xref: /freebsd-src/contrib/llvm-project/lldb/source/Plugins/DynamicLoader/POSIX-DYLD/DYLDRendezvous.cpp (revision fc55c20355d889bf3d3f81d94b3614a0c4253fa0)
1 //===-- DYLDRendezvous.cpp ------------------------------------------------===//
2 //
3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4 // See https://llvm.org/LICENSE.txt for license information.
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6 //
7 //===----------------------------------------------------------------------===//
8 
9 #include "lldb/Core/Module.h"
10 #include "lldb/Symbol/ObjectFile.h"
11 #include "lldb/Symbol/Symbol.h"
12 #include "lldb/Symbol/SymbolContext.h"
13 #include "lldb/Target/Platform.h"
14 #include "lldb/Target/Process.h"
15 #include "lldb/Target/Target.h"
16 #include "lldb/Utility/ArchSpec.h"
17 #include "lldb/Utility/LLDBLog.h"
18 #include "lldb/Utility/Log.h"
19 #include "lldb/Utility/Status.h"
20 
21 #include "llvm/Support/Path.h"
22 
23 #include "DYLDRendezvous.h"
24 
25 using namespace lldb;
26 using namespace lldb_private;
27 
28 DYLDRendezvous::DYLDRendezvous(Process *process)
29     : m_process(process), m_rendezvous_addr(LLDB_INVALID_ADDRESS),
30       m_executable_interpreter(false), m_current(), m_previous(),
31       m_loaded_modules(), m_soentries(), m_added_soentries(),
32       m_removed_soentries() {
33   m_thread_info.valid = false;
34   UpdateExecutablePath();
35 }
36 
37 addr_t DYLDRendezvous::ResolveRendezvousAddress() {
38   Log *log = GetLog(LLDBLog::DynamicLoader);
39   addr_t info_location;
40   addr_t info_addr;
41   Status error;
42 
43   if (!m_process) {
44     LLDB_LOGF(log, "%s null process provided", __FUNCTION__);
45     return LLDB_INVALID_ADDRESS;
46   }
47 
48   // Try to get it from our process.  This might be a remote process and might
49   // grab it via some remote-specific mechanism.
50   info_location = m_process->GetImageInfoAddress();
51   LLDB_LOGF(log, "%s info_location = 0x%" PRIx64, __FUNCTION__, info_location);
52 
53   // If the process fails to return an address, fall back to seeing if the
54   // local object file can help us find it.
55   if (info_location == LLDB_INVALID_ADDRESS) {
56     Target *target = &m_process->GetTarget();
57     if (target) {
58       ObjectFile *obj_file = target->GetExecutableModule()->GetObjectFile();
59       Address addr = obj_file->GetImageInfoAddress(target);
60 
61       if (addr.IsValid()) {
62         info_location = addr.GetLoadAddress(target);
63         LLDB_LOGF(log,
64                   "%s resolved via direct object file approach to 0x%" PRIx64,
65                   __FUNCTION__, info_location);
66       } else {
67         const Symbol *_r_debug =
68             target->GetExecutableModule()->FindFirstSymbolWithNameAndType(
69                 ConstString("_r_debug"));
70         if (_r_debug) {
71           info_addr = _r_debug->GetAddress().GetLoadAddress(target);
72           if (info_addr != LLDB_INVALID_ADDRESS) {
73             LLDB_LOGF(log,
74                       "%s resolved by finding symbol '_r_debug' whose value is "
75                       "0x%" PRIx64,
76                       __FUNCTION__, info_addr);
77             m_executable_interpreter = true;
78             return info_addr;
79           }
80         }
81         LLDB_LOGF(log,
82                   "%s FAILED - direct object file approach did not yield a "
83                   "valid address",
84                   __FUNCTION__);
85       }
86     }
87   }
88 
89   if (info_location == LLDB_INVALID_ADDRESS) {
90     LLDB_LOGF(log, "%s FAILED - invalid info address", __FUNCTION__);
91     return LLDB_INVALID_ADDRESS;
92   }
93 
94   LLDB_LOGF(log, "%s reading pointer (%" PRIu32 " bytes) from 0x%" PRIx64,
95             __FUNCTION__, m_process->GetAddressByteSize(), info_location);
96 
97   info_addr = m_process->ReadPointerFromMemory(info_location, error);
98   if (error.Fail()) {
99     LLDB_LOGF(log, "%s FAILED - could not read from the info location: %s",
100               __FUNCTION__, error.AsCString());
101     return LLDB_INVALID_ADDRESS;
102   }
103 
104   if (info_addr == 0) {
105     LLDB_LOGF(log,
106               "%s FAILED - the rendezvous address contained at 0x%" PRIx64
107               " returned a null value",
108               __FUNCTION__, info_location);
109     return LLDB_INVALID_ADDRESS;
110   }
111 
112   return info_addr;
113 }
114 
115 void DYLDRendezvous::UpdateExecutablePath() {
116   if (m_process) {
117     Log *log = GetLog(LLDBLog::DynamicLoader);
118     Module *exe_mod = m_process->GetTarget().GetExecutableModulePointer();
119     if (exe_mod) {
120       m_exe_file_spec = exe_mod->GetPlatformFileSpec();
121       LLDB_LOGF(log, "DYLDRendezvous::%s exe module executable path set: '%s'",
122                 __FUNCTION__, m_exe_file_spec.GetPath().c_str());
123     } else {
124       LLDB_LOGF(log,
125                 "DYLDRendezvous::%s cannot cache exe module path: null "
126                 "executable module pointer",
127                 __FUNCTION__);
128     }
129   }
130 }
131 
132 bool DYLDRendezvous::Resolve() {
133   Log *log = GetLog(LLDBLog::DynamicLoader);
134 
135   const size_t word_size = 4;
136   Rendezvous info;
137   size_t address_size;
138   size_t padding;
139   addr_t info_addr;
140   addr_t cursor;
141 
142   address_size = m_process->GetAddressByteSize();
143   padding = address_size - word_size;
144   LLDB_LOGF(log,
145             "DYLDRendezvous::%s address size: %" PRIu64 ", padding %" PRIu64,
146             __FUNCTION__, uint64_t(address_size), uint64_t(padding));
147 
148   if (m_rendezvous_addr == LLDB_INVALID_ADDRESS)
149     cursor = info_addr =
150         ResolveRendezvousAddress();
151   else
152     cursor = info_addr = m_rendezvous_addr;
153   LLDB_LOGF(log, "DYLDRendezvous::%s cursor = 0x%" PRIx64, __FUNCTION__,
154             cursor);
155 
156   if (cursor == LLDB_INVALID_ADDRESS)
157     return false;
158 
159   if (!(cursor = ReadWord(cursor, &info.version, word_size)))
160     return false;
161 
162   if (!(cursor = ReadPointer(cursor + padding, &info.map_addr)))
163     return false;
164 
165   if (!(cursor = ReadPointer(cursor, &info.brk)))
166     return false;
167 
168   if (!(cursor = ReadWord(cursor, &info.state, word_size)))
169     return false;
170 
171   if (!(cursor = ReadPointer(cursor + padding, &info.ldbase)))
172     return false;
173 
174   // The rendezvous was successfully read.  Update our internal state.
175   m_rendezvous_addr = info_addr;
176   m_previous = m_current;
177   m_current = info;
178 
179   if (m_current.map_addr == 0)
180     return false;
181 
182   if (UpdateSOEntriesFromRemote())
183     return true;
184 
185   return UpdateSOEntries();
186 }
187 
188 bool DYLDRendezvous::IsValid() {
189   return m_rendezvous_addr != LLDB_INVALID_ADDRESS;
190 }
191 
192 DYLDRendezvous::RendezvousAction DYLDRendezvous::GetAction() const {
193   // If we have a core file, we will read the current rendezvous state
194   // from the core file's memory into m_current which can be in an inconsistent
195   // state, so we can't rely on its state to determine what we should do. We
196   // always need it to load all of the shared libraries one time when we attach
197   // to a core file.
198   if (IsCoreFile())
199     return eTakeSnapshot;
200 
201   switch (m_current.state) {
202 
203   case eConsistent:
204     switch (m_previous.state) {
205     // When the previous and current states are consistent this is the first
206     // time we have been asked to update.  Just take a snapshot of the
207     // currently loaded modules.
208     case eConsistent:
209       return eTakeSnapshot;
210     // If we are about to add or remove a shared object clear out the current
211     // state and take a snapshot of the currently loaded images.
212     case eAdd:
213       return eAddModules;
214     case eDelete:
215       return eRemoveModules;
216     }
217     break;
218 
219   case eAdd:
220   case eDelete:
221     return eNoAction;
222   }
223 
224   return eNoAction;
225 }
226 
227 bool DYLDRendezvous::UpdateSOEntriesFromRemote() {
228   auto action = GetAction();
229 
230   if (action == eNoAction)
231     return false;
232 
233   m_added_soentries.clear();
234   m_removed_soentries.clear();
235   if (action == eTakeSnapshot) {
236     // We already have the loaded list from the previous update so no need to
237     // find all the modules again.
238     if (!m_loaded_modules.m_list.empty())
239       return true;
240   }
241 
242   llvm::Expected<LoadedModuleInfoList> module_list =
243       m_process->GetLoadedModuleList();
244   if (!module_list) {
245     llvm::consumeError(module_list.takeError());
246     return false;
247   }
248 
249   switch (action) {
250   case eTakeSnapshot:
251     m_soentries.clear();
252     return SaveSOEntriesFromRemote(*module_list);
253   case eAddModules:
254     return AddSOEntriesFromRemote(*module_list);
255   case eRemoveModules:
256     return RemoveSOEntriesFromRemote(*module_list);
257   case eNoAction:
258     return false;
259   }
260   llvm_unreachable("Fully covered switch above!");
261 }
262 
263 bool DYLDRendezvous::UpdateSOEntries() {
264   m_added_soentries.clear();
265   m_removed_soentries.clear();
266   switch (GetAction()) {
267   case eTakeSnapshot:
268     m_soentries.clear();
269     return TakeSnapshot(m_soentries);
270   case eAddModules:
271     return AddSOEntries();
272   case eRemoveModules:
273     return RemoveSOEntries();
274   case eNoAction:
275     return false;
276   }
277   llvm_unreachable("Fully covered switch above!");
278 }
279 
280 bool DYLDRendezvous::FillSOEntryFromModuleInfo(
281     LoadedModuleInfoList::LoadedModuleInfo const &modInfo, SOEntry &entry) {
282   addr_t link_map_addr;
283   addr_t base_addr;
284   addr_t dyn_addr;
285   std::string name;
286 
287   if (!modInfo.get_link_map(link_map_addr) || !modInfo.get_base(base_addr) ||
288       !modInfo.get_dynamic(dyn_addr) || !modInfo.get_name(name))
289     return false;
290 
291   entry.link_addr = link_map_addr;
292   entry.base_addr = base_addr;
293   entry.dyn_addr = dyn_addr;
294 
295   entry.file_spec.SetFile(name, FileSpec::Style::native);
296 
297   UpdateBaseAddrIfNecessary(entry, name);
298 
299   // not needed if we're using ModuleInfos
300   entry.next = 0;
301   entry.prev = 0;
302   entry.path_addr = 0;
303 
304   return true;
305 }
306 
307 bool DYLDRendezvous::SaveSOEntriesFromRemote(
308     const LoadedModuleInfoList &module_list) {
309   for (auto const &modInfo : module_list.m_list) {
310     SOEntry entry;
311     if (!FillSOEntryFromModuleInfo(modInfo, entry))
312       return false;
313 
314     // Only add shared libraries and not the executable.
315     if (!SOEntryIsMainExecutable(entry)) {
316       UpdateFileSpecIfNecessary(entry);
317       m_soentries.push_back(entry);
318     }
319   }
320 
321   m_loaded_modules = module_list;
322   return true;
323 }
324 
325 bool DYLDRendezvous::AddSOEntriesFromRemote(
326     const LoadedModuleInfoList &module_list) {
327   for (auto const &modInfo : module_list.m_list) {
328     bool found = false;
329     for (auto const &existing : m_loaded_modules.m_list) {
330       if (modInfo == existing) {
331         found = true;
332         break;
333       }
334     }
335 
336     if (found)
337       continue;
338 
339     SOEntry entry;
340     if (!FillSOEntryFromModuleInfo(modInfo, entry))
341       return false;
342 
343     // Only add shared libraries and not the executable.
344     if (!SOEntryIsMainExecutable(entry)) {
345       UpdateFileSpecIfNecessary(entry);
346       m_soentries.push_back(entry);
347       m_added_soentries.push_back(entry);
348     }
349   }
350 
351   m_loaded_modules = module_list;
352   return true;
353 }
354 
355 bool DYLDRendezvous::RemoveSOEntriesFromRemote(
356     const LoadedModuleInfoList &module_list) {
357   for (auto const &existing : m_loaded_modules.m_list) {
358     bool found = false;
359     for (auto const &modInfo : module_list.m_list) {
360       if (modInfo == existing) {
361         found = true;
362         break;
363       }
364     }
365 
366     if (found)
367       continue;
368 
369     SOEntry entry;
370     if (!FillSOEntryFromModuleInfo(existing, entry))
371       return false;
372 
373     // Only add shared libraries and not the executable.
374     if (!SOEntryIsMainExecutable(entry)) {
375       auto pos = std::find(m_soentries.begin(), m_soentries.end(), entry);
376       if (pos == m_soentries.end())
377         return false;
378 
379       m_soentries.erase(pos);
380       m_removed_soentries.push_back(entry);
381     }
382   }
383 
384   m_loaded_modules = module_list;
385   return true;
386 }
387 
388 bool DYLDRendezvous::AddSOEntries() {
389   SOEntry entry;
390   iterator pos;
391 
392   assert(m_previous.state == eAdd);
393 
394   if (m_current.map_addr == 0)
395     return false;
396 
397   for (addr_t cursor = m_current.map_addr; cursor != 0; cursor = entry.next) {
398     if (!ReadSOEntryFromMemory(cursor, entry))
399       return false;
400 
401     // Only add shared libraries and not the executable.
402     if (SOEntryIsMainExecutable(entry))
403       continue;
404 
405     UpdateFileSpecIfNecessary(entry);
406 
407     if (!llvm::is_contained(m_soentries, entry)) {
408       m_soentries.push_back(entry);
409       m_added_soentries.push_back(entry);
410     }
411   }
412 
413   return true;
414 }
415 
416 bool DYLDRendezvous::RemoveSOEntries() {
417   SOEntryList entry_list;
418   iterator pos;
419 
420   assert(m_previous.state == eDelete);
421 
422   if (!TakeSnapshot(entry_list))
423     return false;
424 
425   for (iterator I = begin(); I != end(); ++I) {
426     if (!llvm::is_contained(entry_list, *I))
427       m_removed_soentries.push_back(*I);
428   }
429 
430   m_soentries = entry_list;
431   return true;
432 }
433 
434 bool DYLDRendezvous::SOEntryIsMainExecutable(const SOEntry &entry) {
435   // On some systes the executable is indicated by an empty path in the entry.
436   // On others it is the full path to the executable.
437 
438   auto triple = m_process->GetTarget().GetArchitecture().GetTriple();
439   switch (triple.getOS()) {
440   case llvm::Triple::FreeBSD:
441   case llvm::Triple::NetBSD:
442     return entry.file_spec == m_exe_file_spec;
443   case llvm::Triple::Linux:
444     if (triple.isAndroid())
445       return entry.file_spec == m_exe_file_spec;
446     // If we are debugging ld.so, then all SOEntries should be treated as
447     // libraries, including the "main" one (denoted by an empty string).
448     if (!entry.file_spec && m_executable_interpreter)
449       return false;
450     return !entry.file_spec;
451   default:
452     return false;
453   }
454 }
455 
456 bool DYLDRendezvous::TakeSnapshot(SOEntryList &entry_list) {
457   SOEntry entry;
458 
459   if (m_current.map_addr == 0)
460     return false;
461 
462   // Clear previous entries since we are about to obtain an up to date list.
463   entry_list.clear();
464 
465   for (addr_t cursor = m_current.map_addr; cursor != 0; cursor = entry.next) {
466     if (!ReadSOEntryFromMemory(cursor, entry))
467       return false;
468 
469     // Only add shared libraries and not the executable.
470     if (SOEntryIsMainExecutable(entry))
471       continue;
472 
473     UpdateFileSpecIfNecessary(entry);
474 
475     entry_list.push_back(entry);
476   }
477 
478   return true;
479 }
480 
481 addr_t DYLDRendezvous::ReadWord(addr_t addr, uint64_t *dst, size_t size) {
482   Status error;
483 
484   *dst = m_process->ReadUnsignedIntegerFromMemory(addr, size, 0, error);
485   if (error.Fail())
486     return 0;
487 
488   return addr + size;
489 }
490 
491 addr_t DYLDRendezvous::ReadPointer(addr_t addr, addr_t *dst) {
492   Status error;
493 
494   *dst = m_process->ReadPointerFromMemory(addr, error);
495   if (error.Fail())
496     return 0;
497 
498   return addr + m_process->GetAddressByteSize();
499 }
500 
501 std::string DYLDRendezvous::ReadStringFromMemory(addr_t addr) {
502   std::string str;
503   Status error;
504 
505   if (addr == LLDB_INVALID_ADDRESS)
506     return std::string();
507 
508   m_process->ReadCStringFromMemory(addr, str, error);
509 
510   return str;
511 }
512 
513 // Returns true if the load bias reported by the linker is incorrect for the
514 // given entry. This function is used to handle cases where we want to work
515 // around a bug in the system linker.
516 static bool isLoadBiasIncorrect(Target &target, const std::string &file_path) {
517   // On Android L (API 21, 22) the load address of the "/system/bin/linker"
518   // isn't filled in correctly.
519   unsigned os_major = target.GetPlatform()->GetOSVersion().getMajor();
520   return target.GetArchitecture().GetTriple().isAndroid() &&
521          (os_major == 21 || os_major == 22) &&
522          (file_path == "/system/bin/linker" ||
523           file_path == "/system/bin/linker64");
524 }
525 
526 void DYLDRendezvous::UpdateBaseAddrIfNecessary(SOEntry &entry,
527                                                std::string const &file_path) {
528   // If the load bias reported by the linker is incorrect then fetch the load
529   // address of the file from the proc file system.
530   if (isLoadBiasIncorrect(m_process->GetTarget(), file_path)) {
531     lldb::addr_t load_addr = LLDB_INVALID_ADDRESS;
532     bool is_loaded = false;
533     Status error =
534         m_process->GetFileLoadAddress(entry.file_spec, is_loaded, load_addr);
535     if (error.Success() && is_loaded)
536       entry.base_addr = load_addr;
537   }
538 }
539 
540 void DYLDRendezvous::UpdateFileSpecIfNecessary(SOEntry &entry) {
541   // Updates filename if empty. It is useful while debugging ld.so,
542   // when the link map returns empty string for the main executable.
543   if (!entry.file_spec) {
544     MemoryRegionInfo region;
545     Status region_status =
546         m_process->GetMemoryRegionInfo(entry.dyn_addr, region);
547     if (!region.GetName().IsEmpty())
548       entry.file_spec.SetFile(region.GetName().AsCString(),
549                               FileSpec::Style::native);
550   }
551 }
552 
553 bool DYLDRendezvous::ReadSOEntryFromMemory(lldb::addr_t addr, SOEntry &entry) {
554   entry.clear();
555 
556   entry.link_addr = addr;
557 
558   if (!(addr = ReadPointer(addr, &entry.base_addr)))
559     return false;
560 
561   // mips adds an extra load offset field to the link map struct on FreeBSD and
562   // NetBSD (need to validate other OSes).
563   // http://svnweb.freebsd.org/base/head/sys/sys/link_elf.h?revision=217153&view=markup#l57
564   const ArchSpec &arch = m_process->GetTarget().GetArchitecture();
565   if ((arch.GetTriple().getOS() == llvm::Triple::FreeBSD ||
566        arch.GetTriple().getOS() == llvm::Triple::NetBSD) &&
567       arch.IsMIPS()) {
568     addr_t mips_l_offs;
569     if (!(addr = ReadPointer(addr, &mips_l_offs)))
570       return false;
571     if (mips_l_offs != 0 && mips_l_offs != entry.base_addr)
572       return false;
573   }
574 
575   if (!(addr = ReadPointer(addr, &entry.path_addr)))
576     return false;
577 
578   if (!(addr = ReadPointer(addr, &entry.dyn_addr)))
579     return false;
580 
581   if (!(addr = ReadPointer(addr, &entry.next)))
582     return false;
583 
584   if (!(addr = ReadPointer(addr, &entry.prev)))
585     return false;
586 
587   std::string file_path = ReadStringFromMemory(entry.path_addr);
588   entry.file_spec.SetFile(file_path, FileSpec::Style::native);
589 
590   UpdateBaseAddrIfNecessary(entry, file_path);
591 
592   return true;
593 }
594 
595 bool DYLDRendezvous::FindMetadata(const char *name, PThreadField field,
596                                   uint32_t &value) {
597   Target &target = m_process->GetTarget();
598 
599   SymbolContextList list;
600   target.GetImages().FindSymbolsWithNameAndType(ConstString(name),
601                                                 eSymbolTypeAny, list);
602   if (list.IsEmpty())
603   return false;
604 
605   Address address = list[0].symbol->GetAddress();
606   addr_t addr = address.GetLoadAddress(&target);
607   if (addr == LLDB_INVALID_ADDRESS)
608     return false;
609 
610   Status error;
611   value = (uint32_t)m_process->ReadUnsignedIntegerFromMemory(
612       addr + field * sizeof(uint32_t), sizeof(uint32_t), 0, error);
613   if (error.Fail())
614     return false;
615 
616   if (field == eSize)
617     value /= 8; // convert bits to bytes
618 
619   return true;
620 }
621 
622 const DYLDRendezvous::ThreadInfo &DYLDRendezvous::GetThreadInfo() {
623   if (!m_thread_info.valid) {
624     bool ok = true;
625 
626     ok &= FindMetadata("_thread_db_pthread_dtvp", eOffset,
627                        m_thread_info.dtv_offset);
628     ok &=
629         FindMetadata("_thread_db_dtv_dtv", eSize, m_thread_info.dtv_slot_size);
630     ok &= FindMetadata("_thread_db_link_map_l_tls_modid", eOffset,
631                        m_thread_info.modid_offset);
632     ok &= FindMetadata("_thread_db_dtv_t_pointer_val", eOffset,
633                        m_thread_info.tls_offset);
634 
635     if (ok)
636       m_thread_info.valid = true;
637   }
638 
639   return m_thread_info;
640 }
641 
642 void DYLDRendezvous::DumpToLog(Log *log) const {
643   int state = GetState();
644 
645   if (!log)
646     return;
647 
648   log->PutCString("DYLDRendezvous:");
649   LLDB_LOGF(log, "   Address: %" PRIx64, GetRendezvousAddress());
650   LLDB_LOGF(log, "   Version: %" PRIu64, GetVersion());
651   LLDB_LOGF(log, "   Link   : %" PRIx64, GetLinkMapAddress());
652   LLDB_LOGF(log, "   Break  : %" PRIx64, GetBreakAddress());
653   LLDB_LOGF(log, "   LDBase : %" PRIx64, GetLDBase());
654   LLDB_LOGF(log, "   State  : %s",
655             (state == eConsistent)
656                 ? "consistent"
657                 : (state == eAdd) ? "add"
658                                   : (state == eDelete) ? "delete" : "unknown");
659 
660   iterator I = begin();
661   iterator E = end();
662 
663   if (I != E)
664     log->PutCString("DYLDRendezvous SOEntries:");
665 
666   for (int i = 1; I != E; ++I, ++i) {
667     LLDB_LOGF(log, "\n   SOEntry [%d] %s", i, I->file_spec.GetPath().c_str());
668     LLDB_LOGF(log, "      Base : %" PRIx64, I->base_addr);
669     LLDB_LOGF(log, "      Path : %" PRIx64, I->path_addr);
670     LLDB_LOGF(log, "      Dyn  : %" PRIx64, I->dyn_addr);
671     LLDB_LOGF(log, "      Next : %" PRIx64, I->next);
672     LLDB_LOGF(log, "      Prev : %" PRIx64, I->prev);
673   }
674 }
675 
676 bool DYLDRendezvous::IsCoreFile() const {
677   return !m_process->IsLiveDebugSession();
678 }
679