2011-01-07 Michael Snyder <msnyder@vmware.com>
[deliverable/binutils-gdb.git] / gdb / arm-linux-tdep.c
CommitLineData
faf5f7ad 1/* GNU/Linux on ARM target support.
0fd88904 2
0fb0cc75 3 Copyright (C) 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008,
7b6bb8da 4 2009, 2010, 2011 Free Software Foundation, Inc.
faf5f7ad
SB
5
6 This file is part of GDB.
7
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
a9762ec7 10 the Free Software Foundation; either version 3 of the License, or
faf5f7ad
SB
11 (at your option) any later version.
12
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
a9762ec7 19 along with this program. If not, see <http://www.gnu.org/licenses/>. */
faf5f7ad
SB
20
21#include "defs.h"
c20f6dea
SB
22#include "target.h"
23#include "value.h"
faf5f7ad 24#include "gdbtypes.h"
134e61c4 25#include "floatformat.h"
2a451106
KB
26#include "gdbcore.h"
27#include "frame.h"
4e052eda 28#include "regcache.h"
d16aafd8 29#include "doublest.h"
7aa1783e 30#include "solib-svr4.h"
4be87837 31#include "osabi.h"
cb587d83 32#include "regset.h"
8e9d1a24
DJ
33#include "trad-frame.h"
34#include "tramp-frame.h"
daddc3c1 35#include "breakpoint.h"
faf5f7ad 36
34e8f22d 37#include "arm-tdep.h"
cb587d83 38#include "arm-linux-tdep.h"
4aa995e1 39#include "linux-tdep.h"
0670c0aa 40#include "glibc-tdep.h"
cca44b1b
JB
41#include "arch-utils.h"
42#include "inferior.h"
43#include "gdbthread.h"
44#include "symfile.h"
a52e6aac 45
8e9d1a24
DJ
46#include "gdb_string.h"
47
cb587d83
DJ
48extern int arm_apcs_32;
49
fdf39c9a
RE
50/* Under ARM GNU/Linux the traditional way of performing a breakpoint
51 is to execute a particular software interrupt, rather than use a
52 particular undefined instruction to provoke a trap. Upon exection
53 of the software interrupt the kernel stops the inferior with a
498b1f87 54 SIGTRAP, and wakes the debugger. */
66e810cd 55
2ef47cd0
DJ
56static const char arm_linux_arm_le_breakpoint[] = { 0x01, 0x00, 0x9f, 0xef };
57
58static const char arm_linux_arm_be_breakpoint[] = { 0xef, 0x9f, 0x00, 0x01 };
66e810cd 59
c75a2cc8
DJ
60/* However, the EABI syscall interface (new in Nov. 2005) does not look at
61 the operand of the swi if old-ABI compatibility is disabled. Therefore,
62 use an undefined instruction instead. This is supported as of kernel
63 version 2.5.70 (May 2003), so should be a safe assumption for EABI
64 binaries. */
65
66static const char eabi_linux_arm_le_breakpoint[] = { 0xf0, 0x01, 0xf0, 0xe7 };
67
68static const char eabi_linux_arm_be_breakpoint[] = { 0xe7, 0xf0, 0x01, 0xf0 };
69
70/* All the kernels which support Thumb support using a specific undefined
71 instruction for the Thumb breakpoint. */
72
498b1f87
DJ
73static const char arm_linux_thumb_be_breakpoint[] = {0xde, 0x01};
74
75static const char arm_linux_thumb_le_breakpoint[] = {0x01, 0xde};
76
177321bd
DJ
77/* Because the 16-bit Thumb breakpoint is affected by Thumb-2 IT blocks,
78 we must use a length-appropriate breakpoint for 32-bit Thumb
79 instructions. See also thumb_get_next_pc. */
80
81static const char arm_linux_thumb2_be_breakpoint[] = { 0xf7, 0xf0, 0xa0, 0x00 };
82
83static const char arm_linux_thumb2_le_breakpoint[] = { 0xf0, 0xf7, 0x00, 0xa0 };
84
f8624c62
MGD
85/* Description of the longjmp buffer. The buffer is treated as an array of
86 elements of size ARM_LINUX_JB_ELEMENT_SIZE.
87
88 The location of saved registers in this buffer (in particular the PC
89 to use after longjmp is called) varies depending on the ABI (in
90 particular the FP model) and also (possibly) the C Library.
91
92 For glibc, eglibc, and uclibc the following holds: If the FP model is
93 SoftVFP or VFP (which implies EABI) then the PC is at offset 9 in the
94 buffer. This is also true for the SoftFPA model. However, for the FPA
95 model the PC is at offset 21 in the buffer. */
7a5ea0d4 96#define ARM_LINUX_JB_ELEMENT_SIZE INT_REGISTER_SIZE
f8624c62
MGD
97#define ARM_LINUX_JB_PC_FPA 21
98#define ARM_LINUX_JB_PC_EABI 9
faf5f7ad 99
f38e884d 100/*
fdf39c9a
RE
101 Dynamic Linking on ARM GNU/Linux
102 --------------------------------
f38e884d
SB
103
104 Note: PLT = procedure linkage table
105 GOT = global offset table
106
107 As much as possible, ELF dynamic linking defers the resolution of
0963b4bd 108 jump/call addresses until the last minute. The technique used is
f38e884d
SB
109 inspired by the i386 ELF design, and is based on the following
110 constraints.
111
112 1) The calling technique should not force a change in the assembly
113 code produced for apps; it MAY cause changes in the way assembly
114 code is produced for position independent code (i.e. shared
115 libraries).
116
117 2) The technique must be such that all executable areas must not be
118 modified; and any modified areas must not be executed.
119
120 To do this, there are three steps involved in a typical jump:
121
122 1) in the code
123 2) through the PLT
124 3) using a pointer from the GOT
125
126 When the executable or library is first loaded, each GOT entry is
127 initialized to point to the code which implements dynamic name
128 resolution and code finding. This is normally a function in the
fdf39c9a
RE
129 program interpreter (on ARM GNU/Linux this is usually
130 ld-linux.so.2, but it does not have to be). On the first
131 invocation, the function is located and the GOT entry is replaced
132 with the real function address. Subsequent calls go through steps
133 1, 2 and 3 and end up calling the real code.
f38e884d
SB
134
135 1) In the code:
136
137 b function_call
138 bl function_call
139
140 This is typical ARM code using the 26 bit relative branch or branch
141 and link instructions. The target of the instruction
142 (function_call is usually the address of the function to be called.
143 In position independent code, the target of the instruction is
144 actually an entry in the PLT when calling functions in a shared
145 library. Note that this call is identical to a normal function
146 call, only the target differs.
147
148 2) In the PLT:
149
0963b4bd
MS
150 The PLT is a synthetic area, created by the linker. It exists in
151 both executables and libraries. It is an array of stubs, one per
152 imported function call. It looks like this:
f38e884d
SB
153
154 PLT[0]:
155 str lr, [sp, #-4]! @push the return address (lr)
156 ldr lr, [pc, #16] @load from 6 words ahead
157 add lr, pc, lr @form an address for GOT[0]
158 ldr pc, [lr, #8]! @jump to the contents of that addr
159
160 The return address (lr) is pushed on the stack and used for
161 calculations. The load on the second line loads the lr with
162 &GOT[3] - . - 20. The addition on the third leaves:
163
164 lr = (&GOT[3] - . - 20) + (. + 8)
165 lr = (&GOT[3] - 12)
166 lr = &GOT[0]
167
168 On the fourth line, the pc and lr are both updated, so that:
169
170 pc = GOT[2]
171 lr = &GOT[0] + 8
172 = &GOT[2]
173
0963b4bd 174 NOTE: PLT[0] borrows an offset .word from PLT[1]. This is a little
f38e884d
SB
175 "tight", but allows us to keep all the PLT entries the same size.
176
177 PLT[n+1]:
178 ldr ip, [pc, #4] @load offset from gotoff
179 add ip, pc, ip @add the offset to the pc
180 ldr pc, [ip] @jump to that address
181 gotoff: .word GOT[n+3] - .
182
183 The load on the first line, gets an offset from the fourth word of
184 the PLT entry. The add on the second line makes ip = &GOT[n+3],
185 which contains either a pointer to PLT[0] (the fixup trampoline) or
186 a pointer to the actual code.
187
188 3) In the GOT:
189
190 The GOT contains helper pointers for both code (PLT) fixups and
0963b4bd 191 data fixups. The first 3 entries of the GOT are special. The next
f38e884d 192 M entries (where M is the number of entries in the PLT) belong to
0963b4bd
MS
193 the PLT fixups. The next D (all remaining) entries belong to
194 various data fixups. The actual size of the GOT is 3 + M + D.
f38e884d 195
0963b4bd 196 The GOT is also a synthetic area, created by the linker. It exists
f38e884d
SB
197 in both executables and libraries. When the GOT is first
198 initialized , all the GOT entries relating to PLT fixups are
199 pointing to code back at PLT[0].
200
201 The special entries in the GOT are:
202
203 GOT[0] = linked list pointer used by the dynamic loader
204 GOT[1] = pointer to the reloc table for this module
205 GOT[2] = pointer to the fixup/resolver code
206
207 The first invocation of function call comes through and uses the
208 fixup/resolver code. On the entry to the fixup/resolver code:
209
210 ip = &GOT[n+3]
211 lr = &GOT[2]
212 stack[0] = return address (lr) of the function call
213 [r0, r1, r2, r3] are still the arguments to the function call
214
215 This is enough information for the fixup/resolver code to work
216 with. Before the fixup/resolver code returns, it actually calls
217 the requested function and repairs &GOT[n+3]. */
218
2a451106
KB
219/* The constants below were determined by examining the following files
220 in the linux kernel sources:
221
222 arch/arm/kernel/signal.c
223 - see SWI_SYS_SIGRETURN and SWI_SYS_RT_SIGRETURN
224 include/asm-arm/unistd.h
225 - see __NR_sigreturn, __NR_rt_sigreturn, and __NR_SYSCALL_BASE */
226
227#define ARM_LINUX_SIGRETURN_INSTR 0xef900077
228#define ARM_LINUX_RT_SIGRETURN_INSTR 0xef9000ad
229
edfb1a26
DJ
230/* For ARM EABI, the syscall number is not in the SWI instruction
231 (instead it is loaded into r7). We recognize the pattern that
232 glibc uses... alternatively, we could arrange to do this by
233 function name, but they are not always exported. */
8e9d1a24
DJ
234#define ARM_SET_R7_SIGRETURN 0xe3a07077
235#define ARM_SET_R7_RT_SIGRETURN 0xe3a070ad
236#define ARM_EABI_SYSCALL 0xef000000
2a451106 237
f1973203
MR
238/* OABI syscall restart trampoline, used for EABI executables too
239 whenever OABI support has been enabled in the kernel. */
240#define ARM_OABI_SYSCALL_RESTART_SYSCALL 0xef900000
241#define ARM_LDR_PC_SP_12 0xe49df00c
242
8e9d1a24 243static void
a262aec2 244arm_linux_sigtramp_cache (struct frame_info *this_frame,
8e9d1a24
DJ
245 struct trad_frame_cache *this_cache,
246 CORE_ADDR func, int regs_offset)
2a451106 247{
a262aec2 248 CORE_ADDR sp = get_frame_register_unsigned (this_frame, ARM_SP_REGNUM);
8e9d1a24
DJ
249 CORE_ADDR base = sp + regs_offset;
250 int i;
2a451106 251
8e9d1a24
DJ
252 for (i = 0; i < 16; i++)
253 trad_frame_set_reg_addr (this_cache, i, base + i * 4);
2a451106 254
8e9d1a24 255 trad_frame_set_reg_addr (this_cache, ARM_PS_REGNUM, base + 16 * 4);
2a451106 256
8e9d1a24
DJ
257 /* The VFP or iWMMXt registers may be saved on the stack, but there's
258 no reliable way to restore them (yet). */
2a451106 259
8e9d1a24
DJ
260 /* Save a frame ID. */
261 trad_frame_set_id (this_cache, frame_id_build (sp, func));
262}
2a451106 263
edfb1a26
DJ
264/* There are a couple of different possible stack layouts that
265 we need to support.
266
267 Before version 2.6.18, the kernel used completely independent
268 layouts for non-RT and RT signals. For non-RT signals the stack
269 began directly with a struct sigcontext. For RT signals the stack
270 began with two redundant pointers (to the siginfo and ucontext),
271 and then the siginfo and ucontext.
272
273 As of version 2.6.18, the non-RT signal frame layout starts with
274 a ucontext and the RT signal frame starts with a siginfo and then
275 a ucontext. Also, the ucontext now has a designated save area
276 for coprocessor registers.
277
278 For RT signals, it's easy to tell the difference: we look for
279 pinfo, the pointer to the siginfo. If it has the expected
280 value, we have an old layout. If it doesn't, we have the new
281 layout.
282
283 For non-RT signals, it's a bit harder. We need something in one
284 layout or the other with a recognizable offset and value. We can't
285 use the return trampoline, because ARM usually uses SA_RESTORER,
286 in which case the stack return trampoline is not filled in.
287 We can't use the saved stack pointer, because sigaltstack might
288 be in use. So for now we guess the new layout... */
289
290/* There are three words (trap_no, error_code, oldmask) in
291 struct sigcontext before r0. */
292#define ARM_SIGCONTEXT_R0 0xc
293
294/* There are five words (uc_flags, uc_link, and three for uc_stack)
295 in the ucontext_t before the sigcontext. */
296#define ARM_UCONTEXT_SIGCONTEXT 0x14
297
298/* There are three elements in an rt_sigframe before the ucontext:
299 pinfo, puc, and info. The first two are pointers and the third
300 is a struct siginfo, with size 128 bytes. We could follow puc
301 to the ucontext, but it's simpler to skip the whole thing. */
302#define ARM_OLD_RT_SIGFRAME_SIGINFO 0x8
303#define ARM_OLD_RT_SIGFRAME_UCONTEXT 0x88
304
305#define ARM_NEW_RT_SIGFRAME_UCONTEXT 0x80
306
307#define ARM_NEW_SIGFRAME_MAGIC 0x5ac3c35a
308
8e9d1a24
DJ
309static void
310arm_linux_sigreturn_init (const struct tramp_frame *self,
a262aec2 311 struct frame_info *this_frame,
8e9d1a24
DJ
312 struct trad_frame_cache *this_cache,
313 CORE_ADDR func)
2a451106 314{
e17a4113
UW
315 struct gdbarch *gdbarch = get_frame_arch (this_frame);
316 enum bfd_endian byte_order = gdbarch_byte_order (gdbarch);
a262aec2 317 CORE_ADDR sp = get_frame_register_unsigned (this_frame, ARM_SP_REGNUM);
e17a4113 318 ULONGEST uc_flags = read_memory_unsigned_integer (sp, 4, byte_order);
edfb1a26
DJ
319
320 if (uc_flags == ARM_NEW_SIGFRAME_MAGIC)
a262aec2 321 arm_linux_sigtramp_cache (this_frame, this_cache, func,
edfb1a26
DJ
322 ARM_UCONTEXT_SIGCONTEXT
323 + ARM_SIGCONTEXT_R0);
324 else
a262aec2 325 arm_linux_sigtramp_cache (this_frame, this_cache, func,
edfb1a26 326 ARM_SIGCONTEXT_R0);
8e9d1a24 327}
2a451106 328
8e9d1a24
DJ
329static void
330arm_linux_rt_sigreturn_init (const struct tramp_frame *self,
a262aec2 331 struct frame_info *this_frame,
8e9d1a24
DJ
332 struct trad_frame_cache *this_cache,
333 CORE_ADDR func)
334{
e17a4113
UW
335 struct gdbarch *gdbarch = get_frame_arch (this_frame);
336 enum bfd_endian byte_order = gdbarch_byte_order (gdbarch);
a262aec2 337 CORE_ADDR sp = get_frame_register_unsigned (this_frame, ARM_SP_REGNUM);
e17a4113 338 ULONGEST pinfo = read_memory_unsigned_integer (sp, 4, byte_order);
edfb1a26
DJ
339
340 if (pinfo == sp + ARM_OLD_RT_SIGFRAME_SIGINFO)
a262aec2 341 arm_linux_sigtramp_cache (this_frame, this_cache, func,
edfb1a26
DJ
342 ARM_OLD_RT_SIGFRAME_UCONTEXT
343 + ARM_UCONTEXT_SIGCONTEXT
344 + ARM_SIGCONTEXT_R0);
345 else
a262aec2 346 arm_linux_sigtramp_cache (this_frame, this_cache, func,
edfb1a26
DJ
347 ARM_NEW_RT_SIGFRAME_UCONTEXT
348 + ARM_UCONTEXT_SIGCONTEXT
349 + ARM_SIGCONTEXT_R0);
2a451106
KB
350}
351
f1973203
MR
352static void
353arm_linux_restart_syscall_init (const struct tramp_frame *self,
354 struct frame_info *this_frame,
355 struct trad_frame_cache *this_cache,
356 CORE_ADDR func)
357{
358 CORE_ADDR sp = get_frame_register_unsigned (this_frame, ARM_SP_REGNUM);
359
360 trad_frame_set_reg_addr (this_cache, ARM_PC_REGNUM, sp);
361 trad_frame_set_reg_value (this_cache, ARM_SP_REGNUM, sp + 12);
362
363 /* Save a frame ID. */
364 trad_frame_set_id (this_cache, frame_id_build (sp, func));
365}
366
8e9d1a24
DJ
367static struct tramp_frame arm_linux_sigreturn_tramp_frame = {
368 SIGTRAMP_FRAME,
369 4,
370 {
371 { ARM_LINUX_SIGRETURN_INSTR, -1 },
372 { TRAMP_SENTINEL_INSN }
373 },
374 arm_linux_sigreturn_init
375};
376
377static struct tramp_frame arm_linux_rt_sigreturn_tramp_frame = {
378 SIGTRAMP_FRAME,
379 4,
380 {
381 { ARM_LINUX_RT_SIGRETURN_INSTR, -1 },
382 { TRAMP_SENTINEL_INSN }
383 },
384 arm_linux_rt_sigreturn_init
385};
386
387static struct tramp_frame arm_eabi_linux_sigreturn_tramp_frame = {
388 SIGTRAMP_FRAME,
389 4,
390 {
391 { ARM_SET_R7_SIGRETURN, -1 },
392 { ARM_EABI_SYSCALL, -1 },
393 { TRAMP_SENTINEL_INSN }
394 },
395 arm_linux_sigreturn_init
396};
397
398static struct tramp_frame arm_eabi_linux_rt_sigreturn_tramp_frame = {
399 SIGTRAMP_FRAME,
400 4,
401 {
402 { ARM_SET_R7_RT_SIGRETURN, -1 },
403 { ARM_EABI_SYSCALL, -1 },
404 { TRAMP_SENTINEL_INSN }
405 },
406 arm_linux_rt_sigreturn_init
407};
408
f1973203
MR
409static struct tramp_frame arm_linux_restart_syscall_tramp_frame = {
410 NORMAL_FRAME,
411 4,
412 {
413 { ARM_OABI_SYSCALL_RESTART_SYSCALL, -1 },
414 { ARM_LDR_PC_SP_12, -1 },
415 { TRAMP_SENTINEL_INSN }
416 },
417 arm_linux_restart_syscall_init
418};
419
cb587d83
DJ
420/* Core file and register set support. */
421
422#define ARM_LINUX_SIZEOF_GREGSET (18 * INT_REGISTER_SIZE)
423
424void
425arm_linux_supply_gregset (const struct regset *regset,
426 struct regcache *regcache,
427 int regnum, const void *gregs_buf, size_t len)
428{
e17a4113
UW
429 struct gdbarch *gdbarch = get_regcache_arch (regcache);
430 enum bfd_endian byte_order = gdbarch_byte_order (gdbarch);
cb587d83
DJ
431 const gdb_byte *gregs = gregs_buf;
432 int regno;
433 CORE_ADDR reg_pc;
434 gdb_byte pc_buf[INT_REGISTER_SIZE];
435
436 for (regno = ARM_A1_REGNUM; regno < ARM_PC_REGNUM; regno++)
437 if (regnum == -1 || regnum == regno)
438 regcache_raw_supply (regcache, regno,
439 gregs + INT_REGISTER_SIZE * regno);
440
441 if (regnum == ARM_PS_REGNUM || regnum == -1)
442 {
443 if (arm_apcs_32)
444 regcache_raw_supply (regcache, ARM_PS_REGNUM,
17c12639 445 gregs + INT_REGISTER_SIZE * ARM_CPSR_GREGNUM);
cb587d83
DJ
446 else
447 regcache_raw_supply (regcache, ARM_PS_REGNUM,
448 gregs + INT_REGISTER_SIZE * ARM_PC_REGNUM);
449 }
450
451 if (regnum == ARM_PC_REGNUM || regnum == -1)
452 {
453 reg_pc = extract_unsigned_integer (gregs
454 + INT_REGISTER_SIZE * ARM_PC_REGNUM,
e17a4113
UW
455 INT_REGISTER_SIZE, byte_order);
456 reg_pc = gdbarch_addr_bits_remove (gdbarch, reg_pc);
457 store_unsigned_integer (pc_buf, INT_REGISTER_SIZE, byte_order, reg_pc);
cb587d83
DJ
458 regcache_raw_supply (regcache, ARM_PC_REGNUM, pc_buf);
459 }
460}
461
462void
463arm_linux_collect_gregset (const struct regset *regset,
464 const struct regcache *regcache,
465 int regnum, void *gregs_buf, size_t len)
466{
467 gdb_byte *gregs = gregs_buf;
468 int regno;
469
470 for (regno = ARM_A1_REGNUM; regno < ARM_PC_REGNUM; regno++)
471 if (regnum == -1 || regnum == regno)
472 regcache_raw_collect (regcache, regno,
473 gregs + INT_REGISTER_SIZE * regno);
474
475 if (regnum == ARM_PS_REGNUM || regnum == -1)
476 {
477 if (arm_apcs_32)
478 regcache_raw_collect (regcache, ARM_PS_REGNUM,
17c12639 479 gregs + INT_REGISTER_SIZE * ARM_CPSR_GREGNUM);
cb587d83
DJ
480 else
481 regcache_raw_collect (regcache, ARM_PS_REGNUM,
482 gregs + INT_REGISTER_SIZE * ARM_PC_REGNUM);
483 }
484
485 if (regnum == ARM_PC_REGNUM || regnum == -1)
486 regcache_raw_collect (regcache, ARM_PC_REGNUM,
487 gregs + INT_REGISTER_SIZE * ARM_PC_REGNUM);
488}
489
490/* Support for register format used by the NWFPE FPA emulator. */
491
492#define typeNone 0x00
493#define typeSingle 0x01
494#define typeDouble 0x02
495#define typeExtended 0x03
496
497void
498supply_nwfpe_register (struct regcache *regcache, int regno,
499 const gdb_byte *regs)
500{
501 const gdb_byte *reg_data;
502 gdb_byte reg_tag;
503 gdb_byte buf[FP_REGISTER_SIZE];
504
505 reg_data = regs + (regno - ARM_F0_REGNUM) * FP_REGISTER_SIZE;
506 reg_tag = regs[(regno - ARM_F0_REGNUM) + NWFPE_TAGS_OFFSET];
507 memset (buf, 0, FP_REGISTER_SIZE);
508
509 switch (reg_tag)
510 {
511 case typeSingle:
512 memcpy (buf, reg_data, 4);
513 break;
514 case typeDouble:
515 memcpy (buf, reg_data + 4, 4);
516 memcpy (buf + 4, reg_data, 4);
517 break;
518 case typeExtended:
519 /* We want sign and exponent, then least significant bits,
520 then most significant. NWFPE does sign, most, least. */
521 memcpy (buf, reg_data, 4);
522 memcpy (buf + 4, reg_data + 8, 4);
523 memcpy (buf + 8, reg_data + 4, 4);
524 break;
525 default:
526 break;
527 }
528
529 regcache_raw_supply (regcache, regno, buf);
530}
531
532void
533collect_nwfpe_register (const struct regcache *regcache, int regno,
534 gdb_byte *regs)
535{
536 gdb_byte *reg_data;
537 gdb_byte reg_tag;
538 gdb_byte buf[FP_REGISTER_SIZE];
539
540 regcache_raw_collect (regcache, regno, buf);
541
542 /* NOTE drow/2006-06-07: This code uses the tag already in the
543 register buffer. I've preserved that when moving the code
544 from the native file to the target file. But this doesn't
545 always make sense. */
546
547 reg_data = regs + (regno - ARM_F0_REGNUM) * FP_REGISTER_SIZE;
548 reg_tag = regs[(regno - ARM_F0_REGNUM) + NWFPE_TAGS_OFFSET];
549
550 switch (reg_tag)
551 {
552 case typeSingle:
553 memcpy (reg_data, buf, 4);
554 break;
555 case typeDouble:
556 memcpy (reg_data, buf + 4, 4);
557 memcpy (reg_data + 4, buf, 4);
558 break;
559 case typeExtended:
560 memcpy (reg_data, buf, 4);
561 memcpy (reg_data + 4, buf + 8, 4);
562 memcpy (reg_data + 8, buf + 4, 4);
563 break;
564 default:
565 break;
566 }
567}
568
569void
570arm_linux_supply_nwfpe (const struct regset *regset,
571 struct regcache *regcache,
572 int regnum, const void *regs_buf, size_t len)
573{
574 const gdb_byte *regs = regs_buf;
575 int regno;
576
577 if (regnum == ARM_FPS_REGNUM || regnum == -1)
578 regcache_raw_supply (regcache, ARM_FPS_REGNUM,
579 regs + NWFPE_FPSR_OFFSET);
580
581 for (regno = ARM_F0_REGNUM; regno <= ARM_F7_REGNUM; regno++)
582 if (regnum == -1 || regnum == regno)
583 supply_nwfpe_register (regcache, regno, regs);
584}
585
586void
587arm_linux_collect_nwfpe (const struct regset *regset,
588 const struct regcache *regcache,
589 int regnum, void *regs_buf, size_t len)
590{
591 gdb_byte *regs = regs_buf;
592 int regno;
593
594 for (regno = ARM_F0_REGNUM; regno <= ARM_F7_REGNUM; regno++)
595 if (regnum == -1 || regnum == regno)
596 collect_nwfpe_register (regcache, regno, regs);
597
598 if (regnum == ARM_FPS_REGNUM || regnum == -1)
599 regcache_raw_collect (regcache, ARM_FPS_REGNUM,
600 regs + INT_REGISTER_SIZE * ARM_FPS_REGNUM);
601}
602
603/* Return the appropriate register set for the core section identified
604 by SECT_NAME and SECT_SIZE. */
605
606static const struct regset *
607arm_linux_regset_from_core_section (struct gdbarch *gdbarch,
608 const char *sect_name, size_t sect_size)
609{
610 struct gdbarch_tdep *tdep = gdbarch_tdep (gdbarch);
611
612 if (strcmp (sect_name, ".reg") == 0
613 && sect_size == ARM_LINUX_SIZEOF_GREGSET)
614 {
615 if (tdep->gregset == NULL)
616 tdep->gregset = regset_alloc (gdbarch, arm_linux_supply_gregset,
617 arm_linux_collect_gregset);
618 return tdep->gregset;
619 }
620
621 if (strcmp (sect_name, ".reg2") == 0
622 && sect_size == ARM_LINUX_SIZEOF_NWFPE)
623 {
624 if (tdep->fpregset == NULL)
625 tdep->fpregset = regset_alloc (gdbarch, arm_linux_supply_nwfpe,
626 arm_linux_collect_nwfpe);
627 return tdep->fpregset;
628 }
629
630 return NULL;
631}
632
25b41d01
YQ
633/* Copy the value of next pc of sigreturn and rt_sigrturn into PC,
634 and return 1. Return 0 if it is not a rt_sigreturn/sigreturn
635 syscall. */
636static int
637arm_linux_sigreturn_return_addr (struct frame_info *frame,
638 unsigned long svc_number,
639 CORE_ADDR *pc)
640{
641 /* Is this a sigreturn or rt_sigreturn syscall? */
642 if (svc_number == 119 || svc_number == 173)
643 {
644 if (get_frame_type (frame) == SIGTRAMP_FRAME)
645 {
646 *pc = frame_unwind_caller_pc (frame);
647 return 1;
648 }
649 }
650 return 0;
651}
652
653/* When FRAME is at a syscall instruction, return the PC of the next
654 instruction to be executed. */
655
656static CORE_ADDR
657arm_linux_syscall_next_pc (struct frame_info *frame)
658{
659 CORE_ADDR pc = get_frame_pc (frame);
660 CORE_ADDR return_addr = 0;
661 int is_thumb = arm_frame_is_thumb (frame);
662 ULONGEST svc_number = 0;
663 int is_sigreturn = 0;
664
665 if (is_thumb)
666 {
667 svc_number = get_frame_register_unsigned (frame, 7);
668 }
669 else
670 {
671 struct gdbarch *gdbarch = get_frame_arch (frame);
672 enum bfd_endian byte_order_for_code =
673 gdbarch_byte_order_for_code (gdbarch);
674 unsigned long this_instr =
675 read_memory_unsigned_integer (pc, 4, byte_order_for_code);
676
677 unsigned long svc_operand = (0x00ffffff & this_instr);
678 if (svc_operand) /* OABI. */
679 {
680 svc_number = svc_operand - 0x900000;
681 }
682 else /* EABI. */
683 {
684 svc_number = get_frame_register_unsigned (frame, 7);
685 }
686 }
687
688 is_sigreturn = arm_linux_sigreturn_return_addr (frame, svc_number,
689 &return_addr);
690
691 if (is_sigreturn)
692 return return_addr;
693
694 if (is_thumb)
695 {
696 return_addr = pc + 2;
697 /* Addresses for calling Thumb functions have the bit 0 set. */
698 return_addr |= 1;
699 }
700 else
701 {
702 return_addr = pc + 4;
703 }
704
705 return return_addr;
706}
707
708
daddc3c1
DJ
709/* Insert a single step breakpoint at the next executed instruction. */
710
63807e1d 711static int
daddc3c1
DJ
712arm_linux_software_single_step (struct frame_info *frame)
713{
a6d9a66e 714 struct gdbarch *gdbarch = get_frame_arch (frame);
6c95b8df 715 struct address_space *aspace = get_frame_address_space (frame);
daddc3c1
DJ
716 CORE_ADDR next_pc = arm_get_next_pc (frame, get_frame_pc (frame));
717
718 /* The Linux kernel offers some user-mode helpers in a high page. We can
719 not read this page (as of 2.6.23), and even if we could then we couldn't
720 set breakpoints in it, and even if we could then the atomic operations
721 would fail when interrupted. They are all called as functions and return
722 to the address in LR, so step to there instead. */
723 if (next_pc > 0xffff0000)
724 next_pc = get_frame_register_unsigned (frame, ARM_LR_REGNUM);
725
6c95b8df 726 insert_single_step_breakpoint (gdbarch, aspace, next_pc);
daddc3c1
DJ
727
728 return 1;
729}
730
cca44b1b
JB
731/* Support for displaced stepping of Linux SVC instructions. */
732
733static void
6e39997a 734arm_linux_cleanup_svc (struct gdbarch *gdbarch,
cca44b1b
JB
735 struct regcache *regs,
736 struct displaced_step_closure *dsc)
737{
738 CORE_ADDR from = dsc->insn_addr;
739 ULONGEST apparent_pc;
740 int within_scratch;
741
742 regcache_cooked_read_unsigned (regs, ARM_PC_REGNUM, &apparent_pc);
743
744 within_scratch = (apparent_pc >= dsc->scratch_base
745 && apparent_pc < (dsc->scratch_base
746 + DISPLACED_MODIFIED_INSNS * 4 + 4));
747
748 if (debug_displaced)
749 {
750 fprintf_unfiltered (gdb_stdlog, "displaced: PC is apparently %.8lx after "
751 "SVC step ", (unsigned long) apparent_pc);
752 if (within_scratch)
753 fprintf_unfiltered (gdb_stdlog, "(within scratch space)\n");
754 else
755 fprintf_unfiltered (gdb_stdlog, "(outside scratch space)\n");
756 }
757
758 if (within_scratch)
759 displaced_write_reg (regs, dsc, ARM_PC_REGNUM, from + 4, BRANCH_WRITE_PC);
760}
761
762static int
763arm_linux_copy_svc (struct gdbarch *gdbarch, uint32_t insn, CORE_ADDR to,
764 struct regcache *regs, struct displaced_step_closure *dsc)
765{
766 CORE_ADDR from = dsc->insn_addr;
25b41d01
YQ
767 CORE_ADDR return_to = 0;
768
cca44b1b
JB
769 struct frame_info *frame;
770 unsigned int svc_number = displaced_read_reg (regs, from, 7);
25b41d01 771 int is_sigreturn = 0;
cca44b1b
JB
772
773 if (debug_displaced)
774 fprintf_unfiltered (gdb_stdlog, "displaced: copying Linux svc insn %.8lx\n",
775 (unsigned long) insn);
776
777 frame = get_current_frame ();
778
25b41d01
YQ
779 is_sigreturn = arm_linux_sigreturn_return_addr(frame, svc_number,
780 &return_to);
781 if (is_sigreturn)
cca44b1b 782 {
cca44b1b
JB
783 struct symtab_and_line sal;
784
785 if (debug_displaced)
786 fprintf_unfiltered (gdb_stdlog, "displaced: found "
0963b4bd 787 "sigreturn/rt_sigreturn SVC call. PC in frame = %lx\n",
cca44b1b
JB
788 (unsigned long) get_frame_pc (frame));
789
cca44b1b 790 if (debug_displaced)
0963b4bd 791 fprintf_unfiltered (gdb_stdlog, "displaced: unwind pc = %lx. "
cca44b1b
JB
792 "Setting momentary breakpoint.\n", (unsigned long) return_to);
793
8358c15c
JK
794 gdb_assert (inferior_thread ()->control.step_resume_breakpoint
795 == NULL);
cca44b1b
JB
796
797 sal = find_pc_line (return_to, 0);
798 sal.pc = return_to;
799 sal.section = find_pc_overlay (return_to);
800 sal.explicit_pc = 1;
801
802 frame = get_prev_frame (frame);
803
804 if (frame)
805 {
8358c15c 806 inferior_thread ()->control.step_resume_breakpoint
cca44b1b
JB
807 = set_momentary_breakpoint (gdbarch, sal, get_frame_id (frame),
808 bp_step_resume);
809
810 /* We need to make sure we actually insert the momentary
811 breakpoint set above. */
812 insert_breakpoints ();
813 }
814 else if (debug_displaced)
815 fprintf_unfiltered (gdb_stderr, "displaced: couldn't find previous "
816 "frame to set momentary breakpoint for "
817 "sigreturn/rt_sigreturn\n");
818 }
819 else if (debug_displaced)
820 fprintf_unfiltered (gdb_stdlog, "displaced: sigreturn/rt_sigreturn "
821 "SVC call not in signal trampoline frame\n");
25b41d01 822
cca44b1b
JB
823
824 /* Preparation: If we detect sigreturn, set momentary breakpoint at resume
825 location, else nothing.
826 Insn: unmodified svc.
827 Cleanup: if pc lands in scratch space, pc <- insn_addr + 4
828 else leave pc alone. */
829
830 dsc->modinsn[0] = insn;
831
832 dsc->cleanup = &arm_linux_cleanup_svc;
833 /* Pretend we wrote to the PC, so cleanup doesn't set PC to the next
834 instruction. */
835 dsc->wrote_to_pc = 1;
836
837 return 0;
838}
839
840
841/* The following two functions implement single-stepping over calls to Linux
842 kernel helper routines, which perform e.g. atomic operations on architecture
843 variants which don't support them natively.
844
845 When this function is called, the PC will be pointing at the kernel helper
846 (at an address inaccessible to GDB), and r14 will point to the return
847 address. Displaced stepping always executes code in the copy area:
848 so, make the copy-area instruction branch back to the kernel helper (the
849 "from" address), and make r14 point to the breakpoint in the copy area. In
850 that way, we regain control once the kernel helper returns, and can clean
851 up appropriately (as if we had just returned from the kernel helper as it
852 would have been called from the non-displaced location). */
853
854static void
6e39997a 855cleanup_kernel_helper_return (struct gdbarch *gdbarch,
cca44b1b
JB
856 struct regcache *regs,
857 struct displaced_step_closure *dsc)
858{
859 displaced_write_reg (regs, dsc, ARM_LR_REGNUM, dsc->tmp[0], CANNOT_WRITE_PC);
860 displaced_write_reg (regs, dsc, ARM_PC_REGNUM, dsc->tmp[0], BRANCH_WRITE_PC);
861}
862
863static void
864arm_catch_kernel_helper_return (struct gdbarch *gdbarch, CORE_ADDR from,
865 CORE_ADDR to, struct regcache *regs,
866 struct displaced_step_closure *dsc)
867{
868 enum bfd_endian byte_order = gdbarch_byte_order (gdbarch);
869
870 dsc->numinsns = 1;
871 dsc->insn_addr = from;
872 dsc->cleanup = &cleanup_kernel_helper_return;
873 /* Say we wrote to the PC, else cleanup will set PC to the next
874 instruction in the helper, which isn't helpful. */
875 dsc->wrote_to_pc = 1;
876
877 /* Preparation: tmp[0] <- r14
878 r14 <- <scratch space>+4
879 *(<scratch space>+8) <- from
880 Insn: ldr pc, [r14, #4]
881 Cleanup: r14 <- tmp[0], pc <- tmp[0]. */
882
883 dsc->tmp[0] = displaced_read_reg (regs, from, ARM_LR_REGNUM);
884 displaced_write_reg (regs, dsc, ARM_LR_REGNUM, (ULONGEST) to + 4,
885 CANNOT_WRITE_PC);
886 write_memory_unsigned_integer (to + 8, 4, byte_order, from);
887
888 dsc->modinsn[0] = 0xe59ef004; /* ldr pc, [lr, #4]. */
889}
890
891/* Linux-specific displaced step instruction copying function. Detects when
892 the program has stepped into a Linux kernel helper routine (which must be
893 handled as a special case), falling back to arm_displaced_step_copy_insn()
894 if it hasn't. */
895
896static struct displaced_step_closure *
897arm_linux_displaced_step_copy_insn (struct gdbarch *gdbarch,
898 CORE_ADDR from, CORE_ADDR to,
899 struct regcache *regs)
900{
901 struct displaced_step_closure *dsc
902 = xmalloc (sizeof (struct displaced_step_closure));
903
904 /* Detect when we enter an (inaccessible by GDB) Linux kernel helper, and
905 stop at the return location. */
906 if (from > 0xffff0000)
907 {
908 if (debug_displaced)
909 fprintf_unfiltered (gdb_stdlog, "displaced: detected kernel helper "
910 "at %.8lx\n", (unsigned long) from);
911
912 arm_catch_kernel_helper_return (gdbarch, from, to, regs, dsc);
913 }
914 else
915 {
916 enum bfd_endian byte_order = gdbarch_byte_order (gdbarch);
917 uint32_t insn = read_memory_unsigned_integer (from, 4, byte_order);
918
919 if (debug_displaced)
920 fprintf_unfiltered (gdb_stdlog, "displaced: stepping insn %.8lx "
921 "at %.8lx\n", (unsigned long) insn,
922 (unsigned long) from);
923
924 /* Override the default handling of SVC instructions. */
925 dsc->u.svc.copy_svc_os = arm_linux_copy_svc;
926
927 arm_process_displaced_insn (gdbarch, insn, from, to, regs, dsc);
928 }
929
930 arm_displaced_init_closure (gdbarch, from, to, dsc);
931
932 return dsc;
933}
934
97e03143
RE
935static void
936arm_linux_init_abi (struct gdbarch_info info,
937 struct gdbarch *gdbarch)
938{
939 struct gdbarch_tdep *tdep = gdbarch_tdep (gdbarch);
940
a5ee0f0c
PA
941 linux_init_abi (info, gdbarch);
942
97e03143 943 tdep->lowest_pc = 0x8000;
2ef47cd0 944 if (info.byte_order == BFD_ENDIAN_BIG)
498b1f87 945 {
c75a2cc8
DJ
946 if (tdep->arm_abi == ARM_ABI_AAPCS)
947 tdep->arm_breakpoint = eabi_linux_arm_be_breakpoint;
948 else
949 tdep->arm_breakpoint = arm_linux_arm_be_breakpoint;
498b1f87 950 tdep->thumb_breakpoint = arm_linux_thumb_be_breakpoint;
177321bd 951 tdep->thumb2_breakpoint = arm_linux_thumb2_be_breakpoint;
498b1f87 952 }
2ef47cd0 953 else
498b1f87 954 {
c75a2cc8
DJ
955 if (tdep->arm_abi == ARM_ABI_AAPCS)
956 tdep->arm_breakpoint = eabi_linux_arm_le_breakpoint;
957 else
958 tdep->arm_breakpoint = arm_linux_arm_le_breakpoint;
498b1f87 959 tdep->thumb_breakpoint = arm_linux_thumb_le_breakpoint;
177321bd 960 tdep->thumb2_breakpoint = arm_linux_thumb2_le_breakpoint;
498b1f87 961 }
66e810cd 962 tdep->arm_breakpoint_size = sizeof (arm_linux_arm_le_breakpoint);
498b1f87 963 tdep->thumb_breakpoint_size = sizeof (arm_linux_thumb_le_breakpoint);
177321bd 964 tdep->thumb2_breakpoint_size = sizeof (arm_linux_thumb2_le_breakpoint);
9df628e0 965
28e97307
DJ
966 if (tdep->fp_model == ARM_FLOAT_AUTO)
967 tdep->fp_model = ARM_FLOAT_FPA;
fd50bc42 968
f8624c62
MGD
969 switch (tdep->fp_model)
970 {
971 case ARM_FLOAT_FPA:
972 tdep->jb_pc = ARM_LINUX_JB_PC_FPA;
973 break;
974 case ARM_FLOAT_SOFT_FPA:
975 case ARM_FLOAT_SOFT_VFP:
976 case ARM_FLOAT_VFP:
977 tdep->jb_pc = ARM_LINUX_JB_PC_EABI;
978 break;
979 default:
980 internal_error
981 (__FILE__, __LINE__,
982 _("arm_linux_init_abi: Floating point model not supported"));
983 break;
984 }
a6cdd8c5 985 tdep->jb_elt_size = ARM_LINUX_JB_ELEMENT_SIZE;
19d3fc80 986
7aa1783e 987 set_solib_svr4_fetch_link_map_offsets
76a9d10f 988 (gdbarch, svr4_ilp32_fetch_link_map_offsets);
7aa1783e 989
190dce09 990 /* Single stepping. */
daddc3c1 991 set_gdbarch_software_single_step (gdbarch, arm_linux_software_single_step);
190dce09 992
0e18d038 993 /* Shared library handling. */
0e18d038 994 set_gdbarch_skip_trampoline_code (gdbarch, find_solib_trampoline_target);
bb41a796 995 set_gdbarch_skip_solib_resolver (gdbarch, glibc_skip_solib_resolver);
b2756930
KB
996
997 /* Enable TLS support. */
998 set_gdbarch_fetch_tls_load_module_address (gdbarch,
999 svr4_fetch_objfile_link_map);
8e9d1a24
DJ
1000
1001 tramp_frame_prepend_unwinder (gdbarch,
1002 &arm_linux_sigreturn_tramp_frame);
1003 tramp_frame_prepend_unwinder (gdbarch,
1004 &arm_linux_rt_sigreturn_tramp_frame);
1005 tramp_frame_prepend_unwinder (gdbarch,
1006 &arm_eabi_linux_sigreturn_tramp_frame);
1007 tramp_frame_prepend_unwinder (gdbarch,
1008 &arm_eabi_linux_rt_sigreturn_tramp_frame);
f1973203
MR
1009 tramp_frame_prepend_unwinder (gdbarch,
1010 &arm_linux_restart_syscall_tramp_frame);
cb587d83
DJ
1011
1012 /* Core file support. */
1013 set_gdbarch_regset_from_core_section (gdbarch,
1014 arm_linux_regset_from_core_section);
4aa995e1
PA
1015
1016 set_gdbarch_get_siginfo_type (gdbarch, linux_get_siginfo_type);
cca44b1b
JB
1017
1018 /* Displaced stepping. */
1019 set_gdbarch_displaced_step_copy_insn (gdbarch,
1020 arm_linux_displaced_step_copy_insn);
1021 set_gdbarch_displaced_step_fixup (gdbarch, arm_displaced_step_fixup);
1022 set_gdbarch_displaced_step_free_closure (gdbarch,
1023 simple_displaced_step_free_closure);
1024 set_gdbarch_displaced_step_location (gdbarch, displaced_step_at_entry_point);
25b41d01
YQ
1025
1026
1027 tdep->syscall_next_pc = arm_linux_syscall_next_pc;
97e03143
RE
1028}
1029
63807e1d
PA
1030/* Provide a prototype to silence -Wmissing-prototypes. */
1031extern initialize_file_ftype _initialize_arm_linux_tdep;
1032
faf5f7ad
SB
1033void
1034_initialize_arm_linux_tdep (void)
1035{
05816f70
MK
1036 gdbarch_register_osabi (bfd_arch_arm, 0, GDB_OSABI_LINUX,
1037 arm_linux_init_abi);
faf5f7ad 1038}
This page took 0.681943 seconds and 4 git commands to generate.