1 /* Native support for the SGI Iris running IRIX version 5, for GDB.
2 Copyright 1988, 89, 90, 91, 92, 93, 94, 95, 96, 98, 1999
3 Free Software Foundation, Inc.
4 Contributed by Alessandro Forin(af@cs.cmu.edu) at CMU
5 and by Per Bothner(bothner@cs.wisc.edu) at U.Wisconsin.
6 Implemented for Irix 4.x by Garrett A. Wollman.
7 Modified for Irix 5.x by Ian Lance Taylor.
9 This file is part of GDB.
11 This program is free software; you can redistribute it and/or modify
12 it under the terms of the GNU General Public License as published by
13 the Free Software Foundation; either version 2 of the License, or
14 (at your option) any later version.
16 This program is distributed in the hope that it will be useful,
17 but WITHOUT ANY WARRANTY; without even the implied warranty of
18 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 GNU General Public License for more details.
21 You should have received a copy of the GNU General Public License
22 along with this program; if not, write to the Free Software
23 Foundation, Inc., 59 Temple Place - Suite 330,
24 Boston, MA 02111-1307, USA. */
31 #include "gdb_string.h"
33 #include <sys/procfs.h>
34 #include <setjmp.h> /* For JB_XXX. */
37 fetch_core_registers PARAMS ((char *, unsigned int, int, CORE_ADDR));
39 /* Size of elements in jmpbuf */
41 #define JB_ELEMENT_SIZE 4
44 * See the comment in m68k-tdep.c regarding the utility of these functions.
46 * These definitions are from the MIPS SVR4 ABI, so they may work for
47 * any MIPS SVR4 target.
51 supply_gregset (gregsetp)
55 register greg_t *regp = &(*gregsetp)[0];
56 int gregoff = sizeof (greg_t) - MIPS_REGSIZE;
57 static char zerobuf[MAX_REGISTER_RAW_SIZE] =
60 for (regi = 0; regi <= CTX_RA; regi++)
61 supply_register (regi, (char *) (regp + regi) + gregoff);
63 supply_register (PC_REGNUM, (char *) (regp + CTX_EPC) + gregoff);
64 supply_register (HI_REGNUM, (char *) (regp + CTX_MDHI) + gregoff);
65 supply_register (LO_REGNUM, (char *) (regp + CTX_MDLO) + gregoff);
66 supply_register (CAUSE_REGNUM, (char *) (regp + CTX_CAUSE) + gregoff);
68 /* Fill inaccessible registers with zero. */
69 supply_register (BADVADDR_REGNUM, zerobuf);
73 fill_gregset (gregsetp, regno)
78 register greg_t *regp = &(*gregsetp)[0];
80 /* Under Irix6, if GDB is built with N32 ABI and is debugging an O32
81 executable, we have to sign extend the registers to 64 bits before
82 filling in the gregset structure. */
84 for (regi = 0; regi <= CTX_RA; regi++)
85 if ((regno == -1) || (regno == regi))
87 extract_signed_integer (®isters[REGISTER_BYTE (regi)],
88 REGISTER_RAW_SIZE (regi));
90 if ((regno == -1) || (regno == PC_REGNUM))
92 extract_signed_integer (®isters[REGISTER_BYTE (PC_REGNUM)],
93 REGISTER_RAW_SIZE (PC_REGNUM));
95 if ((regno == -1) || (regno == CAUSE_REGNUM))
97 extract_signed_integer (®isters[REGISTER_BYTE (CAUSE_REGNUM)],
98 REGISTER_RAW_SIZE (CAUSE_REGNUM));
100 if ((regno == -1) || (regno == HI_REGNUM))
102 extract_signed_integer (®isters[REGISTER_BYTE (HI_REGNUM)],
103 REGISTER_RAW_SIZE (HI_REGNUM));
105 if ((regno == -1) || (regno == LO_REGNUM))
107 extract_signed_integer (®isters[REGISTER_BYTE (LO_REGNUM)],
108 REGISTER_RAW_SIZE (LO_REGNUM));
112 * Now we do the same thing for floating-point registers.
113 * We don't bother to condition on FP0_REGNUM since any
114 * reasonable MIPS configuration has an R3010 in it.
116 * Again, see the comments in m68k-tdep.c.
120 supply_fpregset (fpregsetp)
121 fpregset_t *fpregsetp;
124 static char zerobuf[MAX_REGISTER_RAW_SIZE] =
127 /* FIXME, this is wrong for the N32 ABI which has 64 bit FP regs. */
129 for (regi = 0; regi < 32; regi++)
130 supply_register (FP0_REGNUM + regi,
131 (char *) &fpregsetp->fp_r.fp_regs[regi]);
133 supply_register (FCRCS_REGNUM, (char *) &fpregsetp->fp_csr);
135 /* FIXME: how can we supply FCRIR_REGNUM? SGI doesn't tell us. */
136 supply_register (FCRIR_REGNUM, zerobuf);
140 fill_fpregset (fpregsetp, regno)
141 fpregset_t *fpregsetp;
147 /* FIXME, this is wrong for the N32 ABI which has 64 bit FP regs. */
149 for (regi = FP0_REGNUM; regi < FP0_REGNUM + 32; regi++)
151 if ((regno == -1) || (regno == regi))
153 from = (char *) ®isters[REGISTER_BYTE (regi)];
154 to = (char *) &(fpregsetp->fp_r.fp_regs[regi - FP0_REGNUM]);
155 memcpy (to, from, REGISTER_RAW_SIZE (regi));
159 if ((regno == -1) || (regno == FCRCS_REGNUM))
160 fpregsetp->fp_csr = *(unsigned *) ®isters[REGISTER_BYTE (FCRCS_REGNUM)];
164 /* Figure out where the longjmp will land.
165 We expect the first arg to be a pointer to the jmp_buf structure from which
166 we extract the pc (JB_PC) that we will land at. The pc is copied into PC.
167 This routine returns true on success. */
170 get_longjmp_target (pc)
173 char buf[TARGET_PTR_BIT / TARGET_CHAR_BIT];
176 jb_addr = read_register (A0_REGNUM);
178 if (target_read_memory (jb_addr + JB_PC * JB_ELEMENT_SIZE, buf,
179 TARGET_PTR_BIT / TARGET_CHAR_BIT))
182 *pc = extract_address (buf, TARGET_PTR_BIT / TARGET_CHAR_BIT);
188 fetch_core_registers (core_reg_sect, core_reg_size, which, reg_addr)
190 unsigned core_reg_size;
191 int which; /* Unused */
192 CORE_ADDR reg_addr; /* Unused */
194 if (core_reg_size == REGISTER_BYTES)
196 memcpy ((char *) registers, core_reg_sect, core_reg_size);
198 else if (MIPS_REGSIZE == 4 &&
199 core_reg_size == (2 * MIPS_REGSIZE) * NUM_REGS)
201 /* This is a core file from a N32 executable, 64 bits are saved
202 for all registers. */
203 char *srcp = core_reg_sect;
204 char *dstp = registers;
207 for (regno = 0; regno < NUM_REGS; regno++)
209 if (regno >= FP0_REGNUM && regno < (FP0_REGNUM + 32))
211 /* FIXME, this is wrong, N32 has 64 bit FP regs, but GDB
212 currently assumes that they are 32 bit. */
217 if (REGISTER_RAW_SIZE (regno) == 4)
219 /* copying 4 bytes from eight bytes?
220 I don't see how this can be right... */
225 /* copy all 8 bytes (sizeof(double)) */
244 warning ("wrong size gregset struct in core file");
248 registers_fetched ();
251 /* Irix 5 uses what appears to be a unique form of shared library
252 support. This is a copy of solib.c modified for Irix 5. */
253 /* FIXME: Most of this code could be merged with osfsolib.c and solib.c
254 by using next_link_map_member and xfer_link_map_member in solib.c. */
256 #include <sys/types.h>
258 #include <sys/param.h>
261 /* <obj.h> includes <sym.h> and <symconst.h>, which causes conflicts
262 with our versions of those files included by tm-mips.h. Prevent
263 <obj.h> from including them with some appropriate defines. */
265 #define __SYMCONST_H__
267 #ifdef HAVE_OBJLIST_H
271 #ifdef NEW_OBJ_INFO_MAGIC
272 #define HANDLE_NEW_OBJ_LIST
278 #include "objfiles.h"
281 #include "gnu-regex.h"
282 #include "inferior.h"
283 #include "language.h"
286 /* The symbol which starts off the list of shared libraries. */
287 #define DEBUG_BASE "__rld_obj_head"
289 /* Irix 6.x introduces a new variant of object lists.
290 To be able to debug O32 executables under Irix 6, we have to handle both
295 OBJ_LIST_OLD, /* Pre Irix 6.x object list. */
296 OBJ_LIST_32, /* 32 Bit Elf32_Obj_Info. */
297 OBJ_LIST_64 /* 64 Bit Elf64_Obj_Info, FIXME not yet implemented. */
301 /* Define our own link_map structure.
302 This will help to share code with osfsolib.c and solib.c. */
306 obj_list_variant l_variant; /* which variant of object list */
307 CORE_ADDR l_lladdr; /* addr in inferior list was read from */
308 CORE_ADDR l_next; /* address of next object list entry */
311 /* Irix 5 shared objects are pre-linked to particular addresses
312 although the dynamic linker may have to relocate them if the
313 address ranges of the libraries used by the main program clash.
314 The offset is the difference between the address where the object
315 is mapped and the binding address of the shared library. */
316 #define LM_OFFSET(so) ((so) -> offset)
317 /* Loaded address of shared library. */
318 #define LM_ADDR(so) ((so) -> lmstart)
320 char shadow_contents[BREAKPOINT_MAX]; /* Stash old bkpt addr contents */
324 struct so_list *next; /* next structure in linked list */
326 CORE_ADDR offset; /* prelink to load address offset */
327 char *so_name; /* shared object lib name */
328 CORE_ADDR lmstart; /* lower addr bound of mapped object */
329 CORE_ADDR lmend; /* upper addr bound of mapped object */
330 char symbols_loaded; /* flag: symbols read in yet? */
331 char from_tty; /* flag: print msgs? */
332 struct objfile *objfile; /* objfile for loaded lib */
333 struct section_table *sections;
334 struct section_table *sections_end;
335 struct section_table *textsection;
339 static struct so_list *so_list_head; /* List of known shared objects */
340 static CORE_ADDR debug_base; /* Base of dynamic linker structures */
341 static CORE_ADDR breakpoint_addr; /* Address where end bkpt is set */
343 /* Local function prototypes */
346 sharedlibrary_command PARAMS ((char *, int));
349 enable_break PARAMS ((void));
352 disable_break PARAMS ((void));
355 info_sharedlibrary_command PARAMS ((char *, int));
358 symbol_add_stub PARAMS ((char *));
360 static struct so_list *
361 find_solib PARAMS ((struct so_list *));
363 static struct link_map *
364 first_link_map_member PARAMS ((void));
366 static struct link_map *
367 next_link_map_member PARAMS ((struct so_list *));
370 xfer_link_map_member PARAMS ((struct so_list *, struct link_map *));
373 locate_base PARAMS ((void));
376 solib_map_sections PARAMS ((char *));
382 solib_map_sections -- open bfd and build sections for shared lib
386 static int solib_map_sections (struct so_list *so)
390 Given a pointer to one of the shared objects in our list
391 of mapped objects, use the recorded name to open a bfd
392 descriptor for the object, build a section table, and then
393 relocate all the section addresses by the base address at
394 which the shared object was mapped.
398 In most (all?) cases the shared object file name recorded in the
399 dynamic linkage tables will be a fully qualified pathname. For
400 cases where it isn't, do we really mimic the systems search
401 mechanism correctly in the below code (particularly the tilde
406 solib_map_sections (arg)
409 struct so_list *so = (struct so_list *) arg; /* catch_errors bogon */
411 char *scratch_pathname;
413 struct section_table *p;
414 struct cleanup *old_chain;
417 filename = tilde_expand (so->so_name);
418 old_chain = make_cleanup (free, filename);
420 scratch_chan = openp (getenv ("PATH"), 1, filename, O_RDONLY, 0,
422 if (scratch_chan < 0)
424 scratch_chan = openp (getenv ("LD_LIBRARY_PATH"), 1, filename,
425 O_RDONLY, 0, &scratch_pathname);
427 if (scratch_chan < 0)
429 perror_with_name (filename);
431 /* Leave scratch_pathname allocated. abfd->name will point to it. */
433 abfd = bfd_fdopenr (scratch_pathname, gnutarget, scratch_chan);
436 close (scratch_chan);
437 error ("Could not open `%s' as an executable file: %s",
438 scratch_pathname, bfd_errmsg (bfd_get_error ()));
440 /* Leave bfd open, core_xfer_memory and "info files" need it. */
442 abfd->cacheable = true;
444 if (!bfd_check_format (abfd, bfd_object))
446 error ("\"%s\": not in executable format: %s.",
447 scratch_pathname, bfd_errmsg (bfd_get_error ()));
449 if (build_section_table (abfd, &so->sections, &so->sections_end))
451 error ("Can't find the file sections in `%s': %s",
452 bfd_get_filename (exec_bfd), bfd_errmsg (bfd_get_error ()));
455 for (p = so->sections; p < so->sections_end; p++)
457 /* Relocate the section binding addresses as recorded in the shared
458 object's file by the offset to get the address to which the
459 object was actually mapped. */
460 p->addr += LM_OFFSET (so);
461 p->endaddr += LM_OFFSET (so);
462 so->lmend = (CORE_ADDR) max (p->endaddr, so->lmend);
463 if (STREQ (p->the_bfd_section->name, ".text"))
469 /* Free the file names, close the file now. */
470 do_cleanups (old_chain);
479 locate_base -- locate the base address of dynamic linker structs
483 CORE_ADDR locate_base (void)
487 For both the SunOS and SVR4 shared library implementations, if the
488 inferior executable has been linked dynamically, there is a single
489 address somewhere in the inferior's data space which is the key to
490 locating all of the dynamic linker's runtime structures. This
491 address is the value of the symbol defined by the macro DEBUG_BASE.
492 The job of this function is to find and return that address, or to
493 return 0 if there is no such address (the executable is statically
496 For SunOS, the job is almost trivial, since the dynamic linker and
497 all of it's structures are statically linked to the executable at
498 link time. Thus the symbol for the address we are looking for has
499 already been added to the minimal symbol table for the executable's
500 objfile at the time the symbol file's symbols were read, and all we
501 have to do is look it up there. Note that we explicitly do NOT want
502 to find the copies in the shared library.
504 The SVR4 version is much more complicated because the dynamic linker
505 and it's structures are located in the shared C library, which gets
506 run as the executable's "interpreter" by the kernel. We have to go
507 to a lot more work to discover the address of DEBUG_BASE. Because
508 of this complexity, we cache the value we find and return that value
509 on subsequent invocations. Note there is no copy in the executable
512 Irix 5 is basically like SunOS.
514 Note that we can assume nothing about the process state at the time
515 we need to find this address. We may be stopped on the first instruc-
516 tion of the interpreter (C shared library), the first instruction of
517 the executable itself, or somewhere else entirely (if we attached
518 to the process for example).
525 struct minimal_symbol *msymbol;
526 CORE_ADDR address = 0;
528 msymbol = lookup_minimal_symbol (DEBUG_BASE, NULL, symfile_objfile);
529 if ((msymbol != NULL) && (SYMBOL_VALUE_ADDRESS (msymbol) != 0))
531 address = SYMBOL_VALUE_ADDRESS (msymbol);
540 first_link_map_member -- locate first member in dynamic linker's map
544 static struct link_map *first_link_map_member (void)
548 Read in a copy of the first member in the inferior's dynamic
549 link map from the inferior's dynamic linker structures, and return
550 a pointer to the link map descriptor.
553 static struct link_map *
554 first_link_map_member ()
556 struct obj_list *listp;
557 struct obj_list list_old;
559 static struct link_map first_lm;
561 CORE_ADDR next_lladdr;
563 /* We have not already read in the dynamic linking structures
564 from the inferior, lookup the address of the base structure. */
565 debug_base = locate_base ();
569 /* Get address of first list entry. */
570 read_memory (debug_base, (char *) &listp, sizeof (struct obj_list *));
575 /* Get first list entry. */
576 lladdr = (CORE_ADDR) listp;
577 read_memory (lladdr, (char *) &list_old, sizeof (struct obj_list));
579 /* The first entry in the list is the object file we are debugging,
581 next_lladdr = (CORE_ADDR) list_old.next;
583 #ifdef HANDLE_NEW_OBJ_LIST
584 if (list_old.data == NEW_OBJ_INFO_MAGIC)
586 Elf32_Obj_Info list_32;
588 read_memory (lladdr, (char *) &list_32, sizeof (Elf32_Obj_Info));
589 if (list_32.oi_size != sizeof (Elf32_Obj_Info))
591 next_lladdr = (CORE_ADDR) list_32.oi_next;
595 if (next_lladdr == 0)
598 first_lm.l_lladdr = next_lladdr;
607 next_link_map_member -- locate next member in dynamic linker's map
611 static struct link_map *next_link_map_member (so_list_ptr)
615 Read in a copy of the next member in the inferior's dynamic
616 link map from the inferior's dynamic linker structures, and return
617 a pointer to the link map descriptor.
620 static struct link_map *
621 next_link_map_member (so_list_ptr)
622 struct so_list *so_list_ptr;
624 struct link_map *lm = &so_list_ptr->lm;
625 CORE_ADDR next_lladdr = lm->l_next;
626 static struct link_map next_lm;
628 if (next_lladdr == 0)
630 /* We have hit the end of the list, so check to see if any were
631 added, but be quiet if we can't read from the target any more. */
634 if (lm->l_variant == OBJ_LIST_OLD)
636 struct obj_list list_old;
638 status = target_read_memory (lm->l_lladdr,
640 sizeof (struct obj_list));
641 next_lladdr = (CORE_ADDR) list_old.next;
643 #ifdef HANDLE_NEW_OBJ_LIST
644 else if (lm->l_variant == OBJ_LIST_32)
646 Elf32_Obj_Info list_32;
647 status = target_read_memory (lm->l_lladdr,
649 sizeof (Elf32_Obj_Info));
650 next_lladdr = (CORE_ADDR) list_32.oi_next;
654 if (status != 0 || next_lladdr == 0)
658 next_lm.l_lladdr = next_lladdr;
667 xfer_link_map_member -- set local variables from dynamic linker's map
671 static void xfer_link_map_member (so_list_ptr, lm)
675 Read in a copy of the requested member in the inferior's dynamic
676 link map from the inferior's dynamic linker structures, and fill
677 in the necessary so_list_ptr elements.
681 xfer_link_map_member (so_list_ptr, lm)
682 struct so_list *so_list_ptr;
685 struct obj_list list_old;
686 CORE_ADDR lladdr = lm->l_lladdr;
687 struct link_map *new_lm = &so_list_ptr->lm;
690 read_memory (lladdr, (char *) &list_old, sizeof (struct obj_list));
692 new_lm->l_variant = OBJ_LIST_OLD;
693 new_lm->l_lladdr = lladdr;
694 new_lm->l_next = (CORE_ADDR) list_old.next;
696 #ifdef HANDLE_NEW_OBJ_LIST
697 if (list_old.data == NEW_OBJ_INFO_MAGIC)
699 Elf32_Obj_Info list_32;
701 read_memory (lladdr, (char *) &list_32, sizeof (Elf32_Obj_Info));
702 if (list_32.oi_size != sizeof (Elf32_Obj_Info))
704 new_lm->l_variant = OBJ_LIST_32;
705 new_lm->l_next = (CORE_ADDR) list_32.oi_next;
707 target_read_string ((CORE_ADDR) list_32.oi_pathname,
708 &so_list_ptr->so_name,
709 list_32.oi_pathname_len + 1, &errcode);
711 memory_error (errcode, (CORE_ADDR) list_32.oi_pathname);
713 LM_ADDR (so_list_ptr) = (CORE_ADDR) list_32.oi_ehdr;
714 LM_OFFSET (so_list_ptr) =
715 (CORE_ADDR) list_32.oi_ehdr - (CORE_ADDR) list_32.oi_orig_ehdr;
720 #if defined (_MIPS_SIM_NABI32) && _MIPS_SIM == _MIPS_SIM_NABI32
721 /* If we are compiling GDB under N32 ABI, the alignments in
722 the obj struct are different from the O32 ABI and we will get
723 wrong values when accessing the struct.
724 As a workaround we use fixed values which are good for
728 read_memory ((CORE_ADDR) list_old.data, buf, sizeof (buf));
730 target_read_string (extract_address (&buf[236], 4),
731 &so_list_ptr->so_name,
734 memory_error (errcode, extract_address (&buf[236], 4));
736 LM_ADDR (so_list_ptr) = extract_address (&buf[196], 4);
737 LM_OFFSET (so_list_ptr) =
738 extract_address (&buf[196], 4) - extract_address (&buf[248], 4);
742 read_memory ((CORE_ADDR) list_old.data, (char *) &obj_old,
743 sizeof (struct obj));
745 target_read_string ((CORE_ADDR) obj_old.o_path,
746 &so_list_ptr->so_name,
749 memory_error (errcode, (CORE_ADDR) obj_old.o_path);
751 LM_ADDR (so_list_ptr) = (CORE_ADDR) obj_old.o_praw;
752 LM_OFFSET (so_list_ptr) =
753 (CORE_ADDR) obj_old.o_praw - obj_old.o_base_address;
757 catch_errors (solib_map_sections, (char *) so_list_ptr,
758 "Error while mapping shared library sections:\n",
767 find_solib -- step through list of shared objects
771 struct so_list *find_solib (struct so_list *so_list_ptr)
775 This module contains the routine which finds the names of any
776 loaded "images" in the current process. The argument in must be
777 NULL on the first call, and then the returned value must be passed
778 in on subsequent calls. This provides the capability to "step" down
779 the list of loaded objects. On the last object, a NULL value is
783 static struct so_list *
784 find_solib (so_list_ptr)
785 struct so_list *so_list_ptr; /* Last lm or NULL for first one */
787 struct so_list *so_list_next = NULL;
788 struct link_map *lm = NULL;
791 if (so_list_ptr == NULL)
793 /* We are setting up for a new scan through the loaded images. */
794 if ((so_list_next = so_list_head) == NULL)
796 /* Find the first link map list member. */
797 lm = first_link_map_member ();
802 /* We have been called before, and are in the process of walking
803 the shared library list. Advance to the next shared object. */
804 lm = next_link_map_member (so_list_ptr);
805 so_list_next = so_list_ptr->next;
807 if ((so_list_next == NULL) && (lm != NULL))
809 new = (struct so_list *) xmalloc (sizeof (struct so_list));
810 memset ((char *) new, 0, sizeof (struct so_list));
811 /* Add the new node as the next node in the list, or as the root
812 node if this is the first one. */
813 if (so_list_ptr != NULL)
815 so_list_ptr->next = new;
822 xfer_link_map_member (new, lm);
824 return (so_list_next);
827 /* A small stub to get us past the arg-passing pinhole of catch_errors. */
830 symbol_add_stub (arg)
833 register struct so_list *so = (struct so_list *) arg; /* catch_errs bogon */
834 CORE_ADDR text_addr = 0;
837 text_addr = so->textsection->addr;
838 else if (so->abfd != NULL)
840 asection *lowest_sect;
842 /* If we didn't find a mapped non zero sized .text section, set up
843 text_addr so that the relocation in symbol_file_add does no harm. */
845 lowest_sect = bfd_get_section_by_name (so->abfd, ".text");
846 if (lowest_sect == NULL)
847 bfd_map_over_sections (so->abfd, find_lowest_section,
850 text_addr = bfd_section_vma (so->abfd, lowest_sect) + LM_OFFSET (so);
853 so->objfile = symbol_file_add (so->so_name, so->from_tty,
863 solib_add -- add a shared library file to the symtab and section list
867 void solib_add (char *arg_string, int from_tty,
868 struct target_ops *target)
875 solib_add (arg_string, from_tty, target)
878 struct target_ops *target;
880 register struct so_list *so = NULL; /* link map state variable */
882 /* Last shared library that we read. */
883 struct so_list *so_last = NULL;
889 if ((re_err = re_comp (arg_string ? arg_string : ".")) != NULL)
891 error ("Invalid regexp: %s", re_err);
894 /* Add the shared library sections to the section table of the
895 specified target, if any. */
898 /* Count how many new section_table entries there are. */
901 while ((so = find_solib (so)) != NULL)
905 count += so->sections_end - so->sections;
913 /* We must update the to_sections field in the core_ops structure
914 here, otherwise we dereference a potential dangling pointer
915 for each call to target_read/write_memory within this routine. */
916 update_coreops = core_ops.to_sections == target->to_sections;
918 /* Reallocate the target's section table including the new size. */
919 if (target->to_sections)
921 old = target->to_sections_end - target->to_sections;
922 target->to_sections = (struct section_table *)
923 xrealloc ((char *) target->to_sections,
924 (sizeof (struct section_table)) * (count + old));
929 target->to_sections = (struct section_table *)
930 xmalloc ((sizeof (struct section_table)) * count);
932 target->to_sections_end = target->to_sections + (count + old);
934 /* Update the to_sections field in the core_ops structure
938 core_ops.to_sections = target->to_sections;
939 core_ops.to_sections_end = target->to_sections_end;
942 /* Add these section table entries to the target's table. */
943 while ((so = find_solib (so)) != NULL)
947 count = so->sections_end - so->sections;
948 memcpy ((char *) (target->to_sections + old),
950 (sizeof (struct section_table)) * count);
957 /* Now add the symbol files. */
958 while ((so = find_solib (so)) != NULL)
960 if (so->so_name[0] && re_exec (so->so_name))
962 so->from_tty = from_tty;
963 if (so->symbols_loaded)
967 printf_unfiltered ("Symbols already loaded for %s\n", so->so_name);
970 else if (catch_errors
971 (symbol_add_stub, (char *) so,
972 "Error while reading shared library symbols:\n",
976 so->symbols_loaded = 1;
981 /* Getting new symbols may change our opinion about what is
984 reinit_frame_cache ();
991 info_sharedlibrary_command -- code for "info sharedlibrary"
995 static void info_sharedlibrary_command ()
999 Walk through the shared library list and print information
1000 about each attached library.
1004 info_sharedlibrary_command (ignore, from_tty)
1008 register struct so_list *so = NULL; /* link map state variable */
1009 int header_done = 0;
1011 if (exec_bfd == NULL)
1013 printf_unfiltered ("No exec file.\n");
1016 while ((so = find_solib (so)) != NULL)
1022 printf_unfiltered ("%-12s%-12s%-12s%s\n", "From", "To", "Syms Read",
1023 "Shared Object Library");
1026 printf_unfiltered ("%-12s",
1027 local_hex_string_custom ((unsigned long) LM_ADDR (so),
1029 printf_unfiltered ("%-12s",
1030 local_hex_string_custom ((unsigned long) so->lmend,
1032 printf_unfiltered ("%-12s", so->symbols_loaded ? "Yes" : "No");
1033 printf_unfiltered ("%s\n", so->so_name);
1036 if (so_list_head == NULL)
1038 printf_unfiltered ("No shared libraries loaded at this time.\n");
1046 solib_address -- check to see if an address is in a shared lib
1050 char *solib_address (CORE_ADDR address)
1054 Provides a hook for other gdb routines to discover whether or
1055 not a particular address is within the mapped address space of
1056 a shared library. Any address between the base mapping address
1057 and the first address beyond the end of the last mapping, is
1058 considered to be within the shared library address space, for
1061 For example, this routine is called at one point to disable
1062 breakpoints which are in shared libraries that are not currently
1067 solib_address (address)
1070 register struct so_list *so = 0; /* link map state variable */
1072 while ((so = find_solib (so)) != NULL)
1076 if ((address >= (CORE_ADDR) LM_ADDR (so)) &&
1077 (address < (CORE_ADDR) so->lmend))
1078 return (so->so_name);
1084 /* Called by free_all_symtabs */
1089 struct so_list *next;
1092 disable_breakpoints_in_shlibs (1);
1094 while (so_list_head)
1096 if (so_list_head->sections)
1098 free ((PTR) so_list_head->sections);
1100 if (so_list_head->abfd)
1102 bfd_filename = bfd_get_filename (so_list_head->abfd);
1103 if (!bfd_close (so_list_head->abfd))
1104 warning ("cannot close \"%s\": %s",
1105 bfd_filename, bfd_errmsg (bfd_get_error ()));
1108 /* This happens for the executable on SVR4. */
1109 bfd_filename = NULL;
1111 next = so_list_head->next;
1113 free ((PTR) bfd_filename);
1114 free (so_list_head->so_name);
1115 free ((PTR) so_list_head);
1116 so_list_head = next;
1125 disable_break -- remove the "mapping changed" breakpoint
1129 static int disable_break ()
1133 Removes the breakpoint that gets hit when the dynamic linker
1134 completes a mapping change.
1144 /* Note that breakpoint address and original contents are in our address
1145 space, so we just need to write the original contents back. */
1147 if (memory_remove_breakpoint (breakpoint_addr, shadow_contents) != 0)
1152 /* For the SVR4 version, we always know the breakpoint address. For the
1153 SunOS version we don't know it until the above code is executed.
1154 Grumble if we are stopped anywhere besides the breakpoint address. */
1156 if (stop_pc != breakpoint_addr)
1158 warning ("stopped at unknown breakpoint while handling shared libraries");
1168 enable_break -- arrange for dynamic linker to hit breakpoint
1172 int enable_break (void)
1176 This functions inserts a breakpoint at the entry point of the
1177 main executable, where all shared libraries are mapped in.
1183 if (symfile_objfile != NULL
1184 && target_insert_breakpoint (symfile_objfile->ei.entry_point,
1185 shadow_contents) == 0)
1187 breakpoint_addr = symfile_objfile->ei.entry_point;
1198 solib_create_inferior_hook -- shared library startup support
1202 void solib_create_inferior_hook()
1206 When gdb starts up the inferior, it nurses it along (through the
1207 shell) until it is ready to execute it's first instruction. At this
1208 point, this function gets called via expansion of the macro
1209 SOLIB_CREATE_INFERIOR_HOOK.
1211 For SunOS executables, this first instruction is typically the
1212 one at "_start", or a similar text label, regardless of whether
1213 the executable is statically or dynamically linked. The runtime
1214 startup code takes care of dynamically linking in any shared
1215 libraries, once gdb allows the inferior to continue.
1217 For SVR4 executables, this first instruction is either the first
1218 instruction in the dynamic linker (for dynamically linked
1219 executables) or the instruction at "start" for statically linked
1220 executables. For dynamically linked executables, the system
1221 first exec's /lib/libc.so.N, which contains the dynamic linker,
1222 and starts it running. The dynamic linker maps in any needed
1223 shared libraries, maps in the actual user executable, and then
1224 jumps to "start" in the user executable.
1226 For both SunOS shared libraries, and SVR4 shared libraries, we
1227 can arrange to cooperate with the dynamic linker to discover the
1228 names of shared libraries that are dynamically linked, and the
1229 base addresses to which they are linked.
1231 This function is responsible for discovering those names and
1232 addresses, and saving sufficient information about them to allow
1233 their symbols to be read at a later time.
1237 Between enable_break() and disable_break(), this code does not
1238 properly handle hitting breakpoints which the user might have
1239 set in the startup code or in the dynamic linker itself. Proper
1240 handling will probably have to wait until the implementation is
1241 changed to use the "breakpoint handler function" method.
1243 Also, what if child has exit()ed? Must exit loop somehow.
1247 solib_create_inferior_hook ()
1249 if (!enable_break ())
1251 warning ("shared library handler failed to enable breakpoint");
1255 /* Now run the target. It will eventually hit the breakpoint, at
1256 which point all of the libraries will have been mapped in and we
1257 can go groveling around in the dynamic linker structures to find
1258 out what we need to know about them. */
1260 clear_proceed_status ();
1261 stop_soon_quietly = 1;
1262 stop_signal = TARGET_SIGNAL_0;
1265 target_resume (-1, 0, stop_signal);
1266 wait_for_inferior ();
1268 while (stop_signal != TARGET_SIGNAL_TRAP);
1270 /* We are now either at the "mapping complete" breakpoint (or somewhere
1271 else, a condition we aren't prepared to deal with anyway), so adjust
1272 the PC as necessary after a breakpoint, disable the breakpoint, and
1273 add any shared libraries that were mapped in. */
1275 if (DECR_PC_AFTER_BREAK)
1277 stop_pc -= DECR_PC_AFTER_BREAK;
1278 write_register (PC_REGNUM, stop_pc);
1281 if (!disable_break ())
1283 warning ("shared library handler failed to disable breakpoint");
1286 /* solib_add will call reinit_frame_cache.
1287 But we are stopped in the startup code and we might not have symbols
1288 for the startup code, so heuristic_proc_start could be called
1289 and will put out an annoying warning.
1290 Delaying the resetting of stop_soon_quietly until after symbol loading
1291 suppresses the warning. */
1293 solib_add ((char *) 0, 0, (struct target_ops *) 0);
1294 stop_soon_quietly = 0;
1301 sharedlibrary_command -- handle command to explicitly add library
1305 static void sharedlibrary_command (char *args, int from_tty)
1312 sharedlibrary_command (args, from_tty)
1317 solib_add (args, from_tty, (struct target_ops *) 0);
1321 _initialize_solib ()
1323 add_com ("sharedlibrary", class_files, sharedlibrary_command,
1324 "Load shared object library symbols for files matching REGEXP.");
1325 add_info ("sharedlibrary", info_sharedlibrary_command,
1326 "Status of loaded shared object libraries.");
1329 (add_set_cmd ("auto-solib-add", class_support, var_zinteger,
1330 (char *) &auto_solib_add,
1331 "Set autoloading of shared library symbols.\n\
1332 If nonzero, symbols from all shared object libraries will be loaded\n\
1333 automatically when the inferior begins execution or when the dynamic linker\n\
1334 informs gdb that a new library has been loaded. Otherwise, symbols\n\
1335 must be loaded manually, using `sharedlibrary'.",
1341 /* Register that we are able to handle irix5 core file formats.
1342 This really is bfd_target_unknown_flavour */
1344 static struct core_fns irix5_core_fns =
1346 bfd_target_unknown_flavour,
1347 fetch_core_registers,
1352 _initialize_core_irix5 ()
1354 add_core_fns (&irix5_core_fns);