1 //===-- Address.cpp ---------------------------------------------*- C++ -*-===// 2 // 3 // The LLVM Compiler Infrastructure 4 // 5 // This file is distributed under the University of Illinois Open Source 6 // License. See LICENSE.TXT for details. 7 // 8 //===----------------------------------------------------------------------===// 9 10 #include "lldb/Core/Address.h" 11 #include "lldb/Core/Module.h" 12 #include "lldb/Core/Section.h" 13 #include "lldb/Symbol/Block.h" 14 #include "lldb/Symbol/ObjectFile.h" 15 #include "lldb/Symbol/Variable.h" 16 #include "lldb/Symbol/VariableList.h" 17 #include "lldb/Target/ExecutionContext.h" 18 #include "lldb/Target/Process.h" 19 #include "lldb/Target/SectionLoadList.h" 20 #include "lldb/Target/Target.h" 21 #include "lldb/Symbol/SymbolVendor.h" 22 23 #include "llvm/ADT/Triple.h" 24 25 using namespace lldb; 26 using namespace lldb_private; 27 28 static size_t 29 ReadBytes (ExecutionContextScope *exe_scope, const Address &address, void *dst, size_t dst_len) 30 { 31 if (exe_scope == NULL) 32 return 0; 33 34 TargetSP target_sp (exe_scope->CalculateTarget()); 35 if (target_sp) 36 { 37 Error error; 38 bool prefer_file_cache = false; 39 return target_sp->ReadMemory (address, prefer_file_cache, dst, dst_len, error); 40 } 41 return 0; 42 } 43 44 static bool 45 GetByteOrderAndAddressSize (ExecutionContextScope *exe_scope, const Address &address, ByteOrder& byte_order, uint32_t& addr_size) 46 { 47 byte_order = eByteOrderInvalid; 48 addr_size = 0; 49 if (exe_scope == NULL) 50 return false; 51 52 TargetSP target_sp (exe_scope->CalculateTarget()); 53 if (target_sp) 54 { 55 byte_order = target_sp->GetArchitecture().GetByteOrder(); 56 addr_size = target_sp->GetArchitecture().GetAddressByteSize(); 57 } 58 59 if (byte_order == eByteOrderInvalid || addr_size == 0) 60 { 61 ModuleSP module_sp (address.GetModule()); 62 if (module_sp) 63 { 64 byte_order = module_sp->GetArchitecture().GetByteOrder(); 65 addr_size = module_sp->GetArchitecture().GetAddressByteSize(); 66 } 67 } 68 return byte_order != eByteOrderInvalid && addr_size != 0; 69 } 70 71 static uint64_t 72 ReadUIntMax64 (ExecutionContextScope *exe_scope, const Address &address, uint32_t byte_size, bool &success) 73 { 74 uint64_t uval64 = 0; 75 if (exe_scope == NULL || byte_size > sizeof(uint64_t)) 76 { 77 success = false; 78 return 0; 79 } 80 uint64_t buf = 0; 81 82 success = ReadBytes (exe_scope, address, &buf, byte_size) == byte_size; 83 if (success) 84 { 85 ByteOrder byte_order = eByteOrderInvalid; 86 uint32_t addr_size = 0; 87 if (GetByteOrderAndAddressSize (exe_scope, address, byte_order, addr_size)) 88 { 89 DataExtractor data (&buf, sizeof(buf), byte_order, addr_size); 90 lldb::offset_t offset = 0; 91 uval64 = data.GetU64(&offset); 92 } 93 else 94 success = false; 95 } 96 return uval64; 97 } 98 99 static bool 100 ReadAddress (ExecutionContextScope *exe_scope, const Address &address, uint32_t pointer_size, Address &deref_so_addr) 101 { 102 if (exe_scope == NULL) 103 return false; 104 105 106 bool success = false; 107 addr_t deref_addr = ReadUIntMax64 (exe_scope, address, pointer_size, success); 108 if (success) 109 { 110 ExecutionContext exe_ctx; 111 exe_scope->CalculateExecutionContext(exe_ctx); 112 // If we have any sections that are loaded, try and resolve using the 113 // section load list 114 Target *target = exe_ctx.GetTargetPtr(); 115 if (target && !target->GetSectionLoadList().IsEmpty()) 116 { 117 if (target->GetSectionLoadList().ResolveLoadAddress (deref_addr, deref_so_addr)) 118 return true; 119 } 120 else 121 { 122 // If we were not running, yet able to read an integer, we must 123 // have a module 124 ModuleSP module_sp (address.GetModule()); 125 126 assert (module_sp); 127 if (module_sp->ResolveFileAddress(deref_addr, deref_so_addr)) 128 return true; 129 } 130 131 // We couldn't make "deref_addr" into a section offset value, but we were 132 // able to read the address, so we return a section offset address with 133 // no section and "deref_addr" as the offset (address). 134 deref_so_addr.SetRawAddress(deref_addr); 135 return true; 136 } 137 return false; 138 } 139 140 static bool 141 DumpUInt (ExecutionContextScope *exe_scope, const Address &address, uint32_t byte_size, Stream* strm) 142 { 143 if (exe_scope == NULL || byte_size == 0) 144 return 0; 145 std::vector<uint8_t> buf(byte_size, 0); 146 147 if (ReadBytes (exe_scope, address, &buf[0], buf.size()) == buf.size()) 148 { 149 ByteOrder byte_order = eByteOrderInvalid; 150 uint32_t addr_size = 0; 151 if (GetByteOrderAndAddressSize (exe_scope, address, byte_order, addr_size)) 152 { 153 DataExtractor data (&buf.front(), buf.size(), byte_order, addr_size); 154 155 data.Dump (strm, 156 0, // Start offset in "data" 157 eFormatHex, // Print as characters 158 buf.size(), // Size of item 159 1, // Items count 160 UINT32_MAX, // num per line 161 LLDB_INVALID_ADDRESS,// base address 162 0, // bitfield bit size 163 0); // bitfield bit offset 164 165 return true; 166 } 167 } 168 return false; 169 } 170 171 172 static size_t 173 ReadCStringFromMemory (ExecutionContextScope *exe_scope, const Address &address, Stream *strm) 174 { 175 if (exe_scope == NULL) 176 return 0; 177 const size_t k_buf_len = 256; 178 char buf[k_buf_len+1]; 179 buf[k_buf_len] = '\0'; // NULL terminate 180 181 // Byte order and address size don't matter for C string dumping.. 182 DataExtractor data (buf, sizeof(buf), lldb::endian::InlHostByteOrder(), 4); 183 size_t total_len = 0; 184 size_t bytes_read; 185 Address curr_address(address); 186 strm->PutChar ('"'); 187 while ((bytes_read = ReadBytes (exe_scope, curr_address, buf, k_buf_len)) > 0) 188 { 189 size_t len = strlen(buf); 190 if (len == 0) 191 break; 192 if (len > bytes_read) 193 len = bytes_read; 194 195 data.Dump (strm, 196 0, // Start offset in "data" 197 eFormatChar, // Print as characters 198 1, // Size of item (1 byte for a char!) 199 len, // How many bytes to print? 200 UINT32_MAX, // num per line 201 LLDB_INVALID_ADDRESS,// base address 202 0, // bitfield bit size 203 204 0); // bitfield bit offset 205 206 total_len += bytes_read; 207 208 if (len < k_buf_len) 209 break; 210 curr_address.SetOffset (curr_address.GetOffset() + bytes_read); 211 } 212 strm->PutChar ('"'); 213 return total_len; 214 } 215 216 Address::Address (lldb::addr_t abs_addr) : 217 m_section_wp (), 218 m_offset (abs_addr) 219 { 220 } 221 222 Address::Address (addr_t address, const SectionList *section_list) : 223 m_section_wp (), 224 m_offset (LLDB_INVALID_ADDRESS) 225 { 226 ResolveAddressUsingFileSections(address, section_list); 227 } 228 229 const Address& 230 Address::operator= (const Address& rhs) 231 { 232 if (this != &rhs) 233 { 234 m_section_wp = rhs.m_section_wp; 235 m_offset = rhs.m_offset.load(); 236 } 237 return *this; 238 } 239 240 bool 241 Address::ResolveAddressUsingFileSections (addr_t file_addr, const SectionList *section_list) 242 { 243 if (section_list) 244 { 245 SectionSP section_sp (section_list->FindSectionContainingFileAddress(file_addr)); 246 m_section_wp = section_sp; 247 if (section_sp) 248 { 249 assert( section_sp->ContainsFileAddress(file_addr) ); 250 m_offset = file_addr - section_sp->GetFileAddress(); 251 return true; // Successfully transformed addr into a section offset address 252 } 253 } 254 m_offset = file_addr; 255 return false; // Failed to resolve this address to a section offset value 256 } 257 258 ModuleSP 259 Address::GetModule () const 260 { 261 lldb::ModuleSP module_sp; 262 SectionSP section_sp (GetSection()); 263 if (section_sp) 264 module_sp = section_sp->GetModule(); 265 return module_sp; 266 } 267 268 addr_t 269 Address::GetFileAddress () const 270 { 271 SectionSP section_sp (GetSection()); 272 if (section_sp) 273 { 274 addr_t sect_file_addr = section_sp->GetFileAddress(); 275 if (sect_file_addr == LLDB_INVALID_ADDRESS) 276 { 277 // Section isn't resolved, we can't return a valid file address 278 return LLDB_INVALID_ADDRESS; 279 } 280 // We have a valid file range, so we can return the file based 281 // address by adding the file base address to our offset 282 return sect_file_addr + m_offset; 283 } 284 else if (SectionWasDeletedPrivate()) 285 { 286 // Used to have a valid section but it got deleted so the 287 // offset doesn't mean anything without the section 288 return LLDB_INVALID_ADDRESS; 289 } 290 // No section, we just return the offset since it is the value in this case 291 return m_offset; 292 } 293 294 addr_t 295 Address::GetLoadAddress (Target *target) const 296 { 297 SectionSP section_sp (GetSection()); 298 if (section_sp) 299 { 300 if (target) 301 { 302 addr_t sect_load_addr = section_sp->GetLoadBaseAddress (target); 303 304 if (sect_load_addr != LLDB_INVALID_ADDRESS) 305 { 306 // We have a valid file range, so we can return the file based 307 // address by adding the file base address to our offset 308 return sect_load_addr + m_offset; 309 } 310 } 311 } 312 else if (SectionWasDeletedPrivate()) 313 { 314 // Used to have a valid section but it got deleted so the 315 // offset doesn't mean anything without the section 316 return LLDB_INVALID_ADDRESS; 317 } 318 else 319 { 320 // We don't have a section so the offset is the load address 321 return m_offset; 322 } 323 // The section isn't resolved or an invalid target was passed in 324 // so we can't return a valid load address. 325 return LLDB_INVALID_ADDRESS; 326 } 327 328 addr_t 329 Address::GetCallableLoadAddress (Target *target, bool is_indirect) const 330 { 331 if (is_indirect && target) { 332 ProcessSP processSP = target->GetProcessSP(); 333 Error error; 334 if (processSP.get()) 335 return processSP->ResolveIndirectFunction(this, error); 336 } 337 338 addr_t code_addr = GetLoadAddress (target); 339 340 if (target) 341 return target->GetCallableLoadAddress (code_addr, GetAddressClass()); 342 return code_addr; 343 } 344 345 bool 346 Address::SetCallableLoadAddress (lldb::addr_t load_addr, Target *target) 347 { 348 if (SetLoadAddress (load_addr, target)) 349 { 350 if (target) 351 m_offset = target->GetCallableLoadAddress(m_offset, GetAddressClass()); 352 return true; 353 } 354 return false; 355 } 356 357 addr_t 358 Address::GetOpcodeLoadAddress (Target *target) const 359 { 360 addr_t code_addr = GetLoadAddress (target); 361 if (code_addr != LLDB_INVALID_ADDRESS) 362 code_addr = target->GetOpcodeLoadAddress (code_addr, GetAddressClass()); 363 return code_addr; 364 } 365 366 bool 367 Address::SetOpcodeLoadAddress (lldb::addr_t load_addr, Target *target) 368 { 369 if (SetLoadAddress (load_addr, target)) 370 { 371 if (target) 372 m_offset = target->GetOpcodeLoadAddress (m_offset, GetAddressClass()); 373 return true; 374 } 375 return false; 376 } 377 378 bool 379 Address::Dump (Stream *s, ExecutionContextScope *exe_scope, DumpStyle style, DumpStyle fallback_style, uint32_t addr_size) const 380 { 381 // If the section was NULL, only load address is going to work unless we are 382 // trying to deref a pointer 383 SectionSP section_sp (GetSection()); 384 if (!section_sp && style != DumpStyleResolvedPointerDescription) 385 style = DumpStyleLoadAddress; 386 387 ExecutionContext exe_ctx (exe_scope); 388 Target *target = exe_ctx.GetTargetPtr(); 389 // If addr_byte_size is UINT32_MAX, then determine the correct address 390 // byte size for the process or default to the size of addr_t 391 if (addr_size == UINT32_MAX) 392 { 393 if (target) 394 addr_size = target->GetArchitecture().GetAddressByteSize (); 395 else 396 addr_size = sizeof(addr_t); 397 } 398 399 Address so_addr; 400 switch (style) 401 { 402 case DumpStyleInvalid: 403 return false; 404 405 case DumpStyleSectionNameOffset: 406 if (section_sp) 407 { 408 section_sp->DumpName(s); 409 s->Printf (" + %" PRIu64, m_offset.load()); 410 } 411 else 412 { 413 s->Address(m_offset, addr_size); 414 } 415 break; 416 417 case DumpStyleSectionPointerOffset: 418 s->Printf("(Section *)%p + ", section_sp.get()); 419 s->Address(m_offset, addr_size); 420 break; 421 422 case DumpStyleModuleWithFileAddress: 423 if (section_sp) 424 s->Printf("%s[", section_sp->GetModule()->GetFileSpec().GetFilename().AsCString()); 425 // Fall through 426 case DumpStyleFileAddress: 427 { 428 addr_t file_addr = GetFileAddress(); 429 if (file_addr == LLDB_INVALID_ADDRESS) 430 { 431 if (fallback_style != DumpStyleInvalid) 432 return Dump (s, exe_scope, fallback_style, DumpStyleInvalid, addr_size); 433 return false; 434 } 435 s->Address (file_addr, addr_size); 436 if (style == DumpStyleModuleWithFileAddress && section_sp) 437 s->PutChar(']'); 438 } 439 break; 440 441 case DumpStyleLoadAddress: 442 { 443 addr_t load_addr = GetLoadAddress (target); 444 if (load_addr == LLDB_INVALID_ADDRESS) 445 { 446 if (fallback_style != DumpStyleInvalid) 447 return Dump (s, exe_scope, fallback_style, DumpStyleInvalid, addr_size); 448 return false; 449 } 450 s->Address (load_addr, addr_size); 451 } 452 break; 453 454 case DumpStyleResolvedDescription: 455 case DumpStyleResolvedDescriptionNoModule: 456 if (IsSectionOffset()) 457 { 458 uint32_t pointer_size = 4; 459 ModuleSP module_sp (GetModule()); 460 if (target) 461 pointer_size = target->GetArchitecture().GetAddressByteSize(); 462 else if (module_sp) 463 pointer_size = module_sp->GetArchitecture().GetAddressByteSize(); 464 465 bool showed_info = false; 466 if (section_sp) 467 { 468 SectionType sect_type = section_sp->GetType(); 469 switch (sect_type) 470 { 471 case eSectionTypeData: 472 if (module_sp) 473 { 474 SymbolVendor *sym_vendor = module_sp->GetSymbolVendor(); 475 if (sym_vendor) 476 { 477 Symtab *symtab = sym_vendor->GetSymtab(); 478 if (symtab) 479 { 480 const addr_t file_Addr = GetFileAddress(); 481 Symbol *symbol = symtab->FindSymbolContainingFileAddress (file_Addr); 482 if (symbol) 483 { 484 const char *symbol_name = symbol->GetName().AsCString(); 485 if (symbol_name) 486 { 487 s->PutCString(symbol_name); 488 addr_t delta = file_Addr - symbol->GetAddress().GetFileAddress(); 489 if (delta) 490 s->Printf(" + %" PRIu64, delta); 491 showed_info = true; 492 } 493 } 494 } 495 } 496 } 497 break; 498 499 case eSectionTypeDataCString: 500 // Read the C string from memory and display it 501 showed_info = true; 502 ReadCStringFromMemory (exe_scope, *this, s); 503 break; 504 505 case eSectionTypeDataCStringPointers: 506 { 507 if (ReadAddress (exe_scope, *this, pointer_size, so_addr)) 508 { 509 #if VERBOSE_OUTPUT 510 s->PutCString("(char *)"); 511 so_addr.Dump(s, exe_scope, DumpStyleLoadAddress, DumpStyleFileAddress); 512 s->PutCString(": "); 513 #endif 514 showed_info = true; 515 ReadCStringFromMemory (exe_scope, so_addr, s); 516 } 517 } 518 break; 519 520 case eSectionTypeDataObjCMessageRefs: 521 { 522 if (ReadAddress (exe_scope, *this, pointer_size, so_addr)) 523 { 524 if (target && so_addr.IsSectionOffset()) 525 { 526 SymbolContext func_sc; 527 target->GetImages().ResolveSymbolContextForAddress (so_addr, 528 eSymbolContextEverything, 529 func_sc); 530 if (func_sc.function || func_sc.symbol) 531 { 532 showed_info = true; 533 #if VERBOSE_OUTPUT 534 s->PutCString ("(objc_msgref *) -> { (func*)"); 535 so_addr.Dump(s, exe_scope, DumpStyleLoadAddress, DumpStyleFileAddress); 536 #else 537 s->PutCString ("{ "); 538 #endif 539 Address cstr_addr(*this); 540 cstr_addr.SetOffset(cstr_addr.GetOffset() + pointer_size); 541 func_sc.DumpStopContext(s, exe_scope, so_addr, true, true, false); 542 if (ReadAddress (exe_scope, cstr_addr, pointer_size, so_addr)) 543 { 544 #if VERBOSE_OUTPUT 545 s->PutCString("), (char *)"); 546 so_addr.Dump(s, exe_scope, DumpStyleLoadAddress, DumpStyleFileAddress); 547 s->PutCString(" ("); 548 #else 549 s->PutCString(", "); 550 #endif 551 ReadCStringFromMemory (exe_scope, so_addr, s); 552 } 553 #if VERBOSE_OUTPUT 554 s->PutCString(") }"); 555 #else 556 s->PutCString(" }"); 557 #endif 558 } 559 } 560 } 561 } 562 break; 563 564 case eSectionTypeDataObjCCFStrings: 565 { 566 Address cfstring_data_addr(*this); 567 cfstring_data_addr.SetOffset(cfstring_data_addr.GetOffset() + (2 * pointer_size)); 568 if (ReadAddress (exe_scope, cfstring_data_addr, pointer_size, so_addr)) 569 { 570 #if VERBOSE_OUTPUT 571 s->PutCString("(CFString *) "); 572 cfstring_data_addr.Dump(s, exe_scope, DumpStyleLoadAddress, DumpStyleFileAddress); 573 s->PutCString(" -> @"); 574 #else 575 s->PutChar('@'); 576 #endif 577 if (so_addr.Dump(s, exe_scope, DumpStyleResolvedDescription)) 578 showed_info = true; 579 } 580 } 581 break; 582 583 case eSectionTypeData4: 584 // Read the 4 byte data and display it 585 showed_info = true; 586 s->PutCString("(uint32_t) "); 587 DumpUInt (exe_scope, *this, 4, s); 588 break; 589 590 case eSectionTypeData8: 591 // Read the 8 byte data and display it 592 showed_info = true; 593 s->PutCString("(uint64_t) "); 594 DumpUInt (exe_scope, *this, 8, s); 595 break; 596 597 case eSectionTypeData16: 598 // Read the 16 byte data and display it 599 showed_info = true; 600 s->PutCString("(uint128_t) "); 601 DumpUInt (exe_scope, *this, 16, s); 602 break; 603 604 case eSectionTypeDataPointers: 605 // Read the pointer data and display it 606 { 607 if (ReadAddress (exe_scope, *this, pointer_size, so_addr)) 608 { 609 s->PutCString ("(void *)"); 610 so_addr.Dump(s, exe_scope, DumpStyleLoadAddress, DumpStyleFileAddress); 611 612 showed_info = true; 613 if (so_addr.IsSectionOffset()) 614 { 615 SymbolContext pointer_sc; 616 if (target) 617 { 618 target->GetImages().ResolveSymbolContextForAddress (so_addr, 619 eSymbolContextEverything, 620 pointer_sc); 621 if (pointer_sc.function || pointer_sc.symbol) 622 { 623 s->PutCString(": "); 624 pointer_sc.DumpStopContext(s, exe_scope, so_addr, true, false, false); 625 } 626 } 627 } 628 } 629 } 630 break; 631 632 default: 633 break; 634 } 635 } 636 637 if (!showed_info) 638 { 639 if (module_sp) 640 { 641 SymbolContext sc; 642 module_sp->ResolveSymbolContextForAddress(*this, eSymbolContextEverything, sc); 643 if (sc.function || sc.symbol) 644 { 645 bool show_stop_context = true; 646 const bool show_module = (style == DumpStyleResolvedDescription); 647 const bool show_fullpaths = false; 648 const bool show_inlined_frames = true; 649 if (sc.function == NULL && sc.symbol != NULL) 650 { 651 // If we have just a symbol make sure it is in the right section 652 if (sc.symbol->ValueIsAddress()) 653 { 654 if (sc.symbol->GetAddress().GetSection() != GetSection()) 655 { 656 // don't show the module if the symbol is a trampoline symbol 657 show_stop_context = false; 658 } 659 } 660 } 661 if (show_stop_context) 662 { 663 // We have a function or a symbol from the same 664 // sections as this address. 665 sc.DumpStopContext (s, 666 exe_scope, 667 *this, 668 show_fullpaths, 669 show_module, 670 show_inlined_frames); 671 } 672 else 673 { 674 // We found a symbol but it was in a different 675 // section so it isn't the symbol we should be 676 // showing, just show the section name + offset 677 Dump (s, exe_scope, DumpStyleSectionNameOffset); 678 } 679 } 680 } 681 } 682 } 683 else 684 { 685 if (fallback_style != DumpStyleInvalid) 686 return Dump (s, exe_scope, fallback_style, DumpStyleInvalid, addr_size); 687 return false; 688 } 689 break; 690 691 case DumpStyleDetailedSymbolContext: 692 if (IsSectionOffset()) 693 { 694 ModuleSP module_sp (GetModule()); 695 if (module_sp) 696 { 697 SymbolContext sc; 698 module_sp->ResolveSymbolContextForAddress(*this, eSymbolContextEverything, sc); 699 if (sc.symbol) 700 { 701 // If we have just a symbol make sure it is in the same section 702 // as our address. If it isn't, then we might have just found 703 // the last symbol that came before the address that we are 704 // looking up that has nothing to do with our address lookup. 705 if (sc.symbol->ValueIsAddress() && sc.symbol->GetAddress().GetSection() != GetSection()) 706 sc.symbol = NULL; 707 } 708 sc.GetDescription(s, eDescriptionLevelBrief, target); 709 710 if (sc.block) 711 { 712 bool can_create = true; 713 bool get_parent_variables = true; 714 bool stop_if_block_is_inlined_function = false; 715 VariableList variable_list; 716 sc.block->AppendVariables (can_create, 717 get_parent_variables, 718 stop_if_block_is_inlined_function, 719 &variable_list); 720 721 const size_t num_variables = variable_list.GetSize(); 722 for (size_t var_idx = 0; var_idx < num_variables; ++var_idx) 723 { 724 Variable *var = variable_list.GetVariableAtIndex (var_idx).get(); 725 if (var && var->LocationIsValidForAddress (*this)) 726 { 727 s->Indent(); 728 s->Printf (" Variable: id = {0x%8.8" PRIx64 "}, name = \"%s\", type= \"%s\", location =", 729 var->GetID(), 730 var->GetName().GetCString(), 731 var->GetType()->GetName().GetCString()); 732 var->DumpLocationForAddress(s, *this); 733 s->PutCString(", decl = "); 734 var->GetDeclaration().DumpStopContext(s, false); 735 s->EOL(); 736 } 737 } 738 } 739 } 740 } 741 else 742 { 743 if (fallback_style != DumpStyleInvalid) 744 return Dump (s, exe_scope, fallback_style, DumpStyleInvalid, addr_size); 745 return false; 746 } 747 break; 748 case DumpStyleResolvedPointerDescription: 749 { 750 Process *process = exe_ctx.GetProcessPtr(); 751 if (process) 752 { 753 addr_t load_addr = GetLoadAddress (target); 754 if (load_addr != LLDB_INVALID_ADDRESS) 755 { 756 Error memory_error; 757 addr_t dereferenced_load_addr = process->ReadPointerFromMemory(load_addr, memory_error); 758 if (dereferenced_load_addr != LLDB_INVALID_ADDRESS) 759 { 760 Address dereferenced_addr; 761 if (dereferenced_addr.SetLoadAddress(dereferenced_load_addr, target)) 762 { 763 StreamString strm; 764 if (dereferenced_addr.Dump (&strm, exe_scope, DumpStyleResolvedDescription, DumpStyleInvalid, addr_size)) 765 { 766 s->Address (dereferenced_load_addr, addr_size, " -> ", " "); 767 s->Write(strm.GetData(), strm.GetSize()); 768 return true; 769 } 770 } 771 } 772 } 773 } 774 if (fallback_style != DumpStyleInvalid) 775 return Dump (s, exe_scope, fallback_style, DumpStyleInvalid, addr_size); 776 return false; 777 } 778 break; 779 } 780 781 return true; 782 } 783 784 bool 785 Address::SectionWasDeleted() const 786 { 787 if (GetSection()) 788 return false; 789 return SectionWasDeletedPrivate(); 790 } 791 792 bool 793 Address::SectionWasDeletedPrivate() const 794 { 795 lldb::SectionWP empty_section_wp; 796 797 // If either call to "std::weak_ptr::owner_before(...) value returns true, this 798 // indicates that m_section_wp once contained (possibly still does) a reference 799 // to a valid shared pointer. This helps us know if we had a valid reference to 800 // a section which is now invalid because the module it was in was unloaded/deleted, 801 // or if the address doesn't have a valid reference to a section. 802 return empty_section_wp.owner_before(m_section_wp) || m_section_wp.owner_before(empty_section_wp); 803 } 804 805 uint32_t 806 Address::CalculateSymbolContext (SymbolContext *sc, uint32_t resolve_scope) const 807 { 808 sc->Clear(false); 809 // Absolute addresses don't have enough information to reconstruct even their target. 810 811 SectionSP section_sp (GetSection()); 812 if (section_sp) 813 { 814 ModuleSP module_sp (section_sp->GetModule()); 815 if (module_sp) 816 { 817 sc->module_sp = module_sp; 818 if (sc->module_sp) 819 return sc->module_sp->ResolveSymbolContextForAddress (*this, resolve_scope, *sc); 820 } 821 } 822 return 0; 823 } 824 825 ModuleSP 826 Address::CalculateSymbolContextModule () const 827 { 828 SectionSP section_sp (GetSection()); 829 if (section_sp) 830 return section_sp->GetModule(); 831 return ModuleSP(); 832 } 833 834 CompileUnit * 835 Address::CalculateSymbolContextCompileUnit () const 836 { 837 SectionSP section_sp (GetSection()); 838 if (section_sp) 839 { 840 SymbolContext sc; 841 sc.module_sp = section_sp->GetModule(); 842 if (sc.module_sp) 843 { 844 sc.module_sp->ResolveSymbolContextForAddress (*this, eSymbolContextCompUnit, sc); 845 return sc.comp_unit; 846 } 847 } 848 return NULL; 849 } 850 851 Function * 852 Address::CalculateSymbolContextFunction () const 853 { 854 SectionSP section_sp (GetSection()); 855 if (section_sp) 856 { 857 SymbolContext sc; 858 sc.module_sp = section_sp->GetModule(); 859 if (sc.module_sp) 860 { 861 sc.module_sp->ResolveSymbolContextForAddress (*this, eSymbolContextFunction, sc); 862 return sc.function; 863 } 864 } 865 return NULL; 866 } 867 868 Block * 869 Address::CalculateSymbolContextBlock () const 870 { 871 SectionSP section_sp (GetSection()); 872 if (section_sp) 873 { 874 SymbolContext sc; 875 sc.module_sp = section_sp->GetModule(); 876 if (sc.module_sp) 877 { 878 sc.module_sp->ResolveSymbolContextForAddress (*this, eSymbolContextBlock, sc); 879 return sc.block; 880 } 881 } 882 return NULL; 883 } 884 885 Symbol * 886 Address::CalculateSymbolContextSymbol () const 887 { 888 SectionSP section_sp (GetSection()); 889 if (section_sp) 890 { 891 SymbolContext sc; 892 sc.module_sp = section_sp->GetModule(); 893 if (sc.module_sp) 894 { 895 sc.module_sp->ResolveSymbolContextForAddress (*this, eSymbolContextSymbol, sc); 896 return sc.symbol; 897 } 898 } 899 return NULL; 900 } 901 902 bool 903 Address::CalculateSymbolContextLineEntry (LineEntry &line_entry) const 904 { 905 SectionSP section_sp (GetSection()); 906 if (section_sp) 907 { 908 SymbolContext sc; 909 sc.module_sp = section_sp->GetModule(); 910 if (sc.module_sp) 911 { 912 sc.module_sp->ResolveSymbolContextForAddress (*this, eSymbolContextLineEntry, sc); 913 if (sc.line_entry.IsValid()) 914 { 915 line_entry = sc.line_entry; 916 return true; 917 } 918 } 919 } 920 line_entry.Clear(); 921 return false; 922 } 923 924 int 925 Address::CompareFileAddress (const Address& a, const Address& b) 926 { 927 addr_t a_file_addr = a.GetFileAddress(); 928 addr_t b_file_addr = b.GetFileAddress(); 929 if (a_file_addr < b_file_addr) 930 return -1; 931 if (a_file_addr > b_file_addr) 932 return +1; 933 return 0; 934 } 935 936 937 int 938 Address::CompareLoadAddress (const Address& a, const Address& b, Target *target) 939 { 940 assert (target != NULL); 941 addr_t a_load_addr = a.GetLoadAddress (target); 942 addr_t b_load_addr = b.GetLoadAddress (target); 943 if (a_load_addr < b_load_addr) 944 return -1; 945 if (a_load_addr > b_load_addr) 946 return +1; 947 return 0; 948 } 949 950 int 951 Address::CompareModulePointerAndOffset (const Address& a, const Address& b) 952 { 953 ModuleSP a_module_sp (a.GetModule()); 954 ModuleSP b_module_sp (b.GetModule()); 955 Module *a_module = a_module_sp.get(); 956 Module *b_module = b_module_sp.get(); 957 if (a_module < b_module) 958 return -1; 959 if (a_module > b_module) 960 return +1; 961 // Modules are the same, just compare the file address since they should 962 // be unique 963 addr_t a_file_addr = a.GetFileAddress(); 964 addr_t b_file_addr = b.GetFileAddress(); 965 if (a_file_addr < b_file_addr) 966 return -1; 967 if (a_file_addr > b_file_addr) 968 return +1; 969 return 0; 970 } 971 972 973 size_t 974 Address::MemorySize () const 975 { 976 // Noting special for the memory size of a single Address object, 977 // it is just the size of itself. 978 return sizeof(Address); 979 } 980 981 982 //---------------------------------------------------------------------- 983 // NOTE: Be careful using this operator. It can correctly compare two 984 // addresses from the same Module correctly. It can't compare two 985 // addresses from different modules in any meaningful way, but it will 986 // compare the module pointers. 987 // 988 // To sum things up: 989 // - works great for addresses within the same module 990 // - it works for addresses across multiple modules, but don't expect the 991 // address results to make much sense 992 // 993 // This basically lets Address objects be used in ordered collection 994 // classes. 995 //---------------------------------------------------------------------- 996 997 bool 998 lldb_private::operator< (const Address& lhs, const Address& rhs) 999 { 1000 ModuleSP lhs_module_sp (lhs.GetModule()); 1001 ModuleSP rhs_module_sp (rhs.GetModule()); 1002 Module *lhs_module = lhs_module_sp.get(); 1003 Module *rhs_module = rhs_module_sp.get(); 1004 if (lhs_module == rhs_module) 1005 { 1006 // Addresses are in the same module, just compare the file addresses 1007 return lhs.GetFileAddress() < rhs.GetFileAddress(); 1008 } 1009 else 1010 { 1011 // The addresses are from different modules, just use the module 1012 // pointer value to get consistent ordering 1013 return lhs_module < rhs_module; 1014 } 1015 } 1016 1017 bool 1018 lldb_private::operator> (const Address& lhs, const Address& rhs) 1019 { 1020 ModuleSP lhs_module_sp (lhs.GetModule()); 1021 ModuleSP rhs_module_sp (rhs.GetModule()); 1022 Module *lhs_module = lhs_module_sp.get(); 1023 Module *rhs_module = rhs_module_sp.get(); 1024 if (lhs_module == rhs_module) 1025 { 1026 // Addresses are in the same module, just compare the file addresses 1027 return lhs.GetFileAddress() > rhs.GetFileAddress(); 1028 } 1029 else 1030 { 1031 // The addresses are from different modules, just use the module 1032 // pointer value to get consistent ordering 1033 return lhs_module > rhs_module; 1034 } 1035 } 1036 1037 1038 // The operator == checks for exact equality only (same section, same offset) 1039 bool 1040 lldb_private::operator== (const Address& a, const Address& rhs) 1041 { 1042 return a.GetOffset() == rhs.GetOffset() && 1043 a.GetSection() == rhs.GetSection(); 1044 } 1045 // The operator != checks for exact inequality only (differing section, or 1046 // different offset) 1047 bool 1048 lldb_private::operator!= (const Address& a, const Address& rhs) 1049 { 1050 return a.GetOffset() != rhs.GetOffset() || 1051 a.GetSection() != rhs.GetSection(); 1052 } 1053 1054 AddressClass 1055 Address::GetAddressClass () const 1056 { 1057 ModuleSP module_sp (GetModule()); 1058 if (module_sp) 1059 { 1060 ObjectFile *obj_file = module_sp->GetObjectFile(); 1061 if (obj_file) 1062 { 1063 // Give the symbol vendor a chance to add to the unified section list. 1064 module_sp->GetSymbolVendor(); 1065 return obj_file->GetAddressClass (GetFileAddress()); 1066 } 1067 } 1068 return eAddressClassUnknown; 1069 } 1070 1071 bool 1072 Address::SetLoadAddress (lldb::addr_t load_addr, Target *target) 1073 { 1074 if (target && target->GetSectionLoadList().ResolveLoadAddress(load_addr, *this)) 1075 return true; 1076 m_section_wp.reset(); 1077 m_offset = load_addr; 1078 return false; 1079 } 1080 1081