* mips-linux-tdep.c: Update N32/N64 signal frame comments.
[deliverable/binutils-gdb.git] / gdb / solib-svr4.c
1 /* Handle SVR4 shared libraries for GDB, the GNU Debugger.
2
3 Copyright (C) 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1998, 1999, 2000,
4 2001, 2003, 2004, 2005, 2006, 2007, 2008 Free Software Foundation, Inc.
5
6 This file is part of GDB.
7
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
12
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>. */
20
21 #include "defs.h"
22
23 #include "elf/external.h"
24 #include "elf/common.h"
25 #include "elf/mips.h"
26
27 #include "symtab.h"
28 #include "bfd.h"
29 #include "symfile.h"
30 #include "objfiles.h"
31 #include "gdbcore.h"
32 #include "target.h"
33 #include "inferior.h"
34
35 #include "gdb_assert.h"
36
37 #include "solist.h"
38 #include "solib.h"
39 #include "solib-svr4.h"
40
41 #include "bfd-target.h"
42 #include "elf-bfd.h"
43 #include "exec.h"
44 #include "auxv.h"
45
46 static struct link_map_offsets *svr4_fetch_link_map_offsets (void);
47 static int svr4_have_link_map_offsets (void);
48
49 /* Link map info to include in an allocated so_list entry */
50
51 struct lm_info
52 {
53 /* Pointer to copy of link map from inferior. The type is char *
54 rather than void *, so that we may use byte offsets to find the
55 various fields without the need for a cast. */
56 gdb_byte *lm;
57
58 /* Amount by which addresses in the binary should be relocated to
59 match the inferior. This could most often be taken directly
60 from lm, but when prelinking is involved and the prelink base
61 address changes, we may need a different offset, we want to
62 warn about the difference and compute it only once. */
63 CORE_ADDR l_addr;
64 };
65
66 /* On SVR4 systems, a list of symbols in the dynamic linker where
67 GDB can try to place a breakpoint to monitor shared library
68 events.
69
70 If none of these symbols are found, or other errors occur, then
71 SVR4 systems will fall back to using a symbol as the "startup
72 mapping complete" breakpoint address. */
73
74 static char *solib_break_names[] =
75 {
76 "r_debug_state",
77 "_r_debug_state",
78 "_dl_debug_state",
79 "rtld_db_dlactivity",
80 "_rtld_debug_state",
81
82 NULL
83 };
84
85 #define BKPT_AT_SYMBOL 1
86
87 #if defined (BKPT_AT_SYMBOL)
88 static char *bkpt_names[] =
89 {
90 #ifdef SOLIB_BKPT_NAME
91 SOLIB_BKPT_NAME, /* Prefer configured name if it exists. */
92 #endif
93 "_start",
94 "__start",
95 "main",
96 NULL
97 };
98 #endif
99
100 static char *main_name_list[] =
101 {
102 "main_$main",
103 NULL
104 };
105
106 /* Return non-zero if GDB_SO_NAME and INFERIOR_SO_NAME represent
107 the same shared library. */
108
109 static int
110 svr4_same_1 (const char *gdb_so_name, const char *inferior_so_name)
111 {
112 if (strcmp (gdb_so_name, inferior_so_name) == 0)
113 return 1;
114
115 /* On Solaris, when starting inferior we think that dynamic linker is
116 /usr/lib/ld.so.1, but later on, the table of loaded shared libraries
117 contains /lib/ld.so.1. Sometimes one file is a link to another, but
118 sometimes they have identical content, but are not linked to each
119 other. We don't restrict this check for Solaris, but the chances
120 of running into this situation elsewhere are very low. */
121 if (strcmp (gdb_so_name, "/usr/lib/ld.so.1") == 0
122 && strcmp (inferior_so_name, "/lib/ld.so.1") == 0)
123 return 1;
124
125 /* Similarly, we observed the same issue with sparc64, but with
126 different locations. */
127 if (strcmp (gdb_so_name, "/usr/lib/sparcv9/ld.so.1") == 0
128 && strcmp (inferior_so_name, "/lib/sparcv9/ld.so.1") == 0)
129 return 1;
130
131 return 0;
132 }
133
134 static int
135 svr4_same (struct so_list *gdb, struct so_list *inferior)
136 {
137 return (svr4_same_1 (gdb->so_original_name, inferior->so_original_name));
138 }
139
140 /* link map access functions */
141
142 static CORE_ADDR
143 LM_ADDR_FROM_LINK_MAP (struct so_list *so)
144 {
145 struct link_map_offsets *lmo = svr4_fetch_link_map_offsets ();
146
147 return extract_typed_address (so->lm_info->lm + lmo->l_addr_offset,
148 builtin_type_void_data_ptr);
149 }
150
151 static int
152 HAS_LM_DYNAMIC_FROM_LINK_MAP ()
153 {
154 struct link_map_offsets *lmo = svr4_fetch_link_map_offsets ();
155
156 return lmo->l_ld_offset >= 0;
157 }
158
159 static CORE_ADDR
160 LM_DYNAMIC_FROM_LINK_MAP (struct so_list *so)
161 {
162 struct link_map_offsets *lmo = svr4_fetch_link_map_offsets ();
163
164 return extract_typed_address (so->lm_info->lm + lmo->l_ld_offset,
165 builtin_type_void_data_ptr);
166 }
167
168 static CORE_ADDR
169 LM_ADDR_CHECK (struct so_list *so, bfd *abfd)
170 {
171 if (so->lm_info->l_addr == (CORE_ADDR)-1)
172 {
173 struct bfd_section *dyninfo_sect;
174 CORE_ADDR l_addr, l_dynaddr, dynaddr, align = 0x1000;
175
176 l_addr = LM_ADDR_FROM_LINK_MAP (so);
177
178 if (! abfd || ! HAS_LM_DYNAMIC_FROM_LINK_MAP ())
179 goto set_addr;
180
181 l_dynaddr = LM_DYNAMIC_FROM_LINK_MAP (so);
182
183 dyninfo_sect = bfd_get_section_by_name (abfd, ".dynamic");
184 if (dyninfo_sect == NULL)
185 goto set_addr;
186
187 dynaddr = bfd_section_vma (abfd, dyninfo_sect);
188
189 if (dynaddr + l_addr != l_dynaddr)
190 {
191 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour)
192 {
193 Elf_Internal_Ehdr *ehdr = elf_tdata (abfd)->elf_header;
194 Elf_Internal_Phdr *phdr = elf_tdata (abfd)->phdr;
195 int i;
196
197 align = 1;
198
199 for (i = 0; i < ehdr->e_phnum; i++)
200 if (phdr[i].p_type == PT_LOAD && phdr[i].p_align > align)
201 align = phdr[i].p_align;
202 }
203
204 /* Turn it into a mask. */
205 align--;
206
207 /* If the changes match the alignment requirements, we
208 assume we're using a core file that was generated by the
209 same binary, just prelinked with a different base offset.
210 If it doesn't match, we may have a different binary, the
211 same binary with the dynamic table loaded at an unrelated
212 location, or anything, really. To avoid regressions,
213 don't adjust the base offset in the latter case, although
214 odds are that, if things really changed, debugging won't
215 quite work. */
216 if ((l_addr & align) == ((l_dynaddr - dynaddr) & align))
217 {
218 l_addr = l_dynaddr - dynaddr;
219
220 warning (_(".dynamic section for \"%s\" "
221 "is not at the expected address"), so->so_name);
222 warning (_("difference appears to be caused by prelink, "
223 "adjusting expectations"));
224 }
225 else
226 warning (_(".dynamic section for \"%s\" "
227 "is not at the expected address "
228 "(wrong library or version mismatch?)"), so->so_name);
229 }
230
231 set_addr:
232 so->lm_info->l_addr = l_addr;
233 }
234
235 return so->lm_info->l_addr;
236 }
237
238 static CORE_ADDR
239 LM_NEXT (struct so_list *so)
240 {
241 struct link_map_offsets *lmo = svr4_fetch_link_map_offsets ();
242
243 return extract_typed_address (so->lm_info->lm + lmo->l_next_offset,
244 builtin_type_void_data_ptr);
245 }
246
247 static CORE_ADDR
248 LM_NAME (struct so_list *so)
249 {
250 struct link_map_offsets *lmo = svr4_fetch_link_map_offsets ();
251
252 return extract_typed_address (so->lm_info->lm + lmo->l_name_offset,
253 builtin_type_void_data_ptr);
254 }
255
256 static int
257 IGNORE_FIRST_LINK_MAP_ENTRY (struct so_list *so)
258 {
259 struct link_map_offsets *lmo = svr4_fetch_link_map_offsets ();
260
261 /* Assume that everything is a library if the dynamic loader was loaded
262 late by a static executable. */
263 if (bfd_get_section_by_name (exec_bfd, ".dynamic") == NULL)
264 return 0;
265
266 return extract_typed_address (so->lm_info->lm + lmo->l_prev_offset,
267 builtin_type_void_data_ptr) == 0;
268 }
269
270 static CORE_ADDR debug_base; /* Base of dynamic linker structures */
271
272 /* Validity flag for debug_loader_offset. */
273 static int debug_loader_offset_p;
274
275 /* Load address for the dynamic linker, inferred. */
276 static CORE_ADDR debug_loader_offset;
277
278 /* Name of the dynamic linker, valid if debug_loader_offset_p. */
279 static char *debug_loader_name;
280
281 /* Local function prototypes */
282
283 static int match_main (char *);
284
285 static CORE_ADDR bfd_lookup_symbol (bfd *, char *);
286
287 /*
288
289 LOCAL FUNCTION
290
291 bfd_lookup_symbol -- lookup the value for a specific symbol
292
293 SYNOPSIS
294
295 CORE_ADDR bfd_lookup_symbol (bfd *abfd, char *symname)
296
297 DESCRIPTION
298
299 An expensive way to lookup the value of a single symbol for
300 bfd's that are only temporary anyway. This is used by the
301 shared library support to find the address of the debugger
302 notification routine in the shared library.
303
304 The returned symbol may be in a code or data section; functions
305 will normally be in a code section, but may be in a data section
306 if this architecture uses function descriptors.
307
308 Note that 0 is specifically allowed as an error return (no
309 such symbol).
310 */
311
312 static CORE_ADDR
313 bfd_lookup_symbol (bfd *abfd, char *symname)
314 {
315 long storage_needed;
316 asymbol *sym;
317 asymbol **symbol_table;
318 unsigned int number_of_symbols;
319 unsigned int i;
320 struct cleanup *back_to;
321 CORE_ADDR symaddr = 0;
322
323 storage_needed = bfd_get_symtab_upper_bound (abfd);
324
325 if (storage_needed > 0)
326 {
327 symbol_table = (asymbol **) xmalloc (storage_needed);
328 back_to = make_cleanup (xfree, symbol_table);
329 number_of_symbols = bfd_canonicalize_symtab (abfd, symbol_table);
330
331 for (i = 0; i < number_of_symbols; i++)
332 {
333 sym = *symbol_table++;
334 if (strcmp (sym->name, symname) == 0
335 && (sym->section->flags & (SEC_CODE | SEC_DATA)) != 0)
336 {
337 /* BFD symbols are section relative. */
338 symaddr = sym->value + sym->section->vma;
339 break;
340 }
341 }
342 do_cleanups (back_to);
343 }
344
345 if (symaddr)
346 return symaddr;
347
348 /* On FreeBSD, the dynamic linker is stripped by default. So we'll
349 have to check the dynamic string table too. */
350
351 storage_needed = bfd_get_dynamic_symtab_upper_bound (abfd);
352
353 if (storage_needed > 0)
354 {
355 symbol_table = (asymbol **) xmalloc (storage_needed);
356 back_to = make_cleanup (xfree, symbol_table);
357 number_of_symbols = bfd_canonicalize_dynamic_symtab (abfd, symbol_table);
358
359 for (i = 0; i < number_of_symbols; i++)
360 {
361 sym = *symbol_table++;
362
363 if (strcmp (sym->name, symname) == 0
364 && (sym->section->flags & (SEC_CODE | SEC_DATA)) != 0)
365 {
366 /* BFD symbols are section relative. */
367 symaddr = sym->value + sym->section->vma;
368 break;
369 }
370 }
371 do_cleanups (back_to);
372 }
373
374 return symaddr;
375 }
376
377 /* Scan for DYNTAG in .dynamic section of ABFD. If DYNTAG is found 1 is
378 returned and the corresponding PTR is set. */
379
380 static int
381 scan_dyntag (int dyntag, bfd *abfd, CORE_ADDR *ptr)
382 {
383 int arch_size, step, sect_size;
384 long dyn_tag;
385 CORE_ADDR dyn_ptr, dyn_addr;
386 gdb_byte *bufend, *bufstart, *buf;
387 Elf32_External_Dyn *x_dynp_32;
388 Elf64_External_Dyn *x_dynp_64;
389 struct bfd_section *sect;
390
391 if (abfd == NULL)
392 return 0;
393 arch_size = bfd_get_arch_size (abfd);
394 if (arch_size == -1)
395 return 0;
396
397 /* Find the start address of the .dynamic section. */
398 sect = bfd_get_section_by_name (abfd, ".dynamic");
399 if (sect == NULL)
400 return 0;
401 dyn_addr = bfd_section_vma (abfd, sect);
402
403 /* Read in .dynamic from the BFD. We will get the actual value
404 from memory later. */
405 sect_size = bfd_section_size (abfd, sect);
406 buf = bufstart = alloca (sect_size);
407 if (!bfd_get_section_contents (abfd, sect,
408 buf, 0, sect_size))
409 return 0;
410
411 /* Iterate over BUF and scan for DYNTAG. If found, set PTR and return. */
412 step = (arch_size == 32) ? sizeof (Elf32_External_Dyn)
413 : sizeof (Elf64_External_Dyn);
414 for (bufend = buf + sect_size;
415 buf < bufend;
416 buf += step)
417 {
418 if (arch_size == 32)
419 {
420 x_dynp_32 = (Elf32_External_Dyn *) buf;
421 dyn_tag = bfd_h_get_32 (abfd, (bfd_byte *) x_dynp_32->d_tag);
422 dyn_ptr = bfd_h_get_32 (abfd, (bfd_byte *) x_dynp_32->d_un.d_ptr);
423 }
424 else
425 {
426 x_dynp_64 = (Elf64_External_Dyn *) buf;
427 dyn_tag = bfd_h_get_64 (abfd, (bfd_byte *) x_dynp_64->d_tag);
428 dyn_ptr = bfd_h_get_64 (abfd, (bfd_byte *) x_dynp_64->d_un.d_ptr);
429 }
430 if (dyn_tag == DT_NULL)
431 return 0;
432 if (dyn_tag == dyntag)
433 {
434 /* If requested, try to read the runtime value of this .dynamic
435 entry. */
436 if (ptr)
437 {
438 gdb_byte ptr_buf[8];
439 CORE_ADDR ptr_addr;
440
441 ptr_addr = dyn_addr + (buf - bufstart) + arch_size / 8;
442 if (target_read_memory (ptr_addr, ptr_buf, arch_size / 8) == 0)
443 dyn_ptr = extract_typed_address (ptr_buf,
444 builtin_type_void_data_ptr);
445 *ptr = dyn_ptr;
446 }
447 return 1;
448 }
449 }
450
451 return 0;
452 }
453
454
455 /*
456
457 LOCAL FUNCTION
458
459 elf_locate_base -- locate the base address of dynamic linker structs
460 for SVR4 elf targets.
461
462 SYNOPSIS
463
464 CORE_ADDR elf_locate_base (void)
465
466 DESCRIPTION
467
468 For SVR4 elf targets the address of the dynamic linker's runtime
469 structure is contained within the dynamic info section in the
470 executable file. The dynamic section is also mapped into the
471 inferior address space. Because the runtime loader fills in the
472 real address before starting the inferior, we have to read in the
473 dynamic info section from the inferior address space.
474 If there are any errors while trying to find the address, we
475 silently return 0, otherwise the found address is returned.
476
477 */
478
479 static CORE_ADDR
480 elf_locate_base (void)
481 {
482 struct minimal_symbol *msymbol;
483 CORE_ADDR dyn_ptr;
484
485 /* Look for DT_MIPS_RLD_MAP first. MIPS executables use this
486 instead of DT_DEBUG, although they sometimes contain an unused
487 DT_DEBUG. */
488 if (scan_dyntag (DT_MIPS_RLD_MAP, exec_bfd, &dyn_ptr))
489 {
490 gdb_byte *pbuf;
491 int pbuf_size = TYPE_LENGTH (builtin_type_void_data_ptr);
492 pbuf = alloca (pbuf_size);
493 /* DT_MIPS_RLD_MAP contains a pointer to the address
494 of the dynamic link structure. */
495 if (target_read_memory (dyn_ptr, pbuf, pbuf_size))
496 return 0;
497 return extract_typed_address (pbuf, builtin_type_void_data_ptr);
498 }
499
500 /* Find DT_DEBUG. */
501 if (scan_dyntag (DT_DEBUG, exec_bfd, &dyn_ptr))
502 return dyn_ptr;
503
504 /* This may be a static executable. Look for the symbol
505 conventionally named _r_debug, as a last resort. */
506 msymbol = lookup_minimal_symbol ("_r_debug", NULL, symfile_objfile);
507 if (msymbol != NULL)
508 return SYMBOL_VALUE_ADDRESS (msymbol);
509
510 /* DT_DEBUG entry not found. */
511 return 0;
512 }
513
514 /*
515
516 LOCAL FUNCTION
517
518 locate_base -- locate the base address of dynamic linker structs
519
520 SYNOPSIS
521
522 CORE_ADDR locate_base (void)
523
524 DESCRIPTION
525
526 For both the SunOS and SVR4 shared library implementations, if the
527 inferior executable has been linked dynamically, there is a single
528 address somewhere in the inferior's data space which is the key to
529 locating all of the dynamic linker's runtime structures. This
530 address is the value of the debug base symbol. The job of this
531 function is to find and return that address, or to return 0 if there
532 is no such address (the executable is statically linked for example).
533
534 For SunOS, the job is almost trivial, since the dynamic linker and
535 all of it's structures are statically linked to the executable at
536 link time. Thus the symbol for the address we are looking for has
537 already been added to the minimal symbol table for the executable's
538 objfile at the time the symbol file's symbols were read, and all we
539 have to do is look it up there. Note that we explicitly do NOT want
540 to find the copies in the shared library.
541
542 The SVR4 version is a bit more complicated because the address
543 is contained somewhere in the dynamic info section. We have to go
544 to a lot more work to discover the address of the debug base symbol.
545 Because of this complexity, we cache the value we find and return that
546 value on subsequent invocations. Note there is no copy in the
547 executable symbol tables.
548
549 */
550
551 static CORE_ADDR
552 locate_base (void)
553 {
554 /* Check to see if we have a currently valid address, and if so, avoid
555 doing all this work again and just return the cached address. If
556 we have no cached address, try to locate it in the dynamic info
557 section for ELF executables. There's no point in doing any of this
558 though if we don't have some link map offsets to work with. */
559
560 if (debug_base == 0 && svr4_have_link_map_offsets ())
561 {
562 if (exec_bfd != NULL
563 && bfd_get_flavour (exec_bfd) == bfd_target_elf_flavour)
564 debug_base = elf_locate_base ();
565 }
566 return (debug_base);
567 }
568
569 /* Find the first element in the inferior's dynamic link map, and
570 return its address in the inferior.
571
572 FIXME: Perhaps we should validate the info somehow, perhaps by
573 checking r_version for a known version number, or r_state for
574 RT_CONSISTENT. */
575
576 static CORE_ADDR
577 solib_svr4_r_map (void)
578 {
579 struct link_map_offsets *lmo = svr4_fetch_link_map_offsets ();
580
581 return read_memory_typed_address (debug_base + lmo->r_map_offset,
582 builtin_type_void_data_ptr);
583 }
584
585 /* Find r_brk from the inferior's debug base. */
586
587 static CORE_ADDR
588 solib_svr4_r_brk (void)
589 {
590 struct link_map_offsets *lmo = svr4_fetch_link_map_offsets ();
591
592 return read_memory_typed_address (debug_base + lmo->r_brk_offset,
593 builtin_type_void_data_ptr);
594 }
595
596 /* Find the link map for the dynamic linker (if it is not in the
597 normal list of loaded shared objects). */
598
599 static CORE_ADDR
600 solib_svr4_r_ldsomap (void)
601 {
602 struct link_map_offsets *lmo = svr4_fetch_link_map_offsets ();
603 ULONGEST version;
604
605 /* Check version, and return zero if `struct r_debug' doesn't have
606 the r_ldsomap member. */
607 version = read_memory_unsigned_integer (debug_base + lmo->r_version_offset,
608 lmo->r_version_size);
609 if (version < 2 || lmo->r_ldsomap_offset == -1)
610 return 0;
611
612 return read_memory_typed_address (debug_base + lmo->r_ldsomap_offset,
613 builtin_type_void_data_ptr);
614 }
615
616 /*
617
618 LOCAL FUNCTION
619
620 open_symbol_file_object
621
622 SYNOPSIS
623
624 void open_symbol_file_object (void *from_tty)
625
626 DESCRIPTION
627
628 If no open symbol file, attempt to locate and open the main symbol
629 file. On SVR4 systems, this is the first link map entry. If its
630 name is here, we can open it. Useful when attaching to a process
631 without first loading its symbol file.
632
633 If FROM_TTYP dereferences to a non-zero integer, allow messages to
634 be printed. This parameter is a pointer rather than an int because
635 open_symbol_file_object() is called via catch_errors() and
636 catch_errors() requires a pointer argument. */
637
638 static int
639 open_symbol_file_object (void *from_ttyp)
640 {
641 CORE_ADDR lm, l_name;
642 char *filename;
643 int errcode;
644 int from_tty = *(int *)from_ttyp;
645 struct link_map_offsets *lmo = svr4_fetch_link_map_offsets ();
646 int l_name_size = TYPE_LENGTH (builtin_type_void_data_ptr);
647 gdb_byte *l_name_buf = xmalloc (l_name_size);
648 struct cleanup *cleanups = make_cleanup (xfree, l_name_buf);
649
650 if (symfile_objfile)
651 if (!query ("Attempt to reload symbols from process? "))
652 return 0;
653
654 /* Always locate the debug struct, in case it has moved. */
655 debug_base = 0;
656 if (locate_base () == 0)
657 return 0; /* failed somehow... */
658
659 /* First link map member should be the executable. */
660 lm = solib_svr4_r_map ();
661 if (lm == 0)
662 return 0; /* failed somehow... */
663
664 /* Read address of name from target memory to GDB. */
665 read_memory (lm + lmo->l_name_offset, l_name_buf, l_name_size);
666
667 /* Convert the address to host format. */
668 l_name = extract_typed_address (l_name_buf, builtin_type_void_data_ptr);
669
670 /* Free l_name_buf. */
671 do_cleanups (cleanups);
672
673 if (l_name == 0)
674 return 0; /* No filename. */
675
676 /* Now fetch the filename from target memory. */
677 target_read_string (l_name, &filename, SO_NAME_MAX_PATH_SIZE - 1, &errcode);
678 make_cleanup (xfree, filename);
679
680 if (errcode)
681 {
682 warning (_("failed to read exec filename from attached file: %s"),
683 safe_strerror (errcode));
684 return 0;
685 }
686
687 /* Have a pathname: read the symbol file. */
688 symbol_file_add_main (filename, from_tty);
689
690 return 1;
691 }
692
693 /* If no shared library information is available from the dynamic
694 linker, build a fallback list from other sources. */
695
696 static struct so_list *
697 svr4_default_sos (void)
698 {
699 struct so_list *head = NULL;
700 struct so_list **link_ptr = &head;
701
702 if (debug_loader_offset_p)
703 {
704 struct so_list *new = XZALLOC (struct so_list);
705
706 new->lm_info = xmalloc (sizeof (struct lm_info));
707
708 /* Nothing will ever check the cached copy of the link
709 map if we set l_addr. */
710 new->lm_info->l_addr = debug_loader_offset;
711 new->lm_info->lm = NULL;
712
713 strncpy (new->so_name, debug_loader_name, SO_NAME_MAX_PATH_SIZE - 1);
714 new->so_name[SO_NAME_MAX_PATH_SIZE - 1] = '\0';
715 strcpy (new->so_original_name, new->so_name);
716
717 *link_ptr = new;
718 link_ptr = &new->next;
719 }
720
721 return head;
722 }
723
724 /* LOCAL FUNCTION
725
726 current_sos -- build a list of currently loaded shared objects
727
728 SYNOPSIS
729
730 struct so_list *current_sos ()
731
732 DESCRIPTION
733
734 Build a list of `struct so_list' objects describing the shared
735 objects currently loaded in the inferior. This list does not
736 include an entry for the main executable file.
737
738 Note that we only gather information directly available from the
739 inferior --- we don't examine any of the shared library files
740 themselves. The declaration of `struct so_list' says which fields
741 we provide values for. */
742
743 static struct so_list *
744 svr4_current_sos (void)
745 {
746 CORE_ADDR lm;
747 struct so_list *head = 0;
748 struct so_list **link_ptr = &head;
749 CORE_ADDR ldsomap = 0;
750
751 /* Always locate the debug struct, in case it has moved. */
752 debug_base = 0;
753 locate_base ();
754
755 /* If we can't find the dynamic linker's base structure, this
756 must not be a dynamically linked executable. Hmm. */
757 if (! debug_base)
758 return svr4_default_sos ();
759
760 /* Walk the inferior's link map list, and build our list of
761 `struct so_list' nodes. */
762 lm = solib_svr4_r_map ();
763
764 while (lm)
765 {
766 struct link_map_offsets *lmo = svr4_fetch_link_map_offsets ();
767 struct so_list *new = XZALLOC (struct so_list);
768 struct cleanup *old_chain = make_cleanup (xfree, new);
769
770 new->lm_info = xmalloc (sizeof (struct lm_info));
771 make_cleanup (xfree, new->lm_info);
772
773 new->lm_info->l_addr = (CORE_ADDR)-1;
774 new->lm_info->lm = xzalloc (lmo->link_map_size);
775 make_cleanup (xfree, new->lm_info->lm);
776
777 read_memory (lm, new->lm_info->lm, lmo->link_map_size);
778
779 lm = LM_NEXT (new);
780
781 /* For SVR4 versions, the first entry in the link map is for the
782 inferior executable, so we must ignore it. For some versions of
783 SVR4, it has no name. For others (Solaris 2.3 for example), it
784 does have a name, so we can no longer use a missing name to
785 decide when to ignore it. */
786 if (IGNORE_FIRST_LINK_MAP_ENTRY (new) && ldsomap == 0)
787 free_so (new);
788 else
789 {
790 int errcode;
791 char *buffer;
792
793 /* Extract this shared object's name. */
794 target_read_string (LM_NAME (new), &buffer,
795 SO_NAME_MAX_PATH_SIZE - 1, &errcode);
796 if (errcode != 0)
797 warning (_("Can't read pathname for load map: %s."),
798 safe_strerror (errcode));
799 else
800 {
801 strncpy (new->so_name, buffer, SO_NAME_MAX_PATH_SIZE - 1);
802 new->so_name[SO_NAME_MAX_PATH_SIZE - 1] = '\0';
803 strcpy (new->so_original_name, new->so_name);
804 }
805 xfree (buffer);
806
807 /* If this entry has no name, or its name matches the name
808 for the main executable, don't include it in the list. */
809 if (! new->so_name[0]
810 || match_main (new->so_name))
811 free_so (new);
812 else
813 {
814 new->next = 0;
815 *link_ptr = new;
816 link_ptr = &new->next;
817 }
818 }
819
820 /* On Solaris, the dynamic linker is not in the normal list of
821 shared objects, so make sure we pick it up too. Having
822 symbol information for the dynamic linker is quite crucial
823 for skipping dynamic linker resolver code. */
824 if (lm == 0 && ldsomap == 0)
825 lm = ldsomap = solib_svr4_r_ldsomap ();
826
827 discard_cleanups (old_chain);
828 }
829
830 if (head == NULL)
831 return svr4_default_sos ();
832
833 return head;
834 }
835
836 /* Get the address of the link_map for a given OBJFILE. Loop through
837 the link maps, and return the address of the one corresponding to
838 the given objfile. Note that this function takes into account that
839 objfile can be the main executable, not just a shared library. The
840 main executable has always an empty name field in the linkmap. */
841
842 CORE_ADDR
843 svr4_fetch_objfile_link_map (struct objfile *objfile)
844 {
845 CORE_ADDR lm;
846
847 if (locate_base () == 0)
848 return 0; /* failed somehow... */
849
850 /* Position ourselves on the first link map. */
851 lm = solib_svr4_r_map ();
852 while (lm)
853 {
854 /* Get info on the layout of the r_debug and link_map structures. */
855 struct link_map_offsets *lmo = svr4_fetch_link_map_offsets ();
856 int errcode;
857 char *buffer;
858 struct lm_info objfile_lm_info;
859 struct cleanup *old_chain;
860 CORE_ADDR name_address;
861 int l_name_size = TYPE_LENGTH (builtin_type_void_data_ptr);
862 gdb_byte *l_name_buf = xmalloc (l_name_size);
863 old_chain = make_cleanup (xfree, l_name_buf);
864
865 /* Set up the buffer to contain the portion of the link_map
866 structure that gdb cares about. Note that this is not the
867 whole link_map structure. */
868 objfile_lm_info.lm = xzalloc (lmo->link_map_size);
869 make_cleanup (xfree, objfile_lm_info.lm);
870
871 /* Read the link map into our internal structure. */
872 read_memory (lm, objfile_lm_info.lm, lmo->link_map_size);
873
874 /* Read address of name from target memory to GDB. */
875 read_memory (lm + lmo->l_name_offset, l_name_buf, l_name_size);
876
877 /* Extract this object's name. */
878 name_address = extract_typed_address (l_name_buf,
879 builtin_type_void_data_ptr);
880 target_read_string (name_address, &buffer,
881 SO_NAME_MAX_PATH_SIZE - 1, &errcode);
882 make_cleanup (xfree, buffer);
883 if (errcode != 0)
884 warning (_("Can't read pathname for load map: %s."),
885 safe_strerror (errcode));
886 else
887 {
888 /* Is this the linkmap for the file we want? */
889 /* If the file is not a shared library and has no name,
890 we are sure it is the main executable, so we return that. */
891
892 if (buffer
893 && ((strcmp (buffer, objfile->name) == 0)
894 || (!(objfile->flags & OBJF_SHARED)
895 && (strcmp (buffer, "") == 0))))
896 {
897 do_cleanups (old_chain);
898 return lm;
899 }
900 }
901 /* Not the file we wanted, continue checking. */
902 lm = extract_typed_address (objfile_lm_info.lm + lmo->l_next_offset,
903 builtin_type_void_data_ptr);
904 do_cleanups (old_chain);
905 }
906 return 0;
907 }
908
909 /* On some systems, the only way to recognize the link map entry for
910 the main executable file is by looking at its name. Return
911 non-zero iff SONAME matches one of the known main executable names. */
912
913 static int
914 match_main (char *soname)
915 {
916 char **mainp;
917
918 for (mainp = main_name_list; *mainp != NULL; mainp++)
919 {
920 if (strcmp (soname, *mainp) == 0)
921 return (1);
922 }
923
924 return (0);
925 }
926
927 /* Return 1 if PC lies in the dynamic symbol resolution code of the
928 SVR4 run time loader. */
929 static CORE_ADDR interp_text_sect_low;
930 static CORE_ADDR interp_text_sect_high;
931 static CORE_ADDR interp_plt_sect_low;
932 static CORE_ADDR interp_plt_sect_high;
933
934 int
935 svr4_in_dynsym_resolve_code (CORE_ADDR pc)
936 {
937 return ((pc >= interp_text_sect_low && pc < interp_text_sect_high)
938 || (pc >= interp_plt_sect_low && pc < interp_plt_sect_high)
939 || in_plt_section (pc, NULL));
940 }
941
942 /* Given an executable's ABFD and target, compute the entry-point
943 address. */
944
945 static CORE_ADDR
946 exec_entry_point (struct bfd *abfd, struct target_ops *targ)
947 {
948 /* KevinB wrote ... for most targets, the address returned by
949 bfd_get_start_address() is the entry point for the start
950 function. But, for some targets, bfd_get_start_address() returns
951 the address of a function descriptor from which the entry point
952 address may be extracted. This address is extracted by
953 gdbarch_convert_from_func_ptr_addr(). The method
954 gdbarch_convert_from_func_ptr_addr() is the merely the identify
955 function for targets which don't use function descriptors. */
956 return gdbarch_convert_from_func_ptr_addr (current_gdbarch,
957 bfd_get_start_address (abfd),
958 targ);
959 }
960
961 /*
962
963 LOCAL FUNCTION
964
965 enable_break -- arrange for dynamic linker to hit breakpoint
966
967 SYNOPSIS
968
969 int enable_break (void)
970
971 DESCRIPTION
972
973 Both the SunOS and the SVR4 dynamic linkers have, as part of their
974 debugger interface, support for arranging for the inferior to hit
975 a breakpoint after mapping in the shared libraries. This function
976 enables that breakpoint.
977
978 For SunOS, there is a special flag location (in_debugger) which we
979 set to 1. When the dynamic linker sees this flag set, it will set
980 a breakpoint at a location known only to itself, after saving the
981 original contents of that place and the breakpoint address itself,
982 in it's own internal structures. When we resume the inferior, it
983 will eventually take a SIGTRAP when it runs into the breakpoint.
984 We handle this (in a different place) by restoring the contents of
985 the breakpointed location (which is only known after it stops),
986 chasing around to locate the shared libraries that have been
987 loaded, then resuming.
988
989 For SVR4, the debugger interface structure contains a member (r_brk)
990 which is statically initialized at the time the shared library is
991 built, to the offset of a function (_r_debug_state) which is guaran-
992 teed to be called once before mapping in a library, and again when
993 the mapping is complete. At the time we are examining this member,
994 it contains only the unrelocated offset of the function, so we have
995 to do our own relocation. Later, when the dynamic linker actually
996 runs, it relocates r_brk to be the actual address of _r_debug_state().
997
998 The debugger interface structure also contains an enumeration which
999 is set to either RT_ADD or RT_DELETE prior to changing the mapping,
1000 depending upon whether or not the library is being mapped or unmapped,
1001 and then set to RT_CONSISTENT after the library is mapped/unmapped.
1002 */
1003
1004 static int
1005 enable_break (void)
1006 {
1007 #ifdef BKPT_AT_SYMBOL
1008
1009 struct minimal_symbol *msymbol;
1010 char **bkpt_namep;
1011 asection *interp_sect;
1012 CORE_ADDR sym_addr;
1013
1014 /* First, remove all the solib event breakpoints. Their addresses
1015 may have changed since the last time we ran the program. */
1016 remove_solib_event_breakpoints ();
1017
1018 interp_text_sect_low = interp_text_sect_high = 0;
1019 interp_plt_sect_low = interp_plt_sect_high = 0;
1020
1021 /* If we already have a shared library list in the target, and
1022 r_debug contains r_brk, set the breakpoint there - this should
1023 mean r_brk has already been relocated. Assume the dynamic linker
1024 is the object containing r_brk. */
1025
1026 solib_add (NULL, 0, &current_target, auto_solib_add);
1027 sym_addr = 0;
1028 if (debug_base && solib_svr4_r_map () != 0)
1029 sym_addr = solib_svr4_r_brk ();
1030
1031 if (sym_addr != 0)
1032 {
1033 struct obj_section *os;
1034
1035 sym_addr = gdbarch_addr_bits_remove
1036 (current_gdbarch, gdbarch_convert_from_func_ptr_addr (current_gdbarch,
1037 sym_addr,
1038 &current_target));
1039
1040 os = find_pc_section (sym_addr);
1041 if (os != NULL)
1042 {
1043 /* Record the relocated start and end address of the dynamic linker
1044 text and plt section for svr4_in_dynsym_resolve_code. */
1045 bfd *tmp_bfd;
1046 CORE_ADDR load_addr;
1047
1048 tmp_bfd = os->objfile->obfd;
1049 load_addr = ANOFFSET (os->objfile->section_offsets,
1050 os->objfile->sect_index_text);
1051
1052 interp_sect = bfd_get_section_by_name (tmp_bfd, ".text");
1053 if (interp_sect)
1054 {
1055 interp_text_sect_low =
1056 bfd_section_vma (tmp_bfd, interp_sect) + load_addr;
1057 interp_text_sect_high =
1058 interp_text_sect_low + bfd_section_size (tmp_bfd, interp_sect);
1059 }
1060 interp_sect = bfd_get_section_by_name (tmp_bfd, ".plt");
1061 if (interp_sect)
1062 {
1063 interp_plt_sect_low =
1064 bfd_section_vma (tmp_bfd, interp_sect) + load_addr;
1065 interp_plt_sect_high =
1066 interp_plt_sect_low + bfd_section_size (tmp_bfd, interp_sect);
1067 }
1068
1069 create_solib_event_breakpoint (sym_addr);
1070 return 1;
1071 }
1072 }
1073
1074 /* Find the .interp section; if not found, warn the user and drop
1075 into the old breakpoint at symbol code. */
1076 interp_sect = bfd_get_section_by_name (exec_bfd, ".interp");
1077 if (interp_sect)
1078 {
1079 unsigned int interp_sect_size;
1080 char *buf;
1081 CORE_ADDR load_addr = 0;
1082 int load_addr_found = 0;
1083 int loader_found_in_list = 0;
1084 struct so_list *so;
1085 bfd *tmp_bfd = NULL;
1086 struct target_ops *tmp_bfd_target;
1087 int tmp_fd = -1;
1088 char *tmp_pathname = NULL;
1089
1090 /* Read the contents of the .interp section into a local buffer;
1091 the contents specify the dynamic linker this program uses. */
1092 sym_addr = 0;
1093 interp_sect_size = bfd_section_size (exec_bfd, interp_sect);
1094 buf = alloca (interp_sect_size);
1095 bfd_get_section_contents (exec_bfd, interp_sect,
1096 buf, 0, interp_sect_size);
1097
1098 /* Now we need to figure out where the dynamic linker was
1099 loaded so that we can load its symbols and place a breakpoint
1100 in the dynamic linker itself.
1101
1102 This address is stored on the stack. However, I've been unable
1103 to find any magic formula to find it for Solaris (appears to
1104 be trivial on GNU/Linux). Therefore, we have to try an alternate
1105 mechanism to find the dynamic linker's base address. */
1106
1107 tmp_fd = solib_open (buf, &tmp_pathname);
1108 if (tmp_fd >= 0)
1109 tmp_bfd = bfd_fopen (tmp_pathname, gnutarget, FOPEN_RB, tmp_fd);
1110
1111 if (tmp_bfd == NULL)
1112 goto bkpt_at_symbol;
1113
1114 /* Make sure the dynamic linker's really a useful object. */
1115 if (!bfd_check_format (tmp_bfd, bfd_object))
1116 {
1117 warning (_("Unable to grok dynamic linker %s as an object file"), buf);
1118 bfd_close (tmp_bfd);
1119 goto bkpt_at_symbol;
1120 }
1121
1122 /* Now convert the TMP_BFD into a target. That way target, as
1123 well as BFD operations can be used. Note that closing the
1124 target will also close the underlying bfd. */
1125 tmp_bfd_target = target_bfd_reopen (tmp_bfd);
1126
1127 /* On a running target, we can get the dynamic linker's base
1128 address from the shared library table. */
1129 so = master_so_list ();
1130 while (so)
1131 {
1132 if (svr4_same_1 (buf, so->so_original_name))
1133 {
1134 load_addr_found = 1;
1135 loader_found_in_list = 1;
1136 load_addr = LM_ADDR_CHECK (so, tmp_bfd);
1137 break;
1138 }
1139 so = so->next;
1140 }
1141
1142 /* If we were not able to find the base address of the loader
1143 from our so_list, then try using the AT_BASE auxilliary entry. */
1144 if (!load_addr_found)
1145 if (target_auxv_search (&current_target, AT_BASE, &load_addr) > 0)
1146 load_addr_found = 1;
1147
1148 /* Otherwise we find the dynamic linker's base address by examining
1149 the current pc (which should point at the entry point for the
1150 dynamic linker) and subtracting the offset of the entry point.
1151
1152 This is more fragile than the previous approaches, but is a good
1153 fallback method because it has actually been working well in
1154 most cases. */
1155 if (!load_addr_found)
1156 load_addr = (read_pc ()
1157 - exec_entry_point (tmp_bfd, tmp_bfd_target));
1158
1159 if (!loader_found_in_list)
1160 {
1161 debug_loader_name = xstrdup (buf);
1162 debug_loader_offset_p = 1;
1163 debug_loader_offset = load_addr;
1164 solib_add (NULL, 0, &current_target, auto_solib_add);
1165 }
1166
1167 /* Record the relocated start and end address of the dynamic linker
1168 text and plt section for svr4_in_dynsym_resolve_code. */
1169 interp_sect = bfd_get_section_by_name (tmp_bfd, ".text");
1170 if (interp_sect)
1171 {
1172 interp_text_sect_low =
1173 bfd_section_vma (tmp_bfd, interp_sect) + load_addr;
1174 interp_text_sect_high =
1175 interp_text_sect_low + bfd_section_size (tmp_bfd, interp_sect);
1176 }
1177 interp_sect = bfd_get_section_by_name (tmp_bfd, ".plt");
1178 if (interp_sect)
1179 {
1180 interp_plt_sect_low =
1181 bfd_section_vma (tmp_bfd, interp_sect) + load_addr;
1182 interp_plt_sect_high =
1183 interp_plt_sect_low + bfd_section_size (tmp_bfd, interp_sect);
1184 }
1185
1186 /* Now try to set a breakpoint in the dynamic linker. */
1187 for (bkpt_namep = solib_break_names; *bkpt_namep != NULL; bkpt_namep++)
1188 {
1189 sym_addr = bfd_lookup_symbol (tmp_bfd, *bkpt_namep);
1190 if (sym_addr != 0)
1191 break;
1192 }
1193
1194 if (sym_addr != 0)
1195 /* Convert 'sym_addr' from a function pointer to an address.
1196 Because we pass tmp_bfd_target instead of the current
1197 target, this will always produce an unrelocated value. */
1198 sym_addr = gdbarch_convert_from_func_ptr_addr (current_gdbarch,
1199 sym_addr,
1200 tmp_bfd_target);
1201
1202 /* We're done with both the temporary bfd and target. Remember,
1203 closing the target closes the underlying bfd. */
1204 target_close (tmp_bfd_target, 0);
1205
1206 if (sym_addr != 0)
1207 {
1208 create_solib_event_breakpoint (load_addr + sym_addr);
1209 return 1;
1210 }
1211
1212 /* For whatever reason we couldn't set a breakpoint in the dynamic
1213 linker. Warn and drop into the old code. */
1214 bkpt_at_symbol:
1215 xfree (tmp_pathname);
1216 warning (_("Unable to find dynamic linker breakpoint function.\n"
1217 "GDB will be unable to debug shared library initializers\n"
1218 "and track explicitly loaded dynamic code."));
1219 }
1220
1221 /* Scan through the lists of symbols, trying to look up the symbol and
1222 set a breakpoint there. Terminate loop when we/if we succeed. */
1223
1224 for (bkpt_namep = solib_break_names; *bkpt_namep != NULL; bkpt_namep++)
1225 {
1226 msymbol = lookup_minimal_symbol (*bkpt_namep, NULL, symfile_objfile);
1227 if ((msymbol != NULL) && (SYMBOL_VALUE_ADDRESS (msymbol) != 0))
1228 {
1229 create_solib_event_breakpoint (SYMBOL_VALUE_ADDRESS (msymbol));
1230 return 1;
1231 }
1232 }
1233
1234 for (bkpt_namep = bkpt_names; *bkpt_namep != NULL; bkpt_namep++)
1235 {
1236 msymbol = lookup_minimal_symbol (*bkpt_namep, NULL, symfile_objfile);
1237 if ((msymbol != NULL) && (SYMBOL_VALUE_ADDRESS (msymbol) != 0))
1238 {
1239 create_solib_event_breakpoint (SYMBOL_VALUE_ADDRESS (msymbol));
1240 return 1;
1241 }
1242 }
1243 #endif /* BKPT_AT_SYMBOL */
1244
1245 return 0;
1246 }
1247
1248 /*
1249
1250 LOCAL FUNCTION
1251
1252 special_symbol_handling -- additional shared library symbol handling
1253
1254 SYNOPSIS
1255
1256 void special_symbol_handling ()
1257
1258 DESCRIPTION
1259
1260 Once the symbols from a shared object have been loaded in the usual
1261 way, we are called to do any system specific symbol handling that
1262 is needed.
1263
1264 For SunOS4, this consisted of grunging around in the dynamic
1265 linkers structures to find symbol definitions for "common" symbols
1266 and adding them to the minimal symbol table for the runtime common
1267 objfile.
1268
1269 However, for SVR4, there's nothing to do.
1270
1271 */
1272
1273 static void
1274 svr4_special_symbol_handling (void)
1275 {
1276 }
1277
1278 /* Relocate the main executable. This function should be called upon
1279 stopping the inferior process at the entry point to the program.
1280 The entry point from BFD is compared to the PC and if they are
1281 different, the main executable is relocated by the proper amount.
1282
1283 As written it will only attempt to relocate executables which
1284 lack interpreter sections. It seems likely that only dynamic
1285 linker executables will get relocated, though it should work
1286 properly for a position-independent static executable as well. */
1287
1288 static void
1289 svr4_relocate_main_executable (void)
1290 {
1291 asection *interp_sect;
1292 CORE_ADDR pc = read_pc ();
1293
1294 /* Decide if the objfile needs to be relocated. As indicated above,
1295 we will only be here when execution is stopped at the beginning
1296 of the program. Relocation is necessary if the address at which
1297 we are presently stopped differs from the start address stored in
1298 the executable AND there's no interpreter section. The condition
1299 regarding the interpreter section is very important because if
1300 there *is* an interpreter section, execution will begin there
1301 instead. When there is an interpreter section, the start address
1302 is (presumably) used by the interpreter at some point to start
1303 execution of the program.
1304
1305 If there is an interpreter, it is normal for it to be set to an
1306 arbitrary address at the outset. The job of finding it is
1307 handled in enable_break().
1308
1309 So, to summarize, relocations are necessary when there is no
1310 interpreter section and the start address obtained from the
1311 executable is different from the address at which GDB is
1312 currently stopped.
1313
1314 [ The astute reader will note that we also test to make sure that
1315 the executable in question has the DYNAMIC flag set. It is my
1316 opinion that this test is unnecessary (undesirable even). It
1317 was added to avoid inadvertent relocation of an executable
1318 whose e_type member in the ELF header is not ET_DYN. There may
1319 be a time in the future when it is desirable to do relocations
1320 on other types of files as well in which case this condition
1321 should either be removed or modified to accomodate the new file
1322 type. (E.g, an ET_EXEC executable which has been built to be
1323 position-independent could safely be relocated by the OS if
1324 desired. It is true that this violates the ABI, but the ABI
1325 has been known to be bent from time to time.) - Kevin, Nov 2000. ]
1326 */
1327
1328 interp_sect = bfd_get_section_by_name (exec_bfd, ".interp");
1329 if (interp_sect == NULL
1330 && (bfd_get_file_flags (exec_bfd) & DYNAMIC) != 0
1331 && (exec_entry_point (exec_bfd, &exec_ops) != pc))
1332 {
1333 struct cleanup *old_chain;
1334 struct section_offsets *new_offsets;
1335 int i, changed;
1336 CORE_ADDR displacement;
1337
1338 /* It is necessary to relocate the objfile. The amount to
1339 relocate by is simply the address at which we are stopped
1340 minus the starting address from the executable.
1341
1342 We relocate all of the sections by the same amount. This
1343 behavior is mandated by recent editions of the System V ABI.
1344 According to the System V Application Binary Interface,
1345 Edition 4.1, page 5-5:
1346
1347 ... Though the system chooses virtual addresses for
1348 individual processes, it maintains the segments' relative
1349 positions. Because position-independent code uses relative
1350 addressesing between segments, the difference between
1351 virtual addresses in memory must match the difference
1352 between virtual addresses in the file. The difference
1353 between the virtual address of any segment in memory and
1354 the corresponding virtual address in the file is thus a
1355 single constant value for any one executable or shared
1356 object in a given process. This difference is the base
1357 address. One use of the base address is to relocate the
1358 memory image of the program during dynamic linking.
1359
1360 The same language also appears in Edition 4.0 of the System V
1361 ABI and is left unspecified in some of the earlier editions. */
1362
1363 displacement = pc - exec_entry_point (exec_bfd, &exec_ops);
1364 changed = 0;
1365
1366 new_offsets = xcalloc (symfile_objfile->num_sections,
1367 sizeof (struct section_offsets));
1368 old_chain = make_cleanup (xfree, new_offsets);
1369
1370 for (i = 0; i < symfile_objfile->num_sections; i++)
1371 {
1372 if (displacement != ANOFFSET (symfile_objfile->section_offsets, i))
1373 changed = 1;
1374 new_offsets->offsets[i] = displacement;
1375 }
1376
1377 if (changed)
1378 objfile_relocate (symfile_objfile, new_offsets);
1379
1380 do_cleanups (old_chain);
1381 }
1382 }
1383
1384 /*
1385
1386 GLOBAL FUNCTION
1387
1388 svr4_solib_create_inferior_hook -- shared library startup support
1389
1390 SYNOPSIS
1391
1392 void svr4_solib_create_inferior_hook ()
1393
1394 DESCRIPTION
1395
1396 When gdb starts up the inferior, it nurses it along (through the
1397 shell) until it is ready to execute it's first instruction. At this
1398 point, this function gets called via expansion of the macro
1399 SOLIB_CREATE_INFERIOR_HOOK.
1400
1401 For SunOS executables, this first instruction is typically the
1402 one at "_start", or a similar text label, regardless of whether
1403 the executable is statically or dynamically linked. The runtime
1404 startup code takes care of dynamically linking in any shared
1405 libraries, once gdb allows the inferior to continue.
1406
1407 For SVR4 executables, this first instruction is either the first
1408 instruction in the dynamic linker (for dynamically linked
1409 executables) or the instruction at "start" for statically linked
1410 executables. For dynamically linked executables, the system
1411 first exec's /lib/libc.so.N, which contains the dynamic linker,
1412 and starts it running. The dynamic linker maps in any needed
1413 shared libraries, maps in the actual user executable, and then
1414 jumps to "start" in the user executable.
1415
1416 For both SunOS shared libraries, and SVR4 shared libraries, we
1417 can arrange to cooperate with the dynamic linker to discover the
1418 names of shared libraries that are dynamically linked, and the
1419 base addresses to which they are linked.
1420
1421 This function is responsible for discovering those names and
1422 addresses, and saving sufficient information about them to allow
1423 their symbols to be read at a later time.
1424
1425 FIXME
1426
1427 Between enable_break() and disable_break(), this code does not
1428 properly handle hitting breakpoints which the user might have
1429 set in the startup code or in the dynamic linker itself. Proper
1430 handling will probably have to wait until the implementation is
1431 changed to use the "breakpoint handler function" method.
1432
1433 Also, what if child has exit()ed? Must exit loop somehow.
1434 */
1435
1436 static void
1437 svr4_solib_create_inferior_hook (void)
1438 {
1439 /* Relocate the main executable if necessary. */
1440 svr4_relocate_main_executable ();
1441
1442 if (!svr4_have_link_map_offsets ())
1443 return;
1444
1445 if (!enable_break ())
1446 return;
1447
1448 #if defined(_SCO_DS)
1449 /* SCO needs the loop below, other systems should be using the
1450 special shared library breakpoints and the shared library breakpoint
1451 service routine.
1452
1453 Now run the target. It will eventually hit the breakpoint, at
1454 which point all of the libraries will have been mapped in and we
1455 can go groveling around in the dynamic linker structures to find
1456 out what we need to know about them. */
1457
1458 clear_proceed_status ();
1459 stop_soon = STOP_QUIETLY;
1460 stop_signal = TARGET_SIGNAL_0;
1461 do
1462 {
1463 target_resume (pid_to_ptid (-1), 0, stop_signal);
1464 wait_for_inferior (0);
1465 }
1466 while (stop_signal != TARGET_SIGNAL_TRAP);
1467 stop_soon = NO_STOP_QUIETLY;
1468 #endif /* defined(_SCO_DS) */
1469 }
1470
1471 static void
1472 svr4_clear_solib (void)
1473 {
1474 debug_base = 0;
1475 debug_loader_offset_p = 0;
1476 debug_loader_offset = 0;
1477 xfree (debug_loader_name);
1478 debug_loader_name = NULL;
1479 }
1480
1481 static void
1482 svr4_free_so (struct so_list *so)
1483 {
1484 xfree (so->lm_info->lm);
1485 xfree (so->lm_info);
1486 }
1487
1488
1489 /* Clear any bits of ADDR that wouldn't fit in a target-format
1490 data pointer. "Data pointer" here refers to whatever sort of
1491 address the dynamic linker uses to manage its sections. At the
1492 moment, we don't support shared libraries on any processors where
1493 code and data pointers are different sizes.
1494
1495 This isn't really the right solution. What we really need here is
1496 a way to do arithmetic on CORE_ADDR values that respects the
1497 natural pointer/address correspondence. (For example, on the MIPS,
1498 converting a 32-bit pointer to a 64-bit CORE_ADDR requires you to
1499 sign-extend the value. There, simply truncating the bits above
1500 gdbarch_ptr_bit, as we do below, is no good.) This should probably
1501 be a new gdbarch method or something. */
1502 static CORE_ADDR
1503 svr4_truncate_ptr (CORE_ADDR addr)
1504 {
1505 if (gdbarch_ptr_bit (current_gdbarch) == sizeof (CORE_ADDR) * 8)
1506 /* We don't need to truncate anything, and the bit twiddling below
1507 will fail due to overflow problems. */
1508 return addr;
1509 else
1510 return addr & (((CORE_ADDR) 1 << gdbarch_ptr_bit (current_gdbarch)) - 1);
1511 }
1512
1513
1514 static void
1515 svr4_relocate_section_addresses (struct so_list *so,
1516 struct section_table *sec)
1517 {
1518 sec->addr = svr4_truncate_ptr (sec->addr + LM_ADDR_CHECK (so,
1519 sec->bfd));
1520 sec->endaddr = svr4_truncate_ptr (sec->endaddr + LM_ADDR_CHECK (so,
1521 sec->bfd));
1522 }
1523 \f
1524
1525 /* Architecture-specific operations. */
1526
1527 /* Per-architecture data key. */
1528 static struct gdbarch_data *solib_svr4_data;
1529
1530 struct solib_svr4_ops
1531 {
1532 /* Return a description of the layout of `struct link_map'. */
1533 struct link_map_offsets *(*fetch_link_map_offsets)(void);
1534 };
1535
1536 /* Return a default for the architecture-specific operations. */
1537
1538 static void *
1539 solib_svr4_init (struct obstack *obstack)
1540 {
1541 struct solib_svr4_ops *ops;
1542
1543 ops = OBSTACK_ZALLOC (obstack, struct solib_svr4_ops);
1544 ops->fetch_link_map_offsets = NULL;
1545 return ops;
1546 }
1547
1548 /* Set the architecture-specific `struct link_map_offsets' fetcher for
1549 GDBARCH to FLMO. Also, install SVR4 solib_ops into GDBARCH. */
1550
1551 void
1552 set_solib_svr4_fetch_link_map_offsets (struct gdbarch *gdbarch,
1553 struct link_map_offsets *(*flmo) (void))
1554 {
1555 struct solib_svr4_ops *ops = gdbarch_data (gdbarch, solib_svr4_data);
1556
1557 ops->fetch_link_map_offsets = flmo;
1558
1559 set_solib_ops (gdbarch, &svr4_so_ops);
1560 }
1561
1562 /* Fetch a link_map_offsets structure using the architecture-specific
1563 `struct link_map_offsets' fetcher. */
1564
1565 static struct link_map_offsets *
1566 svr4_fetch_link_map_offsets (void)
1567 {
1568 struct solib_svr4_ops *ops = gdbarch_data (current_gdbarch, solib_svr4_data);
1569
1570 gdb_assert (ops->fetch_link_map_offsets);
1571 return ops->fetch_link_map_offsets ();
1572 }
1573
1574 /* Return 1 if a link map offset fetcher has been defined, 0 otherwise. */
1575
1576 static int
1577 svr4_have_link_map_offsets (void)
1578 {
1579 struct solib_svr4_ops *ops = gdbarch_data (current_gdbarch, solib_svr4_data);
1580 return (ops->fetch_link_map_offsets != NULL);
1581 }
1582 \f
1583
1584 /* Most OS'es that have SVR4-style ELF dynamic libraries define a
1585 `struct r_debug' and a `struct link_map' that are binary compatible
1586 with the origional SVR4 implementation. */
1587
1588 /* Fetch (and possibly build) an appropriate `struct link_map_offsets'
1589 for an ILP32 SVR4 system. */
1590
1591 struct link_map_offsets *
1592 svr4_ilp32_fetch_link_map_offsets (void)
1593 {
1594 static struct link_map_offsets lmo;
1595 static struct link_map_offsets *lmp = NULL;
1596
1597 if (lmp == NULL)
1598 {
1599 lmp = &lmo;
1600
1601 lmo.r_version_offset = 0;
1602 lmo.r_version_size = 4;
1603 lmo.r_map_offset = 4;
1604 lmo.r_brk_offset = 8;
1605 lmo.r_ldsomap_offset = 20;
1606
1607 /* Everything we need is in the first 20 bytes. */
1608 lmo.link_map_size = 20;
1609 lmo.l_addr_offset = 0;
1610 lmo.l_name_offset = 4;
1611 lmo.l_ld_offset = 8;
1612 lmo.l_next_offset = 12;
1613 lmo.l_prev_offset = 16;
1614 }
1615
1616 return lmp;
1617 }
1618
1619 /* Fetch (and possibly build) an appropriate `struct link_map_offsets'
1620 for an LP64 SVR4 system. */
1621
1622 struct link_map_offsets *
1623 svr4_lp64_fetch_link_map_offsets (void)
1624 {
1625 static struct link_map_offsets lmo;
1626 static struct link_map_offsets *lmp = NULL;
1627
1628 if (lmp == NULL)
1629 {
1630 lmp = &lmo;
1631
1632 lmo.r_version_offset = 0;
1633 lmo.r_version_size = 4;
1634 lmo.r_map_offset = 8;
1635 lmo.r_brk_offset = 16;
1636 lmo.r_ldsomap_offset = 40;
1637
1638 /* Everything we need is in the first 40 bytes. */
1639 lmo.link_map_size = 40;
1640 lmo.l_addr_offset = 0;
1641 lmo.l_name_offset = 8;
1642 lmo.l_ld_offset = 16;
1643 lmo.l_next_offset = 24;
1644 lmo.l_prev_offset = 32;
1645 }
1646
1647 return lmp;
1648 }
1649 \f
1650
1651 struct target_so_ops svr4_so_ops;
1652
1653 /* Lookup global symbol for ELF DSOs linked with -Bsymbolic. Those DSOs have a
1654 different rule for symbol lookup. The lookup begins here in the DSO, not in
1655 the main executable. */
1656
1657 static struct symbol *
1658 elf_lookup_lib_symbol (const struct objfile *objfile,
1659 const char *name,
1660 const char *linkage_name,
1661 const domain_enum domain, struct symtab **symtab)
1662 {
1663 if (objfile->obfd == NULL
1664 || scan_dyntag (DT_SYMBOLIC, objfile->obfd, NULL) != 1)
1665 return NULL;
1666
1667 return lookup_global_symbol_from_objfile
1668 (objfile, name, linkage_name, domain, symtab);
1669 }
1670
1671 extern initialize_file_ftype _initialize_svr4_solib; /* -Wmissing-prototypes */
1672
1673 void
1674 _initialize_svr4_solib (void)
1675 {
1676 solib_svr4_data = gdbarch_data_register_pre_init (solib_svr4_init);
1677
1678 svr4_so_ops.relocate_section_addresses = svr4_relocate_section_addresses;
1679 svr4_so_ops.free_so = svr4_free_so;
1680 svr4_so_ops.clear_solib = svr4_clear_solib;
1681 svr4_so_ops.solib_create_inferior_hook = svr4_solib_create_inferior_hook;
1682 svr4_so_ops.special_symbol_handling = svr4_special_symbol_handling;
1683 svr4_so_ops.current_sos = svr4_current_sos;
1684 svr4_so_ops.open_symbol_file_object = open_symbol_file_object;
1685 svr4_so_ops.in_dynsym_resolve_code = svr4_in_dynsym_resolve_code;
1686 svr4_so_ops.lookup_lib_global_symbol = elf_lookup_lib_symbol;
1687 svr4_so_ops.same = svr4_same;
1688 }
This page took 0.068968 seconds and 4 git commands to generate.