Lines Matching +defs:process +defs:name
152 DynamicLoader *DynamicLoaderDarwinKernel::CreateInstance(Process *process,
157 Module *exec = process->GetTarget().GetExecutableModulePointer();
164 process->GetTarget().GetArchitecture().GetTriple();
190 const addr_t kernel_load_address = SearchForDarwinKernel(process);
191 if (CheckForKernelImageAtAddress(kernel_load_address, process).IsValid()) {
192 return new DynamicLoaderDarwinKernel(process, kernel_load_address);
198 DynamicLoaderDarwinKernel::SearchForDarwinKernel(Process *process) {
199 addr_t kernel_load_address = process->GetImageInfoAddress();
201 kernel_load_address = SearchForKernelAtSameLoadAddr(process);
203 kernel_load_address = SearchForKernelWithDebugHints(process);
205 kernel_load_address = SearchForKernelNearPC(process);
207 kernel_load_address = SearchForKernelViaExhaustiveSearch(process);
216 DynamicLoaderDarwinKernel::SearchForKernelAtSameLoadAddr(Process *process) {
217 Module *exe_module = process->GetTarget().GetExecutableModulePointer();
219 if (!is_kernel(process->GetTarget().GetExecutableModulePointer()))
228 exe_objfile->GetBaseAddress().GetFileAddress(), process) ==
239 DynamicLoaderDarwinKernel::SearchForKernelWithDebugHints(Process *process) {
254 if (process->GetAddressByteSize() == 8) {
256 if (process->ReadMemoryFromInferior (kernel_addresses_64[i], uval, 8, read_err) == 8)
258 DataExtractor data (&uval, 8, process->GetByteOrder(), process->GetAddressByteSize());
261 if (CheckForKernelImageAtAddress(addr, process).IsValid()) {
268 if (process->GetAddressByteSize() == 4) {
270 if (process->ReadMemoryFromInferior (kernel_addresses_32[i], uval, 4, read_err) == 4)
272 DataExtractor data (&uval, 4, process->GetByteOrder(), process->GetAddressByteSize());
275 if (CheckForKernelImageAtAddress(addr, process).IsValid()) {
291 DynamicLoaderDarwinKernel::SearchForKernelNearPC(Process *process) {
297 ThreadSP thread = process->GetThreadList().GetSelectedThread();
302 int ptrsize = process->GetTarget().GetArchitecture().GetAddressByteSize();
330 if (CheckForKernelImageAtAddress(addr, process, &read_error).IsValid())
349 Process *process) {
355 if (process->GetTarget().GetArchitecture().GetAddressByteSize() == 8) {
367 if (process->GetTarget().GetArchitecture().GetAddressByteSize() == 8)
374 if (CheckForKernelImageAtAddress(addr, process).IsValid())
377 if (CheckForKernelImageAtAddress(addr + 0x1000, process).IsValid())
380 if (CheckForKernelImageAtAddress(addr + 0x4000, process).IsValid())
393 DynamicLoaderDarwinKernel::ReadMachHeader(addr_t addr, Process *process, llvm::MachO::mach_header &header,
400 if (process->ReadMemory(addr, &header, sizeof(header), error) !=
437 Process *process,
453 if (!ReadMachHeader(addr, process, header, read_error))
465 process->ReadModuleFromMemory(FileSpec("temp_mach_kernel"), addr);
481 if (!process->GetTarget().GetArchitecture().IsCompatibleMatch(
483 process->GetTarget().SetArchitecture(kernel_arch);
507 DynamicLoaderDarwinKernel::DynamicLoaderDarwinKernel(Process *process,
509 : DynamicLoader(process), m_kernel_load_address(kernel_addr), m_kernel(),
514 process->SetCanRunCode(false);
516 process->GetTarget().GetDebugger().GetPlatformList().Create(
519 process->GetTarget().SetPlatform(platform_sp);
538 /// Called after attaching a process.
541 /// attaching to a process.
564 Process *process) {
570 if (m_module_sp->SetLoadAddress(process->GetTarget(), 0, true, changed))
571 m_load_process_stop_id = process->GetStopID();
620 void DynamicLoaderDarwinKernel::KextImageInfo::SetName(const char *name) {
621 m_name = name;
643 Process *process) {
654 if (ReadMachHeader(m_load_address, process, mh)) {
663 process->ReadModuleFromMemory(file_spec, m_load_address, size_to_read);
702 process->GetTarget().SetArchitecture(memory_module_sp->GetArchitecture());
718 Process *process, Progress *progress) {
723 Target &target = process->GetTarget();
728 if (ReadMemoryModule(process) == false) {
762 // 'mach_kernel' is a fake name we make up to find kernels
801 platform_sp->GetSharedModule(module_spec, process, m_module_sp,
875 ReadMemoryModule (process);
961 m_load_process_stop_id = process->GetStopID();
1057 // We didn't get a hint from the process, so we will try the kernel at
1102 // update the target.process.virtual-addressable-bits to be correct.
1105 // target.process.virtual-addressable-bits = T0Sz
1106 // target.process.highmem-virtual-addressable-bits = T1Sz
1171 // the all image infos is already valid for this process stop ID
1362 // Build up a list of <kext-name, uuid> for any kexts that fail to load
1423 // print a sorted list of <kext-name, uuid> kexts which failed to load
1507 LLDB_LOG(log, "uuid={0} name=\"{1}\" (UNLOADED)", m_uuid.GetAsString(),
1510 LLDB_LOG(log, "addr={0:x+16} size={1:x+16} uuid={2} name=\"{3}\"",
1538 void DynamicLoaderDarwinKernel::PrivateInitialize(Process *process) {
1539 DEBUG_PRINTF("DynamicLoaderDarwinKernel::%s() process state = %s\n",
1542 m_process = process;
1547 DEBUG_PRINTF("DynamicLoaderDarwinKernel::%s() process state = %s\n",
1569 // Member function that gets called when the process state changes.
1570 void DynamicLoaderDarwinKernel::PrivateProcessStateChanged(Process *process,