Automatic date update in version.in
[deliverable/binutils-gdb.git] / gdb / solib-darwin.c
CommitLineData
cf1061c0
TG
1/* Handle Darwin shared libraries for GDB, the GNU Debugger.
2
3666a048 3 Copyright (C) 2009-2021 Free Software Foundation, Inc.
cf1061c0
TG
4
5 This file is part of GDB.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
19
20#include "defs.h"
21
22#include "symtab.h"
23#include "bfd.h"
24#include "symfile.h"
25#include "objfiles.h"
26#include "gdbcore.h"
27#include "target.h"
28#include "inferior.h"
fb14de7b 29#include "regcache.h"
cf1061c0 30#include "gdbthread.h"
cbb099e8 31#include "gdb_bfd.h"
cf1061c0 32
cf1061c0
TG
33#include "solist.h"
34#include "solib.h"
35#include "solib-svr4.h"
36
37#include "bfd-target.h"
38#include "elf-bfd.h"
39#include "exec.h"
40#include "auxv.h"
cf1061c0 41#include "mach-o.h"
8544a150 42#include "mach-o/external.h"
cf1061c0
TG
43
44struct gdb_dyld_image_info
45{
46 /* Base address (which corresponds to the Mach-O header). */
47 CORE_ADDR mach_header;
48 /* Image file path. */
49 CORE_ADDR file_path;
50 /* st.m_time of image file. */
51 unsigned long mtime;
52};
53
066d7383
TG
54/* Content of inferior dyld_all_image_infos structure.
55 See /usr/include/mach-o/dyld_images.h for the documentation. */
cf1061c0
TG
56struct gdb_dyld_all_image_infos
57{
58 /* Version (1). */
59 unsigned int version;
60 /* Number of images. */
61 unsigned int count;
62 /* Image description. */
63 CORE_ADDR info;
64 /* Notifier (function called when a library is added or removed). */
65 CORE_ADDR notifier;
66};
67
68/* Current all_image_infos version. */
066d7383 69#define DYLD_VERSION_MIN 1
4bbd4ef2 70#define DYLD_VERSION_MAX 15
cf1061c0 71
ec95993c
TG
72/* Per PSPACE specific data. */
73struct darwin_info
74{
75 /* Address of structure dyld_all_image_infos in inferior. */
51df2ae3 76 CORE_ADDR all_image_addr = 0;
ec95993c
TG
77
78 /* Gdb copy of dyld_all_info_infos. */
51df2ae3 79 struct gdb_dyld_all_image_infos all_image {};
ec95993c
TG
80};
81
82/* Per-program-space data key. */
51df2ae3 83static program_space_key<darwin_info> solib_darwin_pspace_data;
cf1061c0 84
ec95993c
TG
85/* Get the current darwin data. If none is found yet, add it now. This
86 function always returns a valid object. */
87
88static struct darwin_info *
89get_darwin_info (void)
90{
91 struct darwin_info *info;
92
51df2ae3 93 info = solib_darwin_pspace_data.get (current_program_space);
ec95993c
TG
94 if (info != NULL)
95 return info;
96
51df2ae3 97 return solib_darwin_pspace_data.emplace (current_program_space);
ec95993c 98}
cf1061c0 99
066d7383
TG
100/* Return non-zero if the version in dyld_all_image is known. */
101
102static int
ec95993c 103darwin_dyld_version_ok (const struct darwin_info *info)
066d7383 104{
ec95993c
TG
105 return info->all_image.version >= DYLD_VERSION_MIN
106 && info->all_image.version <= DYLD_VERSION_MAX;
066d7383
TG
107}
108
cf1061c0 109/* Read dyld_all_image from inferior. */
066d7383 110
cf1061c0 111static void
ec95993c 112darwin_load_image_infos (struct darwin_info *info)
cf1061c0
TG
113{
114 gdb_byte buf[24];
f5656ead
TT
115 enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch ());
116 struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
cf1061c0
TG
117 int len;
118
119 /* If the structure address is not known, don't continue. */
ec95993c 120 if (info->all_image_addr == 0)
cf1061c0
TG
121 return;
122
123 /* The structure has 4 fields: version (4 bytes), count (4 bytes),
124 info (pointer) and notifier (pointer). */
132874d7 125 len = 4 + 4 + 2 * TYPE_LENGTH (ptr_type);
cf1061c0 126 gdb_assert (len <= sizeof (buf));
ec95993c 127 memset (&info->all_image, 0, sizeof (info->all_image));
cf1061c0
TG
128
129 /* Read structure raw bytes from target. */
ec95993c 130 if (target_read_memory (info->all_image_addr, buf, len))
cf1061c0
TG
131 return;
132
133 /* Extract the fields. */
ec95993c
TG
134 info->all_image.version = extract_unsigned_integer (buf, 4, byte_order);
135 if (!darwin_dyld_version_ok (info))
cf1061c0
TG
136 return;
137
ec95993c
TG
138 info->all_image.count = extract_unsigned_integer (buf + 4, 4, byte_order);
139 info->all_image.info = extract_typed_address (buf + 8, ptr_type);
140 info->all_image.notifier = extract_typed_address
132874d7 141 (buf + 8 + TYPE_LENGTH (ptr_type), ptr_type);
cf1061c0
TG
142}
143
144/* Link map info to include in an allocated so_list entry. */
145
d0e449a1 146struct lm_info_darwin : public lm_info_base
cf1061c0
TG
147{
148 /* The target location of lm. */
9ccbfd7b 149 CORE_ADDR lm_addr = 0;
cf1061c0
TG
150};
151
cf1061c0 152/* Lookup the value for a specific symbol. */
066d7383 153
cf1061c0 154static CORE_ADDR
a121b7c1 155lookup_symbol_from_bfd (bfd *abfd, const char *symname)
cf1061c0
TG
156{
157 long storage_needed;
158 asymbol **symbol_table;
159 unsigned int number_of_symbols;
160 unsigned int i;
161 CORE_ADDR symaddr = 0;
162
163 storage_needed = bfd_get_symtab_upper_bound (abfd);
164
165 if (storage_needed <= 0)
166 return 0;
167
168 symbol_table = (asymbol **) xmalloc (storage_needed);
169 number_of_symbols = bfd_canonicalize_symtab (abfd, symbol_table);
70d4c673 170
cf1061c0
TG
171 for (i = 0; i < number_of_symbols; i++)
172 {
173 asymbol *sym = symbol_table[i];
433759f7 174
cf1061c0
TG
175 if (strcmp (sym->name, symname) == 0
176 && (sym->section->flags & (SEC_CODE | SEC_DATA)) != 0)
177 {
178 /* BFD symbols are section relative. */
179 symaddr = sym->value + sym->section->vma;
180 break;
181 }
182 }
183 xfree (symbol_table);
184
185 return symaddr;
186}
187
188/* Return program interpreter string. */
023e4e81 189
001f13d8 190static char *
cf1061c0
TG
191find_program_interpreter (void)
192{
001f13d8 193 char *buf = NULL;
cf1061c0 194
7e10abd1
TT
195 /* If we have an current exec_bfd, get the interpreter from the load
196 commands. */
197 if (current_program_space->exec_bfd ())
cf1061c0 198 {
023e4e81 199 bfd_mach_o_load_command *cmd;
70d4c673 200
7e10abd1 201 if (bfd_mach_o_lookup_command (current_program_space->exec_bfd (),
dda83cd7
SM
202 BFD_MACH_O_LC_LOAD_DYLINKER, &cmd) == 1)
203 return cmd->command.dylinker.name_str;
cf1061c0
TG
204 }
205
206 /* If we didn't find it, read from memory.
207 FIXME: todo. */
208 return buf;
209}
210
211/* Not used. I don't see how the main symbol file can be found: the
212 interpreter name is needed and it is known from the executable file.
213 Note that darwin-nat.c implements pid_to_exec_file. */
066d7383 214
cf1061c0 215static int
bf469271 216open_symbol_file_object (int from_tty)
cf1061c0
TG
217{
218 return 0;
219}
220
c378eb4e 221/* Build a list of currently loaded shared objects. See solib-svr4.c. */
066d7383 222
cf1061c0
TG
223static struct so_list *
224darwin_current_sos (void)
225{
f5656ead 226 struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
34877895 227 enum bfd_endian byte_order = type_byte_order (ptr_type);
cf1061c0
TG
228 int ptr_len = TYPE_LENGTH (ptr_type);
229 unsigned int image_info_size;
cf1061c0
TG
230 struct so_list *head = NULL;
231 struct so_list *tail = NULL;
232 int i;
ec95993c 233 struct darwin_info *info = get_darwin_info ();
cf1061c0
TG
234
235 /* Be sure image infos are loaded. */
ec95993c 236 darwin_load_image_infos (info);
cf1061c0 237
ec95993c 238 if (!darwin_dyld_version_ok (info))
cf1061c0
TG
239 return NULL;
240
241 image_info_size = ptr_len * 3;
242
243 /* Read infos for each solib.
8544a150
TG
244 The first entry was rumored to be the executable itself, but this is not
245 true when a large number of shared libraries are used (table expanded ?).
246 We now check all entries, but discard executable images. */
ec95993c 247 for (i = 0; i < info->all_image.count; i++)
cf1061c0 248 {
ec95993c 249 CORE_ADDR iinfo = info->all_image.info + i * image_info_size;
e362b510 250 gdb_byte buf[image_info_size];
cf1061c0
TG
251 CORE_ADDR load_addr;
252 CORE_ADDR path_addr;
8544a150
TG
253 struct mach_o_header_external hdr;
254 unsigned long hdr_val;
cf1061c0
TG
255
256 /* Read image info from inferior. */
ec95993c 257 if (target_read_memory (iinfo, buf, image_info_size))
cf1061c0
TG
258 break;
259
260 load_addr = extract_typed_address (buf, ptr_type);
261 path_addr = extract_typed_address (buf + ptr_len, ptr_type);
262
8544a150 263 /* Read Mach-O header from memory. */
948f8e3d 264 if (target_read_memory (load_addr, (gdb_byte *) &hdr, sizeof (hdr) - 4))
8544a150
TG
265 break;
266 /* Discard wrong magic numbers. Shouldn't happen. */
267 hdr_val = extract_unsigned_integer
dda83cd7 268 (hdr.magic, sizeof (hdr.magic), byte_order);
8544a150 269 if (hdr_val != BFD_MACH_O_MH_MAGIC && hdr_val != BFD_MACH_O_MH_MAGIC_64)
dda83cd7 270 continue;
8544a150
TG
271 /* Discard executable. Should happen only once. */
272 hdr_val = extract_unsigned_integer
dda83cd7 273 (hdr.filetype, sizeof (hdr.filetype), byte_order);
8544a150 274 if (hdr_val == BFD_MACH_O_MH_EXECUTE)
dda83cd7 275 continue;
8544a150 276
66920317
TT
277 gdb::unique_xmalloc_ptr<char> file_path
278 = target_read_string (path_addr, SO_NAME_MAX_PATH_SIZE - 1);
279 if (file_path == nullptr)
cf1061c0
TG
280 break;
281
282 /* Create and fill the new so_list element. */
668eb2f0 283 gdb::unique_xmalloc_ptr<struct so_list> newobj (XCNEW (struct so_list));
cf1061c0 284
9ccbfd7b 285 lm_info_darwin *li = new lm_info_darwin;
d0e449a1 286 newobj->lm_info = li;
cf1061c0 287
e83e4e24 288 strncpy (newobj->so_name, file_path.get (), SO_NAME_MAX_PATH_SIZE - 1);
fe978cb0
PA
289 newobj->so_name[SO_NAME_MAX_PATH_SIZE - 1] = '\0';
290 strcpy (newobj->so_original_name, newobj->so_name);
d0e449a1 291 li->lm_addr = load_addr;
cf1061c0
TG
292
293 if (head == NULL)
668eb2f0 294 head = newobj.get ();
cf1061c0 295 else
668eb2f0
TT
296 tail->next = newobj.get ();
297 tail = newobj.release ();
cf1061c0
TG
298 }
299
300 return head;
301}
302
ad2073b0
TG
303/* Check LOAD_ADDR points to a Mach-O executable header. Return LOAD_ADDR
304 in case of success, 0 in case of failure. */
4141a416
JB
305
306static CORE_ADDR
ad2073b0
TG
307darwin_validate_exec_header (CORE_ADDR load_addr)
308{
309 enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch ());
310 struct mach_o_header_external hdr;
311 unsigned long hdr_val;
312
313 /* Read Mach-O header from memory. */
314 if (target_read_memory (load_addr, (gdb_byte *) &hdr, sizeof (hdr) - 4))
315 return 0;
316
317 /* Discard wrong magic numbers. Shouldn't happen. */
318 hdr_val = extract_unsigned_integer
319 (hdr.magic, sizeof (hdr.magic), byte_order);
320 if (hdr_val != BFD_MACH_O_MH_MAGIC && hdr_val != BFD_MACH_O_MH_MAGIC_64)
321 return 0;
322
323 /* Check executable. */
324 hdr_val = extract_unsigned_integer
325 (hdr.filetype, sizeof (hdr.filetype), byte_order);
326 if (hdr_val == BFD_MACH_O_MH_EXECUTE)
327 return load_addr;
328
329 return 0;
330}
331
332/* Get the load address of the executable using dyld list of images.
333 We assume that the dyld info are correct (which is wrong if the target
334 is stopped at the first instruction). */
335
336static CORE_ADDR
337darwin_read_exec_load_addr_from_dyld (struct darwin_info *info)
4141a416
JB
338{
339 struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
4141a416
JB
340 int ptr_len = TYPE_LENGTH (ptr_type);
341 unsigned int image_info_size = ptr_len * 3;
342 int i;
343
344 /* Read infos for each solib. One of them should be the executable. */
345 for (i = 0; i < info->all_image.count; i++)
346 {
347 CORE_ADDR iinfo = info->all_image.info + i * image_info_size;
e362b510 348 gdb_byte buf[image_info_size];
4141a416 349 CORE_ADDR load_addr;
4141a416
JB
350
351 /* Read image info from inferior. */
352 if (target_read_memory (iinfo, buf, image_info_size))
353 break;
354
355 load_addr = extract_typed_address (buf, ptr_type);
ad2073b0 356 if (darwin_validate_exec_header (load_addr) == load_addr)
4141a416
JB
357 return load_addr;
358 }
359
360 return 0;
361}
362
ad2073b0
TG
363/* Get the load address of the executable when the PC is at the dyld
364 entry point using parameter passed by the kernel (at SP). */
365
366static CORE_ADDR
367darwin_read_exec_load_addr_at_init (struct darwin_info *info)
368{
369 struct gdbarch *gdbarch = target_gdbarch ();
370 enum bfd_endian byte_order = gdbarch_byte_order (gdbarch);
371 int addr_size = gdbarch_addr_bit (gdbarch) / 8;
372 ULONGEST load_ptr_addr;
373 ULONGEST load_addr;
374 gdb_byte buf[8];
375
376 /* Get SP. */
377 if (regcache_cooked_read_unsigned (get_current_regcache (),
378 gdbarch_sp_regnum (gdbarch),
379 &load_ptr_addr) != REG_VALID)
380 return 0;
381
382 /* Read value at SP (image load address). */
383 if (target_read_memory (load_ptr_addr, buf, addr_size))
384 return 0;
385
386 load_addr = extract_unsigned_integer (buf, addr_size, byte_order);
387
388 return darwin_validate_exec_header (load_addr);
389}
390
cf1061c0
TG
391/* Return 1 if PC lies in the dynamic symbol resolution code of the
392 run time loader. */
066d7383 393
693be288 394static int
cf1061c0
TG
395darwin_in_dynsym_resolve_code (CORE_ADDR pc)
396{
397 return 0;
398}
399
0cd61f44
TT
400/* A wrapper for bfd_mach_o_fat_extract that handles reference
401 counting properly. This will either return NULL, or return a new
402 reference to a BFD. */
403
192b62ce 404static gdb_bfd_ref_ptr
0cd61f44
TT
405gdb_bfd_mach_o_fat_extract (bfd *abfd, bfd_format format,
406 const bfd_arch_info_type *arch)
407{
408 bfd *result = bfd_mach_o_fat_extract (abfd, format, arch);
409
410 if (result == NULL)
411 return NULL;
412
413 if (result == abfd)
414 gdb_bfd_ref (result);
415 else
416 gdb_bfd_mark_parent (result, abfd);
417
192b62ce 418 return gdb_bfd_ref_ptr (result);
0cd61f44
TT
419}
420
79b32f4a 421/* Return the BFD for the program interpreter. */
066d7383 422
79b32f4a
XR
423static gdb_bfd_ref_ptr
424darwin_get_dyld_bfd ()
cf1061c0 425{
001f13d8 426 char *interp_name;
f00c55f8
TG
427
428 /* This method doesn't work with an attached process. */
429 if (current_inferior ()->attach_flag)
79b32f4a 430 return NULL;
cf1061c0 431
cf1061c0
TG
432 /* Find the program interpreter. */
433 interp_name = find_program_interpreter ();
434 if (!interp_name)
79b32f4a 435 return NULL;
cf1061c0
TG
436
437 /* Create a bfd for the interpreter. */
ad80db5b 438 gdb_bfd_ref_ptr dyld_bfd (gdb_bfd_open (interp_name, gnutarget));
192b62ce 439 if (dyld_bfd != NULL)
cf1061c0 440 {
192b62ce
TT
441 gdb_bfd_ref_ptr sub
442 (gdb_bfd_mach_o_fat_extract (dyld_bfd.get (), bfd_object,
443 gdbarch_bfd_arch_info (target_gdbarch ())));
cd5a152c 444 dyld_bfd = sub;
d6ad71ba 445 }
79b32f4a
XR
446 return dyld_bfd;
447}
448
449/* Extract dyld_all_image_addr when the process was just created, assuming the
450 current PC is at the entry of the dynamic linker. */
451
452static void
453darwin_solib_get_all_image_info_addr_at_init (struct darwin_info *info)
454{
455 CORE_ADDR load_addr = 0;
456 gdb_bfd_ref_ptr dyld_bfd = darwin_get_dyld_bfd ();
457
192b62ce
TT
458 if (dyld_bfd == NULL)
459 return;
70d4c673 460
f00c55f8
TG
461 /* We find the dynamic linker's base address by examining
462 the current pc (which should point at the entry point for the
463 dynamic linker) and subtracting the offset of the entry point. */
464 load_addr = (regcache_read_pc (get_current_regcache ())
dda83cd7 465 - bfd_get_start_address (dyld_bfd.get ()));
cf1061c0
TG
466
467 /* Now try to set a breakpoint in the dynamic linker. */
ec95993c 468 info->all_image_addr =
192b62ce 469 lookup_symbol_from_bfd (dyld_bfd.get (), "_dyld_all_image_infos");
cf1061c0 470
ec95993c 471 if (info->all_image_addr == 0)
cf1061c0
TG
472 return;
473
ec95993c 474 info->all_image_addr += load_addr;
f00c55f8
TG
475}
476
ad2073b0 477/* Extract dyld_all_image_addr reading it from
f00c55f8
TG
478 TARGET_OBJECT_DARWIN_DYLD_INFO. */
479
480static void
ec95993c 481darwin_solib_read_all_image_info_addr (struct darwin_info *info)
f00c55f8 482{
ad2073b0 483 gdb_byte buf[8];
f00c55f8 484 LONGEST len;
ad2073b0
TG
485 struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
486
487 /* Sanity check. */
132874d7 488 if (TYPE_LENGTH (ptr_type) > sizeof (buf))
ad2073b0 489 return;
f00c55f8 490
328d42d8
SM
491 len = target_read (current_inferior ()->top_target (),
492 TARGET_OBJECT_DARWIN_DYLD_INFO,
8b88a78e 493 NULL, buf, 0, TYPE_LENGTH (ptr_type));
ad2073b0 494 if (len <= 0)
f00c55f8
TG
495 return;
496
ad2073b0
TG
497 /* The use of BIG endian is intended, as BUF is a raw stream of bytes. This
498 makes the support of remote protocol easier. */
499 info->all_image_addr = extract_unsigned_integer (buf, len, BFD_ENDIAN_BIG);
f00c55f8
TG
500}
501
502/* Shared library startup support. See documentation in solib-svr4.c. */
503
504static void
505darwin_solib_create_inferior_hook (int from_tty)
506{
5d91a235
SM
507 /* Everything below only makes sense if we have a running inferior. */
508 if (!target_has_execution ())
509 return;
510
ec95993c 511 struct darwin_info *info = get_darwin_info ();
4141a416 512 CORE_ADDR load_addr;
ec95993c
TG
513
514 info->all_image_addr = 0;
f00c55f8 515
ec95993c 516 darwin_solib_read_all_image_info_addr (info);
f00c55f8 517
ec95993c
TG
518 if (info->all_image_addr == 0)
519 darwin_solib_get_all_image_info_addr_at_init (info);
f00c55f8 520
ec95993c 521 if (info->all_image_addr == 0)
f00c55f8 522 return;
cf1061c0 523
ec95993c 524 darwin_load_image_infos (info);
cf1061c0 525
4141a416 526 if (!darwin_dyld_version_ok (info))
d4ccb5e0
TG
527 {
528 warning (_("unhandled dyld version (%d)"), info->all_image.version);
529 return;
530 }
4141a416 531
ad2073b0
TG
532 if (info->all_image.count != 0)
533 {
534 /* Possible relocate the main executable (PIE). */
535 load_addr = darwin_read_exec_load_addr_from_dyld (info);
536 }
537 else
538 {
539 /* Possible issue:
540 Do not break on the notifier if dyld is not initialized (deduced from
541 count == 0). In that case, dyld hasn't relocated itself and the
542 notifier may point to a wrong address. */
543
544 load_addr = darwin_read_exec_load_addr_at_init (info);
545 }
546
a42d7dd8 547 if (load_addr != 0 && current_program_space->symfile_object_file != NULL)
4141a416 548 {
1bdad2e0 549 CORE_ADDR vmaddr;
4141a416
JB
550
551 /* Find the base address of the executable. */
7e10abd1 552 vmaddr = bfd_mach_o_get_base_address (current_program_space->exec_bfd ());
4141a416
JB
553
554 /* Relocate. */
555 if (vmaddr != load_addr)
a42d7dd8
TT
556 objfile_rebase (current_program_space->symfile_object_file,
557 load_addr - vmaddr);
4141a416 558 }
79b32f4a
XR
559
560 /* Set solib notifier (to reload list of shared libraries). */
561 CORE_ADDR notifier = info->all_image.notifier;
562
563 if (info->all_image.count == 0)
564 {
565 /* Dyld hasn't yet relocated itself, so the notifier address may
566 be incorrect (as it has to be relocated). */
7e10abd1
TT
567 CORE_ADDR start
568 = bfd_get_start_address (current_program_space->exec_bfd ());
79b32f4a
XR
569 if (start == 0)
570 notifier = 0;
571 else
dda83cd7
SM
572 {
573 gdb_bfd_ref_ptr dyld_bfd = darwin_get_dyld_bfd ();
574 if (dyld_bfd != NULL)
575 {
576 CORE_ADDR dyld_bfd_start_address;
577 CORE_ADDR dyld_relocated_base_address;
578 CORE_ADDR pc;
579
580 dyld_bfd_start_address = bfd_get_start_address (dyld_bfd.get());
581
582 /* We find the dynamic linker's base address by examining
583 the current pc (which should point at the entry point
584 for the dynamic linker) and subtracting the offset of
585 the entry point. */
586
587 pc = regcache_read_pc (get_current_regcache ());
588 dyld_relocated_base_address = pc - dyld_bfd_start_address;
589
590 /* We get the proper notifier relocated address by
591 adding the dyld relocated base address to the current
592 notifier offset value. */
593
594 notifier += dyld_relocated_base_address;
595 }
596 }
79b32f4a
XR
597 }
598
599 /* Add the breakpoint which is hit by dyld when the list of solib is
600 modified. */
601 if (notifier != 0)
602 create_solib_event_breakpoint (target_gdbarch (), notifier);
cf1061c0
TG
603}
604
605static void
606darwin_clear_solib (void)
607{
ec95993c
TG
608 struct darwin_info *info = get_darwin_info ();
609
610 info->all_image_addr = 0;
611 info->all_image.version = 0;
cf1061c0
TG
612}
613
614static void
615darwin_free_so (struct so_list *so)
616{
9ccbfd7b
SM
617 lm_info_darwin *li = (lm_info_darwin *) so->lm_info;
618
619 delete li;
cf1061c0
TG
620}
621
622/* The section table is built from bfd sections using bfd VMAs.
623 Relocate these VMAs according to solib info. */
066d7383 624
cf1061c0
TG
625static void
626darwin_relocate_section_addresses (struct so_list *so,
0542c86d 627 struct target_section *sec)
cf1061c0 628{
d0e449a1
SM
629 lm_info_darwin *li = (lm_info_darwin *) so->lm_info;
630
631 sec->addr += li->lm_addr;
632 sec->endaddr += li->lm_addr;
cf1061c0
TG
633
634 /* Best effort to set addr_high/addr_low. This is used only by
635 'info sharedlibary'. */
636 if (so->addr_high == 0)
637 {
638 so->addr_low = sec->addr;
639 so->addr_high = sec->endaddr;
640 }
641 if (sec->endaddr > so->addr_high)
642 so->addr_high = sec->endaddr;
643 if (sec->addr < so->addr_low)
644 so->addr_low = sec->addr;
645}
646\f
192b62ce 647static gdb_bfd_ref_ptr
692d6f97 648darwin_bfd_open (const char *pathname)
cf1061c0 649{
cf1061c0 650 int found_file;
cf1061c0
TG
651
652 /* Search for shared library file. */
797bc1cb
TT
653 gdb::unique_xmalloc_ptr<char> found_pathname
654 = solib_find (pathname, &found_file);
cf1061c0
TG
655 if (found_pathname == NULL)
656 perror_with_name (pathname);
657
658 /* Open bfd for shared library. */
797bc1cb 659 gdb_bfd_ref_ptr abfd (solib_bfd_fopen (found_pathname.get (), found_file));
cf1061c0 660
192b62ce
TT
661 gdb_bfd_ref_ptr res
662 (gdb_bfd_mach_o_fat_extract (abfd.get (), bfd_object,
663 gdbarch_bfd_arch_info (target_gdbarch ())));
664 if (res == NULL)
665 error (_("`%s': not a shared-library: %s"),
666 bfd_get_filename (abfd.get ()), bfd_errmsg (bfd_get_error ()));
0cd61f44 667
b030cf11
JB
668 /* The current filename for fat-binary BFDs is a name generated
669 by BFD, usually a string containing the name of the architecture.
670 Reset its value to the actual filename. */
7b958a48 671 bfd_set_filename (res.get (), pathname);
b030cf11 672
cf1061c0
TG
673 return res;
674}
675
676struct target_so_ops darwin_so_ops;
677
6c265988 678void _initialize_darwin_solib ();
cf1061c0 679void
6c265988 680_initialize_darwin_solib ()
cf1061c0
TG
681{
682 darwin_so_ops.relocate_section_addresses = darwin_relocate_section_addresses;
683 darwin_so_ops.free_so = darwin_free_so;
684 darwin_so_ops.clear_solib = darwin_clear_solib;
685 darwin_so_ops.solib_create_inferior_hook = darwin_solib_create_inferior_hook;
cf1061c0
TG
686 darwin_so_ops.current_sos = darwin_current_sos;
687 darwin_so_ops.open_symbol_file_object = open_symbol_file_object;
688 darwin_so_ops.in_dynsym_resolve_code = darwin_in_dynsym_resolve_code;
cf1061c0
TG
689 darwin_so_ops.bfd_open = darwin_bfd_open;
690}
This page took 1.410474 seconds and 4 git commands to generate.