1 /* Program and address space management, for GDB, the GNU debugger.
3 Copyright (C) 2009-2024 Free Software Foundation, Inc.
5 This file is part of GDB.
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
28 #include "gdbsupport/safe-iterator.h"
29 #include "gdbsupport/intrusive_list.h"
30 #include "gdbsupport/refcounted-object.h"
31 #include "gdbsupport/gdb_ref_ptr.h"
44 typedef std::list
<std::unique_ptr
<objfile
>> objfile_list
;
46 /* An address space. It is used for comparing if
47 pspaces/inferior/threads see the same address space and for
48 associating caches to each address space. */
49 struct address_space
: public refcounted_object
51 /* Create a new address space object, and add it to the list. */
53 DISABLE_COPY_AND_ASSIGN (address_space
);
55 /* Returns the integer address space id of this address space. */
61 /* Per aspace data-pointers required by other GDB modules. */
62 registry
<address_space
> registry_fields
;
68 using address_space_ref_ptr
69 = gdb::ref_ptr
<address_space
,
70 refcounted_object_delete_ref_policy
<address_space
>>;
72 /* Create a new address space. */
74 static inline address_space_ref_ptr
77 return address_space_ref_ptr::new_reference (new address_space
);
80 /* An iterator that wraps an iterator over std::unique_ptr<objfile>,
81 and dereferences the returned object. This is useful for iterating
82 over a list of shared pointers and returning raw pointers -- which
83 helped avoid touching a lot of code when changing how objfiles are
86 class unwrapping_objfile_iterator
90 typedef unwrapping_objfile_iterator self_type
;
91 typedef typename ::objfile
*value_type
;
92 typedef typename ::objfile
&reference
;
93 typedef typename ::objfile
**pointer
;
94 typedef typename
objfile_list::iterator::iterator_category iterator_category
;
95 typedef typename
objfile_list::iterator::difference_type difference_type
;
97 unwrapping_objfile_iterator (objfile_list::iterator iter
)
98 : m_iter (std::move (iter
))
102 objfile
*operator* () const
104 return m_iter
->get ();
107 unwrapping_objfile_iterator
operator++ ()
113 bool operator!= (const unwrapping_objfile_iterator
&other
) const
115 return m_iter
!= other
.m_iter
;
120 /* The underlying iterator. */
121 objfile_list::iterator m_iter
;
125 /* A range that returns unwrapping_objfile_iterators. */
127 using unwrapping_objfile_range
= iterator_range
<unwrapping_objfile_iterator
>;
129 /* A program space represents a symbolic view of an address space.
130 Roughly speaking, it holds all the data associated with a
131 non-running-yet program (main executable, main symbols), and when
132 an inferior is running and is bound to it, includes the list of its
133 mapped in shared libraries.
135 In the traditional debugging scenario, there's a 1-1 correspondence
136 among program spaces, inferiors and address spaces, like so:
138 pspace1 (prog1) <--> inf1(pid1) <--> aspace1
140 In the case of debugging more than one traditional unix process or
141 program, we still have:
143 |-----------------+------------+---------|
144 | pspace1 (prog1) | inf1(pid1) | aspace1 |
145 |----------------------------------------|
146 | pspace2 (prog1) | no inf yet | aspace2 |
147 |-----------------+------------+---------|
148 | pspace3 (prog2) | inf2(pid2) | aspace3 |
149 |-----------------+------------+---------|
151 In the former example, if inf1 forks (and GDB stays attached to
152 both processes), the new child will have its own program and
153 address spaces. Like so:
155 |-----------------+------------+---------|
156 | pspace1 (prog1) | inf1(pid1) | aspace1 |
157 |-----------------+------------+---------|
158 | pspace2 (prog1) | inf2(pid2) | aspace2 |
159 |-----------------+------------+---------|
161 However, had inf1 from the latter case vforked instead, it would
162 share the program and address spaces with its parent, until it
163 execs or exits, like so:
165 |-----------------+------------+---------|
166 | pspace1 (prog1) | inf1(pid1) | aspace1 |
168 |-----------------+------------+---------|
170 When the vfork child execs, it is finally given new program and
173 |-----------------+------------+---------|
174 | pspace1 (prog1) | inf1(pid1) | aspace1 |
175 |-----------------+------------+---------|
176 | pspace2 (prog1) | inf2(pid2) | aspace2 |
177 |-----------------+------------+---------|
179 There are targets where the OS (if any) doesn't provide memory
180 management or VM protection, where all inferiors share the same
181 address space --- e.g. uClinux. GDB models this by having all
182 inferiors share the same address space, but, giving each its own
183 program space, like so:
185 |-----------------+------------+---------|
186 | pspace1 (prog1) | inf1(pid1) | |
187 |-----------------+------------+ |
188 | pspace2 (prog1) | inf2(pid2) | aspace1 |
189 |-----------------+------------+ |
190 | pspace3 (prog2) | inf3(pid3) | |
191 |-----------------+------------+---------|
193 The address space sharing matters for run control and breakpoints
194 management. E.g., did we just hit a known breakpoint that we need
195 to step over? Is this breakpoint a duplicate of this other one, or
196 do I need to insert a trap?
198 Then, there are targets where all symbols look the same for all
199 inferiors, although each has its own address space, as e.g.,
200 Ericsson DICOS. In such case, the model is:
202 |---------+------------+---------|
203 | | inf1(pid1) | aspace1 |
204 | +------------+---------|
205 | pspace | inf2(pid2) | aspace2 |
206 | +------------+---------|
207 | | inf3(pid3) | aspace3 |
208 |---------+------------+---------|
210 Note however, that the DICOS debug API takes care of making GDB
211 believe that breakpoints are "global". That is, although each
212 process does have its own private copy of data symbols (just like a
213 bunch of forks), to the breakpoints module, all processes share a
214 single address space, so all breakpoints set at the same address
215 are duplicates of each other, even breakpoints set in the data
216 space (e.g., call dummy breakpoints placed on stack). This allows
217 a simplification in the spaces implementation: we avoid caring for
218 a many-many links between address and program spaces. Either
219 there's a single address space bound to the program space
220 (traditional unix/uClinux), or, in the DICOS case, the address
221 space bound to the program space is mostly ignored. */
223 /* The program space structure. */
227 /* Constructs a new empty program space, binds it to ASPACE, and
228 adds it to the program space list. */
229 explicit program_space (address_space_ref_ptr aspace
);
231 /* Releases a program space, and all its contents (shared libraries,
232 objfiles, and any other references to the program space in other
233 modules). It is an internal error to call this when the program
234 space is the current program space, since there should always be
238 using objfiles_range
= unwrapping_objfile_range
;
240 /* Return an iterable object that can be used to iterate over all
241 objfiles. The basic use is in a foreach, like:
243 for (objfile *objf : pspace->objfiles ()) { ... } */
244 objfiles_range
objfiles ()
246 return objfiles_range
247 (unwrapping_objfile_iterator (objfiles_list
.begin ()),
248 unwrapping_objfile_iterator (objfiles_list
.end ()));
251 using objfiles_safe_range
= basic_safe_range
<objfiles_range
>;
253 /* An iterable object that can be used to iterate over all objfiles.
254 The basic use is in a foreach, like:
256 for (objfile *objf : pspace->objfiles_safe ()) { ... }
258 This variant uses a basic_safe_iterator so that objfiles can be
259 deleted during iteration. */
260 objfiles_safe_range
objfiles_safe ()
262 return objfiles_safe_range
264 (unwrapping_objfile_iterator (objfiles_list
.begin ()),
265 unwrapping_objfile_iterator (objfiles_list
.end ())));
268 /* Add OBJFILE to the list of objfiles, putting it just before
269 BEFORE. If BEFORE is nullptr, it will go at the end of the
271 void add_objfile (std::unique_ptr
<objfile
> &&objfile
,
272 struct objfile
*before
);
274 /* Remove OBJFILE from the list of objfiles. */
275 void remove_objfile (struct objfile
*objfile
);
277 /* Return true if there is more than one object file loaded; false
279 bool multi_objfile_p () const
281 return objfiles_list
.size () > 1;
284 /* Free all the objfiles associated with this program space. */
285 void free_all_objfiles ();
287 /* Return the objfile containing ADDRESS, or nullptr if the address
288 is outside all objfiles in this progspace. */
289 struct objfile
*objfile_for_address (CORE_ADDR address
);
291 /* Return the list of all the solibs in this program space. */
292 owning_intrusive_list
<solib
> &solibs ()
295 /* Similar to `bfd_get_filename (exec_bfd ())` but in original form given
296 by user, without symbolic links and pathname resolved. It is not nullptr
297 iff `exec_bfd ()` is not nullptr. */
298 const char *exec_filename () const
299 { return m_exec_filename
.get (); }
301 void set_exec_filename (gdb::unique_xmalloc_ptr
<char> filename
)
302 { m_exec_filename
= std::move (filename
); }
304 /* Close and clear exec_bfd. If we end up with no target sections
305 to read memory from, this unpushes the exec_ops target. */
308 /* Return the exec BFD for this program space. */
309 bfd
*exec_bfd () const
310 { return ebfd
.get (); }
312 /* Set the exec BFD for this program space to ABFD. */
313 void set_exec_bfd (gdb_bfd_ref_ptr
&&abfd
)
315 ebfd
= std::move (abfd
);
318 bfd
*core_bfd () const
319 { return cbfd
.get (); }
321 /* Reset saved solib data at the start of an solib event. This lets
322 us properly collect the data when calling solib_add, so it can then
324 void clear_solib_cache ();
326 /* Returns true iff there's no inferior bound to this program
330 /* Remove all target sections owned by OWNER. */
331 void remove_target_sections (target_section_owner owner
);
333 /* Add the sections array defined by SECTIONS to the
334 current set of target sections. */
335 void add_target_sections (target_section_owner owner
,
336 const std::vector
<target_section
> §ions
);
338 /* Add the sections of OBJFILE to the current set of target
339 sections. They are given OBJFILE as the "owner". */
340 void add_target_sections (struct objfile
*objfile
);
342 /* Clear all target sections from M_TARGET_SECTIONS table. */
343 void clear_target_sections ()
345 m_target_sections
.clear ();
348 /* Return a reference to the M_TARGET_SECTIONS table. */
349 std::vector
<target_section
> &target_sections ()
351 return m_target_sections
;
354 /* Unique ID number. */
357 /* The main executable loaded into this program space. This is
358 managed by the exec target. */
360 /* The BFD handle for the main executable. */
361 gdb_bfd_ref_ptr ebfd
;
362 /* The last-modified time, from when the exec was brought in. */
365 /* Binary file diddling handle for the core file. */
366 gdb_bfd_ref_ptr cbfd
;
368 /* The address space attached to this program space. More than one
369 program space may be bound to the same address space. In the
370 traditional unix-like debugging scenario, this will usually
371 match the address space bound to the inferior, and is mostly
372 used by the breakpoints module for address matches. If the
373 target shares a program space for all inferiors and breakpoints
374 are global, then this field is ignored (we don't currently
375 support inferiors sharing a program space if the target doesn't
376 make breakpoints global). */
377 address_space_ref_ptr aspace
;
379 /* True if this program space's section offsets don't yet represent
380 the final offsets of the "live" address space (that is, the
381 section addresses still require the relocation offsets to be
382 applied, and hence we can't trust the section addresses for
383 anything that pokes at live memory). E.g., for qOffsets
384 targets, or for PIE executables, until we connect and ask the
385 target for the final relocation offsets, the symbols we've used
386 to set breakpoints point at the wrong addresses. */
387 int executing_startup
= 0;
389 /* True if no breakpoints should be inserted in this program
391 int breakpoints_not_allowed
= 0;
393 /* The object file that the main symbol table was loaded from
394 (e.g. the argument to the "symbol-file" or "file" command). */
395 struct objfile
*symfile_object_file
= NULL
;
397 /* All known objfiles are kept in a linked list. */
398 std::list
<std::unique_ptr
<objfile
>> objfiles_list
;
400 /* List of shared objects mapped into this space. Managed by
402 owning_intrusive_list
<solib
> so_list
;
404 /* Number of calls to solib_add. */
405 unsigned int solib_add_generation
= 0;
407 /* When an solib is added, it is also added to this vector. This
408 is so we can properly report solib changes to the user. */
409 std::vector
<solib
*> added_solibs
;
411 /* When an solib is removed, its name is added to this vector.
412 This is so we can properly report solib changes to the user. */
413 std::vector
<std::string
> deleted_solibs
;
415 /* Per pspace data-pointers required by other GDB modules. */
416 registry
<program_space
> registry_fields
;
419 /* The set of target sections matching the sections mapped into
420 this program space. Managed by both exec_ops and solib.c. */
421 std::vector
<target_section
> m_target_sections
;
423 /* See `exec_filename`. */
424 gdb::unique_xmalloc_ptr
<char> m_exec_filename
;
427 /* The list of all program spaces. There's always at least one. */
428 extern std::vector
<struct program_space
*>program_spaces
;
430 /* The current program space. This is always non-null. */
431 extern struct program_space
*current_program_space
;
433 /* Initialize progspace-related global state. */
434 extern void initialize_progspace ();
436 /* Copies program space SRC to DEST. Copies the main executable file,
437 and the main symbol file. Returns DEST. */
438 extern struct program_space
*clone_program_space (struct program_space
*dest
,
439 struct program_space
*src
);
441 /* Sets PSPACE as the current program space. This is usually used
442 instead of set_current_space_and_thread when the current
443 thread/inferior is not important for the operations that follow.
444 E.g., when accessing the raw symbol tables. If memory access is
445 required, then you should use switch_to_program_space_and_thread.
446 Otherwise, it is the caller's responsibility to make sure that the
447 currently selected inferior/thread matches the selected program
449 extern void set_current_program_space (struct program_space
*pspace
);
451 /* Save/restore the current program space. */
453 class scoped_restore_current_program_space
456 scoped_restore_current_program_space ()
457 : m_saved_pspace (current_program_space
)
460 ~scoped_restore_current_program_space ()
461 { set_current_program_space (m_saved_pspace
); }
463 DISABLE_COPY_AND_ASSIGN (scoped_restore_current_program_space
);
466 program_space
*m_saved_pspace
;
469 /* Maybe create a new address space object, and add it to the list, or
470 return a pointer to an existing address space, in case inferiors
471 share an address space. */
472 extern address_space_ref_ptr
maybe_new_address_space ();
474 /* Update all program spaces matching to address spaces. The user may
475 have created several program spaces, and loaded executables into
476 them before connecting to the target interface that will create the
477 inferiors. All that happens before GDB has a chance to know if the
478 inferiors will share an address space or not. Call this after
479 having connected to the target interface and having fetched the
480 target description, to fixup the program/address spaces
482 extern void update_address_spaces (void);