Convert Figma logo to code with AI

apple logodarwin-xnu

Legacy mirror of Darwin Kernel. Replaced by https://github.com/apple-oss-distributions/xnu

10,981
1,633
10,981
3

Top Related Projects

178,031

Linux kernel source tree

WDF makes it easy to write high-quality Windows drivers

The FreeBSD src tree publish-only repository. Experimenting with 'simple' pull requests....

3,182

Read-only git conversion of OpenBSD's official CVS src repository. Pull requests not accepted - send diffs to the tech@ mailing list.

14,402

A free Windows-compatible Operating System

Quick Overview

Darwin-XNU is the open-source kernel for Apple's macOS and iOS operating systems. It combines the Mach microkernel, various elements of BSD, and Apple's proprietary code to create a hybrid kernel that powers Apple's devices. This repository contains the source code for the XNU kernel, allowing developers to explore and understand the inner workings of Apple's operating systems.

Pros

  • Open-source nature allows for transparency and community contributions
  • Provides valuable insights into Apple's operating system architecture
  • Enables researchers and developers to study and improve system security
  • Serves as an educational resource for operating system design and implementation

Cons

  • Complex codebase that can be challenging for newcomers to navigate
  • Limited documentation compared to other open-source projects
  • Contributions from the community may not be directly incorporated into Apple's official releases
  • Some proprietary components are not included, limiting full understanding of the complete system

Code Examples

As Darwin-XNU is an operating system kernel and not a code library, providing code examples for direct usage is not applicable. However, here are a few snippets from the kernel source code to illustrate its structure:

// Example of a system call definition
int
sys_exit(struct proc *p, struct sys_exit_args *uap, int32_t *retval)
{
    exit1(p, W_EXITCODE(uap->rval, 0), EXIT_THREAD_NORETURN);
    /* NOTREACHED */
    return 0;
}

This code snippet shows the implementation of the sys_exit system call, which is responsible for terminating a process.

// Example of memory management in the kernel
kern_return_t
vm_map_enter(
    vm_map_t                map,
    vm_map_offset_t         *address,
    vm_map_size_t           size,
    vm_map_offset_t         mask,
    int                     flags,
    vm_map_kernel_flags_t   vmk_flags,
    vm_tag_t                tag,
    vm_object_t             object,
    vm_object_offset_t      offset,
    boolean_t               needs_copy,
    vm_prot_t               cur_protection,
    vm_prot_t               max_protection,
    vm_inherit_t            inheritance)
{
    // Implementation details...
}

This function is part of the virtual memory management system, responsible for mapping memory regions in the kernel.

Getting Started

As Darwin-XNU is a kernel and not a typical software library, there isn't a straightforward "getting started" process for using it directly. However, for developers interested in exploring or contributing to the project, you can follow these steps:

  1. Clone the repository: git clone https://github.com/apple/darwin-xnu.git
  2. Read the documentation in the repository, particularly the README and CONTRIBUTING files.
  3. Set up a development environment suitable for kernel development on macOS.
  4. Explore the source code and build system to understand the project structure.

Note that building and running a custom kernel requires advanced knowledge and can potentially harm your system if not done correctly. It's recommended to use virtual machines or dedicated test hardware for kernel development and testing.

Competitor Comparisons

178,031

Linux kernel source tree

Pros of Linux

  • Larger and more active community, resulting in faster development and broader hardware support
  • More extensive documentation and learning resources available
  • Greater flexibility and customization options for users and developers

Cons of Linux

  • Can be more complex to set up and configure for specific use cases
  • Less streamlined user experience compared to Darwin's integration with macOS
  • Potential compatibility issues with certain proprietary software

Code Comparison

Darwin XNU:

void machine_idle(void)
{
    Idle_load_context();
    Idle_context();
}

Linux:

static void cpu_idle_loop(void)
{
    while (1) {
        tick_nohz_idle_enter();
        arch_cpu_idle();
        tick_nohz_idle_exit();
    }
}

Both kernels implement idle loops, but Linux's implementation is more explicit and includes power management considerations.

WDF makes it easy to write high-quality Windows drivers

Pros of Windows-Driver-Frameworks

  • More extensive documentation and examples for driver development
  • Better integration with Windows-specific APIs and features
  • Larger community and ecosystem for Windows driver development

Cons of Windows-Driver-Frameworks

  • Limited to Windows operating systems, less portable
  • More complex architecture due to supporting various Windows versions
  • Steeper learning curve for developers new to Windows driver development

Code Comparison

darwin-xnu (XNU kernel):

void
thread_bootstrap_return(void)
{
    thread_t thread = current_thread();
    thread_continue(thread);
}

Windows-Driver-Frameworks:

NTSTATUS
DriverEntry(
    _In_ PDRIVER_OBJECT  DriverObject,
    _In_ PUNICODE_STRING RegistryPath
    )
{
    WDF_DRIVER_CONFIG config;
    WDF_DRIVER_CONFIG_INIT(&config, EvtDriverDeviceAdd);
    return WdfDriverCreate(DriverObject, RegistryPath, WDF_NO_OBJECT_ATTRIBUTES, &config, WDF_NO_HANDLE);
}

The code snippets demonstrate the different approaches to kernel and driver development in the two frameworks. darwin-xnu focuses on low-level kernel operations, while Windows-Driver-Frameworks provides a higher-level abstraction for driver development on Windows.

The FreeBSD src tree publish-only repository. Experimenting with 'simple' pull requests....

Pros of freebsd-src

  • Open-source and community-driven development
  • Broader hardware support and portability
  • More comprehensive documentation and user-friendly resources

Cons of freebsd-src

  • Slower release cycle compared to darwin-xnu
  • Less focus on desktop and consumer-oriented features
  • Smaller ecosystem of third-party applications

Code Comparison

darwin-xnu (BSD-derived kernel):

void
thread_bootstrap_return(void)
{
    thread_t thread = current_thread();
    thread_continue(thread->continuation);
}

freebsd-src (BSD kernel):

void
cpu_throw(struct thread *td, struct thread *newtd)
{
    critical_enter();
    cpu_switch(td, newtd, mtx_contested);
    panic("cpu_throw: returned");
}

Both examples showcase kernel-level thread management, but darwin-xnu's code appears more abstracted, while freebsd-src's implementation is more direct and low-level.

3,182

Read-only git conversion of OpenBSD's official CVS src repository. Pull requests not accepted - send diffs to the tech@ mailing list.

Pros of src

  • Open-source and freely available, allowing for community contributions and audits
  • Highly secure by default, with a focus on proactive security measures
  • Clean and well-documented codebase, making it easier to understand and modify

Cons of src

  • Smaller developer community compared to darwin-xnu, potentially leading to slower development
  • Limited hardware support, primarily focused on x86 and ARM architectures
  • Fewer third-party applications and drivers available

Code Comparison

darwin-xnu (BSD-derived kernel):

void
thread_bootstrap_return(void)
{
    thread_t thread = current_thread();
    thread_continue(thread);
}

src (OpenBSD kernel):

void
cpu_switchto(struct proc *oldproc, struct proc *newproc)
{
    struct cpu_info *ci = curcpu();
    ci->ci_curproc = newproc;
}

Both examples show low-level kernel operations, but darwin-xnu focuses on thread management while src demonstrates process switching. The OpenBSD code appears more straightforward, aligning with its reputation for simplicity and clarity.

14,402

A free Windows-compatible Operating System

Pros of ReactOS

  • Open-source and community-driven, allowing for broader contributions and customization
  • Aims to be binary-compatible with Windows, potentially supporting a wider range of applications
  • Actively developed with frequent updates and improvements

Cons of ReactOS

  • Less mature and stable compared to XNU, which powers production operating systems
  • Smaller developer base and resources compared to Apple's backing of XNU
  • May face legal challenges due to its goal of Windows compatibility

Code Comparison

XNU (kernel/syscall/mach_kernelrpc.c):

kern_return_t
mach_kernelrpc_mach_vm_allocate_trap(
    struct mach_kernelrpc_mach_vm_allocate_trap_args *args)
{
    mach_vm_offset_t addr;
    mach_vm_size_t size;
    int flags;

ReactOS (ntoskrnl/mm/ARM3/virtual.c):

NTSTATUS
NTAPI
MiAllocateVirtualMemory(
    PVOID *BaseAddress,
    PSIZE_T RegionSize,
    ULONG AllocationType,
    ULONG Protect,
    PEPROCESS Process,
    MODE PreviousMode)

Both snippets show memory allocation functions, but XNU uses Mach-specific types while ReactOS follows Windows NT conventions.

Convert Figma logo designs to code with AI

Visual Copilot

Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.

Try Visual Copilot

README

What is XNU?

XNU kernel is part of the Darwin operating system for use in macOS and iOS operating systems. XNU is an acronym for X is Not Unix. XNU is a hybrid kernel combining the Mach kernel developed at Carnegie Mellon University with components from FreeBSD and a C++ API for writing drivers called IOKit. XNU runs on x86_64 for both single processor and multi-processor configurations.

XNU Source Tree

  • config - configurations for exported apis for supported architecture and platform
  • SETUP - Basic set of tools used for configuring the kernel, versioning and kextsymbol management.
  • EXTERNAL_HEADERS - Headers sourced from other projects to avoid dependency cycles when building. These headers should be regularly synced when source is updated.
  • libkern - C++ IOKit library code for handling of drivers and kexts.
  • libsa - kernel bootstrap code for startup
  • libsyscall - syscall library interface for userspace programs
  • libkdd - source for user library for parsing kernel data like kernel chunked data.
  • makedefs - top level rules and defines for kernel build.
  • osfmk - Mach kernel based subsystems
  • pexpert - Platform specific code like interrupt handling, atomics etc.
  • security - Mandatory Access Check policy interfaces and related implementation.
  • bsd - BSD subsystems code
  • tools - A set of utilities for testing, debugging and profiling kernel.

How to build XNU

Building DEVELOPMENT kernel

The xnu make system can build kernel based on KERNEL_CONFIGS & ARCH_CONFIGS variables as arguments. Here is the syntax:

make SDKROOT=<sdkroot> ARCH_CONFIGS=<arch> KERNEL_CONFIGS=<variant>

Where:

  • <sdkroot>: path to macOS SDK on disk. (defaults to /)
  • <variant>: can be debug, development, release, profile and configures compilation flags and asserts throughout kernel code.
  • <arch> : can be valid arch to build for. (E.g. X86_64)

To build a kernel for the same architecture as running OS, just type

$ make
$ make SDKROOT=macosx.internal

Additionally, there is support for configuring architectures through ARCH_CONFIGS and kernel configurations with KERNEL_CONFIGS.

$ make SDKROOT=macosx.internal ARCH_CONFIGS=X86_64 KERNEL_CONFIGS=DEVELOPMENT
$ make SDKROOT=macosx.internal ARCH_CONFIGS=X86_64 KERNEL_CONFIGS="RELEASE DEVELOPMENT DEBUG"

Note:

  • By default, architecture is set to the build machine architecture, and the default kernel config is set to build for DEVELOPMENT.

This will also create a bootable image, kernel.[config], and a kernel binary with symbols, kernel.[config].unstripped.

To intall the kernel into a DSTROOT, use the install_kernels target:

$ make install_kernels DSTROOT=/tmp/xnu-dst

Hint: For a more satisfying kernel debugging experience, with access to all local variables and arguments, but without all the extra check of the DEBUG kernel, add something like: CFLAGS_DEVELOPMENTARM64="-O0 -g -DKERNEL_STACK_MULTIPLIER=2" CXXFLAGS_DEVELOPMENTARM64="-O0 -g -DKERNEL_STACK_MULTIPLIER=2" to your make command. Replace DEVELOPMENT and ARM64 with the appropriate build and platform.

  • To build with RELEASE kernel configuration

    make KERNEL_CONFIGS=RELEASE SDKROOT=/path/to/SDK
    

Building FAT kernel binary

Define architectures in your environment or when running a make command.

$ make ARCH_CONFIGS="X86_64" exporthdrs all

Other makefile options

  • $ make MAKEJOBS=-j8 # this will use 8 processes during the build. The default is 2x the number of active CPUS.
  • $ make -j8 # the standard command-line option is also accepted
  • $ make -w # trace recursive make invocations. Useful in combination with VERBOSE=YES
  • $ make BUILD_LTO=0 # build without LLVM Link Time Optimization
  • $ make REMOTEBUILD=user@remotehost # perform build on remote host
  • $ make BUILD_JSON_COMPILATION_DATABASE=1 # Build Clang JSON Compilation Database

The XNU build system can optionally output color-formatted build output. To enable this, you can either set the XNU_LOGCOLORS environment variable to y, or you can pass LOGCOLORS=y to the make command.

Debug information formats

By default, a DWARF debug information repository is created during the install phase; this is a "bundle" named kernel.development.<variant>.dSYM To select the older STABS debug information format (where debug information is embedded in the kernel.development.unstripped image), set the BUILD_STABS environment variable.

$ export BUILD_STABS=1
$ make

Building KernelCaches

To test the xnu kernel, you need to build a kernelcache that links the kexts and kernel together into a single bootable image. To build a kernelcache you can use the following mechanisms:

  • Using automatic kernelcache generation with kextd. The kextd daemon keeps watching for changing in /System/Library/Extensions directory. So you can setup new kernel as

    $ cp BUILD/obj/DEVELOPMENT/X86_64/kernel.development /System/Library/Kernels/
    $ touch /System/Library/Extensions
    $ ps -e | grep kextd
    
  • Manually invoking kextcache to build new kernelcache.

    $ kextcache -q -z -a x86_64 -l -n -c /var/tmp/kernelcache.test -K /var/tmp/kernel.test /System/Library/Extensions
    

Running KernelCache on Target machine

The development kernel and iBoot supports configuring boot arguments so that we can safely boot into test kernel and, if things go wrong, safely fall back to previously used kernelcache. Following are the steps to get such a setup:

  1. Create kernel cache using the kextcache command as /kernelcache.test

  2. Copy exiting boot configurations to alternate file

    $ cp /Library/Preferences/SystemConfiguration/com.apple.Boot.plist /next_boot.plist
    
  3. Update the kernelcache and boot-args for your setup

    $ plutil -insert "Kernel Cache" -string "kernelcache.test" /next_boot.plist
    $ plutil -replace "Kernel Flags" -string "debug=0x144 -v kernelsuffix=test " /next_boot.plist
    
  4. Copy the new config to /Library/Preferences/SystemConfiguration/

    $ cp /next_boot.plist /Library/Preferences/SystemConfiguration/boot.plist
    
  5. Bless the volume with new configs.

    $ sudo -n bless  --mount / --setBoot --nextonly --options "config=boot"
    

    The --nextonly flag specifies that use the boot.plist configs only for one boot. So if the kernel panic's you can easily power reboot and recover back to original kernel.

Creating tags and cscope

Set up your build environment and from the top directory, run:

$ make tags     # this will build ctags and etags on a case-sensitive volume, only ctags on case-insensitive
$ make TAGS     # this will build etags
$ make cscope   # this will build cscope database

How to install a new header file from XNU

To install IOKit headers, see additional comments in iokit/IOKit/Makefile.

XNU installs header files at the following locations -

a. $(DSTROOT)/System/Library/Frameworks/Kernel.framework/Headers
b. $(DSTROOT)/System/Library/Frameworks/Kernel.framework/PrivateHeaders
c. $(DSTROOT)/usr/include/
d. $(DSTROOT)/System/DriverKit/usr/include/
e. $(DSTROOT)/System/Library/Frameworks/System.framework/PrivateHeaders

Kernel.framework is used by kernel extensions.
The System.framework and /usr/include are used by user level applications.
/System/DriverKit/usr/include is used by userspace drivers.
The header files in framework's PrivateHeaders are only available for ** Apple Internal Development **.

The directory containing the header file should have a Makefile that creates the list of files that should be installed at different locations. If you are adding the first header file in a directory, you will need to create Makefile similar to xnu/bsd/sys/Makefile.

Add your header file to the correct file list depending on where you want to install it. The default locations where the header files are installed from each file list are -

a. `DATAFILES` : To make header file available in user level -
   `$(DSTROOT)/usr/include`

b. `DRIVERKIT_DATAFILES` : To make header file available to DriverKit userspace drivers -
   `$(DSTROOT)/System/DriverKit/usr/include`

c. `PRIVATE_DATAFILES` : To make header file available to Apple internal in
   user level -
   `$(DSTROOT)/System/Library/Frameworks/System.framework/PrivateHeaders`

d. `KERNELFILES` : To make header file available in kernel level -
   `$(DSTROOT)/System/Library/Frameworks/Kernel.framework/Headers`
   `$(DSTROOT)/System/Library/Frameworks/Kernel.framework/PrivateHeaders`

e. `PRIVATE_KERNELFILES` : To make header file available to Apple internal
   for kernel extensions -
   `$(DSTROOT)/System/Library/Frameworks/Kernel.framework/PrivateHeaders`

The Makefile combines the file lists mentioned above into different install lists which are used by build system to install the header files. There are two types of install lists: machine-dependent and machine-independent. These lists are indicated by the presence of MD and MI in the build setting, respectively. If your header is architecture-specific, then you should use a machine-dependent install list (e.g. INSTALL_MD_LIST). If your header should be installed for all architectures, then you should use a machine-independent install list (e.g. INSTALL_MI_LIST).

If the install list that you are interested does not exist, create it by adding the appropriate file lists. The default install lists, its member file lists and their default location are described below -

a. `INSTALL_MI_LIST` : Installs header file to a location that is available to everyone in user level.
    Locations -
       $(DSTROOT)/usr/include
   Definition -
       INSTALL_MI_LIST = ${DATAFILES}

b. `INSTALL_DRIVERKIT_MI_LIST` : Installs header file to a location that is
    available to DriverKit userspace drivers.
    Locations -
       $(DSTROOT)/System/DriverKit/usr/include
   Definition -
       INSTALL_DRIVERKIT_MI_LIST = ${DRIVERKIT_DATAFILES}

c.  `INSTALL_MI_LCL_LIST` : Installs header file to a location that is available
   for Apple internal in user level.
   Locations -
       $(DSTROOT)/System/Library/Frameworks/System.framework/PrivateHeaders
   Definition -
       INSTALL_MI_LCL_LIST = ${PRIVATE_DATAFILES}

d. `INSTALL_KF_MI_LIST` : Installs header file to location that is available
   to everyone for kernel extensions.
   Locations -
        $(DSTROOT)/System/Library/Frameworks/Kernel.framework/Headers
   Definition -
        INSTALL_KF_MI_LIST = ${KERNELFILES}

e. `INSTALL_KF_MI_LCL_LIST` : Installs header file to location that is
   available for Apple internal for kernel extensions.
   Locations -
        $(DSTROOT)/System/Library/Frameworks/Kernel.framework/PrivateHeaders
   Definition -
        INSTALL_KF_MI_LCL_LIST = ${KERNELFILES} ${PRIVATE_KERNELFILES}

f. `EXPORT_MI_LIST` : Exports header file to all of xnu (bsd/, osfmk/, etc.)
   for compilation only. Does not install anything into the SDK.
   Definition -
        EXPORT_MI_LIST = ${KERNELFILES} ${PRIVATE_KERNELFILES}

g. `INSTALL_MODULEMAP_INCDIR_MI_LIST` : Installs module map file to a
   location that is available to everyone in user level, installing at the
   root of INCDIR.
   Locations -
       $(DSTROOT)/usr/include
   Definition -
       INSTALL_MODULEMAP_INCDIR_MI_LIST = ${MODULEMAP_INCDIR_FILES}

If you want to install the header file in a sub-directory of the paths described in (1), specify the directory name using two variables INSTALL_MI_DIR and EXPORT_MI_DIR as follows -

INSTALL_MI_DIR = dirname
EXPORT_MI_DIR = dirname

A single header file can exist at different locations using the steps mentioned above. However it might not be desirable to make all the code in the header file available at all the locations. For example, you want to export a function only to kernel level but not user level.

You can use C language's pre-processor directive (#ifdef, #endif, #ifndef) to control the text generated before a header file is installed. The kernel only includes the code if the conditional macro is TRUE and strips out code for FALSE conditions from the header file.

Some pre-defined macros and their descriptions are -

a. `PRIVATE` : If defined, enclosed definitions are considered System
Private Interfaces. These are visible within xnu and
exposed in user/kernel headers installed within the AppleInternal
"PrivateHeaders" sections of the System and Kernel frameworks.
b. `KERNEL_PRIVATE` : If defined, enclosed code is available to all of xnu
kernel and Apple internal kernel extensions and omitted from user
headers.
c. `BSD_KERNEL_PRIVATE` : If defined, enclosed code is visible exclusively
within the xnu/bsd module.
d. `MACH_KERNEL_PRIVATE`: If defined, enclosed code is visible exclusively
within the xnu/osfmk module.
e. `XNU_KERNEL_PRIVATE`: If defined, enclosed code is visible exclusively
within xnu.
f. `KERNEL` :  If defined, enclosed code is available within xnu and kernel
   extensions and is not visible in user level header files.  Only the
   header files installed in following paths will have the code -

        $(DSTROOT)/System/Library/Frameworks/Kernel.framework/Headers
        $(DSTROOT)/System/Library/Frameworks/Kernel.framework/PrivateHeaders
g. `DRIVERKIT`: If defined, enclosed code is visible exclusively in the
DriverKit SDK headers used by userspace drivers.

Conditional compilation

xnu offers the following mechanisms for conditionally compiling code:

a. *CPU Characteristics* If the code you are guarding has specific
characterstics that will vary only based on the CPU architecture being
targeted, use this option. Prefer checking for features of the
architecture (e.g. `__LP64__`, `__LITTLE_ENDIAN__`, etc.).
b. *New Features* If the code you are guarding, when taken together,
implements a feature, you should define a new feature in `config/MASTER`
and use the resulting `CONFIG` preprocessor token (e.g. for a feature
named `config_virtual_memory`, check for `#if CONFIG_VIRTUAL_MEMORY`).
This practice ensures that existing features may be brought to other
platforms by simply changing a feature switch.
c. *Existing Features* You can use existing features if your code is
strongly tied to them (e.g. use `SECURE_KERNEL` if your code implements
new functionality that is exclusively relevant to the trusted kernel and
updates the definition/understanding of what being a trusted kernel means).

It is recommended that you avoid compiling based on the target platform. xnu does not define the platform macros from TargetConditionals.h (TARGET_OS_OSX, TARGET_OS_IOS, etc.).

There is a deprecated TARGET_OS_EMBEDDED macro, but this should be avoided as it is in general too broad a definition for most functionality. Please refer to TargetConditionals.h for a full picture.

How to add a new syscall

Testing the kernel

XNU kernel has multiple mechanisms for testing.

  • Assertions - The DEVELOPMENT and DEBUG kernel configs are compiled with assertions enabled. This allows developers to easily test invariants and conditions.

  • XNU Power On Self Tests (XNUPOST): The XNUPOST config allows for building the kernel with basic set of test functions that are run before first user space process is launched. Since XNU is hybrid between MACH and BSD, we have two locations where tests can be added.

    xnu/osfmk/tests/     # For testing mach based kernel structures and apis.
    bsd/tests/           # For testing BSD interfaces.
    

    Please follow the documentation at osfmk/tests/README.md

  • User level tests: The tools/tests/ directory holds all the tests that verify syscalls and other features of the xnu kernel. The make target xnu_tests can be used to build all the tests supported.

    $ make RC_ProjectName=xnu_tests SDKROOT=/path/to/SDK
    

    These tests are individual programs that can be run from Terminal and report tests status by means of std posix exit codes (0 -> success) and/or stdout. Please read detailed documentation in tools/tests/unit_tests/README.md

Kernel data descriptors

XNU uses different data formats for passing data in its api. The most standard way is using syscall arguments. But for complex data it often relies of sending memory saved by C structs. This packaged data transport mechanism is fragile and leads to broken interfaces between user space programs and kernel apis. libkdd directory holds user space library that can parse custom data provided by the same version of kernel. The kernel chunked data format is described in detail at libkdd/README.md.

Debugging the kernel

The xnu kernel supports debugging with a remote kernel debugging protocol (kdp). Please refer documentation at [technical note] TN2063 By default the kernel is setup to reboot on a panic. To debug a live kernel, the kdp server is setup to listen for UDP connections over ethernet. For machines without ethernet port, this behavior can be altered with use of kernel boot-args. Following are some common options.

  • debug=0x144 - setups debug variables to start kdp debugserver on panic
  • -v - print kernel logs on screen. By default XNU only shows grey screen with boot art.
  • kdp_match_name=en1 - Override default port selection for kdp. Supported for ethernet, thunderbolt and serial debugging.

To debug a panic'ed kernel, use llvm debugger (lldb) along with unstripped symbol rich kernel binary.

sh$ lldb kernel.development.unstripped

And then you can connect to panic'ed machine with kdp_remote [ip addr] or gdb_remote [hostip : port] commands.

Each kernel is packaged with kernel specific debug scripts as part of the build process. For security reasons these special commands and scripts do not get loaded automatically when lldb is connected to machine. Please add the following setting to your ~/.lldbinit if you wish to always load these macros.

settings set target.load-script-from-symbol-file true

The tools/lldbmacros directory contains the source for each of these commands. Please follow the README.md for detailed explanation of commands and their usage.