1 /* Target-dependent code for HP-UX on PA-RISC.
3 Copyright 2002, 2003, 2004 Free Software Foundation, Inc.
5 This file is part of GDB.
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 59 Temple Place - Suite 330,
20 Boston, MA 02111-1307, USA. */
23 #include "arch-utils.h"
27 #include "frame-unwind.h"
28 #include "trad-frame.h"
34 #include "hppa-tdep.h"
35 #include "solib-som.h"
36 #include "solib-pa64.h"
38 #include "exceptions.h"
40 #include "gdb_string.h"
43 #include <machine/save_state.h>
46 #define offsetof(TYPE, MEMBER) ((unsigned long) &((TYPE *)0)->MEMBER)
49 #define IS_32BIT_TARGET(_gdbarch) \
50 ((gdbarch_tdep (_gdbarch))->bytes_per_address == 4)
52 /* Forward declarations. */
53 extern void _initialize_hppa_hpux_tdep (void);
54 extern initialize_file_ftype _initialize_hppa_hpux_tdep
;
58 struct minimal_symbol
*msym
;
59 CORE_ADDR solib_handle
;
65 in_opd_section (CORE_ADDR pc
)
67 struct obj_section
*s
;
70 s
= find_pc_section (pc
);
73 && s
->the_bfd_section
->name
!= NULL
74 && strcmp (s
->the_bfd_section
->name
, ".opd") == 0);
78 /* Return one if PC is in the call path of a trampoline, else return zero.
80 Note we return one for *any* call trampoline (long-call, arg-reloc), not
81 just shared library trampolines (import, export). */
84 hppa32_hpux_in_solib_call_trampoline (CORE_ADDR pc
, char *name
)
86 struct minimal_symbol
*minsym
;
87 struct unwind_table_entry
*u
;
89 /* First see if PC is in one of the two C-library trampolines. */
90 if (pc
== hppa_symbol_address("$$dyncall")
91 || pc
== hppa_symbol_address("_sr4export"))
94 minsym
= lookup_minimal_symbol_by_pc (pc
);
95 if (minsym
&& strcmp (DEPRECATED_SYMBOL_NAME (minsym
), ".stub") == 0)
98 /* Get the unwind descriptor corresponding to PC, return zero
99 if no unwind was found. */
100 u
= find_unwind_entry (pc
);
104 /* If this isn't a linker stub, then return now. */
105 if (u
->stub_unwind
.stub_type
== 0)
108 /* By definition a long-branch stub is a call stub. */
109 if (u
->stub_unwind
.stub_type
== LONG_BRANCH
)
112 /* The call and return path execute the same instructions within
113 an IMPORT stub! So an IMPORT stub is both a call and return
115 if (u
->stub_unwind
.stub_type
== IMPORT
)
118 /* Parameter relocation stubs always have a call path and may have a
120 if (u
->stub_unwind
.stub_type
== PARAMETER_RELOCATION
121 || u
->stub_unwind
.stub_type
== EXPORT
)
125 /* Search forward from the current PC until we hit a branch
126 or the end of the stub. */
127 for (addr
= pc
; addr
<= u
->region_end
; addr
+= 4)
131 insn
= read_memory_integer (addr
, 4);
133 /* Does it look like a bl? If so then it's the call path, if
134 we find a bv or be first, then we're on the return path. */
135 if ((insn
& 0xfc00e000) == 0xe8000000)
137 else if ((insn
& 0xfc00e001) == 0xe800c000
138 || (insn
& 0xfc000000) == 0xe0000000)
142 /* Should never happen. */
143 warning ("Unable to find branch in parameter relocation stub.\n");
147 /* Unknown stub type. For now, just return zero. */
152 hppa64_hpux_in_solib_call_trampoline (CORE_ADDR pc
, char *name
)
154 /* PA64 has a completely different stub/trampoline scheme. Is it
155 better? Maybe. It's certainly harder to determine with any
156 certainty that we are in a stub because we can not refer to the
159 The heuristic is simple. Try to lookup the current PC value in th
160 minimal symbol table. If that fails, then assume we are not in a
163 Then see if the PC value falls within the section bounds for the
164 section containing the minimal symbol we found in the first
165 step. If it does, then assume we are not in a stub and return.
167 Finally peek at the instructions to see if they look like a stub. */
168 struct minimal_symbol
*minsym
;
173 minsym
= lookup_minimal_symbol_by_pc (pc
);
177 sec
= SYMBOL_BFD_SECTION (minsym
);
179 if (bfd_get_section_vma (sec
->owner
, sec
) <= pc
180 && pc
< (bfd_get_section_vma (sec
->owner
, sec
)
181 + bfd_section_size (sec
->owner
, sec
)))
184 /* We might be in a stub. Peek at the instructions. Stubs are 3
185 instructions long. */
186 insn
= read_memory_integer (pc
, 4);
188 /* Find out where we think we are within the stub. */
189 if ((insn
& 0xffffc00e) == 0x53610000)
191 else if ((insn
& 0xffffffff) == 0xe820d000)
193 else if ((insn
& 0xffffc00e) == 0x537b0000)
198 /* Now verify each insn in the range looks like a stub instruction. */
199 insn
= read_memory_integer (addr
, 4);
200 if ((insn
& 0xffffc00e) != 0x53610000)
203 /* Now verify each insn in the range looks like a stub instruction. */
204 insn
= read_memory_integer (addr
+ 4, 4);
205 if ((insn
& 0xffffffff) != 0xe820d000)
208 /* Now verify each insn in the range looks like a stub instruction. */
209 insn
= read_memory_integer (addr
+ 8, 4);
210 if ((insn
& 0xffffc00e) != 0x537b0000)
213 /* Looks like a stub. */
217 /* Return one if PC is in the return path of a trampoline, else return zero.
219 Note we return one for *any* call trampoline (long-call, arg-reloc), not
220 just shared library trampolines (import, export). */
223 hppa_hpux_in_solib_return_trampoline (CORE_ADDR pc
, char *name
)
225 struct unwind_table_entry
*u
;
227 /* Get the unwind descriptor corresponding to PC, return zero
228 if no unwind was found. */
229 u
= find_unwind_entry (pc
);
233 /* If this isn't a linker stub or it's just a long branch stub, then
235 if (u
->stub_unwind
.stub_type
== 0 || u
->stub_unwind
.stub_type
== LONG_BRANCH
)
238 /* The call and return path execute the same instructions within
239 an IMPORT stub! So an IMPORT stub is both a call and return
241 if (u
->stub_unwind
.stub_type
== IMPORT
)
244 /* Parameter relocation stubs always have a call path and may have a
246 if (u
->stub_unwind
.stub_type
== PARAMETER_RELOCATION
247 || u
->stub_unwind
.stub_type
== EXPORT
)
251 /* Search forward from the current PC until we hit a branch
252 or the end of the stub. */
253 for (addr
= pc
; addr
<= u
->region_end
; addr
+= 4)
257 insn
= read_memory_integer (addr
, 4);
259 /* Does it look like a bl? If so then it's the call path, if
260 we find a bv or be first, then we're on the return path. */
261 if ((insn
& 0xfc00e000) == 0xe8000000)
263 else if ((insn
& 0xfc00e001) == 0xe800c000
264 || (insn
& 0xfc000000) == 0xe0000000)
268 /* Should never happen. */
269 warning ("Unable to find branch in parameter relocation stub.\n");
273 /* Unknown stub type. For now, just return zero. */
278 /* Figure out if PC is in a trampoline, and if so find out where
279 the trampoline will jump to. If not in a trampoline, return zero.
281 Simple code examination probably is not a good idea since the code
282 sequences in trampolines can also appear in user code.
284 We use unwinds and information from the minimal symbol table to
285 determine when we're in a trampoline. This won't work for ELF
286 (yet) since it doesn't create stub unwind entries. Whether or
287 not ELF will create stub unwinds or normal unwinds for linker
288 stubs is still being debated.
290 This should handle simple calls through dyncall or sr4export,
291 long calls, argument relocation stubs, and dyncall/sr4export
292 calling an argument relocation stub. It even handles some stubs
293 used in dynamic executables. */
296 hppa_hpux_skip_trampoline_code (CORE_ADDR pc
)
299 long prev_inst
, curr_inst
, loc
;
300 struct minimal_symbol
*msym
;
301 struct unwind_table_entry
*u
;
303 /* Addresses passed to dyncall may *NOT* be the actual address
304 of the function. So we may have to do something special. */
305 if (pc
== hppa_symbol_address("$$dyncall"))
307 pc
= (CORE_ADDR
) read_register (22);
309 /* If bit 30 (counting from the left) is on, then pc is the address of
310 the PLT entry for this function, not the address of the function
311 itself. Bit 31 has meaning too, but only for MPE. */
313 pc
= (CORE_ADDR
) read_memory_integer (pc
& ~0x3, TARGET_PTR_BIT
/ 8);
315 if (pc
== hppa_symbol_address("$$dyncall_external"))
317 pc
= (CORE_ADDR
) read_register (22);
318 pc
= (CORE_ADDR
) read_memory_integer (pc
& ~0x3, TARGET_PTR_BIT
/ 8);
320 else if (pc
== hppa_symbol_address("_sr4export"))
321 pc
= (CORE_ADDR
) (read_register (22));
323 /* Get the unwind descriptor corresponding to PC, return zero
324 if no unwind was found. */
325 u
= find_unwind_entry (pc
);
329 /* If this isn't a linker stub, then return now. */
330 /* elz: attention here! (FIXME) because of a compiler/linker
331 error, some stubs which should have a non zero stub_unwind.stub_type
332 have unfortunately a value of zero. So this function would return here
333 as if we were not in a trampoline. To fix this, we go look at the partial
334 symbol information, which reports this guy as a stub.
335 (FIXME): Unfortunately, we are not that lucky: it turns out that the
336 partial symbol information is also wrong sometimes. This is because
337 when it is entered (somread.c::som_symtab_read()) it can happen that
338 if the type of the symbol (from the som) is Entry, and the symbol is
339 in a shared library, then it can also be a trampoline. This would
340 be OK, except that I believe the way they decide if we are ina shared library
341 does not work. SOOOO..., even if we have a regular function w/o trampolines
342 its minimal symbol can be assigned type mst_solib_trampoline.
343 Also, if we find that the symbol is a real stub, then we fix the unwind
344 descriptor, and define the stub type to be EXPORT.
345 Hopefully this is correct most of the times. */
346 if (u
->stub_unwind
.stub_type
== 0)
349 /* elz: NOTE (FIXME!) once the problem with the unwind information is fixed
350 we can delete all the code which appears between the lines */
351 /*--------------------------------------------------------------------------*/
352 msym
= lookup_minimal_symbol_by_pc (pc
);
354 if (msym
== NULL
|| MSYMBOL_TYPE (msym
) != mst_solib_trampoline
)
355 return orig_pc
== pc
? 0 : pc
& ~0x3;
357 else if (msym
!= NULL
&& MSYMBOL_TYPE (msym
) == mst_solib_trampoline
)
359 struct objfile
*objfile
;
360 struct minimal_symbol
*msymbol
;
361 int function_found
= 0;
363 /* go look if there is another minimal symbol with the same name as
364 this one, but with type mst_text. This would happen if the msym
365 is an actual trampoline, in which case there would be another
366 symbol with the same name corresponding to the real function */
368 ALL_MSYMBOLS (objfile
, msymbol
)
370 if (MSYMBOL_TYPE (msymbol
) == mst_text
371 && DEPRECATED_STREQ (DEPRECATED_SYMBOL_NAME (msymbol
), DEPRECATED_SYMBOL_NAME (msym
)))
379 /* the type of msym is correct (mst_solib_trampoline), but
380 the unwind info is wrong, so set it to the correct value */
381 u
->stub_unwind
.stub_type
= EXPORT
;
383 /* the stub type info in the unwind is correct (this is not a
384 trampoline), but the msym type information is wrong, it
385 should be mst_text. So we need to fix the msym, and also
386 get out of this function */
388 MSYMBOL_TYPE (msym
) = mst_text
;
389 return orig_pc
== pc
? 0 : pc
& ~0x3;
393 /*--------------------------------------------------------------------------*/
396 /* It's a stub. Search for a branch and figure out where it goes.
397 Note we have to handle multi insn branch sequences like ldil;ble.
398 Most (all?) other branches can be determined by examining the contents
399 of certain registers and the stack. */
406 /* Make sure we haven't walked outside the range of this stub. */
407 if (u
!= find_unwind_entry (loc
))
409 warning ("Unable to find branch in linker stub");
410 return orig_pc
== pc
? 0 : pc
& ~0x3;
413 prev_inst
= curr_inst
;
414 curr_inst
= read_memory_integer (loc
, 4);
416 /* Does it look like a branch external using %r1? Then it's the
417 branch from the stub to the actual function. */
418 if ((curr_inst
& 0xffe0e000) == 0xe0202000)
420 /* Yup. See if the previous instruction loaded
421 a value into %r1. If so compute and return the jump address. */
422 if ((prev_inst
& 0xffe00000) == 0x20200000)
423 return (hppa_extract_21 (prev_inst
) + hppa_extract_17 (curr_inst
)) & ~0x3;
426 warning ("Unable to find ldil X,%%r1 before ble Y(%%sr4,%%r1).");
427 return orig_pc
== pc
? 0 : pc
& ~0x3;
431 /* Does it look like a be 0(sr0,%r21)? OR
432 Does it look like a be, n 0(sr0,%r21)? OR
433 Does it look like a bve (r21)? (this is on PA2.0)
434 Does it look like a bve, n(r21)? (this is also on PA2.0)
435 That's the branch from an
436 import stub to an export stub.
438 It is impossible to determine the target of the branch via
439 simple examination of instructions and/or data (consider
440 that the address in the plabel may be the address of the
441 bind-on-reference routine in the dynamic loader).
443 So we have try an alternative approach.
445 Get the name of the symbol at our current location; it should
446 be a stub symbol with the same name as the symbol in the
449 Then lookup a minimal symbol with the same name; we should
450 get the minimal symbol for the target routine in the shared
451 library as those take precedence of import/export stubs. */
452 if ((curr_inst
== 0xe2a00000) ||
453 (curr_inst
== 0xe2a00002) ||
454 (curr_inst
== 0xeaa0d000) ||
455 (curr_inst
== 0xeaa0d002))
457 struct minimal_symbol
*stubsym
, *libsym
;
459 stubsym
= lookup_minimal_symbol_by_pc (loc
);
462 warning ("Unable to find symbol for 0x%lx", loc
);
463 return orig_pc
== pc
? 0 : pc
& ~0x3;
466 libsym
= lookup_minimal_symbol (DEPRECATED_SYMBOL_NAME (stubsym
), NULL
, NULL
);
469 warning ("Unable to find library symbol for %s\n",
470 DEPRECATED_SYMBOL_NAME (stubsym
));
471 return orig_pc
== pc
? 0 : pc
& ~0x3;
474 return SYMBOL_VALUE (libsym
);
477 /* Does it look like bl X,%rp or bl X,%r0? Another way to do a
478 branch from the stub to the actual function. */
480 else if ((curr_inst
& 0xffe0e000) == 0xe8400000
481 || (curr_inst
& 0xffe0e000) == 0xe8000000
482 || (curr_inst
& 0xffe0e000) == 0xe800A000)
483 return (loc
+ hppa_extract_17 (curr_inst
) + 8) & ~0x3;
485 /* Does it look like bv (rp)? Note this depends on the
486 current stack pointer being the same as the stack
487 pointer in the stub itself! This is a branch on from the
488 stub back to the original caller. */
489 /*else if ((curr_inst & 0xffe0e000) == 0xe840c000) */
490 else if ((curr_inst
& 0xffe0f000) == 0xe840c000)
492 /* Yup. See if the previous instruction loaded
494 if (prev_inst
== 0x4bc23ff1)
495 return (read_memory_integer
496 (read_register (HPPA_SP_REGNUM
) - 8, 4)) & ~0x3;
499 warning ("Unable to find restore of %%rp before bv (%%rp).");
500 return orig_pc
== pc
? 0 : pc
& ~0x3;
504 /* elz: added this case to capture the new instruction
505 at the end of the return part of an export stub used by
506 the PA2.0: BVE, n (rp) */
507 else if ((curr_inst
& 0xffe0f000) == 0xe840d000)
509 return (read_memory_integer
510 (read_register (HPPA_SP_REGNUM
) - 24, TARGET_PTR_BIT
/ 8)) & ~0x3;
513 /* What about be,n 0(sr0,%rp)? It's just another way we return to
514 the original caller from the stub. Used in dynamic executables. */
515 else if (curr_inst
== 0xe0400002)
517 /* The value we jump to is sitting in sp - 24. But that's
518 loaded several instructions before the be instruction.
519 I guess we could check for the previous instruction being
520 mtsp %r1,%sr0 if we want to do sanity checking. */
521 return (read_memory_integer
522 (read_register (HPPA_SP_REGNUM
) - 24, TARGET_PTR_BIT
/ 8)) & ~0x3;
525 /* Haven't found the branch yet, but we're still in the stub.
532 hppa_skip_permanent_breakpoint (void)
534 /* To step over a breakpoint instruction on the PA takes some
535 fiddling with the instruction address queue.
537 When we stop at a breakpoint, the IA queue front (the instruction
538 we're executing now) points at the breakpoint instruction, and
539 the IA queue back (the next instruction to execute) points to
540 whatever instruction we would execute after the breakpoint, if it
541 were an ordinary instruction. This is the case even if the
542 breakpoint is in the delay slot of a branch instruction.
544 Clearly, to step past the breakpoint, we need to set the queue
545 front to the back. But what do we put in the back? What
546 instruction comes after that one? Because of the branch delay
547 slot, the next insn is always at the back + 4. */
548 write_register (HPPA_PCOQ_HEAD_REGNUM
, read_register (HPPA_PCOQ_TAIL_REGNUM
));
549 write_register (HPPA_PCSQ_HEAD_REGNUM
, read_register (HPPA_PCSQ_TAIL_REGNUM
));
551 write_register (HPPA_PCOQ_TAIL_REGNUM
, read_register (HPPA_PCOQ_TAIL_REGNUM
) + 4);
552 /* We can leave the tail's space the same, since there's no jump. */
555 /* Exception handling support for the HP-UX ANSI C++ compiler.
556 The compiler (aCC) provides a callback for exception events;
557 GDB can set a breakpoint on this callback and find out what
558 exception event has occurred. */
560 /* The name of the hook to be set to point to the callback function */
561 static char HP_ACC_EH_notify_hook
[] = "__eh_notify_hook";
562 /* The name of the function to be used to set the hook value */
563 static char HP_ACC_EH_set_hook_value
[] = "__eh_set_hook_value";
564 /* The name of the callback function in end.o */
565 static char HP_ACC_EH_notify_callback
[] = "__d_eh_notify_callback";
566 /* Name of function in end.o on which a break is set (called by above) */
567 static char HP_ACC_EH_break
[] = "__d_eh_break";
568 /* Name of flag (in end.o) that enables catching throws */
569 static char HP_ACC_EH_catch_throw
[] = "__d_eh_catch_throw";
570 /* Name of flag (in end.o) that enables catching catching */
571 static char HP_ACC_EH_catch_catch
[] = "__d_eh_catch_catch";
572 /* The enum used by aCC */
580 /* Is exception-handling support available with this executable? */
581 static int hp_cxx_exception_support
= 0;
582 /* Has the initialize function been run? */
583 static int hp_cxx_exception_support_initialized
= 0;
584 /* Address of __eh_notify_hook */
585 static CORE_ADDR eh_notify_hook_addr
= 0;
586 /* Address of __d_eh_notify_callback */
587 static CORE_ADDR eh_notify_callback_addr
= 0;
588 /* Address of __d_eh_break */
589 static CORE_ADDR eh_break_addr
= 0;
590 /* Address of __d_eh_catch_catch */
591 static CORE_ADDR eh_catch_catch_addr
= 0;
592 /* Address of __d_eh_catch_throw */
593 static CORE_ADDR eh_catch_throw_addr
= 0;
594 /* Sal for __d_eh_break */
595 static struct symtab_and_line
*break_callback_sal
= 0;
597 /* Code in end.c expects __d_pid to be set in the inferior,
598 otherwise __d_eh_notify_callback doesn't bother to call
599 __d_eh_break! So we poke the pid into this symbol
604 setup_d_pid_in_inferior (void)
607 struct minimal_symbol
*msymbol
;
608 char buf
[4]; /* FIXME 32x64? */
610 /* Slam the pid of the process into __d_pid; failing is only a warning! */
611 msymbol
= lookup_minimal_symbol ("__d_pid", NULL
, symfile_objfile
);
614 warning ("Unable to find __d_pid symbol in object file.");
615 warning ("Suggest linking executable with -g (links in /opt/langtools/lib/end.o).");
619 anaddr
= SYMBOL_VALUE_ADDRESS (msymbol
);
620 store_unsigned_integer (buf
, 4, PIDGET (inferior_ptid
)); /* FIXME 32x64? */
621 if (target_write_memory (anaddr
, buf
, 4)) /* FIXME 32x64? */
623 warning ("Unable to write __d_pid");
624 warning ("Suggest linking executable with -g (links in /opt/langtools/lib/end.o).");
630 /* elz: Used to lookup a symbol in the shared libraries.
631 This function calls shl_findsym, indirectly through a
632 call to __d_shl_get. __d_shl_get is in end.c, which is always
633 linked in by the hp compilers/linkers.
634 The call to shl_findsym cannot be made directly because it needs
635 to be active in target address space.
636 inputs: - minimal symbol pointer for the function we want to look up
637 - address in target space of the descriptor for the library
638 where we want to look the symbol up.
639 This address is retrieved using the
640 som_solib_get_solib_by_pc function (somsolib.c).
641 output: - real address in the library of the function.
642 note: the handle can be null, in which case shl_findsym will look for
643 the symbol in all the loaded shared libraries.
644 files to look at if you need reference on this stuff:
645 dld.c, dld_shl_findsym.c
647 man entry for shl_findsym */
650 find_stub_with_shl_get (struct minimal_symbol
*function
, CORE_ADDR handle
)
652 struct symbol
*get_sym
, *symbol2
;
653 struct minimal_symbol
*buff_minsym
, *msymbol
;
656 struct value
*funcval
;
659 int x
, namelen
, err_value
, tmp
= -1;
660 CORE_ADDR endo_buff_addr
, value_return_addr
, errno_return_addr
;
664 args
= alloca (sizeof (struct value
*) * 8); /* 6 for the arguments and one null one??? */
665 funcval
= find_function_in_inferior ("__d_shl_get");
666 get_sym
= lookup_symbol ("__d_shl_get", NULL
, VAR_DOMAIN
, NULL
, NULL
);
667 buff_minsym
= lookup_minimal_symbol ("__buffer", NULL
, NULL
);
668 msymbol
= lookup_minimal_symbol ("__shldp", NULL
, NULL
);
669 symbol2
= lookup_symbol ("__shldp", NULL
, VAR_DOMAIN
, NULL
, NULL
);
670 endo_buff_addr
= SYMBOL_VALUE_ADDRESS (buff_minsym
);
671 namelen
= strlen (DEPRECATED_SYMBOL_NAME (function
));
672 value_return_addr
= endo_buff_addr
+ namelen
;
673 ftype
= check_typedef (SYMBOL_TYPE (get_sym
));
676 if ((x
= value_return_addr
% 64) != 0)
677 value_return_addr
= value_return_addr
+ 64 - x
;
679 errno_return_addr
= value_return_addr
+ 64;
682 /* set up stuff needed by __d_shl_get in buffer in end.o */
684 target_write_memory (endo_buff_addr
, DEPRECATED_SYMBOL_NAME (function
), namelen
);
686 target_write_memory (value_return_addr
, (char *) &tmp
, 4);
688 target_write_memory (errno_return_addr
, (char *) &tmp
, 4);
690 target_write_memory (SYMBOL_VALUE_ADDRESS (msymbol
),
691 (char *) &handle
, 4);
693 /* now prepare the arguments for the call */
695 args
[0] = value_from_longest (TYPE_FIELD_TYPE (ftype
, 0), 12);
696 args
[1] = value_from_pointer (TYPE_FIELD_TYPE (ftype
, 1), SYMBOL_VALUE_ADDRESS (msymbol
));
697 args
[2] = value_from_pointer (TYPE_FIELD_TYPE (ftype
, 2), endo_buff_addr
);
698 args
[3] = value_from_longest (TYPE_FIELD_TYPE (ftype
, 3), TYPE_PROCEDURE
);
699 args
[4] = value_from_pointer (TYPE_FIELD_TYPE (ftype
, 4), value_return_addr
);
700 args
[5] = value_from_pointer (TYPE_FIELD_TYPE (ftype
, 5), errno_return_addr
);
702 /* now call the function */
704 val
= call_function_by_hand (funcval
, 6, args
);
706 /* now get the results */
708 target_read_memory (errno_return_addr
, (char *) &err_value
, sizeof (err_value
));
710 target_read_memory (value_return_addr
, (char *) &stub_addr
, sizeof (stub_addr
));
712 error ("call to __d_shl_get failed, error code is %d", err_value
);
717 /* Cover routine for find_stub_with_shl_get to pass to catch_errors */
719 cover_find_stub_with_shl_get (void *args_untyped
)
721 args_for_find_stub
*args
= args_untyped
;
722 args
->return_val
= find_stub_with_shl_get (args
->msym
, args
->solib_handle
);
726 /* Initialize exception catchpoint support by looking for the
727 necessary hooks/callbacks in end.o, etc., and set the hook value to
728 point to the required debug function
734 initialize_hp_cxx_exception_support (void)
736 struct symtabs_and_lines sals
;
737 struct cleanup
*old_chain
;
738 struct cleanup
*canonical_strings_chain
= NULL
;
741 char *addr_end
= NULL
;
742 char **canonical
= (char **) NULL
;
744 struct symbol
*sym
= NULL
;
745 struct minimal_symbol
*msym
= NULL
;
746 struct objfile
*objfile
;
747 asection
*shlib_info
;
749 /* Detect and disallow recursion. On HP-UX with aCC, infinite
750 recursion is a possibility because finding the hook for exception
751 callbacks involves making a call in the inferior, which means
752 re-inserting breakpoints which can re-invoke this code */
754 static int recurse
= 0;
757 hp_cxx_exception_support_initialized
= 0;
758 deprecated_exception_support_initialized
= 0;
762 hp_cxx_exception_support
= 0;
764 /* First check if we have seen any HP compiled objects; if not,
765 it is very unlikely that HP's idiosyncratic callback mechanism
766 for exception handling debug support will be available!
767 This will percolate back up to breakpoint.c, where our callers
768 will decide to try the g++ exception-handling support instead. */
769 if (!deprecated_hp_som_som_object_present
)
772 /* We have a SOM executable with SOM debug info; find the hooks */
774 /* First look for the notify hook provided by aCC runtime libs */
775 /* If we find this symbol, we conclude that the executable must
776 have HP aCC exception support built in. If this symbol is not
777 found, even though we're a HP SOM-SOM file, we may have been
778 built with some other compiler (not aCC). This results percolates
779 back up to our callers in breakpoint.c which can decide to
780 try the g++ style of exception support instead.
781 If this symbol is found but the other symbols we require are
782 not found, there is something weird going on, and g++ support
783 should *not* be tried as an alternative.
785 ASSUMPTION: Only HP aCC code will have __eh_notify_hook defined.
786 ASSUMPTION: HP aCC and g++ modules cannot be linked together. */
788 /* libCsup has this hook; it'll usually be non-debuggable */
789 msym
= lookup_minimal_symbol (HP_ACC_EH_notify_hook
, NULL
, NULL
);
792 eh_notify_hook_addr
= SYMBOL_VALUE_ADDRESS (msym
);
793 hp_cxx_exception_support
= 1;
797 warning ("Unable to find exception callback hook (%s).", HP_ACC_EH_notify_hook
);
798 warning ("Executable may not have been compiled debuggable with HP aCC.");
799 warning ("GDB will be unable to intercept exception events.");
800 eh_notify_hook_addr
= 0;
801 hp_cxx_exception_support
= 0;
805 /* Next look for the notify callback routine in end.o */
806 /* This is always available in the SOM symbol dictionary if end.o is linked in */
807 msym
= lookup_minimal_symbol (HP_ACC_EH_notify_callback
, NULL
, NULL
);
810 eh_notify_callback_addr
= SYMBOL_VALUE_ADDRESS (msym
);
811 hp_cxx_exception_support
= 1;
815 warning ("Unable to find exception callback routine (%s).", HP_ACC_EH_notify_callback
);
816 warning ("Suggest linking executable with -g (links in /opt/langtools/lib/end.o).");
817 warning ("GDB will be unable to intercept exception events.");
818 eh_notify_callback_addr
= 0;
822 #ifndef GDB_TARGET_IS_HPPA_20W
823 /* Check whether the executable is dynamically linked or archive bound */
824 /* With an archive-bound executable we can use the raw addresses we find
825 for the callback function, etc. without modification. For an executable
826 with shared libraries, we have to do more work to find the plabel, which
827 can be the target of a call through $$dyncall from the aCC runtime support
828 library (libCsup) which is linked shared by default by aCC. */
829 /* This test below was copied from somsolib.c/somread.c. It may not be a very
830 reliable one to test that an executable is linked shared. pai/1997-07-18 */
831 shlib_info
= bfd_get_section_by_name (symfile_objfile
->obfd
, "$SHLIB_INFO$");
832 if (shlib_info
&& (bfd_section_size (symfile_objfile
->obfd
, shlib_info
) != 0))
834 /* The minsym we have has the local code address, but that's not the
835 plabel that can be used by an inter-load-module call. */
836 /* Find solib handle for main image (which has end.o), and use that
837 and the min sym as arguments to __d_shl_get() (which does the equivalent
838 of shl_findsym()) to find the plabel. */
840 args_for_find_stub args
;
841 static char message
[] = "Error while finding exception callback hook:\n";
843 args
.solib_handle
= gdbarch_tdep (current_gdbarch
)->solib_get_solib_by_pc (eh_notify_callback_addr
);
848 catch_errors (cover_find_stub_with_shl_get
, &args
, message
,
850 eh_notify_callback_addr
= args
.return_val
;
853 deprecated_exception_catchpoints_are_fragile
= 1;
855 if (!eh_notify_callback_addr
)
857 /* We can get here either if there is no plabel in the export list
858 for the main image, or if something strange happened (?) */
859 warning ("Couldn't find a plabel (indirect function label) for the exception callback.");
860 warning ("GDB will not be able to intercept exception events.");
865 deprecated_exception_catchpoints_are_fragile
= 0;
868 /* Now, look for the breakpointable routine in end.o */
869 /* This should also be available in the SOM symbol dict. if end.o linked in */
870 msym
= lookup_minimal_symbol (HP_ACC_EH_break
, NULL
, NULL
);
873 eh_break_addr
= SYMBOL_VALUE_ADDRESS (msym
);
874 hp_cxx_exception_support
= 1;
878 warning ("Unable to find exception callback routine to set breakpoint (%s).", HP_ACC_EH_break
);
879 warning ("Suggest linking executable with -g (link in /opt/langtools/lib/end.o).");
880 warning ("GDB will be unable to intercept exception events.");
885 /* Next look for the catch enable flag provided in end.o */
886 sym
= lookup_symbol (HP_ACC_EH_catch_catch
, (struct block
*) NULL
,
887 VAR_DOMAIN
, 0, (struct symtab
**) NULL
);
888 if (sym
) /* sometimes present in debug info */
890 eh_catch_catch_addr
= SYMBOL_VALUE_ADDRESS (sym
);
891 hp_cxx_exception_support
= 1;
894 /* otherwise look in SOM symbol dict. */
896 msym
= lookup_minimal_symbol (HP_ACC_EH_catch_catch
, NULL
, NULL
);
899 eh_catch_catch_addr
= SYMBOL_VALUE_ADDRESS (msym
);
900 hp_cxx_exception_support
= 1;
904 warning ("Unable to enable interception of exception catches.");
905 warning ("Executable may not have been compiled debuggable with HP aCC.");
906 warning ("Suggest linking executable with -g (link in /opt/langtools/lib/end.o).");
911 /* Next look for the catch enable flag provided end.o */
912 sym
= lookup_symbol (HP_ACC_EH_catch_catch
, (struct block
*) NULL
,
913 VAR_DOMAIN
, 0, (struct symtab
**) NULL
);
914 if (sym
) /* sometimes present in debug info */
916 eh_catch_throw_addr
= SYMBOL_VALUE_ADDRESS (sym
);
917 hp_cxx_exception_support
= 1;
920 /* otherwise look in SOM symbol dict. */
922 msym
= lookup_minimal_symbol (HP_ACC_EH_catch_throw
, NULL
, NULL
);
925 eh_catch_throw_addr
= SYMBOL_VALUE_ADDRESS (msym
);
926 hp_cxx_exception_support
= 1;
930 warning ("Unable to enable interception of exception throws.");
931 warning ("Executable may not have been compiled debuggable with HP aCC.");
932 warning ("Suggest linking executable with -g (link in /opt/langtools/lib/end.o).");
938 hp_cxx_exception_support
= 2; /* everything worked so far */
939 hp_cxx_exception_support_initialized
= 1;
940 deprecated_exception_support_initialized
= 1;
945 /* Target operation for enabling or disabling interception of
947 KIND is either EX_EVENT_THROW or EX_EVENT_CATCH
948 ENABLE is either 0 (disable) or 1 (enable).
949 Return value is NULL if no support found;
950 -1 if something went wrong,
951 or a pointer to a symtab/line struct if the breakpointable
952 address was found. */
954 struct symtab_and_line
*
955 child_enable_exception_callback (enum exception_event_kind kind
, int enable
)
959 if (!deprecated_exception_support_initialized
960 || !hp_cxx_exception_support_initialized
)
961 if (!initialize_hp_cxx_exception_support ())
964 switch (hp_cxx_exception_support
)
967 /* Assuming no HP support at all */
970 /* HP support should be present, but something went wrong */
971 return (struct symtab_and_line
*) -1; /* yuck! */
972 /* there may be other cases in the future */
975 /* Set the EH hook to point to the callback routine */
976 store_unsigned_integer (buf
, 4, enable
? eh_notify_callback_addr
: 0); /* FIXME 32x64 problem */
977 /* pai: (temp) FIXME should there be a pack operation first? */
978 if (target_write_memory (eh_notify_hook_addr
, buf
, 4)) /* FIXME 32x64 problem */
980 warning ("Could not write to target memory for exception event callback.");
981 warning ("Interception of exception events may not work.");
982 return (struct symtab_and_line
*) -1;
986 /* Ensure that __d_pid is set up correctly -- end.c code checks this. :-( */
987 if (PIDGET (inferior_ptid
) > 0)
989 if (setup_d_pid_in_inferior ())
990 return (struct symtab_and_line
*) -1;
994 warning ("Internal error: Invalid inferior pid? Cannot intercept exception events.");
995 return (struct symtab_and_line
*) -1;
1001 case EX_EVENT_THROW
:
1002 store_unsigned_integer (buf
, 4, enable
? 1 : 0);
1003 if (target_write_memory (eh_catch_throw_addr
, buf
, 4)) /* FIXME 32x64? */
1005 warning ("Couldn't enable exception throw interception.");
1006 return (struct symtab_and_line
*) -1;
1009 case EX_EVENT_CATCH
:
1010 store_unsigned_integer (buf
, 4, enable
? 1 : 0);
1011 if (target_write_memory (eh_catch_catch_addr
, buf
, 4)) /* FIXME 32x64? */
1013 warning ("Couldn't enable exception catch interception.");
1014 return (struct symtab_and_line
*) -1;
1018 error ("Request to enable unknown or unsupported exception event.");
1021 /* Copy break address into new sal struct, malloc'ing if needed. */
1022 if (!break_callback_sal
)
1023 break_callback_sal
= XMALLOC (struct symtab_and_line
);
1024 init_sal (break_callback_sal
);
1025 break_callback_sal
->symtab
= NULL
;
1026 break_callback_sal
->pc
= eh_break_addr
;
1027 break_callback_sal
->line
= 0;
1028 break_callback_sal
->end
= eh_break_addr
;
1030 return break_callback_sal
;
1033 /* Record some information about the current exception event */
1034 static struct exception_event_record current_ex_event
;
1035 /* Convenience struct */
1036 static struct symtab_and_line null_symtab_and_line
=
1039 /* Report current exception event. Returns a pointer to a record
1040 that describes the kind of the event, where it was thrown from,
1041 and where it will be caught. More information may be reported
1043 struct exception_event_record
*
1044 child_get_current_exception_event (void)
1046 CORE_ADDR event_kind
;
1047 CORE_ADDR throw_addr
;
1048 CORE_ADDR catch_addr
;
1049 struct frame_info
*fi
, *curr_frame
;
1052 curr_frame
= get_current_frame ();
1054 return (struct exception_event_record
*) NULL
;
1056 /* Go up one frame to __d_eh_notify_callback, because at the
1057 point when this code is executed, there's garbage in the
1058 arguments of __d_eh_break. */
1059 fi
= find_relative_frame (curr_frame
, &level
);
1061 return (struct exception_event_record
*) NULL
;
1065 /* Read in the arguments */
1066 /* __d_eh_notify_callback() is called with 3 arguments:
1067 1. event kind catch or throw
1068 2. the target address if known
1069 3. a flag -- not sure what this is. pai/1997-07-17 */
1070 event_kind
= read_register (HPPA_ARG0_REGNUM
);
1071 catch_addr
= read_register (HPPA_ARG1_REGNUM
);
1073 /* Now go down to a user frame */
1074 /* For a throw, __d_eh_break is called by
1075 __d_eh_notify_callback which is called by
1076 __notify_throw which is called
1078 For a catch, __d_eh_break is called by
1079 __d_eh_notify_callback which is called by
1080 <stackwalking stuff> which is called by
1081 __throw__<stuff> or __rethrow_<stuff> which is called
1083 /* FIXME: Don't use such magic numbers; search for the frames */
1084 level
= (event_kind
== EX_EVENT_THROW
) ? 3 : 4;
1085 fi
= find_relative_frame (curr_frame
, &level
);
1087 return (struct exception_event_record
*) NULL
;
1090 throw_addr
= get_frame_pc (fi
);
1092 /* Go back to original (top) frame */
1093 select_frame (curr_frame
);
1095 current_ex_event
.kind
= (enum exception_event_kind
) event_kind
;
1096 current_ex_event
.throw_sal
= find_pc_line (throw_addr
, 1);
1097 current_ex_event
.catch_sal
= find_pc_line (catch_addr
, 1);
1099 return ¤t_ex_event
;
1102 /* Signal frames. */
1103 struct hppa_hpux_sigtramp_unwind_cache
1106 struct trad_frame_saved_reg
*saved_regs
;
1109 static int hppa_hpux_tramp_reg
[] = {
1111 HPPA_PCOQ_HEAD_REGNUM
,
1112 HPPA_PCSQ_HEAD_REGNUM
,
1113 HPPA_PCOQ_TAIL_REGNUM
,
1114 HPPA_PCSQ_TAIL_REGNUM
,
1122 HPPA_SR4_REGNUM
+ 1,
1123 HPPA_SR4_REGNUM
+ 2,
1124 HPPA_SR4_REGNUM
+ 3,
1125 HPPA_SR4_REGNUM
+ 4,
1126 HPPA_SR4_REGNUM
+ 5,
1127 HPPA_SR4_REGNUM
+ 6,
1128 HPPA_SR4_REGNUM
+ 7,
1136 HPPA_TR0_REGNUM
+ 1,
1137 HPPA_TR0_REGNUM
+ 2,
1141 static struct hppa_hpux_sigtramp_unwind_cache
*
1142 hppa_hpux_sigtramp_frame_unwind_cache (struct frame_info
*next_frame
,
1146 struct gdbarch
*gdbarch
= get_frame_arch (next_frame
);
1147 struct gdbarch_tdep
*tdep
= gdbarch_tdep (gdbarch
);
1148 struct hppa_hpux_sigtramp_unwind_cache
*info
;
1150 CORE_ADDR sp
, scptr
;
1151 int i
, incr
, off
, szoff
;
1156 info
= FRAME_OBSTACK_ZALLOC (struct hppa_hpux_sigtramp_unwind_cache
);
1158 info
->saved_regs
= trad_frame_alloc_saved_regs (next_frame
);
1160 sp
= frame_unwind_register_unsigned (next_frame
, HPPA_SP_REGNUM
);
1165 /* See /usr/include/machine/save_state.h for the structure of the save_state_t
1168 flag
= read_memory_unsigned_integer(scptr
, 4);
1172 /* Narrow registers. */
1173 off
= scptr
+ offsetof (save_state_t
, ss_narrow
);
1179 /* Wide registers. */
1180 off
= scptr
+ offsetof (save_state_t
, ss_wide
) + 8;
1182 szoff
= (tdep
->bytes_per_address
== 4 ? 4 : 0);
1185 for (i
= 1; i
< 32; i
++)
1187 info
->saved_regs
[HPPA_R0_REGNUM
+ i
].addr
= off
+ szoff
;
1191 for (i
= 0; i
< ARRAY_SIZE (hppa_hpux_tramp_reg
); i
++)
1193 if (hppa_hpux_tramp_reg
[i
] > 0)
1194 info
->saved_regs
[hppa_hpux_tramp_reg
[i
]].addr
= off
+ szoff
;
1200 info
->base
= frame_unwind_register_unsigned (next_frame
, HPPA_SP_REGNUM
);
1206 hppa_hpux_sigtramp_frame_this_id (struct frame_info
*next_frame
,
1207 void **this_prologue_cache
,
1208 struct frame_id
*this_id
)
1210 struct hppa_hpux_sigtramp_unwind_cache
*info
1211 = hppa_hpux_sigtramp_frame_unwind_cache (next_frame
, this_prologue_cache
);
1212 *this_id
= frame_id_build (info
->base
, frame_pc_unwind (next_frame
));
1216 hppa_hpux_sigtramp_frame_prev_register (struct frame_info
*next_frame
,
1217 void **this_prologue_cache
,
1218 int regnum
, int *optimizedp
,
1219 enum lval_type
*lvalp
,
1221 int *realnump
, void *valuep
)
1223 struct hppa_hpux_sigtramp_unwind_cache
*info
1224 = hppa_hpux_sigtramp_frame_unwind_cache (next_frame
, this_prologue_cache
);
1225 hppa_frame_prev_register_helper (next_frame
, info
->saved_regs
, regnum
,
1226 optimizedp
, lvalp
, addrp
, realnump
, valuep
);
1229 static const struct frame_unwind hppa_hpux_sigtramp_frame_unwind
= {
1231 hppa_hpux_sigtramp_frame_this_id
,
1232 hppa_hpux_sigtramp_frame_prev_register
1235 static const struct frame_unwind
*
1236 hppa_hpux_sigtramp_unwind_sniffer (struct frame_info
*next_frame
)
1238 CORE_ADDR pc
= frame_pc_unwind (next_frame
);
1241 find_pc_partial_function (pc
, &name
, NULL
, NULL
);
1243 if (name
&& strcmp(name
, "_sigreturn") == 0)
1244 return &hppa_hpux_sigtramp_frame_unwind
;
1250 hppa32_hpux_find_global_pointer (struct value
*function
)
1254 faddr
= value_as_address (function
);
1256 /* Is this a plabel? If so, dereference it to get the gp value. */
1264 status
= target_read_memory (faddr
+ 4, buf
, sizeof (buf
));
1266 return extract_unsigned_integer (buf
, sizeof (buf
));
1269 return gdbarch_tdep (current_gdbarch
)->solib_get_got_by_pc (faddr
);
1273 hppa64_hpux_find_global_pointer (struct value
*function
)
1278 faddr
= value_as_address (function
);
1280 if (in_opd_section (faddr
))
1282 target_read_memory (faddr
, buf
, sizeof (buf
));
1283 return extract_unsigned_integer (&buf
[24], 8);
1287 return gdbarch_tdep (current_gdbarch
)->solib_get_got_by_pc (faddr
);
1291 static unsigned int ldsid_pattern
[] = {
1292 0x000010a0, /* ldsid (rX),rY */
1293 0x00001820, /* mtsp rY,sr0 */
1294 0xe0000000 /* be,n (sr0,rX) */
1298 hppa_hpux_search_pattern (CORE_ADDR start
, CORE_ADDR end
,
1299 unsigned int *patterns
, int count
)
1305 region
= end
- start
+ 4;
1307 buf
= (unsigned int *) alloca (region
);
1309 read_memory (start
, (char *) buf
, region
);
1311 for (i
= 0; i
< insns
; i
++)
1312 buf
[i
] = extract_unsigned_integer (&buf
[i
], 4);
1314 for (offset
= 0; offset
<= insns
- count
; offset
++)
1316 for (i
= 0; i
< count
; i
++)
1318 if ((buf
[offset
+ i
] & patterns
[i
]) != patterns
[i
])
1325 if (offset
<= insns
- count
)
1326 return start
+ offset
* 4;
1332 hppa32_hpux_search_dummy_call_sequence (struct gdbarch
*gdbarch
, CORE_ADDR pc
,
1335 struct objfile
*obj
;
1336 struct obj_section
*sec
;
1337 struct hppa_objfile_private
*priv
;
1338 struct frame_info
*frame
;
1339 struct unwind_table_entry
*u
;
1344 sec
= find_pc_section (pc
);
1346 priv
= objfile_data (obj
, hppa_objfile_priv_data
);
1349 priv
= hppa_init_objfile_priv_data (obj
);
1351 error ("Internal error creating objfile private data.\n");
1353 /* Use the cached value if we have one. */
1354 if (priv
->dummy_call_sequence_addr
!= 0)
1356 *argreg
= priv
->dummy_call_sequence_reg
;
1357 return priv
->dummy_call_sequence_addr
;
1360 /* First try a heuristic; if we are in a shared library call, our return
1361 pointer is likely to point at an export stub. */
1362 frame
= get_current_frame ();
1363 rp
= frame_unwind_register_unsigned (frame
, 2);
1364 u
= find_unwind_entry (rp
);
1365 if (u
&& u
->stub_unwind
.stub_type
== EXPORT
)
1367 addr
= hppa_hpux_search_pattern (u
->region_start
, u
->region_end
,
1369 ARRAY_SIZE (ldsid_pattern
));
1374 /* Next thing to try is to look for an export stub. */
1375 if (priv
->unwind_info
)
1379 for (i
= 0; i
< priv
->unwind_info
->last
; i
++)
1381 struct unwind_table_entry
*u
;
1382 u
= &priv
->unwind_info
->table
[i
];
1383 if (u
->stub_unwind
.stub_type
== EXPORT
)
1385 addr
= hppa_hpux_search_pattern (u
->region_start
, u
->region_end
,
1387 ARRAY_SIZE (ldsid_pattern
));
1396 /* Finally, if this is the main executable, try to locate a sequence
1398 addr
= hppa_symbol_address ("noshlibs");
1399 sec
= find_pc_section (addr
);
1401 if (sec
&& sec
->objfile
== obj
)
1403 CORE_ADDR start
, end
;
1405 find_pc_partial_function (addr
, NULL
, &start
, &end
);
1406 if (start
!= 0 && end
!= 0)
1408 addr
= hppa_hpux_search_pattern (start
, end
, ldsid_pattern
,
1409 ARRAY_SIZE (ldsid_pattern
));
1415 /* Can't find a suitable sequence. */
1419 target_read_memory (addr
, buf
, sizeof (buf
));
1420 insn
= extract_unsigned_integer (buf
, sizeof (buf
));
1421 priv
->dummy_call_sequence_addr
= addr
;
1422 priv
->dummy_call_sequence_reg
= (insn
>> 21) & 0x1f;
1424 *argreg
= priv
->dummy_call_sequence_reg
;
1425 return priv
->dummy_call_sequence_addr
;
1429 hppa64_hpux_search_dummy_call_sequence (struct gdbarch
*gdbarch
, CORE_ADDR pc
,
1432 struct objfile
*obj
;
1433 struct obj_section
*sec
;
1434 struct hppa_objfile_private
*priv
;
1436 struct minimal_symbol
*msym
;
1439 sec
= find_pc_section (pc
);
1441 priv
= objfile_data (obj
, hppa_objfile_priv_data
);
1444 priv
= hppa_init_objfile_priv_data (obj
);
1446 error ("Internal error creating objfile private data.\n");
1448 /* Use the cached value if we have one. */
1449 if (priv
->dummy_call_sequence_addr
!= 0)
1451 *argreg
= priv
->dummy_call_sequence_reg
;
1452 return priv
->dummy_call_sequence_addr
;
1455 /* FIXME: Without stub unwind information, locating a suitable sequence is
1456 fairly difficult. For now, we implement a very naive and inefficient
1457 scheme; try to read in blocks of code, and look for a "bve,n (rp)"
1458 instruction. These are likely to occur at the end of functions, so
1459 we only look at the last two instructions of each function. */
1460 for (i
= 0, msym
= obj
->msymbols
; i
< obj
->minimal_symbol_count
; i
++, msym
++)
1462 CORE_ADDR begin
, end
;
1464 unsigned int insns
[2];
1467 find_pc_partial_function (SYMBOL_VALUE_ADDRESS (msym
), &name
,
1470 if (name
== NULL
|| begin
== 0 || end
== 0)
1473 if (target_read_memory (end
- sizeof (insns
), (char *)insns
, sizeof (insns
)) == 0)
1475 for (offset
= 0; offset
< ARRAY_SIZE (insns
); offset
++)
1479 insn
= extract_unsigned_integer (&insns
[offset
], 4);
1480 if (insn
== 0xe840d002) /* bve,n (rp) */
1482 addr
= (end
- sizeof (insns
)) + (offset
* 4);
1489 /* Can't find a suitable sequence. */
1493 priv
->dummy_call_sequence_addr
= addr
;
1494 /* Right now we only look for a "bve,l (rp)" sequence, so the register is
1495 always HPPA_RP_REGNUM. */
1496 priv
->dummy_call_sequence_reg
= HPPA_RP_REGNUM
;
1498 *argreg
= priv
->dummy_call_sequence_reg
;
1499 return priv
->dummy_call_sequence_addr
;
1503 hppa_hpux_find_import_stub_for_addr (CORE_ADDR funcaddr
)
1505 struct objfile
*objfile
;
1506 struct minimal_symbol
*funsym
, *stubsym
;
1509 funsym
= lookup_minimal_symbol_by_pc (funcaddr
);
1512 ALL_OBJFILES (objfile
)
1514 stubsym
= lookup_minimal_symbol_solib_trampoline
1515 (SYMBOL_LINKAGE_NAME (funsym
), objfile
);
1519 struct unwind_table_entry
*u
;
1521 u
= find_unwind_entry (SYMBOL_VALUE (stubsym
));
1523 || (u
->stub_unwind
.stub_type
!= IMPORT
1524 && u
->stub_unwind
.stub_type
!= IMPORT_SHLIB
))
1527 stubaddr
= SYMBOL_VALUE (stubsym
);
1529 /* If we found an IMPORT stub, then we can stop searching;
1530 if we found an IMPORT_SHLIB, we want to continue the search
1531 in the hopes that we will find an IMPORT stub. */
1532 if (u
->stub_unwind
.stub_type
== IMPORT
)
1541 hppa_hpux_sr_for_addr (CORE_ADDR addr
)
1544 /* The space register to use is encoded in the top 2 bits of the address. */
1545 sr
= addr
>> (gdbarch_tdep (current_gdbarch
)->bytes_per_address
* 8 - 2);
1550 hppa_hpux_find_dummy_bpaddr (CORE_ADDR addr
)
1552 /* In order for us to restore the space register to its starting state,
1553 we need the dummy trampoline to return to the an instruction address in
1554 the same space as where we started the call. We used to place the
1555 breakpoint near the current pc, however, this breaks nested dummy calls
1556 as the nested call will hit the breakpoint address and terminate
1557 prematurely. Instead, we try to look for an address in the same space to
1560 This is similar in spirit to putting the breakpoint at the "entry point"
1561 of an executable. */
1563 struct obj_section
*sec
;
1564 struct unwind_table_entry
*u
;
1565 struct minimal_symbol
*msym
;
1569 sec
= find_pc_section (addr
);
1572 /* First try the lowest address in the section; we can use it as long
1573 as it is "regular" code (i.e. not a stub) */
1574 u
= find_unwind_entry (sec
->addr
);
1575 if (!u
|| u
->stub_unwind
.stub_type
== 0)
1578 /* Otherwise, we need to find a symbol for a regular function. We
1579 do this by walking the list of msymbols in the objfile. The symbol
1580 we find should not be the same as the function that was passed in. */
1582 /* FIXME: this is broken, because we can find a function that will be
1583 called by the dummy call target function, which will still not
1586 find_pc_partial_function (addr
, NULL
, &func
, NULL
);
1587 for (i
= 0, msym
= sec
->objfile
->msymbols
;
1588 i
< sec
->objfile
->minimal_symbol_count
;
1591 u
= find_unwind_entry (SYMBOL_VALUE_ADDRESS (msym
));
1592 if (func
!= SYMBOL_VALUE_ADDRESS (msym
)
1593 && (!u
|| u
->stub_unwind
.stub_type
== 0))
1594 return SYMBOL_VALUE_ADDRESS (msym
);
1598 warning ("Cannot find suitable address to place dummy breakpoint; nested "
1599 "calls may fail.\n");
1604 hppa_hpux_push_dummy_code (struct gdbarch
*gdbarch
, CORE_ADDR sp
,
1605 CORE_ADDR funcaddr
, int using_gcc
,
1606 struct value
**args
, int nargs
,
1607 struct type
*value_type
,
1608 CORE_ADDR
*real_pc
, CORE_ADDR
*bp_addr
)
1610 CORE_ADDR pc
, stubaddr
;
1615 /* Note: we don't want to pass a function descriptor here; push_dummy_call
1616 fills in the PIC register for us. */
1617 funcaddr
= gdbarch_convert_from_func_ptr_addr (gdbarch
, funcaddr
, NULL
);
1619 /* The simple case is where we call a function in the same space that we are
1620 currently in; in that case we don't really need to do anything. */
1621 if (hppa_hpux_sr_for_addr (pc
) == hppa_hpux_sr_for_addr (funcaddr
))
1623 /* Intraspace call. */
1624 *bp_addr
= hppa_hpux_find_dummy_bpaddr (pc
);
1625 *real_pc
= funcaddr
;
1626 regcache_cooked_write_unsigned (current_regcache
, HPPA_RP_REGNUM
, *bp_addr
);
1631 /* In order to make an interspace call, we need to go through a stub.
1632 gcc supplies an appropriate stub called "__gcc_plt_call", however, if
1633 an application is compiled with HP compilers then this stub is not
1634 available. We used to fallback to "__d_plt_call", however that stub
1635 is not entirely useful for us because it doesn't do an interspace
1636 return back to the caller. Also, on hppa64-hpux, there is no
1637 __gcc_plt_call available. In order to keep the code uniform, we
1638 instead don't use either of these stubs, but instead write our own
1641 A problem arises since the stack is located in a different space than
1642 code, so in order to branch to a stack stub, we will need to do an
1643 interspace branch. Previous versions of gdb did this by modifying code
1644 at the current pc and doing single-stepping to set the pcsq. Since this
1645 is highly undesirable, we use a different scheme:
1647 All we really need to do the branch to the stub is a short instruction
1658 Instead of writing these sequences ourselves, we can find it in
1659 the instruction stream that belongs to the current space. While this
1660 seems difficult at first, we are actually guaranteed to find the sequences
1664 - in export stubs for shared libraries
1665 - in the "noshlibs" routine in the main module
1668 - at the end of each "regular" function
1670 We cache the address of these sequences in the objfile's private data
1671 since these operations can potentially be quite expensive.
1674 - write a stack trampoline
1675 - look for a suitable instruction sequence in the current space
1676 - point the sequence at the trampoline
1677 - set the return address of the trampoline to the current space
1678 (see hppa_hpux_find_dummy_call_bpaddr)
1679 - set the continuing address of the "dummy code" as the sequence.
1683 if (IS_32BIT_TARGET (gdbarch
))
1685 static unsigned int hppa32_tramp
[] = {
1686 0x0fdf1291, /* stw r31,-8(,sp) */
1687 0x02c010a1, /* ldsid (,r22),r1 */
1688 0x00011820, /* mtsp r1,sr0 */
1689 0xe6c00000, /* be,l 0(sr0,r22),%sr0,%r31 */
1690 0x081f0242, /* copy r31,rp */
1691 0x0fd11082, /* ldw -8(,sp),rp */
1692 0x004010a1, /* ldsid (,rp),r1 */
1693 0x00011820, /* mtsp r1,sr0 */
1694 0xe0400000, /* be 0(sr0,rp) */
1695 0x08000240 /* nop */
1698 /* for hppa32, we must call the function through a stub so that on
1699 return it can return to the space of our trampoline. */
1700 stubaddr
= hppa_hpux_find_import_stub_for_addr (funcaddr
);
1702 error ("Cannot call external function not referenced by application "
1703 "(no import stub).\n");
1704 regcache_cooked_write_unsigned (current_regcache
, 22, stubaddr
);
1706 write_memory (sp
, (char *)&hppa32_tramp
, sizeof (hppa32_tramp
));
1708 *bp_addr
= hppa_hpux_find_dummy_bpaddr (pc
);
1709 regcache_cooked_write_unsigned (current_regcache
, 31, *bp_addr
);
1711 *real_pc
= hppa32_hpux_search_dummy_call_sequence (gdbarch
, pc
, &argreg
);
1713 error ("Cannot make interspace call from here.\n");
1715 regcache_cooked_write_unsigned (current_regcache
, argreg
, sp
);
1717 sp
+= sizeof (hppa32_tramp
);
1721 static unsigned int hppa64_tramp
[] = {
1722 0xeac0f000, /* bve,l (r22),%r2 */
1723 0x0fdf12d1, /* std r31,-8(,sp) */
1724 0x0fd110c2, /* ldd -8(,sp),rp */
1725 0xe840d002, /* bve,n (rp) */
1726 0x08000240 /* nop */
1729 /* for hppa64, we don't need to call through a stub; all functions
1730 return via a bve. */
1731 regcache_cooked_write_unsigned (current_regcache
, 22, funcaddr
);
1732 write_memory (sp
, (char *)&hppa64_tramp
, sizeof (hppa64_tramp
));
1735 regcache_cooked_write_unsigned (current_regcache
, 31, *bp_addr
);
1737 *real_pc
= hppa64_hpux_search_dummy_call_sequence (gdbarch
, pc
, &argreg
);
1739 error ("Cannot make interspace call from here.\n");
1741 regcache_cooked_write_unsigned (current_regcache
, argreg
, sp
);
1743 sp
+= sizeof (hppa64_tramp
);
1746 sp
= gdbarch_frame_align (gdbarch
, sp
);
1753 /* Bit in the `ss_flag' member of `struct save_state' that indicates
1754 that the 64-bit register values are live. From
1755 <machine/save_state.h>. */
1756 #define HPPA_HPUX_SS_WIDEREGS 0x40
1758 /* Offsets of various parts of `struct save_state'. From
1759 <machine/save_state.h>. */
1760 #define HPPA_HPUX_SS_FLAGS_OFFSET 0
1761 #define HPPA_HPUX_SS_NARROW_OFFSET 4
1762 #define HPPA_HPUX_SS_FPBLOCK_OFFSET 256
1763 #define HPPA_HPUX_SS_WIDE_OFFSET 640
1765 /* The size of `struct save_state. */
1766 #define HPPA_HPUX_SAVE_STATE_SIZE 1152
1768 /* The size of `struct pa89_save_state', which corresponds to PA-RISC
1769 1.1, the lowest common denominator that we support. */
1770 #define HPPA_HPUX_PA89_SAVE_STATE_SIZE 512
1773 hppa_hpux_supply_ss_narrow (struct regcache
*regcache
,
1774 int regnum
, const char *save_state
)
1776 const char *ss_narrow
= save_state
+ HPPA_HPUX_SS_NARROW_OFFSET
;
1779 for (i
= HPPA_R1_REGNUM
; i
< HPPA_FP0_REGNUM
; i
++)
1781 if (regnum
== i
|| regnum
== -1)
1782 regcache_raw_supply (regcache
, i
, ss_narrow
+ offset
);
1789 hppa_hpux_supply_ss_fpblock (struct regcache
*regcache
,
1790 int regnum
, const char *save_state
)
1792 const char *ss_fpblock
= save_state
+ HPPA_HPUX_SS_FPBLOCK_OFFSET
;
1795 /* FIXME: We view the floating-point state as 64 single-precision
1796 registers for 32-bit code, and 32 double-precision register for
1797 64-bit code. This distinction is artificial and should be
1798 eliminated. If that ever happens, we should remove the if-clause
1801 if (register_size (get_regcache_arch (regcache
), HPPA_FP0_REGNUM
) == 4)
1803 for (i
= HPPA_FP0_REGNUM
; i
< HPPA_FP0_REGNUM
+ 64; i
++)
1805 if (regnum
== i
|| regnum
== -1)
1806 regcache_raw_supply (regcache
, i
, ss_fpblock
+ offset
);
1813 for (i
= HPPA_FP0_REGNUM
; i
< HPPA_FP0_REGNUM
+ 32; i
++)
1815 if (regnum
== i
|| regnum
== -1)
1816 regcache_raw_supply (regcache
, i
, ss_fpblock
+ offset
);
1824 hppa_hpux_supply_ss_wide (struct regcache
*regcache
,
1825 int regnum
, const char *save_state
)
1827 const char *ss_wide
= save_state
+ HPPA_HPUX_SS_WIDE_OFFSET
;
1830 if (register_size (get_regcache_arch (regcache
), HPPA_R1_REGNUM
) == 4)
1833 for (i
= HPPA_R1_REGNUM
; i
< HPPA_FP0_REGNUM
; i
++)
1835 if (regnum
== i
|| regnum
== -1)
1836 regcache_raw_supply (regcache
, i
, ss_wide
+ offset
);
1843 hppa_hpux_supply_save_state (const struct regset
*regset
,
1844 struct regcache
*regcache
,
1845 int regnum
, const void *regs
, size_t len
)
1847 const char *proc_info
= regs
;
1848 const char *save_state
= proc_info
+ 8;
1851 flags
= extract_unsigned_integer (save_state
+ HPPA_HPUX_SS_FLAGS_OFFSET
, 4);
1852 if (regnum
== -1 || regnum
== HPPA_FLAGS_REGNUM
)
1854 struct gdbarch
*arch
= get_regcache_arch (regcache
);
1855 size_t size
= register_size (arch
, HPPA_FLAGS_REGNUM
);
1858 store_unsigned_integer (buf
, size
, flags
);
1859 regcache_raw_supply (regcache
, HPPA_FLAGS_REGNUM
, buf
);
1862 /* If the SS_WIDEREGS flag is set, we really do need the full
1863 `struct save_state'. */
1864 if (flags
& HPPA_HPUX_SS_WIDEREGS
&& len
< HPPA_HPUX_SAVE_STATE_SIZE
)
1865 error ("Register set contents too small");
1867 if (flags
& HPPA_HPUX_SS_WIDEREGS
)
1868 hppa_hpux_supply_ss_wide (regcache
, regnum
, save_state
);
1870 hppa_hpux_supply_ss_narrow (regcache
, regnum
, save_state
);
1872 hppa_hpux_supply_ss_fpblock (regcache
, regnum
, save_state
);
1875 /* HP-UX register set. */
1877 static struct regset hppa_hpux_regset
=
1880 hppa_hpux_supply_save_state
1883 static const struct regset
*
1884 hppa_hpux_regset_from_core_section (struct gdbarch
*gdbarch
,
1885 const char *sect_name
, size_t sect_size
)
1887 if (strcmp (sect_name
, ".reg") == 0
1888 && sect_size
>= HPPA_HPUX_PA89_SAVE_STATE_SIZE
+ 8)
1889 return &hppa_hpux_regset
;
1895 /* Bit in the `ss_flag' member of `struct save_state' that indicates
1896 the state was saved from a system call. From
1897 <machine/save_state.h>. */
1898 #define HPPA_HPUX_SS_INSYSCALL 0x02
1901 hppa_hpux_read_pc (ptid_t ptid
)
1905 /* If we're currently in a system call return the contents of %r31. */
1906 flags
= read_register_pid (HPPA_FLAGS_REGNUM
, ptid
);
1907 if (flags
& HPPA_HPUX_SS_INSYSCALL
)
1908 return read_register_pid (HPPA_R31_REGNUM
, ptid
) & ~0x3;
1910 return hppa_read_pc (ptid
);
1914 hppa_hpux_write_pc (CORE_ADDR pc
, ptid_t ptid
)
1918 /* If we're currently in a system call also write PC into %r31. */
1919 flags
= read_register_pid (HPPA_FLAGS_REGNUM
, ptid
);
1920 if (flags
& HPPA_HPUX_SS_INSYSCALL
)
1921 write_register_pid (HPPA_R31_REGNUM
, pc
| 0x3, ptid
);
1923 return hppa_write_pc (pc
, ptid
);
1927 hppa_hpux_unwind_pc (struct gdbarch
*gdbarch
, struct frame_info
*next_frame
)
1931 /* If we're currently in a system call return the contents of %r31. */
1932 flags
= frame_unwind_register_unsigned (next_frame
, HPPA_FLAGS_REGNUM
);
1933 if (flags
& HPPA_HPUX_SS_INSYSCALL
)
1934 return frame_unwind_register_unsigned (next_frame
, HPPA_R31_REGNUM
) & ~0x3;
1936 return hppa_unwind_pc (gdbarch
, next_frame
);
1941 hppa_hpux_inferior_created (struct target_ops
*objfile
, int from_tty
)
1943 /* Some HP-UX related globals to clear when a new "main"
1944 symbol file is loaded. HP-specific. */
1945 deprecated_hp_som_som_object_present
= 0;
1946 hp_cxx_exception_support_initialized
= 0;
1949 /* Given the current value of the pc, check to see if it is inside a stub, and
1950 if so, change the value of the pc to point to the caller of the stub.
1951 NEXT_FRAME is the next frame in the current list of frames.
1952 BASE contains to stack frame base of the current frame.
1953 SAVE_REGS is the register file stored in the frame cache. */
1955 hppa_hpux_unwind_adjust_stub (struct frame_info
*next_frame
, CORE_ADDR base
,
1956 struct trad_frame_saved_reg
*saved_regs
)
1958 int optimized
, realreg
;
1959 enum lval_type lval
;
1961 char buffer
[sizeof(ULONGEST
)];
1964 struct unwind_table_entry
*u
;
1966 trad_frame_get_prev_register (next_frame
, saved_regs
,
1967 HPPA_PCOQ_HEAD_REGNUM
,
1968 &optimized
, &lval
, &addr
, &realreg
, buffer
);
1969 val
= extract_unsigned_integer (buffer
,
1970 register_size (get_frame_arch (next_frame
),
1971 HPPA_PCOQ_HEAD_REGNUM
));
1973 u
= find_unwind_entry (val
);
1974 if (u
&& u
->stub_unwind
.stub_type
== EXPORT
)
1976 stubpc
= read_memory_integer (base
- 24, TARGET_PTR_BIT
/ 8);
1977 trad_frame_set_value (saved_regs
, HPPA_PCOQ_HEAD_REGNUM
, stubpc
);
1979 else if (hppa_symbol_address ("__gcc_plt_call")
1980 == get_pc_function_start (val
))
1982 stubpc
= read_memory_integer (base
- 8, TARGET_PTR_BIT
/ 8);
1983 trad_frame_set_value (saved_regs
, HPPA_PCOQ_HEAD_REGNUM
, stubpc
);
1988 hppa_hpux_init_abi (struct gdbarch_info info
, struct gdbarch
*gdbarch
)
1990 struct gdbarch_tdep
*tdep
= gdbarch_tdep (gdbarch
);
1992 if (IS_32BIT_TARGET (gdbarch
))
1993 tdep
->in_solib_call_trampoline
= hppa32_hpux_in_solib_call_trampoline
;
1995 tdep
->in_solib_call_trampoline
= hppa64_hpux_in_solib_call_trampoline
;
1997 tdep
->unwind_adjust_stub
= hppa_hpux_unwind_adjust_stub
;
1999 set_gdbarch_in_solib_return_trampoline
2000 (gdbarch
, hppa_hpux_in_solib_return_trampoline
);
2001 set_gdbarch_skip_trampoline_code (gdbarch
, hppa_hpux_skip_trampoline_code
);
2003 set_gdbarch_push_dummy_code (gdbarch
, hppa_hpux_push_dummy_code
);
2004 set_gdbarch_call_dummy_location (gdbarch
, ON_STACK
);
2006 set_gdbarch_read_pc (gdbarch
, hppa_hpux_read_pc
);
2007 set_gdbarch_write_pc (gdbarch
, hppa_hpux_write_pc
);
2008 set_gdbarch_unwind_pc (gdbarch
, hppa_hpux_unwind_pc
);
2010 set_gdbarch_regset_from_core_section
2011 (gdbarch
, hppa_hpux_regset_from_core_section
);
2013 frame_unwind_append_sniffer (gdbarch
, hppa_hpux_sigtramp_unwind_sniffer
);
2015 observer_attach_inferior_created (hppa_hpux_inferior_created
);
2019 hppa_hpux_som_init_abi (struct gdbarch_info info
, struct gdbarch
*gdbarch
)
2021 struct gdbarch_tdep
*tdep
= gdbarch_tdep (gdbarch
);
2025 tdep
->find_global_pointer
= hppa32_hpux_find_global_pointer
;
2027 hppa_hpux_init_abi (info
, gdbarch
);
2028 som_solib_select (tdep
);
2032 hppa_hpux_elf_init_abi (struct gdbarch_info info
, struct gdbarch
*gdbarch
)
2034 struct gdbarch_tdep
*tdep
= gdbarch_tdep (gdbarch
);
2037 tdep
->find_global_pointer
= hppa64_hpux_find_global_pointer
;
2039 hppa_hpux_init_abi (info
, gdbarch
);
2040 pa64_solib_select (tdep
);
2043 static enum gdb_osabi
2044 hppa_hpux_core_osabi_sniffer (bfd
*abfd
)
2046 if (strcmp (bfd_get_target (abfd
), "hpux-core") == 0)
2047 return GDB_OSABI_HPUX_SOM
;
2049 return GDB_OSABI_UNKNOWN
;
2053 _initialize_hppa_hpux_tdep (void)
2055 /* BFD doesn't set a flavour for HP-UX style core files. It doesn't
2056 set the architecture either. */
2057 gdbarch_register_osabi_sniffer (bfd_arch_unknown
,
2058 bfd_target_unknown_flavour
,
2059 hppa_hpux_core_osabi_sniffer
);
2061 gdbarch_register_osabi (bfd_arch_hppa
, 0, GDB_OSABI_HPUX_SOM
,
2062 hppa_hpux_som_init_abi
);
2063 gdbarch_register_osabi (bfd_arch_hppa
, bfd_mach_hppa20w
, GDB_OSABI_HPUX_ELF
,
2064 hppa_hpux_elf_init_abi
);