码迷,mamicode.com
首页 > 系统相关 > 详细

《coredump问题原理探究》Linux x86版6.6节单继承

时间:2015-02-04 20:27:13      阅读:246      评论:0      收藏:0      [点我收藏+]

标签:linux   程序崩溃   调试技术   c++   x86   

在C++里,类的多态是通过继承由虚函数来体现的。那么在单继承中,类的成员变量和虚函数的分布又是怎样的呢?

看一下例子:

  1	 #include <stdio.h>
  2	 class xuzhina_dump_c06_s4_base
  3	 {
  4	     private:
  5	         int m_a;
  6	     public:
  7	         xuzhina_dump_c06_s4_base() { m_a = 1; }
  8	         virtual void inc()
  9	         {
 10	             m_a++;
 11	         }
 12	         virtual void print()
 13	         {
 14	             printf( "m_a:%d\n", m_a );
 15	         }
 16	 };
 17 
 18	 class xuzhina_dump_c06_s4_derived: public xuzhina_dump_c06_s4_base
 19	 {
 20	     private:
 21	         int m_b;
 22	         int m_c;
 23	     public:
 24	         xuzhina_dump_c06_s4_derived()
 25	         {
 26	             m_b = 0;
 27	             m_c = 2*m_b;
 28	         }
 29	         virtual void mul()
 30	         {
 31	             m_c *= m_b;
 32	         }
 33	 
 34	         virtual void print()
 35	         {
 36	             printf( "m_b:%d, m_c:%d\n", m_b, m_c );
 37	         }
 38	         virtual void dec()
 39	         {
 40	             m_c -= m_b;
 41	         }
 42
43	         virtual void inc()
 44	         {
 45	             m_b++;
 46	             m_c += m_b;
 47	         }
 48	 };
 49 
 50	 int main()
 51	 {
 52	     xuzhina_dump_c06_s4_base* p = new xuzhina_dump_c06_s4_derived;
 53	     if ( p != NULL )
 54	     {
 55	         p->inc();
 56	         p->print();
 57	     }
 58 
 59	     return 0;
 60	 }


看一下汇编:

(gdb) disassemble main
Dump of assembler code for function main:
   0x080485b0 <+0>:     push   %ebp
   0x080485b1 <+1>:     mov    %esp,%ebp
   0x080485b3 <+3>:     push   %ebx
   0x080485b4 <+4>:     and    $0xfffffff0,%esp
   0x080485b7 <+7>:     sub    $0x20,%esp
   0x080485ba <+10>:    movl   $0x10,(%esp)
   0x080485c1 <+17>:    call   0x80484a0 <_Znwj@plt>
   0x080485c6 <+22>:    mov    %eax,%ebx
   0x080485c8 <+24>:    mov    %ebx,(%esp)
   0x080485cb <+27>:    call   0x8048654 <_ZN27xuzhina_dump_c06_s4_derivedC2Ev>
   0x080485d0 <+32>:    mov    %ebx,0x1c(%esp)
   0x080485d4 <+36>:    cmpl   $0x0,0x1c(%esp)
   0x080485d9 <+41>:    je     0x8048600 <main+80>
   0x080485db <+43>:    mov    0x1c(%esp),%eax
   0x080485df <+47>:    mov    (%eax),%eax
   0x080485e1 <+49>:    mov    (%eax),%eax
   0x080485e3 <+51>:    mov    0x1c(%esp),%edx
   0x080485e7 <+55>:    mov    %edx,(%esp)
   0x080485ea <+58>:    call   *%eax
   0x080485ec <+60>:    mov    0x1c(%esp),%eax
   0x080485f0 <+64>:    mov    (%eax),%eax
   0x080485f2 <+66>:    add    $0x4,%eax
   0x080485f5 <+69>:    mov    (%eax),%eax
   0x080485f7 <+71>:    mov    0x1c(%esp),%edx
   0x080485fb <+75>:    mov    %edx,(%esp)
   0x080485fe <+78>:    call   *%eax
   0x08048600 <+80>:    mov    $0x0,%eax
   0x08048605 <+85>:    mov    -0x4(%ebp),%ebx
   0x08048608 <+88>:    leave  
   0x08048609 <+89>:    ret    
End of assembler dump.


由上一节可知,要看虚函数表和成员变量的内存布局,直接看构造函数的汇编就行了。

(gdb) disassemble _ZN27xuzhina_dump_c06_s4_derivedC2Ev
Dump of assembler code for function _ZN27xuzhina_dump_c06_s4_derivedC2Ev:
   0x08048654 <+0>:     push   %ebp
   0x08048655 <+1>:     mov    %esp,%ebp
   0x08048657 <+3>:     sub    $0x18,%esp
   0x0804865a <+6>:     mov    0x8(%ebp),%eax
   0x0804865d <+9>:     mov    %eax,(%esp)
   0x08048660 <+12>:    call   0x804860a <_ZN24xuzhina_dump_c06_s4_baseC2Ev>
   0x08048665 <+17>:    mov    0x8(%ebp),%eax
   0x08048668 <+20>:    movl   $0x80487c8,(%eax)
   0x0804866e <+26>:    mov    0x8(%ebp),%eax
   0x08048671 <+29>:    movl   $0x0,0x8(%eax)
   0x08048678 <+36>:    mov    0x8(%ebp),%eax
   0x0804867b <+39>:    mov    0x8(%eax),%eax
   0x0804867e <+42>:    lea    (%eax,%eax,1),%edx
   0x08048681 <+45>:    mov    0x8(%ebp),%eax
   0x08048684 <+48>:    mov    %edx,0xc(%eax)
   0x08048687 <+51>:    leave  
   0x08048688 <+52>:    ret    
End of assembler dump.


可见,类xuzhina_dump_c06_s4_derived的构造函数,先调用基类xuzhina_dump_c06_s4_base构造函数(即_ZN24xuzhina_dump_c06_s4_baseC2Ev),再设置虚函数表,然后初始化自己变量。在这里,有两个疑问:

1.      类xuzhina_dump_c06_s4_derived的成员变量是从this+8的位置开始的,而不是从this+4的位置开始.那么this+4放着什么东西?

2.      虚函数表指针0x80487c8放着的是类xuzhina_dump_c06_s4_derived的虚函数表,还是基类xuzhina_dump_c06_s4_base的虚函数表?

 

 

在回答这两个问题之前,先看一下基类xuzhina_dump_c06_s4_base的构造函数:

(gdb) disassemble _ZN24xuzhina_dump_c06_s4_baseC2Ev
Dump of assembler code for function _ZN24xuzhina_dump_c06_s4_baseC2Ev:
   0x0804860a <+0>:     push   %ebp
   0x0804860b <+1>:     mov    %esp,%ebp
   0x0804860d <+3>:     mov    0x8(%ebp),%eax
   0x08048610 <+6>:     movl   $0x80487e0,(%eax)
   0x08048616 <+12>:    mov    0x8(%ebp),%eax
   0x08048619 <+15>:    movl   $0x1,0x4(%eax)
   0x08048620 <+22>:    pop    %ebp
   0x08048621 <+23>:    ret    
End of assembler dump.


从基类的构造函数可知,上面两个疑问的答案如下:

1.      this+4的地方是存放着m_a,初始化为1.

2.      地址0x80487e0放着的则是基类的虚函数表。而地址0x80487c8放着的是子类的虚函数表。

 

看一下这两个虚函数表指针的内容。

基类虚函数表指针:

(gdb)  x /4wx 0x80487e0
0x80487e0 <_ZTV24xuzhina_dump_c06_s4_base+8>:   0x08048622      0x08048636      0x75783732      0x6e69687a
(gdb) info symbol 0x08048622
xuzhina_dump_c06_s4_base::inc() in section .text
(gdb) info symbol 0x08048636
xuzhina_dump_c06_s4_base::print() in section .text


子类虚函数表指针:

(gdb) x /8wx 0x80487c8
0x80487c8 <_ZTV27xuzhina_dump_c06_s4_derived+8>:        0x080486e6      0x080486a4      0x0804868a      0x080486cc
0x80487d8 <_ZTV24xuzhina_dump_c06_s4_base>:     0x00000000      0x08048830      0x08048622      0x08048636
(gdb) info symbol 0x080486e6
xuzhina_dump_c06_s4_derived::inc() in section .text
(gdb) info symbol 0x080486a4
xuzhina_dump_c06_s4_derived::print() in section .text
(gdb) info symbol 0x0804868a
xuzhina_dump_c06_s4_derived::mul() in section .text
(gdb) info symbol 0x080486cc
xuzhina_dump_c06_s4_derived::dec() in section .text

也就是说子类xuzhina_dump_c06_s4_derived的对象构造经历了下面的步骤

技术分享

由上面可以看到子类虚函数表的分布规律:

1.重载基类的虚函数,按照基类虚函数的声明顺序排列,和子类声明顺序无关。

2.子类独有的虚函数,按照虚函数的声明顺序排列,追加在重载虚函数后面。


《coredump问题原理探究》Linux x86版6.6节单继承

标签:linux   程序崩溃   调试技术   c++   x86   

原文地址:http://blog.csdn.net/xuzhina/article/details/43491851

(0)
(0)
   
举报
评论 一句话评论(0
登录后才能评论!
© 2014 mamicode.com 版权所有  联系我们:gaon5@hotmail.com
迷上了代码!