2011-01-11 Michael Snyder <msnyder@vmware.com>
[deliverable/binutils-gdb.git] / gdb / solib-som.c
CommitLineData
fbdbf38b 1/* Handle SOM shared libraries.
419b8bfb 2
7b6bb8da 3 Copyright (C) 2004, 2005, 2007, 2008, 2009, 2010, 2011
4c38e0a4 4 Free Software Foundation, Inc.
419b8bfb
RC
5
6 This file is part of GDB.
7
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
a9762ec7 10 the Free Software Foundation; either version 3 of the License, or
419b8bfb
RC
11 (at your option) any later version.
12
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
a9762ec7 19 along with this program. If not, see <http://www.gnu.org/licenses/>. */
419b8bfb
RC
20
21#include "defs.h"
419b8bfb
RC
22#include "symtab.h"
23#include "bfd.h"
24#include "symfile.h"
25#include "objfiles.h"
26#include "gdbcore.h"
27#include "target.h"
28#include "inferior.h"
29
30#include "hppa-tdep.h"
31#include "solist.h"
d542061a 32#include "solib.h"
63807e1d 33#include "solib-som.h"
419b8bfb 34
7be67755
DA
35#include <sys/utsname.h>
36#include <string.h>
37
419b8bfb
RC
38#undef SOLIB_SOM_DBG
39
40/* These ought to be defined in some public interface, but aren't. They
41 define the meaning of the various bits in the distinguished __dld_flags
42 variable that is declared in every debuggable a.out on HP-UX, and that
c378eb4e
MS
43 is shared between the debugger and the dynamic linker. */
44
419b8bfb
RC
45#define DLD_FLAGS_MAPPRIVATE 0x1
46#define DLD_FLAGS_HOOKVALID 0x2
47#define DLD_FLAGS_LISTVALID 0x4
48#define DLD_FLAGS_BOR_ENABLE 0x8
49
50struct lm_info
51 {
3e43a32a
MS
52 /* Version of this structure (it is expected to change again in
53 hpux10). */
419b8bfb
RC
54 unsigned char struct_version;
55
56 /* Binding mode for this library. */
57 unsigned char bind_mode;
58
59 /* Version of this library. */
60 short library_version;
61
62 /* Start of text address,
63 link-time text location (length of text area),
64 end of text address. */
65 CORE_ADDR text_addr;
66 CORE_ADDR text_link_addr;
67 CORE_ADDR text_end;
68
69 /* Start of data, start of bss and end of data. */
70 CORE_ADDR data_start;
71 CORE_ADDR bss_start;
72 CORE_ADDR data_end;
73
74 /* Value of linkage pointer (%r19). */
75 CORE_ADDR got_value;
76
77 /* Address in target of offset from thread-local register of
78 start of this thread's data. I.e., the first thread-local
79 variable in this shared library starts at *(tsd_start_addr)
80 from that area pointed to by cr27 (mpsfu_hi).
81
82 We do the indirection as soon as we read it, so from then
83 on it's the offset itself. */
84 CORE_ADDR tsd_start_addr;
85
86 /* Address of the link map entry in the loader. */
87 CORE_ADDR lm_addr;
88 };
89
90/* These addresses should be filled in by som_solib_create_inferior_hook.
c378eb4e
MS
91 They are also used elsewhere in this module. */
92
419b8bfb
RC
93typedef struct
94 {
95 CORE_ADDR address;
96 struct unwind_table_entry *unwind;
97 }
98addr_and_unwind_t;
99
c378eb4e 100/* When adding fields, be sure to clear them in _initialize_som_solib. */
419b8bfb
RC
101static struct
102 {
103 int is_valid;
104 addr_and_unwind_t hook;
105 addr_and_unwind_t hook_stub;
106 addr_and_unwind_t load;
107 addr_and_unwind_t load_stub;
108 addr_and_unwind_t unload;
109 addr_and_unwind_t unload2;
110 addr_and_unwind_t unload_stub;
111 }
112dld_cache;
113
114static void
115som_relocate_section_addresses (struct so_list *so,
0542c86d 116 struct target_section *sec)
419b8bfb
RC
117{
118 flagword aflag = bfd_get_section_flags(so->abfd, sec->the_bfd_section);
119
419b8bfb
RC
120 if (aflag & SEC_CODE)
121 {
122 sec->addr += so->lm_info->text_addr - so->lm_info->text_link_addr;
123 sec->endaddr += so->lm_info->text_addr - so->lm_info->text_link_addr;
124 }
125 else if (aflag & SEC_DATA)
126 {
127 sec->addr += so->lm_info->data_start;
128 sec->endaddr += so->lm_info->data_start;
129 }
130 else
131 ;
132}
133
7be67755
DA
134/* Get HP-UX major release number. Returns zero if the
135 release is not known. */
136
137static int
138get_hpux_major_release (void)
139{
140 static int hpux_major_release = -1;
141
142 if (hpux_major_release == -1)
143 {
144 struct utsname x;
145 char *p;
146
147 uname (&x);
148 p = strchr (x.release, '.');
149 hpux_major_release = p ? atoi (p + 1) : 0;
150 }
151
152 return hpux_major_release;
153}
154
155/* DL header flag defines. */
156#define SHLIB_TEXT_PRIVATE_ENABLE 0x4000
157
158/* The DL header is documented in <shl.h>. We are only interested
159 in the flags field to determine whether the executable wants shared
160 libraries mapped private. */
161struct {
162 short junk[37];
163 short flags;
164} dl_header;
165
419b8bfb
RC
166/* This hook gets called just before the first instruction in the
167 inferior process is executed.
168
169 This is our opportunity to set magic flags in the inferior so
170 that GDB can be notified when a shared library is mapped in and
171 to tell the dynamic linker that a private copy of the library is
172 needed (so GDB can set breakpoints in the library).
173
174 __dld_flags is the location of the magic flags; as of this implementation
175 there are 3 flags of interest:
176
177 bit 0 when set indicates that private copies of the libraries are needed
178 bit 1 when set indicates that the callback hook routine is valid
179 bit 2 when set indicates that the dynamic linker should maintain the
180 __dld_list structure when loading/unloading libraries.
181
182 Note that shared libraries are not mapped in at this time, so we have
183 run the inferior until the libraries are mapped in. Typically this
184 means running until the "_start" is called. */
185
186static void
268a4a75 187som_solib_create_inferior_hook (int from_tty)
419b8bfb 188{
e17a4113 189 enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch);
419b8bfb
RC
190 struct minimal_symbol *msymbol;
191 unsigned int dld_flags, status, have_endo;
192 asection *shlib_info;
193 char buf[4];
419b8bfb
RC
194 CORE_ADDR anaddr;
195
419b8bfb
RC
196 if (symfile_objfile == NULL)
197 return;
198
199 /* First see if the objfile was dynamically linked. */
200 shlib_info = bfd_get_section_by_name (symfile_objfile->obfd, "$SHLIB_INFO$");
201 if (!shlib_info)
202 return;
203
204 /* It's got a $SHLIB_INFO$ section, make sure it's not empty. */
205 if (bfd_section_size (symfile_objfile->obfd, shlib_info) == 0)
206 return;
207
7be67755
DA
208 /* Read the DL header. */
209 bfd_get_section_contents (symfile_objfile->obfd, shlib_info,
210 (char *) &dl_header, 0, sizeof (dl_header));
211
419b8bfb
RC
212 have_endo = 0;
213 /* Slam the pid of the process into __d_pid.
214
215 We used to warn when this failed, but that warning is only useful
216 on very old HP systems (hpux9 and older). The warnings are an
217 annoyance to users of modern systems and foul up the testsuite as
218 well. As a result, the warnings have been disabled. */
219 msymbol = lookup_minimal_symbol ("__d_pid", NULL, symfile_objfile);
220 if (msymbol == NULL)
221 goto keep_going;
222
223 anaddr = SYMBOL_VALUE_ADDRESS (msymbol);
e17a4113 224 store_unsigned_integer (buf, 4, byte_order, PIDGET (inferior_ptid));
419b8bfb
RC
225 status = target_write_memory (anaddr, buf, 4);
226 if (status != 0)
227 {
ac74f770
MS
228 warning (_("\
229Unable to write __d_pid.\n\
230Suggest linking with /opt/langtools/lib/end.o.\n\
231GDB will be unable to track shl_load/shl_unload calls"));
419b8bfb
RC
232 goto keep_going;
233 }
234
235 /* Get the value of _DLD_HOOK (an export stub) and put it in __dld_hook;
236 This will force the dynamic linker to call __d_trap when significant
237 events occur.
238
239 Note that the above is the pre-HP-UX 9.0 behaviour. At 9.0 and above,
240 the dld provides an export stub named "__d_trap" as well as the
241 function named "__d_trap" itself, but doesn't provide "_DLD_HOOK".
c378eb4e
MS
242 We'll look first for the old flavor and then the new. */
243
419b8bfb
RC
244 msymbol = lookup_minimal_symbol ("_DLD_HOOK", NULL, symfile_objfile);
245 if (msymbol == NULL)
246 msymbol = lookup_minimal_symbol ("__d_trap", NULL, symfile_objfile);
247 if (msymbol == NULL)
248 {
ac74f770
MS
249 warning (_("\
250Unable to find _DLD_HOOK symbol in object file.\n\
251Suggest linking with /opt/langtools/lib/end.o.\n\
252GDB will be unable to track shl_load/shl_unload calls"));
419b8bfb
RC
253 goto keep_going;
254 }
255 anaddr = SYMBOL_VALUE_ADDRESS (msymbol);
256 dld_cache.hook.address = anaddr;
257
258 /* Grrr, this might not be an export symbol! We have to find the
259 export stub. */
ff644745
JB
260 msymbol = hppa_lookup_stub_minimal_symbol (SYMBOL_LINKAGE_NAME (msymbol),
261 EXPORT);
262 if (msymbol != NULL)
263 {
264 anaddr = SYMBOL_VALUE (msymbol);
265 dld_cache.hook_stub.address = anaddr;
266 }
e17a4113 267 store_unsigned_integer (buf, 4, byte_order, anaddr);
419b8bfb
RC
268
269 msymbol = lookup_minimal_symbol ("__dld_hook", NULL, symfile_objfile);
270 if (msymbol == NULL)
271 {
ac74f770
MS
272 warning (_("\
273Unable to find __dld_hook symbol in object file.\n\
274Suggest linking with /opt/langtools/lib/end.o.\n\
275GDB will be unable to track shl_load/shl_unload calls"));
419b8bfb
RC
276 goto keep_going;
277 }
278 anaddr = SYMBOL_VALUE_ADDRESS (msymbol);
279 status = target_write_memory (anaddr, buf, 4);
280
281 /* Now set a shlib_event breakpoint at __d_trap so we can track
282 significant shared library events. */
283 msymbol = lookup_minimal_symbol ("__d_trap", NULL, symfile_objfile);
284 if (msymbol == NULL)
285 {
ac74f770
MS
286 warning (_("\
287Unable to find __dld_d_trap symbol in object file.\n\
288Suggest linking with /opt/langtools/lib/end.o.\n\
289GDB will be unable to track shl_load/shl_unload calls"));
419b8bfb
RC
290 goto keep_going;
291 }
a6d9a66e
UW
292 create_solib_event_breakpoint (target_gdbarch,
293 SYMBOL_VALUE_ADDRESS (msymbol));
419b8bfb
RC
294
295 /* We have all the support usually found in end.o, so we can track
296 shl_load and shl_unload calls. */
297 have_endo = 1;
298
299keep_going:
300
301 /* Get the address of __dld_flags, if no such symbol exists, then we can
302 not debug the shared code. */
303 msymbol = lookup_minimal_symbol ("__dld_flags", NULL, NULL);
304 if (msymbol == NULL)
305 {
8a3fe4f8 306 error (_("Unable to find __dld_flags symbol in object file."));
419b8bfb
RC
307 }
308
309 anaddr = SYMBOL_VALUE_ADDRESS (msymbol);
310
311 /* Read the current contents. */
312 status = target_read_memory (anaddr, buf, 4);
313 if (status != 0)
8a3fe4f8 314 error (_("Unable to read __dld_flags."));
e17a4113 315 dld_flags = extract_unsigned_integer (buf, 4, byte_order);
419b8bfb 316
7be67755
DA
317 /* If the libraries were not mapped private on HP-UX 11 and later, warn
318 the user. On HP-UX 10 and earlier, there is no easy way to specify
319 that shared libraries should be privately mapped. So, we just force
320 private mapping. */
321 if (get_hpux_major_release () >= 11
322 && (dl_header.flags & SHLIB_TEXT_PRIVATE_ENABLE) == 0
323 && (dld_flags & DLD_FLAGS_MAPPRIVATE) == 0)
324 warning
ac74f770
MS
325 (_("\
326Private mapping of shared library text was not specified\n\
327by the executable; setting a breakpoint in a shared library which\n\
328is not privately mapped will not work. See the HP-UX 11i v3 chatr\n\
329manpage for methods to privately map shared library text."));
7be67755 330
419b8bfb 331 /* Turn on the flags we care about. */
7be67755
DA
332 if (get_hpux_major_release () < 11)
333 dld_flags |= DLD_FLAGS_MAPPRIVATE;
419b8bfb
RC
334 if (have_endo)
335 dld_flags |= DLD_FLAGS_HOOKVALID;
e17a4113 336 store_unsigned_integer (buf, 4, byte_order, dld_flags);
419b8bfb
RC
337 status = target_write_memory (anaddr, buf, 4);
338 if (status != 0)
8a3fe4f8 339 error (_("Unable to write __dld_flags."));
419b8bfb 340
c378eb4e 341 /* Now find the address of _start and set a breakpoint there.
419b8bfb
RC
342 We still need this code for two reasons:
343
344 * Not all sites have /opt/langtools/lib/end.o, so it's not always
345 possible to track the dynamic linker's events.
346
347 * At this time no events are triggered for shared libraries
348 loaded at startup time (what a crock). */
349
350 msymbol = lookup_minimal_symbol ("_start", NULL, symfile_objfile);
351 if (msymbol == NULL)
8a3fe4f8 352 error (_("Unable to find _start symbol in object file."));
419b8bfb
RC
353
354 anaddr = SYMBOL_VALUE_ADDRESS (msymbol);
355
356 /* Make the breakpoint at "_start" a shared library event breakpoint. */
a6d9a66e 357 create_solib_event_breakpoint (target_gdbarch, anaddr);
419b8bfb 358
c1e56572 359 clear_symtab_users (0);
419b8bfb
RC
360}
361
419b8bfb
RC
362static void
363som_special_symbol_handling (void)
364{
365}
366
367static void
368som_solib_desire_dynamic_linker_symbols (void)
369{
370 struct objfile *objfile;
371 struct unwind_table_entry *u;
372 struct minimal_symbol *dld_msymbol;
373
374 /* Do we already know the value of these symbols? If so, then
375 we've no work to do.
376
377 (If you add clauses to this test, be sure to likewise update the
c378eb4e
MS
378 test within the loop.) */
379
419b8bfb
RC
380 if (dld_cache.is_valid)
381 return;
382
383 ALL_OBJFILES (objfile)
384 {
385 dld_msymbol = lookup_minimal_symbol ("shl_load", NULL, objfile);
386 if (dld_msymbol != NULL)
387 {
388 dld_cache.load.address = SYMBOL_VALUE (dld_msymbol);
389 dld_cache.load.unwind = find_unwind_entry (dld_cache.load.address);
390 }
391
392 dld_msymbol = lookup_minimal_symbol_solib_trampoline ("shl_load",
393 objfile);
394 if (dld_msymbol != NULL)
395 {
712f90be 396 if (MSYMBOL_TYPE (dld_msymbol) == mst_solib_trampoline)
419b8bfb
RC
397 {
398 u = find_unwind_entry (SYMBOL_VALUE (dld_msymbol));
399 if ((u != NULL) && (u->stub_unwind.stub_type == EXPORT))
400 {
401 dld_cache.load_stub.address = SYMBOL_VALUE (dld_msymbol);
402 dld_cache.load_stub.unwind = u;
403 }
404 }
405 }
406
407 dld_msymbol = lookup_minimal_symbol ("shl_unload", NULL, objfile);
408 if (dld_msymbol != NULL)
409 {
410 dld_cache.unload.address = SYMBOL_VALUE (dld_msymbol);
411 dld_cache.unload.unwind = find_unwind_entry (dld_cache.unload.address);
412
413 /* ??rehrauer: I'm not sure exactly what this is, but it appears
414 that on some HPUX 10.x versions, there's two unwind regions to
415 cover the body of "shl_unload", the second being 4 bytes past
416 the end of the first. This is a large hack to handle that
417 case, but since I don't seem to have any legitimate way to
c378eb4e
MS
418 look for this thing via the symbol table... */
419
419b8bfb
RC
420 if (dld_cache.unload.unwind != NULL)
421 {
422 u = find_unwind_entry (dld_cache.unload.unwind->region_end + 4);
423 if (u != NULL)
424 {
425 dld_cache.unload2.address = u->region_start;
426 dld_cache.unload2.unwind = u;
427 }
428 }
429 }
430
431 dld_msymbol = lookup_minimal_symbol_solib_trampoline ("shl_unload",
432 objfile);
433 if (dld_msymbol != NULL)
434 {
712f90be 435 if (MSYMBOL_TYPE (dld_msymbol) == mst_solib_trampoline)
419b8bfb
RC
436 {
437 u = find_unwind_entry (SYMBOL_VALUE (dld_msymbol));
438 if ((u != NULL) && (u->stub_unwind.stub_type == EXPORT))
439 {
440 dld_cache.unload_stub.address = SYMBOL_VALUE (dld_msymbol);
441 dld_cache.unload_stub.unwind = u;
442 }
443 }
444 }
445
c378eb4e 446 /* Did we find everything we were looking for? If so, stop. */
419b8bfb
RC
447 if ((dld_cache.load.address != 0)
448 && (dld_cache.load_stub.address != 0)
449 && (dld_cache.unload.address != 0)
450 && (dld_cache.unload_stub.address != 0))
451 {
452 dld_cache.is_valid = 1;
453 break;
454 }
455 }
456
457 dld_cache.hook.unwind = find_unwind_entry (dld_cache.hook.address);
458 dld_cache.hook_stub.unwind = find_unwind_entry (dld_cache.hook_stub.address);
459
460 /* We're prepared not to find some of these symbols, which is why
c378eb4e 461 this function is a "desire" operation, and not a "require". */
419b8bfb
RC
462}
463
464static int
465som_in_dynsym_resolve_code (CORE_ADDR pc)
466{
467 struct unwind_table_entry *u_pc;
468
469 /* Are we in the dld itself?
470
471 ??rehrauer: Large hack -- We'll assume that any address in a
472 shared text region is the dld's text. This would obviously
473 fall down if the user attached to a process, whose shlibs
474 weren't mapped to a (writeable) private region. However, in
475 that case the debugger probably isn't able to set the fundamental
476 breakpoint in the dld callback anyways, so this hack should be
c378eb4e
MS
477 safe. */
478
419b8bfb
RC
479 if ((pc & (CORE_ADDR) 0xc0000000) == (CORE_ADDR) 0xc0000000)
480 return 1;
481
482 /* Cache the address of some symbols that are part of the dynamic
c378eb4e
MS
483 linker, if not already known. */
484
419b8bfb
RC
485 som_solib_desire_dynamic_linker_symbols ();
486
c378eb4e 487 /* Are we in the dld callback? Or its export stub? */
419b8bfb
RC
488 u_pc = find_unwind_entry (pc);
489 if (u_pc == NULL)
490 return 0;
491
492 if ((u_pc == dld_cache.hook.unwind) || (u_pc == dld_cache.hook_stub.unwind))
493 return 1;
494
c378eb4e 495 /* Or the interface of the dld (i.e., "shl_load" or friends)? */
419b8bfb
RC
496 if ((u_pc == dld_cache.load.unwind)
497 || (u_pc == dld_cache.unload.unwind)
498 || (u_pc == dld_cache.unload2.unwind)
499 || (u_pc == dld_cache.load_stub.unwind)
500 || (u_pc == dld_cache.unload_stub.unwind))
501 return 1;
502
c378eb4e 503 /* Apparently this address isn't part of the dld's text. */
419b8bfb
RC
504 return 0;
505}
506
507static void
508som_clear_solib (void)
509{
510}
511
512struct dld_list {
513 char name[4];
514 char info[4];
515 char text_addr[4];
516 char text_link_addr[4];
517 char text_end[4];
518 char data_start[4];
519 char bss_start[4];
520 char data_end[4];
521 char got_value[4];
522 char next[4];
523 char tsd_start_addr_ptr[4];
524};
525
526static CORE_ADDR
527link_map_start (void)
528{
e17a4113 529 enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch);
419b8bfb
RC
530 struct minimal_symbol *sym;
531 CORE_ADDR addr;
532 char buf[4];
533 unsigned int dld_flags;
534
535 sym = lookup_minimal_symbol ("__dld_flags", NULL, NULL);
536 if (!sym)
8a3fe4f8 537 error (_("Unable to find __dld_flags symbol in object file."));
419b8bfb
RC
538 addr = SYMBOL_VALUE_ADDRESS (sym);
539 read_memory (addr, buf, 4);
e17a4113 540 dld_flags = extract_unsigned_integer (buf, 4, byte_order);
419b8bfb 541 if ((dld_flags & DLD_FLAGS_LISTVALID) == 0)
8a3fe4f8 542 error (_("__dld_list is not valid according to __dld_flags."));
419b8bfb 543
419b8bfb
RC
544 sym = lookup_minimal_symbol ("__dld_list", NULL, NULL);
545 if (!sym)
546 {
547 /* Older crt0.o files (hpux8) don't have __dld_list as a symbol,
548 but the data is still available if you know where to look. */
549 sym = lookup_minimal_symbol ("__dld_flags", NULL, NULL);
550 if (!sym)
551 {
8a3fe4f8 552 error (_("Unable to find dynamic library list."));
419b8bfb
RC
553 return 0;
554 }
555 addr = SYMBOL_VALUE_ADDRESS (sym) - 8;
556 }
557 else
558 addr = SYMBOL_VALUE_ADDRESS (sym);
559
560 read_memory (addr, buf, 4);
e17a4113 561 addr = extract_unsigned_integer (buf, 4, byte_order);
419b8bfb 562 if (addr == 0)
7fc4b1a1 563 return 0;
419b8bfb
RC
564
565 read_memory (addr, buf, 4);
e17a4113 566 return extract_unsigned_integer (buf, 4, byte_order);
419b8bfb
RC
567}
568
c378eb4e 569/* Does this so's name match the main binary? */
419b8bfb
RC
570static int
571match_main (const char *name)
572{
573 return strcmp (name, symfile_objfile->name) == 0;
574}
575
576static struct so_list *
577som_current_sos (void)
578{
e17a4113 579 enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch);
419b8bfb
RC
580 CORE_ADDR lm;
581 struct so_list *head = 0;
582 struct so_list **link_ptr = &head;
583
584 for (lm = link_map_start (); lm; )
585 {
586 char *namebuf;
587 CORE_ADDR addr;
588 struct so_list *new;
589 struct cleanup *old_chain;
590 int errcode;
591 struct dld_list dbuf;
592 char tsdbuf[4];
593
594 new = (struct so_list *) xmalloc (sizeof (struct so_list));
595 old_chain = make_cleanup (xfree, new);
596
597 memset (new, 0, sizeof (*new));
598 new->lm_info = xmalloc (sizeof (struct lm_info));
599 make_cleanup (xfree, new->lm_info);
600
fbdbf38b 601 read_memory (lm, (gdb_byte *)&dbuf, sizeof (struct dld_list));
419b8bfb 602
fbdbf38b 603 addr = extract_unsigned_integer ((gdb_byte *)&dbuf.name,
e17a4113 604 sizeof (dbuf.name), byte_order);
419b8bfb
RC
605 target_read_string (addr, &namebuf, SO_NAME_MAX_PATH_SIZE - 1, &errcode);
606 if (errcode != 0)
8a3fe4f8
AC
607 warning (_("Can't read pathname for load map: %s."),
608 safe_strerror (errcode));
419b8bfb
RC
609 else
610 {
611 strncpy (new->so_name, namebuf, SO_NAME_MAX_PATH_SIZE - 1);
612 new->so_name[SO_NAME_MAX_PATH_SIZE - 1] = '\0';
613 xfree (namebuf);
614 strcpy (new->so_original_name, new->so_name);
615 }
616
617 if (new->so_name[0] && !match_main (new->so_name))
618 {
619 struct lm_info *lmi = new->lm_info;
620 unsigned int tmp;
621
622 lmi->lm_addr = lm;
623
624#define EXTRACT(_fld) \
e17a4113
UW
625 extract_unsigned_integer ((gdb_byte *)&dbuf._fld, \
626 sizeof (dbuf._fld), byte_order);
419b8bfb
RC
627
628 lmi->text_addr = EXTRACT (text_addr);
629 tmp = EXTRACT (info);
630 lmi->library_version = (tmp >> 16) & 0xffff;
631 lmi->bind_mode = (tmp >> 8) & 0xff;
632 lmi->struct_version = tmp & 0xff;
633 lmi->text_link_addr = EXTRACT (text_link_addr);
634 lmi->text_end = EXTRACT (text_end);
635 lmi->data_start = EXTRACT (data_start);
636 lmi->bss_start = EXTRACT (bss_start);
637 lmi->data_end = EXTRACT (data_end);
638 lmi->got_value = EXTRACT (got_value);
639 tmp = EXTRACT (tsd_start_addr_ptr);
640 read_memory (tmp, tsdbuf, 4);
e17a4113
UW
641 lmi->tsd_start_addr
642 = extract_unsigned_integer (tsdbuf, 4, byte_order);
419b8bfb
RC
643
644#ifdef SOLIB_SOM_DBG
5af949e3
UW
645 printf ("\n+ library \"%s\" is described at %s\n", new->so_name,
646 paddress (target_gdbarch, lm));
419b8bfb
RC
647 printf (" 'version' is %d\n", new->lm_info->struct_version);
648 printf (" 'bind_mode' is %d\n", new->lm_info->bind_mode);
649 printf (" 'library_version' is %d\n",
650 new->lm_info->library_version);
5af949e3
UW
651 printf (" 'text_addr' is %s\n",
652 paddress (target_gdbarch, new->lm_info->text_addr));
653 printf (" 'text_link_addr' is %s\n",
654 paddress (target_gdbarch, new->lm_info->text_link_addr));
655 printf (" 'text_end' is %s\n",
656 paddress (target_gdbarch, new->lm_info->text_end));
657 printf (" 'data_start' is %s\n",
658 paddress (target_gdbarch, new->lm_info->data_start));
659 printf (" 'bss_start' is %s\n",
660 paddress (target_gdbarch, new->lm_info->bss_start));
661 printf (" 'data_end' is %s\n",
662 paddress (target_gdbarch, new->lm_info->data_end));
663 printf (" 'got_value' is %s\n",
664 paddress (target_gdbarch, new->lm_info->got_value));
665 printf (" 'tsd_start_addr' is %s\n",
666 paddress (target_gdbarch, new->lm_info->tsd_start_addr));
419b8bfb
RC
667#endif
668
cfa9d6d9
DJ
669 new->addr_low = lmi->text_addr;
670 new->addr_high = lmi->text_end;
671
419b8bfb
RC
672 /* Link the new object onto the list. */
673 new->next = NULL;
674 *link_ptr = new;
675 link_ptr = &new->next;
676 }
677 else
678 {
679 free_so (new);
680 }
681
682 lm = EXTRACT (next);
683 discard_cleanups (old_chain);
684#undef EXTRACT
685 }
686
687 /* TODO: The original somsolib code has logic to detect and eliminate
688 duplicate entries. Do we need that? */
689
690 return head;
691}
692
693static int
694som_open_symbol_file_object (void *from_ttyp)
695{
e17a4113 696 enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch);
419b8bfb
RC
697 CORE_ADDR lm, l_name;
698 char *filename;
699 int errcode;
700 int from_tty = *(int *)from_ttyp;
701 char buf[4];
702
703 if (symfile_objfile)
9e2f0ad4 704 if (!query (_("Attempt to reload symbols from process? ")))
419b8bfb
RC
705 return 0;
706
707 /* First link map member should be the executable. */
708 if ((lm = link_map_start ()) == 0)
c378eb4e 709 return 0; /* failed somehow... */
419b8bfb
RC
710
711 /* Read address of name from target memory to GDB. */
712 read_memory (lm + offsetof (struct dld_list, name), buf, 4);
713
714 /* Convert the address to host format. Assume that the address is
715 unsigned. */
e17a4113 716 l_name = extract_unsigned_integer (buf, 4, byte_order);
419b8bfb
RC
717
718 if (l_name == 0)
719 return 0; /* No filename. */
720
721 /* Now fetch the filename from target memory. */
722 target_read_string (l_name, &filename, SO_NAME_MAX_PATH_SIZE - 1, &errcode);
723
724 if (errcode)
725 {
8a3fe4f8 726 warning (_("failed to read exec filename from attached file: %s"),
419b8bfb
RC
727 safe_strerror (errcode));
728 return 0;
729 }
730
731 make_cleanup (xfree, filename);
732 /* Have a pathname: read the symbol file. */
733 symbol_file_add_main (filename, from_tty);
734
735 return 1;
736}
737
738static void
739som_free_so (struct so_list *so)
740{
741 xfree (so->lm_info);
742}
743
744static CORE_ADDR
745som_solib_thread_start_addr (struct so_list *so)
746{
747 return so->lm_info->tsd_start_addr;
748}
749
750/* Return the GOT value for the shared library in which ADDR belongs. If
751 ADDR isn't in any known shared library, return zero. */
752
753static CORE_ADDR
754som_solib_get_got_by_pc (CORE_ADDR addr)
755{
756 struct so_list *so_list = master_so_list ();
757 CORE_ADDR got_value = 0;
758
759 while (so_list)
760 {
761 if (so_list->lm_info->text_addr <= addr
762 && so_list->lm_info->text_end > addr)
763 {
764 got_value = so_list->lm_info->got_value;
765 break;
766 }
767 so_list = so_list->next;
768 }
769 return got_value;
770}
771
3e43a32a
MS
772/* Return the address of the handle of the shared library in which
773 ADDR belongs. If ADDR isn't in any known shared library, return
774 zero. */
c378eb4e
MS
775/* This function is used in initialize_hp_cxx_exception_support in
776 hppa-hpux-tdep.c. */
419b8bfb
RC
777
778static CORE_ADDR
779som_solib_get_solib_by_pc (CORE_ADDR addr)
780{
781 struct so_list *so_list = master_so_list ();
782
783 while (so_list)
784 {
785 if (so_list->lm_info->text_addr <= addr
786 && so_list->lm_info->text_end > addr)
787 {
788 break;
789 }
790 so_list = so_list->next;
791 }
792 if (so_list)
793 return so_list->lm_info->lm_addr;
794 else
795 return 0;
796}
797
798
799static struct target_so_ops som_so_ops;
800
801extern initialize_file_ftype _initialize_som_solib; /* -Wmissing-prototypes */
802
803void
804_initialize_som_solib (void)
805{
806 som_so_ops.relocate_section_addresses = som_relocate_section_addresses;
807 som_so_ops.free_so = som_free_so;
808 som_so_ops.clear_solib = som_clear_solib;
809 som_so_ops.solib_create_inferior_hook = som_solib_create_inferior_hook;
810 som_so_ops.special_symbol_handling = som_special_symbol_handling;
811 som_so_ops.current_sos = som_current_sos;
812 som_so_ops.open_symbol_file_object = som_open_symbol_file_object;
813 som_so_ops.in_dynsym_resolve_code = som_in_dynsym_resolve_code;
831a0c44 814 som_so_ops.bfd_open = solib_bfd_open;
419b8bfb
RC
815}
816
63807e1d
PA
817void
818som_solib_select (struct gdbarch *gdbarch)
419b8bfb 819{
d542061a 820 struct gdbarch_tdep *tdep = gdbarch_tdep (gdbarch);
419b8bfb 821
433759f7 822 set_solib_ops (gdbarch, &som_so_ops);
419b8bfb
RC
823 tdep->solib_thread_start_addr = som_solib_thread_start_addr;
824 tdep->solib_get_got_by_pc = som_solib_get_got_by_pc;
825 tdep->solib_get_solib_by_pc = som_solib_get_solib_by_pc;
826}
827
828/* The rest of these functions are not part of the solib interface; they
c378eb4e 829 are used by somread.c or hppa-hpux-tdep.c. */
419b8bfb
RC
830
831int
832som_solib_section_offsets (struct objfile *objfile,
833 struct section_offsets *offsets)
834{
835 struct so_list *so_list = master_so_list ();
836
837 while (so_list)
838 {
839 /* Oh what a pain! We need the offsets before so_list->objfile
840 is valid. The BFDs will never match. Make a best guess. */
841 if (strstr (objfile->name, so_list->so_name))
842 {
843 asection *private_section;
844
845 /* The text offset is easy. */
846 offsets->offsets[SECT_OFF_TEXT (objfile)]
847 = (so_list->lm_info->text_addr
848 - so_list->lm_info->text_link_addr);
849 offsets->offsets[SECT_OFF_RODATA (objfile)]
850 = ANOFFSET (offsets, SECT_OFF_TEXT (objfile));
851
852 /* We should look at presumed_dp in the SOM header, but
853 that's not easily available. This should be OK though. */
854 private_section = bfd_get_section_by_name (objfile->obfd,
855 "$PRIVATE$");
856 if (!private_section)
857 {
8a3fe4f8 858 warning (_("Unable to find $PRIVATE$ in shared library!"));
419b8bfb
RC
859 offsets->offsets[SECT_OFF_DATA (objfile)] = 0;
860 offsets->offsets[SECT_OFF_BSS (objfile)] = 0;
861 return 1;
862 }
863 offsets->offsets[SECT_OFF_DATA (objfile)]
864 = (so_list->lm_info->data_start - private_section->vma);
865 offsets->offsets[SECT_OFF_BSS (objfile)]
866 = ANOFFSET (offsets, SECT_OFF_DATA (objfile));
867 return 1;
868 }
869 so_list = so_list->next;
870 }
871 return 0;
872}
This page took 0.677849 seconds and 4 git commands to generate.