]> git.saurik.com Git - apple/xnu.git/blame - tools/lldbmacros/memory.py
xnu-3789.1.32.tar.gz
[apple/xnu.git] / tools / lldbmacros / memory.py
CommitLineData
39236c6e
A
1
2""" Please make sure you read the README file COMPLETELY BEFORE reading anything below.
fe8ab488 3 It is very critical that you read coding guidelines in Section E in README file.
39236c6e
A
4"""
5from xnu import *
fe8ab488
A
6import sys
7import shlex
39236c6e
A
8from utils import *
9import xnudefines
10from process import *
39037602 11import macho
39236c6e
A
12
13# Macro: memstats
14@lldb_command('memstats')
15def Memstats(cmd_args=None):
16 """ Prints out a summary of various memory statistics. In particular vm_page_wire_count should be greater than 2K or you are under memory pressure.
17 """
18 try:
19 print "memorystatus_level: {: >10d}".format(kern.globals.memorystatus_level)
39236c6e 20 print "memorystatus_available_pages: {: >10d}".format(kern.globals.memorystatus_available_pages)
39037602 21 print "inuse_ptepages_count: {: >10d}".format(kern.globals.inuse_ptepages_count)
39236c6e
A
22 except ValueError:
23 pass
24 print "vm_page_throttled_count: {: >10d}".format(kern.globals.vm_page_throttled_count)
25 print "vm_page_active_count: {: >10d}".format(kern.globals.vm_page_active_count)
26 print "vm_page_inactive_count: {: >10d}".format(kern.globals.vm_page_inactive_count)
27 print "vm_page_wire_count: {: >10d}".format(kern.globals.vm_page_wire_count)
28 print "vm_page_free_count: {: >10d}".format(kern.globals.vm_page_free_count)
29 print "vm_page_purgeable_count: {: >10d}".format(kern.globals.vm_page_purgeable_count)
30 print "vm_page_inactive_target: {: >10d}".format(kern.globals.vm_page_inactive_target)
31 print "vm_page_free_target: {: >10d}".format(kern.globals.vm_page_free_target)
39037602 32
39236c6e
A
33 print "vm_page_free_reserved: {: >10d}".format(kern.globals.vm_page_free_reserved)
34
35@xnudebug_test('test_memstats')
36def TestMemstats(kernel_target, config, lldb_obj, isConnected ):
37 """ Test the functionality of memstats command
38 returns
39 - False on failure
40 - True on success
41 """
42 if not isConnected:
43 print "Target is not connected. Cannot test memstats"
44 return False
45 res = lldb.SBCommandReturnObject()
46 lldb_obj.debugger.GetCommandInterpreter().HandleCommand("memstats", res)
47 result = res.GetOutput()
48 if result.split(":")[1].strip().find('None') == -1 :
49 return True
50 else:
51 return False
52
53# EndMacro: memstats
54
55# Macro: showmemorystatus
56def CalculateLedgerPeak(phys_footprint_entry):
57 """ Internal function to calculate ledger peak value for the given phys footprint entry
58 params: phys_footprint_entry - value representing struct ledger_entry *
59 return: value - representing the ledger peak for the given phys footprint entry
60 """
61 now = kern.globals.sched_tick / 20
62 ledger_peak = phys_footprint_entry.le_credit - phys_footprint_entry.le_debit
63 if (now - phys_footprint_entry._le.le_peaks[0].le_time <= 1) and (phys_footprint_entry._le.le_peaks[0].le_max > ledger_peak):
64 ledger_peak = phys_footprint_entry._le.le_peaks[0].le_max
65 if (now - phys_footprint_entry._le.le_peaks[1].le_time <= 1) and (phys_footprint_entry._le.le_peaks[1].le_max > ledger_peak):
66 ledger_peak = phys_footprint_entry._le.le_peaks[1].le_max
67 return ledger_peak
68
69@header("{: >8s} {: >22s} {: >22s} {: >11s} {: >11s} {: >12s} {: >10s} {: >13s} {: ^10s} {: >8s} {: <20s}\n".format(
70'pid', 'effective priority', 'requested priority', 'state', 'user_data', 'physical', 'iokit', 'footprint',
71'spike', 'limit', 'command'))
72def GetMemoryStatusNode(proc_val):
73 """ Internal function to get memorystatus information from the given proc
74 params: proc - value representing struct proc *
75 return: str - formatted output information for proc object
76 """
77 out_str = ''
78 task_val = Cast(proc_val.task, 'task *')
79 task_ledgerp = task_val.ledger
80
81 task_physmem_footprint_ledger_entry = task_ledgerp.l_entries[kern.globals.task_ledgers.phys_mem]
fe8ab488 82 task_iokit_footprint_ledger_entry = task_ledgerp.l_entries[kern.globals.task_ledgers.iokit_mapped]
39236c6e
A
83 task_phys_footprint_ledger_entry = task_ledgerp.l_entries[kern.globals.task_ledgers.phys_footprint]
84 page_size = kern.globals.page_size
85
86 phys_mem_footprint = (task_physmem_footprint_ledger_entry.le_credit - task_physmem_footprint_ledger_entry.le_debit) / page_size
87 iokit_footprint = (task_iokit_footprint_ledger_entry.le_credit - task_iokit_footprint_ledger_entry.le_debit) / page_size
88 phys_footprint = (task_phys_footprint_ledger_entry.le_credit - task_phys_footprint_ledger_entry.le_debit) / page_size
89 phys_footprint_limit = task_phys_footprint_ledger_entry.le_limit / page_size
90 ledger_peak = CalculateLedgerPeak(task_phys_footprint_ledger_entry)
91 phys_footprint_spike = ledger_peak / page_size
92
93 format_string = '{0: >8d} {1: >22d} {2: >22d} {3: #011x} {4: #011x} {5: >12d} {6: >10d} {7: >13d}'
94 out_str += format_string.format(proc_val.p_pid, proc_val.p_memstat_effectivepriority,
95 proc_val.p_memstat_requestedpriority, proc_val.p_memstat_state, proc_val.p_memstat_userdata,
96 phys_mem_footprint, iokit_footprint, phys_footprint)
97 if phys_footprint != phys_footprint_spike:
98 out_str += "{: ^12d}".format(phys_footprint_spike)
99 else:
100 out_str += "{: ^12s}".format('-')
101 out_str += "{: 8d} {: <20s}\n".format(phys_footprint_limit, proc_val.p_comm)
102 return out_str
103
104@lldb_command('showmemorystatus')
105def ShowMemoryStatus(cmd_args=None):
106 """ Routine to display each entry in jetsam list with a summary of pressure statistics
107 Usage: showmemorystatus
108 """
109 bucket_index = 0
110 bucket_count = 20
111 print GetMemoryStatusNode.header
112 print "{: >91s} {: >10s} {: >13s} {: ^10s} {: >8s}\n".format("(pages)", "(pages)", "(pages)",
113 "(pages)", "(pages)")
114 while bucket_index < bucket_count:
115 current_bucket = kern.globals.memstat_bucket[bucket_index]
116 current_list = current_bucket.list
117 current_proc = Cast(current_list.tqh_first, 'proc *')
118 while unsigned(current_proc) != 0:
119 print GetMemoryStatusNode(current_proc)
120 current_proc = current_proc.p_memstat_list.tqe_next
121 bucket_index += 1
122 print "\n\n"
123 Memstats()
124
125# EndMacro: showmemorystatus
126
39037602
A
127def GetRealMetadata(meta):
128 """ Get real metadata for a given metadata pointer
129 """
130 try:
131 if unsigned(meta.zindex) != 255:
132 return meta
133 else:
134 return kern.GetValueFromAddress(unsigned(meta) - unsigned(meta.real_metadata_offset), "struct zone_page_metadata *")
135 except:
136 return 0
137
138def GetFreeList(meta):
139 """ Get the free list pointer for a given metadata pointer
140 """
141 global kern
142 zone_map_min_address = kern.GetGlobalVariable('zone_map_min_address')
143 zone_map_max_address = kern.GetGlobalVariable('zone_map_max_address')
144 try:
145 if unsigned(meta.freelist_offset) == unsigned(0xffffffff):
146 return 0
147 else:
148 if (unsigned(meta) >= unsigned(zone_map_min_address)) and (unsigned(meta) < unsigned(zone_map_max_address)):
149 page_index = ((unsigned(meta) - unsigned(kern.GetGlobalVariable('zone_metadata_region_min'))) / sizeof('struct zone_page_metadata'))
150 return (unsigned(zone_map_min_address) + (kern.globals.page_size * (page_index))) + meta.freelist_offset
151 else:
152 return (unsigned(meta) + meta.freelist_offset)
153 except:
154 return 0
155
156@lldb_type_summary(['zone_page_metadata'])
157@header("{:<18s} {:<18s} {:>8s} {:>8s} {:<18s} {:<20s}".format('ZONE_METADATA', 'FREELIST', 'PG_CNT', 'FREE_CNT', 'ZONE', 'NAME'))
158def GetZoneMetadataSummary(meta):
159 """ Summarize a zone metadata object
160 params: meta - obj representing zone metadata in the kernel
161 returns: str - summary of the zone metadata
162 """
163 out_str = ""
164 global kern
165 zinfo = 0
166 try:
167 out_str += 'Metadata Description:\n' + GetZoneMetadataSummary.header + '\n'
168 meta = kern.GetValueFromAddress(meta, "struct zone_page_metadata *")
169 if unsigned(meta.zindex) == 255:
170 out_str += "{:#018x} {:#018x} {:8d} {:8d} {:#018x} {:s}\n".format(meta, 0, 0, 0, 0, '(fake multipage meta)')
171 meta = GetRealMetadata(meta)
172 if meta == 0:
173 return ""
174 zinfo = kern.globals.zone_array[unsigned(meta.zindex)]
175 out_str += "{:#018x} {:#018x} {:8d} {:8d} {:#018x} {:s}".format(meta, GetFreeList(meta), meta.page_count, meta.free_count, addressof(zinfo), zinfo.zone_name)
176 return out_str
177 except:
178 out_str = ""
179 return out_str
180
181@header("{:<18s} {:>18s} {:>18s} {:<18s}".format('ADDRESS', 'TYPE', 'OFFSET_IN_PG', 'METADATA'))
182def WhatIs(addr):
183 """ Information about kernel pointer
184 """
185 out_str = ""
186 global kern
187 pagesize = kern.globals.page_size
188 zone_map_min_address = kern.GetGlobalVariable('zone_map_min_address')
189 zone_map_max_address = kern.GetGlobalVariable('zone_map_max_address')
190 if (unsigned(addr) >= unsigned(zone_map_min_address)) and (unsigned(addr) < unsigned(zone_map_max_address)):
191 zone_metadata_region_min = kern.GetGlobalVariable('zone_metadata_region_min')
192 zone_metadata_region_max = kern.GetGlobalVariable('zone_metadata_region_max')
193 if (unsigned(addr) >= unsigned(zone_metadata_region_min)) and (unsigned(addr) < unsigned(zone_metadata_region_max)):
194 metadata_offset = (unsigned(addr) - unsigned(zone_metadata_region_min)) % sizeof('struct zone_page_metadata')
195 page_offset_str = "{:d}/{:d}".format((unsigned(addr) - (unsigned(addr) & ~(pagesize - 1))), pagesize)
196 out_str += WhatIs.header + '\n'
197 out_str += "{:#018x} {:>18s} {:>18s} {:#018x}\n\n".format(unsigned(addr), "Metadata", page_offset_str, unsigned(addr) - metadata_offset)
198 out_str += GetZoneMetadataSummary((unsigned(addr) - metadata_offset)) + '\n\n'
199 else:
200 page_index = ((unsigned(addr) & ~(pagesize - 1)) - unsigned(zone_map_min_address)) / pagesize
201 meta = unsigned(zone_metadata_region_min) + (page_index * sizeof('struct zone_page_metadata'))
202 meta = kern.GetValueFromAddress(meta, "struct zone_page_metadata *")
203 page_meta = GetRealMetadata(meta)
204 if page_meta != 0:
205 zinfo = kern.globals.zone_array[unsigned(page_meta.zindex)]
206 page_offset_str = "{:d}/{:d}".format((unsigned(addr) - (unsigned(addr) & ~(pagesize - 1))), pagesize)
207 out_str += WhatIs.header + '\n'
208 out_str += "{:#018x} {:>18s} {:>18s} {:#018x}\n\n".format(unsigned(addr), "Element", page_offset_str, page_meta)
209 out_str += GetZoneMetadataSummary(unsigned(page_meta)) + '\n\n'
210 else:
211 out_str += "Unmapped address within the zone_map ({:#018x}-{:#018x})".format(zone_map_min_address, zone_map_max_address)
212 else:
213 out_str += "Address {:#018x} is outside the zone_map ({:#018x}-{:#018x})\n".format(addr, zone_map_min_address, zone_map_max_address)
214 print out_str
215 return
216
217@lldb_command('whatis')
218def WhatIsHelper(cmd_args=None):
219 """ Routine to show information about a kernel pointer
220 Usage: whatis <address>
221 """
222 if not cmd_args:
223 raise ArgumentError("No arguments passed")
224 addr = kern.GetValueFromAddress(cmd_args[0], 'void *')
225 WhatIs(addr)
226 print "Hexdump:\n"
227 try:
228 data_array = kern.GetValueFromAddress(unsigned(addr) - 16, "uint8_t *")
229 print_hex_data(data_array[0:48], unsigned(addr) - 16, "")
230 except:
231 pass
232 return
233
39236c6e
A
234# Macro: zprint
235
236@lldb_type_summary(['zone','zone_t'])
39037602
A
237@header("{:^18s} {:>10s} {:>10s} {:>10s} {:>10s} {:>10s} {:>10s} {:>10s} {:>10s}({:>6s} {:>6s} {:>6s}) {:^15s} {:<20s}".format(
238'ZONE', 'TOT_SZ', 'PAGE_COUNT', 'ALLOC_ELTS', 'FREE_ELTS', 'FREE_SZ', 'ALL_FREE_PGS', 'ELT_SZ', 'ALLOC', 'ELTS', 'PGS', 'WASTE', 'FLAGS', 'NAME'))
39236c6e
A
239def GetZoneSummary(zone):
240 """ Summarize a zone with important information. See help zprint for description of each field
241 params:
242 zone: value - obj representing a zone in kernel
243 returns:
244 str - summary of the zone
245 """
246 out_string = ""
3e170ce0
A
247 format_string = '{:#018x} {:10d} {:10d} {:10d} {:10d} {:10d} {:10d} {:10d} {:6d} {:6d} {:6d} {markings} {name:s} '
248 pagesize = kern.globals.page_size
39236c6e 249
3e170ce0 250 free_elements = zone.countfree
39236c6e
A
251 free_size = free_elements * zone.elem_size
252
39236c6e 253 alloc_pages = zone.alloc_size / pagesize
39037602
A
254 alloc_count = zone.alloc_size / zone.elem_size
255 alloc_waste = zone.alloc_size % zone.elem_size
3e170ce0 256
39236c6e 257 marks = [
3e170ce0
A
258 ["collectable", "C"],
259 ["expandable", "X"],
260 ["noencrypt", "$"],
261 ["caller_acct", "@"],
262 ["exhaustible", "H"],
263 ["allows_foreign", "F"],
264 ["async_prio_refill", "R"],
265 ["no_callout", "O"],
266 ["zleak_on", "L"],
267 ["doing_alloc_without_vm_priv", "A"],
268 ["doing_alloc_with_vm_priv", "S"],
39037602 269 ["waiting", "W"]
39236c6e
A
270 ]
271 if kern.arch == 'x86_64':
272 marks.append(["gzalloc_exempt", "M"])
273 marks.append(["alignment_required", "N"])
274
275 markings=""
276 for mark in marks:
277 if zone.__getattr__(mark[0]) :
278 markings+=mark[1]
279 else:
280 markings+=" "
281 out_string += format_string.format(zone, zone.cur_size, zone.page_count,
39037602 282 zone.count, free_elements, free_size, zone.count_all_free_pages,
39236c6e 283 zone.elem_size, zone.alloc_size, alloc_count,
3e170ce0 284 alloc_pages, alloc_waste, name = zone.zone_name, markings=markings)
39236c6e
A
285
286 if zone.exhaustible :
287 out_string += "(max: {:d})".format(zone.max_size)
288
289 return out_string
290
291@lldb_command('zprint')
292def Zprint(cmd_args=None):
293 """ Routine to print a summary listing of all the kernel zones
294 All columns are printed in decimal
295 Legend:
296 C - collectable
297 X - expandable
298 $ - not encrypted during hibernation
299 @ - allocs and frees are accounted to caller process for KPRVT
300 H - exhaustible
301 F - allows foreign memory (memory not allocated from zone_map)
302 M - gzalloc will avoid monitoring this zone
303 R - will be refilled when below low water mark
304 O - does not allow refill callout to fill zone on noblock allocation
305 N - zone requires alignment (avoids padding this zone for debugging)
3e170ce0
A
306 A - currently trying to allocate more backing memory from kernel_memory_allocate without VM priv
307 S - currently trying to allocate more backing memory from kernel_memory_allocate with VM priv
39236c6e
A
308 W - another thread is waiting for more memory
309 L - zone is being monitored by zleaks
310 G - currently running GC
311 """
312 global kern
313 print GetZoneSummary.header
314 for zval in kern.zones:
315 print GetZoneSummary(zval)
316
317@xnudebug_test('test_zprint')
318def TestZprint(kernel_target, config, lldb_obj, isConnected ):
319 """ Test the functionality of zprint command
320 returns
321 - False on failure
322 - True on success
323 """
324 if not isConnected:
325 print "Target is not connected. Cannot test memstats"
326 return False
327 res = lldb.SBCommandReturnObject()
328 lldb_obj.debugger.GetCommandInterpreter().HandleCommand("zprint", res)
329 result = res.GetOutput()
330 if len(result.split("\n")) > 2:
331 return True
332 else:
333 return False
334
335
336# EndMacro: zprint
337
338# Macro: showzfreelist
339
340def ShowZfreeListHeader(zone):
341 """ Helper routine to print a header for zone freelist.
342 (Since the freelist does not have a custom type, this is not defined as a Type Summary).
343 params:
344 zone:zone_t - Zone object to print header info
345 returns:
346 None
347 """
fe8ab488
A
348
349 scaled_factor = (unsigned(kern.globals.zp_factor) +
350 (unsigned(zone.elem_size) >> unsigned(kern.globals.zp_scale)))
351
39236c6e
A
352 out_str = ""
353 out_str += "{0: <9s} {1: <12s} {2: <18s} {3: <18s} {4: <6s}\n".format('ELEM_SIZE', 'COUNT', 'NCOOKIE', 'PCOOKIE', 'FACTOR')
354 out_str += "{0: <9d} {1: <12d} 0x{2:0>16x} 0x{3:0>16x} {4: <2d}/{5: <2d}\n\n".format(
fe8ab488 355 zone.elem_size, zone.count, kern.globals.zp_nopoison_cookie, kern.globals.zp_poisoned_cookie, zone.zp_count, scaled_factor)
39236c6e
A
356 out_str += "{0: <7s} {1: <18s} {2: <18s} {3: <18s} {4: <18s} {5: <18s} {6: <14s}\n".format(
357 'NUM', 'ELEM', 'NEXT', 'BACKUP', '^ NCOOKIE', '^ PCOOKIE', 'POISON (PREV)')
358 print out_str
359
360def ShowZfreeListChain(zone, zfirst, zlimit):
361 """ Helper routine to print a zone free list chain
362 params:
363 zone: zone_t - Zone object
364 zfirst: void * - A pointer to the first element of the free list chain
365 zlimit: int - Limit for the number of elements to be printed by showzfreelist
366 returns:
367 None
368 """
369 current = Cast(zfirst, 'void *')
370 while ShowZfreeList.elts_found < zlimit:
371 ShowZfreeList.elts_found += 1
372 znext = dereference(Cast(current, 'vm_offset_t *'))
39037602
A
373 znext = (unsigned(znext) ^ unsigned(kern.globals.zp_nopoison_cookie))
374 znext = kern.GetValueFromAddress(znext, 'vm_offset_t *')
39236c6e
A
375 backup_ptr = kern.GetValueFromAddress((unsigned(Cast(current, 'vm_offset_t')) + unsigned(zone.elem_size) - sizeof('vm_offset_t')), 'vm_offset_t *')
376 backup_val = dereference(backup_ptr)
377 n_unobfuscated = (unsigned(backup_val) ^ unsigned(kern.globals.zp_nopoison_cookie))
378 p_unobfuscated = (unsigned(backup_val) ^ unsigned(kern.globals.zp_poisoned_cookie))
379 poison_str = ''
380 if p_unobfuscated == unsigned(znext):
381 poison_str = "P ({0: <d})".format(ShowZfreeList.elts_found - ShowZfreeList.last_poisoned)
382 ShowZfreeList.last_poisoned = ShowZfreeList.elts_found
383 else:
384 if n_unobfuscated != unsigned(znext):
385 poison_str = "INVALID"
386 print "{0: <7d} 0x{1:0>16x} 0x{2:0>16x} 0x{3:0>16x} 0x{4:0>16x} 0x{5:0>16x} {6: <14s}\n".format(
387 ShowZfreeList.elts_found, unsigned(current), unsigned(znext), unsigned(backup_val), n_unobfuscated, p_unobfuscated, poison_str)
388 if unsigned(znext) == 0:
389 break
390 current = Cast(znext, 'void *')
391
392@static_var('elts_found',0)
393@static_var('last_poisoned',0)
394@lldb_command('showzfreelist')
395def ShowZfreeList(cmd_args=None):
396 """ Walk the freelist for a zone, printing out the primary and backup next pointers, the poisoning cookies, and the poisoning status of each element.
397 Usage: showzfreelist <zone> [iterations]
398
399 Will walk up to 50 elements by default, pass a limit in 'iterations' to override.
400 """
401 if not cmd_args:
402 print ShowZfreeList.__doc__
403 return
404 ShowZfreeList.elts_found = 0
405 ShowZfreeList.last_poisoned = 0
406
407 zone = kern.GetValueFromAddress(cmd_args[0], 'struct zone *')
408 zlimit = 50
409 if len(cmd_args) >= 2:
410 zlimit = ArgumentStringToInt(cmd_args[1])
411 ShowZfreeListHeader(zone)
412
39037602
A
413 if unsigned(zone.allows_foreign) == 1:
414 for free_page_meta in IterateQueue(zone.pages.any_free_foreign, 'struct zone_page_metadata *', 'pages'):
39236c6e
A
415 if ShowZfreeList.elts_found == zlimit:
416 break
39037602 417 zfirst = kern.GetValueFromAddress(GetFreeList(free_page_meta), 'void *')
39236c6e
A
418 if unsigned(zfirst) != 0:
419 ShowZfreeListChain(zone, zfirst, zlimit)
39037602
A
420 for free_page_meta in IterateQueue(zone.pages.intermediate, 'struct zone_page_metadata *', 'pages'):
421 if ShowZfreeList.elts_found == zlimit:
422 break
423 zfirst = kern.GetValueFromAddress(GetFreeList(free_page_meta), 'void *')
424 if unsigned(zfirst) != 0:
425 ShowZfreeListChain(zone, zfirst, zlimit)
426 for free_page_meta in IterateQueue(zone.pages.all_free, 'struct zone_page_metadata *', 'pages'):
427 if ShowZfreeList.elts_found == zlimit:
428 break
429 zfirst = kern.GetValueFromAddress(GetFreeList(free_page_meta), 'void *')
39236c6e
A
430 if unsigned(zfirst) != 0:
431 ShowZfreeListChain(zone, zfirst, zlimit)
432
433 if ShowZfreeList.elts_found == zlimit:
434 print "Stopped at {0: <d} elements!".format(zlimit)
435 else:
436 print "Found {0: <d} elements!".format(ShowZfreeList.elts_found)
437
438# EndMacro: showzfreelist
439
39037602
A
440# Macro: zstack_showzonesbeinglogged
441
442@lldb_command('zstack_showzonesbeinglogged')
443def ZstackShowZonesBeingLogged(cmd_args=None):
444 """
445 """
446 global kern
447 for zval in kern.zones:
448 if zval.zlog_btlog:
449 print "Zone: %s with its BTLog at: 0x%lx" % (zval.zone_name, zval.zlog_btlog)
450
451# EndMacro: zstack_showzonesbeinglogged
452
39236c6e
A
453# Macro: zstack
454
455@lldb_command('zstack')
456def Zstack(cmd_args=None):
39037602
A
457 """ Zone leak debugging: Print the stack trace logged at <index> in the stacks list. If a <count> is supplied, it prints <count> stacks starting at <index>.
458 Usage: zstack <btlog addr> <index> [<count>]
39236c6e 459
39037602
A
460 The suggested usage is to look at stacks with high percentage of refs (maybe > 25%).
461 The stack trace that occurs the most is probably the cause of the leak. Use zstack_findleak for that.
39236c6e
A
462 """
463 if not cmd_args:
464 print Zstack.__doc__
465 return
466 if int(kern.globals.log_records) == 0:
467 print "Zone logging not enabled. Add 'zlog=<zone name>' to boot-args."
468 return
39236c6e 469
39037602
A
470 btlog_ptr = kern.GetValueFromAddress(cmd_args[0], 'btlog_t *')
471 btrecords_total_size = unsigned(btlog_ptr.btlog_buffersize)
472 btrecord_size = unsigned(btlog_ptr.btrecord_size)
473 btrecords = unsigned(btlog_ptr.btrecords)
474 btlog_size = unsigned(sizeof('struct btlog'))
475 depth = unsigned(btlog_ptr.btrecord_btdepth)
476 zstack_index = ArgumentStringToInt(cmd_args[1])
39236c6e 477 count = 1
39037602
A
478 if len(cmd_args) >= 3:
479 count = ArgumentStringToInt(cmd_args[2])
480
481 max_count = ((btrecords_total_size - btlog_size)/btrecord_size)
482
483 if (zstack_index + count) > max_count:
484 count = max_count - zstack_index
485
39236c6e 486 while count and (zstack_index != 0xffffff):
39037602
A
487 zstack_record_offset = zstack_index * btrecord_size
488 zstack_record = kern.GetValueFromAddress(btrecords + zstack_record_offset, 'btlog_record_t *')
489 if int(zstack_record.ref_count)!=0:
490 ShowZStackRecord(zstack_record, zstack_index, depth, unsigned(btlog_ptr.active_element_count))
491 zstack_index += 1
39236c6e
A
492 count -= 1
493
494# EndMacro : zstack
495
39037602 496# Macro: zstack_inorder
39236c6e 497
39037602
A
498@lldb_command('zstack_inorder')
499def ZstackInOrder(cmd_args=None):
500 """ Zone leak debugging: Print the stack traces starting from head to the tail.
501 Usage: zstack_inorder <btlog addr>
39236c6e 502 """
39037602
A
503 if not cmd_args:
504 print "Zone leak debugging: Print the stack traces starting from head to the tail. \nUsage: zstack_inorder <btlog addr>"
39236c6e 505 return
39037602
A
506 if int(kern.globals.log_records) == 0:
507 print "Zone logging not enabled. Add 'zlog=<zone name>' to boot-args."
39236c6e 508 return
39236c6e 509
39037602
A
510 btlog_ptr = kern.GetValueFromAddress(cmd_args[0], 'btlog_t *')
511 btrecords_total_size = unsigned(btlog_ptr.btlog_buffersize)
512 btrecord_size = unsigned(btlog_ptr.btrecord_size)
513 btrecords = unsigned(btlog_ptr.btrecords)
514 btlog_size = unsigned(sizeof('struct btlog'))
515 depth = unsigned(btlog_ptr.btrecord_btdepth)
516 zstack_head = unsigned(btlog_ptr.head)
517 zstack_index = zstack_head
518 zstack_tail = unsigned(btlog_ptr.tail)
519 count = ((btrecords_total_size - btlog_size)/btrecord_size)
520
521 while count and (zstack_index != 0xffffff):
522 zstack_record_offset = zstack_index * btrecord_size
523 zstack_record = kern.GetValueFromAddress(btrecords + zstack_record_offset, 'btlog_record_t *')
524 ShowZStackRecord(zstack_record, zstack_index, depth, unsigned(btlog_ptr.active_element_count))
525 zstack_index = zstack_record.next
526 count -= 1
527
528# EndMacro : zstack_inorder
529
530# Macro: findoldest
531
532@lldb_command('findoldest')
533def FindOldest(cmd_args=None):
534 """
535 """
536 print "***** DEPRECATED ***** use 'zstack_findleak' macro instead."
537 return
39236c6e
A
538# EndMacro : findoldest
539
39037602 540# Macro : zstack_findleak
39236c6e 541
39037602
A
542@lldb_command('zstack_findleak')
543def zstack_findleak(cmd_args=None):
544 """ Zone leak debugging: search the log and print the stack with the most active references
39236c6e 545 in the stack trace.
39037602 546 Usage: zstack_findleak <btlog address>
39236c6e 547
39037602
A
548 This is useful for verifying a suspected stack as being the source of
549 the leak.
39236c6e 550 """
39037602
A
551 btlog_ptr = kern.GetValueFromAddress(cmd_args[0], 'btlog_t *')
552 btrecord_size = unsigned(btlog_ptr.btrecord_size)
553 btrecords = unsigned(btlog_ptr.btrecords)
554
555 cpcs_index = unsigned(btlog_ptr.head)
556 depth = unsigned(btlog_ptr.btrecord_btdepth)
557 highref = 0
558 highref_index = 0
559 highref_record = 0
39236c6e
A
560
561 while cpcs_index != 0xffffff:
39037602
A
562 cpcs_record_offset = cpcs_index * btrecord_size
563 cpcs_record = kern.GetValueFromAddress(btrecords + cpcs_record_offset, 'btlog_record_t *')
564 if cpcs_record.ref_count > highref:
565 highref_record = cpcs_record
566 highref = cpcs_record.ref_count
567 highref_index = cpcs_index
39236c6e 568 cpcs_index = cpcs_record.next
39037602 569 ShowZStackRecord(highref_record, highref_index, depth, unsigned(btlog_ptr.active_element_count))
39236c6e 570
39037602 571# EndMacro: zstack_findleak
39236c6e
A
572
573# Macro: findelem
574
575@lldb_command('findelem')
576def FindElem(cmd_args=None):
39037602
A
577 """
578 """
579 print "***** DEPRECATED ***** use 'zstack_findelem' macro instead."
580 return
581# EndMacro: findelem
582
583@lldb_command('zstack_findelem')
584def ZStackFindElem(cmd_args=None):
585 """ Zone corruption debugging: search the zone log and print out the stack traces for all log entries that
39236c6e 586 refer to the given zone element.
39037602 587 Usage: zstack_findelem <btlog addr> <elem addr>
39236c6e
A
588
589 When the kernel panics due to a corrupted zone element, get the
590 element address and use this command. This will show you the stack traces of all logged zalloc and
591 zfree operations which tells you who touched the element in the recent past. This also makes
592 double-frees readily apparent.
593 """
594 if not cmd_args:
39037602 595 print ZStackFindElem.__doc__
39236c6e 596 return
39037602
A
597 if int(kern.globals.log_records) == 0 or unsigned(kern.globals.corruption_debug_flag) == 0:
598 print "Zone logging with corruption detection not enabled. Add '-zc zlog=<zone name>' to boot-args."
39236c6e
A
599 return
600
39037602
A
601 btlog_ptr = kern.GetValueFromAddress(cmd_args[0], 'btlog_t *')
602 target_element = unsigned(kern.GetValueFromAddress(cmd_args[1], 'void *'))
603
604 btrecord_size = unsigned(btlog_ptr.btrecord_size)
605 btrecords = unsigned(btlog_ptr.btrecords)
606 depth = unsigned(btlog_ptr.btrecord_btdepth)
39236c6e 607
39037602
A
608 prev_op = -1
609 scan_items = 0
610 hashelem = cast(btlog_ptr.elem_linkage_un.element_hash_queue.tqh_first, 'btlog_element_t *')
611 if (target_element >> 32) != 0:
612 target_element = target_element ^ 0xFFFFFFFFFFFFFFFF
613 else:
614 target_element = target_element ^ 0xFFFFFFFF
615 while hashelem != 0:
616 if unsigned(hashelem.elem) == target_element:
617 recindex = hashelem.recindex
618 recoffset = recindex * btrecord_size
619 record = kern.GetValueFromAddress(btrecords + recoffset, 'btlog_record_t *')
620 out_str = ('-' * 8)
621 if record.operation == 1:
622 out_str += "OP: ALLOC. "
623 else:
624 out_str += "OP: FREE. "
625 out_str += "Stack Index {0: <d} {1: <s}\n".format(recindex, ('-' * 8))
626 print out_str
627 print GetBtlogBacktrace(depth, record)
628 print " \n"
629 if int(record.operation) == prev_op:
39236c6e 630 print "{0: <s} DOUBLE OP! {1: <s}".format(('*' * 8), ('*' * 8))
39037602
A
631 return
632 prev_op = int(record.operation)
633 scan_items = 0
634 hashelem = cast(hashelem.element_hash_link.tqe_next, 'btlog_element_t *')
635 scan_items += 1
636 if scan_items % 100 == 0:
637 print "Scanning is ongoing. {0: <d} items scanned since last check." .format(scan_items)
39236c6e 638
39037602 639# EndMacro: zstack_findelem
39236c6e
A
640
641# Macro: btlog_find
642
fe8ab488 643@lldb_command('btlog_find', "AS")
39236c6e 644def BtlogFind(cmd_args=None, cmd_options={}):
39236c6e 645 """
39037602
A
646 """
647 print "***** DEPRECATED ***** use 'zstack_findelem' macro instead."
fe8ab488 648 return
39236c6e
A
649
650#EndMacro: btlog_find
651
652#Macro: showzalloc
653
654@lldb_command('showzalloc')
655def ShowZalloc(cmd_args=None):
656 """ Prints a zallocation from the zallocations array based off its index and prints the associated symbolicated backtrace.
657 Usage: showzalloc <index>
658 """
659 if not cmd_args:
660 print ShowZalloc.__doc__
661 return
662 if unsigned(kern.globals.zallocations) == 0:
663 print "zallocations array not initialized!"
664 return
665 zallocation = kern.globals.zallocations[ArgumentStringToInt(cmd_args[0])]
666 print zallocation
667 ShowZTrace([str(int(zallocation.za_trace_index))])
668
669#EndMacro: showzalloc
670
671#Macro: showztrace
672
673@lldb_command('showztrace')
674def ShowZTrace(cmd_args=None):
675 """ Prints the backtrace from the ztraces array at index
676 Usage: showztrace <trace index>
677 """
678 if not cmd_args:
679 print ShowZTrace.__doc__
680 return
681 if unsigned(kern.globals.ztraces) == 0:
682 print "ztraces array not initialized!"
683 return
684 ztrace_addr = kern.globals.ztraces[ArgumentStringToInt(cmd_args[0])]
685 print ztrace_addr
686 ShowZstackTraceHelper(ztrace_addr.zt_stack, ztrace_addr.zt_depth)
687
688#EndMacro: showztrace
689
690#Macro: showztraceaddr
691
692@lldb_command('showztraceaddr')
693def ShowZTraceAddr(cmd_args=None):
694 """ Prints the struct ztrace passed in.
695 Usage: showztraceaddr <trace address>
696 """
697 if not cmd_args:
698 print ShowZTraceAddr.__doc__
699 return
700 ztrace_ptr = kern.GetValueFromAddress(cmd_args[0], 'struct ztrace *')
701 print dereference(ztrace_ptr)
702 ShowZstackTraceHelper(ztrace_ptr.zt_stack, ztrace_ptr.zt_depth)
703
704#EndMacro: showztraceaddr
705
706#Macro: showzstacktrace
707
708@lldb_command('showzstacktrace')
709def ShowZstackTrace(cmd_args=None):
710 """ Routine to print a stacktrace stored by OSBacktrace.
711 Usage: showzstacktrace <saved stacktrace> [size]
712
713 size is optional, defaults to 15.
714 """
715 if not cmd_args:
716 print ShowZstackTrace.__doc__
717 return
718 void_ptr_type = gettype('void *')
719 void_double_ptr_type = void_ptr_type.GetPointerType()
720 trace = kern.GetValueFromAddress(cmd_args[0], void_double_ptr_type)
721 trace_size = 15
722 if len(cmd_args) >= 2:
723 trace_size = ArgumentStringToInt(cmd_args[1])
724 ShowZstackTraceHelper(trace, trace_size)
725
726#EndMacro: showzstacktrace
727
728def ShowZstackTraceHelper(stack, depth):
729 """ Helper routine for printing a zstack.
730 params:
731 stack: void *[] - An array of pointers representing the Zstack
732 depth: int - The depth of the ztrace stack
733 returns:
734 None
735 """
736 trace_current = 0
737 while trace_current < depth:
738 trace_addr = stack[trace_current]
739 symbol_arr = kern.SymbolicateFromAddress(unsigned(trace_addr))
740 if symbol_arr:
741 symbol_str = str(symbol_arr[0].addr)
742 else:
743 symbol_str = ''
744 print '{0: <#x} {1: <s}'.format(trace_addr, symbol_str)
745 trace_current += 1
746
747#Macro: showtopztrace
748
749@lldb_command('showtopztrace')
750def ShowTopZtrace(cmd_args=None):
751 """ Shows the ztrace with the biggest size.
752 (According to top_ztrace, not by iterating through the hash table)
753 """
754 top_trace = kern.globals.top_ztrace
755 print 'Index: {0: <d}'.format((unsigned(top_trace) - unsigned(kern.globals.ztraces)) / sizeof('struct ztrace'))
756 print dereference(top_trace)
757 ShowZstackTraceHelper(top_trace.zt_stack, top_trace.zt_depth)
758
759#EndMacro: showtopztrace
760
761#Macro: showzallocs
762
763@lldb_command('showzallocs')
764def ShowZallocs(cmd_args=None):
765 """ Prints all allocations in the zallocations table
766 """
767 if unsigned(kern.globals.zallocations) == 0:
768 print "zallocations array not initialized!"
769 return
770 print '{0: <5s} {1: <18s} {2: <5s} {3: <15s}'.format('INDEX','ADDRESS','TRACE','SIZE')
771 current_index = 0
772 max_zallocation = unsigned(kern.globals.zleak_alloc_buckets)
773 allocation_count = 0
774 while current_index < max_zallocation:
775 current_zalloc = kern.globals.zallocations[current_index]
776 if int(current_zalloc.za_element) != 0:
777 print '{0: <5d} {1: <#018x} {2: <5d} {3: <15d}'.format(current_index, current_zalloc.za_element, current_zalloc.za_trace_index, unsigned(current_zalloc.za_size))
778 allocation_count += 1
779 current_index += 1
780 print 'Total Allocations: {0: <d}'.format(allocation_count)
781
782#EndMacro: showzallocs
783
784#Macro: showzallocsfortrace
785
786@lldb_command('showzallocsfortrace')
787def ShowZallocsForTrace(cmd_args=None):
788 """ Prints all allocations pointing to the passed in trace's index into ztraces by looking through zallocations table
789 Usage: showzallocsfortrace <trace index>
790 """
791 if not cmd_args:
792 print ShowZallocsForTrace.__doc__
793 return
794 print '{0: <5s} {1: <18s} {2: <15s}'.format('INDEX','ADDRESS','SIZE')
795 target_index = ArgumentStringToInt(cmd_args[0])
796 current_index = 0
797 max_zallocation = unsigned(kern.globals.zleak_alloc_buckets)
798 allocation_count = 0
799 while current_index < max_zallocation:
800 current_zalloc = kern.globals.zallocations[current_index]
801 if unsigned(current_zalloc.za_element) != 0 and (unsigned(current_zalloc.za_trace_index) == unsigned(target_index)):
802 print '{0: <5d} {1: <#018x} {2: <6d}'.format(current_index, current_zalloc.za_element, current_zalloc.za_size)
803 allocation_count += 1
804 current_index += 1
805 print 'Total Allocations: {0: <d}'.format(allocation_count)
806
807#EndMacro: showzallocsfortrace
808
809#Macro: showztraces
810
811@lldb_command('showztraces')
812def ShowZTraces(cmd_args=None):
813 """ Prints all traces with size > 0
814 """
815 ShowZTracesAbove([0])
816
817#EndMacro: showztraces
818
819#Macro: showztracesabove
820
821@lldb_command('showztracesabove')
822def ShowZTracesAbove(cmd_args=None):
823 """ Prints all traces with size greater than X
824 Usage: showztracesabove <size>
825 """
826 if not cmd_args:
827 print ShowZTracesAbove.__doc__
828 return
829 print '{0: <5s} {1: <6s}'.format('INDEX','SIZE')
830 current_index = 0
831 ztrace_count = 0
832 max_ztrace = unsigned(kern.globals.zleak_trace_buckets)
833 while current_index < max_ztrace:
834 ztrace_current = kern.globals.ztraces[current_index]
835 if ztrace_current.zt_size > unsigned(cmd_args[0]):
836 print '{0: <5d} {1: <6d}'.format(current_index, int(ztrace_current.zt_size))
837 ztrace_count += 1
838 current_index += 1
839 print 'Total traces: {0: <d}'.format(ztrace_count)
840
841#EndMacro: showztracesabove
842
843#Macro: showztracehistogram
844
845@lldb_command('showztracehistogram')
846def ShowZtraceHistogram(cmd_args=None):
847 """ Prints the histogram of the ztrace table
848 """
849 print '{0: <5s} {1: <9s} {2: <10s}'.format('INDEX','HIT_COUNT','COLLISIONS')
850 current_index = 0
851 ztrace_count = 0
852 max_ztrace = unsigned(kern.globals.zleak_trace_buckets)
853 while current_index < max_ztrace:
854 ztrace_current = kern.globals.ztraces[current_index]
855 if ztrace_current.zt_hit_count != 0:
856 print '{0: <5d} {1: <9d} {2: <10d}'.format(current_index, ztrace_current.zt_hit_count, ztrace_current.zt_collisions)
857 ztrace_count += 1
858 current_index += 1
859 print 'Total traces: {0: <d}'.format(ztrace_count)
860
861#EndMacro: showztracehistogram
862
863#Macro: showzallochistogram
864
865@lldb_command('showzallochistogram')
866def ShowZallocHistogram(cmd_args=None):
867 """ Prints the histogram for the zalloc table
868 """
869 print '{0: <5s} {1: <9s}'.format('INDEX','HIT_COUNT')
870 current_index = 0
871 zallocation_count = 0
872 max_ztrace = unsigned(kern.globals.zleak_alloc_buckets)
873 while current_index < max_ztrace:
874 zallocation_current = kern.globals.zallocations[current_index]
875 if zallocation_current.za_hit_count != 0:
876 print '{0: <5d} {1: <9d}'.format(current_index, zallocation_current.za_hit_count)
877 zallocation_count += 1
878 current_index += 1
879 print 'Total Allocations: {0: <d}'.format(zallocation_count)
880
881#EndMacro: showzallochistogram
882
883#Macro: showzstats
884
885@lldb_command('showzstats')
886def ShowZstats(cmd_args=None):
887 """ Prints the zone leak detection stats
888 """
889 print 'z_alloc_collisions: {0: <d}, z_trace_collisions: {1: <d}'.format(unsigned(kern.globals.z_alloc_collisions), unsigned(kern.globals.z_trace_collisions))
890 print 'z_alloc_overwrites: {0: <d}, z_trace_overwrites: {1: <d}'.format(unsigned(kern.globals.z_alloc_overwrites), unsigned(kern.globals.z_trace_overwrites))
891 print 'z_alloc_recorded: {0: <d}, z_trace_recorded: {1: <d}'.format(unsigned(kern.globals.z_alloc_recorded), unsigned(kern.globals.z_trace_recorded))
892
893#EndMacro: showzstats
894
fe8ab488
A
895def GetBtlogBacktrace(depth, zstack_record):
896 """ Helper routine for getting a BT Log record backtrace stack.
39236c6e
A
897 params:
898 depth:int - The depth of the zstack record
899 zstack_record:btlog_record_t * - A BTLog record
900 returns:
fe8ab488 901 str - string with backtrace in it.
39236c6e
A
902 """
903 out_str = ''
904 frame = 0
905 if not zstack_record:
fe8ab488
A
906 return "Zstack record none!"
907
39236c6e
A
908 depth_val = unsigned(depth)
909 while frame < depth_val:
910 frame_pc = zstack_record.bt[frame]
911 if not frame_pc or int(frame_pc) == 0:
912 break
913 symbol_arr = kern.SymbolicateFromAddress(frame_pc)
914 if symbol_arr:
915 symbol_str = str(symbol_arr[0].addr)
916 else:
917 symbol_str = ''
918 out_str += "{0: <#0x} <{1: <s}>\n".format(frame_pc, symbol_str)
919 frame += 1
fe8ab488 920 return out_str
39236c6e 921
39037602 922def ShowZStackRecord(zstack_record, zstack_index, btrecord_btdepth, elements_count):
39236c6e
A
923 """ Helper routine for printing a single zstack record
924 params:
925 zstack_record:btlog_record_t * - A BTLog record
926 zstack_index:int - Index for the record in the BTLog table
927 returns:
928 None
929 """
930 out_str = ('-' * 8)
931 if zstack_record.operation == 1:
39037602 932 out_str += "ALLOC. "
39236c6e 933 else:
39037602
A
934 out_str += "FREE. "
935 out_str += "Stack Index {0: <d} with active refs {1: <d} of {2: <d} {3: <s}\n".format(zstack_index, zstack_record.ref_count, elements_count, ('-' * 8))
39236c6e 936 print out_str
39037602
A
937 print GetBtlogBacktrace(btrecord_btdepth, zstack_record)
938 print " \n"
39236c6e
A
939
940# Macro: showioalloc
941
942@lldb_command('showioalloc')
943def ShowIOAllocations(cmd_args=None):
944 """ Show some accounting of memory allocated by IOKit allocators. See ioalloccount man page for details.
945 Routine to display a summary of memory accounting allocated by IOKit allocators.
946 """
947 print "Instance allocation = {0: <#0x} = {1: d}K".format(kern.globals.debug_ivars_size, (kern.globals.debug_ivars_size / 1024))
948 print "Container allocation = {0: <#0x} = {1: d}K".format(kern.globals.debug_container_malloc_size, (kern.globals.debug_container_malloc_size / 1024))
949 print "IOMalloc allocation = {0: <#0x} = {1: d}K".format(kern.globals.debug_iomalloc_size, (kern.globals.debug_iomalloc_size / 1024))
950 print "Container allocation = {0: <#0x} = {1: d}K".format(kern.globals.debug_iomallocpageable_size, (kern.globals.debug_iomallocpageable_size / 1024))
951
952
953# EndMacro: showioalloc
954
955
3e170ce0
A
956# Macro: showselectmem
957@lldb_command('showselectmem', "S:")
958def ShowSelectMem(cmd_args=None, cmd_options={}):
959 """ Show memory cached by threads on calls to select.
960
961 usage: showselectmem [-v]
962 -v : print each thread's memory
963 (one line per thread with non-zero select memory)
964 -S {addr} : Find the thread whose thread-local select set
965 matches the given address
966 """
967 verbose = False
968 opt_wqs = 0
969 if config['verbosity'] > vHUMAN:
970 verbose = True
971 if "-S" in cmd_options:
972 opt_wqs = unsigned(kern.GetValueFromAddress(cmd_options["-S"], 'uint64_t *'))
973 if opt_wqs == 0:
974 raise ArgumentError("Invalid waitq set address: {:s}".format(cmd_options["-S"]))
975 selmem = 0
976 if verbose:
977 print "{:18s} {:10s} {:s}".format('Task', 'Thread ID', 'Select Mem (bytes)')
978 for t in kern.tasks:
979 for th in IterateQueue(t.threads, 'thread *', 'task_threads'):
980 uth = Cast(th.uthread, 'uthread *');
981 wqs = 0
982 if hasattr(uth, 'uu_allocsize'): # old style
983 thmem = uth.uu_allocsize
984 wqs = uth.uu_wqset
985 elif hasattr(uth, 'uu_wqstate_sz'): # new style
986 thmem = uth.uu_wqstate_sz
987 wqs = uth.uu_wqset
988 else:
989 print "What kind of uthread is this?!"
990 return
991 if opt_wqs and opt_wqs == unsigned(wqs):
992 print "FOUND: {:#x} in thread: {:#x} ({:#x})".format(opt_wqs, unsigned(th), unsigned(th.thread_id))
993 if verbose and thmem > 0:
994 print "{:<#18x} {:<#10x} {:d}".format(unsigned(t), unsigned(th.thread_id), thmem)
995 selmem += thmem
996 print '-'*40
997 print "Total: {:d} bytes ({:d} kbytes)".format(selmem, selmem/1024)
998# Endmacro: showselectmem
39236c6e
A
999
1000
1001# Macro: showtaskvme
fe8ab488
A
1002@lldb_command('showtaskvme', "PS")
1003def ShowTaskVmeHelper(cmd_args=None, cmd_options={}):
39236c6e
A
1004 """ Display a summary list of the specified vm_map's entries
1005 Usage: showtaskvme <task address> (ex. showtaskvme 0x00ataskptr00 )
3e170ce0
A
1006 Use -S flag to show VM object shadow chains
1007 Use -P flag to show pager info (mapped file, compressed pages, ...)
39236c6e 1008 """
fe8ab488
A
1009 show_pager_info = False
1010 show_all_shadows = False
1011 if "-P" in cmd_options:
1012 show_pager_info = True
1013 if "-S" in cmd_options:
1014 show_all_shadows = True
39236c6e 1015 task = kern.GetValueFromAddress(cmd_args[0], 'task *')
fe8ab488 1016 ShowTaskVMEntries(task, show_pager_info, show_all_shadows)
39236c6e 1017
fe8ab488
A
1018@lldb_command('showallvme', "PS")
1019def ShowAllVME(cmd_args=None, cmd_options={}):
39236c6e 1020 """ Routine to print a summary listing of all the vm map entries
fe8ab488
A
1021 Go Through each task in system and show the vm memory regions
1022 Use -S flag to show VM object shadow chains
1023 Use -P flag to show pager info (mapped file, compressed pages, ...)
1024 """
1025 show_pager_info = False
1026 show_all_shadows = False
1027 if "-P" in cmd_options:
1028 show_pager_info = True
1029 if "-S" in cmd_options:
1030 show_all_shadows = True
39236c6e 1031 for task in kern.tasks:
fe8ab488 1032 ShowTaskVMEntries(task, show_pager_info, show_all_shadows)
39236c6e
A
1033
1034@lldb_command('showallvm')
1035def ShowAllVM(cmd_args=None):
1036 """ Routine to print a summary listing of all the vm maps
1037 """
1038 for task in kern.tasks:
1039 print GetTaskSummary.header + ' ' + GetProcSummary.header
1040 print GetTaskSummary(task) + ' ' + GetProcSummary(Cast(task.bsd_info, 'proc *'))
1041 print GetVMMapSummary.header
1042 print GetVMMapSummary(task.map)
1043
1044@lldb_command("showtaskvm")
1045def ShowTaskVM(cmd_args=None):
1046 """ Display info about the specified task's vm_map
1047 syntax: (lldb) showtaskvm <task_ptr>
1048 """
1049 if not cmd_args:
1050 print ShowTaskVM.__doc__
1051 return False
1052 task = kern.GetValueFromAddress(cmd_args[0], 'task *')
1053 if not task:
1054 print "Unknown arguments."
1055 return False
1056 print GetTaskSummary.header + ' ' + GetProcSummary.header
1057 print GetTaskSummary(task) + ' ' + GetProcSummary(Cast(task.bsd_info, 'proc *'))
1058 print GetVMMapSummary.header
1059 print GetVMMapSummary(task.map)
1060 return True
1061
1062@lldb_command('showallvmstats')
1063def ShowAllVMStats(cmd_args=None):
1064 """ Print a summary of vm statistics in a table format
1065 """
3e170ce0 1066 page_size = kern.globals.page_size
39236c6e
A
1067 vmstats = lambda:None
1068 vmstats.wired_count = 0
1069 vmstats.resident_count = 0
1070 vmstats.resident_max = 0
1071 vmstats.internal = 0
1072 vmstats.external = 0
1073 vmstats.reusable = 0
1074 vmstats.compressed = 0
1075 vmstats.compressed_peak = 0
1076 vmstats.compressed_lifetime = 0
1077 vmstats.error = ''
1078
1079 hdr_format = "{0: >10s} {1: <20s} {2: >6s} {3: >10s} {4: >10s} {5: >10s} {6: >10s} {7: >10s} {8: >10s} {9: >10s} {10: >10s} {11: >10s} {12: >10s} {13: >10s} {14:}"
1080 print hdr_format.format('pid', 'command', '#ents', 'wired', 'vsize', 'rsize', 'NEW RSIZE', 'max rsize', 'internal', 'external', 'reusable', 'compressed', 'compressed', 'compressed', '')
1081 print hdr_format.format('', '', '', '(pages)', '(pages)', '(pages)', '(pages)', '(pages)', '(pages)', '(pages)', '(pages)', '(current)', '(peak)', '(lifetime)', '')
1082 entry_format = "{p.p_pid: >10d} {p.p_comm: <20s} {m.hdr.nentries: >6d} {s.wired_count: >10d} {vsize: >10d} {s.resident_count: >10d} {s.new_resident_count: >10d} {s.resident_max: >10d} {s.internal: >10d} {s.external: >10d} {s.reusable: >10d} {s.compressed: >10d} {s.compressed_peak: >10d} {s.compressed_lifetime: >10d} {s.error}"
1083
1084 for task in kern.tasks:
1085 proc = Cast(task.bsd_info, 'proc *')
1086 vmmap = Cast(task.map, '_vm_map *')
1087 vmstats.error = ''
1088 vmstats.wired_count = vmmap.pmap.stats.wired_count;
1089 vmstats.resident_count = unsigned(vmmap.pmap.stats.resident_count);
1090 vmstats.resident_max = vmmap.pmap.stats.resident_max;
1091 vmstats.internal = unsigned(vmmap.pmap.stats.internal);
1092 vmstats.external = unsigned(vmmap.pmap.stats.external);
1093 vmstats.reusable = unsigned(vmmap.pmap.stats.reusable);
1094 vmstats.compressed = unsigned(vmmap.pmap.stats.compressed);
1095 vmstats.compressed_peak = unsigned(vmmap.pmap.stats.compressed_peak);
1096 vmstats.compressed_lifetime = unsigned(vmmap.pmap.stats.compressed_lifetime);
1097 vmstats.new_resident_count = vmstats.internal + vmstats.external
1098
1099 if vmstats.internal < 0:
1100 vmstats.error += '*'
1101 if vmstats.external < 0:
1102 vmstats.error += '*'
1103 if vmstats.reusable < 0:
1104 vmstats.error += '*'
1105 if vmstats.compressed < 0:
1106 vmstats.error += '*'
1107 if vmstats.compressed_peak < 0:
1108 vmstats.error += '*'
1109 if vmstats.compressed_lifetime < 0:
1110 vmstats.error += '*'
1111 if vmstats.new_resident_count +vmstats.reusable != vmstats.resident_count:
1112 vmstats.error += '*'
1113
3e170ce0 1114 print entry_format.format(p=proc, m=vmmap, vsize=(unsigned(vmmap.size) / page_size), t=task, s=vmstats)
39236c6e
A
1115
1116
fe8ab488 1117def ShowTaskVMEntries(task, show_pager_info, show_all_shadows):
39236c6e
A
1118 """ Routine to print out a summary listing of all the entries in a vm_map
1119 params:
1120 task - core.value : a object of type 'task *'
1121 returns:
1122 None
1123 """
1124 print "vm_map entries for task " + hex(task)
1125 print GetTaskSummary.header
1126 print GetTaskSummary(task)
1127 if not task.map:
1128 print "Task {0: <#020x} has map = 0x0"
1129 return None
1130 print GetVMMapSummary.header
1131 print GetVMMapSummary(task.map)
1132 vme_list_head = task.map.hdr.links
1133 vme_ptr_type = GetType('vm_map_entry *')
1134 print GetVMEntrySummary.header
1135 for vme in IterateQueue(vme_list_head, vme_ptr_type, "links"):
fe8ab488 1136 print GetVMEntrySummary(vme, show_pager_info, show_all_shadows)
39236c6e
A
1137 return None
1138
1139@lldb_command("showmap")
1140def ShowMap(cmd_args=None):
1141 """ Routine to print out info about the specified vm_map
1142 usage: showmap <vm_map>
1143 """
1144 if cmd_args == None or len(cmd_args) < 1:
1145 print "Invalid argument.", ShowMap.__doc__
1146 return
1147 map_val = kern.GetValueFromAddress(cmd_args[0], 'vm_map_t')
1148 print GetVMMapSummary.header
1149 print GetVMMapSummary(map_val)
1150
1151@lldb_command("showmapvme")
1152def ShowMapVME(cmd_args=None):
1153 """Routine to print out info about the specified vm_map and its vm entries
1154 usage: showmapvme <vm_map>
1155 """
1156 if cmd_args == None or len(cmd_args) < 1:
1157 print "Invalid argument.", ShowMap.__doc__
1158 return
1159 map_val = kern.GetValueFromAddress(cmd_args[0], 'vm_map_t')
1160 print GetVMMapSummary.header
1161 print GetVMMapSummary(map_val)
1162 vme_list_head = map_val.hdr.links
1163 vme_ptr_type = GetType('vm_map_entry *')
1164 print GetVMEntrySummary.header
1165 for vme in IterateQueue(vme_list_head, vme_ptr_type, "links"):
1166 print GetVMEntrySummary(vme)
1167 return None
1168
1169@lldb_type_summary(['_vm_map *', 'vm_map_t'])
1170@header("{0: <20s} {1: <20s} {2: <20s} {3: >5s} {4: >5s} {5: <20s} {6: <20s}".format("vm_map", "pmap", "vm_size", "#ents", "rpage", "hint", "first_free"))
1171def GetVMMapSummary(vmmap):
1172 """ Display interesting bits from vm_map struct """
1173 out_string = ""
1174 format_string = "{0: <#020x} {1: <#020x} {2: <#020x} {3: >5d} {4: >5d} {5: <#020x} {6: <#020x}"
1175 vm_size = uint64_t(vmmap.size).value
1176 resident_pages = 0
1177 if vmmap.pmap != 0: resident_pages = int(vmmap.pmap.stats.resident_count)
4bd07ac2
A
1178 first_free = 0
1179 if int(vmmap.holelistenabled) == 0: first_free = vmmap.f_s.first_free
1180 out_string += format_string.format(vmmap, vmmap.pmap, vm_size, vmmap.hdr.nentries, resident_pages, vmmap.hint, first_free)
39236c6e
A
1181 return out_string
1182
1183@lldb_type_summary(['vm_map_entry'])
1184@header("{0: <20s} {1: <20s} {2: <5s} {3: >7s} {4: <20s} {5: <20s}".format("entry", "start", "prot", "#page", "object", "offset"))
1185def GetVMEntrySummary(vme):
1186 """ Display vm entry specific information. """
3e170ce0 1187 page_size = kern.globals.page_size
39236c6e
A
1188 out_string = ""
1189 format_string = "{0: <#020x} {1: <#20x} {2: <1x}{3: <1x}{4: <3s} {5: >7d} {6: <#020x} {7: <#020x}"
1190 vme_protection = int(vme.protection)
1191 vme_max_protection = int(vme.max_protection)
1192 vme_extra_info_str ="SC-Ds"[int(vme.inheritance)]
1193 if int(vme.is_sub_map) != 0 :
1194 vme_extra_info_str +="s"
1195 elif int(vme.needs_copy) != 0 :
1196 vme_extra_info_str +="n"
3e170ce0
A
1197 num_pages = (unsigned(vme.links.end) - unsigned(vme.links.start)) / page_size
1198 out_string += format_string.format(vme, vme.links.start, vme_protection, vme_max_protection, vme_extra_info_str, num_pages, vme.vme_object.vmo_object, vme.vme_offset)
39236c6e
A
1199 return out_string
1200
1201# EndMacro: showtaskvme
1202@lldb_command('showmapwired')
1203def ShowMapWired(cmd_args=None):
1204 """ Routine to print out a summary listing of all the entries with wired pages in a vm_map
1205 """
1206 if cmd_args == None or len(cmd_args) < 1:
1207 print "Invalid argument", ShowMapWired.__doc__
1208 return
1209 map_val = kern.GetValueFromAddress(cmd_args[0], 'vm_map_t')
39037602 1210
39236c6e
A
1211
1212@lldb_type_summary(['kmod_info_t *'])
39037602 1213@header("{0: <20s} {1: <20s} {2: <20s} {3: >3s} {4: >5s} {5: <20s} {6: <20s} {7: >20s} {8: <30s}".format('kmod_info', 'address', 'size', 'id', 'refs', 'TEXT exec', 'size', 'version', 'name'))
39236c6e
A
1214def GetKextSummary(kmod):
1215 """ returns a string representation of kext information
1216 """
1217 out_string = ""
39037602
A
1218 format_string = "{0: <#020x} {1: <#020x} {2: <#020x} {3: >3d} {4: >5d} {5: <#020x} {6: <#020x} {7: >20s} {8: <30s}"
1219 segments, sections = GetAllSegmentsAndSectionsFromDataInMemory(unsigned(kmod.address), unsigned(kmod.size))
1220 text_segment = macho.get_text_segment(segments)
1221 if not text_segment:
1222 text_segment = segments[0]
1223 out_string += format_string.format(kmod, kmod.address, kmod.size, kmod.id, kmod.reference_count, text_segment.vmaddr, text_segment.vmsize, kmod.version, kmod.name)
39236c6e
A
1224 return out_string
1225
1226@lldb_type_summary(['uuid_t'])
1227@header("")
1228def GetUUIDSummary(uuid):
1229 """ returns a string representation like CA50DA4C-CA10-3246-B8DC-93542489AA26
1230 """
1231 arr = Cast(addressof(uuid), 'uint8_t *')
1232 data = []
1233 for i in range(16):
1234 data.append(int(arr[i]))
1235 return "{a[0]:02X}{a[1]:02X}{a[2]:02X}{a[3]:02X}-{a[4]:02X}{a[5]:02X}-{a[6]:02X}{a[7]:02X}-{a[8]:02X}{a[9]:02X}-{a[10]:02X}{a[11]:02X}{a[12]:02X}{a[13]:02X}{a[14]:02X}{a[15]:02X}".format(a=data)
1236
1237@lldb_command('showallkmods')
1238def ShowAllKexts(cmd_args=None):
1239 """Display a summary listing of all loaded kexts (alias: showallkmods)
1240 """
1241 kmod_val = kern.globals.kmod
39037602 1242 kextuuidinfo = GetKextLoadInformation(show_progress=(config['verbosity'] > vHUMAN))
39236c6e 1243 print "{: <36s} ".format("UUID") + GetKextSummary.header
39236c6e
A
1244 for kval in IterateLinkedList(kmod_val, 'next'):
1245 uuid = "........-....-....-....-............"
1246 kaddr = unsigned(kval.address)
39037602 1247 found_kext_summary = None
39236c6e 1248 for l in kextuuidinfo :
39037602 1249 if kaddr == int(l[3],16):
39236c6e 1250 uuid = l[0]
39037602 1251 found_kext_summary = l
39236c6e 1252 break
39037602
A
1253 if found_kext_summary:
1254 _ksummary = GetKextSummary(found_kext_summary[7])
1255 else:
1256 _ksummary = GetKextSummary(kval)
1257 print uuid + " " + _ksummary
39236c6e 1258
39037602
A
1259def GetKmodWithAddr(addr):
1260 """ Go through kmod list and find one with begin_addr as addr
1261 returns: None if not found. else a cvalue of type kmod
1262 """
1263 kmod_val = kern.globals.kmod
1264 for kval in IterateLinkedList(kmod_val, 'next'):
1265 if addr == unsigned(kval.address):
1266 return kval
1267 return None
1268
1269def GetAllSegmentsAndSectionsFromDataInMemory(address, size):
1270 """ reads memory at address and parses mach_header to get segment and section information
1271 returns: Tuple of (segments_list, sections_list) like ([MachOSegment,...], [MachOSegment, ...])
1272 where MachOSegment has fields like 'name vmaddr vmsize fileoff filesize'
1273 if TEXT segment is not found a dummy segment & section with address, size is returned.
1274 """
1275 cache_hash = "kern.kexts.segments.{}.{}".format(address, size)
1276 cached_result = caching.GetDynamicCacheData(cache_hash,())
1277 if cached_result:
1278 return cached_result
1279
1280 defval = macho.MachOSegment('__TEXT', address, size, 0, size)
1281 if address == 0 or size == 0:
1282 return ([defval], [defval])
1283
1284 # if int(kern.globals.gLoadedKextSummaries.version) <= 2:
1285 # until we have separate version. we will pay penalty only on arm64 devices
1286 if kern.arch not in ('arm64',):
1287 return ([defval], [defval])
1288
1289 restrict_size_to_read = 1536
1290 machoObject = None
1291 while machoObject is None:
1292 err = lldb.SBError()
1293 size_to_read = min(size, restrict_size_to_read)
1294 data = LazyTarget.GetProcess().ReadMemory(address, size_to_read, err)
1295 if not err.Success():
1296 print "Failed to read memory at {} and size {}".format(address, size_to_read)
1297 return ([defval], [defval])
1298 try:
1299 m = macho.MemMacho(data, len(data))
1300 machoObject = m
1301 except Exception as e:
1302 if str(e.message).find('unpack requires a string argument') >= 0:
1303 # this may be due to short read of memory. Lets do double read size.
1304 restrict_size_to_read *= 2
1305 debuglog("Bumping mach header read size to {}".format(restrict_size_to_read))
1306 continue
1307 else:
1308 print "Failed to read MachO for address {} errormessage: {}".format(address, e.message)
1309 return ([defval], [defval])
1310 # end of while loop. We have machoObject defined
1311 segments = machoObject.get_segments_with_name('')
1312 sections = machoObject.get_sections_with_name('')
1313 rval = (segments, sections)
1314 caching.SaveDynamicCacheData(cache_hash, rval)
1315 return rval
1316
1317def GetKextLoadInformation(addr=0, show_progress=False):
39236c6e
A
1318 """ Extract the kext uuid and load address information from the kernel data structure.
1319 params:
1320 addr - int - optional integer that is the address to search for.
39037602
A
1321 returns:
1322 [] - array with each entry of format
1323 ( 'UUID', 'Hex Load Address of __TEXT or __TEXT_EXEC section', 'name',
1324 'addr of macho header', [macho.MachOSegment,..], [MachoSection,...], kext, kmod_obj)
39236c6e 1325 """
39037602
A
1326 cached_result = caching.GetDynamicCacheData("kern.kexts.loadinformation", [])
1327 # if specific addr is provided then ignore caching
1328 if cached_result and not addr:
1329 return cached_result
1330
1331 # because of <rdar://problem/12683084>, we can't find summaries directly
39236c6e
A
1332 #addr = hex(addressof(kern.globals.gLoadedKextSummaries.summaries))
1333 baseaddr = unsigned(kern.globals.gLoadedKextSummaries) + 0x10
1334 summaries_begin = kern.GetValueFromAddress(baseaddr, 'OSKextLoadedKextSummary *')
1335 total_summaries = int(kern.globals.gLoadedKextSummaries.numSummaries)
1336 kext_version = int(kern.globals.gLoadedKextSummaries.version)
1337 entry_size = 64 + 16 + 8 + 8 + 8 + 4 + 4
1338 if kext_version >= 2 :
1339 entry_size = int(kern.globals.gLoadedKextSummaries.entry_size)
1340 retval = []
1341 for i in range(total_summaries):
39037602
A
1342 if show_progress:
1343 print "progress: {}/{}".format(i, total_summaries)
39236c6e
A
1344 tmpaddress = unsigned(summaries_begin) + (i * entry_size)
1345 current_kext = kern.GetValueFromAddress(tmpaddress, 'OSKextLoadedKextSummary *')
39037602
A
1346 # code to extract macho information
1347 segments, sections = GetAllSegmentsAndSectionsFromDataInMemory(unsigned(current_kext.address), unsigned(current_kext.size))
1348 seginfo = macho.get_text_segment(segments)
1349 if not seginfo:
1350 seginfo = segments[0]
1351 kmod_obj = GetKmodWithAddr(unsigned(current_kext.address))
39236c6e 1352 if addr != 0 :
39037602
A
1353 if addr == unsigned(current_kext.address) or addr == seginfo.vmaddr:
1354 return [(GetUUIDSummary(current_kext.uuid) , hex(seginfo.vmaddr).rstrip('L'), str(current_kext.name), hex(current_kext.address), segments, seginfo, current_kext, kmod_obj)]
1355 retval.append((GetUUIDSummary(current_kext.uuid) , hex(seginfo.vmaddr).rstrip('L'), str(current_kext.name), hex(current_kext.address), segments, seginfo, current_kext, kmod_obj))
1356
1357 if not addr:
1358 caching.SaveDynamicCacheData("kern.kexts.loadinformation", retval)
39236c6e
A
1359 return retval
1360
1361lldb_alias('showallkexts', 'showallkmods')
1362
1363def GetOSKextVersion(version_num):
1364 """ returns a string of format 1.2.3x from the version_num
1365 params: version_num - int
39037602 1366 return: str
39236c6e
A
1367 """
1368 if version_num == -1 :
1369 return "invalid"
1370 (MAJ_MULT, MIN_MULT, REV_MULT,STAGE_MULT) = (100000000, 1000000, 10000, 1000)
1371 version = version_num
1372
1373 vers_major = version / MAJ_MULT
1374 version = version - (vers_major * MAJ_MULT)
1375
1376 vers_minor = version / MIN_MULT
1377 version = version - (vers_minor * MIN_MULT)
1378
1379 vers_revision = version / REV_MULT
1380 version = version - (vers_revision * REV_MULT)
1381
1382 vers_stage = version / STAGE_MULT
1383 version = version - (vers_stage * STAGE_MULT)
1384
1385 vers_stage_level = version
1386
1387 out_str = "%d.%d" % (vers_major, vers_minor)
1388 if vers_revision > 0: out_str += ".%d" % vers_revision
1389 if vers_stage == 1 : out_str += "d%d" % vers_stage_level
1390 if vers_stage == 3 : out_str += "a%d" % vers_stage_level
1391 if vers_stage == 5 : out_str += "b%d" % vers_stage_level
1392 if vers_stage == 6 : out_str += "fc%d" % vers_stage_level
1393
1394 return out_str
1395
1396@lldb_command('showallknownkmods')
1397def ShowAllKnownKexts(cmd_args=None):
1398 """ Display a summary listing of all kexts known in the system.
1399 This is particularly useful to find if some kext was unloaded before this crash'ed state.
1400 """
1401 kext_count = int(kern.globals.sKextsByID.count)
1402 index = 0
1403 kext_dictionary = kern.globals.sKextsByID.dictionary
1404 print "%d kexts in sKextsByID:" % kext_count
1405 print "{0: <20s} {1: <20s} {2: >5s} {3: >20s} {4: <30s}".format('OSKEXT *', 'load_addr', 'id', 'version', 'name')
1406 format_string = "{0: <#020x} {1: <20s} {2: >5s} {3: >20s} {4: <30s}"
39037602 1407
39236c6e
A
1408 while index < kext_count:
1409 kext_dict = GetObjectAtIndexFromArray(kext_dictionary, index)
1410 kext_name = str(kext_dict.key.string)
1411 osk = Cast(kext_dict.value, 'OSKext *')
1412 if int(osk.flags.loaded) :
1413 load_addr = "{0: <#020x}".format(osk.kmod_info)
1414 id = "{0: >5d}".format(osk.loadTag)
1415 else:
1416 load_addr = "------"
1417 id = "--"
1418 version_num = unsigned(osk.version)
1419 version = GetOSKextVersion(version_num)
1420 print format_string.format(osk, load_addr, id, version, kext_name)
1421 index += 1
39037602 1422
39236c6e
A
1423 return
1424
1425@lldb_command('showkmodaddr')
1426def ShowKmodAddr(cmd_args=[]):
39037602 1427 """ Given an address, print the offset and name for the kmod containing it
39236c6e
A
1428 Syntax: (lldb) showkmodaddr <addr>
1429 """
1430 if len(cmd_args) < 1:
1431 raise ArgumentError("Insufficient arguments")
1432
1433 addr = ArgumentStringToInt(cmd_args[0])
39037602
A
1434 all_kexts_info = GetKextLoadInformation()
1435 found_kinfo = None
1436 found_segment = None
1437 for kinfo in all_kexts_info:
1438 s = macho.get_segment_with_addr(kinfo[4], addr)
1439 if s:
1440 found_segment = s
1441 found_kinfo = kinfo
1442 break
1443 if found_kinfo:
1444 print GetKextSummary.header
1445 print GetKextSummary(found_kinfo[7]) + " segment: {} offset = {:#0x}".format(found_segment.name, (addr - found_segment.vmaddr))
1446 return True
39236c6e
A
1447 return False
1448
39037602 1449
fe8ab488 1450@lldb_command('addkext','AF:N:')
39236c6e
A
1451def AddKextSyms(cmd_args=[], cmd_options={}):
1452 """ Add kext symbols into lldb.
1453 This command finds symbols for a uuid and load the required executable
39037602 1454 Usage:
39236c6e
A
1455 addkext <uuid> : Load one kext based on uuid. eg. (lldb)addkext 4DD2344C0-4A81-3EAB-BDCF-FEAFED9EB73E
1456 addkext -F <abs/path/to/executable> <load_address> : Load kext executable at specified load address
1457 addkext -N <name> : Load one kext that matches the name provided. eg. (lldb) addkext -N corecrypto
fe8ab488 1458 addkext -N <name> -A: Load all kext that matches the name provided. eg. to load all kext with Apple in name do (lldb) addkext -N Apple -A
39037602 1459 addkext all : Will load all the kext symbols - SLOW
39236c6e 1460 """
39037602 1461
39236c6e
A
1462
1463 if "-F" in cmd_options:
1464 exec_path = cmd_options["-F"]
1465 exec_full_path = ResolveFSPath(exec_path)
1466 if not os.path.exists(exec_full_path):
1467 raise ArgumentError("Unable to resolve {:s}".format(exec_path))
1468
1469 if not os.path.isfile(exec_full_path):
1470 raise ArgumentError("Path is {:s} not a filepath. \nPlease check that path points to executable.\
1471\nFor ex. path/to/Symbols/IOUSBFamily.kext/Contents/PlugIns/AppleUSBHub.kext/Contents/MacOS/AppleUSBHub.\
1472\nNote: LLDB does not support adding kext based on directory paths like gdb used to.".format(exec_path))
39236c6e
A
1473
1474 slide_value = None
1475 if cmd_args:
1476 slide_value = cmd_args[0]
1477 debuglog("loading slide value from user input %s" % cmd_args[0])
1478
1479 filespec = lldb.SBFileSpec(exec_full_path, False)
1480 print "target modules add %s" % exec_full_path
1481 print lldb_run_command("target modules add %s" % exec_full_path)
1482 loaded_module = LazyTarget.GetTarget().FindModule(filespec)
1483 if loaded_module.IsValid():
1484 uuid_str = loaded_module.GetUUIDString()
1485 debuglog("added module %s with uuid %s" % (exec_full_path, uuid_str))
1486 if slide_value is None:
1487 all_kexts_info = GetKextLoadInformation()
1488 for k in all_kexts_info:
1489 debuglog(k[0])
1490 if k[0].lower() == uuid_str.lower():
1491 slide_value = k[1]
1492 debuglog("found the slide %s for uuid %s" % (k[1], k[0]))
39236c6e
A
1493 if slide_value is None:
1494 raise ArgumentError("Unable to find load address for module described at %s " % exec_full_path)
1495 load_cmd = "target modules load --file %s --slide %s" % (exec_full_path, str(slide_value))
1496 print load_cmd
39037602 1497 print lldb_run_command(load_cmd)
39236c6e
A
1498 kern.symbolicator = None
1499 return True
1500
1501 all_kexts_info = GetKextLoadInformation()
39037602 1502
39236c6e
A
1503 if "-N" in cmd_options:
1504 kext_name = cmd_options["-N"]
1505 kext_name_matches = GetLongestMatchOption(kext_name, [str(x[2]) for x in all_kexts_info], True)
fe8ab488 1506 if len(kext_name_matches) != 1 and "-A" not in cmd_options:
39236c6e
A
1507 print "Ambiguous match for name: {:s}".format(kext_name)
1508 if len(kext_name_matches) > 0:
1509 print "Options are:\n\t" + "\n\t".join(kext_name_matches)
1510 return
1511 debuglog("matched the kext to name %s and uuid %s" % (kext_name_matches[0], kext_name))
fe8ab488
A
1512 for cur_knm in kext_name_matches:
1513 for x in all_kexts_info:
1514 if cur_knm == x[2]:
1515 cur_uuid = x[0].lower()
1516 print "Fetching dSYM for {:s}".format(cur_uuid)
1517 info = dsymForUUID(cur_uuid)
1518 if info and 'DBGSymbolRichExecutable' in info:
1519 print "Adding dSYM ({0:s}) for {1:s}".format(cur_uuid, info['DBGSymbolRichExecutable'])
1520 addDSYM(cur_uuid, info)
39037602 1521 loadDSYM(cur_uuid, int(x[1],16), x[4])
fe8ab488
A
1522 else:
1523 print "Failed to get symbol info for {:s}".format(cur_uuid)
1524 break
39236c6e
A
1525 kern.symbolicator = None
1526 return
1527
1528 if len(cmd_args) < 1:
1529 raise ArgumentError("No arguments specified.")
1530
1531 uuid = cmd_args[0].lower()
1532
1533 load_all_kexts = False
1534 if uuid == "all":
1535 load_all_kexts = True
39037602 1536
39236c6e
A
1537 if not load_all_kexts and len(uuid_regex.findall(uuid)) == 0:
1538 raise ArgumentError("Unknown argument {:s}".format(uuid))
1539
1540 for k_info in all_kexts_info:
1541 cur_uuid = k_info[0].lower()
1542 if load_all_kexts or (uuid == cur_uuid):
1543 print "Fetching dSYM for %s" % cur_uuid
1544 info = dsymForUUID(cur_uuid)
1545 if info and 'DBGSymbolRichExecutable' in info:
1546 print "Adding dSYM (%s) for %s" % (cur_uuid, info['DBGSymbolRichExecutable'])
1547 addDSYM(cur_uuid, info)
39037602 1548 loadDSYM(cur_uuid, int(k_info[1],16), k_info[4])
39236c6e
A
1549 else:
1550 print "Failed to get symbol info for %s" % cur_uuid
1551 #end of for loop
1552 kern.symbolicator = None
1553 return True
1554
39037602 1555
39236c6e
A
1556
1557lldb_alias('showkmod', 'showkmodaddr')
1558lldb_alias('showkext', 'showkmodaddr')
1559lldb_alias('showkextaddr', 'showkmodaddr')
1560
1561@lldb_type_summary(['mount *'])
fe8ab488 1562@header("{0: <20s} {1: <20s} {2: <20s} {3: <12s} {4: <12s} {5: <12s} {6: >6s} {7: <30s} {8: <35s} {9: <30s}".format('volume(mp)', 'mnt_data', 'mnt_devvp', 'flag', 'kern_flag', 'lflag', 'type', 'mnton', 'mntfrom', 'iosched supported'))
39236c6e
A
1563def GetMountSummary(mount):
1564 """ Display a summary of mount on the system
1565 """
1566 out_string = ("{mnt: <#020x} {mnt.mnt_data: <#020x} {mnt.mnt_devvp: <#020x} {mnt.mnt_flag: <#012x} " +
1567 "{mnt.mnt_kern_flag: <#012x} {mnt.mnt_lflag: <#012x} {vfs.f_fstypename: >6s} " +
fe8ab488 1568 "{vfs.f_mntonname: <30s} {vfs.f_mntfromname: <35s} {iomode: <30s}").format(mnt=mount, vfs=mount.mnt_vfsstat, iomode=('Yes' if (mount.mnt_ioflags & 0x4) else 'No'))
39236c6e
A
1569 return out_string
1570
1571@lldb_command('showallmounts')
1572def ShowAllMounts(cmd_args=None):
1573 """ Print all mount points
1574 """
1575 mntlist = kern.globals.mountlist
1576 print GetMountSummary.header
1577 for mnt in IterateTAILQ_HEAD(mntlist, 'mnt_list'):
1578 print GetMountSummary(mnt)
1579 return
1580
1581lldb_alias('ShowAllVols', 'showallmounts')
1582
1583@lldb_command('systemlog')
1584def ShowSystemLog(cmd_args=None):
1585 """ Display the kernel's printf ring buffer """
1586 msgbufp = kern.globals.msgbufp
1587 msg_size = int(msgbufp.msg_size)
1588 msg_bufx = int(msgbufp.msg_bufx)
1589 msg_bufr = int(msgbufp.msg_bufr)
1590 msg_bufc = msgbufp.msg_bufc
1591 msg_bufc_data = msg_bufc.GetSBValue().GetPointeeData(0, msg_size)
1592
1593 # the buffer is circular; start at the write pointer to end,
1594 # then from beginning to write pointer
1595 line = ''
1596 err = lldb.SBError()
1597 for i in range(msg_bufx, msg_size) + range(0, msg_bufx) :
1598 err.Clear()
1599 cbyte = msg_bufc_data.GetUnsignedInt8(err, i)
1600 if not err.Success() :
fe8ab488 1601 raise ValueError("Failed to read character at offset " + str(i) + ": " + err.GetCString())
39236c6e
A
1602 c = chr(cbyte)
1603 if c == '\0' :
1604 continue
1605 elif c == '\n' :
1606 print line
1607 line = ''
1608 else :
1609 line += c
1610
1611 if len(line) > 0 :
1612 print line
1613
1614 return
1615
1616@static_var('output','')
1617def _GetVnodePathName(vnode, vnodename):
1618 """ Internal function to get vnode path string from vnode structure.
1619 params:
1620 vnode - core.value
1621 vnodename - str
1622 returns Nothing. The output will be stored in the static variable.
1623 """
1624 if not vnode:
1625 return
1626 if int(vnode.v_flag) & 0x1 and int(hex(vnode.v_mount), 16) !=0:
1627 if int(vnode.v_mount.mnt_vnodecovered):
1628 _GetVnodePathName(vnode.v_mount.mnt_vnodecovered, str(vnode.v_mount.mnt_vnodecovered.v_name) )
1629 else:
1630 _GetVnodePathName(vnode.v_parent, str(vnode.v_parent.v_name))
1631 _GetVnodePathName.output += "/%s" % vnodename
1632
1633def GetVnodePath(vnode):
1634 """ Get string representation of the vnode
1635 params: vnodeval - value representing vnode * in the kernel
1636 return: str - of format /path/to/something
1637 """
1638 out_str = ''
1639 if vnode:
1640 if (int(vnode.v_flag) & 0x000001) and int(hex(vnode.v_mount), 16) != 0 and (int(vnode.v_mount.mnt_flag) & 0x00004000) :
1641 out_str += "/"
1642 else:
1643 _GetVnodePathName.output = ''
1644 if abs(vnode.v_name) != 0:
1645 _GetVnodePathName(vnode, str(vnode.v_name))
1646 out_str += _GetVnodePathName.output
1647 else:
1648 out_str += 'v_name = NULL'
1649 _GetVnodePathName.output = ''
1650 return out_str
1651
1652
1653@lldb_command('showvnodepath')
1654def ShowVnodePath(cmd_args=None):
1655 """ Prints the path for a vnode
1656 usage: showvnodepath <vnode>
1657 """
1658 if cmd_args != None and len(cmd_args) > 0 :
1659 vnode_val = kern.GetValueFromAddress(cmd_args[0], 'vnode *')
1660 if vnode_val:
1661 print GetVnodePath(vnode_val)
1662 return
1663
1664# Macro: showvnodedev
1665def GetVnodeDevInfo(vnode):
1666 """ Internal function to get information from the device type vnodes
1667 params: vnode - value representing struct vnode *
1668 return: str - formatted output information for block and char vnode types passed as param
1669 """
1670 vnodedev_output = ""
1671 vblk_type = GetEnumValue('vtype::VBLK')
1672 vchr_type = GetEnumValue('vtype::VCHR')
1673 if (vnode.v_type == vblk_type) or (vnode.v_type == vchr_type):
1674 devnode = Cast(vnode.v_data, 'devnode_t *')
1675 devnode_dev = devnode.dn_typeinfo.dev
1676 devnode_major = (devnode_dev >> 24) & 0xff
1677 devnode_minor = devnode_dev & 0x00ffffff
1678
1679 # boilerplate device information for a vnode
1680 vnodedev_output += "Device Info:\n\t vnode:\t\t{:#x}".format(vnode)
1681 vnodedev_output += "\n\t type:\t\t"
1682 if (vnode.v_type == vblk_type):
1683 vnodedev_output += "VBLK"
1684 if (vnode.v_type == vchr_type):
1685 vnodedev_output += "VCHR"
1686 vnodedev_output += "\n\t name:\t\t{:<s}".format(vnode.v_name)
1687 vnodedev_output += "\n\t major, minor:\t{:d},{:d}".format(devnode_major, devnode_minor)
1688 vnodedev_output += "\n\t mode\t\t0{:o}".format(unsigned(devnode.dn_mode))
1689 vnodedev_output += "\n\t owner (u,g):\t{:d} {:d}".format(devnode.dn_uid, devnode.dn_gid)
1690
1691 # decode device specific data
1692 vnodedev_output += "\nDevice Specific Information:\t"
1693 if (vnode.v_type == vblk_type):
1694 vnodedev_output += "Sorry, I do not know how to decode block devices yet!"
1695 vnodedev_output += "\nMaybe you can write me!"
1696
1697 if (vnode.v_type == vchr_type):
1698 # Device information; this is scanty
1699 # range check
1700 if (devnode_major > 42) or (devnode_major < 0):
1701 vnodedev_output += "Invalid major #\n"
1702 # static assignments in conf
1703 elif (devnode_major == 0):
1704 vnodedev_output += "Console mux device\n"
1705 elif (devnode_major == 2):
1706 vnodedev_output += "Current tty alias\n"
1707 elif (devnode_major == 3):
1708 vnodedev_output += "NULL device\n"
1709 elif (devnode_major == 4):
1710 vnodedev_output += "Old pty slave\n"
1711 elif (devnode_major == 5):
1712 vnodedev_output += "Old pty master\n"
1713 elif (devnode_major == 6):
1714 vnodedev_output += "Kernel log\n"
1715 elif (devnode_major == 12):
1716 vnodedev_output += "Memory devices\n"
1717 # Statically linked dynamic assignments
1718 elif unsigned(kern.globals.cdevsw[devnode_major].d_open) == unsigned(kern.GetLoadAddressForSymbol('ptmx_open')):
1719 vnodedev_output += "Cloning pty master not done\n"
1720 #GetVnodeDevCpty(devnode_major, devnode_minor)
1721 elif unsigned(kern.globals.cdevsw[devnode_major].d_open) == unsigned(kern.GetLoadAddressForSymbol('ptsd_open')):
1722 vnodedev_output += "Cloning pty slave not done\n"
1723 #GetVnodeDevCpty(devnode_major, devnode_minor)
1724 else:
1725 vnodedev_output += "RESERVED SLOT\n"
1726 else:
1727 vnodedev_output += "{:#x} is not a device".format(vnode)
1728 return vnodedev_output
1729
1730@lldb_command('showvnodedev')
1731def ShowVnodeDev(cmd_args=None):
1732 """ Routine to display details of all vnodes of block and character device types
1733 Usage: showvnodedev <address of vnode>
1734 """
1735 if not cmd_args:
1736 print "No arguments passed"
1737 print ShowVnodeDev.__doc__
1738 return False
1739 vnode_val = kern.GetValueFromAddress(cmd_args[0], 'vnode *')
1740 if not vnode_val:
1741 print "unknown arguments:", str(cmd_args)
1742 return False
1743 print GetVnodeDevInfo(vnode_val)
1744
1745# EndMacro: showvnodedev
1746
1747# Macro: showvnodelocks
1748def GetVnodeLock(lockf):
1749 """ Internal function to get information from the given advisory lock
1750 params: lockf - value representing v_lockf member in struct vnode *
1751 return: str - formatted output information for the advisory lock
1752 """
1753 vnode_lock_output = ''
1754 lockf_flags = lockf.lf_flags
1755 lockf_type = lockf.lf_type
1756 if lockf_flags & 0x20:
1757 vnode_lock_output += ("{: <8s}").format('flock')
1758 if lockf_flags & 0x40:
1759 vnode_lock_output += ("{: <8s}").format('posix')
1760 if lockf_flags & 0x80:
1761 vnode_lock_output += ("{: <8s}").format('prov')
1762 if lockf_flags & 0x10:
1763 vnode_lock_output += ("{: <4s}").format('W')
3e170ce0
A
1764 if lockf_flags & 0x400:
1765 vnode_lock_output += ("{: <8s}").format('ofd')
39236c6e
A
1766 else:
1767 vnode_lock_output += ("{: <4s}").format('.')
1768
1769 # POSIX file vs advisory range locks
1770 if lockf_flags & 0x40:
1771 lockf_proc = Cast(lockf.lf_id, 'proc *')
1772 vnode_lock_output += ("PID {: <18d}").format(lockf_proc.p_pid)
1773 else:
1774 vnode_lock_output += ("ID {: <#019x}").format(int(lockf.lf_id))
1775
1776 # lock type
1777 if lockf_type == 1:
1778 vnode_lock_output += ("{: <12s}").format('shared')
1779 else:
1780 if lockf_type == 3:
1781 vnode_lock_output += ("{: <12s}").format('exclusive')
1782 else:
1783 if lockf_type == 2:
1784 vnode_lock_output += ("{: <12s}").format('unlock')
1785 else:
1786 vnode_lock_output += ("{: <12s}").format('unknown')
1787
1788 # start and stop values
1789 vnode_lock_output += ("{: #018x} ..").format(lockf.lf_start)
1790 vnode_lock_output += ("{: #018x}\n").format(lockf.lf_end)
1791 return vnode_lock_output
1792
1793@header("{0: <3s} {1: <7s} {2: <3s} {3: <21s} {4: <11s} {5: ^19s} {6: ^17s}".format('*', 'type', 'W', 'held by', 'lock type', 'start', 'end'))
1794def GetVnodeLocksSummary(vnode):
1795 """ Internal function to get summary of advisory locks for the given vnode
1796 params: vnode - value representing the vnode object
1797 return: str - formatted output information for the summary of advisory locks
1798 """
1799 out_str = ''
1800 if vnode:
1801 lockf_list = vnode.v_lockf
1802 for lockf_itr in IterateLinkedList(lockf_list, 'lf_next'):
1803 out_str += ("{: <4s}").format('H')
1804 out_str += GetVnodeLock(lockf_itr)
1805 lockf_blocker = lockf_itr.lf_blkhd.tqh_first
1806 while lockf_blocker:
1807 out_str += ("{: <4s}").format('>')
1808 out_str += GetVnodeLock(lockf_blocker)
1809 lockf_blocker = lockf_blocker.lf_block.tqe_next
1810 return out_str
1811
1812@lldb_command('showvnodelocks')
1813def ShowVnodeLocks(cmd_args=None):
1814 """ Routine to display list of advisory record locks for the given vnode address
1815 Usage: showvnodelocks <address of vnode>
1816 """
1817 if not cmd_args:
1818 print "No arguments passed"
1819 print ShowVnodeLocks.__doc__
1820 return False
1821 vnode_val = kern.GetValueFromAddress(cmd_args[0], 'vnode *')
1822 if not vnode_val:
1823 print "unknown arguments:", str(cmd_args)
1824 return False
1825 print GetVnodeLocksSummary.header
1826 print GetVnodeLocksSummary(vnode_val)
1827
1828# EndMacro: showvnodelocks
1829
1830# Macro: showproclocks
1831
1832@lldb_command('showproclocks')
1833def ShowProcLocks(cmd_args=None):
1834 """ Routine to display list of advisory record locks for the given process
1835 Usage: showproclocks <address of proc>
1836 """
1837 if not cmd_args:
1838 print "No arguments passed"
1839 print ShowProcLocks.__doc__
1840 return False
1841 proc = kern.GetValueFromAddress(cmd_args[0], 'proc *')
1842 if not proc:
1843 print "unknown arguments:", str(cmd_args)
1844 return False
1845 out_str = ''
1846 proc_filedesc = proc.p_fd
1847 fd_lastfile = proc_filedesc.fd_lastfile
1848 fd_ofiles = proc_filedesc.fd_ofiles
1849 count = 0
1850 seen = 0
1851 while count <= fd_lastfile:
1852 if fd_ofiles[count]:
1853 fglob = fd_ofiles[count].f_fglob
1854 fo_type = fglob.fg_ops.fo_type
1855 if fo_type == 1:
1856 fg_data = fglob.fg_data
1857 fg_vnode = Cast(fg_data, 'vnode *')
1858 name = fg_vnode.v_name
1859 lockf_itr = fg_vnode.v_lockf
1860 if lockf_itr:
1861 if not seen:
1862 print GetVnodeLocksSummary.header
1863 seen = seen + 1
1864 out_str += ("\n( fd {:d}, name ").format(count)
1865 if not name:
1866 out_str += "(null) )\n"
1867 else:
1868 out_str += "{:s} )\n".format(name)
1869 print out_str
1870 print GetVnodeLocksSummary(fg_vnode)
1871 count = count + 1
1872 print "\n{0: d} total locks for {1: #018x}".format(seen, proc)
1873
1874# EndMacro: showproclocks
1875
1876@lldb_type_summary(['vnode_t', 'vnode *'])
fe8ab488 1877@header("{0: <20s} {1: >8s} {2: >8s} {3: <20s} {4: <6s} {5: <20s} {6: <6s} {7: <6s} {8: <35s}".format('vnode', 'usecount', 'iocount', 'v_data', 'vtype', 'parent', 'mapped', 'cs_version', 'name'))
39236c6e
A
1878def GetVnodeSummary(vnode):
1879 """ Get a summary of important information out of vnode
1880 """
1881 out_str = ''
fe8ab488 1882 format_string = "{0: <#020x} {1: >8d} {2: >8d} {3: <#020x} {4: <6s} {5: <#020x} {6: <6s} {7: <6s} {8: <35s}"
39236c6e
A
1883 usecount = int(vnode.v_usecount)
1884 iocount = int(vnode.v_iocount)
1885 v_data_ptr = int(hex(vnode.v_data), 16)
1886 vtype = int(vnode.v_type)
1887 vtype_str = "%d" % vtype
1888 vnode_types = ['VNON', 'VREG', 'VDIR', 'VBLK', 'VCHR', 'VLNK', 'VSOCK', 'VFIFO', 'VBAD', 'VSTR', 'VCPLX'] # see vnode.h for enum type definition
1889 if vtype >= 0 and vtype < len(vnode_types):
1890 vtype_str = vnode_types[vtype]
1891 parent_ptr = int(hex(vnode.v_parent), 16)
1892 name_ptr = int(hex(vnode.v_name), 16)
1893 name =""
1894 if name_ptr != 0:
1895 name = str(vnode.v_name)
1896 elif int(vnode.v_tag) == 16 :
1897 cnode = Cast(vnode.v_data, 'cnode *')
1898 name = "hfs: %s" % str( Cast(cnode.c_desc.cd_nameptr, 'char *'))
1899 mapped = '-'
fe8ab488 1900 csblob_version = '-'
39236c6e 1901 if (vtype == 1) and (vnode.v_un.vu_ubcinfo != 0):
fe8ab488 1902 csblob_version = '{: <6d}'.format(vnode.v_un.vu_ubcinfo.cs_add_gen)
39236c6e
A
1903 # Check to see if vnode is mapped/unmapped
1904 if (vnode.v_un.vu_ubcinfo.ui_flags & 0x8) != 0:
1905 mapped = '1'
1906 else:
1907 mapped = '0'
fe8ab488 1908 out_str += format_string.format(vnode, usecount, iocount, v_data_ptr, vtype_str, parent_ptr, mapped, csblob_version, name)
39236c6e
A
1909 return out_str
1910
1911@lldb_command('showallvnodes')
1912def ShowAllVnodes(cmd_args=None):
1913 """ Display info about all vnodes
1914 """
1915 mntlist = kern.globals.mountlist
1916 print GetVnodeSummary.header
1917 for mntval in IterateTAILQ_HEAD(mntlist, 'mnt_list'):
1918 for vnodeval in IterateTAILQ_HEAD(mntval.mnt_vnodelist, 'v_mntvnodes'):
1919 print GetVnodeSummary(vnodeval)
1920 return
1921
1922@lldb_command('showvnode')
1923def ShowVnode(cmd_args=None):
1924 """ Display info about one vnode
1925 usage: showvnode <vnode>
1926 """
1927 if cmd_args == None or len(cmd_args) < 1:
1928 print "Please provide valid vnode argument. Type help showvnode for help."
1929 return
1930 vnodeval = kern.GetValueFromAddress(cmd_args[0],'vnode *')
1931 print GetVnodeSummary.header
1932 print GetVnodeSummary(vnodeval)
1933
1934@lldb_command('showvolvnodes')
1935def ShowVolVnodes(cmd_args=None):
1936 """ Display info about all vnodes of a given mount_t
1937 """
1938 if cmd_args == None or len(cmd_args) < 1:
1939 print "Please provide a valide mount_t argument. Try 'help showvolvnodes' for help"
1940 return
1941 mntval = kern.GetValueFromAddress(cmd_args[0], 'mount_t')
1942 print GetVnodeSummary.header
1943 for vnodeval in IterateTAILQ_HEAD(mntval.mnt_vnodelist, 'v_mntvnodes'):
1944 print GetVnodeSummary(vnodeval)
1945 return
1946
1947@lldb_command('showvolbusyvnodes')
1948def ShowVolBusyVnodes(cmd_args=None):
1949 """ Display info about busy (iocount!=0) vnodes of a given mount_t
1950 """
1951 if cmd_args == None or len(cmd_args) < 1:
1952 print "Please provide a valide mount_t argument. Try 'help showvolbusyvnodes' for help"
1953 return
1954 mntval = kern.GetValueFromAddress(cmd_args[0], 'mount_t')
1955 print GetVnodeSummary.header
1956 for vnodeval in IterateTAILQ_HEAD(mntval.mnt_vnodelist, 'v_mntvnodes'):
1957 if int(vnodeval.v_iocount) != 0:
1958 print GetVnodeSummary(vnodeval)
1959
1960@lldb_command('showallbusyvnodes')
1961def ShowAllBusyVnodes(cmd_args=None):
1962 """ Display info about all busy (iocount!=0) vnodes
1963 """
1964 mntlistval = kern.globals.mountlist
1965 for mntval in IterateTAILQ_HEAD(mntlistval, 'mnt_list'):
1966 ShowVolBusyVnodes([hex(mntval)])
1967
1968@lldb_command('print_vnode')
1969def PrintVnode(cmd_args=None):
1970 """ Prints out the fields of a vnode struct
1971 Usage: print_vnode <vnode>
1972 """
1973 if not cmd_args:
1974 print "Please provide valid vnode argument. Type help print_vnode for help."
1975 return
1976 ShowVnode(cmd_args)
1977
1978@lldb_command('showworkqvnodes')
1979def ShowWorkqVnodes(cmd_args=None):
1980 """ Print the vnode worker list
1981 Usage: showworkqvnodes <struct mount *>
1982 """
1983 if not cmd_args:
1984 print "Please provide valid mount argument. Type help showworkqvnodes for help."
1985 return
1986
1987 mp = kern.GetValueFromAddress(cmd_args[0], 'mount *')
1988 vp = Cast(mp.mnt_workerqueue.tqh_first, 'vnode *')
1989 print GetVnodeSummary.header
1990 while int(vp) != 0:
1991 print GetVnodeSummary(vp)
1992 vp = vp.v_mntvnodes.tqe_next
1993
1994@lldb_command('shownewvnodes')
1995def ShowNewVnodes(cmd_args=None):
1996 """ Print the new vnode list
1997 Usage: shownewvnodes <struct mount *>
1998 """
1999 if not cmd_args:
2000 print "Please provide valid mount argument. Type help shownewvnodes for help."
2001 return
2002 mp = kern.GetValueFromAddress(cmd_args[0], 'mount *')
2003 vp = Cast(mp.mnt_newvnodes.tqh_first, 'vnode *')
2004 print GetVnodeSummary.header
2005 while int(vp) != 0:
2006 print GetVnodeSummary(vp)
2007 vp = vp.v_mntvnodes.tqe_next
2008
2009
2010@lldb_command('showprocvnodes')
2011def ShowProcVnodes(cmd_args=None):
2012 """ Routine to print out all the open fds which are vnodes in a process
2013 Usage: showprocvnodes <proc *>
2014 """
2015 if not cmd_args:
2016 print "Please provide valid proc argument. Type help showprocvnodes for help."
2017 return
2018 procptr = kern.GetValueFromAddress(cmd_args[0], 'proc *')
2019 fdptr = Cast(procptr.p_fd, 'filedesc *')
2020 if int(fdptr.fd_cdir) != 0:
2021 print '{0: <25s}\n{1: <s}\n{2: <s}'.format('Current Working Directory:', GetVnodeSummary.header, GetVnodeSummary(fdptr.fd_cdir))
2022 if int(fdptr.fd_rdir) != 0:
2023 print '{0: <25s}\n{1: <s}\n{2: <s}'.format('Current Root Directory:', GetVnodeSummary.header, GetVnodeSummary(fdptr.fd_rdir))
2024 count = 0
2025 print '\n' + '{0: <5s} {1: <7s}'.format('fd', 'flags') + GetVnodeSummary.header
2026 # Hack to get around <rdar://problem/12879494> llb fails to cast addresses to double pointers
2027 fpptr = Cast(fdptr.fd_ofiles, 'fileproc *')
2028 while count < fdptr.fd_nfiles:
2029 fpp = dereference(fpptr)
2030 fproc = Cast(fpp, 'fileproc *')
2031 if int(fproc) != 0:
2032 fglob = dereference(fproc).f_fglob
2033 flags = ""
2034 if (int(fglob) != 0) and (int(fglob.fg_ops.fo_type) == 1):
2035 if (fdptr.fd_ofileflags[count] & 1): flags += 'E'
2036 if (fdptr.fd_ofileflags[count] & 2): flags += 'F'
2037 if (fdptr.fd_ofileflags[count] & 4): flags += 'R'
2038 if (fdptr.fd_ofileflags[count] & 8): flags += 'C'
2039 print '{0: <5d} {1: <7s}'.format(count, flags) + GetVnodeSummary(Cast(fglob.fg_data, 'vnode *'))
2040 count += 1
2041 fpptr = kern.GetValueFromAddress(int(fpptr) + kern.ptrsize,'fileproc *')
2042
2043@lldb_command('showallprocvnodes')
2044def ShowAllProcVnodes(cmd_args=None):
2045 """ Routine to print out all the open fds which are vnodes
2046 """
2047
2048 procptr = Cast(kern.globals.allproc.lh_first, 'proc *')
2049 while procptr and int(procptr) != 0:
2050 print '{:<s}'.format("=" * 106)
2051 print GetProcInfo(procptr)
2052 ShowProcVnodes([int(procptr)])
2053 procptr = procptr.p_list.le_next
2054
2055@xnudebug_test('test_vnode')
2056def TestShowAllVnodes(kernel_target, config, lldb_obj, isConnected ):
2057 """ Test the functionality of vnode related commands
2058 returns
2059 - False on failure
2060 - True on success
2061 """
2062 if not isConnected:
2063 print "Target is not connected. Cannot test memstats"
2064 return False
2065 res = lldb.SBCommandReturnObject()
2066 lldb_obj.debugger.GetCommandInterpreter().HandleCommand("showallvnodes", res)
2067 result = res.GetOutput()
2068 if len(result.split("\n")) > 2 and result.find('VREG') != -1 and len(result.splitlines()[2].split()) > 5:
2069 return True
2070 else:
2071 return False
2072
2073# Macro: showallmtx
2074@lldb_type_summary(['_lck_grp_ *'])
2075def GetMutexEntry(mtxg):
2076 """ Summarize a mutex group entry with important information.
2077 params:
2078 mtxg: value - obj representing a mutex group in kernel
2079 returns:
2080 out_string - summary of the mutex group
2081 """
2082 out_string = ""
2083
2084 if kern.ptrsize == 8:
2085 format_string = '{0:#018x} {1:10d} {2:10d} {3:10d} {4:10d} {5: <30s} '
2086 else:
2087 format_string = '{0:#010x} {1:10d} {2:10d} {3:10d} {4:10d} {5: <30s} '
2088
2089 if mtxg.lck_grp_mtxcnt:
2090 out_string += format_string.format(mtxg, mtxg.lck_grp_mtxcnt,mtxg.lck_grp_stat.lck_grp_mtx_stat.lck_grp_mtx_util_cnt,
2091 mtxg.lck_grp_stat.lck_grp_mtx_stat.lck_grp_mtx_miss_cnt,
2092 mtxg.lck_grp_stat.lck_grp_mtx_stat.lck_grp_mtx_wait_cnt, mtxg.lck_grp_name)
2093 return out_string
2094
2095@lldb_command('showallmtx')
2096def ShowAllMtx(cmd_args=None):
2097 """ Routine to print a summary listing of all mutexes
2098 """
2099
2100 if kern.ptrsize == 8:
2101 hdr_format = '{:<18s} {:>10s} {:>10s} {:>10s} {:>10s} {:<30s} '
2102 else:
2103 hdr_format = '{:<10s} {:>10s} {:>10s} {:>10s} {:>10s} {:<30s} '
2104
2105 print hdr_format.format('LCK GROUP', 'CNT', 'UTIL', 'MISS', 'WAIT', 'NAME')
2106
2107 mtxgrp_queue_head = kern.globals.lck_grp_queue
2108 mtxgrp_ptr_type = GetType('_lck_grp_ *')
2109
2110 for mtxgrp_ptr in IterateQueue(mtxgrp_queue_head, mtxgrp_ptr_type, "lck_grp_link"):
2111 print GetMutexEntry(mtxgrp_ptr)
2112 return
2113# EndMacro: showallmtx
2114
2115# Macro: showallrwlck
2116@lldb_type_summary(['_lck_grp_ *'])
2117def GetRWLEntry(rwlg):
2118 """ Summarize a reader writer lock group with important information.
2119 params:
2120 rwlg: value - obj representing a reader writer lock group in kernel
2121 returns:
2122 out_string - summary of the reader writer lock group
2123 """
2124 out_string = ""
2125
2126 if kern.ptrsize == 8:
2127 format_string = '{0:#018x} {1:10d} {2:10d} {3:10d} {4:10d} {5: <30s} '
2128 else:
2129 format_string = '{0:#010x} {1:10d} {2:10d} {3:10d} {4:10d} {5: <30s} '
2130
2131 if rwlg.lck_grp_rwcnt:
2132 out_string += format_string.format(rwlg, rwlg.lck_grp_rwcnt,rwlg.lck_grp_stat.lck_grp_rw_stat.lck_grp_rw_util_cnt,
2133 rwlg.lck_grp_stat.lck_grp_rw_stat.lck_grp_rw_miss_cnt,
2134 rwlg.lck_grp_stat.lck_grp_rw_stat.lck_grp_rw_wait_cnt, rwlg.lck_grp_name)
2135 return out_string
2136
15129b1c
A
2137#Macro: showlock
2138@lldb_type_summary(['lck_mtx_t *'])
2139@header("===== Mutex Lock Summary =====")
2140def GetMutexLockSummary(mtx):
2141 """ Summarize mutex lock with important information.
2142 params:
2143 mtx: value - obj representing a mutex lock in kernel
2144 returns:
2145 out_str - summary of the mutex lock
2146 """
2147 if not mtx:
2148 return "Invalid lock value: 0x0"
2149
2150 if kern.arch == "x86_64":
39037602
A
2151 out_str = "Lock Type : MUTEX\n"
2152 if mtx.lck_mtx_tag == 0x07ff1007 :
2153 out_str += "Tagged as indirect, printing ext lock at: {:#x}\n".format(mtx.lck_mtx_ptr)
2154 mtx = Cast(mtx.lck_mtx_ptr, 'lck_mtx_t *')
2155
2156 if mtx.lck_mtx_tag == 0x07fe2007 :
2157 out_str += "*** Tagged as DESTROYED ({:#x}) ***\n".format(mtx.lck_mtx_tag)
2158
2159 out_str += "Owner Thread : {mtx.lck_mtx_owner:#x}\n".format(mtx=mtx)
2160 out_str += "Number of Waiters : {mtx.lck_mtx_waiters:#x}\n".format(mtx=mtx)
2161 out_str += "ILocked : {mtx.lck_mtx_ilocked:#x}\n".format(mtx=mtx)
2162 out_str += "MLocked : {mtx.lck_mtx_mlocked:#x}\n".format(mtx=mtx)
2163 out_str += "Promoted : {mtx.lck_mtx_promoted:#x}\n".format(mtx=mtx)
2164 out_str += "Pri : {mtx.lck_mtx_pri:#x}\n".format(mtx=mtx)
2165 out_str += "Spin : {mtx.lck_mtx_spin:#x}\n".format(mtx=mtx)
2166 out_str += "Ext : {mtx.lck_mtx_is_ext:#x}\n".format(mtx=mtx)
2167 if mtx.lck_mtxd_pad32 == 0xFFFFFFFF :
2168 out_str += "Canary (valid) : {mtx.lck_mtxd_pad32:#x}\n".format(mtx=mtx)
2169 else:
2170 out_str += "Canary (INVALID) : {mtx.lck_mtxd_pad32:#x}\n".format(mtx=mtx)
15129b1c
A
2171 return out_str
2172
2173 out_str = "Lock Type\t\t: MUTEX\n"
39037602
A
2174 out_str += "Owner Thread\t\t: {:#x}".format(mtx.lck_mtx_data & ~0x3)
2175 if (mtx.lck_mtx_data & ~0x3) == 0xfffffff0:
2176 out_str += " Held as spinlock"
2177 out_str += "\nNumber of Waiters\t: {:d}\n".format(mtx.lck_mtx_waiters)
15129b1c 2178 out_str += "Flags\t\t\t: "
39037602 2179 if mtx.lck_mtx_data & 0x1:
15129b1c 2180 out_str += "[Interlock Locked] "
39037602 2181 if mtx.lck_mtx_data & 0x2:
15129b1c 2182 out_str += "[Wait Flag]"
15129b1c
A
2183 return out_str
2184
2185@lldb_type_summary(['lck_spin_t *'])
2186@header("===== SpinLock Summary =====")
2187def GetSpinLockSummary(spinlock):
2188 """ Summarize spinlock with important information.
2189 params:
2190 spinlock: value - obj representing a spinlock in kernel
2191 returns:
2192 out_str - summary of the spinlock
2193 """
2194 if not spinlock:
2195 return "Invalid lock value: 0x0"
2196
2197 out_str = "Lock Type\t\t: SPINLOCK\n"
2198 if kern.arch == "x86_64":
2199 out_str += "Interlock\t\t: {:#x}\n".format(spinlock.interlock)
2200 return out_str
2201
39037602
A
2202 lock_data = spinlock.hwlock.lock_data
2203 if lock_data == 1:
2204 out_str += "Invalid state: interlock is locked but no owner\n"
2205 return out_str
2206 out_str += "Owner Thread\t\t: "
2207 if lock_data == 0:
2208 out_str += "None\n"
2209 else:
2210 out_str += "{:#x}\n".format(lock_data & ~0x1)
2211 if (lock_data & 1) == 0:
2212 out_str += "Invalid state: owned but interlock bit is not set\n"
15129b1c
A
2213 return out_str
2214
2215@lldb_command('showlock', 'MS')
2216def ShowLock(cmd_args=None, cmd_options={}):
2217 """ Show info about a lock - its state and owner thread details
2218 Usage: showlock <address of a lock>
2219 -M : to consider <addr> as lck_mtx_t
2220 -S : to consider <addr> as lck_spin_t
2221 """
2222 if not cmd_args:
2223 raise ArgumentError("Please specify the address of the lock whose info you want to view.")
2224 return
2225
2226 summary_str = ""
2227 lock = kern.GetValueFromAddress(cmd_args[0], 'uintptr_t*')
2228
2229 if kern.arch == "x86_64" and lock:
2230 if "-M" in cmd_options:
2231 lock_mtx = Cast(lock, 'lck_mtx_t *')
2232 summary_str = GetMutexLockSummary(lock_mtx)
2233 elif "-S" in cmd_options:
2234 lock_spin = Cast(lock, 'lck_spin_t *')
2235 summary_str = GetSpinLockSummary(lock_spin)
2236 else:
2237 summary_str = "Please specify supported lock option(-M/-S)"
2238
2239 print summary_str
2240 return
2241
2242 if lock:
2243 lock_mtx = Cast(lock, 'lck_mtx_t*')
2244 if lock_mtx.lck_mtx_type == 0x22:
2245 summary_str = GetMutexLockSummary(lock_mtx)
2246
2247 lock_spin = Cast(lock, 'lck_spin_t*')
39037602 2248 if lock_spin.type == 0x11:
15129b1c
A
2249 summary_str = GetSpinLockSummary(lock_spin)
2250
2251 if summary_str == "":
2252 summary_str = "Lock Type\t\t: INVALID LOCK"
2253 print summary_str
2254
2255#EndMacro: showlock
2256
39236c6e
A
2257@lldb_command('showallrwlck')
2258def ShowAllRWLck(cmd_args=None):
2259 """ Routine to print a summary listing of all read/writer locks
2260 """
2261 if kern.ptrsize == 8:
2262 hdr_format = '{:<18s} {:>10s} {:>10s} {:>10s} {:>10s} {:<30s} '
2263 else:
2264 hdr_format = '{:<10s} {:>10s} {:>10s} {:>10s} {:>10s} {:<30s} '
2265
2266 print hdr_format.format('LCK GROUP', 'CNT', 'UTIL', 'MISS', 'WAIT', 'NAME')
2267
2268 rwlgrp_queue_head = kern.globals.lck_grp_queue
2269 rwlgrp_ptr_type = GetType('_lck_grp_ *')
2270 for rwlgrp_ptr in IterateQueue(rwlgrp_queue_head, rwlgrp_ptr_type, "lck_grp_link"):
2271 print GetRWLEntry(rwlgrp_ptr)
2272 return
2273# EndMacro: showallrwlck
2274
2275#Macro: showbootermemorymap
2276@lldb_command('showbootermemorymap')
2277def ShowBooterMemoryMap(cmd_args=None):
2278 """ Prints out the phys memory map from kernelBootArgs
2279 Supported only on x86_64
2280 """
2281 if kern.arch == 'x86_64':
2282 voffset = unsigned(0xFFFFFF8000000000)
2283 else:
2284 print "showbootermemorymap not supported on this architecture"
2285 return
2286
2287 out_string = ""
2288
2289 # Memory type map
2290 memtype_dict = {
2291 0: 'Reserved',
2292 1: 'LoaderCode',
2293 2: 'LoaderData',
2294 3: 'BS_code',
2295 4: 'BS_data',
2296 5: 'RT_code',
2297 6: 'RT_data',
2298 7: 'Convention',
2299 8: 'Unusable',
2300 9: 'ACPI_recl',
2301 10: 'ACPI_NVS',
2302 11: 'MemMapIO',
2303 12: 'MemPortIO',
2304 13: 'PAL_code'
2305 }
2306
2307 boot_args = kern.globals.kernelBootArgs
2308 msize = boot_args.MemoryMapDescriptorSize
2309 mcount = (boot_args.MemoryMapSize) / unsigned(msize)
2310
2311 out_string += "{0: <12s} {1: <19s} {2: <19s} {3: <19s} {4: <10s}\n".format("Type", "Physical Start", "Number of Pages", "Virtual Start", "Attributes")
2312
2313 i = 0
2314 while i < mcount:
2315 mptr = kern.GetValueFromAddress(unsigned(boot_args.MemoryMap) + voffset + unsigned(i*msize), 'EfiMemoryRange *')
2316 mtype = unsigned(mptr.Type)
2317 if mtype in memtype_dict:
2318 out_string += "{0: <12s}".format(memtype_dict[mtype])
2319 else:
2320 out_string += "{0: <12s}".format("UNKNOWN")
2321
2322 if mptr.VirtualStart == 0:
2323 out_string += "{0: #019x} {1: #019x} {2: <19s} {3: #019x}\n".format(mptr.PhysicalStart, mptr.NumberOfPages, ' '*19, mptr.Attribute)
2324 else:
2325 out_string += "{0: #019x} {1: #019x} {2: #019x} {3: #019x}\n".format(mptr.PhysicalStart, mptr.NumberOfPages, mptr.VirtualStart, mptr.Attribute)
2326 i = i + 1
2327
2328 print out_string
2329#EndMacro: showbootermemorymap
2330
fe8ab488
A
2331@lldb_command('show_all_purgeable_objects')
2332def ShowAllPurgeableVmObjects(cmd_args=None):
2333 """ Routine to print a summary listing of all the purgeable vm objects
2334 """
2335 print "\n-------------------- VOLATILE OBJECTS --------------------\n"
2336 ShowAllPurgeableVolatileVmObjects()
2337 print "\n-------------------- NON-VOLATILE OBJECTS --------------------\n"
2338 ShowAllPurgeableNonVolatileVmObjects()
2339
2340@lldb_command('show_all_purgeable_nonvolatile_objects')
2341def ShowAllPurgeableNonVolatileVmObjects(cmd_args=None):
2342 """ Routine to print a summary listing of all the vm objects in
2343 the purgeable_nonvolatile_queue
2344 """
2345
2346 nonvolatile_total = lambda:None
2347 nonvolatile_total.objects = 0
2348 nonvolatile_total.vsize = 0
2349 nonvolatile_total.rsize = 0
2350 nonvolatile_total.wsize = 0
2351 nonvolatile_total.csize = 0
2352 nonvolatile_total.disowned_objects = 0
2353 nonvolatile_total.disowned_vsize = 0
2354 nonvolatile_total.disowned_rsize = 0
2355 nonvolatile_total.disowned_wsize = 0
2356 nonvolatile_total.disowned_csize = 0
2357
2358 queue_len = kern.globals.purgeable_nonvolatile_count
2359 queue_head = kern.globals.purgeable_nonvolatile_queue
2360
2361 print 'purgeable_nonvolatile_queue:{:#018x} purgeable_volatile_count:{:d}\n'.format(kern.GetLoadAddressForSymbol('purgeable_nonvolatile_queue'),queue_len)
2362 print 'N:non-volatile V:volatile E:empty D:deny\n'
2363
2364 print '{:>6s} {:<6s} {:18s} {:1s} {:>6s} {:>16s} {:>10s} {:>10s} {:>10s} {:18s} {:>6s} {:<20s}\n'.format("#","#","object","P","refcnt","size (pages)","resid","wired","compressed","owner","pid","process")
2365 idx = 0
2366 for object in IterateQueue(queue_head, 'struct vm_object *', 'objq'):
2367 idx += 1
2368 ShowPurgeableNonVolatileVmObject(object, idx, queue_len, nonvolatile_total)
2369 print "disowned objects:{:<10d} [ virtual:{:<10d} resident:{:<10d} wired:{:<10d} compressed:{:<10d} ]\n".format(nonvolatile_total.disowned_objects, nonvolatile_total.disowned_vsize, nonvolatile_total.disowned_rsize, nonvolatile_total.disowned_wsize, nonvolatile_total.disowned_csize)
2370 print " all objects:{:<10d} [ virtual:{:<10d} resident:{:<10d} wired:{:<10d} compressed:{:<10d} ]\n".format(nonvolatile_total.objects, nonvolatile_total.vsize, nonvolatile_total.rsize, nonvolatile_total.wsize, nonvolatile_total.csize)
2371
2372
2373def ShowPurgeableNonVolatileVmObject(object, idx, queue_len, nonvolatile_total):
2374 """ Routine to print out a summary a VM object in purgeable_nonvolatile_queue
2375 params:
2376 object - core.value : a object of type 'struct vm_object *'
2377 returns:
2378 None
2379 """
3e170ce0 2380 page_size = kern.globals.page_size
fe8ab488
A
2381 if object.purgable == 0:
2382 purgable = "N"
2383 elif object.purgable == 1:
2384 purgable = "V"
2385 elif object.purgable == 2:
2386 purgable = "E"
2387 elif object.purgable == 3:
2388 purgable = "D"
2389 else:
2390 purgable = "?"
2391 if object.pager == 0:
2392 compressed_count = 0
2393 else:
2394 compressor_pager = Cast(object.pager, 'compressor_pager *')
2395 compressed_count = compressor_pager.cpgr_num_slots_occupied
2396
3e170ce0 2397 print "{:>6d}/{:<6d} {:#018x} {:1s} {:>6d} {:>16d} {:>10d} {:>10d} {:>10d} {:#018x} {:>6d} {:<20s}\n".format(idx,queue_len,object,purgable,object.ref_count,object.vo_un1.vou_size/page_size,object.resident_page_count,object.wired_page_count,compressed_count, object.vo_un2.vou_purgeable_owner,GetProcPIDForTask(object.vo_un2.vou_purgeable_owner),GetProcNameForTask(object.vo_un2.vou_purgeable_owner))
fe8ab488
A
2398
2399 nonvolatile_total.objects += 1
3e170ce0 2400 nonvolatile_total.vsize += object.vo_un1.vou_size/page_size
fe8ab488
A
2401 nonvolatile_total.rsize += object.resident_page_count
2402 nonvolatile_total.wsize += object.wired_page_count
2403 nonvolatile_total.csize += compressed_count
2404 if object.vo_un2.vou_purgeable_owner == 0:
2405 nonvolatile_total.disowned_objects += 1
3e170ce0 2406 nonvolatile_total.disowned_vsize += object.vo_un1.vou_size/page_size
fe8ab488
A
2407 nonvolatile_total.disowned_rsize += object.resident_page_count
2408 nonvolatile_total.disowned_wsize += object.wired_page_count
2409 nonvolatile_total.disowned_csize += compressed_count
2410
2411
2412@lldb_command('show_all_purgeable_volatile_objects')
2413def ShowAllPurgeableVolatileVmObjects(cmd_args=None):
2414 """ Routine to print a summary listing of all the vm objects in
2415 the purgeable queues
2416 """
2417 volatile_total = lambda:None
2418 volatile_total.objects = 0
2419 volatile_total.vsize = 0
2420 volatile_total.rsize = 0
2421 volatile_total.wsize = 0
2422 volatile_total.csize = 0
2423 volatile_total.disowned_objects = 0
2424 volatile_total.disowned_vsize = 0
2425 volatile_total.disowned_rsize = 0
2426 volatile_total.disowned_wsize = 0
2427 volatile_total.disowned_csize = 0
2428
2429 purgeable_queues = kern.globals.purgeable_queues
2430 print "---------- OBSOLETE\n"
2431 ShowPurgeableQueue(purgeable_queues[0], volatile_total)
2432 print "\n\n---------- FIFO\n"
2433 ShowPurgeableQueue(purgeable_queues[1], volatile_total)
2434 print "\n\n---------- LIFO\n"
2435 ShowPurgeableQueue(purgeable_queues[2], volatile_total)
2436
2437 print "disowned objects:{:<10d} [ virtual:{:<10d} resident:{:<10d} wired:{:<10d} compressed:{:<10d} ]\n".format(volatile_total.disowned_objects, volatile_total.disowned_vsize, volatile_total.disowned_rsize, volatile_total.disowned_wsize, volatile_total.disowned_csize)
2438 print " all objects:{:<10d} [ virtual:{:<10d} resident:{:<10d} wired:{:<10d} compressed:{:<10d} ]\n".format(volatile_total.objects, volatile_total.vsize, volatile_total.rsize, volatile_total.wsize, volatile_total.csize)
2439 purgeable_count = kern.globals.vm_page_purgeable_count
2440 purgeable_wired_count = kern.globals.vm_page_purgeable_wired_count
2441 if purgeable_count != volatile_total.rsize or purgeable_wired_count != volatile_total.wsize:
2442 mismatch = "<--------- MISMATCH\n"
2443 else:
2444 mismatch = ""
2445 print "vm_page_purgeable_count: resident:{:<10d} wired:{:<10d} {:s}\n".format(purgeable_count, purgeable_wired_count, mismatch)
2446
2447
2448def ShowPurgeableQueue(qhead, volatile_total):
2449 print "----- GROUP 0\n"
2450 ShowPurgeableGroup(qhead.objq[0], volatile_total)
2451 print "----- GROUP 1\n"
2452 ShowPurgeableGroup(qhead.objq[1], volatile_total)
2453 print "----- GROUP 2\n"
2454 ShowPurgeableGroup(qhead.objq[2], volatile_total)
2455 print "----- GROUP 3\n"
2456 ShowPurgeableGroup(qhead.objq[3], volatile_total)
2457 print "----- GROUP 4\n"
2458 ShowPurgeableGroup(qhead.objq[4], volatile_total)
2459 print "----- GROUP 5\n"
2460 ShowPurgeableGroup(qhead.objq[5], volatile_total)
2461 print "----- GROUP 6\n"
2462 ShowPurgeableGroup(qhead.objq[6], volatile_total)
2463 print "----- GROUP 7\n"
2464 ShowPurgeableGroup(qhead.objq[7], volatile_total)
2465
2466def ShowPurgeableGroup(qhead, volatile_total):
2467 idx = 0
2468 for object in IterateQueue(qhead, 'struct vm_object *', 'objq'):
2469 if idx == 0:
2470# print "{:>6s} {:18s} {:1s} {:>6s} {:>16s} {:>10s} {:>10s} {:>10s} {:18s} {:>6s} {:<20s} {:18s} {:>6s} {:<20s} {:s}\n".format("#","object","P","refcnt","size (pages)","resid","wired","compressed","owner","pid","process","volatilizer","pid","process","")
2471 print "{:>6s} {:18s} {:1s} {:>6s} {:>16s} {:>10s} {:>10s} {:>10s} {:18s} {:>6s} {:<20s}\n".format("#","object","P","refcnt","size (pages)","resid","wired","compressed","owner","pid","process")
2472 idx += 1
2473 ShowPurgeableVolatileVmObject(object, idx, volatile_total)
2474
2475def ShowPurgeableVolatileVmObject(object, idx, volatile_total):
2476 """ Routine to print out a summary a VM object in a purgeable queue
2477 params:
2478 object - core.value : a object of type 'struct vm_object *'
2479 returns:
2480 None
2481 """
2482# if int(object.vo_un2.vou_purgeable_owner) != int(object.vo_purgeable_volatilizer):
2483# diff=" !="
2484# else:
2485# diff=" "
3e170ce0 2486 page_size = kern.globals.page_size
fe8ab488
A
2487 if object.purgable == 0:
2488 purgable = "N"
2489 elif object.purgable == 1:
2490 purgable = "V"
2491 elif object.purgable == 2:
2492 purgable = "E"
2493 elif object.purgable == 3:
2494 purgable = "D"
2495 else:
2496 purgable = "?"
2497 if object.pager == 0:
2498 compressed_count = 0
2499 else:
2500 compressor_pager = Cast(object.pager, 'compressor_pager *')
2501 compressed_count = compressor_pager.cpgr_num_slots_occupied
3e170ce0
A
2502# print "{:>6d} {:#018x} {:1s} {:>6d} {:>16d} {:>10d} {:>10d} {:>10d} {:#018x} {:>6d} {:<20s} {:#018x} {:>6d} {:<20s} {:s}\n".format(idx,object,purgable,object.ref_count,object.vo_un1.vou_size/page_size,object.resident_page_count,object.wired_page_count,compressed_count,object.vo_un2.vou_purgeable_owner,GetProcPIDForTask(object.vo_un2.vou_purgeable_owner),GetProcNameForTask(object.vo_un2.vou_purgeable_owner),object.vo_purgeable_volatilizer,GetProcPIDForTask(object.vo_purgeable_volatilizer),GetProcNameForTask(object.vo_purgeable_volatilizer),diff)
2503 print "{:>6d} {:#018x} {:1s} {:>6d} {:>16d} {:>10d} {:>10d} {:>10d} {:#018x} {:>6d} {:<20s}\n".format(idx,object,purgable,object.ref_count,object.vo_un1.vou_size/page_size,object.resident_page_count,object.wired_page_count,compressed_count, object.vo_un2.vou_purgeable_owner,GetProcPIDForTask(object.vo_un2.vou_purgeable_owner),GetProcNameForTask(object.vo_un2.vou_purgeable_owner))
fe8ab488 2504 volatile_total.objects += 1
3e170ce0 2505 volatile_total.vsize += object.vo_un1.vou_size/page_size
fe8ab488
A
2506 volatile_total.rsize += object.resident_page_count
2507 volatile_total.wsize += object.wired_page_count
2508 volatile_total.csize += compressed_count
2509 if object.vo_un2.vou_purgeable_owner == 0:
2510 volatile_total.disowned_objects += 1
3e170ce0 2511 volatile_total.disowned_vsize += object.vo_un1.vou_size/page_size
fe8ab488
A
2512 volatile_total.disowned_rsize += object.resident_page_count
2513 volatile_total.disowned_wsize += object.wired_page_count
2514 volatile_total.disowned_csize += compressed_count
2515
2516
2517def GetCompressedPagesForObject(obj):
2518 """Stuff
2519 """
2520 pager = Cast(obj.pager, 'compressor_pager_t')
2521 return pager.cpgr_num_slots_occupied
2522# if pager.cpgr_num_slots > 128:
2523# slots_arr = pager.cpgr_slots.cpgr_islots
2524# num_indirect_slot_ptr = (pager.cpgr_num_slots + 127) / 128
2525# index = 0
2526# compressor_slot = 0
2527# compressed_pages = 0
2528# while index < num_indirect_slot_ptr:
2529# compressor_slot = 0
2530# if slots_arr[index]:
2531# while compressor_slot < 128:
2532# if slots_arr[index][compressor_slot]:
2533# compressed_pages += 1
2534# compressor_slot += 1
2535# index += 1
2536# else:
2537# slots_arr = pager.cpgr_slots.cpgr_dslots
2538# compressor_slot = 0
2539# compressed_pages = 0
2540# while compressor_slot < pager.cpgr_num_slots:
2541# if slots_arr[compressor_slot]:
2542# compressed_pages += 1
2543# compressor_slot += 1
2544# return compressed_pages
2545
fe8ab488
A
2546def ShowTaskVMEntries(task, show_pager_info, show_all_shadows):
2547 """ Routine to print out a summary listing of all the entries in a vm_map
2548 params:
2549 task - core.value : a object of type 'task *'
2550 returns:
2551 None
2552 """
2553 print "vm_map entries for task " + hex(task)
2554 print GetTaskSummary.header
2555 print GetTaskSummary(task)
2556 if not task.map:
2557 print "Task {0: <#020x} has map = 0x0"
2558 return None
2559 showmapvme(task.map, show_pager_info, show_all_shadows)
2560
2561@lldb_command("showmapvme", "PS")
2562def ShowMapVME(cmd_args=None, cmd_options={}):
2563 """Routine to print out info about the specified vm_map and its vm entries
2564 usage: showmapvme <vm_map>
3e170ce0
A
2565 Use -S flag to show VM object shadow chains
2566 Use -P flag to show pager info (mapped file, compressed pages, ...)
fe8ab488
A
2567 """
2568 if cmd_args == None or len(cmd_args) < 1:
2569 print "Invalid argument.", ShowMap.__doc__
2570 return
2571 show_pager_info = False
2572 show_all_shadows = False
2573 if "-P" in cmd_options:
2574 show_pager_info = True
2575 if "-S" in cmd_options:
2576 show_all_shadows = True
2577 map = kern.GetValueFromAddress(cmd_args[0], 'vm_map_t')
2578 showmapvme(map, show_pager_info, show_all_shadows)
2579
2580def showmapvme(map, show_pager_info, show_all_shadows):
3e170ce0 2581 page_size = kern.globals.page_size
fe8ab488
A
2582 vnode_pager_ops = kern.globals.vnode_pager_ops
2583 vnode_pager_ops_addr = unsigned(addressof(vnode_pager_ops))
2584 rsize = 0
2585 if map.pmap != 0:
2586 rsize = int(map.pmap.stats.resident_count)
3e170ce0
A
2587 print "{:<18s} {:<18s} {:<18s} {:>10s} {:>18s} {:>18s}:{:<18s}".format("vm_map","pmap","size","#ents","rsize","start","end")
2588 print "{:#018x} {:#018x} {:#018x} {:>10d} {:>18d} {:#018x}:{:#018x}".format(map,map.pmap,unsigned(map.size),map.hdr.nentries,rsize,map.hdr.links.start,map.hdr.links.end)
fe8ab488
A
2589 vme_list_head = map.hdr.links
2590 vme_ptr_type = GetType('vm_map_entry *')
3e170ce0
A
2591 print "{:<18s} {:>18s}:{:<18s} {:>10s} {:<8s} {:<10s} {:<18s} {:<18s}".format("entry","start","end","#pgs","tag.kmod","prot&flags","object","offset")
2592 last_end = unsigned(map.hdr.links.start)
fe8ab488 2593 for vme in IterateQueue(vme_list_head, vme_ptr_type, "links"):
3e170ce0
A
2594 if unsigned(vme.links.start) != last_end:
2595 print "{:18s} {:#018x}:{:#018x} {:>10d}".format("------------------",last_end,vme.links.start,(unsigned(vme.links.start) - last_end)/page_size)
2596 last_end = unsigned(vme.links.end)
2597 size = unsigned(vme.links.end) - unsigned(vme.links.start)
2598 object = vme.vme_object.vmo_object
2599 if object == 0:
2600 object_str = "{:<#018x}".format(object)
2601 elif vme.is_sub_map:
2602 if object == kern.globals.bufferhdr_map:
2603 object_str = "BUFFERHDR_MAP"
2604 elif object == kern.globals.mb_map:
2605 object_str = "MB_MAP"
2606 elif object == kern.globals.bsd_pageable_map:
2607 object_str = "BSD_PAGEABLE_MAP"
2608 elif object == kern.globals.ipc_kernel_map:
2609 object_str = "IPC_KERNEL_MAP"
2610 elif object == kern.globals.ipc_kernel_copy_map:
2611 object_str = "IPC_KERNEL_COPY_MAP"
2612 elif object == kern.globals.kalloc_map:
2613 object_str = "KALLOC_MAP"
2614 elif object == kern.globals.zone_map:
2615 object_str = "ZONE_MAP"
39037602
A
2616 elif hasattr(kern.globals, 'compressor_map') and object == kern.globals.compressor_map:
2617 object_str = "COMPRESSOR_MAP"
3e170ce0
A
2618 elif hasattr(kern.globals, 'gzalloc_map') and object == kern.globals.gzalloc_map:
2619 object_str = "GZALLOC_MAP"
2620 elif hasattr(kern.globals, 'g_kext_map') and object == kern.globals.g_kext_map:
2621 object_str = "G_KEXT_MAP"
2622 elif hasattr(kern.globals, 'vector_upl_submap') and object == kern.globals.vector_upl_submap:
2623 object_str = "VECTOR_UPL_SUBMAP"
2624 else:
2625 object_str = "submap:{:<#018x}".format(object)
2626 else:
2627 if object == kern.globals.kernel_object:
2628 object_str = "KERNEL_OBJECT"
2629 elif object == kern.globals.vm_submap_object:
2630 object_str = "VM_SUBMAP_OBJECT"
2631 elif object == kern.globals.compressor_object:
2632 object_str = "COMPRESSOR_OBJECT"
2633 else:
2634 object_str = "{:<#018x}".format(object)
2635 offset = unsigned(vme.vme_offset) & ~0xFFF
2636 tag = unsigned(vme.vme_offset & 0xFFF)
fe8ab488
A
2637 vme_flags = ""
2638 if vme.is_sub_map:
2639 vme_flags += "s"
3e170ce0
A
2640 if vme.needs_copy:
2641 vme_flags += "n"
2642 if vme.is_sub_map and vme.use_pmap:
2643 vme_flags += "p"
2644 tagstr = ""
2645 if map.pmap == kern.globals.kernel_pmap:
2646 xsite = Cast(kern.globals.vm_allocation_sites[tag],'OSKextAccount *')
2647 if xsite and xsite.site.flags & 2:
2648 tagstr = ".{:<3d}".format(xsite.loadTag)
2649 print "{:#018x} {:#018x}:{:#018x} {:>10d} {:>3d}{:<4s} {:1d}{:1d}{:<8s} {:<18s} {:<#18x}".format(vme,vme.links.start,vme.links.end,(unsigned(vme.links.end)-unsigned(vme.links.start))/page_size,tag,tagstr,vme.protection,vme.max_protection,vme_flags,object_str,offset)
2650 if (show_pager_info or show_all_shadows) and vme.is_sub_map == 0 and vme.vme_object.vmo_object != 0:
2651 object = vme.vme_object.vmo_object
fe8ab488
A
2652 else:
2653 object = 0
2654 depth = 0
fe8ab488
A
2655 while object != 0:
2656 depth += 1
2657 if show_all_shadows == False and depth != 1 and object.shadow != 0:
2658 offset += unsigned(object.vo_un2.vou_shadow_offset)
2659 object = object.shadow
2660 continue
2661 if object.copy_strategy == 0:
2662 copy_strategy="N"
2663 elif object.copy_strategy == 2:
2664 copy_strategy="D"
2665 elif object.copy_strategy == 4:
2666 copy_strategy="S"
2667 else:
2668 copy_strategy=str(object.copy_strategy)
2669 if object.internal:
2670 internal = "internal"
2671 else:
2672 internal = "external"
2673 pager_string = ""
3e170ce0
A
2674 pager = object.pager
2675 if show_pager_info and pager != 0:
fe8ab488
A
2676 if object.internal:
2677 pager_string = "-> compressed:{:d}".format(GetCompressedPagesForObject(object))
3e170ce0
A
2678 elif unsigned(pager.mo_pager_ops) == vnode_pager_ops_addr:
2679 vnode_pager = Cast(pager,'vnode_pager *')
2680 pager_string = "-> " + GetVnodePath(vnode_pager.vnode_handle)
fe8ab488 2681 else:
3e170ce0
A
2682 pager_string = "-> {:s}:{:#018x}".format(pager.mo_pager_ops.memory_object_pager_name, pager.mo_pager_ops)
2683 print "{:>18d} {:#018x}:{:#018x} {:#018x} ref:{:<6d} ts:{:1d} strat:{:1s} {:s} ({:d} {:d} {:d}) {:s}".format(depth,offset,offset+size,object,object.ref_count,object.true_share,copy_strategy,internal,unsigned(object.vo_un1.vou_size)/page_size,object.resident_page_count,object.wired_page_count,pager_string)
2684# print " #{:<5d} obj {:#018x} ref:{:<6d} ts:{:1d} strat:{:1s} {:s} size:{:<10d} wired:{:<10d} resident:{:<10d} reusable:{:<10d}".format(depth,object,object.ref_count,object.true_share,copy_strategy,internal,object.vo_un1.vou_size/page_size,object.wired_page_count,object.resident_page_count,object.reusable_page_count)
fe8ab488
A
2685 offset += unsigned(object.vo_un2.vou_shadow_offset)
2686 object = object.shadow
3e170ce0
A
2687 if unsigned(map.hdr.links.end) > last_end:
2688 print "{:18s} {:#018x}:{:#018x} {:>10d}".format("------------------",last_end,map.hdr.links.end,(unsigned(map.hdr.links.end) - last_end)/page_size)
fe8ab488
A
2689 return None
2690
3e170ce0
A
2691def CountMapTags(map, tagcounts, slow):
2692 page_size = unsigned(kern.globals.page_size)
2693 vme_list_head = map.hdr.links
2694 vme_ptr_type = GetType('vm_map_entry *')
2695 for vme in IterateQueue(vme_list_head, vme_ptr_type, "links"):
2696 object = vme.vme_object.vmo_object
2697 tag = vme.vme_offset & 0xFFF
2698 if object == kern.globals.kernel_object:
2699 count = 0
2700 if not slow:
2701 count = unsigned(vme.links.end - vme.links.start) / page_size
2702 else:
2703 addr = unsigned(vme.links.start)
2704 while addr < unsigned(vme.links.end):
2705 hash_id = _calc_vm_page_hash(object, addr)
2706 page_list = kern.globals.vm_page_buckets[hash_id].page_list
2707 page = _vm_page_unpack_ptr(page_list)
2708 while (page != 0):
2709 vmpage = kern.GetValueFromAddress(page, 'vm_page_t')
39037602 2710 if (addr == unsigned(vmpage.offset)) and (object == vm_object_t(_vm_page_unpack_ptr(vmpage.vm_page_object))):
3e170ce0
A
2711 if (not vmpage.local) and (vmpage.wire_count > 0):
2712 count += 1
2713 break
2714 page = _vm_page_unpack_ptr(vmpage.next_m)
2715 addr += page_size
2716 tagcounts[tag] += count
2717 elif vme.is_sub_map:
2718 CountMapTags(Cast(object,'vm_map_t'), tagcounts, slow)
2719 return None
2720
2721def CountWiredObject(object, tagcounts):
2722 tagcounts[unsigned(object.wire_tag)] += object.wired_page_count
2723 return None
2724
2725def CountWiredPurgeableGroup(qhead, tagcounts):
2726 for object in IterateQueue(qhead, 'struct vm_object *', 'objq'):
2727 CountWiredObject(object, tagcounts)
2728 return None
2729
2730def CountWiredPurgeableQueue(qhead, tagcounts):
2731 CountWiredPurgeableGroup(qhead.objq[0], tagcounts)
2732 CountWiredPurgeableGroup(qhead.objq[1], tagcounts)
2733 CountWiredPurgeableGroup(qhead.objq[2], tagcounts)
2734 CountWiredPurgeableGroup(qhead.objq[3], tagcounts)
2735 CountWiredPurgeableGroup(qhead.objq[4], tagcounts)
2736 CountWiredPurgeableGroup(qhead.objq[5], tagcounts)
2737 CountWiredPurgeableGroup(qhead.objq[6], tagcounts)
2738 CountWiredPurgeableGroup(qhead.objq[7], tagcounts)
2739
2740def GetKmodIDName(kmod_id):
2741 kmod_val = kern.globals.kmod
2742 for kmod in IterateLinkedList(kmod_val, 'next'):
2743 if (kmod.id == kmod_id):
2744 return "{:<50s}".format(kmod.name)
2745 return "??"
2746
2747def GetVMKernName(tag):
2748 if 1 == tag:
2749 return "VM_KERN_MEMORY_OSFMK"
2750 elif 2 == tag:
2751 return "VM_KERN_MEMORY_BSD"
2752 elif 3 == tag:
2753 return "VM_KERN_MEMORY_IOKIT"
2754 elif 4 == tag:
2755 return "VM_KERN_MEMORY_LIBKERN"
2756 elif 5 == tag:
2757 return "VM_KERN_MEMORY_OSKEXT"
2758 elif 6 == tag:
2759 return "VM_KERN_MEMORY_KEXT"
2760 elif 7 == tag:
2761 return "VM_KERN_MEMORY_IPC"
2762 elif 8 == tag:
2763 return "VM_KERN_MEMORY_STACK"
2764 elif 9 == tag:
2765 return "VM_KERN_MEMORY_CPU"
2766 elif 10 == tag:
2767 return "VM_KERN_MEMORY_PMAP"
2768 elif 11 == tag:
2769 return "VM_KERN_MEMORY_PTE"
2770 elif 12 == tag:
2771 return "VM_KERN_MEMORY_ZONE"
2772 elif 13 == tag:
2773 return "VM_KERN_MEMORY_KALLOC"
2774 elif 14 == tag:
2775 return "VM_KERN_MEMORY_COMPRESSOR"
2776 elif 15 == tag:
2777 return "VM_KERN_MEMORY_COMPRESSED_DATA"
2778 elif 16 == tag:
2779 return "VM_KERN_MEMORY_PHANTOM_CACHE"
2780 elif 17 == tag:
2781 return "VM_KERN_MEMORY_WAITQ"
2782 elif 18 == tag:
2783 return "VM_KERN_MEMORY_DIAG"
2784 elif 19 == tag:
2785 return "VM_KERN_MEMORY_LOG"
2786 elif 20 == tag:
2787 return "VM_KERN_MEMORY_FILE"
2788 elif 21 == tag:
2789 return "VM_KERN_MEMORY_MBUF"
2790 elif 22 == tag:
2791 return "VM_KERN_MEMORY_UBC"
2792 elif 23 == tag:
2793 return "VM_KERN_MEMORY_SECURITY"
2794 elif 24 == tag:
2795 return "VM_KERN_MEMORY_MLOCK"
2796 return "??"
2797
2798
2799@lldb_command("showvmtags", "S")
2800def showvmtags(cmd_args=None, cmd_options={}):
2801 """Routine to print out info about kernel wired page allocations
2802 usage: showvmtags
2803 iterates kernel map and vm objects totaling allocations by tag.
2804 usage: showvmtags -S
2805 also iterates kernel object pages individually - slow.
2806 """
2807 slow = False
2808 if "-S" in cmd_options:
2809 slow = True
2810 page_size = unsigned(kern.globals.page_size)
2811 tagcounts = []
2812 for tag in range(256):
2813 tagcounts.append(0)
2814
2815 queue_head = kern.globals.vm_objects_wired
2816 for object in IterateQueue(queue_head, 'struct vm_object *', 'objq'):
39037602
A
2817 if object != kern.globals.kernel_object:
2818 CountWiredObject(object, tagcounts)
3e170ce0
A
2819
2820 queue_head = kern.globals.purgeable_nonvolatile_queue
2821 for object in IterateQueue(queue_head, 'struct vm_object *', 'objq'):
2822 CountWiredObject(object, tagcounts)
2823
2824 purgeable_queues = kern.globals.purgeable_queues
2825 CountWiredPurgeableQueue(purgeable_queues[0], tagcounts)
2826 CountWiredPurgeableQueue(purgeable_queues[1], tagcounts)
2827 CountWiredPurgeableQueue(purgeable_queues[2], tagcounts)
2828
2829 CountMapTags(kern.globals.kernel_map, tagcounts, slow)
2830
2831 total = 0
2832 print " {:<8s} {:>7s} {:<50s}".format("tag.kmod","size","name")
2833 for tag in range(256):
2834 if tagcounts[tag]:
2835 total += tagcounts[tag]
2836 tagstr = ""
2837 sitestr = ""
2838 if (tag <= 24):
2839 sitestr = GetVMKernName(tag)
2840 else:
2841 site = kern.globals.vm_allocation_sites[tag]
2842 if site:
2843 if site.flags & 2:
2844 xsite = Cast(site,'OSKextAccount *')
2845 tagstr = ".{:<3d}".format(xsite.loadTag)
2846 sitestr = GetKmodIDName(xsite.loadTag)
2847 else:
2848 sitestr = kern.Symbolicate(site)
2849 print " {:>3d}{:<4s} {:>7d}K {:<50s}".format(tag,tagstr,tagcounts[tag]*page_size / 1024,sitestr)
2850 print "Total: {:>7d}K".format(total*page_size / 1024)
2851 return None
2852
2853
fe8ab488
A
2854def FindVMEntriesForVnode(task, vn):
2855 """ returns an array of vme that have the vnode set to defined vnode
2856 each entry in array is of format (vme, start_addr, end_address, protection)
2857 """
2858 retval = []
2859 vmmap = task.map
2860 pmap = vmmap.pmap
2861 pager_ops_addr = unsigned(addressof(kern.globals.vnode_pager_ops))
2862 debuglog("pager_ops_addr %s" % hex(pager_ops_addr))
2863
2864 if unsigned(pmap) == 0:
2865 return retval
2866 vme_list_head = vmmap.hdr.links
2867 vme_ptr_type = gettype('vm_map_entry *')
2868 for vme in IterateQueue(vme_list_head, vme_ptr_type, 'links'):
2869 #print vme
3e170ce0
A
2870 if unsigned(vme.is_sub_map) == 0 and unsigned(vme.vme_object.vmo_object) != 0:
2871 obj = vme.vme_object.vmo_object
fe8ab488
A
2872 else:
2873 continue
2874
2875 while obj != 0:
2876 if obj.pager != 0:
2877 if obj.internal:
2878 pass
2879 else:
2880 vn_pager = Cast(obj.pager, 'vnode_pager *')
2881 if unsigned(vn_pager.pager_ops) == pager_ops_addr and unsigned(vn_pager.vnode_handle) == unsigned(vn):
2882 retval.append((vme, unsigned(vme.links.start), unsigned(vme.links.end), unsigned(vme.protection)))
2883 obj = obj.shadow
2884 return retval
2885
2886@lldb_command('showtaskloadinfo')
2887def ShowTaskLoadInfo(cmd_args=None, cmd_options={}):
2888 """ Print the load address and uuid for the process
2889 Usage: (lldb)showtaskloadinfo <task_t>
2890 """
2891 if not cmd_args:
2892 raise ArgumentError("Insufficient arguments")
2893 t = kern.GetValueFromAddress(cmd_args[0], 'struct task *')
2894 print_format = "0x{0:x} - 0x{1:x} {2: <50s} (??? - ???) <{3: <36s}> {4: <50s}"
2895 p = Cast(t.bsd_info, 'struct proc *')
2896 uuid = p.p_uuid
2897 uuid_out_string = "{a[0]:02X}{a[1]:02X}{a[2]:02X}{a[3]:02X}-{a[4]:02X}{a[5]:02X}-{a[6]:02X}{a[7]:02X}-{a[8]:02X}{a[9]:02X}-{a[10]:02X}{a[11]:02X}{a[12]:02X}{a[13]:02X}{a[14]:02X}{a[15]:02X}".format(a=uuid)
2898 filepath = GetVnodePath(p.p_textvp)
2899 libname = filepath.split('/')[-1]
2900 #print "uuid: %s file: %s" % (uuid_out_string, filepath)
2901 mappings = FindVMEntriesForVnode(t, p.p_textvp)
2902 load_addr = 0
2903 end_addr = 0
2904 for m in mappings:
2905 if m[3] == 5:
2906 load_addr = m[1]
2907 end_addr = m[2]
2908 #print "Load address: %s" % hex(m[1])
2909 print print_format.format(load_addr, end_addr, libname, uuid_out_string, filepath)
3e170ce0
A
2910 return None
2911
2912@header("{0: <20s} {1: <20s} {2: <20s}".format("vm_page_t", "offset", "object"))
2913@lldb_command('vmpagelookup')
2914def VMPageLookup(cmd_args=None):
2915 """ Print the pages in the page bucket corresponding to the provided object and offset.
2916 Usage: (lldb)vmpagelookup <vm_object_t> <vm_offset_t>
2917 """
2918 if cmd_args == None or len(cmd_args) < 2:
2919 raise ArgumentError("Please specify an object and offset.")
2920 format_string = "{0: <#020x} {1: <#020x} {2: <#020x}\n"
2921
2922 obj = kern.GetValueFromAddress(cmd_args[0],'unsigned long long')
2923 off = kern.GetValueFromAddress(cmd_args[1],'unsigned long long')
2924
2925 hash_id = _calc_vm_page_hash(obj, off)
2926
2927 page_list = kern.globals.vm_page_buckets[hash_id].page_list
2928 print("hash_id: 0x%x page_list: 0x%x\n" % (unsigned(hash_id), unsigned(page_list)))
2929
2930 print VMPageLookup.header
2931 page = _vm_page_unpack_ptr(page_list)
2932 while (page != 0) :
2933 pg_t = kern.GetValueFromAddress(page, 'vm_page_t')
39037602 2934 print format_string.format(page, pg_t.offset, _vm_page_unpack_ptr(pg_t.vm_page_object))
3e170ce0
A
2935 page = _vm_page_unpack_ptr(pg_t.next_m)
2936
39037602
A
2937
2938
2939@lldb_command('vmpage_get_phys_page')
2940def VmPageGetPhysPage(cmd_args=None):
2941 """ return the physical page for a vm_page_t
2942 usage: vm_page_get_phys_page <vm_page_t>
2943 """
2944 if cmd_args == None or len(cmd_args) < 1:
2945 print "Please provide valid vm_page_t. Type help vm_page_get_phys_page for help."
2946 return
2947
2948 page = kern.GetValueFromAddress(cmd_args[0], 'vm_page_t')
2949 phys_page = _vm_page_get_phys_page(page)
2950 print("phys_page = 0x%x\n" % phys_page)
2951
2952
2953def _vm_page_get_phys_page(page):
2954 if kern.arch == 'x86_64':
2955 return page.phys_page
2956
2957 if page == 0 :
2958 return 0
2959
2960 m = unsigned(page)
2961 if m >= unsigned(kern.globals.vm_page_array_beginning_addr) and m < unsigned(kern.globals.vm_page_array_ending_addr) :
2962 return (m - unsigned(kern.globals.vm_page_array_beginning_addr)) / sizeof('struct vm_page') + unsigned(kern.globals.vm_first_phys_ppnum)
2963
2964 page_with_ppnum = Cast(page, 'uint32_t *')
2965 ppnum_offset = sizeof('struct vm_page') / sizeof('uint32_t')
2966 return page_with_ppnum[ppnum_offset]
2967
2968
2969@lldb_command('vmpage_unpack_ptr')
2970def VmPageUnpackPtr(cmd_args=None):
2971 """ unpack a pointer
2972 usage: vm_page_unpack_ptr <packed_ptr>
2973 """
2974 if cmd_args == None or len(cmd_args) < 1:
2975 print "Please provide valid packed pointer argument. Type help vm_page_unpack_ptr for help."
2976 return
2977
2978 packed = kern.GetValueFromAddress(cmd_args[0],'unsigned long')
2979 unpacked = _vm_page_unpack_ptr(packed)
2980 print("unpacked pointer = 0x%x\n" % unpacked)
2981
2982
3e170ce0
A
2983def _vm_page_unpack_ptr(page):
2984 if kern.ptrsize == 4 :
2985 return page
2986
2987 if page == 0 :
2988 return page
2989
2990 min_addr = kern.globals.vm_min_kernel_and_kext_address
39037602
A
2991 ptr_shift = kern.globals.vm_packed_pointer_shift
2992 ptr_mask = kern.globals.vm_packed_from_vm_pages_array_mask
3e170ce0
A
2993 #INTEL - min_addr = 0xffffff7f80000000
2994 #ARM - min_addr = 0x80000000
2995 #ARM64 - min_addr = 0xffffff8000000000
39037602
A
2996 if unsigned(page) & unsigned(ptr_mask) :
2997 masked_page = (unsigned(page) & ~ptr_mask)
2998 return (unsigned(addressof(kern.globals.vm_pages[masked_page])))
2999 return ((unsigned(page) << unsigned(ptr_shift)) + unsigned(min_addr))
3e170ce0
A
3000
3001@lldb_command('calcvmpagehash')
3002def CalcVMPageHash(cmd_args=None):
3003 """ Get the page bucket corresponding to the provided object and offset.
3004 Usage: (lldb)calcvmpagehash <vm_object_t> <vm_offset_t>
3005 """
3006 if cmd_args == None or len(cmd_args) < 2:
3007 raise ArgumentError("Please specify an object and offset.")
3008
3009 obj = kern.GetValueFromAddress(cmd_args[0],'unsigned long long')
3010 off = kern.GetValueFromAddress(cmd_args[1],'unsigned long long')
3011
3012 hash_id = _calc_vm_page_hash(obj, off)
3013
3014 print("hash_id: 0x%x page_list: 0x%x\n" % (unsigned(hash_id), unsigned(kern.globals.vm_page_buckets[hash_id].page_list)))
3015 return None
3016
3017def _calc_vm_page_hash(obj, off):
3018 bucket_hash = (int) (kern.globals.vm_page_bucket_hash)
3019 hash_mask = (int) (kern.globals.vm_page_hash_mask)
3020
3021 one = (obj * bucket_hash) & 0xFFFFFFFF
3022 two = off >> unsigned(kern.globals.page_shift)
3023 three = two ^ bucket_hash
3024 four = one + three
3025 hash_id = four & hash_mask
3026
3027 return hash_id
3028
39037602
A
3029VM_PAGE_IS_WIRED = 1
3030
3e170ce0
A
3031@header("{0: <10s} of {1: <10s} {2: <20s} {3: <20s} {4: <20s} {5: <10s} {6: <5s}\t {7: <28s}\t{8: <50s}".format("index", "total", "vm_page_t", "offset", "next", "phys_page", "wire#", "first bitfield", "second bitfield"))
3032@lldb_command('vmobjectwalkpages', 'SBNQP:')
3033def VMObjectWalkPages(cmd_args=None, cmd_options={}):
3034 """ Print the resident pages contained in the provided object. If a vm_page_t is provided as well, we
3035 specifically look for this page, highlighting it in the output or noting if it was not found. For
3036 each page, we confirm that it points to the object. We also keep track of the number of pages we
3037 see and compare this to the object's resident page count field.
3038 Usage:
3039 vmobjectwalkpages <vm_object_t> : Walk and print all the pages for a given object (up to 4K pages by default)
3040 vmobjectwalkpages <vm_object_t> -B : Walk and print all the pages for a given object (up to 4K pages by default), traversing the memq backwards
3041 vmobjectwalkpages <vm_object_t> -N : Walk and print all the pages for a given object, ignore the page limit
39037602 3042 vmobjectwalkpages <vm_object_t> -Q : Walk all pages for a given object, looking for known signs of corruption (i.e. q_state == VM_PAGE_IS_WIRED && wire_count == 0)
3e170ce0
A
3043 vmobjectwalkpages <vm_object_t> -P <vm_page_t> : Walk all the pages for a given object, annotate the specified page in the output with ***
3044 vmobjectwalkpages <vm_object_t> -P <vm_page_t> -S : Walk all the pages for a given object, stopping when we find the specified page
3045
3046 """
3047
3048 if (cmd_args == None or len(cmd_args) < 1):
3049 raise ArgumentError("Please specify at minimum a vm_object_t and optionally a vm_page_t")
3050
3051 out_string = ""
3052
3053 obj = kern.GetValueFromAddress(cmd_args[0], 'vm_object_t')
3054
3055 page = 0
3056 if "-P" in cmd_options:
3057 page = kern.GetValueFromAddress(cmd_options['-P'], 'vm_page_t')
3058
3059 stop = 0
3060 if "-S" in cmd_options:
3061 if page == 0:
3062 raise ArgumentError("-S can only be passed when a page is specified with -P")
3063 stop = 1
3064
3065 walk_backwards = False
3066 if "-B" in cmd_options:
3067 walk_backwards = True
3068
3069 quiet_mode = False
3070 if "-Q" in cmd_options:
3071 quiet_mode = True
3072
3073 if not quiet_mode:
3074 print VMObjectWalkPages.header
3075 format_string = "{0: <#10d} of {1: <#10d} {2: <#020x} {3: <#020x} {4: <#020x} {5: <#010x} {6: <#05d}\t"
39037602
A
3076 first_bitfield_format_string = "{0: <#2d}:{1: <#1d}:{2: <#1d}:{3: <#1d}:{4: <#1d}:{5: <#1d}:{6: <#1d}:{7: <#1d}\t"
3077 second_bitfield_format_string = "{0: <#1d}:{1: <#1d}:{2: <#1d}:{3: <#1d}:{4: <#1d}:{5: <#1d}:{6: <#1d}:"
3078 second_bitfield_format_string += "{7: <#1d}:{8: <#1d}:{9: <#1d}:{10: <#1d}:{11: <#1d}:{12: <#1d}:"
3079 second_bitfield_format_string += "{13: <#1d}:{14: <#1d}:{15: <#1d}:{16: <#1d}:{17: <#1d}:{18: <#1d}:{19: <#1d}:"
3e170ce0 3080 second_bitfield_format_string += "{20: <#1d}:{21: <#1d}:{22: <#1d}:{23: <#1d}:{24: <#1d}:{25: <#1d}:{26: <#1d}\n"
3e170ce0
A
3081
3082 limit = 4096 #arbitrary limit of number of pages to walk
3083 ignore_limit = 0
3084 if "-N" in cmd_options:
3085 ignore_limit = 1
3086
3087 page_count = 0
3088 res_page_count = unsigned(obj.resident_page_count)
3089 page_found = False
3090 pages_seen = set()
3091
39037602 3092 for vmp in IterateQueue(obj.memq, "vm_page_t", "listq", walk_backwards, unpack_ptr_fn=_vm_page_unpack_ptr):
3e170ce0
A
3093 page_count += 1
3094 out_string = ""
3095 if (page != 0 and not(page_found) and vmp == page):
3096 out_string += "******"
3097 page_found = True
3098
3099 if page != 0 or quiet_mode:
3100 if (page_count % 1000) == 0:
3101 print "traversed %d pages ...\n" % (page_count)
3102 else:
39037602
A
3103 out_string += format_string.format(page_count, res_page_count, vmp, vmp.offset, _vm_page_unpack_ptr(vmp.listq.next), _vm_page_get_phys_page(vmp), vmp.wire_count)
3104 out_string += first_bitfield_format_string.format(vmp.vm_page_q_state, vmp.vm_page_in_background, vmp.vm_page_on_backgroundq, vmp.gobbled, vmp.laundry, vmp.no_cache,
3105 vmp.private, vmp.reference)
3e170ce0
A
3106
3107 out_string += second_bitfield_format_string.format(vmp.busy, vmp.wanted, vmp.tabled, vmp.hashed, vmp.fictitious, vmp.clustered,
39037602
A
3108 vmp.pmapped, vmp.xpmapped, vmp.wpmapped, vmp.free_when_done, vmp.absent,
3109 vmp.error, vmp.dirty, vmp.cleaning, vmp.precious, vmp.overwriting,
3110 vmp.restart, vmp.unusual, vmp.encrypted, vmp.encrypted_cleaning,
3111 vmp.cs_validated, vmp.cs_tainted, vmp.cs_nx, vmp.reusable, vmp.lopage, vmp.slid,
3e170ce0
A
3112 vmp.written_by_kernel)
3113
3114 if (vmp in pages_seen):
3115 print out_string + "cycle detected! we've seen vm_page_t: " + "{0: <#020x}".format(unsigned(vmp)) + " twice. stopping...\n"
3116 return
3117
39037602
A
3118 if (_vm_page_unpack_ptr(vmp.vm_page_object) != unsigned(obj)):
3119 print out_string + " vm_page_t: " + "{0: <#020x}".format(unsigned(vmp)) + " points to different vm_object_t: " + "{0: <#020x}".format(unsigned(_vm_page_unpack_ptr(vmp.vm_page_object)))
3e170ce0
A
3120 return
3121
39037602
A
3122 if (vmp.vm_page_q_state == VM_PAGE_IS_WIRED) and (vmp.wire_count == 0):
3123 print out_string + " page in wired state with wire_count of 0\n"
3124 print "vm_page_t: " + "{0: <#020x}".format(unsigned(vmp)) + "\n"
3e170ce0
A
3125 print "stopping...\n"
3126 return
3127
3128 if ((vmp.__unused_pageq_bits != 0) or (vmp.__unused_object_bits != 0)):
3129 print out_string + " unused bits not zero for vm_page_t: " + "{0: <#020x}".format(unsigned(vmp)) + " unused__pageq_bits: %d unused_object_bits : %d\n" % (vmp.__unused_pageq_bits,
3130 vmp.__unused_object_bits)
3131 print "stopping...\n"
3132 return
3133
3134 pages_seen.add(vmp)
3135
3136 if False:
3137 hash_id = _calc_vm_page_hash(obj, vmp.offset)
3138 hash_page_list = kern.globals.vm_page_buckets[hash_id].page_list
3139 hash_page = _vm_page_unpack_ptr(hash_page_list)
3140 hash_page_t = 0
3141
3142 while (hash_page != 0):
3143 hash_page_t = kern.GetValueFromAddress(hash_page, 'vm_page_t')
3144 if hash_page_t == vmp:
3145 break
3146 hash_page = _vm_page_unpack_ptr(hash_page_t.next_m)
3147
3148 if (unsigned(vmp) != unsigned(hash_page_t)):
3149 print out_string + "unable to find page: " + "{0: <#020x}".format(unsigned(vmp)) + " from object in kernel page bucket list\n"
3150 print lldb_run_command("vm_page_info %s 0x%x" % (cmd_args[0], unsigned(vmp.offset)))
3151 return
3152
3153 if (page_count >= limit and not(ignore_limit)):
3154 print out_string + "Limit reached (%d pages), stopping..." % (limit)
3155 return
3156
3157 print out_string
3158
3159 if page_found and stop:
3160 print("Object reports resident page count of: %d we stopped after traversing %d and finding the requested page.\n" % (unsigned(obj.res_page_count), unsigned(page_count)))
3161 return
3162
3163 if (page != 0):
3164 print("page found? : %s\n" % page_found)
3165
3166 print("Object reports resident page count of %d, we saw %d pages when we walked the resident list.\n" % (unsigned(obj.resident_page_count), unsigned(page_count)))
3167
3168
3169@lldb_command("show_all_apple_protect_pagers")
3170def ShowAllAppleProtectPagers(cmd_args=None):
3171 """Routine to print all apple_protect pagers
3172 usage: show_all_apple_protect_pagers
3173 """
3174 print "{:>3s} {:<3s} {:<18s} {:>5s} {:>5s} {:>6s} {:<18s} {:<18s} {:<18s} {:<18s} {:<18s} {:<18s}\n".format("#", "#", "pager", "refs", "ready", "mapped", "mo_control", "object", "offset", "crypto_offset", "crypto_start", "crypto_end")
3175 qhead = kern.globals.apple_protect_pager_queue
3176 qtype = GetType('apple_protect_pager *')
3177 qcnt = kern.globals.apple_protect_pager_count
3178 idx = 0
3179 for pager in IterateQueue(qhead, qtype, "pager_queue"):
3180 idx = idx + 1
3181 show_apple_protect_pager(pager, qcnt, idx)
3182
3183@lldb_command("show_apple_protect_pager")
3184def ShowAppleProtectPager(cmd_args=None):
3185 """Routine to print out info about an apple_protect pager
3186 usage: show_apple_protect_pager <pager>
3187 """
3188 if cmd_args == None or len(cmd_args) < 1:
3189 print "Invalid argument.", ShowMap.__doc__
3190 return
3191 pager = kern.GetValueFromAddress(cmd_ars[0], 'apple_protect_pager_t')
3192 show_apple_protect_pager(pager, 1, 1)
3193
3194def show_apple_protect_pager(pager, qcnt, idx):
3195 object = pager.backing_object
3196 shadow = object.shadow
3197 while shadow != 0:
3198 object = shadow
3199 shadow = object.shadow
3200 vnode_pager = Cast(object.pager,'vnode_pager *')
3201 filename = GetVnodePath(vnode_pager.vnode_handle)
3202 print "{:>3}/{:<3d} {:#018x} {:>5d} {:>5d} {:>6d} {:#018x} {:#018x} {:#018x} {:#018x} {:#018x} {:#018x}\n\tcrypt_info:{:#018x} <decrypt:{:#018x} end:{:#018x} ops:{:#018x} refs:{:<d}>\n\tvnode:{:#018x} {:s}\n".format(idx, qcnt, pager, pager.ref_count, pager.is_ready, pager.is_mapped, pager.pager_control, pager.backing_object, pager.backing_offset, pager.crypto_backing_offset, pager.crypto_start, pager.crypto_end, pager.crypt_info, pager.crypt_info.page_decrypt, pager.crypt_info.crypt_end, pager.crypt_info.crypt_ops, pager.crypt_info.crypt_refcnt, vnode_pager.vnode_handle, filename)
39037602
A
3203
3204@lldb_command("show_console_ring")
3205def ShowConsoleRingData(cmd_args=None):
3206 """ Print console ring buffer stats and data
3207 """
3208 cr = kern.globals.console_ring
3209 print "console_ring = {:#018x} buffer = {:#018x} length = {:<5d} used = {:<5d} read_ptr = {:#018x} write_ptr = {:#018x}".format(addressof(cr), cr.buffer, cr.len, cr.used, cr.read_ptr, cr.write_ptr)
3210 pending_data = []
3211 for i in range(unsigned(cr.used)):
3212 idx = ((unsigned(cr.read_ptr) - unsigned(cr.buffer)) + i) % unsigned(cr.len)
3213 pending_data.append("{:c}".format(cr.buffer[idx]))
3214
3215 if pending_data:
3216 print "Data:"
3217 print "".join(pending_data)
3218
3219# Macro: showjetsamsnapshot
3220
3221@lldb_command("showjetsamsnapshot", "DA")
3222def ShowJetsamSnapshot(cmd_args=None, cmd_options={}):
3223 """ Dump entries in the jetsam snapshot table
3224 usage: showjetsamsnapshot [-D] [-A]
3225 Use -D flag to print extra physfootprint details
3226 Use -A flag to print all entries (regardless of valid count)
3227 """
3228
3229 # Not shown are uuid, user_data, cpu_time
3230
3231 global kern
3232 if kern.arch == 'x86_64':
3233 print "Snapshots are not supported.\n"
3234 return
3235
3236 show_footprint_details = False
3237 show_all_entries = False
3238
3239 if "-D" in cmd_options:
3240 show_footprint_details = True
3241
3242 if "-A" in cmd_options:
3243 show_all_entries = True
3244
3245 valid_count = kern.globals.memorystatus_jetsam_snapshot_count
3246 max_count = kern.globals.memorystatus_jetsam_snapshot_max
3247
3248 if (show_all_entries == True):
3249 count = max_count
3250 else:
3251 count = valid_count
3252
3253 print "{:s}".format(valid_count)
3254 print "{:s}".format(max_count)
3255
3256 if int(count) == 0:
3257 print "The jetsam snapshot is empty."
3258 print "Use -A to force dump all entries (regardless of valid count)"
3259 return
3260
3261 # Dumps the snapshot header info
3262 print lldb_run_command('p *memorystatus_jetsam_snapshot')
3263
3264 hdr_format = "{0: >32s} {1: >5s} {2: >4s} {3: >6s} {4: >6s} {5: >20s} {6: >20s} {7: >20s} {8: >5s} {9: >10s} {10: >6s} {11: >6s} {12: >10s} {13: >15s} {14: >15s} {15: >15s} {16: >15s}"
3265 if (show_footprint_details == True):
3266 hdr_format += "{17: >15s} {18: >15s} {19: >12s} {20: >12s} {21: >17s} {22: >10s} {23: >13s} {24: >10s}"
3267
3268
3269 if (show_footprint_details == False):
3270 print hdr_format.format('command', 'index', 'pri', 'cid', 'pid', 'starttime', 'killtime', 'idletime', 'kill', '#ents', 'fds', 'gen', 'state', 'footprint', 'max', 'purgeable', 'lifetimeMax')
3271 print hdr_format.format('', '', '', '', '', '(abs)', '(abs)', '(abs)', 'cause', '', '', 'Count', '', '(pages)', '(pages)', '(pages)', '(pages)')
3272 else:
3273 print hdr_format.format('command', 'index', 'pri', 'cid', 'pid', 'starttime', 'killtime', 'idletime', 'kill', '#ents', 'fds', 'gen', 'state', 'footprint', 'max', 'purgeable', 'lifetimeMax', '|| internal', 'internal_comp', 'iokit_mapped', 'purge_nonvol', 'purge_nonvol_comp', 'alt_acct', 'alt_acct_comp', 'page_table')
3274 print hdr_format.format('', '', '', '', '', '(abs)', '(abs)', '(abs)', 'cause', '', '', 'Count', '', '(pages)', '(pages)', '(pages)', '(pages)', '(pages)', '(pages)', '(pages)', '(pages)', '(pages)', '(pages)', '(pages)', '(pages)')
3275
3276
3277 entry_format = "{e.name: >32s} {index: >5d} {e.priority: >4d} {e.jse_coalition_jetsam_id: >6d} {e.pid: >6d} "\
3278 "{e.jse_starttime: >20d} {e.jse_killtime: >20d} "\
3279 "{e.jse_idle_delta: >20d} {e.killed: >5d} {e.jse_memory_region_count: >10d} "\
3280 "{e.fds: >6d} {e.jse_gencount: >6d} {e.state: >10x} {e.pages: >15d} {e.max_pages: >15d} "\
3281 "{e.purgeable_pages: >15d} {e.max_pages_lifetime: >15d}"
3282
3283 if (show_footprint_details == True):
3284 entry_format += "{e.jse_internal_pages: >15d} "\
3285 "{e.jse_internal_compressed_pages: >15d} "\
3286 "{e.jse_iokit_mapped_pages: >12d} "\
3287 "{e.jse_purgeable_nonvolatile_pages: >12d} "\
3288 "{e.jse_purgeable_nonvolatile_compressed_pages: >17d} "\
3289 "{e.jse_alternate_accounting_pages: >10d} "\
3290 "{e.jse_alternate_accounting_compressed_pages: >13d} "\
3291 "{e.jse_page_table_pages: >10d}"
3292
3293 snapshot_list = kern.globals.memorystatus_jetsam_snapshot.entries
3294 idx = 0
3295 while idx < count:
3296 current_entry = Cast(snapshot_list[idx], 'jetsam_snapshot_entry')
3297 print entry_format.format(index=idx, e=current_entry)
3298 idx +=1
3299 return
3300
3301# EndMacro: showjetsamsnapshot