summaryrefslogtreecommitdiff
path: root/StoneIsland/platforms/ios/Pods/FirebaseCrashlytics/Crashlytics/Shared/FIRCLSMachO/FIRCLSMachO.m
diff options
context:
space:
mode:
authorJules Laplace <julescarbon@gmail.com>2020-08-31 23:07:20 +0200
committerJules Laplace <julescarbon@gmail.com>2020-08-31 23:07:20 +0200
commit22721a013bdd10d5eb395ba18453585f5f3f1f7f (patch)
tree5a920e31d6026ed5dc55265e5fd057febccc50e3 /StoneIsland/platforms/ios/Pods/FirebaseCrashlytics/Crashlytics/Shared/FIRCLSMachO/FIRCLSMachO.m
parentd22d51a1ae49680015326857360eb699f31efced (diff)
rebuild the ios platform and the plugins
Diffstat (limited to 'StoneIsland/platforms/ios/Pods/FirebaseCrashlytics/Crashlytics/Shared/FIRCLSMachO/FIRCLSMachO.m')
-rw-r--r--StoneIsland/platforms/ios/Pods/FirebaseCrashlytics/Crashlytics/Shared/FIRCLSMachO/FIRCLSMachO.m509
1 files changed, 509 insertions, 0 deletions
diff --git a/StoneIsland/platforms/ios/Pods/FirebaseCrashlytics/Crashlytics/Shared/FIRCLSMachO/FIRCLSMachO.m b/StoneIsland/platforms/ios/Pods/FirebaseCrashlytics/Crashlytics/Shared/FIRCLSMachO/FIRCLSMachO.m
new file mode 100644
index 00000000..9991121d
--- /dev/null
+++ b/StoneIsland/platforms/ios/Pods/FirebaseCrashlytics/Crashlytics/Shared/FIRCLSMachO/FIRCLSMachO.m
@@ -0,0 +1,509 @@
+// Copyright 2019 Google
+//
+// Licensed under the Apache License, Version 2.0 (the "License");
+// you may not use this file except in compliance with the License.
+// You may obtain a copy of the License at
+//
+// http://www.apache.org/licenses/LICENSE-2.0
+//
+// Unless required by applicable law or agreed to in writing, software
+// distributed under the License is distributed on an "AS IS" BASIS,
+// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+// See the License for the specific language governing permissions and
+// limitations under the License.
+
+#include "Crashlytics/Shared/FIRCLSMachO/FIRCLSMachO.h"
+
+#include <Foundation/Foundation.h>
+
+#include <mach-o/dyld.h>
+#include <mach-o/fat.h>
+#include <mach-o/getsect.h>
+#include <mach-o/ldsyms.h>
+
+#include <sys/mman.h>
+#include <sys/stat.h>
+
+#include <dlfcn.h>
+#include <fcntl.h>
+
+#include <stdio.h>
+
+#include <unistd.h>
+
+// This is defined in newer versions of iOS/macOS in usr/include/mach/machine.h
+#define CLS_CPU_SUBTYPE_ARM64E ((cpu_subtype_t)2)
+
+static void FIRCLSMachOHeaderValues(FIRCLSMachOSliceRef slice,
+ const struct load_command** cmds,
+ uint32_t* cmdCount);
+static bool FIRCLSMachOSliceIsValid(FIRCLSMachOSliceRef slice);
+
+bool FIRCLSMachOFileInitWithPath(FIRCLSMachOFileRef file, const char* path) {
+ struct stat statBuffer;
+
+ if (!file || !path) {
+ return false;
+ }
+
+ file->fd = 0;
+ file->mappedFile = NULL;
+ file->mappedSize = 0;
+
+ file->fd = open(path, O_RDONLY);
+ if (file->fd < 0) {
+ // unable to open mach-o file
+ return false;
+ }
+
+ if (fstat(file->fd, &statBuffer) == -1) {
+ close(file->fd);
+ return false;
+ }
+
+ // We need some minimum size for this to even be a possible mach-o file. I believe
+ // its probably quite a bit bigger than this, but this at least covers something.
+ // We also need it to be a regular file.
+ file->mappedSize = (size_t)statBuffer.st_size;
+ if (statBuffer.st_size < 16 || !(statBuffer.st_mode & S_IFREG)) {
+ close(file->fd);
+ return false;
+ }
+
+ // Map the file to memory. MAP_SHARED can potentially reduce the amount of actual private
+ // memory needed to do this mapping. Also, be sure to check for the correct failure result.
+ file->mappedFile = mmap(0, file->mappedSize, PROT_READ, MAP_FILE | MAP_SHARED, file->fd, 0);
+ if (!file->mappedFile || (file->mappedFile == MAP_FAILED)) {
+ close(file->fd);
+ return false;
+ }
+
+ return true;
+}
+
+bool FIRCLSMachOFileInitWithCurrent(FIRCLSMachOFileRef file) {
+ struct FIRCLSMachOSlice slice = FIRCLSMachOSliceGetCurrent();
+
+ const char* imagePath = FIRCLSMachOSliceGetExecutablePath(&slice);
+
+ return FIRCLSMachOFileInitWithPath(file, imagePath);
+}
+
+void FIRCLSMachOFileDestroy(FIRCLSMachOFileRef file) {
+ if (!file) {
+ return;
+ }
+
+ if (file->mappedFile && file->mappedSize > 0) {
+ munmap(file->mappedFile, file->mappedSize);
+ }
+
+ close(file->fd);
+}
+
+void FIRCLSMachOFileEnumerateSlices(FIRCLSMachOFileRef file, FIRCLSMachOSliceIterator block) {
+ FIRCLSMachOEnumerateSlicesAtAddress(file->mappedFile, block);
+}
+
+void FIRCLSMachOEnumerateSlicesAtAddress(void* executableData, FIRCLSMachOSliceIterator block) {
+ // check the magic value, to determine if we have a fat header or not
+ uint32_t magicValue;
+ uint32_t archCount;
+ const struct fat_arch* fatArch;
+ struct FIRCLSMachOSlice slice;
+
+ memset(&slice, 0, sizeof(struct FIRCLSMachOSlice));
+
+ magicValue = ((struct fat_header*)executableData)->magic;
+ if ((magicValue != FAT_MAGIC) && (magicValue != FAT_CIGAM)) {
+ slice.startAddress = executableData;
+
+ // use this to fill in the values
+ FIRCLSMachOHeaderValues(&slice, NULL, NULL);
+
+ block(&slice);
+
+ return;
+ }
+
+ archCount = OSSwapBigToHostInt32(((struct fat_header*)executableData)->nfat_arch);
+ fatArch = executableData + sizeof(struct fat_header);
+
+ for (uint32_t i = 0; i < archCount; ++i) {
+ slice.cputype = OSSwapBigToHostInt32(fatArch->cputype);
+ slice.cpusubtype = OSSwapBigToHostInt32(fatArch->cpusubtype);
+ slice.startAddress = executableData + OSSwapBigToHostInt32(fatArch->offset);
+
+ block(&slice);
+
+ // advance to the next fat_arch structure
+ fatArch = (struct fat_arch*)((uintptr_t)fatArch + sizeof(struct fat_arch));
+ }
+}
+
+struct FIRCLSMachOSlice FIRCLSMachOFileSliceWithArchitectureName(FIRCLSMachOFileRef file,
+ const char* name) {
+ __block struct FIRCLSMachOSlice value;
+
+ memset(&value, 0, sizeof(struct FIRCLSMachOSlice));
+
+ FIRCLSMachOFileEnumerateSlices(file, ^(FIRCLSMachOSliceRef slice) {
+ if (strcmp(FIRCLSMachOSliceGetArchitectureName(slice), name) == 0) {
+ value = *slice;
+ }
+ });
+
+ return value;
+}
+
+static void FIRCLSMachOHeaderValues(FIRCLSMachOSliceRef slice,
+ const struct load_command** cmds,
+ uint32_t* cmdCount) {
+ const struct mach_header* header32 = (const struct mach_header*)slice->startAddress;
+ const struct mach_header_64* header64 = (const struct mach_header_64*)slice->startAddress;
+ uint32_t commandCount;
+ const void* commandsAddress;
+
+ if (cmds) {
+ *cmds = NULL;
+ }
+
+ if (cmdCount) {
+ *cmdCount = 0;
+ }
+
+ if (!slice->startAddress) {
+ return;
+ }
+
+ // the 32 and 64 bit versions have an identical structures, so this will work
+ switch (header32->magic) {
+ case MH_MAGIC: // 32-bit
+ case MH_CIGAM:
+ slice->cputype = header32->cputype;
+ slice->cpusubtype = header32->cpusubtype;
+ commandCount = header32->ncmds;
+ commandsAddress = slice->startAddress + sizeof(struct mach_header);
+ break;
+ case MH_MAGIC_64: // 64-bit
+ case MH_CIGAM_64:
+ slice->cputype = header64->cputype;
+ slice->cpusubtype = header64->cpusubtype;
+ commandCount = header64->ncmds;
+ commandsAddress = slice->startAddress + sizeof(struct mach_header_64);
+ break;
+ default:
+ // not a valid header
+ return;
+ }
+
+ // assign everything back by reference
+ if (cmds) {
+ *cmds = commandsAddress;
+ }
+
+ if (cmdCount) {
+ *cmdCount = commandCount;
+ }
+}
+
+static bool FIRCLSMachOSliceIsValid(FIRCLSMachOSliceRef slice) {
+ if (!slice) {
+ return false;
+ }
+
+ if (!slice->startAddress) {
+ return false;
+ }
+
+ return true;
+}
+
+void FIRCLSMachOSliceEnumerateLoadCommands(FIRCLSMachOSliceRef slice,
+ FIRCLSMachOLoadCommandIterator block) {
+ const struct load_command* cmd;
+ uint32_t cmdCount;
+
+ if (!block) {
+ return;
+ }
+
+ if (!FIRCLSMachOSliceIsValid(slice)) {
+ return;
+ }
+
+ FIRCLSMachOHeaderValues(slice, &cmd, &cmdCount);
+
+ for (uint32_t i = 0; cmd != NULL && i < cmdCount; ++i) {
+ block(cmd->cmd, cmd->cmdsize, cmd);
+
+ cmd = (struct load_command*)((uintptr_t)cmd + cmd->cmdsize);
+ }
+}
+
+struct FIRCLSMachOSlice FIRCLSMachOSliceGetCurrent(void) {
+ const NXArchInfo* archInfo;
+ struct FIRCLSMachOSlice slice;
+ void* executableSymbol;
+ Dl_info dlinfo;
+
+ archInfo = NXGetLocalArchInfo();
+ if (archInfo) {
+ slice.cputype = archInfo->cputype;
+ slice.cpusubtype = archInfo->cpusubtype;
+ }
+
+ slice.startAddress = NULL;
+
+ // This call can fail when Exported Symbols File in Build Settings is missing the symbol value
+ // defined as _MH_EXECUTE_SYM (if you look in the header the underscored MH_EXECUTE_SYM define is
+ // there)
+ executableSymbol = dlsym(RTLD_MAIN_ONLY, MH_EXECUTE_SYM);
+
+ // get the address of the main function
+ if (dladdr(executableSymbol, &dlinfo) != 0) {
+ slice.startAddress = dlinfo.dli_fbase;
+ }
+
+ return slice;
+}
+
+struct FIRCLSMachOSlice FIRCLSMachOSliceWithHeader(void* machHeader) {
+ struct FIRCLSMachOSlice slice;
+
+ slice.startAddress = machHeader;
+
+ return slice;
+}
+
+const char* FIRCLSMachOSliceGetExecutablePath(FIRCLSMachOSliceRef slice) {
+ Dl_info info;
+
+ if (!FIRCLSMachOSliceIsValid(slice)) {
+ return NULL;
+ }
+
+ // use dladdr here to look up the information we need for a binary image
+ if (dladdr(slice->startAddress, &info) == 0) {
+ return NULL;
+ }
+
+ return info.dli_fname;
+}
+
+const char* FIRCLSMachOSliceGetArchitectureName(FIRCLSMachOSliceRef slice) {
+ const NXArchInfo* archInfo;
+
+ // there are some special cases here for types not handled by earlier OSes
+ if (slice->cputype == CPU_TYPE_ARM && slice->cpusubtype == CPU_SUBTYPE_ARM_V7S) {
+ return "armv7s";
+ }
+
+ if (slice->cputype == (CPU_TYPE_ARM | CPU_ARCH_ABI64)) {
+ if (slice->cpusubtype == CLS_CPU_SUBTYPE_ARM64E) {
+ return "arm64e";
+ } else if (slice->cpusubtype == CPU_SUBTYPE_ARM64_ALL) {
+ return "arm64";
+ }
+ }
+
+ if (slice->cputype == (CPU_TYPE_ARM) && slice->cpusubtype == CPU_SUBTYPE_ARM_V7K) {
+ return "armv7k";
+ }
+
+ archInfo = NXGetArchInfoFromCpuType(slice->cputype, slice->cpusubtype);
+ if (!archInfo) {
+ return "unknown";
+ }
+
+ return archInfo->name;
+}
+
+bool FIRCLSMachOSliceIs64Bit(FIRCLSMachOSliceRef slice) {
+ // I'm pretty sure this is sufficient...
+ return (slice->cputype & CPU_ARCH_ABI64) == CPU_ARCH_ABI64;
+}
+
+bool FIRCLSMachOSliceGetSectionByName(FIRCLSMachOSliceRef slice,
+ const char* segName,
+ const char* sectionName,
+ const void** ptr) {
+ if (!ptr) {
+ return false;
+ }
+
+ *ptr = NULL; // make sure this is set before returning
+
+ FIRCLSMachOSection section;
+
+ if (!FIRCLSMachOSliceInitSectionByName(slice, segName, sectionName, &section)) {
+ return false;
+ }
+
+ // WARNING: this calculation isn't correct, but is here to maintain backwards
+ // compatibility for now with callers of FIRCLSMachOSliceGetSectionByName. All new
+ // users should be calling FIRCLSMachOSliceInitSectionByName
+ *ptr = (const void*)((uintptr_t)slice->startAddress + section.offset);
+
+ return true;
+}
+
+bool FIRCLSMachOSliceInitSectionByName(FIRCLSMachOSliceRef slice,
+ const char* segName,
+ const char* sectionName,
+ FIRCLSMachOSection* section) {
+ if (!FIRCLSMachOSliceIsValid(slice)) {
+ return false;
+ }
+
+ if (!section) {
+ return false;
+ }
+
+ memset(section, 0, sizeof(FIRCLSMachOSection));
+
+ if (FIRCLSMachOSliceIs64Bit(slice)) {
+ const struct section_64* sect =
+ getsectbynamefromheader_64(slice->startAddress, segName, sectionName);
+ if (!sect) {
+ return false;
+ }
+
+ section->addr = sect->addr;
+ section->size = sect->size;
+ section->offset = sect->offset;
+ } else {
+ const struct section* sect = getsectbynamefromheader(slice->startAddress, segName, sectionName);
+ if (!sect) {
+ return false;
+ }
+
+ section->addr = sect->addr;
+ section->size = sect->size;
+ section->offset = sect->offset;
+ }
+
+ return true;
+}
+
+// TODO: this is left in-place just to ensure that old crashltyics + new fabric are still compatible
+// with each other. As a happy bonus, if that situation does come up, this will also fix the bug
+// that was preventing compact unwind on arm64 + iOS 9 from working correctly.
+void FIRCLSMachOSliceGetUnwindInformation(FIRCLSMachOSliceRef slice,
+ const void** ehFrame,
+ const void** unwindInfo) {
+ if (!unwindInfo && !ehFrame) {
+ return;
+ }
+
+ bool found = false;
+ intptr_t slide = 0;
+
+ // This is inefficient, but we have no other safe way to do this correctly. Modifying the
+ // FIRCLSMachOSlice structure is tempting, but could introduce weird binary-compatibility issues
+ // with version mis-matches.
+ for (uint32_t i = 0; i < _dyld_image_count(); ++i) {
+ const struct mach_header* header = _dyld_get_image_header(i);
+
+ if (header == slice->startAddress) {
+ found = true;
+ slide = _dyld_get_image_vmaddr_slide(i);
+ break;
+ }
+ }
+
+ // make sure we were able to find a matching value
+ if (!found) {
+ return;
+ }
+
+ FIRCLSMachOSection section;
+
+ if (unwindInfo) {
+ if (FIRCLSMachOSliceInitSectionByName(slice, SEG_TEXT, "__unwind_info", &section)) {
+ *unwindInfo = (void*)(section.addr + slide);
+ }
+ }
+
+ if (ehFrame) {
+ if (FIRCLSMachOSliceInitSectionByName(slice, SEG_TEXT, "__eh_frame", &section)) {
+ *ehFrame = (void*)(section.addr + slide);
+ }
+ }
+}
+
+uint8_t const* FIRCLSMachOGetUUID(const struct load_command* cmd) {
+ return ((const struct uuid_command*)cmd)->uuid;
+}
+
+const char* FIRCLSMachOGetDylibPath(const struct load_command* cmd) {
+ const struct dylib_command* dylibcmd = (const struct dylib_command*)cmd;
+
+ return (const char*)((uintptr_t)cmd + dylibcmd->dylib.name.offset);
+}
+
+bool FIRCLSMachOGetEncrypted(const struct load_command* cmd) {
+ return ((struct encryption_info_command*)cmd)->cryptid > 0;
+}
+
+static FIRCLSMachOVersion FIRCLSMachOVersionFromEncoded(uint32_t encoded) {
+ FIRCLSMachOVersion version;
+
+ version.major = (encoded & 0xffff0000) >> 16;
+ version.minor = (encoded & 0x0000ff00) >> 8;
+ version.bugfix = encoded & 0x000000ff;
+
+ return version;
+}
+
+FIRCLSMachOVersion FIRCLSMachOGetMinimumOSVersion(const struct load_command* cmd) {
+ return FIRCLSMachOVersionFromEncoded(((const struct version_min_command*)cmd)->version);
+}
+
+FIRCLSMachOVersion FIRCLSMachOGetLinkedSDKVersion(const struct load_command* cmd) {
+ return FIRCLSMachOVersionFromEncoded(((const struct version_min_command*)cmd)->sdk);
+}
+
+FIRCLSMachOSegmentCommand FIRCLSMachOGetSegmentCommand(const struct load_command* cmd) {
+ FIRCLSMachOSegmentCommand segmentCommand;
+
+ memset(&segmentCommand, 0, sizeof(FIRCLSMachOSegmentCommand));
+
+ if (!cmd) {
+ return segmentCommand;
+ }
+
+ if (cmd->cmd == LC_SEGMENT) {
+ struct segment_command* segCmd = (struct segment_command*)cmd;
+
+ memcpy(segmentCommand.segname, segCmd->segname, 16);
+ segmentCommand.vmaddr = segCmd->vmaddr;
+ segmentCommand.vmsize = segCmd->vmsize;
+ } else if (cmd->cmd == LC_SEGMENT_64) {
+ struct segment_command_64* segCmd = (struct segment_command_64*)cmd;
+
+ memcpy(segmentCommand.segname, segCmd->segname, 16);
+ segmentCommand.vmaddr = segCmd->vmaddr;
+ segmentCommand.vmsize = segCmd->vmsize;
+ }
+
+ return segmentCommand;
+}
+
+NSString* FIRCLSMachONormalizeUUID(CFUUIDBytes* uuidBytes) {
+ CFUUIDRef uuid = CFUUIDCreateFromUUIDBytes(kCFAllocatorDefault, *uuidBytes);
+
+ NSString* string = CFBridgingRelease(CFUUIDCreateString(kCFAllocatorDefault, uuid));
+
+ CFRelease(uuid);
+
+ return [[string stringByReplacingOccurrencesOfString:@"-" withString:@""] lowercaseString];
+}
+
+NSString* FIRCLSMachOFormatVersion(FIRCLSMachOVersion* version) {
+ if (!version) {
+ return nil;
+ }
+
+ return [NSString stringWithFormat:@"%d.%d.%d", version->major, version->minor, version->bugfix];
+}