1 /* Intel 386 target-dependent stuff.
2 Copyright (C) 1988, 1989, 1991, 1994, 1995, 1996, 1998
3 Free Software Foundation, Inc.
5 This file is part of GDB.
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 59 Temple Place - Suite 330,
20 Boston, MA 02111-1307, USA. */
23 #include "gdb_string.h"
28 #include "floatformat.h"
33 static long i386_get_frame_setup
PARAMS ((CORE_ADDR
));
35 static void i386_follow_jump
PARAMS ((void));
37 static void codestream_read
PARAMS ((unsigned char *, int));
39 static void codestream_seek
PARAMS ((CORE_ADDR
));
41 static unsigned char codestream_fill
PARAMS ((int));
43 CORE_ADDR skip_trampoline_code
PARAMS ((CORE_ADDR
, char *));
45 static int gdb_print_insn_i386 (bfd_vma
, disassemble_info
*);
47 void _initialize_i386_tdep
PARAMS ((void));
49 /* This is the variable the is set with "set disassembly-flavor",
50 and its legitimate values. */
51 static char att_flavor
[] = "att";
52 static char intel_flavor
[] = "intel";
53 static char *valid_flavors
[] =
59 static char *disassembly_flavor
= att_flavor
;
61 static void i386_print_register
PARAMS ((char *, int, int));
63 /* This is used to keep the bfd arch_info in sync with the disassembly flavor. */
64 static void set_disassembly_flavor_sfunc
PARAMS ((char *, int, struct cmd_list_element
*));
65 static void set_disassembly_flavor
PARAMS ((void));
67 /* Stdio style buffering was used to minimize calls to ptrace, but this
68 buffering did not take into account that the code section being accessed
69 may not be an even number of buffers long (even if the buffer is only
70 sizeof(int) long). In cases where the code section size happened to
71 be a non-integral number of buffers long, attempting to read the last
72 buffer would fail. Simply using target_read_memory and ignoring errors,
73 rather than read_memory, is not the correct solution, since legitimate
74 access errors would then be totally ignored. To properly handle this
75 situation and continue to use buffering would require that this code
76 be able to determine the minimum code section size granularity (not the
77 alignment of the section itself, since the actual failing case that
78 pointed out this problem had a section alignment of 4 but was not a
79 multiple of 4 bytes long), on a target by target basis, and then
80 adjust it's buffer size accordingly. This is messy, but potentially
81 feasible. It probably needs the bfd library's help and support. For
82 now, the buffer size is set to 1. (FIXME -fnf) */
84 #define CODESTREAM_BUFSIZ 1 /* Was sizeof(int), see note above. */
85 static CORE_ADDR codestream_next_addr
;
86 static CORE_ADDR codestream_addr
;
87 static unsigned char codestream_buf
[CODESTREAM_BUFSIZ
];
88 static int codestream_off
;
89 static int codestream_cnt
;
91 #define codestream_tell() (codestream_addr + codestream_off)
92 #define codestream_peek() (codestream_cnt == 0 ? \
93 codestream_fill(1): codestream_buf[codestream_off])
94 #define codestream_get() (codestream_cnt-- == 0 ? \
95 codestream_fill(0) : codestream_buf[codestream_off++])
98 codestream_fill (peek_flag
)
101 codestream_addr
= codestream_next_addr
;
102 codestream_next_addr
+= CODESTREAM_BUFSIZ
;
104 codestream_cnt
= CODESTREAM_BUFSIZ
;
105 read_memory (codestream_addr
, (char *) codestream_buf
, CODESTREAM_BUFSIZ
);
108 return (codestream_peek ());
110 return (codestream_get ());
114 codestream_seek (place
)
117 codestream_next_addr
= place
/ CODESTREAM_BUFSIZ
;
118 codestream_next_addr
*= CODESTREAM_BUFSIZ
;
121 while (codestream_tell () != place
)
126 codestream_read (buf
, count
)
133 for (i
= 0; i
< count
; i
++)
134 *p
++ = codestream_get ();
137 /* next instruction is a jump, move to target */
142 unsigned char buf
[4];
148 pos
= codestream_tell ();
151 if (codestream_peek () == 0x66)
157 switch (codestream_get ())
160 /* relative jump: if data16 == 0, disp32, else disp16 */
163 codestream_read (buf
, 2);
164 delta
= extract_signed_integer (buf
, 2);
166 /* include size of jmp inst (including the 0x66 prefix). */
171 codestream_read (buf
, 4);
172 delta
= extract_signed_integer (buf
, 4);
178 /* relative jump, disp8 (ignore data16) */
179 codestream_read (buf
, 1);
180 /* Sign-extend it. */
181 delta
= extract_signed_integer (buf
, 1);
186 codestream_seek (pos
);
190 * find & return amound a local space allocated, and advance codestream to
191 * first register push (if any)
193 * if entry sequence doesn't make sense, return -1, and leave
194 * codestream pointer random
198 i386_get_frame_setup (pc
)
203 codestream_seek (pc
);
207 op
= codestream_get ();
209 if (op
== 0x58) /* popl %eax */
212 * this function must start with
215 * xchgl %eax, (%esp) 0x87 0x04 0x24
216 * or xchgl %eax, 0(%esp) 0x87 0x44 0x24 0x00
218 * (the system 5 compiler puts out the second xchg
219 * inst, and the assembler doesn't try to optimize it,
220 * so the 'sib' form gets generated)
222 * this sequence is used to get the address of the return
223 * buffer for a function that returns a structure
226 unsigned char buf
[4];
227 static unsigned char proto1
[3] =
229 static unsigned char proto2
[4] =
230 {0x87, 0x44, 0x24, 0x00};
231 pos
= codestream_tell ();
232 codestream_read (buf
, 4);
233 if (memcmp (buf
, proto1
, 3) == 0)
235 else if (memcmp (buf
, proto2
, 4) == 0)
238 codestream_seek (pos
);
239 op
= codestream_get (); /* update next opcode */
242 if (op
== 0x68 || op
== 0x6a)
245 * this function may start with
255 unsigned char buf
[8];
257 /* Skip past the pushl instruction; it has either a one-byte
258 or a four-byte operand, depending on the opcode. */
259 pos
= codestream_tell ();
264 codestream_seek (pos
);
266 /* Read the following 8 bytes, which should be "call _probe" (6 bytes)
267 followed by "addl $4,%esp" (2 bytes). */
268 codestream_read (buf
, sizeof (buf
));
269 if (buf
[0] == 0xe8 && buf
[6] == 0xc4 && buf
[7] == 0x4)
271 codestream_seek (pos
);
272 op
= codestream_get (); /* update next opcode */
275 if (op
== 0x55) /* pushl %ebp */
277 /* check for movl %esp, %ebp - can be written two ways */
278 switch (codestream_get ())
281 if (codestream_get () != 0xec)
285 if (codestream_get () != 0xe5)
291 /* check for stack adjustment
295 * note: you can't subtract a 16 bit immediate
296 * from a 32 bit reg, so we don't have to worry
297 * about a data16 prefix
299 op
= codestream_peek ();
302 /* subl with 8 bit immed */
304 if (codestream_get () != 0xec)
305 /* Some instruction starting with 0x83 other than subl. */
307 codestream_seek (codestream_tell () - 2);
310 /* subl with signed byte immediate
311 * (though it wouldn't make sense to be negative)
313 return (codestream_get ());
318 /* Maybe it is subl with 32 bit immedediate. */
320 if (codestream_get () != 0xec)
321 /* Some instruction starting with 0x81 other than subl. */
323 codestream_seek (codestream_tell () - 2);
326 /* It is subl with 32 bit immediate. */
327 codestream_read ((unsigned char *) buf
, 4);
328 return extract_signed_integer (buf
, 4);
338 /* enter instruction: arg is 16 bit unsigned immed */
339 codestream_read ((unsigned char *) buf
, 2);
340 codestream_get (); /* flush final byte of enter instruction */
341 return extract_unsigned_integer (buf
, 2);
346 /* Return number of args passed to a frame.
347 Can return -1, meaning no way to tell. */
350 i386_frame_num_args (fi
)
351 struct frame_info
*fi
;
356 /* This loses because not only might the compiler not be popping the
357 args right after the function call, it might be popping args from both
358 this call and a previous one, and we would say there are more args
359 than there really are. */
363 struct frame_info
*pfi
;
365 /* on the 386, the instruction following the call could be:
367 addl $imm, %esp - imm/4 args; imm may be 8 or 32 bits
368 anything else - zero args */
372 frameless
= FRAMELESS_FUNCTION_INVOCATION (fi
);
374 /* In the absence of a frame pointer, GDB doesn't get correct values
375 for nameless arguments. Return -1, so it doesn't print any
376 nameless arguments. */
379 pfi
= get_prev_frame (fi
);
382 /* Note: this can happen if we are looking at the frame for
383 main, because FRAME_CHAIN_VALID won't let us go into
384 start. If we have debugging symbols, that's not really
385 a big deal; it just means it will only show as many arguments
386 to main as are declared. */
392 op
= read_memory_integer (retpc
, 1);
398 op
= read_memory_integer (retpc
+ 1, 1);
400 /* addl $<signed imm 8 bits>, %esp */
401 return (read_memory_integer (retpc
+ 2, 1) & 0xff) / 4;
406 { /* add with 32 bit immediate */
407 op
= read_memory_integer (retpc
+ 1, 1);
409 /* addl $<imm 32>, %esp */
410 return read_memory_integer (retpc
+ 2, 4) / 4;
423 * parse the first few instructions of the function to see
424 * what registers were stored.
426 * We handle these cases:
428 * The startup sequence can be at the start of the function,
429 * or the function can start with a branch to startup code at the end.
431 * %ebp can be set up with either the 'enter' instruction, or
432 * 'pushl %ebp, movl %esp, %ebp' (enter is too slow to be useful,
433 * but was once used in the sys5 compiler)
435 * Local space is allocated just below the saved %ebp by either the
436 * 'enter' instruction, or by 'subl $<size>, %esp'. 'enter' has
437 * a 16 bit unsigned argument for space to allocate, and the
438 * 'addl' instruction could have either a signed byte, or
441 * Next, the registers used by this function are pushed. In
442 * the sys5 compiler they will always be in the order: %edi, %esi, %ebx
443 * (and sometimes a harmless bug causes it to also save but not restore %eax);
444 * however, the code below is willing to see the pushes in any order,
445 * and will handle up to 8 of them.
447 * If the setup sequence is at the end of the function, then the
448 * next instruction will be a branch back to the start.
452 i386_frame_find_saved_regs (fip
, fsrp
)
453 struct frame_info
*fip
;
454 struct frame_saved_regs
*fsrp
;
458 CORE_ADDR dummy_bottom
;
463 memset (fsrp
, 0, sizeof *fsrp
);
465 /* if frame is the end of a dummy, compute where the
468 dummy_bottom
= fip
->frame
- 4 - REGISTER_BYTES
- CALL_DUMMY_LENGTH
;
470 /* check if the PC is in the stack, in a dummy frame */
471 if (dummy_bottom
<= fip
->pc
&& fip
->pc
<= fip
->frame
)
473 /* all regs were saved by push_call_dummy () */
475 for (i
= 0; i
< NUM_REGS
; i
++)
477 adr
-= REGISTER_RAW_SIZE (i
);
483 pc
= get_pc_function_start (fip
->pc
);
485 locals
= i386_get_frame_setup (pc
);
489 adr
= fip
->frame
- 4 - locals
;
490 for (i
= 0; i
< 8; i
++)
492 op
= codestream_get ();
493 if (op
< 0x50 || op
> 0x57)
495 #ifdef I386_REGNO_TO_SYMMETRY
496 /* Dynix uses different internal numbering. Ick. */
497 fsrp
->regs
[I386_REGNO_TO_SYMMETRY (op
- 0x50)] = adr
;
499 fsrp
->regs
[op
- 0x50] = adr
;
505 fsrp
->regs
[PC_REGNUM
] = fip
->frame
+ 4;
506 fsrp
->regs
[FP_REGNUM
] = fip
->frame
;
509 /* return pc of first real instruction */
512 i386_skip_prologue (pc
)
517 static unsigned char pic_pat
[6] =
518 {0xe8, 0, 0, 0, 0, /* call 0x0 */
519 0x5b, /* popl %ebx */
523 if (i386_get_frame_setup (pc
) < 0)
526 /* found valid frame setup - codestream now points to
527 * start of push instructions for saving registers
530 /* skip over register saves */
531 for (i
= 0; i
< 8; i
++)
533 op
= codestream_peek ();
534 /* break if not pushl inst */
535 if (op
< 0x50 || op
> 0x57)
540 /* The native cc on SVR4 in -K PIC mode inserts the following code to get
541 the address of the global offset table (GOT) into register %ebx.
544 movl %ebx,x(%ebp) (optional)
546 This code is with the rest of the prologue (at the end of the
547 function), so we have to skip it to get to the first real
548 instruction at the start of the function. */
550 pos
= codestream_tell ();
551 for (i
= 0; i
< 6; i
++)
553 op
= codestream_get ();
554 if (pic_pat
[i
] != op
)
559 unsigned char buf
[4];
562 op
= codestream_get ();
563 if (op
== 0x89) /* movl %ebx, x(%ebp) */
565 op
= codestream_get ();
566 if (op
== 0x5d) /* one byte offset from %ebp */
569 codestream_read (buf
, 1);
571 else if (op
== 0x9d) /* four byte offset from %ebp */
574 codestream_read (buf
, 4);
576 else /* unexpected instruction */
578 op
= codestream_get ();
581 if (delta
> 0 && op
== 0x81 && codestream_get () == 0xc3)
586 codestream_seek (pos
);
590 return (codestream_tell ());
594 i386_push_dummy_frame ()
596 CORE_ADDR sp
= read_register (SP_REGNUM
);
598 char regbuf
[MAX_REGISTER_RAW_SIZE
];
600 sp
= push_word (sp
, read_register (PC_REGNUM
));
601 sp
= push_word (sp
, read_register (FP_REGNUM
));
602 write_register (FP_REGNUM
, sp
);
603 for (regnum
= 0; regnum
< NUM_REGS
; regnum
++)
605 read_register_gen (regnum
, regbuf
);
606 sp
= push_bytes (sp
, regbuf
, REGISTER_RAW_SIZE (regnum
));
608 write_register (SP_REGNUM
, sp
);
614 struct frame_info
*frame
= get_current_frame ();
617 struct frame_saved_regs fsr
;
618 char regbuf
[MAX_REGISTER_RAW_SIZE
];
620 fp
= FRAME_FP (frame
);
621 get_frame_saved_regs (frame
, &fsr
);
622 for (regnum
= 0; regnum
< NUM_REGS
; regnum
++)
625 adr
= fsr
.regs
[regnum
];
628 read_memory (adr
, regbuf
, REGISTER_RAW_SIZE (regnum
));
629 write_register_bytes (REGISTER_BYTE (regnum
), regbuf
,
630 REGISTER_RAW_SIZE (regnum
));
633 write_register (FP_REGNUM
, read_memory_integer (fp
, 4));
634 write_register (PC_REGNUM
, read_memory_integer (fp
+ 4, 4));
635 write_register (SP_REGNUM
, fp
+ 8);
636 flush_cached_frames ();
639 #ifdef GET_LONGJMP_TARGET
641 /* Figure out where the longjmp will land. Slurp the args out of the stack.
642 We expect the first arg to be a pointer to the jmp_buf structure from which
643 we extract the pc (JB_PC) that we will land at. The pc is copied into PC.
644 This routine returns true on success. */
647 get_longjmp_target (pc
)
650 char buf
[TARGET_PTR_BIT
/ TARGET_CHAR_BIT
];
651 CORE_ADDR sp
, jb_addr
;
653 sp
= read_register (SP_REGNUM
);
655 if (target_read_memory (sp
+ SP_ARG0
, /* Offset of first arg on stack */
657 TARGET_PTR_BIT
/ TARGET_CHAR_BIT
))
660 jb_addr
= extract_address (buf
, TARGET_PTR_BIT
/ TARGET_CHAR_BIT
);
662 if (target_read_memory (jb_addr
+ JB_PC
* JB_ELEMENT_SIZE
, buf
,
663 TARGET_PTR_BIT
/ TARGET_CHAR_BIT
))
666 *pc
= extract_address (buf
, TARGET_PTR_BIT
/ TARGET_CHAR_BIT
);
671 #endif /* GET_LONGJMP_TARGET */
674 i386_extract_return_value (type
, regbuf
, valbuf
)
676 char regbuf
[REGISTER_BYTES
];
679 /* On AIX and i386 GNU/Linux, floating point values are returned in
680 floating point registers. */
681 #if defined(I386_AIX_TARGET) || defined(I386_GNULINUX_TARGET)
682 if (TYPE_CODE_FLT
== TYPE_CODE (type
))
685 /* 387 %st(0), gcc uses this */
686 floatformat_to_double (&floatformat_i387_ext
,
687 ®buf
[REGISTER_BYTE(FPDATA_REGNUM
)],
689 store_floating (valbuf
, TYPE_LENGTH (type
), d
);
692 #endif /* I386_AIX_TARGET || I386_GNULINUX_TARGET*/
694 int len
= TYPE_LENGTH (type
);
695 int low_size
= REGISTER_RAW_SIZE (LOW_RETURN_REGNUM
);
696 int high_size
= REGISTER_RAW_SIZE (HIGH_RETURN_REGNUM
);
699 memcpy (valbuf
, regbuf
+ REGISTER_BYTE (LOW_RETURN_REGNUM
), len
);
700 else if (len
<= (low_size
+ high_size
))
703 regbuf
+ REGISTER_BYTE (LOW_RETURN_REGNUM
),
705 memcpy (valbuf
+ low_size
,
706 regbuf
+ REGISTER_BYTE (HIGH_RETURN_REGNUM
),
710 error ("GDB bug: i386-tdep.c (i386_extract_return_value): Don't know how to find a return value %d bytes long", len
);
714 #ifdef I386V4_SIGTRAMP_SAVED_PC
715 /* Get saved user PC for sigtramp from the pushed ucontext on the stack
716 for all three variants of SVR4 sigtramps. */
719 i386v4_sigtramp_saved_pc (frame
)
720 struct frame_info
*frame
;
722 CORE_ADDR saved_pc_offset
= 4;
725 find_pc_partial_function (frame
->pc
, &name
, NULL
, NULL
);
728 if (STREQ (name
, "_sigreturn"))
729 saved_pc_offset
= 132 + 14 * 4;
730 else if (STREQ (name
, "_sigacthandler"))
731 saved_pc_offset
= 80 + 14 * 4;
732 else if (STREQ (name
, "sigvechandler"))
733 saved_pc_offset
= 120 + 14 * 4;
737 return read_memory_integer (frame
->next
->frame
+ saved_pc_offset
, 4);
738 return read_memory_integer (read_register (SP_REGNUM
) + saved_pc_offset
, 4);
740 #endif /* I386V4_SIGTRAMP_SAVED_PC */
742 #ifdef I386_LINUX_SIGTRAMP
744 /* When the i386 Linux kernel calls a signal handler, the return
745 address points to a bit of code on the stack. This function
746 returns whether the PC appears to be within this bit of code.
748 The instruction sequence is
752 or 0x58 0xb8 0x77 0x00 0x00 0x00 0xcd 0x80.
754 Checking for the code sequence should be somewhat reliable, because
755 the effect is to call the system call sigreturn. This is unlikely
756 to occur anywhere other than a signal trampoline.
758 It kind of sucks that we have to read memory from the process in
759 order to identify a signal trampoline, but there doesn't seem to be
760 any other way. The IN_SIGTRAMP macro in tm-linux.h arranges to
761 only call us if no function name could be identified, which should
762 be the case since the code is on the stack. */
764 #define LINUX_SIGTRAMP_INSN0 (0x58) /* pop %eax */
765 #define LINUX_SIGTRAMP_OFFSET0 (0)
766 #define LINUX_SIGTRAMP_INSN1 (0xb8) /* mov $NNNN,%eax */
767 #define LINUX_SIGTRAMP_OFFSET1 (1)
768 #define LINUX_SIGTRAMP_INSN2 (0xcd) /* int */
769 #define LINUX_SIGTRAMP_OFFSET2 (6)
771 static const unsigned char linux_sigtramp_code
[] =
773 LINUX_SIGTRAMP_INSN0
, /* pop %eax */
774 LINUX_SIGTRAMP_INSN1
, 0x77, 0x00, 0x00, 0x00, /* mov $0x77,%eax */
775 LINUX_SIGTRAMP_INSN2
, 0x80 /* int $0x80 */
778 #define LINUX_SIGTRAMP_LEN (sizeof linux_sigtramp_code)
780 /* If PC is in a sigtramp routine, return the address of the start of
781 the routine. Otherwise, return 0. */
784 i386_linux_sigtramp_start (pc
)
787 unsigned char buf
[LINUX_SIGTRAMP_LEN
];
789 /* We only recognize a signal trampoline if PC is at the start of
790 one of the three instructions. We optimize for finding the PC at
791 the start, as will be the case when the trampoline is not the
792 first frame on the stack. We assume that in the case where the
793 PC is not at the start of the instruction sequence, there will be
794 a few trailing readable bytes on the stack. */
796 if (read_memory_nobpt (pc
, (char *) buf
, LINUX_SIGTRAMP_LEN
) != 0)
799 if (buf
[0] != LINUX_SIGTRAMP_INSN0
)
805 case LINUX_SIGTRAMP_INSN1
:
806 adjust
= LINUX_SIGTRAMP_OFFSET1
;
808 case LINUX_SIGTRAMP_INSN2
:
809 adjust
= LINUX_SIGTRAMP_OFFSET2
;
817 if (read_memory_nobpt (pc
, (char *) buf
, LINUX_SIGTRAMP_LEN
) != 0)
821 if (memcmp (buf
, linux_sigtramp_code
, LINUX_SIGTRAMP_LEN
) != 0)
827 /* Return whether PC is in a Linux sigtramp routine. */
830 i386_linux_sigtramp (pc
)
833 return i386_linux_sigtramp_start (pc
) != 0;
836 /* Assuming FRAME is for a Linux sigtramp routine, return the saved
837 program counter. The Linux kernel will set up a sigcontext
838 structure immediately before the sigtramp routine on the stack. */
841 i386_linux_sigtramp_saved_pc (frame
)
842 struct frame_info
*frame
;
846 pc
= i386_linux_sigtramp_start (frame
->pc
);
848 error ("i386_linux_sigtramp_saved_pc called when no sigtramp");
849 return read_memory_integer ((pc
850 - LINUX_SIGCONTEXT_SIZE
851 + LINUX_SIGCONTEXT_PC_OFFSET
),
855 /* Assuming FRAME is for a Linux sigtramp routine, return the saved
856 stack pointer. The Linux kernel will set up a sigcontext structure
857 immediately before the sigtramp routine on the stack. */
860 i386_linux_sigtramp_saved_sp (frame
)
861 struct frame_info
*frame
;
865 pc
= i386_linux_sigtramp_start (frame
->pc
);
867 error ("i386_linux_sigtramp_saved_sp called when no sigtramp");
868 return read_memory_integer ((pc
869 - LINUX_SIGCONTEXT_SIZE
870 + LINUX_SIGCONTEXT_SP_OFFSET
),
874 #endif /* I386_LINUX_SIGTRAMP */
876 #ifdef STATIC_TRANSFORM_NAME
877 /* SunPRO encodes the static variables. This is not related to C++ mangling,
878 it is done for C too. */
881 sunpro_static_transform_name (name
)
885 if (IS_STATIC_TRANSFORM_NAME (name
))
887 /* For file-local statics there will be a period, a bunch
888 of junk (the contents of which match a string given in the
889 N_OPT), a period and the name. For function-local statics
890 there will be a bunch of junk (which seems to change the
891 second character from 'A' to 'B'), a period, the name of the
892 function, and the name. So just skip everything before the
894 p
= strrchr (name
, '.');
900 #endif /* STATIC_TRANSFORM_NAME */
904 /* Stuff for WIN32 PE style DLL's but is pretty generic really. */
907 skip_trampoline_code (pc
, name
)
911 if (pc
&& read_memory_unsigned_integer (pc
, 2) == 0x25ff) /* jmp *(dest) */
913 unsigned long indirect
= read_memory_unsigned_integer (pc
+ 2, 4);
914 struct minimal_symbol
*indsym
=
915 indirect
? lookup_minimal_symbol_by_pc (indirect
) : 0;
916 char *symname
= indsym
? SYMBOL_NAME (indsym
) : 0;
920 if (strncmp (symname
, "__imp_", 6) == 0
921 || strncmp (symname
, "_imp_", 5) == 0)
922 return name
? 1 : read_memory_unsigned_integer (indirect
, 4);
925 return 0; /* not a trampoline */
929 gdb_print_insn_i386 (memaddr
, info
)
931 disassemble_info
*info
;
933 if (disassembly_flavor
== att_flavor
)
934 return print_insn_i386_att (memaddr
, info
);
935 else if (disassembly_flavor
== intel_flavor
)
936 return print_insn_i386_intel (memaddr
, info
);
937 /* Never reached - disassembly_flavour is always either att_flavor
942 /* If the disassembly mode is intel, we have to also switch the
943 bfd mach_type. This function is run in the set disassembly_flavor
944 command, and does that. */
947 set_disassembly_flavor_sfunc (args
, from_tty
, c
)
950 struct cmd_list_element
*c
;
952 set_disassembly_flavor ();
956 set_disassembly_flavor ()
958 if (disassembly_flavor
== att_flavor
)
959 set_architecture_from_arch_mach (bfd_arch_i386
, bfd_mach_i386_i386
);
960 else if (disassembly_flavor
== intel_flavor
)
961 set_architecture_from_arch_mach (bfd_arch_i386
, bfd_mach_i386_i386_intel_syntax
);
964 /* Print the register regnum, or all registers if regnum is -1 */
967 i386_do_registers_info (regnum
, fpregs
)
971 char raw_regs
[REGISTER_BYTES
];
974 for (i
= 0; i
< NUM_REGS
; i
++)
975 read_relative_register_raw_bytes (i
, raw_regs
+ REGISTER_BYTE (i
));
977 if (regnum
< FPSTART_REGNUM
)
978 i386_print_register (raw_regs
, regnum
, fpregs
);
980 i387_print_register (raw_regs
, regnum
);
984 i386_print_register (raw_regs
, regnum
, fpregs
)
993 for (i
= 0; i
< FPSTART_REGNUM
; i
++)
995 if ((regnum
!= -1) && (i
!= regnum
))
998 val
= extract_signed_integer (raw_regs
+ REGISTER_BYTE (i
), 4);
1000 sprintf(string
, "0x%x", val
);
1001 printf_filtered ("%8.8s: %10.10s %11d\n", REGISTER_NAME(i
), string
, val
);
1004 if ((regnum
== -1) && fpregs
)
1005 for (i
= FPSTART_REGNUM
; i
< FPEND_REGNUM
; i
++)
1006 i387_print_register (raw_regs
, i
);
1010 _initialize_i386_tdep ()
1012 struct cmd_list_element
*new_cmd
;
1014 tm_print_insn
= gdb_print_insn_i386
;
1015 tm_print_insn_info
.mach
= bfd_lookup_arch (bfd_arch_i386
, 0)->mach
;
1017 /* Add the variable that controls the disassembly flavor */
1019 new_cmd
= add_set_enum_cmd ("disassembly-flavor", no_class
,
1021 (char *) &disassembly_flavor
,
1022 "Set the disassembly flavor, the valid values are \"att\" and \"intel\", \
1023 and the default value is \"att\".",
1025 new_cmd
->function
.sfunc
= set_disassembly_flavor_sfunc
;
1026 add_show_from_set (new_cmd
, &showlist
);
1028 /* Finally, initialize the disassembly flavor to the default given
1029 in the disassembly_flavor variable */
1031 set_disassembly_flavor ();