramer   for (size_t i = 0; i < llvm::array_lengthof (magicks); i++)
41087f0f95eSJason Molenda     if (::memcmp (&header.magic, &magicks[i], sizeof (uint32_t)) == 0)
41187f0f95eSJason Molenda         found_matching_pattern = true;
41287f0f95eSJason Molenda 
413a6682a41SJonas Devlieghere   if (!found_matching_pattern)
41487f0f95eSJason Molenda     return false;
41587f0f95eSJason Molenda 
41687f0f95eSJason Molenda   if (header.magic == llvm::MachO::MH_CIGAM ||
41787f0f95eSJason Molenda       header.magic == llvm::MachO::MH_CIGAM_64) {
41887f0f95eSJason Molenda     header.magic = llvm::ByteSwap_32(header.magic);
41987f0f95eSJason Molenda     header.cputype = llvm::ByteSwap_32(header.cputype);
42087f0f95eSJason Molenda     header.cpusubtype = llvm::ByteSwap_32(header.cpusubtype);
42187f0f95eSJason Molenda     header.filetype = llvm::ByteSwap_32(header.filetype);
42287f0f95eSJason Molenda     header.ncmds = llvm::ByteSwap_32(header.ncmds);
42387f0f95eSJason Molenda     header.sizeofcmds = llvm::ByteSwap_32(header.sizeofcmds);
42487f0f95eSJason Molenda     header.flags = llvm::ByteSwap_32(header.flags);
42587f0f95eSJason Molenda   }
42687f0f95eSJason Molenda 
42787f0f95eSJason Molenda   return true;
42887f0f95eSJason Molenda }
42987f0f95eSJason Molenda 
4306ba6d3d1SJason Molenda // Given an address in memory, look to see if there is a kernel image at that
43187f0f95eSJason Molenda // address.
43287f0f95eSJason Molenda // Returns a UUID; if a kernel was not found at that address, UUID.IsValid()
43387f0f95eSJason Molenda // will be false.
4346ba6d3d1SJason Molenda lldb_private::UUID
CheckForKernelImageAtAddress(lldb::addr_t addr,Process * process,bool * read_error)435b9c1b51eSKate Stone DynamicLoaderDarwinKernel::CheckForKernelImageAtAddress(lldb::addr_t addr,
4364cc9ff12SJason Molenda                                                         Process *process,
4374cc9ff12SJason Molenda                                                         bool *read_error) {
438a007a6d8SPavel Labath   Log *log = GetLog(LLDBLog::DynamicLoader);
4394cc9ff12SJason Molenda   if (addr == LLDB_INVALID_ADDRESS) {
4404cc9ff12SJason Molenda     if (read_error)
4414cc9ff12SJason Molenda       *read_error = true;
4426ba6d3d1SJason Molenda     return UUID();
4434cc9ff12SJason Molenda   }
4446ba6d3d1SJason Molenda 
44563e5fb76SJonas Devlieghere   LLDB_LOGF(log,
44663e5fb76SJonas Devlieghere             "DynamicLoaderDarwinKernel::CheckForKernelImageAtAddress: "
447b9c1b51eSKate Stone             "looking for kernel binary at 0x%" PRIx64,
448b9c1b51eSKate Stone             addr);
449ec504238SJason Molenda 
4506ba6d3d1SJason Molenda   llvm::MachO::mach_header header;
45187f0f95eSJason Molenda 
4524cc9ff12SJason Molenda   if (!ReadMachHeader(addr, process, header, read_error))
4536ba6d3d1SJason Molenda     return UUID();
4546ba6d3d1SJason Molenda 
45587f0f95eSJason Molenda   // First try a quick test -- read the first 4 bytes and see if there is a
45687f0f95eSJason Molenda   // valid Mach-O magic field there
45787f0f95eSJason Molenda   // (the first field of the mach_header/mach_header_64 struct).
458b9c1b51eSKate Stone   // A kernel is an executable which does not have the dynamic link object flag
459b9c1b51eSKate Stone   // set.
460b9c1b51eSKate Stone   if (header.filetype == llvm::MachO::MH_EXECUTE &&
461b9c1b51eSKate Stone       (header.flags & llvm::MachO::MH_DYLDLINK) == 0) {
4626ba6d3d1SJason Molenda     // Create a full module to get the UUID
4638f3be7a3SJonas Devlieghere     ModuleSP memory_module_sp =
4648f3be7a3SJonas Devlieghere         process->ReadModuleFromMemory(FileSpec("temp_mach_kernel"), addr);
4656ba6d3d1SJason Molenda     if (!memory_module_sp.get())
4666ba6d3d1SJason Molenda       return UUID();
4676ba6d3d1SJason Molenda 
4686ba6d3d1SJason Molenda     ObjectFile *exe_objfile = memory_module_sp->GetObjectFile();
469248a1305SKonrad Kleine     if (exe_objfile == nullptr) {
47063e5fb76SJonas Devlieghere       LLDB_LOGF(log,
47163e5fb76SJonas Devlieghere                 "DynamicLoaderDarwinKernel::CheckForKernelImageAtAddress "
472bc22c8d8SJason Molenda                 "found a binary at 0x%" PRIx64
473bc22c8d8SJason Molenda                 " but could not create an object file from memory",
474bc22c8d8SJason Molenda                 addr);
4756ba6d3d1SJason Molenda       return UUID();
476bc22c8d8SJason Molenda     }
4776ba6d3d1SJason Molenda 
478b9c1b51eSKate Stone     if (exe_objfile->GetType() == ObjectFile::eTypeExecutable &&
479b9c1b51eSKate Stone         exe_objfile->GetStrata() == ObjectFile::eStrataKernel) {
480a4ce2538SJason Molenda       ArchSpec kernel_arch(eArchTypeMachO, header.cputype, header.cpusubtype);
481b9c1b51eSKate Stone       if (!process->GetTarget().GetArchitecture().IsCompatibleMatch(
482b9c1b51eSKate Stone               kernel_arch)) {
483a4ce2538SJason Molenda         process->GetTarget().SetArchitecture(kernel_arch);
484a4ce2538SJason Molenda       }
485bc22c8d8SJason Molenda       if (log) {
486bc22c8d8SJason Molenda         std::string uuid_str;
487bc22c8d8SJason Molenda         if (memory_module_sp->GetUUID().IsValid()) {
488bc22c8d8SJason Molenda           uuid_str = "with UUID ";
489bc22c8d8SJason Molenda           uuid_str += memory_module_sp->GetUUID().GetAsString();
490bc22c8d8SJason Molenda         } else {
491bc22c8d8SJason Molenda           uuid_str = "and no LC_UUID found in load commands ";
492bc22c8d8SJason Molenda         }
49363e5fb76SJonas Devlieghere         LLDB_LOGF(
49463e5fb76SJonas Devlieghere             log,
495bc22c8d8SJason Molenda             "DynamicLoaderDarwinKernel::CheckForKernelImageAtAddress: "
496bc22c8d8SJason Molenda             "kernel binary image found at 0x%" PRIx64 " with arch '%s' %s",
497bc22c8d8SJason Molenda             addr, kernel_arch.GetTriple().str().c_str(), uuid_str.c_str());
498bc22c8d8SJason Molenda       }
4996ba6d3d1SJason Molenda       return memory_module_sp->GetUUID();
5006ba6d3d1SJason Molenda     }
5016ba6d3d1SJason Molenda   }
5026ba6d3d1SJason Molenda 
5036ba6d3d1SJason Molenda   return UUID();
5046ba6d3d1SJason Molenda }
5056ba6d3d1SJason Molenda 
506d4bfbc9aSGreg Clayton // Constructor
DynamicLoaderDarwinKernel(Process * process,lldb::addr_t kernel_addr)507b9c1b51eSKate Stone DynamicLoaderDarwinKernel::DynamicLoaderDarwinKernel(Process *process,
508b9c1b51eSKate Stone                                                      lldb::addr_t kernel_addr)
509b9c1b51eSKate Stone     : DynamicLoader(process), m_kernel_load_address(kernel_addr), m_kernel(),
510b9c1b51eSKate Stone       m_kext_summary_header_ptr_addr(), m_kext_summary_header_addr(),
511b9c1b51eSKate Stone       m_kext_summary_header(), m_known_kexts(), m_mutex(),
512b9c1b51eSKate Stone       m_break_id(LLDB_INVALID_BREAK_ID) {
51397206d57SZachary Turner   Status error;
514af921006SPavel Labath   PlatformSP platform_sp =
515af921006SPavel Labath       process->GetTarget().GetDebugger().GetPlatformList().Create(
516af921006SPavel Labath           PlatformDarwinKernel::GetPluginNameStatic());
517a1e97923SJason Molenda   if (platform_sp.get())
5181c627543SJason Molenda     process->GetTarget().SetPlatform(platform_sp);
5191c627543SJason Molenda }
520d4bfbc9aSGreg Clayton 
521d4bfbc9aSGreg Clayton // Destructor
~DynamicLoaderDarwinKernel()522b9c1b51eSKate Stone DynamicLoaderDarwinKernel::~DynamicLoaderDarwinKernel() { Clear(true); }
523d4bfbc9aSGreg Clayton 
UpdateIfNeeded()524b9c1b51eSKate Stone void DynamicLoaderDarwinKernel::UpdateIfNeeded() {
525d4bfbc9aSGreg Clayton   LoadKernelModuleIfNeeded();
526d4bfbc9aSGreg Clayton   SetNotificationBreakpointIfNeeded();
527d4bfbc9aSGreg Clayton }
528d4bfbc9aSGreg Clayton /// Called after attaching a process.
529d4bfbc9aSGreg Clayton ///
530d4bfbc9aSGreg Clayton /// Allow DynamicLoader plug-ins to execute some code after
531d4bfbc9aSGreg Clayton /// attaching to a process.
DidAttach()532b9c1b51eSKate Stone void DynamicLoaderDarwinKernel::DidAttach() {
533d4bfbc9aSGreg Clayton   PrivateInitialize(m_process);
534d4bfbc9aSGreg Clayton   UpdateIfNeeded();
535d4bfbc9aSGreg Clayton }
536d4bfbc9aSGreg Clayton 
537d4bfbc9aSGreg Clayton /// Called after attaching a process.
538d4bfbc9aSGreg Clayton ///
539d4bfbc9aSGreg Clayton /// Allow DynamicLoader plug-ins to execute some code after
540d4bfbc9aSGreg Clayton /// attaching to a process.
DidLaunch()541b9c1b51eSKate Stone void DynamicLoaderDarwinKernel::DidLaunch() {
542d4bfbc9aSGreg Clayton   PrivateInitialize(m_process);
543d4bfbc9aSGreg Clayton   UpdateIfNeeded();
544d4bfbc9aSGreg Clayton }
545d4bfbc9aSGreg Clayton 
546d4bfbc9aSGreg Clayton // Clear out the state of this class.
Clear(bool clear_process)547b9c1b51eSKate Stone void DynamicLoaderDarwinKernel::Clear(bool clear_process) {
54816ff8604SSaleem Abdulrasool   std::lock_guard<std::recursive_mutex> guard(m_mutex);
549d4bfbc9aSGreg Clayton 
550d4bfbc9aSGreg Clayton   if (m_process->IsAlive() && LLDB_BREAK_ID_IS_VALID(m_break_id))
551d4bfbc9aSGreg Clayton     m_process->ClearBreakpointSiteByID(m_break_id);
552d4bfbc9aSGreg Clayton 
553d4bfbc9aSGreg Clayton   if (clear_process)
554248a1305SKonrad Kleine     m_process = nullptr;
555306bd0aaSJason Molenda   m_kernel.Clear();
556306bd0aaSJason Molenda   m_known_kexts.clear();
557d4bfbc9aSGreg Clayton   m_kext_summary_header_ptr_addr.Clear();
558d4bfbc9aSGreg Clayton   m_kext_summary_header_addr.Clear();
559d4bfbc9aSGreg Clayton   m_break_id = LLDB_INVALID_BREAK_ID;
560d4bfbc9aSGreg Clayton }
561d4bfbc9aSGreg Clayton 
LoadImageAtFileAddress(Process * process)562b9c1b51eSKate Stone bool DynamicLoaderDarwinKernel::KextImageInfo::LoadImageAtFileAddress(
563b9c1b51eSKate Stone     Process *process) {
5642af282a1SGreg Clayton   if (IsLoaded())
5652af282a1SGreg Clayton     return true;
5662af282a1SGreg Clayton 
567b9c1b51eSKate Stone   if (m_module_sp) {
5682af282a1SGreg Clayton     bool changed = false;
569751caf65SGreg Clayton     if (m_module_sp->SetLoadAddress(process->GetTarget(), 0, true, changed))
570306bd0aaSJason Molenda       m_load_process_stop_id = process->GetStopID();
5712af282a1SGreg Clayton   }
5722af282a1SGreg Clayton   return false;
5732af282a1SGreg Clayton }
5742af282a1SGreg Clayton 
SetModule(ModuleSP module_sp)575b9c1b51eSKate Stone void DynamicLoaderDarwinKernel::KextImageInfo::SetModule(ModuleSP module_sp) {
576306bd0aaSJason Molenda   m_module_sp = module_sp;
577b9c1b51eSKate Stone   if (module_sp.get() && module_sp->GetObjectFile()) {
578b9c1b51eSKate Stone     if (module_sp->GetObjectFile()->GetType() == ObjectFile::eTypeExecutable &&
579b9c1b51eSKate Stone         module_sp->GetObjectFile()->GetStrata() == ObjectFile::eStrataKernel) {
580306bd0aaSJason Molenda       m_kernel_image = true;
581b9c1b51eSKate Stone     } else {
582306bd0aaSJason Molenda       m_kernel_image = false;
583306bd0aaSJason Molenda     }
584306bd0aaSJason Molenda   }
585306bd0aaSJason Molenda }
586306bd0aaSJason Molenda 
GetModule()587b9c1b51eSKate Stone ModuleSP DynamicLoaderDarwinKernel::KextImageInfo::GetModule() {
588306bd0aaSJason Molenda   return m_module_sp;
589306bd0aaSJason Molenda }
590306bd0aaSJason Molenda 
SetLoadAddress(addr_t load_addr)591b9c1b51eSKate Stone void DynamicLoaderDarwinKernel::KextImageInfo::SetLoadAddress(
592b9c1b51eSKate Stone     addr_t load_addr) {
593306bd0aaSJason Molenda   m_load_address = load_addr;
594306bd0aaSJason Molenda }
595306bd0aaSJason Molenda 
GetLoadAddress() const596b9c1b51eSKate Stone addr_t DynamicLoaderDarwinKernel::KextImageInfo::GetLoadAddress() const {
597306bd0aaSJason Molenda   return m_load_address;
598306bd0aaSJason Molenda }
599306bd0aaSJason Molenda 
GetSize() const600b9c1b51eSKate Stone uint64_t DynamicLoaderDarwinKernel::KextImageInfo::GetSize() const {
601306bd0aaSJason Molenda   return m_size;
602306bd0aaSJason Molenda }
603306bd0aaSJason Molenda 
SetSize(uint64_t size)604b9c1b51eSKate Stone void DynamicLoaderDarwinKernel::KextImageInfo::SetSize(uint64_t size) {
605306bd0aaSJason Molenda   m_size = size;
606306bd0aaSJason Molenda }
607306bd0aaSJason Molenda 
GetProcessStopId() const608b9c1b51eSKate Stone uint32_t DynamicLoaderDarwinKernel::KextImageInfo::GetProcessStopId() const {
609306bd0aaSJason Molenda   return m_load_process_stop_id;
610306bd0aaSJason Molenda }
611306bd0aaSJason Molenda 
SetProcessStopId(uint32_t stop_id)612b9c1b51eSKate Stone void DynamicLoaderDarwinKernel::KextImageInfo::SetProcessStopId(
613b9c1b51eSKate Stone     uint32_t stop_id) {
614306bd0aaSJason Molenda   m_load_process_stop_id = stop_id;
615306bd0aaSJason Molenda }
616306bd0aaSJason Molenda 
617b9c1b51eSKate Stone bool DynamicLoaderDarwinKernel::KextImageInfo::
operator ==(const KextImageInfo & rhs)618b9c1b51eSKate Stone operator==(const KextImageInfo &rhs) {
619b9c1b51eSKate Stone   if (m_uuid.IsValid() || rhs.GetUUID().IsValid()) {
620a6682a41SJonas Devlieghere     return m_uuid == rhs.GetUUID();
621306bd0aaSJason Molenda   }
622306bd0aaSJason Molenda 
623a6682a41SJonas Devlieghere   return m_name == rhs.GetName() && m_load_address == rhs.GetLoadAddress();
624306bd0aaSJason Molenda }
625306bd0aaSJason Molenda 
SetName(const char * name)626b9c1b51eSKate Stone void DynamicLoaderDarwinKernel::KextImageInfo::SetName(const char *name) {
627306bd0aaSJason Molenda   m_name = name;
628306bd0aaSJason Molenda }
629306bd0aaSJason Molenda 
GetName() const630b9c1b51eSKate Stone std::string DynamicLoaderDarwinKernel::KextImageInfo::GetName() const {
631306bd0aaSJason Molenda   return m_name;
632306bd0aaSJason Molenda }
633306bd0aaSJason Molenda 
SetUUID(const UUID & uuid)634b9c1b51eSKate Stone void DynamicLoaderDarwinKernel::KextImageInfo::SetUUID(const UUID &uuid) {
635306bd0aaSJason Molenda   m_uuid = uuid;
636306bd0aaSJason Molenda }
637306bd0aaSJason Molenda 
GetUUID() const638b9c1b51eSKate Stone UUID DynamicLoaderDarwinKernel::KextImageInfo::GetUUID() const {
639306bd0aaSJason Molenda   return m_uuid;
640306bd0aaSJason Molenda }
641306bd0aaSJason Molenda 
642b9c1b51eSKate Stone // Given the m_load_address from the kext summaries, and a UUID, try to create
64305097246SAdrian Prantl // an in-memory Module at that address.  Require that the MemoryModule have a
64405097246SAdrian Prantl // matching UUID and detect if this MemoryModule is a kernel or a kext.
645306bd0aaSJason Molenda //
646306bd0aaSJason Molenda // Returns true if m_memory_module_sp is now set to a valid Module.
647306bd0aaSJason Molenda 
ReadMemoryModule(Process * process)648b9c1b51eSKate Stone bool DynamicLoaderDarwinKernel::KextImageInfo::ReadMemoryModule(
649b9c1b51eSKate Stone     Process *process) {
650a007a6d8SPavel Labath   Log *log = GetLog(LLDBLog::Host);
651248a1305SKonrad Kleine   if (m_memory_module_sp.get() != nullptr)
652306bd0aaSJason Molenda     return true;
653306bd0aaSJason Molenda   if (m_load_address == LLDB_INVALID_ADDRESS)
654306bd0aaSJason Molenda     return false;
655306bd0aaSJason Molenda 
6568f3be7a3SJonas Devlieghere   FileSpec file_spec(m_name.c_str());
657306bd0aaSJason Molenda 
65887f0f95eSJason Molenda   llvm::MachO::mach_header mh;
65987f0f95eSJason Molenda   size_t size_to_read = 512;
66087f0f95eSJason Molenda   if (ReadMachHeader(m_load_address, process, mh)) {
66152cadf0dSDavid Bolvansky     if (mh.magic == llvm::MachO::MH_CIGAM || mh.magic == llvm::MachO::MH_MAGIC)
66287f0f95eSJason Molenda       size_to_read = sizeof(llvm::MachO::mach_header) + mh.sizeofcmds;
66352cadf0dSDavid Bolvansky     if (mh.magic == llvm::MachO::MH_CIGAM_64 ||
66452cadf0dSDavid Bolvansky         mh.magic == llvm::MachO::MH_MAGIC_64)
66587f0f95eSJason Molenda       size_to_read = sizeof(llvm::MachO::mach_header_64) + mh.sizeofcmds;
66687f0f95eSJason Molenda   }
66787f0f95eSJason Molenda 
668b9c1b51eSKate Stone   ModuleSP memory_module_sp =
66987f0f95eSJason Molenda       process->ReadModuleFromMemory(file_spec, m_load_address, size_to_read);
670306bd0aaSJason Molenda 
671248a1305SKonrad Kleine   if (memory_module_sp.get() == nullptr)
672306bd0aaSJason Molenda     return false;
673306bd0aaSJason Molenda 
674306bd0aaSJason Molenda   bool is_kernel = false;
675b9c1b51eSKate Stone   if (memory_module_sp->GetObjectFile()) {
676b9c1b51eSKate Stone     if (memory_module_sp->GetObjectFile()->GetType() ==
677b9c1b51eSKate Stone             ObjectFile::eTypeExecutable &&
678b9c1b51eSKate Stone         memory_module_sp->GetObjectFile()->GetStrata() ==
679b9c1b51eSKate Stone             ObjectFile::eStrataKernel) {
680306bd0aaSJason Molenda       is_kernel = true;
681b9c1b51eSKate Stone     } else if (memory_module_sp->GetObjectFile()->GetType() ==
682b9c1b51eSKate Stone                ObjectFile::eTypeSharedLibrary) {
683306bd0aaSJason Molenda       is_kernel = false;
684306bd0aaSJason Molenda     }
685306bd0aaSJason Molenda   }
686306bd0aaSJason Molenda 
687b9c1b51eSKate Stone   // If this is a kext, and the kernel specified what UUID we should find at
68805097246SAdrian Prantl   // this load address, require that the memory module have a matching UUID or
68905097246SAdrian Prantl   // something has gone wrong and we should discard it.
690b9c1b51eSKate Stone   if (m_uuid.IsValid()) {
691b9c1b51eSKate Stone     if (m_uuid != memory_module_sp->GetUUID()) {
692b9c1b51eSKate Stone       if (log) {
69363e5fb76SJonas Devlieghere         LLDB_LOGF(log,
69463e5fb76SJonas Devlieghere                   "KextImageInfo::ReadMemoryModule the kernel said to find "
695b9c1b51eSKate Stone                   "uuid %s at 0x%" PRIx64
696b9c1b51eSKate Stone                   " but instead we found uuid %s, throwing it away",
697b9c1b51eSKate Stone                   m_uuid.GetAsString().c_str(), m_load_address,
698b9c1b51eSKate Stone                   memory_module_sp->GetUUID().GetAsString().c_str());
69908a3258bSJason Molenda       }
700306bd0aaSJason Molenda       return false;
701306bd0aaSJason Molenda     }
702306bd0aaSJason Molenda   }
703306bd0aaSJason Molenda 
704306bd0aaSJason Molenda   // If the in-memory Module has a UUID, let's use that.
705b9c1b51eSKate Stone   if (!m_uuid.IsValid() && memory_module_sp->GetUUID().IsValid()) {
706306bd0aaSJason Molenda     m_uuid = memory_module_sp->GetUUID();
707306bd0aaSJason Molenda   }
708306bd0aaSJason Molenda 
709306bd0aaSJason Molenda   m_memory_module_sp = memory_module_sp;
710306bd0aaSJason Molenda   m_kernel_image = is_kernel;
711b9c1b51eSKate Stone   if (is_kernel) {
712b9c1b51eSKate Stone     if (log) {
71308a3258bSJason Molenda       // This is unusual and probably not intended
71463e5fb76SJonas Devlieghere       LLDB_LOGF(log,
71563e5fb76SJonas Devlieghere                 "KextImageInfo::ReadMemoryModule read the kernel binary out "
716b9c1b51eSKate Stone                 "of memory");
71708a3258bSJason Molenda     }
718b9c1b51eSKate Stone     if (memory_module_sp->GetArchitecture().IsValid()) {
719306bd0aaSJason Molenda       process->GetTarget().SetArchitecture(memory_module_sp->GetArchitecture());
720306bd0aaSJason Molenda     }
721b9c1b51eSKate Stone     if (m_uuid.IsValid()) {
72248975833SJason Molenda       ModuleSP exe_module_sp = process->GetTarget().GetExecutableModule();
723b9c1b51eSKate Stone       if (exe_module_sp.get() && exe_module_sp->GetUUID().IsValid()) {
724b9c1b51eSKate Stone         if (m_uuid != exe_module_sp->GetUUID()) {
72548975833SJason Molenda           // The user specified a kernel binary that has a different UUID than
72648975833SJason Molenda           // the kernel actually running in memory.  This never ends well;
72748975833SJason Molenda           // clear the user specified kernel binary from the Target.
72848975833SJason Molenda 
72948975833SJason Molenda           m_module_sp.reset();
73048975833SJason Molenda 
73148975833SJason Molenda           ModuleList user_specified_kernel_list;
73248975833SJason Molenda           user_specified_kernel_list.Append(exe_module_sp);
73348975833SJason Molenda           process->GetTarget().GetImages().Remove(user_specified_kernel_list);
73438e70d11SJason Molenda         }
73538e70d11SJason Molenda       }
73638e70d11SJason Molenda     }
737306bd0aaSJason Molenda   }
738306bd0aaSJason Molenda 
739306bd0aaSJason Molenda   return true;
740306bd0aaSJason Molenda }
741306bd0aaSJason Molenda 
IsKernel() const742b9c1b51eSKate Stone bool DynamicLoaderDarwinKernel::KextImageInfo::IsKernel() const {
743a6682a41SJonas Devlieghere   return m_kernel_image;
744306bd0aaSJason Molenda }
745306bd0aaSJason Molenda 
SetIsKernel(bool is_kernel)746b9c1b51eSKate Stone void DynamicLoaderDarwinKernel::KextImageInfo::SetIsKernel(bool is_kernel) {
747306bd0aaSJason Molenda   m_kernel_image = is_kernel;
748306bd0aaSJason Molenda }
749306bd0aaSJason Molenda 
LoadImageUsingMemoryModule(Process * process)750b9c1b51eSKate Stone bool DynamicLoaderDarwinKernel::KextImageInfo::LoadImageUsingMemoryModule(
751b9c1b51eSKate Stone     Process *process) {
752c859e2d5SGreg Clayton   if (IsLoaded())
753c859e2d5SGreg Clayton     return true;
754c859e2d5SGreg Clayton 
755c859e2d5SGreg Clayton   Target &target = process->GetTarget();
75687a04b24SJason Molenda 
75797866d74SJason Molenda   // kexts will have a uuid from the table.
75897866d74SJason Molenda   // for the kernel, we'll need to read the load commands out of memory to get it.
75997866d74SJason Molenda   if (m_uuid.IsValid() == false) {
76097866d74SJason Molenda     if (ReadMemoryModule(process) == false) {
761a007a6d8SPavel Labath       Log *log = GetLog(LLDBLog::DynamicLoader);
76263e5fb76SJonas Devlieghere       LLDB_LOGF(log,
76363e5fb76SJonas Devlieghere                 "Unable to read '%s' from memory at address 0x%" PRIx64
764b9c1b51eSKate Stone                 " to get the segment load addresses.",
765b9c1b51eSKate Stone                 m_name.c_str(), m_load_address);
76687a04b24SJason Molenda       return false;
76787a04b24SJason Molenda     }
76897866d74SJason Molenda   }
76987a04b24SJason Molenda 
77097866d74SJason Molenda   if (IsKernel() && m_uuid.IsValid()) {
7717ca15ba7SLawrence D'Anna     Stream &s = target.GetDebugger().GetOutputStream();
7727ca15ba7SLawrence D'Anna     s.Printf("Kernel UUID: %s\n", m_uuid.GetAsString().c_str());
7737ca15ba7SLawrence D'Anna     s.Printf("Load Address: 0x%" PRIx64 "\n", m_load_address);
774e575e7bcSJason Molenda   }
775e575e7bcSJason Molenda 
776b9c1b51eSKate Stone   if (!m_module_sp) {
777b9c1b51eSKate Stone     // See if the kext has already been loaded into the target, probably by the
778b9c1b51eSKate Stone     // user doing target modules add.
7791759848bSEnrico Granata     const ModuleList &target_images = target.GetImages();
780306bd0aaSJason Molenda     m_module_sp = target_images.FindModule(m_uuid);
781c859e2d5SGreg Clayton 
782306bd0aaSJason Molenda     // Search for the kext on the local filesystem via the UUID
78397866d74SJason Molenda     if (!m_module_sp && m_uuid.IsValid()) {
7842af282a1SGreg Clayton       ModuleSpec module_spec;
785306bd0aaSJason Molenda       module_spec.GetUUID() = m_uuid;
78653667f5dSJason Molenda       module_spec.GetArchitecture() = target.GetArchitecture();
787bb860bd2SJason Molenda 
78805097246SAdrian Prantl       // For the kernel, we really do need an on-disk file copy of the binary
7896602e1fbSJason Molenda       // to do anything useful. This will force a call to dsymForUUID if it
7906602e1fbSJason Molenda       // exists, instead of depending on the DebugSymbols preferences being
7916602e1fbSJason Molenda       // set.
792b9c1b51eSKate Stone       if (IsKernel()) {
793*af91446aSJonas Devlieghere         Status error;
794*af91446aSJonas Devlieghere         if (Symbols::DownloadObjectAndSymbolFile(module_spec, error, true)) {
795dbd7fabaSJonas Devlieghere           if (FileSystem::Instance().Exists(module_spec.GetFileSpec())) {
796796ac80bSJonas Devlieghere             m_module_sp = std::make_shared<Module>(module_spec.GetFileSpec(),
797796ac80bSJonas Devlieghere                                                    target.GetArchitecture());
798bb860bd2SJason Molenda           }
799bb860bd2SJason Molenda         }
800d76fb6eaSJason Molenda       }
801bb860bd2SJason Molenda 
802b9c1b51eSKate Stone       // If the current platform is PlatformDarwinKernel, create a ModuleSpec
80305097246SAdrian Prantl       // with the filename set to be the bundle ID for this kext, e.g.
80405097246SAdrian Prantl       // "com.apple.filesystems.msdosfs", and ask the platform to find it.
8056602e1fbSJason Molenda       // PlatformDarwinKernel does a special scan for kexts on the local
8066602e1fbSJason Molenda       // system.
8071c627543SJason Molenda       PlatformSP platform_sp(target.GetPlatform());
808b9c1b51eSKate Stone       if (!m_module_sp && platform_sp) {
809b9c1b51eSKate Stone         static ConstString g_platform_name(
810b9c1b51eSKate Stone             PlatformDarwinKernel::GetPluginNameStatic());
811a3939e15SPavel Labath         if (platform_sp->GetPluginName() == g_platform_name.GetStringRef()) {
8121c627543SJason Molenda           ModuleSpec kext_bundle_module_spec(module_spec);
8138f3be7a3SJonas Devlieghere           FileSpec kext_filespec(m_name.c_str());
814acbf0058SFrederic Riss           FileSpecList search_paths = target.GetExecutableSearchPaths();
8151c627543SJason Molenda           kext_bundle_module_spec.GetFileSpec() = kext_filespec;
816248a1305SKonrad Kleine           platform_sp->GetSharedModule(kext_bundle_module_spec, process,
817248a1305SKonrad Kleine                                        m_module_sp, &search_paths, nullptr,
818248a1305SKonrad Kleine                                        nullptr);
8191c627543SJason Molenda         }
8201c627543SJason Molenda       }
8211c627543SJason Molenda 
822d76fb6eaSJason Molenda       // Ask the Target to find this file on the local system, if possible.
823bb860bd2SJason Molenda       // This will search in the list of currently-loaded files, look in the
824bb860bd2SJason Molenda       // standard search paths on the system, and on a Mac it will try calling
825bb860bd2SJason Molenda       // the DebugSymbols framework with the UUID to find the binary via its
826bb860bd2SJason Molenda       // search methods.
827b9c1b51eSKate Stone       if (!m_module_sp) {
8281724a179SJason Molenda         m_module_sp = target.GetOrCreateModule(module_spec, true /* notify */);
829306bd0aaSJason Molenda       }
830e575e7bcSJason Molenda 
831b9c1b51eSKate Stone       if (IsKernel() && !m_module_sp) {
8327ca15ba7SLawrence D'Anna         Stream &s = target.GetDebugger().GetOutputStream();
8337ca15ba7SLawrence D'Anna         s.Printf("WARNING: Unable to locate kernel binary on the debugger "
834b9c1b51eSKate Stone                  "system.\n");
835e575e7bcSJason Molenda       }
836e575e7bcSJason Molenda     }
83765d57a3dSJason Molenda 
83805097246SAdrian Prantl     // If we managed to find a module, append it to the target's list of
83905097246SAdrian Prantl     // images. If we also have a memory module, require that they have matching
84005097246SAdrian Prantl     // UUIDs
841b9c1b51eSKate Stone     if (m_module_sp) {
84297866d74SJason Molenda       if (m_uuid.IsValid() && m_module_sp->GetUUID() == m_uuid) {
8436602e1fbSJason Molenda         target.GetImages().AppendIfNeeded(m_module_sp, false);
844b9c1b51eSKate Stone         if (IsKernel() &&
845b9c1b51eSKate Stone             target.GetExecutableModulePointer() != m_module_sp.get()) {
846f9a07e9fSJonas Devlieghere           target.SetExecutableModule(m_module_sp, eLoadDependentsNo);
847306bd0aaSJason Molenda         }
848c859e2d5SGreg Clayton       }
849c859e2d5SGreg Clayton     }
850bb860bd2SJason Molenda   }
851c859e2d5SGreg Clayton 
85297866d74SJason Molenda   // If we've found a binary, read the load commands out of memory so we
85397866d74SJason Molenda   // can set the segment load addresses.
85497866d74SJason Molenda   if (m_module_sp)
85597866d74SJason Molenda     ReadMemoryModule (process);
85697866d74SJason Molenda 
85767408537SGreg Clayton   static ConstString g_section_name_LINKEDIT("__LINKEDIT");
85867408537SGreg Clayton 
859b9c1b51eSKate Stone   if (m_memory_module_sp && m_module_sp) {
860b9c1b51eSKate Stone     if (m_module_sp->GetUUID() == m_memory_module_sp->GetUUID()) {
861306bd0aaSJason Molenda       ObjectFile *ondisk_object_file = m_module_sp->GetObjectFile();
862306bd0aaSJason Molenda       ObjectFile *memory_object_file = m_memory_module_sp->GetObjectFile();
86367408537SGreg Clayton 
864b9c1b51eSKate Stone       if (memory_object_file && ondisk_object_file) {
865b9c1b51eSKate Stone         // The memory_module for kexts may have an invalid __LINKEDIT seg; skip
866b9c1b51eSKate Stone         // it.
867306bd0aaSJason Molenda         const bool ignore_linkedit = !IsKernel();
86867408537SGreg Clayton 
869c859e2d5SGreg Clayton         SectionList *ondisk_section_list = ondisk_object_file->GetSectionList();
870c859e2d5SGreg Clayton         SectionList *memory_section_list = memory_object_file->GetSectionList();
871b9c1b51eSKate Stone         if (memory_section_list && ondisk_section_list) {
872bae2f2f8SGreg Clayton           const uint32_t num_ondisk_sections = ondisk_section_list->GetSize();
87305097246SAdrian Prantl           // There may be CTF sections in the memory image so we can't always
87405097246SAdrian Prantl           // just compare the number of sections (which are actually segments
87505097246SAdrian Prantl           // in mach-o parlance)
876c859e2d5SGreg Clayton           uint32_t sect_idx = 0;
877bae2f2f8SGreg Clayton 
87805097246SAdrian Prantl           // Use the memory_module's addresses for each section to set the file
87905097246SAdrian Prantl           // module's load address as appropriate.  We don't want to use a
88005097246SAdrian Prantl           // single slide value for the entire kext - different segments may be
88105097246SAdrian Prantl           // slid different amounts by the kext loader.
882bae2f2f8SGreg Clayton 
883bae2f2f8SGreg Clayton           uint32_t num_sections_loaded = 0;
884b9c1b51eSKate Stone           for (sect_idx = 0; sect_idx < num_ondisk_sections; ++sect_idx) {
885b9c1b51eSKate Stone             SectionSP ondisk_section_sp(
886b9c1b51eSKate Stone                 ondisk_section_list->GetSectionAtIndex(sect_idx));
887b9c1b51eSKate Stone             if (ondisk_section_sp) {
88867408537SGreg Clayton               // Don't ever load __LINKEDIT as it may or may not be actually
88967408537SGreg Clayton               // mapped into memory and there is no current way to tell.
89067408537SGreg Clayton               // I filed rdar://problem/12851706 to track being able to tell
89167408537SGreg Clayton               // if the __LINKEDIT is actually mapped, but until then, we need
89267408537SGreg Clayton               // to not load the __LINKEDIT
893b9c1b51eSKate Stone               if (ignore_linkedit &&
894b9c1b51eSKate Stone                   ondisk_section_sp->GetName() == g_section_name_LINKEDIT)
89567408537SGreg Clayton                 continue;
89667408537SGreg Clayton 
897b9c1b51eSKate Stone               const Section *memory_section =
898b9c1b51eSKate Stone                   memory_section_list
899b9c1b51eSKate Stone                       ->FindSectionByName(ondisk_section_sp->GetName())
900b9c1b51eSKate Stone                       .get();
901b9c1b51eSKate Stone               if (memory_section) {
902b9c1b51eSKate Stone                 target.SetSectionLoadAddress(ondisk_section_sp,
903b9c1b51eSKate Stone                                              memory_section->GetFileAddress());
904bae2f2f8SGreg Clayton                 ++num_sections_loaded;
905c859e2d5SGreg Clayton               }
906bae2f2f8SGreg Clayton             }
907bae2f2f8SGreg Clayton           }
908bae2f2f8SGreg Clayton           if (num_sections_loaded > 0)
909306bd0aaSJason Molenda             m_load_process_stop_id = process->GetStopID();
910bae2f2f8SGreg Clayton           else
911306bd0aaSJason Molenda             m_module_sp.reset(); // No sections were loaded
912b9c1b51eSKate Stone         } else
913306bd0aaSJason Molenda           m_module_sp.reset(); // One or both section lists
914b9c1b51eSKate Stone       } else
915306bd0aaSJason Molenda         m_module_sp.reset(); // One or both object files missing
916b9c1b51eSKate Stone     } else
917306bd0aaSJason Molenda       m_module_sp.reset(); // UUID mismatch
918c859e2d5SGreg Clayton   }
919c859e2d5SGreg Clayton 
920c859e2d5SGreg Clayton   bool is_loaded = IsLoaded();
921c859e2d5SGreg Clayton 
922b9c1b51eSKate Stone   if (is_loaded && m_module_sp && IsKernel()) {
9237ca15ba7SLawrence D'Anna     Stream &s = target.GetDebugger().GetOutputStream();
924732238cdSJason Molenda     ObjectFile *kernel_object_file = m_module_sp->GetObjectFile();
925b9c1b51eSKate Stone     if (kernel_object_file) {
926b9c1b51eSKate Stone       addr_t file_address =
927d1e3fe21SPavel Labath           kernel_object_file->GetBaseAddress().GetFileAddress();
928b9c1b51eSKate Stone       if (m_load_address != LLDB_INVALID_ADDRESS &&
929b9c1b51eSKate Stone           file_address != LLDB_INVALID_ADDRESS) {
9307ca15ba7SLawrence D'Anna         s.Printf("Kernel slid 0x%" PRIx64 " in memory.\n",
931b9c1b51eSKate Stone                  m_load_address - file_address);
932732238cdSJason Molenda       }
933732238cdSJason Molenda     }
934743e4396SJason Molenda     {
9357ca15ba7SLawrence D'Anna       s.Printf("Loaded kernel file %s\n",
936b5ad4ec7SGreg Clayton                m_module_sp->GetFileSpec().GetPath().c_str());
937743e4396SJason Molenda     }
9387ca15ba7SLawrence D'Anna     s.Flush();
93968b3607fSJason Molenda   }
9407ca15ba7SLawrence D'Anna 
9416602e1fbSJason Molenda   // Notify the target about the module being added;
9426602e1fbSJason Molenda   // set breakpoints, load dSYM scripts, etc. as needed.
9436602e1fbSJason Molenda   if (is_loaded && m_module_sp) {
9446602e1fbSJason Molenda     ModuleList loaded_module_list;
9456602e1fbSJason Molenda     loaded_module_list.Append(m_module_sp);
9466602e1fbSJason Molenda     target.ModulesDidLoad(loaded_module_list);
9476602e1fbSJason Molenda   }
9486602e1fbSJason Molenda 
949c859e2d5SGreg Clayton   return is_loaded;
950c859e2d5SGreg Clayton }
951c859e2d5SGreg Clayton 
GetAddressByteSize()952b9c1b51eSKate Stone uint32_t DynamicLoaderDarwinKernel::KextImageInfo::GetAddressByteSize() {
953306bd0aaSJason Molenda   if (m_memory_module_sp)
954306bd0aaSJason Molenda     return m_memory_module_sp->GetArchitecture().GetAddressByteSize();
955306bd0aaSJason Molenda   if (m_module_sp)
956306bd0aaSJason Molenda     return m_module_sp->GetArchitecture().GetAddressByteSize();
9571f746071SGreg Clayton   return 0;
9581f746071SGreg Clayton }
9591f746071SGreg Clayton 
GetByteOrder()960b9c1b51eSKate Stone lldb::ByteOrder DynamicLoaderDarwinKernel::KextImageInfo::GetByteOrder() {
961306bd0aaSJason Molenda   if (m_memory_module_sp)
962306bd0aaSJason Molenda     return m_memory_module_sp->GetArchitecture().GetByteOrder();
963306bd0aaSJason Molenda   if (m_module_sp)
964306bd0aaSJason Molenda     return m_module_sp->GetArchitecture().GetByteOrder();
9659ccb970fSBruce Mitchener   return endian::InlHostByteOrder();
9661f746071SGreg Clayton }
9671f746071SGreg Clayton 
9681f746071SGreg Clayton lldb_private::ArchSpec
GetArchitecture() const969b9c1b51eSKate Stone DynamicLoaderDarwinKernel::KextImageInfo::GetArchitecture() const {
970306bd0aaSJason Molenda   if (m_memory_module_sp)
971306bd0aaSJason Molenda     return m_memory_module_sp->GetArchitecture();
972306bd0aaSJason Molenda   if (m_module_sp)
973306bd0aaSJason Molenda     return m_module_sp->GetArchitecture();
9741f746071SGreg Clayton   return lldb_private::ArchSpec();
9751f746071SGreg Clayton }
9761f746071SGreg Clayton 
97705097246SAdrian Prantl // Load the kernel module and initialize the "m_kernel" member. Return true
97805097246SAdrian Prantl // _only_ if the kernel is loaded the first time through (subsequent calls to
97905097246SAdrian Prantl // this function should return false after the kernel has been already loaded).
LoadKernelModuleIfNeeded()980b9c1b51eSKate Stone void DynamicLoaderDarwinKernel::LoadKernelModuleIfNeeded() {
981b9c1b51eSKate Stone   if (!m_kext_summary_header_ptr_addr.IsValid()) {
982306bd0aaSJason Molenda     m_kernel.Clear();
983306bd0aaSJason Molenda     m_kernel.SetModule(m_process->GetTarget().GetExecutableModule());
984306bd0aaSJason Molenda     m_kernel.SetIsKernel(true);
9854bd4e7e3SJason Molenda 
9864bd4e7e3SJason Molenda     ConstString kernel_name("mach_kernel");
987b9c1b51eSKate Stone     if (m_kernel.GetModule().get() && m_kernel.GetModule()->GetObjectFile() &&
988b9c1b51eSKate Stone         !m_kernel.GetModule()
989b9c1b51eSKate Stone              ->GetObjectFile()
990b9c1b51eSKate Stone              ->GetFileSpec()
991b9c1b51eSKate Stone              .GetFilename()
992b9c1b51eSKate Stone              .IsEmpty()) {
993b9c1b51eSKate Stone       kernel_name =
994b9c1b51eSKate Stone           m_kernel.GetModule()->GetObjectFile()->GetFileSpec().GetFilename();
9954bd4e7e3SJason Molenda     }
996306bd0aaSJason Molenda     m_kernel.SetName(kernel_name.AsCString());
9974bd4e7e3SJason Molenda 
998b9c1b51eSKate Stone     if (m_kernel.GetLoadAddress() == LLDB_INVALID_ADDRESS) {
999306bd0aaSJason Molenda       m_kernel.SetLoadAddress(m_kernel_load_address);
1000b9c1b51eSKate Stone       if (m_kernel.GetLoadAddress() == LLDB_INVALID_ADDRESS &&
1001b9c1b51eSKate Stone           m_kernel.GetModule()) {
100205097246SAdrian Prantl         // We didn't get a hint from the process, so we will try the kernel at
100305097246SAdrian Prantl         // the address that it exists at in the file if we have one
1004306bd0aaSJason Molenda         ObjectFile *kernel_object_file = m_kernel.GetModule()->GetObjectFile();
1005b9c1b51eSKate Stone         if (kernel_object_file) {
1006b9c1b51eSKate Stone           addr_t load_address =
1007d1e3fe21SPavel Labath               kernel_object_file->GetBaseAddress().GetLoadAddress(
1008b9c1b51eSKate Stone                   &m_process->GetTarget());
1009b9c1b51eSKate Stone           addr_t file_address =
1010d1e3fe21SPavel Labath               kernel_object_file->GetBaseAddress().GetFileAddress();
1011b9c1b51eSKate Stone           if (load_address != LLDB_INVALID_ADDRESS && load_address != 0) {
1012306bd0aaSJason Molenda             m_kernel.SetLoadAddress(load_address);
1013b9c1b51eSKate Stone             if (load_address != file_address) {
10144bd4e7e3SJason Molenda               // Don't accidentally relocate the kernel to the File address --
1015b9c1b51eSKate Stone               // the Load address has already been set to its actual in-memory
101605097246SAdrian Prantl               // address. Mark it as IsLoaded.
1017306bd0aaSJason Molenda               m_kernel.SetProcessStopId(m_process->GetStopID());
10184bd4e7e3SJason Molenda             }
1019b9c1b51eSKate Stone           } else {
1020306bd0aaSJason Molenda             m_kernel.SetLoadAddress(file_address);
10214bd4e7e3SJason Molenda           }
10224bd4e7e3SJason Molenda         }
1023c859e2d5SGreg Clayton       }
1024c859e2d5SGreg Clayton     }
1025c859e2d5SGreg Clayton 
1026b9c1b51eSKate Stone     if (m_kernel.GetLoadAddress() != LLDB_INVALID_ADDRESS) {
1027b9c1b51eSKate Stone       if (!m_kernel.LoadImageUsingMemoryModule(m_process)) {
10282af282a1SGreg Clayton         m_kernel.LoadImageAtFileAddress(m_process);
10292af282a1SGreg Clayton       }
10302af282a1SGreg Clayton     }
1031c859e2d5SGreg Clayton 
1032519b0816SJim Ingham     // The operating system plugin gets loaded and initialized in
103305097246SAdrian Prantl     // LoadImageUsingMemoryModule when we discover the kernel dSYM.  For a core
103405097246SAdrian Prantl     // file in particular, that's the wrong place to do this, since  we haven't
103505097246SAdrian Prantl     // fixed up the section addresses yet.  So let's redo it here.
1036519b0816SJim Ingham     LoadOperatingSystemPlugin(false);
1037519b0816SJim Ingham 
1038b9c1b51eSKate Stone     if (m_kernel.IsLoaded() && m_kernel.GetModule()) {
1039d4bfbc9aSGreg Clayton       static ConstString kext_summary_symbol("gLoadedKextSummaries");
1040b9c1b51eSKate Stone       const Symbol *symbol =
1041b9c1b51eSKate Stone           m_kernel.GetModule()->FindFirstSymbolWithNameAndType(
1042b9c1b51eSKate Stone               kext_summary_symbol, eSymbolTypeData);
1043b9c1b51eSKate Stone       if (symbol) {
1044e7612134SGreg Clayton         m_kext_summary_header_ptr_addr = symbol->GetAddress();
1045d4bfbc9aSGreg Clayton         // Update all image infos
1046d4bfbc9aSGreg Clayton         ReadAllKextSummaries();
1047d4bfbc9aSGreg Clayton       }
1048b9c1b51eSKate Stone     } else {
1049306bd0aaSJason Molenda       m_kernel.Clear();
1050d4bfbc9aSGreg Clayton     }
1051d4bfbc9aSGreg Clayton   }
1052d4bfbc9aSGreg Clayton }
1053d4bfbc9aSGreg Clayton 
1054d4bfbc9aSGreg Clayton // Static callback function that gets called when our DYLD notification
105505097246SAdrian Prantl // breakpoint gets hit. We update all of our image infos and then let our super
105605097246SAdrian Prantl // class DynamicLoader class decide if we should stop or not (based on global
105705097246SAdrian Prantl // preference).
BreakpointHitCallback(void * baton,StoppointCallbackContext * context,user_id_t break_id,user_id_t break_loc_id)1058b9c1b51eSKate Stone bool DynamicLoaderDarwinKernel::BreakpointHitCallback(
1059b9c1b51eSKate Stone     void *baton, StoppointCallbackContext *context, user_id_t break_id,
1060b9c1b51eSKate Stone     user_id_t break_loc_id) {
1061b9c1b51eSKate Stone   return static_cast<DynamicLoaderDarwinKernel *>(baton)->BreakpointHit(
1062b9c1b51eSKate Stone       context, break_id, break_loc_id);
1063d4bfbc9aSGreg Clayton }
1064d4bfbc9aSGreg Clayton 
BreakpointHit(StoppointCallbackContext * context,user_id_t break_id,user_id_t break_loc_id)1065b9c1b51eSKate Stone bool DynamicLoaderDarwinKernel::BreakpointHit(StoppointCallbackContext *context,
1066d4bfbc9aSGreg Clayton                                               user_id_t break_id,
1067b9c1b51eSKate Stone                                               user_id_t break_loc_id) {
1068a007a6d8SPavel Labath   Log *log = GetLog(LLDBLog::DynamicLoader);
106963e5fb76SJonas Devlieghere   LLDB_LOGF(log, "DynamicLoaderDarwinKernel::BreakpointHit (...)\n");
1070d4bfbc9aSGreg Clayton 
1071d4bfbc9aSGreg Clayton   ReadAllKextSummaries();
1072d4bfbc9aSGreg Clayton 
1073d4bfbc9aSGreg Clayton   if (log)
10745160ce5cSGreg Clayton     PutToLog(log);
1075d4bfbc9aSGreg Clayton 
1076d4bfbc9aSGreg Clayton   return GetStopWhenImagesChange();
1077d4bfbc9aSGreg Clayton }
1078d4bfbc9aSGreg Clayton 
ReadKextSummaryHeader()1079b9c1b51eSKate Stone bool DynamicLoaderDarwinKernel::ReadKextSummaryHeader() {
108016ff8604SSaleem Abdulrasool   std::lock_guard<std::recursive_mutex> guard(m_mutex);
1081d4bfbc9aSGreg Clayton 
1082d4bfbc9aSGreg Clayton   // the all image infos is already valid for this process stop ID
1083d4bfbc9aSGreg Clayton 
1084b9c1b51eSKate Stone   if (m_kext_summary_header_ptr_addr.IsValid()) {
1085d4bfbc9aSGreg Clayton     const uint32_t addr_size = m_kernel.GetAddressByteSize();
1086d4bfbc9aSGreg Clayton     const ByteOrder byte_order = m_kernel.GetByteOrder();
108797206d57SZachary Turner     Status error;
108805097246SAdrian Prantl     // Read enough bytes for a "OSKextLoadedKextSummaryHeader" structure which
108905097246SAdrian Prantl     // is currently 4 uint32_t and a pointer.
1090d4bfbc9aSGreg Clayton     uint8_t buf[24];
1091d4bfbc9aSGreg Clayton     DataExtractor data(buf, sizeof(buf), byte_order, addr_size);
1092d4bfbc9aSGreg Clayton     const size_t count = 4 * sizeof(uint32_t) + addr_size;
1093e9fe788dSJason Molenda     const bool force_live_memory = true;
1094b9c1b51eSKate Stone     if (m_process->GetTarget().ReadPointerFromMemory(
1095e9fe788dSJason Molenda             m_kext_summary_header_ptr_addr, error,
1096e9fe788dSJason Molenda             m_kext_summary_header_addr, force_live_memory)) {
1097b9c1b51eSKate Stone       // We got a valid address for our kext summary header and make sure it
1098b9c1b51eSKate Stone       // isn't NULL
1099d4bfbc9aSGreg Clayton       if (m_kext_summary_header_addr.IsValid() &&
1100b9c1b51eSKate Stone           m_kext_summary_header_addr.GetFileAddress() != 0) {
1101b9c1b51eSKate Stone         const size_t bytes_read = m_process->GetTarget().ReadMemory(
1102e9fe788dSJason Molenda             m_kext_summary_header_addr, buf, count, error, force_live_memory);
1103b9c1b51eSKate Stone         if (bytes_read == count) {
1104c7bece56SGreg Clayton           lldb::offset_t offset = 0;
1105d4bfbc9aSGreg Clayton           m_kext_summary_header.version = data.GetU32(&offset);
1106b9c1b51eSKate Stone           if (m_kext_summary_header.version > 128) {
11077ca15ba7SLawrence D'Anna             Stream &s = m_process->GetTarget().GetDebugger().GetOutputStream();
11087ca15ba7SLawrence D'Anna             s.Printf("WARNING: Unable to read kext summary header, got "
1109b9c1b51eSKate Stone                      "improbable version number %u\n",
1110b9c1b51eSKate Stone                      m_kext_summary_header.version);
1111b9c1b51eSKate Stone             // If we get an improbably large version number, we're probably
1112b9c1b51eSKate Stone             // getting bad memory.
1113c6fa5db7SJason Molenda             m_kext_summary_header_addr.Clear();
1114c6fa5db7SJason Molenda             return false;
1115c6fa5db7SJason Molenda           }
1116b9c1b51eSKate Stone           if (m_kext_summary_header.version >= 2) {
1117d4bfbc9aSGreg Clayton             m_kext_summary_header.entry_size = data.GetU32(&offset);
1118b9c1b51eSKate Stone             if (m_kext_summary_header.entry_size > 4096) {
1119b9c1b51eSKate Stone               // If we get an improbably large entry_size, we're probably
1120b9c1b51eSKate Stone               // getting bad memory.
11217ca15ba7SLawrence D'Anna               Stream &s =
11227ca15ba7SLawrence D'Anna                   m_process->GetTarget().GetDebugger().GetOutputStream();
11237ca15ba7SLawrence D'Anna               s.Printf("WARNING: Unable to read kext summary header, got "
1124b9c1b51eSKate Stone                        "improbable entry_size %u\n",
1125b9c1b51eSKate Stone                        m_kext_summary_header.entry_size);
1126c6fa5db7SJason Molenda               m_kext_summary_header_addr.Clear();
1127c6fa5db7SJason Molenda               return false;
1128c6fa5db7SJason Molenda             }
1129b9c1b51eSKate Stone           } else {
113005097246SAdrian Prantl             // Versions less than 2 didn't have an entry size, it was hard
113105097246SAdrian Prantl             // coded
1132b9c1b51eSKate Stone             m_kext_summary_header.entry_size =
1133b9c1b51eSKate Stone                 KERNEL_MODULE_ENTRY_SIZE_VERSION_1;
1134d4bfbc9aSGreg Clayton           }
1135d4bfbc9aSGreg Clayton           m_kext_summary_header.entry_count = data.GetU32(&offset);
1136b9c1b51eSKate Stone           if (m_kext_summary_header.entry_count > 10000) {
1137b9c1b51eSKate Stone             // If we get an improbably large number of kexts, we're probably
1138b9c1b51eSKate Stone             // getting bad memory.
11397ca15ba7SLawrence D'Anna             Stream &s = m_process->GetTarget().GetDebugger().GetOutputStream();
11407ca15ba7SLawrence D'Anna             s.Printf("WARNING: Unable to read kext summary header, got "
1141b9c1b51eSKate Stone                      "improbable number of kexts %u\n",
1142b9c1b51eSKate Stone                      m_kext_summary_header.entry_count);
1143c6fa5db7SJason Molenda             m_kext_summary_header_addr.Clear();
1144c6fa5db7SJason Molenda             return false;
1145c6fa5db7SJason Molenda           }
1146d4bfbc9aSGreg Clayton           return true;
1147d4bfbc9aSGreg Clayton         }
1148d4bfbc9aSGreg Clayton       }
1149d4bfbc9aSGreg Clayton     }
1150d4bfbc9aSGreg Clayton   }
1151d4bfbc9aSGreg Clayton   m_kext_summary_header_addr.Clear();
1152d4bfbc9aSGreg Clayton   return false;
1153d4bfbc9aSGreg Clayton }
1154d4bfbc9aSGreg Clayton 
1155b9c1b51eSKate Stone // We've either (a) just attached to a new kernel, or (b) the kexts-changed
115605097246SAdrian Prantl // breakpoint was hit and we need to figure out what kexts have been added or
115705097246SAdrian Prantl // removed. Read the kext summaries from the inferior kernel memory, compare
115805097246SAdrian Prantl // them against the m_known_kexts vector and update the m_known_kexts vector as
115905097246SAdrian Prantl // needed to keep in sync with the inferior.
1160d4bfbc9aSGreg Clayton 
ParseKextSummaries(const Address & kext_summary_addr,uint32_t count)1161b9c1b51eSKate Stone bool DynamicLoaderDarwinKernel::ParseKextSummaries(
1162b9c1b51eSKate Stone     const Address &kext_summary_addr, uint32_t count) {
1163306bd0aaSJason Molenda   KextImageInfo::collection kext_summaries;
1164a007a6d8SPavel Labath   Log *log = GetLog(LLDBLog::DynamicLoader);
116563e5fb76SJonas Devlieghere   LLDB_LOGF(log,
116663e5fb76SJonas Devlieghere             "Kexts-changed breakpoint hit, there are %d kexts currently.\n",
1167b9c1b51eSKate Stone             count);
1168d4bfbc9aSGreg Clayton 
116916ff8604SSaleem Abdulrasool   std::lock_guard<std::recursive_mutex> guard(m_mutex);
1170d4bfbc9aSGreg Clayton 
1171d4bfbc9aSGreg Clayton   if (!ReadKextSummaries(kext_summary_addr, count, kext_summaries))
1172d4bfbc9aSGreg Clayton     return false;
1173d4bfbc9aSGreg Clayton 
1174b9c1b51eSKate Stone   // read the plugin.dynamic-loader.darwin-kernel.load-kexts setting -- if the
117505097246SAdrian Prantl   // user requested no kext loading, don't print any messages about kexts &
117605097246SAdrian Prantl   // don't try to read them.
11773d7161e3SPavel Labath   const bool load_kexts = GetGlobalProperties().GetLoadKexts();
11784da2e32fSJason Molenda 
1179b9c1b51eSKate Stone   // By default, all kexts we've loaded in the past are marked as "remove" and
118005097246SAdrian Prantl   // all of the kexts we just found out about from ReadKextSummaries are marked
118105097246SAdrian Prantl   // as "add".
1182306bd0aaSJason Molenda   std::vector<bool> to_be_removed(m_known_kexts.size(), true);
1183306bd0aaSJason Molenda   std::vector<bool> to_be_added(count, true);
1184306bd0aaSJason Molenda 
1185306bd0aaSJason Molenda   int number_of_new_kexts_being_added = 0;
1186306bd0aaSJason Molenda   int number_of_old_kexts_being_removed = m_known_kexts.size();
1187306bd0aaSJason Molenda 
1188306bd0aaSJason Molenda   const uint32_t new_kexts_size = kext_summaries.size();
1189306bd0aaSJason Molenda   const uint32_t old_kexts_size = m_known_kexts.size();
1190306bd0aaSJason Molenda 
119105097246SAdrian Prantl   // The m_known_kexts vector may have entries that have been Cleared, or are a
119205097246SAdrian Prantl   // kernel.
1193b9c1b51eSKate Stone   for (uint32_t old_kext = 0; old_kext < old_kexts_size; old_kext++) {
1194306bd0aaSJason Molenda     bool ignore = false;
1195306bd0aaSJason Molenda     KextImageInfo &image_info = m_known_kexts[old_kext];
1196b9c1b51eSKate Stone     if (image_info.IsKernel()) {
1197306bd0aaSJason Molenda       ignore = true;
1198b9c1b51eSKate Stone     } else if (image_info.GetLoadAddress() == LLDB_INVALID_ADDRESS &&
1199b9c1b51eSKate Stone                !image_info.GetModule()) {
1200306bd0aaSJason Molenda       ignore = true;
1201306bd0aaSJason Molenda     }
1202306bd0aaSJason Molenda 
1203b9c1b51eSKate Stone     if (ignore) {
1204306bd0aaSJason Molenda       number_of_old_kexts_being_removed--;
1205306bd0aaSJason Molenda       to_be_removed[old_kext] = false;
1206306bd0aaSJason Molenda     }
1207306bd0aaSJason Molenda   }
1208306bd0aaSJason Molenda 
1209306bd0aaSJason Molenda   // Scan over the list of kexts we just read from the kernel, note those that
1210306bd0aaSJason Molenda   // need to be added and those already loaded.
1211b9c1b51eSKate Stone   for (uint32_t new_kext = 0; new_kext < new_kexts_size; new_kext++) {
1212306bd0aaSJason Molenda     bool add_this_one = true;
1213b9c1b51eSKate Stone     for (uint32_t old_kext = 0; old_kext < old_kexts_size; old_kext++) {
1214b9c1b51eSKate Stone       if (m_known_kexts[old_kext] == kext_summaries[new_kext]) {
1215306bd0aaSJason Molenda         // We already have this kext, don't re-load it.
1216306bd0aaSJason Molenda         to_be_added[new_kext] = false;
1217306bd0aaSJason Molenda         // This kext is still present, do not remove it.
1218306bd0aaSJason Molenda         to_be_removed[old_kext] = false;
1219306bd0aaSJason Molenda 
1220306bd0aaSJason Molenda         number_of_old_kexts_being_removed--;
1221306bd0aaSJason Molenda         add_this_one = false;
1222306bd0aaSJason Molenda         break;
1223306bd0aaSJason Molenda       }
1224306bd0aaSJason Molenda     }
122505097246SAdrian Prantl     // If this "kext" entry is actually an alias for the kernel -- the kext was
122605097246SAdrian Prantl     // compiled into the kernel or something -- then we don't want to load the
122705097246SAdrian Prantl     // kernel's text section at a different address.  Ignore this kext entry.
1228a54d5803SJonas Devlieghere     if (kext_summaries[new_kext].GetUUID().IsValid() &&
1229a54d5803SJonas Devlieghere         m_kernel.GetUUID().IsValid() &&
1230a54d5803SJonas Devlieghere         kext_summaries[new_kext].GetUUID() == m_kernel.GetUUID()) {
1231c1871475SJason Molenda       to_be_added[new_kext] = false;
1232c1871475SJason Molenda       break;
1233c1871475SJason Molenda     }
1234b9c1b51eSKate Stone     if (add_this_one) {
1235306bd0aaSJason Molenda       number_of_new_kexts_being_added++;
1236306bd0aaSJason Molenda     }
1237306bd0aaSJason Molenda   }
1238306bd0aaSJason Molenda 
1239b9c1b51eSKate Stone   if (number_of_new_kexts_being_added == 0 &&
1240b9c1b51eSKate Stone       number_of_old_kexts_being_removed == 0)
1241306bd0aaSJason Molenda     return true;
1242306bd0aaSJason Molenda 
12437ca15ba7SLawrence D'Anna   Stream &s = m_process->GetTarget().GetDebugger().GetOutputStream();
12447ca15ba7SLawrence D'Anna   if (load_kexts) {
1245b9c1b51eSKate Stone     if (number_of_new_kexts_being_added > 0 &&
1246b9c1b51eSKate Stone         number_of_old_kexts_being_removed > 0) {
12477ca15ba7SLawrence D'Anna       s.Printf("Loading %d kext modules and unloading %d kext modules ",
1248b9c1b51eSKate Stone                number_of_new_kexts_being_added,
1249b9c1b51eSKate Stone                number_of_old_kexts_being_removed);
1250b9c1b51eSKate Stone     } else if (number_of_new_kexts_being_added > 0) {
12517ca15ba7SLawrence D'Anna       s.Printf("Loading %d kext modules ", number_of_new_kexts_being_added);
1252b9c1b51eSKate Stone     } else if (number_of_old_kexts_being_removed > 0) {
12537ca15ba7SLawrence D'Anna       s.Printf("Unloading %d kext modules ", number_of_old_kexts_being_removed);
1254306bd0aaSJason Molenda     }
1255306bd0aaSJason Molenda   }
1256306bd0aaSJason Molenda 
1257b9c1b51eSKate Stone   if (log) {
1258b9c1b51eSKate Stone     if (load_kexts) {
125963e5fb76SJonas Devlieghere       LLDB_LOGF(log,
126063e5fb76SJonas Devlieghere                 "DynamicLoaderDarwinKernel::ParseKextSummaries: %d kexts "
1261b9c1b51eSKate Stone                 "added, %d kexts removed",
1262b9c1b51eSKate Stone                 number_of_new_kexts_being_added,
1263b9c1b51eSKate Stone                 number_of_old_kexts_being_removed);
1264b9c1b51eSKate Stone     } else {
126563e5fb76SJonas Devlieghere       LLDB_LOGF(log,
1266b9c1b51eSKate Stone                 "DynamicLoaderDarwinKernel::ParseKextSummaries kext loading is "
1267b9c1b51eSKate Stone                 "disabled, else would have %d kexts added, %d kexts removed",
126863e5fb76SJonas Devlieghere                 number_of_new_kexts_being_added,
126963e5fb76SJonas Devlieghere                 number_of_old_kexts_being_removed);
12704da2e32fSJason Molenda     }
12714da2e32fSJason Molenda   }
12724da2e32fSJason Molenda 
1273c02b95e4SJason Molenda   // Build up a list of <kext-name, uuid> for any kexts that fail to load
1274c02b95e4SJason Molenda   std::vector<std::pair<std::string, UUID>> kexts_failed_to_load;
1275b9c1b51eSKate Stone   if (number_of_new_kexts_being_added > 0) {
1276306bd0aaSJason Molenda     ModuleList loaded_module_list;
1277306bd0aaSJason Molenda 
1278306bd0aaSJason Molenda     const uint32_t num_of_new_kexts = kext_summaries.size();
1279b9c1b51eSKate Stone     for (uint32_t new_kext = 0; new_kext < num_of_new_kexts; new_kext++) {
1280a6682a41SJonas Devlieghere       if (to_be_added[new_kext]) {
1281306bd0aaSJason Molenda         KextImageInfo &image_info = kext_summaries[new_kext];
1282c02b95e4SJason Molenda         bool kext_successfully_added = true;
1283b9c1b51eSKate Stone         if (load_kexts) {
1284b9c1b51eSKate Stone           if (!image_info.LoadImageUsingMemoryModule(m_process)) {
1285a54d5803SJonas Devlieghere             kexts_failed_to_load.push_back(std::pair<std::string, UUID>(
1286c02b95e4SJason Molenda                 kext_summaries[new_kext].GetName(),
1287c02b95e4SJason Molenda                 kext_summaries[new_kext].GetUUID()));
1288306bd0aaSJason Molenda             image_info.LoadImageAtFileAddress(m_process);
1289c02b95e4SJason Molenda             kext_successfully_added = false;
12904da2e32fSJason Molenda           }
12914da2e32fSJason Molenda         }
1292306bd0aaSJason Molenda 
1293306bd0aaSJason Molenda         m_known_kexts.push_back(image_info);
1294306bd0aaSJason Molenda 
1295b9c1b51eSKate Stone         if (image_info.GetModule() &&
1296b9c1b51eSKate Stone             m_process->GetStopID() == image_info.GetProcessStopId())
1297306bd0aaSJason Molenda           loaded_module_list.AppendIfNeeded(image_info.GetModule());
1298d4bfbc9aSGreg Clayton 
12997ca15ba7SLawrence D'Anna         if (load_kexts) {
1300c02b95e4SJason Molenda           if (kext_successfully_added)
13017ca15ba7SLawrence D'Anna             s.Printf(".");
1302c02b95e4SJason Molenda           else
13037ca15ba7SLawrence D'Anna             s.Printf("-");
1304c02b95e4SJason Molenda         }
1305d4bfbc9aSGreg Clayton 
1306d4bfbc9aSGreg Clayton         if (log)
13075160ce5cSGreg Clayton           kext_summaries[new_kext].PutToLog(log);
1308d4bfbc9aSGreg Clayton       }
1309306bd0aaSJason Molenda     }
1310306bd0aaSJason Molenda     m_process->GetTarget().ModulesDidLoad(loaded_module_list);
1311306bd0aaSJason Molenda   }
1312306bd0aaSJason Molenda 
1313b9c1b51eSKate Stone   if (number_of_old_kexts_being_removed > 0) {
1314306bd0aaSJason Molenda     ModuleList loaded_module_list;
1315306bd0aaSJason Molenda     const uint32_t num_of_old_kexts = m_known_kexts.size();
1316b9c1b51eSKate Stone     for (uint32_t old_kext = 0; old_kext < num_of_old_kexts; old_kext++) {
1317306bd0aaSJason Molenda       ModuleList unloaded_module_list;
1318b9c1b51eSKate Stone       if (to_be_removed[old_kext]) {
1319306bd0aaSJason Molenda         KextImageInfo &image_info = m_known_kexts[old_kext];
1320306bd0aaSJason Molenda         // You can't unload the kernel.
1321b9c1b51eSKate Stone         if (!image_info.IsKernel()) {
1322b9c1b51eSKate Stone           if (image_info.GetModule()) {
1323306bd0aaSJason Molenda             unloaded_module_list.AppendIfNeeded(image_info.GetModule());
1324306bd0aaSJason Molenda           }
13257ca15ba7SLawrence D'Anna           s.Printf(".");
1326306bd0aaSJason Molenda           image_info.Clear();
1327b9c1b51eSKate Stone           // should pull it out of the KextImageInfos vector but that would
132805097246SAdrian Prantl           // mutate the list and invalidate the to_be_removed bool vector;
132905097246SAdrian Prantl           // leaving it in place once Cleared() is relatively harmless.
1330306bd0aaSJason Molenda         }
1331306bd0aaSJason Molenda       }
1332095eeaa0SGreg Clayton       m_process->GetTarget().ModulesDidUnload(unloaded_module_list, false);
1333306bd0aaSJason Molenda     }
1334306bd0aaSJason Molenda   }
1335306bd0aaSJason Molenda 
13367ca15ba7SLawrence D'Anna   if (load_kexts) {
13377ca15ba7SLawrence D'Anna     s.Printf(" done.\n");
1338c02b95e4SJason Molenda     if (kexts_failed_to_load.size() > 0 && number_of_new_kexts_being_added > 0) {
13397ca15ba7SLawrence D'Anna       s.Printf("Failed to load %d of %d kexts:\n",
1340c02b95e4SJason Molenda                (int)kexts_failed_to_load.size(),
13412d6e6cbaSJason Molenda                number_of_new_kexts_being_added);
1342c02b95e4SJason Molenda       // print a sorted list of <kext-name, uuid> kexts which failed to load
1343a54d5803SJonas Devlieghere       unsigned longest_name = 0;
1344c02b95e4SJason Molenda       std::sort(kexts_failed_to_load.begin(), kexts_failed_to_load.end());
1345c02b95e4SJason Molenda       for (const auto &ku : kexts_failed_to_load) {
1346c02b95e4SJason Molenda         if (ku.first.size() > longest_name)
1347c02b95e4SJason Molenda           longest_name = ku.first.size();
1348c02b95e4SJason Molenda       }
1349c02b95e4SJason Molenda       for (const auto &ku : kexts_failed_to_load) {
1350c02b95e4SJason Molenda         std::string uuid;
1351c02b95e4SJason Molenda         if (ku.second.IsValid())
1352c02b95e4SJason Molenda           uuid = ku.second.GetAsString();
13537ca15ba7SLawrence D'Anna         s.Printf(" %-*s %s\n", longest_name, ku.first.c_str(), uuid.c_str());
1354c02b95e4SJason Molenda       }
1355c02b95e4SJason Molenda     }
13567ca15ba7SLawrence D'Anna     s.Flush();
135768b3607fSJason Molenda   }
135868b3607fSJason Molenda 
1359306bd0aaSJason Molenda   return true;
1360d4bfbc9aSGreg Clayton }
1361d4bfbc9aSGreg Clayton 
ReadKextSummaries(const Address & kext_summary_addr,uint32_t image_infos_count,KextImageInfo::collection & image_infos)1362b9c1b51eSKate Stone uint32_t DynamicLoaderDarwinKernel::ReadKextSummaries(
1363b9c1b51eSKate Stone     const Address &kext_summary_addr, uint32_t image_infos_count,
1364b9c1b51eSKate Stone     KextImageInfo::collection &image_infos) {
1365d4bfbc9aSGreg Clayton   const ByteOrder endian = m_kernel.GetByteOrder();
1366d4bfbc9aSGreg Clayton   const uint32_t addr_size = m_kernel.GetAddressByteSize();
1367d4bfbc9aSGreg Clayton 
1368d4bfbc9aSGreg Clayton   image_infos.resize(image_infos_count);
1369d4bfbc9aSGreg Clayton   const size_t count = image_infos.size() * m_kext_summary_header.entry_size;
1370d4bfbc9aSGreg Clayton   DataBufferHeap data(count, 0);
137197206d57SZachary Turner   Status error;
1372d4bfbc9aSGreg Clayton 
1373e9fe788dSJason Molenda   const bool force_live_memory = true;
1374b9c1b51eSKate Stone   const size_t bytes_read = m_process->GetTarget().ReadMemory(
1375e9fe788dSJason Molenda       kext_summary_addr, data.GetBytes(), data.GetByteSize(), error, force_live_memory);
1376b9c1b51eSKate Stone   if (bytes_read == count) {
1377d4bfbc9aSGreg Clayton 
1378b9c1b51eSKate Stone     DataExtractor extractor(data.GetBytes(), data.GetByteSize(), endian,
1379b9c1b51eSKate Stone                             addr_size);
1380d4bfbc9aSGreg Clayton     uint32_t i = 0;
1381d4bfbc9aSGreg Clayton     for (uint32_t kext_summary_offset = 0;
1382b9c1b51eSKate Stone          i < image_infos.size() &&
1383b9c1b51eSKate Stone          extractor.ValidOffsetForDataOfSize(kext_summary_offset,
1384b9c1b51eSKate Stone                                             m_kext_summary_header.entry_size);
1385b9c1b51eSKate Stone          ++i, kext_summary_offset += m_kext_summary_header.entry_size) {
1386c7bece56SGreg Clayton       lldb::offset_t offset = kext_summary_offset;
1387b9c1b51eSKate Stone       const void *name_data =
1388b9c1b51eSKate Stone           extractor.GetData(&offset, KERNEL_MODULE_MAX_NAME);
1389248a1305SKonrad Kleine       if (name_data == nullptr)
1390d4bfbc9aSGreg Clayton         break;
1391306bd0aaSJason Molenda       image_infos[i].SetName((const char *)name_data);
13922f93fd1fSPavel Labath       UUID uuid = UUID::fromOptionalData(extractor.GetData(&offset, 16), 16);
1393306bd0aaSJason Molenda       image_infos[i].SetUUID(uuid);
1394306bd0aaSJason Molenda       image_infos[i].SetLoadAddress(extractor.GetU64(&offset));
1395306bd0aaSJason Molenda       image_infos[i].SetSize(extractor.GetU64(&offset));
1396d4bfbc9aSGreg Clayton     }
1397d4bfbc9aSGreg Clayton     if (i < image_infos.size())
1398d4bfbc9aSGreg Clayton       image_infos.resize(i);
1399b9c1b51eSKate Stone   } else {
1400d4bfbc9aSGreg Clayton     image_infos.clear();
1401d4bfbc9aSGreg Clayton   }
1402d4bfbc9aSGreg Clayton   return image_infos.size();
1403d4bfbc9aSGreg Clayton }
1404d4bfbc9aSGreg Clayton 
ReadAllKextSummaries()1405b9c1b51eSKate Stone bool DynamicLoaderDarwinKernel::ReadAllKextSummaries() {
140616ff8604SSaleem Abdulrasool   std::lock_guard<std::recursive_mutex> guard(m_mutex);
1407d4bfbc9aSGreg Clayton 
1408b9c1b51eSKate Stone   if (ReadKextSummaryHeader()) {
1409b9c1b51eSKate Stone     if (m_kext_summary_header.entry_count > 0 &&
1410b9c1b51eSKate Stone         m_kext_summary_header_addr.IsValid()) {
1411d4bfbc9aSGreg Clayton       Address summary_addr(m_kext_summary_header_addr);
1412d4bfbc9aSGreg Clayton       summary_addr.Slide(m_kext_summary_header.GetSize());
1413b9c1b51eSKate Stone       if (!ParseKextSummaries(summary_addr,
1414b9c1b51eSKate Stone                               m_kext_summary_header.entry_count)) {
1415306bd0aaSJason Molenda         m_known_kexts.clear();
1416d4bfbc9aSGreg Clayton       }
1417d4bfbc9aSGreg Clayton       return true;
1418d4bfbc9aSGreg Clayton     }
1419d4bfbc9aSGreg Clayton   }
1420d4bfbc9aSGreg Clayton   return false;
1421d4bfbc9aSGreg Clayton }
1422d4bfbc9aSGreg Clayton 
1423d4bfbc9aSGreg Clayton // Dump an image info structure to the file handle provided.
PutToLog(Log * log) const1424b9c1b51eSKate Stone void DynamicLoaderDarwinKernel::KextImageInfo::PutToLog(Log *log) const {
1425b9c1b51eSKate Stone   if (m_load_address == LLDB_INVALID_ADDRESS) {
1426fbb14285SPavel Labath     LLDB_LOG(log, "uuid={0} name=\"{1}\" (UNLOADED)", m_uuid.GetAsString(),
1427fbb14285SPavel Labath              m_name);
1428b9c1b51eSKate Stone   } else {
1429fbb14285SPavel Labath     LLDB_LOG(log, "addr={0:x+16} size={1:x+16} uuid={2} name=\"{3}\"",
1430fbb14285SPavel Labath         m_load_address, m_size, m_uuid.GetAsString(), m_name);
1431d4bfbc9aSGreg Clayton   }
1432d4bfbc9aSGreg Clayton }
1433d4bfbc9aSGreg Clayton 
143405097246SAdrian Prantl // Dump the _dyld_all_image_infos members and all current image infos that we
143505097246SAdrian Prantl // have parsed to the file handle provided.
PutToLog(Log * log) const1436b9c1b51eSKate Stone void DynamicLoaderDarwinKernel::PutToLog(Log *log) const {
1437248a1305SKonrad Kleine   if (log == nullptr)
1438d4bfbc9aSGreg Clayton     return;
1439d4bfbc9aSGreg Clayton 
144016ff8604SSaleem Abdulrasool   std::lock_guard<std::recursive_mutex> guard(m_mutex);
144163e5fb76SJonas Devlieghere   LLDB_LOGF(log,
144263e5fb76SJonas Devlieghere             "gLoadedKextSummaries = 0x%16.16" PRIx64
1443b9c1b51eSKate Stone             " { version=%u, entry_size=%u, entry_count=%u }",
1444d4bfbc9aSGreg Clayton             m_kext_summary_header_addr.GetFileAddress(),
1445b9c1b51eSKate Stone             m_kext_summary_header.version, m_kext_summary_header.entry_size,
1446d4bfbc9aSGreg Clayton             m_kext_summary_header.entry_count);
1447d4bfbc9aSGreg Clayton 
1448d4bfbc9aSGreg Clayton   size_t i;
1449306bd0aaSJason Molenda   const size_t count = m_known_kexts.size();
1450b9c1b51eSKate Stone   if (count > 0) {
1451d4bfbc9aSGreg Clayton     log->PutCString("Loaded:");
1452d4bfbc9aSGreg Clayton     for (i = 0; i < count; i++)
1453306bd0aaSJason Molenda       m_known_kexts[i].PutToLog(log);
1454d4bfbc9aSGreg Clayton   }
1455d4bfbc9aSGreg Clayton }
1456d4bfbc9aSGreg Clayton 
PrivateInitialize(Process * process)1457b9c1b51eSKate Stone void DynamicLoaderDarwinKernel::PrivateInitialize(Process *process) {
1458b9c1b51eSKate Stone   DEBUG_PRINTF("DynamicLoaderDarwinKernel::%s() process state = %s\n",
1459b9c1b51eSKate Stone                __FUNCTION__, StateAsCString(m_process->GetState()));
1460d4bfbc9aSGreg Clayton   Clear(true);
1461d4bfbc9aSGreg Clayton   m_process = process;
1462d4bfbc9aSGreg Clayton }
1463d4bfbc9aSGreg Clayton 
SetNotificationBreakpointIfNeeded()1464b9c1b51eSKate Stone void DynamicLoaderDarwinKernel::SetNotificationBreakpointIfNeeded() {
1465b9c1b51eSKate Stone   if (m_break_id == LLDB_INVALID_BREAK_ID && m_kernel.GetModule()) {
1466b9c1b51eSKate Stone     DEBUG_PRINTF("DynamicLoaderDarwinKernel::%s() process state = %s\n",
1467b9c1b51eSKate Stone                  __FUNCTION__, StateAsCString(m_process->GetState()));
1468d4bfbc9aSGreg Clayton 
1469a8558b62SJim Ingham     const bool internal_bp = true;
1470eb023e75SGreg Clayton     const bool hardware = false;
1471d4bfbc9aSGreg Clayton     const LazyBool skip_prologue = eLazyBoolNo;
1472969795f1SJim Ingham     FileSpecList module_spec_list;
1473306bd0aaSJason Molenda     module_spec_list.Append(m_kernel.GetModule()->GetFileSpec());
1474b9c1b51eSKate Stone     Breakpoint *bp =
1475b9c1b51eSKate Stone         m_process->GetTarget()
1476248a1305SKonrad Kleine             .CreateBreakpoint(&module_spec_list, nullptr,
1477d4bfbc9aSGreg Clayton                               "OSKextLoadedKextSummariesUpdated",
1478b9c1b51eSKate Stone                               eFunctionNameTypeFull, eLanguageTypeUnknown, 0,
1479b9c1b51eSKate Stone                               skip_prologue, internal_bp, hardware)
1480b9c1b51eSKate Stone             .get();
1481d4bfbc9aSGreg Clayton 
1482b9c1b51eSKate Stone     bp->SetCallback(DynamicLoaderDarwinKernel::BreakpointHitCallback, this,
1483b9c1b51eSKate Stone                     true);
1484d4bfbc9aSGreg Clayton     m_break_id = bp->GetID();
1485d4bfbc9aSGreg Clayton   }
1486d4bfbc9aSGreg Clayton }
1487d4bfbc9aSGreg Clayton 
1488d4bfbc9aSGreg Clayton // Member function that gets called when the process state changes.
PrivateProcessStateChanged(Process * process,StateType state)1489b9c1b51eSKate Stone void DynamicLoaderDarwinKernel::PrivateProcessStateChanged(Process *process,
1490b9c1b51eSKate Stone                                                            StateType state) {
1491b9c1b51eSKate Stone   DEBUG_PRINTF("DynamicLoaderDarwinKernel::%s(%s)\n", __FUNCTION__,
1492b9c1b51eSKate Stone                StateAsCString(state));
1493b9c1b51eSKate Stone   switch (state) {
1494d4bfbc9aSGreg Clayton   case eStateConnected:
1495d4bfbc9aSGreg Clayton   case eStateAttaching:
1496d4bfbc9aSGreg Clayton   case eStateLaunching:
1497d4bfbc9aSGreg Clayton   case eStateInvalid:
1498d4bfbc9aSGreg Clayton   case eStateUnloaded:
1499d4bfbc9aSGreg Clayton   case eStateExited:
1500d4bfbc9aSGreg Clayton   case eStateDetached:
1501d4bfbc9aSGreg Clayton     Clear(false);
1502d4bfbc9aSGreg Clayton     break;
1503d4bfbc9aSGreg Clayton 
1504d4bfbc9aSGreg Clayton   case eStateStopped:
1505d4bfbc9aSGreg Clayton     UpdateIfNeeded();
1506d4bfbc9aSGreg Clayton     break;
1507d4bfbc9aSGreg Clayton 
1508d4bfbc9aSGreg Clayton   case eStateRunning:
1509d4bfbc9aSGreg Clayton   case eStateStepping:
1510d4bfbc9aSGreg Clayton   case eStateCrashed:
1511d4bfbc9aSGreg Clayton   case eStateSuspended:
1512d4bfbc9aSGreg Clayton     break;
1513d4bfbc9aSGreg Clayton   }
1514d4bfbc9aSGreg Clayton }
1515d4bfbc9aSGreg Clayton 
1516d4bfbc9aSGreg Clayton ThreadPlanSP
GetStepThroughTrampolinePlan(Thread & thread,bool stop_others)1517b9c1b51eSKate Stone DynamicLoaderDarwinKernel::GetStepThroughTrampolinePlan(Thread &thread,
1518b9c1b51eSKate Stone                                                         bool stop_others) {
1519d4bfbc9aSGreg Clayton   ThreadPlanSP thread_plan_sp;
1520a007a6d8SPavel Labath   Log *log = GetLog(LLDBLog::Step);
152163e5fb76SJonas Devlieghere   LLDB_LOGF(log, "Could not find symbol for step through.");
1522d4bfbc9aSGreg Clayton   return thread_plan_sp;
1523d4bfbc9aSGreg Clayton }
1524d4bfbc9aSGreg Clayton 
CanLoadImage()152597206d57SZachary Turner Status DynamicLoaderDarwinKernel::CanLoadImage() {
152697206d57SZachary Turner   Status error;
1527b9c1b51eSKate Stone   error.SetErrorString(
1528b9c1b51eSKate Stone       "always unsafe to load or unload shared libraries in the darwin kernel");
1529d4bfbc9aSGreg Clayton   return error;
1530d4bfbc9aSGreg Clayton }
1531d4bfbc9aSGreg Clayton 
Initialize()1532b9c1b51eSKate Stone void DynamicLoaderDarwinKernel::Initialize() {
1533d4bfbc9aSGreg Clayton   PluginManager::RegisterPlugin(GetPluginNameStatic(),
1534b9c1b51eSKate Stone                                 GetPluginDescriptionStatic(), CreateInstance,
1535e8cd0c98SGreg Clayton                                 DebuggerInitialize);
1536d4bfbc9aSGreg Clayton }
1537d4bfbc9aSGreg Clayton 
Terminate()1538b9c1b51eSKate Stone void DynamicLoaderDarwinKernel::Terminate() {
1539d4bfbc9aSGreg Clayton   PluginManager::UnregisterPlugin(CreateInstance);
1540d4bfbc9aSGreg Clayton }
1541d4bfbc9aSGreg Clayton 
DebuggerInitialize(lldb_private::Debugger & debugger)1542b9c1b51eSKate Stone void DynamicLoaderDarwinKernel::DebuggerInitialize(
1543b9c1b51eSKate Stone     lldb_private::Debugger &debugger) {
1544b9c1b51eSKate Stone   if (!PluginManager::GetSettingForDynamicLoaderPlugin(
1545b9c1b51eSKate Stone           debugger, DynamicLoaderDarwinKernelProperties::GetSettingName())) {
1546e8cd0c98SGreg Clayton     const bool is_global_setting = true;
1547b9c1b51eSKate Stone     PluginManager::CreateSettingForDynamicLoaderPlugin(
15483d7161e3SPavel Labath         debugger, GetGlobalProperties().GetValueProperties(),
1549e8cd0c98SGreg Clayton         ConstString("Properties for the DynamicLoaderDarwinKernel plug-in."),
1550e8cd0c98SGreg Clayton         is_global_setting);
1551e8cd0c98SGreg Clayton   }
1552e8cd0c98SGreg Clayton }
1553d4bfbc9aSGreg Clayton 
GetPluginDescriptionStatic()15546fa1b4ffSPavel Labath llvm::StringRef DynamicLoaderDarwinKernel::GetPluginDescriptionStatic() {
1555b9c1b51eSKate Stone   return "Dynamic loader plug-in that watches for shared library loads/unloads "
1556b9c1b51eSKate Stone          "in the MacOSX kernel.";
1557d4bfbc9aSGreg Clayton }
1558d4bfbc9aSGreg Clayton 
15591f746071SGreg Clayton lldb::ByteOrder
GetByteOrderFromMagic(uint32_t magic)1560b9c1b51eSKate Stone DynamicLoaderDarwinKernel::GetByteOrderFromMagic(uint32_t magic) {
1561b9c1b51eSKate Stone   switch (magic) {
1562510938e5SCharles Davis   case llvm::MachO::MH_MAGIC:
1563510938e5SCharles Davis   case llvm::MachO::MH_MAGIC_64:
15649ccb970fSBruce Mitchener     return endian::InlHostByteOrder();
15651f746071SGreg Clayton 
1566510938e5SCharles Davis   case llvm::MachO::MH_CIGAM:
1567510938e5SCharles Davis   case llvm::MachO::MH_CIGAM_64:
15689ccb970fSBruce Mitchener     if (endian::InlHostByteOrder() == lldb::eByteOrderBig)
15691f746071SGreg Clayton       return lldb::eByteOrderLittle;
15701f746071SGreg Clayton     else
15711f746071SGreg Clayton       return lldb::eByteOrderBig;
15721f746071SGreg Clayton 
15731f746071SGreg Clayton   default:
15741f746071SGreg Clayton     break;
15751f746071SGreg Clayton   }
15761f746071SGreg Clayton   return lldb::eByteOrderInvalid;
15771f746071SGreg Clayton }
1578