xref: /freebsd/contrib/llvm-project/lldb/source/Core/Address.cpp (revision 0fca6ea1d4eea4c934cfff25ac9ee8ad6fe95583)
1 //===-- Address.cpp -------------------------------------------------------===//
2 //
3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4 // See https://llvm.org/LICENSE.txt for license information.
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6 //
7 //===----------------------------------------------------------------------===//
8 
9 #include "lldb/Core/Address.h"
10 #include "lldb/Core/Debugger.h"
11 #include "lldb/Core/Declaration.h"
12 #include "lldb/Core/DumpDataExtractor.h"
13 #include "lldb/Core/Module.h"
14 #include "lldb/Core/ModuleList.h"
15 #include "lldb/Core/Section.h"
16 #include "lldb/Symbol/Block.h"
17 #include "lldb/Symbol/LineEntry.h"
18 #include "lldb/Symbol/ObjectFile.h"
19 #include "lldb/Symbol/Symbol.h"
20 #include "lldb/Symbol/SymbolContext.h"
21 #include "lldb/Symbol/SymbolVendor.h"
22 #include "lldb/Symbol/Symtab.h"
23 #include "lldb/Symbol/Type.h"
24 #include "lldb/Symbol/Variable.h"
25 #include "lldb/Symbol/VariableList.h"
26 #include "lldb/Target/ABI.h"
27 #include "lldb/Target/ExecutionContext.h"
28 #include "lldb/Target/ExecutionContextScope.h"
29 #include "lldb/Target/Process.h"
30 #include "lldb/Target/SectionLoadList.h"
31 #include "lldb/Target/Target.h"
32 #include "lldb/Utility/AnsiTerminal.h"
33 #include "lldb/Utility/ConstString.h"
34 #include "lldb/Utility/DataExtractor.h"
35 #include "lldb/Utility/Endian.h"
36 #include "lldb/Utility/FileSpec.h"
37 #include "lldb/Utility/Status.h"
38 #include "lldb/Utility/Stream.h"
39 #include "lldb/Utility/StreamString.h"
40 
41 #include "llvm/ADT/StringRef.h"
42 #include "llvm/Support/Compiler.h"
43 #include "llvm/TargetParser/Triple.h"
44 
45 #include <cstdint>
46 #include <memory>
47 #include <vector>
48 
49 #include <cassert>
50 #include <cinttypes>
51 #include <cstring>
52 
53 namespace lldb_private {
54 class CompileUnit;
55 }
56 namespace lldb_private {
57 class Function;
58 }
59 
60 using namespace lldb;
61 using namespace lldb_private;
62 
ReadBytes(ExecutionContextScope * exe_scope,const Address & address,void * dst,size_t dst_len)63 static size_t ReadBytes(ExecutionContextScope *exe_scope,
64                         const Address &address, void *dst, size_t dst_len) {
65   if (exe_scope == nullptr)
66     return 0;
67 
68   TargetSP target_sp(exe_scope->CalculateTarget());
69   if (target_sp) {
70     Status error;
71     bool force_live_memory = true;
72     return target_sp->ReadMemory(address, dst, dst_len, error,
73                                  force_live_memory);
74   }
75   return 0;
76 }
77 
GetByteOrderAndAddressSize(ExecutionContextScope * exe_scope,const Address & address,ByteOrder & byte_order,uint32_t & addr_size)78 static bool GetByteOrderAndAddressSize(ExecutionContextScope *exe_scope,
79                                        const Address &address,
80                                        ByteOrder &byte_order,
81                                        uint32_t &addr_size) {
82   byte_order = eByteOrderInvalid;
83   addr_size = 0;
84   if (exe_scope == nullptr)
85     return false;
86 
87   TargetSP target_sp(exe_scope->CalculateTarget());
88   if (target_sp) {
89     byte_order = target_sp->GetArchitecture().GetByteOrder();
90     addr_size = target_sp->GetArchitecture().GetAddressByteSize();
91   }
92 
93   if (byte_order == eByteOrderInvalid || addr_size == 0) {
94     ModuleSP module_sp(address.GetModule());
95     if (module_sp) {
96       byte_order = module_sp->GetArchitecture().GetByteOrder();
97       addr_size = module_sp->GetArchitecture().GetAddressByteSize();
98     }
99   }
100   return byte_order != eByteOrderInvalid && addr_size != 0;
101 }
102 
ReadUIntMax64(ExecutionContextScope * exe_scope,const Address & address,uint32_t byte_size,bool & success)103 static uint64_t ReadUIntMax64(ExecutionContextScope *exe_scope,
104                               const Address &address, uint32_t byte_size,
105                               bool &success) {
106   uint64_t uval64 = 0;
107   if (exe_scope == nullptr || byte_size > sizeof(uint64_t)) {
108     success = false;
109     return 0;
110   }
111   uint64_t buf = 0;
112 
113   success = ReadBytes(exe_scope, address, &buf, byte_size) == byte_size;
114   if (success) {
115     ByteOrder byte_order = eByteOrderInvalid;
116     uint32_t addr_size = 0;
117     if (GetByteOrderAndAddressSize(exe_scope, address, byte_order, addr_size)) {
118       DataExtractor data(&buf, sizeof(buf), byte_order, addr_size);
119       lldb::offset_t offset = 0;
120       uval64 = data.GetU64(&offset);
121     } else
122       success = false;
123   }
124   return uval64;
125 }
126 
ReadAddress(ExecutionContextScope * exe_scope,const Address & address,uint32_t pointer_size,Address & deref_so_addr)127 static bool ReadAddress(ExecutionContextScope *exe_scope,
128                         const Address &address, uint32_t pointer_size,
129                         Address &deref_so_addr) {
130   if (exe_scope == nullptr)
131     return false;
132 
133   bool success = false;
134   addr_t deref_addr = ReadUIntMax64(exe_scope, address, pointer_size, success);
135   if (success) {
136     ExecutionContext exe_ctx;
137     exe_scope->CalculateExecutionContext(exe_ctx);
138     // If we have any sections that are loaded, try and resolve using the
139     // section load list
140     Target *target = exe_ctx.GetTargetPtr();
141     if (target && !target->GetSectionLoadList().IsEmpty()) {
142       if (target->GetSectionLoadList().ResolveLoadAddress(deref_addr,
143                                                           deref_so_addr))
144         return true;
145     } else {
146       // If we were not running, yet able to read an integer, we must have a
147       // module
148       ModuleSP module_sp(address.GetModule());
149 
150       assert(module_sp);
151       if (module_sp->ResolveFileAddress(deref_addr, deref_so_addr))
152         return true;
153     }
154 
155     // We couldn't make "deref_addr" into a section offset value, but we were
156     // able to read the address, so we return a section offset address with no
157     // section and "deref_addr" as the offset (address).
158     deref_so_addr.SetRawAddress(deref_addr);
159     return true;
160   }
161   return false;
162 }
163 
DumpUInt(ExecutionContextScope * exe_scope,const Address & address,uint32_t byte_size,Stream * strm)164 static bool DumpUInt(ExecutionContextScope *exe_scope, const Address &address,
165                      uint32_t byte_size, Stream *strm) {
166   if (exe_scope == nullptr || byte_size == 0)
167     return false;
168   std::vector<uint8_t> buf(byte_size, 0);
169 
170   if (ReadBytes(exe_scope, address, &buf[0], buf.size()) == buf.size()) {
171     ByteOrder byte_order = eByteOrderInvalid;
172     uint32_t addr_size = 0;
173     if (GetByteOrderAndAddressSize(exe_scope, address, byte_order, addr_size)) {
174       DataExtractor data(&buf.front(), buf.size(), byte_order, addr_size);
175 
176       DumpDataExtractor(data, strm,
177                         0,                    // Start offset in "data"
178                         eFormatHex,           // Print as characters
179                         buf.size(),           // Size of item
180                         1,                    // Items count
181                         UINT32_MAX,           // num per line
182                         LLDB_INVALID_ADDRESS, // base address
183                         0,                    // bitfield bit size
184                         0);                   // bitfield bit offset
185 
186       return true;
187     }
188   }
189   return false;
190 }
191 
ReadCStringFromMemory(ExecutionContextScope * exe_scope,const Address & address,Stream * strm)192 static size_t ReadCStringFromMemory(ExecutionContextScope *exe_scope,
193                                     const Address &address, Stream *strm) {
194   if (exe_scope == nullptr)
195     return 0;
196   const size_t k_buf_len = 256;
197   char buf[k_buf_len + 1];
198   buf[k_buf_len] = '\0'; // NULL terminate
199 
200   // Byte order and address size don't matter for C string dumping..
201   DataExtractor data(buf, sizeof(buf), endian::InlHostByteOrder(), 4);
202   size_t total_len = 0;
203   size_t bytes_read;
204   Address curr_address(address);
205   strm->PutChar('"');
206   while ((bytes_read = ReadBytes(exe_scope, curr_address, buf, k_buf_len)) >
207          0) {
208     size_t len = strlen(buf);
209     if (len == 0)
210       break;
211     if (len > bytes_read)
212       len = bytes_read;
213 
214     DumpDataExtractor(data, strm,
215                       0,                    // Start offset in "data"
216                       eFormatChar,          // Print as characters
217                       1,                    // Size of item (1 byte for a char!)
218                       len,                  // How many bytes to print?
219                       UINT32_MAX,           // num per line
220                       LLDB_INVALID_ADDRESS, // base address
221                       0,                    // bitfield bit size
222 
223                       0); // bitfield bit offset
224 
225     total_len += bytes_read;
226 
227     if (len < k_buf_len)
228       break;
229     curr_address.SetOffset(curr_address.GetOffset() + bytes_read);
230   }
231   strm->PutChar('"');
232   return total_len;
233 }
234 
Address(lldb::addr_t abs_addr)235 Address::Address(lldb::addr_t abs_addr) : m_section_wp(), m_offset(abs_addr) {}
236 
Address(addr_t address,const SectionList * section_list)237 Address::Address(addr_t address, const SectionList *section_list)
238     : m_section_wp() {
239   ResolveAddressUsingFileSections(address, section_list);
240 }
241 
operator =(const Address & rhs)242 const Address &Address::operator=(const Address &rhs) {
243   if (this != &rhs) {
244     m_section_wp = rhs.m_section_wp;
245     m_offset = rhs.m_offset;
246   }
247   return *this;
248 }
249 
ResolveAddressUsingFileSections(addr_t file_addr,const SectionList * section_list)250 bool Address::ResolveAddressUsingFileSections(addr_t file_addr,
251                                               const SectionList *section_list) {
252   if (section_list) {
253     SectionSP section_sp(
254         section_list->FindSectionContainingFileAddress(file_addr));
255     m_section_wp = section_sp;
256     if (section_sp) {
257       assert(section_sp->ContainsFileAddress(file_addr));
258       m_offset = file_addr - section_sp->GetFileAddress();
259       return true; // Successfully transformed addr into a section offset
260                    // address
261     }
262   }
263   m_offset = file_addr;
264   return false; // Failed to resolve this address to a section offset value
265 }
266 
267 /// if "addr_range_ptr" is not NULL, then fill in with the address range of the function.
ResolveFunctionScope(SymbolContext & sym_ctx,AddressRange * addr_range_ptr)268 bool Address::ResolveFunctionScope(SymbolContext &sym_ctx,
269                                    AddressRange *addr_range_ptr) {
270   constexpr SymbolContextItem resolve_scope =
271     eSymbolContextFunction | eSymbolContextSymbol;
272 
273   if (!(CalculateSymbolContext(&sym_ctx, resolve_scope) & resolve_scope)) {
274     if (addr_range_ptr)
275       addr_range_ptr->Clear();
276    return false;
277   }
278 
279   if (!addr_range_ptr)
280     return true;
281 
282   return sym_ctx.GetAddressRange(resolve_scope, 0, false, *addr_range_ptr);
283 }
284 
GetModule() const285 ModuleSP Address::GetModule() const {
286   lldb::ModuleSP module_sp;
287   SectionSP section_sp(GetSection());
288   if (section_sp)
289     module_sp = section_sp->GetModule();
290   return module_sp;
291 }
292 
GetFileAddress() const293 addr_t Address::GetFileAddress() const {
294   SectionSP section_sp(GetSection());
295   if (section_sp) {
296     addr_t sect_file_addr = section_sp->GetFileAddress();
297     if (sect_file_addr == LLDB_INVALID_ADDRESS) {
298       // Section isn't resolved, we can't return a valid file address
299       return LLDB_INVALID_ADDRESS;
300     }
301     // We have a valid file range, so we can return the file based address by
302     // adding the file base address to our offset
303     return sect_file_addr + m_offset;
304   } else if (SectionWasDeletedPrivate()) {
305     // Used to have a valid section but it got deleted so the offset doesn't
306     // mean anything without the section
307     return LLDB_INVALID_ADDRESS;
308   }
309   // No section, we just return the offset since it is the value in this case
310   return m_offset;
311 }
312 
GetLoadAddress(Target * target) const313 addr_t Address::GetLoadAddress(Target *target) const {
314   SectionSP section_sp(GetSection());
315   if (section_sp) {
316     if (target) {
317       addr_t sect_load_addr = section_sp->GetLoadBaseAddress(target);
318 
319       if (sect_load_addr != LLDB_INVALID_ADDRESS) {
320         // We have a valid file range, so we can return the file based address
321         // by adding the file base address to our offset
322         return sect_load_addr + m_offset;
323       }
324     }
325   } else if (SectionWasDeletedPrivate()) {
326     // Used to have a valid section but it got deleted so the offset doesn't
327     // mean anything without the section
328     return LLDB_INVALID_ADDRESS;
329   } else {
330     // We don't have a section so the offset is the load address
331     return m_offset;
332   }
333   // The section isn't resolved or an invalid target was passed in so we can't
334   // return a valid load address.
335   return LLDB_INVALID_ADDRESS;
336 }
337 
GetCallableLoadAddress(Target * target,bool is_indirect) const338 addr_t Address::GetCallableLoadAddress(Target *target, bool is_indirect) const {
339   addr_t code_addr = LLDB_INVALID_ADDRESS;
340 
341   if (is_indirect && target) {
342     ProcessSP processSP = target->GetProcessSP();
343     Status error;
344     if (processSP) {
345       code_addr = processSP->ResolveIndirectFunction(this, error);
346       if (!error.Success())
347         code_addr = LLDB_INVALID_ADDRESS;
348     }
349   } else {
350     code_addr = GetLoadAddress(target);
351   }
352 
353   if (code_addr == LLDB_INVALID_ADDRESS)
354     return code_addr;
355 
356   if (target)
357     return target->GetCallableLoadAddress(code_addr, GetAddressClass());
358   return code_addr;
359 }
360 
SetCallableLoadAddress(lldb::addr_t load_addr,Target * target)361 bool Address::SetCallableLoadAddress(lldb::addr_t load_addr, Target *target) {
362   if (SetLoadAddress(load_addr, target)) {
363     if (target)
364       m_offset = target->GetCallableLoadAddress(m_offset, GetAddressClass());
365     return true;
366   }
367   return false;
368 }
369 
GetOpcodeLoadAddress(Target * target,AddressClass addr_class) const370 addr_t Address::GetOpcodeLoadAddress(Target *target,
371                                      AddressClass addr_class) const {
372   addr_t code_addr = GetLoadAddress(target);
373   if (code_addr != LLDB_INVALID_ADDRESS) {
374     if (addr_class == AddressClass::eInvalid)
375       addr_class = GetAddressClass();
376     code_addr = target->GetOpcodeLoadAddress(code_addr, addr_class);
377   }
378   return code_addr;
379 }
380 
SetOpcodeLoadAddress(lldb::addr_t load_addr,Target * target,AddressClass addr_class,bool allow_section_end)381 bool Address::SetOpcodeLoadAddress(lldb::addr_t load_addr, Target *target,
382                                    AddressClass addr_class,
383                                    bool allow_section_end) {
384   if (SetLoadAddress(load_addr, target, allow_section_end)) {
385     if (target) {
386       if (addr_class == AddressClass::eInvalid)
387         addr_class = GetAddressClass();
388       m_offset = target->GetOpcodeLoadAddress(m_offset, addr_class);
389     }
390     return true;
391   }
392   return false;
393 }
394 
GetDescription(Stream & s,Target & target,DescriptionLevel level) const395 bool Address::GetDescription(Stream &s, Target &target,
396                              DescriptionLevel level) const {
397   assert(level == eDescriptionLevelBrief &&
398          "Non-brief descriptions not implemented");
399   LineEntry line_entry;
400   if (CalculateSymbolContextLineEntry(line_entry)) {
401     s.Printf(" (%s:%u:%u)", line_entry.GetFile().GetFilename().GetCString(),
402              line_entry.line, line_entry.column);
403     return true;
404   }
405   return false;
406 }
407 
Dump(Stream * s,ExecutionContextScope * exe_scope,DumpStyle style,DumpStyle fallback_style,uint32_t addr_size,bool all_ranges,std::optional<Stream::HighlightSettings> settings) const408 bool Address::Dump(Stream *s, ExecutionContextScope *exe_scope, DumpStyle style,
409                    DumpStyle fallback_style, uint32_t addr_size,
410                    bool all_ranges,
411                    std::optional<Stream::HighlightSettings> settings) const {
412   // If the section was nullptr, only load address is going to work unless we
413   // are trying to deref a pointer
414   SectionSP section_sp(GetSection());
415   if (!section_sp && style != DumpStyleResolvedPointerDescription)
416     style = DumpStyleLoadAddress;
417 
418   ExecutionContext exe_ctx(exe_scope);
419   Target *target = exe_ctx.GetTargetPtr();
420   // If addr_byte_size is UINT32_MAX, then determine the correct address byte
421   // size for the process or default to the size of addr_t
422   if (addr_size == UINT32_MAX) {
423     if (target)
424       addr_size = target->GetArchitecture().GetAddressByteSize();
425     else
426       addr_size = sizeof(addr_t);
427   }
428 
429   Address so_addr;
430   switch (style) {
431   case DumpStyleInvalid:
432     return false;
433 
434   case DumpStyleSectionNameOffset:
435     if (section_sp) {
436       section_sp->DumpName(s->AsRawOstream());
437       s->Printf(" + %" PRIu64, m_offset);
438     } else {
439       DumpAddress(s->AsRawOstream(), m_offset, addr_size);
440     }
441     break;
442 
443   case DumpStyleSectionPointerOffset:
444     s->Printf("(Section *)%p + ", static_cast<void *>(section_sp.get()));
445     DumpAddress(s->AsRawOstream(), m_offset, addr_size);
446     break;
447 
448   case DumpStyleModuleWithFileAddress:
449     if (section_sp) {
450       ModuleSP module_sp = section_sp->GetModule();
451       if (module_sp)
452         s->Printf("%s[", module_sp->GetFileSpec().GetFilename().AsCString(
453                              "<Unknown>"));
454       else
455         s->Printf("%s[", "<Unknown>");
456     }
457     [[fallthrough]];
458   case DumpStyleFileAddress: {
459     addr_t file_addr = GetFileAddress();
460     if (file_addr == LLDB_INVALID_ADDRESS) {
461       if (fallback_style != DumpStyleInvalid)
462         return Dump(s, exe_scope, fallback_style, DumpStyleInvalid, addr_size);
463       return false;
464     }
465     DumpAddress(s->AsRawOstream(), file_addr, addr_size);
466     if (style == DumpStyleModuleWithFileAddress && section_sp)
467       s->PutChar(']');
468   } break;
469 
470   case DumpStyleLoadAddress: {
471     addr_t load_addr = GetLoadAddress(target);
472 
473     /*
474      * MIPS:
475      * Display address in compressed form for MIPS16 or microMIPS
476      * if the address belongs to AddressClass::eCodeAlternateISA.
477     */
478     if (target) {
479       const llvm::Triple::ArchType llvm_arch =
480           target->GetArchitecture().GetMachine();
481       if (llvm_arch == llvm::Triple::mips ||
482           llvm_arch == llvm::Triple::mipsel ||
483           llvm_arch == llvm::Triple::mips64 ||
484           llvm_arch == llvm::Triple::mips64el)
485         load_addr = GetCallableLoadAddress(target);
486     }
487 
488     if (load_addr == LLDB_INVALID_ADDRESS) {
489       if (fallback_style != DumpStyleInvalid)
490         return Dump(s, exe_scope, fallback_style, DumpStyleInvalid, addr_size);
491       return false;
492     }
493     DumpAddress(s->AsRawOstream(), load_addr, addr_size);
494   } break;
495 
496   case DumpStyleResolvedDescription:
497   case DumpStyleResolvedDescriptionNoModule:
498   case DumpStyleResolvedDescriptionNoFunctionArguments:
499   case DumpStyleNoFunctionName:
500     if (IsSectionOffset()) {
501       uint32_t pointer_size = 4;
502       ModuleSP module_sp(GetModule());
503       if (target)
504         pointer_size = target->GetArchitecture().GetAddressByteSize();
505       else if (module_sp)
506         pointer_size = module_sp->GetArchitecture().GetAddressByteSize();
507       bool showed_info = false;
508       if (section_sp) {
509         SectionType sect_type = section_sp->GetType();
510         switch (sect_type) {
511         case eSectionTypeData:
512           if (module_sp) {
513             if (Symtab *symtab = module_sp->GetSymtab()) {
514               const addr_t file_Addr = GetFileAddress();
515               Symbol *symbol =
516                   symtab->FindSymbolContainingFileAddress(file_Addr);
517               if (symbol) {
518                 const char *symbol_name = symbol->GetName().AsCString();
519                 if (symbol_name) {
520                   s->PutCStringColorHighlighted(symbol_name, settings);
521                   addr_t delta =
522                       file_Addr - symbol->GetAddressRef().GetFileAddress();
523                   if (delta)
524                     s->Printf(" + %" PRIu64, delta);
525                   showed_info = true;
526                 }
527               }
528             }
529           }
530           break;
531 
532         case eSectionTypeDataCString:
533           // Read the C string from memory and display it
534           showed_info = true;
535           ReadCStringFromMemory(exe_scope, *this, s);
536           break;
537 
538         case eSectionTypeDataCStringPointers:
539           if (ReadAddress(exe_scope, *this, pointer_size, so_addr)) {
540 #if VERBOSE_OUTPUT
541             s->PutCString("(char *)");
542             so_addr.Dump(s, exe_scope, DumpStyleLoadAddress,
543                          DumpStyleFileAddress);
544             s->PutCString(": ");
545 #endif
546             showed_info = true;
547             ReadCStringFromMemory(exe_scope, so_addr, s);
548           }
549           break;
550 
551         case eSectionTypeDataObjCMessageRefs:
552           if (ReadAddress(exe_scope, *this, pointer_size, so_addr)) {
553             if (target && so_addr.IsSectionOffset()) {
554               SymbolContext func_sc;
555               target->GetImages().ResolveSymbolContextForAddress(
556                   so_addr, eSymbolContextEverything, func_sc);
557               if (func_sc.function != nullptr || func_sc.symbol != nullptr) {
558                 showed_info = true;
559 #if VERBOSE_OUTPUT
560                 s->PutCString("(objc_msgref *) -> { (func*)");
561                 so_addr.Dump(s, exe_scope, DumpStyleLoadAddress,
562                              DumpStyleFileAddress);
563 #else
564                 s->PutCString("{ ");
565 #endif
566                 Address cstr_addr(*this);
567                 cstr_addr.SetOffset(cstr_addr.GetOffset() + pointer_size);
568                 func_sc.DumpStopContext(s, exe_scope, so_addr, true, true,
569                                         false, true, true);
570                 if (ReadAddress(exe_scope, cstr_addr, pointer_size, so_addr)) {
571 #if VERBOSE_OUTPUT
572                   s->PutCString("), (char *)");
573                   so_addr.Dump(s, exe_scope, DumpStyleLoadAddress,
574                                DumpStyleFileAddress);
575                   s->PutCString(" (");
576 #else
577                   s->PutCString(", ");
578 #endif
579                   ReadCStringFromMemory(exe_scope, so_addr, s);
580                 }
581 #if VERBOSE_OUTPUT
582                 s->PutCString(") }");
583 #else
584                 s->PutCString(" }");
585 #endif
586               }
587             }
588           }
589           break;
590 
591         case eSectionTypeDataObjCCFStrings: {
592           Address cfstring_data_addr(*this);
593           cfstring_data_addr.SetOffset(cfstring_data_addr.GetOffset() +
594                                        (2 * pointer_size));
595           if (ReadAddress(exe_scope, cfstring_data_addr, pointer_size,
596                           so_addr)) {
597 #if VERBOSE_OUTPUT
598             s->PutCString("(CFString *) ");
599             cfstring_data_addr.Dump(s, exe_scope, DumpStyleLoadAddress,
600                                     DumpStyleFileAddress);
601             s->PutCString(" -> @");
602 #else
603             s->PutChar('@');
604 #endif
605             if (so_addr.Dump(s, exe_scope, DumpStyleResolvedDescription))
606               showed_info = true;
607           }
608         } break;
609 
610         case eSectionTypeData4:
611           // Read the 4 byte data and display it
612           showed_info = true;
613           s->PutCString("(uint32_t) ");
614           DumpUInt(exe_scope, *this, 4, s);
615           break;
616 
617         case eSectionTypeData8:
618           // Read the 8 byte data and display it
619           showed_info = true;
620           s->PutCString("(uint64_t) ");
621           DumpUInt(exe_scope, *this, 8, s);
622           break;
623 
624         case eSectionTypeData16:
625           // Read the 16 byte data and display it
626           showed_info = true;
627           s->PutCString("(uint128_t) ");
628           DumpUInt(exe_scope, *this, 16, s);
629           break;
630 
631         case eSectionTypeDataPointers:
632           // Read the pointer data and display it
633           if (ReadAddress(exe_scope, *this, pointer_size, so_addr)) {
634             s->PutCString("(void *)");
635             so_addr.Dump(s, exe_scope, DumpStyleLoadAddress,
636                          DumpStyleFileAddress);
637 
638             showed_info = true;
639             if (so_addr.IsSectionOffset()) {
640               SymbolContext pointer_sc;
641               if (target) {
642                 target->GetImages().ResolveSymbolContextForAddress(
643                     so_addr, eSymbolContextEverything, pointer_sc);
644                 if (pointer_sc.function != nullptr ||
645                     pointer_sc.symbol != nullptr) {
646                   s->PutCString(": ");
647                   pointer_sc.DumpStopContext(s, exe_scope, so_addr, true, false,
648                                              false, true, true, false,
649                                              settings);
650                 }
651               }
652             }
653           }
654           break;
655 
656         default:
657           break;
658         }
659       }
660 
661       if (!showed_info) {
662         if (module_sp) {
663           SymbolContext sc;
664           module_sp->ResolveSymbolContextForAddress(
665               *this, eSymbolContextEverything, sc);
666           if (sc.function || sc.symbol) {
667             bool show_stop_context = true;
668             const bool show_module = (style == DumpStyleResolvedDescription);
669             const bool show_fullpaths = false;
670             const bool show_inlined_frames = true;
671             const bool show_function_arguments =
672                 (style != DumpStyleResolvedDescriptionNoFunctionArguments);
673             const bool show_function_name = (style != DumpStyleNoFunctionName);
674             if (sc.function == nullptr && sc.symbol != nullptr) {
675               // If we have just a symbol make sure it is in the right section
676               if (sc.symbol->ValueIsAddress()) {
677                 if (sc.symbol->GetAddressRef().GetSection() != GetSection()) {
678                   // don't show the module if the symbol is a trampoline symbol
679                   show_stop_context = false;
680                 }
681               }
682             }
683             if (show_stop_context) {
684               // We have a function or a symbol from the same sections as this
685               // address.
686               sc.DumpStopContext(s, exe_scope, *this, show_fullpaths,
687                                  show_module, show_inlined_frames,
688                                  show_function_arguments, show_function_name,
689                                  false, settings);
690             } else {
691               // We found a symbol but it was in a different section so it
692               // isn't the symbol we should be showing, just show the section
693               // name + offset
694               Dump(s, exe_scope, DumpStyleSectionNameOffset, DumpStyleInvalid,
695                    UINT32_MAX, false, settings);
696             }
697           }
698         }
699       }
700     } else {
701       if (fallback_style != DumpStyleInvalid)
702         return Dump(s, exe_scope, fallback_style, DumpStyleInvalid, addr_size,
703                     false, settings);
704       return false;
705     }
706     break;
707 
708   case DumpStyleDetailedSymbolContext:
709     if (IsSectionOffset()) {
710       ModuleSP module_sp(GetModule());
711       if (module_sp) {
712         SymbolContext sc;
713         module_sp->ResolveSymbolContextForAddress(
714             *this, eSymbolContextEverything | eSymbolContextVariable, sc);
715         if (sc.symbol) {
716           // If we have just a symbol make sure it is in the same section as
717           // our address. If it isn't, then we might have just found the last
718           // symbol that came before the address that we are looking up that
719           // has nothing to do with our address lookup.
720           if (sc.symbol->ValueIsAddress() &&
721               sc.symbol->GetAddressRef().GetSection() != GetSection())
722             sc.symbol = nullptr;
723         }
724         sc.GetDescription(s, eDescriptionLevelBrief, target, settings);
725 
726         if (sc.block) {
727           bool can_create = true;
728           bool get_parent_variables = true;
729           bool stop_if_block_is_inlined_function = false;
730           VariableList variable_list;
731           addr_t file_addr = GetFileAddress();
732           sc.block->AppendVariables(
733               can_create, get_parent_variables,
734               stop_if_block_is_inlined_function,
735               [&](Variable *var) {
736                 return var && var->LocationIsValidForAddress(*this);
737               },
738               &variable_list);
739           ABISP abi =
740               ABI::FindPlugin(ProcessSP(), module_sp->GetArchitecture());
741           for (const VariableSP &var_sp : variable_list) {
742             s->Indent();
743             s->Printf("   Variable: id = {0x%8.8" PRIx64 "}, name = \"%s\"",
744                       var_sp->GetID(), var_sp->GetName().GetCString());
745             Type *type = var_sp->GetType();
746             if (type)
747               s->Printf(", type = \"%s\"", type->GetName().GetCString());
748             else
749               s->PutCString(", type = <unknown>");
750             s->PutCString(", valid ranges = ");
751             if (var_sp->GetScopeRange().IsEmpty())
752               s->PutCString("<block>");
753             else if (all_ranges) {
754               for (auto range : var_sp->GetScopeRange())
755                 DumpAddressRange(s->AsRawOstream(), range.GetRangeBase(),
756                                  range.GetRangeEnd(), addr_size);
757             } else if (auto *range =
758                            var_sp->GetScopeRange().FindEntryThatContains(
759                                file_addr))
760               DumpAddressRange(s->AsRawOstream(), range->GetRangeBase(),
761                                range->GetRangeEnd(), addr_size);
762             s->PutCString(", location = ");
763             var_sp->DumpLocations(s, all_ranges ? LLDB_INVALID_ADDRESS : *this);
764             s->PutCString(", decl = ");
765             var_sp->GetDeclaration().DumpStopContext(s, false);
766             s->EOL();
767           }
768         }
769       }
770     } else {
771       if (fallback_style != DumpStyleInvalid)
772         return Dump(s, exe_scope, fallback_style, DumpStyleInvalid, addr_size,
773                     false, settings);
774       return false;
775     }
776     break;
777 
778   case DumpStyleResolvedPointerDescription: {
779     Process *process = exe_ctx.GetProcessPtr();
780     if (process) {
781       addr_t load_addr = GetLoadAddress(target);
782       if (load_addr != LLDB_INVALID_ADDRESS) {
783         Status memory_error;
784         addr_t dereferenced_load_addr =
785             process->ReadPointerFromMemory(load_addr, memory_error);
786         if (dereferenced_load_addr != LLDB_INVALID_ADDRESS) {
787           Address dereferenced_addr;
788           if (dereferenced_addr.SetLoadAddress(dereferenced_load_addr,
789                                                target)) {
790             StreamString strm;
791             if (dereferenced_addr.Dump(&strm, exe_scope,
792                                        DumpStyleResolvedDescription,
793                                        DumpStyleInvalid, addr_size)) {
794               DumpAddress(s->AsRawOstream(), dereferenced_load_addr, addr_size,
795                           " -> ", " ");
796               s->Write(strm.GetString().data(), strm.GetSize());
797               return true;
798             }
799           }
800         }
801       }
802     }
803     if (fallback_style != DumpStyleInvalid)
804       return Dump(s, exe_scope, fallback_style, DumpStyleInvalid, addr_size);
805     return false;
806   } break;
807   }
808 
809   return true;
810 }
811 
SectionWasDeleted() const812 bool Address::SectionWasDeleted() const {
813   if (GetSection())
814     return false;
815   return SectionWasDeletedPrivate();
816 }
817 
SectionWasDeletedPrivate() const818 bool Address::SectionWasDeletedPrivate() const {
819   lldb::SectionWP empty_section_wp;
820 
821   // If either call to "std::weak_ptr::owner_before(...) value returns true,
822   // this indicates that m_section_wp once contained (possibly still does) a
823   // reference to a valid shared pointer. This helps us know if we had a valid
824   // reference to a section which is now invalid because the module it was in
825   // was unloaded/deleted, or if the address doesn't have a valid reference to
826   // a section.
827   return empty_section_wp.owner_before(m_section_wp) ||
828          m_section_wp.owner_before(empty_section_wp);
829 }
830 
831 uint32_t
CalculateSymbolContext(SymbolContext * sc,SymbolContextItem resolve_scope) const832 Address::CalculateSymbolContext(SymbolContext *sc,
833                                 SymbolContextItem resolve_scope) const {
834   sc->Clear(false);
835   // Absolute addresses don't have enough information to reconstruct even their
836   // target.
837 
838   SectionSP section_sp(GetSection());
839   if (section_sp) {
840     ModuleSP module_sp(section_sp->GetModule());
841     if (module_sp) {
842       sc->module_sp = module_sp;
843       if (sc->module_sp)
844         return sc->module_sp->ResolveSymbolContextForAddress(
845             *this, resolve_scope, *sc);
846     }
847   }
848   return 0;
849 }
850 
CalculateSymbolContextModule() const851 ModuleSP Address::CalculateSymbolContextModule() const {
852   SectionSP section_sp(GetSection());
853   if (section_sp)
854     return section_sp->GetModule();
855   return ModuleSP();
856 }
857 
CalculateSymbolContextCompileUnit() const858 CompileUnit *Address::CalculateSymbolContextCompileUnit() const {
859   SectionSP section_sp(GetSection());
860   if (section_sp) {
861     SymbolContext sc;
862     sc.module_sp = section_sp->GetModule();
863     if (sc.module_sp) {
864       sc.module_sp->ResolveSymbolContextForAddress(*this,
865                                                    eSymbolContextCompUnit, sc);
866       return sc.comp_unit;
867     }
868   }
869   return nullptr;
870 }
871 
CalculateSymbolContextFunction() const872 Function *Address::CalculateSymbolContextFunction() const {
873   SectionSP section_sp(GetSection());
874   if (section_sp) {
875     SymbolContext sc;
876     sc.module_sp = section_sp->GetModule();
877     if (sc.module_sp) {
878       sc.module_sp->ResolveSymbolContextForAddress(*this,
879                                                    eSymbolContextFunction, sc);
880       return sc.function;
881     }
882   }
883   return nullptr;
884 }
885 
CalculateSymbolContextBlock() const886 Block *Address::CalculateSymbolContextBlock() const {
887   SectionSP section_sp(GetSection());
888   if (section_sp) {
889     SymbolContext sc;
890     sc.module_sp = section_sp->GetModule();
891     if (sc.module_sp) {
892       sc.module_sp->ResolveSymbolContextForAddress(*this, eSymbolContextBlock,
893                                                    sc);
894       return sc.block;
895     }
896   }
897   return nullptr;
898 }
899 
CalculateSymbolContextSymbol() const900 Symbol *Address::CalculateSymbolContextSymbol() const {
901   SectionSP section_sp(GetSection());
902   if (section_sp) {
903     SymbolContext sc;
904     sc.module_sp = section_sp->GetModule();
905     if (sc.module_sp) {
906       sc.module_sp->ResolveSymbolContextForAddress(*this, eSymbolContextSymbol,
907                                                    sc);
908       return sc.symbol;
909     }
910   }
911   return nullptr;
912 }
913 
CalculateSymbolContextLineEntry(LineEntry & line_entry) const914 bool Address::CalculateSymbolContextLineEntry(LineEntry &line_entry) const {
915   SectionSP section_sp(GetSection());
916   if (section_sp) {
917     SymbolContext sc;
918     sc.module_sp = section_sp->GetModule();
919     if (sc.module_sp) {
920       sc.module_sp->ResolveSymbolContextForAddress(*this,
921                                                    eSymbolContextLineEntry, sc);
922       if (sc.line_entry.IsValid()) {
923         line_entry = sc.line_entry;
924         return true;
925       }
926     }
927   }
928   line_entry.Clear();
929   return false;
930 }
931 
CompareFileAddress(const Address & a,const Address & b)932 int Address::CompareFileAddress(const Address &a, const Address &b) {
933   addr_t a_file_addr = a.GetFileAddress();
934   addr_t b_file_addr = b.GetFileAddress();
935   if (a_file_addr < b_file_addr)
936     return -1;
937   if (a_file_addr > b_file_addr)
938     return +1;
939   return 0;
940 }
941 
CompareLoadAddress(const Address & a,const Address & b,Target * target)942 int Address::CompareLoadAddress(const Address &a, const Address &b,
943                                 Target *target) {
944   assert(target != nullptr);
945   addr_t a_load_addr = a.GetLoadAddress(target);
946   addr_t b_load_addr = b.GetLoadAddress(target);
947   if (a_load_addr < b_load_addr)
948     return -1;
949   if (a_load_addr > b_load_addr)
950     return +1;
951   return 0;
952 }
953 
CompareModulePointerAndOffset(const Address & a,const Address & b)954 int Address::CompareModulePointerAndOffset(const Address &a, const Address &b) {
955   ModuleSP a_module_sp(a.GetModule());
956   ModuleSP b_module_sp(b.GetModule());
957   Module *a_module = a_module_sp.get();
958   Module *b_module = b_module_sp.get();
959   if (a_module < b_module)
960     return -1;
961   if (a_module > b_module)
962     return +1;
963   // Modules are the same, just compare the file address since they should be
964   // unique
965   addr_t a_file_addr = a.GetFileAddress();
966   addr_t b_file_addr = b.GetFileAddress();
967   if (a_file_addr < b_file_addr)
968     return -1;
969   if (a_file_addr > b_file_addr)
970     return +1;
971   return 0;
972 }
973 
MemorySize() const974 size_t Address::MemorySize() const {
975   // Noting special for the memory size of a single Address object, it is just
976   // the size of itself.
977   return sizeof(Address);
978 }
979 
980 // NOTE: Be careful using this operator. It can correctly compare two
981 // addresses from the same Module correctly. It can't compare two addresses
982 // from different modules in any meaningful way, but it will compare the module
983 // pointers.
984 //
985 // To sum things up:
986 // - works great for addresses within the same module - it works for addresses
987 // across multiple modules, but don't expect the
988 //   address results to make much sense
989 //
990 // This basically lets Address objects be used in ordered collection classes.
991 
operator <(const Address & lhs,const Address & rhs)992 bool lldb_private::operator<(const Address &lhs, const Address &rhs) {
993   ModuleSP lhs_module_sp(lhs.GetModule());
994   ModuleSP rhs_module_sp(rhs.GetModule());
995   Module *lhs_module = lhs_module_sp.get();
996   Module *rhs_module = rhs_module_sp.get();
997   if (lhs_module == rhs_module) {
998     // Addresses are in the same module, just compare the file addresses
999     return lhs.GetFileAddress() < rhs.GetFileAddress();
1000   } else {
1001     // The addresses are from different modules, just use the module pointer
1002     // value to get consistent ordering
1003     return lhs_module < rhs_module;
1004   }
1005 }
1006 
operator >(const Address & lhs,const Address & rhs)1007 bool lldb_private::operator>(const Address &lhs, const Address &rhs) {
1008   ModuleSP lhs_module_sp(lhs.GetModule());
1009   ModuleSP rhs_module_sp(rhs.GetModule());
1010   Module *lhs_module = lhs_module_sp.get();
1011   Module *rhs_module = rhs_module_sp.get();
1012   if (lhs_module == rhs_module) {
1013     // Addresses are in the same module, just compare the file addresses
1014     return lhs.GetFileAddress() > rhs.GetFileAddress();
1015   } else {
1016     // The addresses are from different modules, just use the module pointer
1017     // value to get consistent ordering
1018     return lhs_module > rhs_module;
1019   }
1020 }
1021 
1022 // The operator == checks for exact equality only (same section, same offset)
operator ==(const Address & a,const Address & rhs)1023 bool lldb_private::operator==(const Address &a, const Address &rhs) {
1024   return a.GetOffset() == rhs.GetOffset() && a.GetSection() == rhs.GetSection();
1025 }
1026 
1027 // The operator != checks for exact inequality only (differing section, or
1028 // different offset)
operator !=(const Address & a,const Address & rhs)1029 bool lldb_private::operator!=(const Address &a, const Address &rhs) {
1030   return a.GetOffset() != rhs.GetOffset() || a.GetSection() != rhs.GetSection();
1031 }
1032 
GetAddressClass() const1033 AddressClass Address::GetAddressClass() const {
1034   ModuleSP module_sp(GetModule());
1035   if (module_sp) {
1036     ObjectFile *obj_file = module_sp->GetObjectFile();
1037     if (obj_file) {
1038       // Give the symbol file a chance to add to the unified section list
1039       // and to the symtab.
1040       module_sp->GetSymtab();
1041       return obj_file->GetAddressClass(GetFileAddress());
1042     }
1043   }
1044   return AddressClass::eUnknown;
1045 }
1046 
SetLoadAddress(lldb::addr_t load_addr,Target * target,bool allow_section_end)1047 bool Address::SetLoadAddress(lldb::addr_t load_addr, Target *target,
1048                              bool allow_section_end) {
1049   if (target && target->GetSectionLoadList().ResolveLoadAddress(
1050                     load_addr, *this, allow_section_end))
1051     return true;
1052   m_section_wp.reset();
1053   m_offset = load_addr;
1054   return false;
1055 }
1056