This patch is enough to have shared objects recognized by LLDB. We can handle position independent executables. We can handle dynamically loaded modules brought in via dlopen. The DYLDRendezvous class provides an interface to a structure present in the address space of ELF-based processes. This structure provides the address of a function which is called by the linker each time a shared object is loaded and unloaded (thus a breakpoint at that address will let LLDB intercept such events), a list of entries describing the currently loaded shared objects, plus a few other things. On Linux, processes are brought up with an auxiliary vector on the stack. One element in this vector contains the (possibly dynamic) entry address of the process. One does not need to walk the stack to find this information as it is also available under /proc/<pid>/auxv. The new AuxVector class provides a convenient read-only view of this auxiliary vector information. We use the dynamic entry address and the address as specified in the object file to compute the actual load address of the inferior image. This strategy works for both normal executables and PIE's. llvm-svn: 123592
372 lines
9.9 KiB
C++
372 lines
9.9 KiB
C++
//===-- DynamicLoaderLinux.h ------------------------------------*- C++ -*-===//
|
|
//
|
|
// The LLVM Compiler Infrastructure
|
|
//
|
|
// This file is distributed under the University of Illinois Open Source
|
|
// License. See LICENSE.TXT for details.
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
// C Includes
|
|
// C++ Includes
|
|
#include <iostream>
|
|
|
|
// Other libraries and framework includes
|
|
#include "lldb/Core/PluginManager.h"
|
|
#include "lldb/Core/Log.h"
|
|
#include "lldb/Target/Process.h"
|
|
#include "lldb/Target/Target.h"
|
|
|
|
#include "AuxVector.h"
|
|
#include "DynamicLoaderLinuxDYLD.h"
|
|
|
|
using namespace lldb;
|
|
using namespace lldb_private;
|
|
|
|
void
|
|
DynamicLoaderLinuxDYLD::Initialize()
|
|
{
|
|
PluginManager::RegisterPlugin(GetPluginNameStatic(),
|
|
GetPluginDescriptionStatic(),
|
|
CreateInstance);
|
|
}
|
|
|
|
void
|
|
DynamicLoaderLinuxDYLD::Terminate()
|
|
{
|
|
}
|
|
|
|
const char *
|
|
DynamicLoaderLinuxDYLD::GetPluginName()
|
|
{
|
|
return "DynamicLoaderLinuxDYLD";
|
|
}
|
|
|
|
const char *
|
|
DynamicLoaderLinuxDYLD::GetShortPluginName()
|
|
{
|
|
return "linux-dyld";
|
|
}
|
|
|
|
const char *
|
|
DynamicLoaderLinuxDYLD::GetPluginNameStatic()
|
|
{
|
|
return "dynamic-loader.linux-dyld";
|
|
}
|
|
|
|
const char *
|
|
DynamicLoaderLinuxDYLD::GetPluginDescriptionStatic()
|
|
{
|
|
return "Dynamic loader plug-in that watches for shared library "
|
|
"loads/unloads in Linux processes.";
|
|
}
|
|
|
|
void
|
|
DynamicLoaderLinuxDYLD::GetPluginCommandHelp(const char *command, Stream *strm)
|
|
{
|
|
}
|
|
|
|
uint32_t
|
|
DynamicLoaderLinuxDYLD::GetPluginVersion()
|
|
{
|
|
return 1;
|
|
}
|
|
|
|
DynamicLoader *
|
|
DynamicLoaderLinuxDYLD::CreateInstance(Process *process)
|
|
{
|
|
return new DynamicLoaderLinuxDYLD(process);
|
|
}
|
|
|
|
DynamicLoaderLinuxDYLD::DynamicLoaderLinuxDYLD(Process *process)
|
|
: DynamicLoader(process),
|
|
m_rendezvous(process),
|
|
m_load_offset(LLDB_INVALID_ADDRESS),
|
|
m_entry_point(LLDB_INVALID_ADDRESS),
|
|
m_auxv(NULL)
|
|
{
|
|
}
|
|
|
|
DynamicLoaderLinuxDYLD::~DynamicLoaderLinuxDYLD()
|
|
{
|
|
}
|
|
|
|
void
|
|
DynamicLoaderLinuxDYLD::DidAttach()
|
|
{
|
|
ModuleSP executable;
|
|
addr_t load_offset;
|
|
|
|
m_auxv.reset(new AuxVector(m_process));
|
|
|
|
executable = m_process->GetTarget().GetExecutableModule();
|
|
load_offset = ComputeLoadOffset();
|
|
|
|
if (!executable.empty() && load_offset != LLDB_INVALID_ADDRESS)
|
|
{
|
|
ModuleList module_list;
|
|
module_list.Append(executable);
|
|
UpdateLoadedSections(executable, load_offset);
|
|
m_process->GetTarget().ModulesDidLoad(module_list);
|
|
}
|
|
}
|
|
|
|
void
|
|
DynamicLoaderLinuxDYLD::DidLaunch()
|
|
{
|
|
ModuleSP executable;
|
|
addr_t load_offset;
|
|
|
|
m_auxv.reset(new AuxVector(m_process));
|
|
|
|
executable = m_process->GetTarget().GetExecutableModule();
|
|
load_offset = ComputeLoadOffset();
|
|
|
|
if (!executable.empty() && load_offset != LLDB_INVALID_ADDRESS)
|
|
{
|
|
ModuleList module_list;
|
|
module_list.Append(executable);
|
|
UpdateLoadedSections(executable, load_offset);
|
|
ProbeEntry();
|
|
m_process->GetTarget().ModulesDidLoad(module_list);
|
|
}
|
|
}
|
|
|
|
Error
|
|
DynamicLoaderLinuxDYLD::ExecutePluginCommand(Args &command, Stream *strm)
|
|
{
|
|
return Error();
|
|
}
|
|
|
|
Log *
|
|
DynamicLoaderLinuxDYLD::EnablePluginLogging(Stream *strm, Args &command)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
Error
|
|
DynamicLoaderLinuxDYLD::CanLoadImage()
|
|
{
|
|
return Error();
|
|
}
|
|
|
|
void
|
|
DynamicLoaderLinuxDYLD::UpdateLoadedSections(ModuleSP module, addr_t base_addr)
|
|
{
|
|
ObjectFile *obj_file = module->GetObjectFile();
|
|
SectionList *sections = obj_file->GetSectionList();
|
|
SectionLoadList &load_list = m_process->GetTarget().GetSectionLoadList();
|
|
const size_t num_sections = sections->GetSize();
|
|
|
|
for (unsigned i = 0; i < num_sections; ++i)
|
|
{
|
|
Section *section = sections->GetSectionAtIndex(i).get();
|
|
lldb::addr_t new_load_addr = section->GetFileAddress() + base_addr;
|
|
lldb::addr_t old_load_addr = load_list.GetSectionLoadAddress(section);
|
|
|
|
// If the file address of the section is zero then this is not an
|
|
// allocatable/loadable section (property of ELF sh_addr). Skip it.
|
|
if (new_load_addr == base_addr)
|
|
continue;
|
|
|
|
if (old_load_addr == LLDB_INVALID_ADDRESS ||
|
|
old_load_addr != new_load_addr)
|
|
load_list.SetSectionLoadAddress(section, new_load_addr);
|
|
}
|
|
}
|
|
|
|
void
|
|
DynamicLoaderLinuxDYLD::ProbeEntry()
|
|
{
|
|
Breakpoint *entry_break;
|
|
addr_t entry;
|
|
|
|
if ((entry = GetEntryPoint()) == LLDB_INVALID_ADDRESS)
|
|
return;
|
|
|
|
entry_break = m_process->GetTarget().CreateBreakpoint(entry, true).get();
|
|
entry_break->SetCallback(EntryBreakpointHit, this, true);
|
|
}
|
|
|
|
// The runtime linker has run and initialized the rendezvous structure once the
|
|
// process has hit its entry point. When we hit the corresponding breakpoint we
|
|
// interrogate the rendezvous structure to get the load addresses of all
|
|
// dependent modules for the process. Similarly, we can discover the runtime
|
|
// linker function and setup a breakpoint to notify us of any dynamically loaded
|
|
// modules (via dlopen).
|
|
bool
|
|
DynamicLoaderLinuxDYLD::EntryBreakpointHit(void *baton,
|
|
StoppointCallbackContext *context,
|
|
user_id_t break_id,
|
|
user_id_t break_loc_id)
|
|
{
|
|
DynamicLoaderLinuxDYLD* dyld_instance;
|
|
|
|
dyld_instance = static_cast<DynamicLoaderLinuxDYLD*>(baton);
|
|
dyld_instance->LoadAllCurrentModules();
|
|
dyld_instance->SetRendezvousBreakpoint();
|
|
return false; // Continue running.
|
|
}
|
|
|
|
void
|
|
DynamicLoaderLinuxDYLD::SetRendezvousBreakpoint()
|
|
{
|
|
Breakpoint *dyld_break;
|
|
addr_t break_addr;
|
|
|
|
break_addr = m_rendezvous.GetBreakAddress();
|
|
dyld_break = m_process->GetTarget().CreateBreakpoint(break_addr, true).get();
|
|
dyld_break->SetCallback(RendezvousBreakpointHit, this, true);
|
|
}
|
|
|
|
bool
|
|
DynamicLoaderLinuxDYLD::RendezvousBreakpointHit(void *baton,
|
|
StoppointCallbackContext *context,
|
|
user_id_t break_id,
|
|
user_id_t break_loc_id)
|
|
{
|
|
DynamicLoaderLinuxDYLD* dyld_instance;
|
|
|
|
dyld_instance = static_cast<DynamicLoaderLinuxDYLD*>(baton);
|
|
dyld_instance->RefreshModules();
|
|
|
|
// Return true to stop the target, false to just let the target run.
|
|
return dyld_instance->GetStopWhenImagesChange();
|
|
}
|
|
|
|
void
|
|
DynamicLoaderLinuxDYLD::RefreshModules()
|
|
{
|
|
if (!m_rendezvous.Resolve())
|
|
return;
|
|
|
|
DYLDRendezvous::iterator I;
|
|
DYLDRendezvous::iterator E;
|
|
|
|
ModuleList &loaded_modules = m_process->GetTarget().GetImages();
|
|
|
|
if (m_rendezvous.ModulesDidLoad())
|
|
{
|
|
ModuleList new_modules;
|
|
|
|
E = m_rendezvous.loaded_end();
|
|
for (I = m_rendezvous.loaded_begin(); I != E; ++I)
|
|
{
|
|
FileSpec file(I->path.c_str(), true);
|
|
ModuleSP module_sp = LoadModuleAtAddress(file, I->base_addr);
|
|
if (!module_sp.empty())
|
|
new_modules.Append(module_sp);
|
|
}
|
|
m_process->GetTarget().ModulesDidLoad(new_modules);
|
|
}
|
|
|
|
if (m_rendezvous.ModulesDidUnload())
|
|
{
|
|
ModuleList old_modules;
|
|
|
|
E = m_rendezvous.unloaded_end();
|
|
for (I = m_rendezvous.unloaded_begin(); I != E; ++I)
|
|
{
|
|
FileSpec file(I->path.c_str(), true);
|
|
ModuleSP module_sp = loaded_modules.FindFirstModuleForFileSpec(file);
|
|
if (!module_sp.empty())
|
|
old_modules.Append(module_sp);
|
|
}
|
|
m_process->GetTarget().ModulesDidUnload(old_modules);
|
|
}
|
|
}
|
|
|
|
ThreadPlanSP
|
|
DynamicLoaderLinuxDYLD::GetStepThroughTrampolinePlan(Thread &thread, bool stop_others)
|
|
{
|
|
LogSP log(GetLogIfAnyCategoriesSet(LIBLLDB_LOG_DYNAMIC_LOADER));
|
|
ThreadPlanSP thread_plan_sp;
|
|
|
|
if (log)
|
|
log->PutCString("DynamicLoaderLinuxDYLD: "
|
|
"GetStepThroughTrampolinePlan not implemented\n");
|
|
|
|
return thread_plan_sp;
|
|
}
|
|
|
|
void
|
|
DynamicLoaderLinuxDYLD::LoadAllCurrentModules()
|
|
{
|
|
DYLDRendezvous::iterator I;
|
|
DYLDRendezvous::iterator E;
|
|
ModuleList module_list;
|
|
|
|
if (!m_rendezvous.Resolve())
|
|
return;
|
|
|
|
for (I = m_rendezvous.begin(), E = m_rendezvous.end(); I != E; ++I)
|
|
{
|
|
FileSpec file(I->path.c_str(), false);
|
|
ModuleSP module_sp = LoadModuleAtAddress(file, I->base_addr);
|
|
if (!module_sp.empty())
|
|
module_list.Append(module_sp);
|
|
}
|
|
|
|
m_process->GetTarget().ModulesDidLoad(module_list);
|
|
}
|
|
|
|
ModuleSP
|
|
DynamicLoaderLinuxDYLD::LoadModuleAtAddress(const FileSpec &file, addr_t base_addr)
|
|
{
|
|
Target &target = m_process->GetTarget();
|
|
ModuleList &modules = target.GetImages();
|
|
ModuleSP module_sp;
|
|
|
|
if ((module_sp = modules.FindFirstModuleForFileSpec(file)))
|
|
{
|
|
UpdateLoadedSections(module_sp, base_addr);
|
|
}
|
|
else if ((module_sp = target.GetSharedModule(file, target.GetArchitecture())))
|
|
{
|
|
UpdateLoadedSections(module_sp, base_addr);
|
|
modules.Append(module_sp);
|
|
}
|
|
|
|
return module_sp;
|
|
}
|
|
|
|
addr_t
|
|
DynamicLoaderLinuxDYLD::ComputeLoadOffset()
|
|
{
|
|
addr_t virt_entry;
|
|
|
|
if (m_load_offset != LLDB_INVALID_ADDRESS)
|
|
return m_load_offset;
|
|
|
|
if ((virt_entry = GetEntryPoint()) == LLDB_INVALID_ADDRESS)
|
|
return LLDB_INVALID_ADDRESS;
|
|
|
|
ModuleSP module = m_process->GetTarget().GetExecutableModule();
|
|
ObjectFile *exe = module->GetObjectFile();
|
|
Address file_entry = exe->GetEntryPoint();
|
|
|
|
if (!file_entry.IsValid())
|
|
return LLDB_INVALID_ADDRESS;
|
|
|
|
m_load_offset = virt_entry - file_entry.GetFileAddress();
|
|
return m_load_offset;
|
|
}
|
|
|
|
addr_t
|
|
DynamicLoaderLinuxDYLD::GetEntryPoint()
|
|
{
|
|
if (m_entry_point != LLDB_INVALID_ADDRESS)
|
|
return m_entry_point;
|
|
|
|
if (m_auxv.get() == NULL)
|
|
return LLDB_INVALID_ADDRESS;
|
|
|
|
AuxVector::iterator I = m_auxv->FindEntry(AuxVector::AT_ENTRY);
|
|
|
|
if (I == m_auxv->end())
|
|
return LLDB_INVALID_ADDRESS;
|
|
|
|
m_entry_point = static_cast<addr_t>(I->value);
|
|
return m_entry_point;
|
|
}
|