1 /* Copyright (C) 2010-2013 Free Software Foundation, Inc.
3 This file is part of GDB.
5 This program is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published by
7 the Free Software Foundation; either version 3 of the License, or
8 (at your option) any later version.
10 This program is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 GNU General Public License for more details.
15 You should have received a copy of the GNU General Public License
16 along with this program. If not, see <http://www.gnu.org/licenses/>. */
19 #include "ia64-tdep.h"
20 #include "ia64-hpux-tdep.h"
21 #include "solib-ia64-hpux.h"
29 #include "opcode/ia64.h"
33 #include "exceptions.h"
35 /* Need to define the following macro in order to get the complete
36 load_module_desc struct definition in dlfcn.h Otherwise, it doesn't
37 match the size of the struct the loader is providing us during load
39 #define _LOAD_MODULE_DESC_EXT
41 #include <sys/ttrace.h>
44 #include <service_mgr.h>
46 /* The following is to have access to the definition of type load_info_t. */
49 /* The r32 pseudo-register number.
51 Like all stacked registers, r32 is treated as a pseudo-register,
52 because it is not always available for read/write via the ttrace
54 /* This is a bit of a hack, as we duplicate something hidden inside
55 ia64-tdep.c, but oh well... */
56 #define IA64_R32_PSEUDO_REGNUM (IA64_NAT127_REGNUM + 2)
58 /* Our struct so_list private data structure. */
62 /* The shared library module descriptor. We extract this structure
63 from the loader at the time the shared library gets mapped. */
64 struct load_module_desc module_desc;
66 /* The text segment address as defined in the shared library object
67 (this is not the address where this segment got loaded). This
68 field is initially set to zero, and computed lazily. */
71 /* The data segment address as defined in the shared library object
72 (this is not the address where this segment got loaded). This
73 field is initially set to zero, and computed lazily. */
77 /* The list of shared libraries currently mapped by the inferior. */
79 static struct so_list *so_list_head = NULL;
81 /* Create a new so_list element. The result should be deallocated
82 when no longer in use. */
84 static struct so_list *
85 new_so_list (char *so_name, struct load_module_desc module_desc)
87 struct so_list *new_so;
89 new_so = (struct so_list *) XZALLOC (struct so_list);
90 new_so->lm_info = (struct lm_info *) XZALLOC (struct lm_info);
91 new_so->lm_info->module_desc = module_desc;
93 strncpy (new_so->so_name, so_name, SO_NAME_MAX_PATH_SIZE - 1);
94 new_so->so_name[SO_NAME_MAX_PATH_SIZE - 1] = '\0';
95 strcpy (new_so->so_original_name, new_so->so_name);
100 /* Return non-zero if the instruction at the current PC is a breakpoint
101 part of the dynamic loading process.
103 We identify such instructions by checking that the instruction at
104 the current pc is a break insn where no software breakpoint has been
105 inserted by us. We also verify that the operands have specific
106 known values, to be extra certain.
108 PTID is the ptid of the thread that should be checked, but this
109 function also assumes that inferior_ptid is already equal to PTID.
110 Ideally, we would like to avoid the requirement on inferior_ptid,
111 but many routines still use the inferior_ptid global to access
112 the relevant thread's register and memory. We still have the ptid
113 as parameter to be able to pass it to the routines that do take a ptid
114 - that way we avoid increasing explicit uses of the inferior_ptid
118 ia64_hpux_at_dld_breakpoint_1_p (ptid_t ptid)
120 struct regcache *regcache = get_thread_regcache (ptid);
121 CORE_ADDR pc = regcache_read_pc (regcache);
122 struct address_space *aspace = get_regcache_aspace (regcache);
123 ia64_insn t0, t1, slot[3], template, insn;
127 /* If this is a regular breakpoint, then it can not be a dld one. */
128 if (breakpoint_inserted_here_p (aspace, pc))
131 slotnum = ((long) pc) & 0xf;
133 internal_error (__FILE__, __LINE__,
134 "invalid slot (%d) for address %s", slotnum,
135 paddress (get_regcache_arch (regcache), pc));
138 read_memory (pc, bundle, sizeof (bundle));
140 /* bundles are always in little-endian byte order */
141 t0 = bfd_getl64 (bundle);
142 t1 = bfd_getl64 (bundle + 8);
143 template = (t0 >> 1) & 0xf;
144 slot[0] = (t0 >> 5) & 0x1ffffffffffLL;
145 slot[1] = ((t0 >> 46) & 0x3ffff) | ((t1 & 0x7fffff) << 18);
146 slot[2] = (t1 >> 23) & 0x1ffffffffffLL;
148 if (template == 2 && slotnum == 1)
150 /* skip L slot in MLI template: */
154 insn = slot[slotnum];
156 return (insn == 0x1c0c9c0 /* break.i 0x070327 */
157 || insn == 0x3c0c9c0); /* break.i 0x0f0327 */
160 /* Same as ia64_hpux_at_dld_breakpoint_1_p above, with the following
161 differences: It temporarily sets inferior_ptid to PTID, and also
162 contains any exception being raised. */
165 ia64_hpux_at_dld_breakpoint_p (ptid_t ptid)
167 volatile struct gdb_exception e;
168 ptid_t saved_ptid = inferior_ptid;
171 inferior_ptid = ptid;
172 TRY_CATCH (e, RETURN_MASK_ALL)
174 result = ia64_hpux_at_dld_breakpoint_1_p (ptid);
176 inferior_ptid = saved_ptid;
178 warning (_("error while checking for dld breakpoint: %s"), e.message);
183 /* Handler for library load event: Read the information provided by
184 the loader, and then use it to read the shared library symbols. */
187 ia64_hpux_handle_load_event (struct regcache *regcache)
189 CORE_ADDR module_desc_addr;
190 ULONGEST module_desc_size;
191 CORE_ADDR so_path_addr;
192 char so_path[PATH_MAX];
193 struct load_module_desc module_desc;
194 struct so_list *new_so;
196 /* Extract the data provided by the loader as follow:
197 - r33: Address of load_module_desc structure
198 - r34: size of struct load_module_desc
199 - r35: Address of string holding shared library path
201 regcache_cooked_read_unsigned (regcache, IA64_R32_PSEUDO_REGNUM + 1,
203 regcache_cooked_read_unsigned (regcache, IA64_R32_PSEUDO_REGNUM + 2,
205 regcache_cooked_read_unsigned (regcache, IA64_R32_PSEUDO_REGNUM + 3,
208 if (module_desc_size != sizeof (struct load_module_desc))
209 warning (_("load_module_desc size (%ld) != size returned by kernel (%s)"),
210 sizeof (struct load_module_desc),
211 pulongest (module_desc_size));
213 read_memory_string (so_path_addr, so_path, PATH_MAX);
214 read_memory (module_desc_addr, (gdb_byte *) &module_desc,
215 sizeof (module_desc));
217 /* Create a new so_list element and insert it at the start of our
218 so_list_head (we insert at the start of the list only because
219 it is less work compared to inserting it elsewhere). */
220 new_so = new_so_list (so_path, module_desc);
221 new_so->next = so_list_head;
222 so_list_head = new_so;
225 /* Update the value of the PC to point to the begining of the next
226 instruction bundle. */
229 ia64_hpux_move_pc_to_next_bundle (struct regcache *regcache)
231 CORE_ADDR pc = regcache_read_pc (regcache);
235 ia64_write_pc (regcache, pc);
238 /* Handle loader events.
240 PTID is the ptid of the thread corresponding to the event being
241 handled. Similarly to ia64_hpux_at_dld_breakpoint_1_p, this
242 function assumes that inferior_ptid is set to PTID. */
245 ia64_hpux_handle_dld_breakpoint_1 (ptid_t ptid)
247 struct regcache *regcache = get_thread_regcache (ptid);
250 /* The type of event is provided by the loaded via r32. */
251 regcache_cooked_read_unsigned (regcache, IA64_R32_PSEUDO_REGNUM, &arg0);
254 case BREAK_DE_SVC_LOADED:
255 /* Currently, the only service loads are uld and dld,
256 so we shouldn't need to do anything. Just ignore. */
258 case BREAK_DE_LIB_LOADED:
259 ia64_hpux_handle_load_event (regcache);
260 solib_add (NULL, 0, ¤t_target, auto_solib_add);
262 case BREAK_DE_LIB_UNLOADED:
263 case BREAK_DE_LOAD_COMPLETE:
265 /* Ignore for now. */
269 /* Now that we have handled the event, we can move the PC to
270 the next instruction bundle, past the break instruction. */
271 ia64_hpux_move_pc_to_next_bundle (regcache);
274 /* Same as ia64_hpux_handle_dld_breakpoint_1 above, with the following
275 differences: This function temporarily sets inferior_ptid to PTID,
276 and also contains any exception. */
279 ia64_hpux_handle_dld_breakpoint (ptid_t ptid)
281 volatile struct gdb_exception e;
282 ptid_t saved_ptid = inferior_ptid;
284 inferior_ptid = ptid;
285 TRY_CATCH (e, RETURN_MASK_ALL)
287 ia64_hpux_handle_dld_breakpoint_1 (ptid);
289 inferior_ptid = saved_ptid;
291 warning (_("error detected while handling dld breakpoint: %s"), e.message);
294 /* Find the address of the code and data segments in ABFD, and update
295 TEXT_START and DATA_START accordingly. */
298 ia64_hpux_find_start_vma (bfd *abfd, CORE_ADDR *text_start,
299 CORE_ADDR *data_start)
301 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
308 if (bfd_seek (abfd, i_ehdrp->e_phoff, SEEK_SET) == -1)
309 error (_("invalid program header offset in %s"), abfd->filename);
311 for (i = 0; i < i_ehdrp->e_phnum; i++)
313 if (bfd_bread (&phdr, sizeof (phdr), abfd) != sizeof (phdr))
314 error (_("failed to read segment %d in %s"), i, abfd->filename);
316 if (phdr.p_flags & PF_X
317 && (*text_start == 0 || phdr.p_vaddr < *text_start))
318 *text_start = phdr.p_vaddr;
320 if (phdr.p_flags & PF_W
321 && (*data_start == 0 || phdr.p_vaddr < *data_start))
322 *data_start = phdr.p_vaddr;
326 /* The "relocate_section_addresses" target_so_ops routine for ia64-hpux. */
329 ia64_hpux_relocate_section_addresses (struct so_list *so,
330 struct target_section *sec)
332 CORE_ADDR offset = 0;
334 /* If we haven't computed the text & data segment addresses, do so now.
335 We do this here, because we now have direct access to the associated
336 bfd, whereas we would have had to open our own if we wanted to do it
337 while processing the library-load event. */
338 if (so->lm_info->text_start == 0 && so->lm_info->data_start == 0)
339 ia64_hpux_find_start_vma (sec->bfd, &so->lm_info->text_start,
340 &so->lm_info->data_start);
342 /* Determine the relocation offset based on which segment
343 the section belongs to. */
344 if ((so->lm_info->text_start < so->lm_info->data_start
345 && sec->addr < so->lm_info->data_start)
346 || (so->lm_info->text_start > so->lm_info->data_start
347 && sec->addr >= so->lm_info->text_start))
348 offset = so->lm_info->module_desc.text_base - so->lm_info->text_start;
349 else if ((so->lm_info->text_start < so->lm_info->data_start
350 && sec->addr >= so->lm_info->data_start)
351 || (so->lm_info->text_start > so->lm_info->data_start
352 && sec->addr < so->lm_info->text_start))
353 offset = so->lm_info->module_desc.data_base - so->lm_info->data_start;
355 /* And now apply the relocation. */
357 sec->endaddr += offset;
359 /* Best effort to set addr_high/addr_low. This is used only by
360 'info sharedlibrary'. */
361 if (so->addr_low == 0 || sec->addr < so->addr_low)
362 so->addr_low = sec->addr;
364 if (so->addr_high == 0 || sec->endaddr > so->addr_high)
365 so->addr_high = sec->endaddr;
368 /* The "free_so" target_so_ops routine for ia64-hpux. */
371 ia64_hpux_free_so (struct so_list *so)
376 /* The "clear_solib" target_so_ops routine for ia64-hpux. */
379 ia64_hpux_clear_solib (void)
383 while (so_list_head != NULL)
386 so_list_head = so_list_head->next;
388 ia64_hpux_free_so (so);
393 /* Assuming the inferior just stopped on an EXEC event, return
394 the address of the load_info_t structure. */
397 ia64_hpux_get_load_info_addr (void)
399 struct type *data_ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
403 /* The address of the load_info_t structure is stored in the 4th
404 argument passed to the initial thread of the process (in other
405 words, in argv[3]). So get the address of these arguments,
406 and extract the 4th one. */
407 status = ttrace (TT_PROC_GET_ARGS, ptid_get_pid (inferior_ptid),
408 0, (uintptr_t) &addr, sizeof (CORE_ADDR), 0);
409 if (status == -1 && errno)
410 perror_with_name (_("Unable to get argument list"));
411 return (read_memory_typed_address (addr + 3 * 8, data_ptr_type));
414 /* A structure used to aggregate some information extracted from
415 the dynamic section of the main executable. */
423 /* Scan the ".dynamic" section referenced by ABFD and DYN_SECT,
424 and extract the information needed to fill in INFO. */
427 ia64_hpux_read_dynamic_info (struct gdbarch *gdbarch, bfd *abfd,
428 asection *dyn_sect, struct dld_info *info)
434 /* Make sure that info always has initialized data, even if we fail
435 to read the syn_sect section. */
436 memset (info, 0, sizeof (struct dld_info));
438 sect_size = bfd_section_size (abfd, dyn_sect);
439 buf = alloca (sect_size);
440 buf_end = buf + sect_size;
442 if (bfd_seek (abfd, dyn_sect->filepos, SEEK_SET) != 0
443 || bfd_bread (buf, sect_size, abfd) != sect_size)
444 error (_("failed to read contents of .dynamic section"));
446 for (; buf < buf_end; buf += sizeof (Elf64_Dyn))
448 Elf64_Dyn *dynp = (Elf64_Dyn *) buf;
451 d_tag = bfd_h_get_64 (abfd, &dynp->d_tag);
454 case DT_HP_DLD_FLAGS:
455 info->dld_flags = bfd_h_get_64 (abfd, &dynp->d_un);
460 CORE_ADDR load_map_addr = bfd_h_get_64 (abfd, &dynp->d_un.d_ptr);
462 if (target_read_memory (load_map_addr,
463 (gdb_byte *) &info->load_map,
464 sizeof (info->load_map)) != 0)
465 error (_("failed to read load map at %s"),
466 paddress (gdbarch, load_map_addr));
473 /* Wrapper around target_read_memory used with libdl. */
476 ia64_hpux_read_tgt_mem (void *buffer, uint64_t ptr, size_t bufsiz, int ident)
478 if (target_read_memory (ptr, (gdb_byte *) buffer, bufsiz) != 0)
484 /* Create a new so_list object for a shared library, and store that
485 new so_list object in our SO_LIST_HEAD list.
487 SO_INDEX is an index specifying the placement of the loaded shared
488 library in the dynamic loader's search list. Normally, this index
489 is strictly positive, but an index of -1 refers to the loader itself.
491 Return nonzero if the so_list object could be created. A null
492 return value with a positive SO_INDEX normally means that there are
493 no more entries in the dynamic loader's search list at SO_INDEX or
497 ia64_hpux_add_so_from_dld_info (struct dld_info info, int so_index)
499 struct load_module_desc module_desc;
504 so_handle = dlgetmodinfo (so_index, &module_desc, sizeof (module_desc),
505 ia64_hpux_read_tgt_mem, 0, info.load_map);
508 /* No such entry. We probably reached the end of the list. */
511 so_path = dlgetname (&module_desc, sizeof (module_desc),
512 ia64_hpux_read_tgt_mem, 0, info.load_map);
515 /* Should never happen, but let's not crash if it does. */
516 warning (_("unable to get shared library name, symbols not loaded"));
520 /* Create a new so_list and insert it at the start of our list.
521 The order is not extremely important, but it's less work to do so
522 at the end of the list. */
523 so = new_so_list (so_path, module_desc);
524 so->next = so_list_head;
530 /* Assuming we just attached to a process, update our list of shared
531 libraries (SO_LIST_HEAD) as well as GDB's list. */
534 ia64_hpux_solib_add_after_attach (void)
538 struct dld_info info;
541 if (symfile_objfile == NULL)
544 abfd = symfile_objfile->obfd;
545 dyn_sect = bfd_get_section_by_name (abfd, ".dynamic");
547 if (dyn_sect == NULL || bfd_section_size (abfd, dyn_sect) == 0)
550 ia64_hpux_read_dynamic_info (get_objfile_arch (symfile_objfile), abfd,
553 if ((info.dld_flags & DT_HP_DEBUG_PRIVATE) == 0)
556 "The shared libraries were not privately mapped; setting a breakpoint\n\
557 in a shared library will not work until you rerun the program.\n\
558 Use the following command to enable debugging of shared libraries.\n\
559 chatr +dbg enable a.out"));
562 /* Read the symbols of the dynamic loader (dld.so). */
563 ia64_hpux_add_so_from_dld_info (info, -1);
565 /* Read the symbols of all the other shared libraries. */
567 if (!ia64_hpux_add_so_from_dld_info (info, i))
568 break; /* End of list. */
570 /* Resync the library list at the core level. */
571 solib_add (NULL, 1, ¤t_target, auto_solib_add);
574 /* The "create_inferior_hook" target_so_ops routine for ia64-hpux. */
577 ia64_hpux_solib_create_inferior_hook (int from_tty)
579 CORE_ADDR load_info_addr;
580 load_info_t load_info;
582 /* Initially, we were thinking about adding a check that the program
583 (accessible through symfile_objfile) was linked against some shared
584 libraries, by searching for a ".dynamic" section. However, could
585 this break in the case of a statically linked program that later
586 uses dlopen? Programs that are fully statically linked are very
587 rare, and we will worry about them when we encounter one that
590 /* Set the LI_TRACE flag in the load_info_t structure. This enables
591 notifications when shared libraries are being mapped. */
592 load_info_addr = ia64_hpux_get_load_info_addr ();
593 read_memory (load_info_addr, (gdb_byte *) &load_info, sizeof (load_info));
594 load_info.li_flags |= LI_TRACE;
595 write_memory (load_info_addr, (gdb_byte *) &load_info, sizeof (load_info));
597 /* If we just attached to our process, some shard libraries have
598 already been mapped. Find which ones they are... */
599 if (current_inferior ()->attach_flag)
600 ia64_hpux_solib_add_after_attach ();
603 /* The "special_symbol_handling" target_so_ops routine for ia64-hpux. */
606 ia64_hpux_special_symbol_handling (void)
611 /* The "current_sos" target_so_ops routine for ia64-hpux. */
613 static struct so_list *
614 ia64_hpux_current_sos (void)
616 /* Return a deep copy of our own list. */
617 struct so_list *new_head = NULL, *prev_new_so = NULL;
618 struct so_list *our_so;
620 for (our_so = so_list_head; our_so != NULL; our_so = our_so->next)
622 struct so_list *new_so;
624 new_so = new_so_list (our_so->so_name, our_so->lm_info->module_desc);
625 if (prev_new_so != NULL)
626 prev_new_so->next = new_so;
627 prev_new_so = new_so;
628 if (new_head == NULL)
635 /* The "open_symbol_file_object" target_so_ops routine for ia64-hpux. */
638 ia64_hpux_open_symbol_file_object (void *from_ttyp)
643 /* The "in_dynsym_resolve_code" target_so_ops routine for ia64-hpux. */
646 ia64_hpux_in_dynsym_resolve_code (CORE_ADDR pc)
651 /* If FADDR is the address of a function inside one of the shared
652 libraries, return the shared library linkage address. */
655 ia64_hpux_get_solib_linkage_addr (CORE_ADDR faddr)
657 struct so_list *so = so_list_head;
661 struct load_module_desc module_desc = so->lm_info->module_desc;
663 if (module_desc.text_base <= faddr
664 && (module_desc.text_base + module_desc.text_size) > faddr)
665 return module_desc.linkage_ptr;
673 /* Create a new target_so_ops structure suitable for ia64-hpux, and
674 return its address. */
676 static struct target_so_ops *
677 ia64_hpux_target_so_ops (void)
679 struct target_so_ops *ops = XZALLOC (struct target_so_ops);
681 ops->relocate_section_addresses = ia64_hpux_relocate_section_addresses;
682 ops->free_so = ia64_hpux_free_so;
683 ops->clear_solib = ia64_hpux_clear_solib;
684 ops->solib_create_inferior_hook = ia64_hpux_solib_create_inferior_hook;
685 ops->special_symbol_handling = ia64_hpux_special_symbol_handling;
686 ops->current_sos = ia64_hpux_current_sos;
687 ops->open_symbol_file_object = ia64_hpux_open_symbol_file_object;
688 ops->in_dynsym_resolve_code = ia64_hpux_in_dynsym_resolve_code;
689 ops->bfd_open = solib_bfd_open;
694 /* Prevent warning from -Wmissing-prototypes. */
695 void _initialize_solib_ia64_hpux (void);
698 _initialize_solib_ia64_hpux (void)
700 ia64_hpux_so_ops = ia64_hpux_target_so_ops ();