1 /* Cell SPU GNU/Linux support -- shared library handling.
2 Copyright (C) 2009-2012 Free Software Foundation, Inc.
4 Contributed by Ulrich Weigand <uweigand@de.ibm.com>.
6 This file is part of GDB.
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>. */
22 #include "solib-spu.h"
24 #include "gdb_string.h"
25 #include "gdb_assert.h"
27 #include "arch-utils.h"
31 #include "solib-svr4.h"
36 #include "breakpoint.h"
37 #include "gdbthread.h"
38 #include "exceptions.h"
42 /* Highest SPE id (file handle) the inferior may have. */
43 #define MAX_SPE_FD 1024
45 /* Stand-alone SPE executable? */
46 #define spu_standalone_p() \
47 (symfile_objfile && symfile_objfile->obfd \
48 && bfd_get_arch (symfile_objfile->obfd) == bfd_arch_spu)
51 /* Relocate main SPE executable. */
53 spu_relocate_main_executable (int spufs_fd)
55 struct section_offsets *new_offsets;
58 if (symfile_objfile == NULL)
61 new_offsets = alloca (symfile_objfile->num_sections
62 * sizeof (struct section_offsets));
64 for (i = 0; i < symfile_objfile->num_sections; i++)
65 new_offsets->offsets[i] = SPUADDR (spufs_fd, 0);
67 objfile_relocate (symfile_objfile, new_offsets);
70 /* When running a stand-alone SPE executable, we may need to skip one more
71 exec event on startup, to get past the binfmt_misc loader. */
73 spu_skip_standalone_loader (void)
75 if (target_has_execution && !current_inferior ()->attach_flag)
77 struct target_waitstatus ws;
79 /* Only some kernels report an extra SIGTRAP with the binfmt_misc
80 loader; others do not. In addition, if we have attached to an
81 already running inferior instead of starting a new one, we will
82 not see the extra SIGTRAP -- and we cannot readily distinguish
83 the two cases, in particular with the extended-remote target.
85 Thus we issue a single-step here. If no extra SIGTRAP was pending,
86 this will step past the first instruction of the stand-alone SPE
87 executable loader, but we don't care about that. */
89 inferior_thread ()->control.in_infcall = 1; /* Suppress MI messages. */
91 target_resume (inferior_ptid, 1, TARGET_SIGNAL_0);
92 target_wait (minus_one_ptid, &ws, 0);
93 set_executing (minus_one_ptid, 0);
95 inferior_thread ()->control.in_infcall = 0;
99 static const struct objfile_data *ocl_program_data_key;
101 /* Appends OpenCL programs to the list of `struct so_list' objects. */
103 append_ocl_sos (struct so_list **link_ptr)
105 CORE_ADDR *ocl_program_addr_base;
106 struct objfile *objfile;
108 ALL_OBJFILES (objfile)
110 ocl_program_addr_base = objfile_data (objfile, ocl_program_data_key);
111 if (ocl_program_addr_base != NULL)
113 enum bfd_endian byte_order = bfd_big_endian (objfile->obfd)?
114 BFD_ENDIAN_BIG : BFD_ENDIAN_LITTLE;
115 volatile struct gdb_exception ex;
116 TRY_CATCH (ex, RETURN_MASK_ALL)
119 read_memory_unsigned_integer (*ocl_program_addr_base,
126 /* Allocate so_list structure. */
127 new = XZALLOC (struct so_list);
129 /* Encode FD and object ID in path name. */
130 xsnprintf (new->so_name, sizeof new->so_name, "@%s <%d>",
132 SPUADDR_SPU (*ocl_program_addr_base));
133 strcpy (new->so_original_name, new->so_name);
136 link_ptr = &new->next;
141 /* Ignore memory errors. */
147 throw_exception (ex);
155 /* Build a list of `struct so_list' objects describing the shared
156 objects currently loaded in the inferior. */
157 static struct so_list *
158 spu_current_sos (void)
160 enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch);
161 struct so_list *head;
162 struct so_list **link_ptr;
164 char buf[MAX_SPE_FD * 4];
167 /* First, retrieve the SVR4 shared library list. */
168 head = svr4_so_ops.current_sos ();
170 /* Append our libraries to the end of the list. */
171 for (link_ptr = &head; *link_ptr; link_ptr = &(*link_ptr)->next)
174 /* Determine list of SPU ids. */
175 size = target_read (¤t_target, TARGET_OBJECT_SPU, NULL,
178 /* Do not add stand-alone SPE executable context as shared library,
179 but relocate main SPE executable objfile. */
180 if (spu_standalone_p ())
184 int fd = extract_unsigned_integer (buf, 4, byte_order);
186 spu_relocate_main_executable (fd);
188 /* Re-enable breakpoints after main SPU context was established;
189 see also comments in spu_solib_create_inferior_hook. */
190 enable_breakpoints_after_startup ();
196 /* Create an so_list entry for each SPU id. */
197 for (i = 0; i < size; i += 4)
199 int fd = extract_unsigned_integer (buf + i, 4, byte_order);
202 unsigned long long addr;
203 char annex[32], id[100];
206 /* Read object ID. There's a race window where the inferior may have
207 already created the SPE context, but not installed the object-id
208 yet. Skip such entries; we'll be back for them later. */
209 xsnprintf (annex, sizeof annex, "%d/object-id", fd);
210 len = target_read (¤t_target, TARGET_OBJECT_SPU, annex,
212 if (len <= 0 || len >= sizeof id)
215 if (sscanf (id, "0x%llx", &addr) != 1 || !addr)
218 /* Allocate so_list structure. */
219 new = XZALLOC (struct so_list);
221 /* Encode FD and object ID in path name. Choose the name so as not
222 to conflict with any (normal) SVR4 library path name. */
223 xsnprintf (new->so_name, sizeof new->so_name, "@%s <%d>",
224 hex_string (addr), fd);
225 strcpy (new->so_original_name, new->so_name);
228 link_ptr = &new->next;
231 /* Append OpenCL sos. */
232 append_ocl_sos (link_ptr);
237 /* Free so_list information. */
239 spu_free_so (struct so_list *so)
241 if (so->so_original_name[0] != '@')
242 svr4_so_ops.free_so (so);
245 /* Relocate section addresses. */
247 spu_relocate_section_addresses (struct so_list *so,
248 struct target_section *sec)
250 if (so->so_original_name[0] != '@')
251 svr4_so_ops.relocate_section_addresses (so, sec);
254 unsigned long long addr;
257 /* Set addr_low/high to just LS offset for display. */
258 if (so->addr_low == 0 && so->addr_high == 0
259 && strcmp (sec->the_bfd_section->name, ".text") == 0)
261 so->addr_low = sec->addr;
262 so->addr_high = sec->endaddr;
265 /* Decode object ID. */
266 if (sscanf (so->so_original_name, "@0x%llx <%d>", &addr, &fd) != 2)
267 internal_error (__FILE__, __LINE__, "bad object ID");
269 sec->addr = SPUADDR (fd, sec->addr);
270 sec->endaddr = SPUADDR (fd, sec->endaddr);
275 /* Inferior memory should contain an SPE executable image at location ADDR.
276 Allocate a BFD representing that executable. Return NULL on error. */
279 spu_bfd_iovec_open (bfd *nbfd, void *open_closure)
285 spu_bfd_iovec_close (bfd *nbfd, void *stream)
292 spu_bfd_iovec_pread (bfd *abfd, void *stream, void *buf,
293 file_ptr nbytes, file_ptr offset)
295 CORE_ADDR addr = *(CORE_ADDR *)stream;
298 ret = target_read_memory (addr + offset, buf, nbytes);
301 bfd_set_error (bfd_error_invalid_operation);
309 spu_bfd_iovec_stat (bfd *abfd, void *stream, struct stat *sb)
311 /* We don't have an easy way of finding the size of embedded spu
312 images. We could parse the in-memory ELF header and section
313 table to find the extent of the last section but that seems
314 pointless when the size is needed only for checks of other
315 parsed values in dbxread.c. */
316 sb->st_size = INT_MAX;
321 spu_bfd_fopen (char *name, CORE_ADDR addr)
325 CORE_ADDR *open_closure = xmalloc (sizeof (CORE_ADDR));
326 *open_closure = addr;
328 nbfd = bfd_openr_iovec (xstrdup (name), "elf32-spu",
329 spu_bfd_iovec_open, open_closure,
330 spu_bfd_iovec_pread, spu_bfd_iovec_close,
335 if (!bfd_check_format (nbfd, bfd_object))
344 /* Open shared library BFD. */
346 spu_bfd_open (char *pathname)
348 char *original_name = strrchr (pathname, '@');
351 unsigned long long addr;
354 /* Handle regular SVR4 libraries. */
356 return svr4_so_ops.bfd_open (pathname);
358 /* Decode object ID. */
359 if (sscanf (original_name, "@0x%llx <%d>", &addr, &fd) != 2)
360 internal_error (__FILE__, __LINE__, "bad object ID");
362 /* Open BFD representing SPE executable. */
363 abfd = spu_bfd_fopen (original_name, (CORE_ADDR) addr);
365 error (_("Cannot read SPE executable at %s"), original_name);
367 /* Retrieve SPU name note. */
368 spu_name = bfd_get_section_by_name (abfd, ".note.spu_name");
371 int sect_size = bfd_section_size (abfd, spu_name);
375 char *buf = alloca (sect_size - 20 + strlen (original_name) + 1);
377 bfd_get_section_contents (abfd, spu_name, buf, 20, sect_size - 20);
378 buf[sect_size - 20] = '\0';
380 strcat (buf, original_name);
382 xfree ((char *)abfd->filename);
383 abfd->filename = xstrdup (buf);
390 /* Lookup global symbol in a SPE executable. */
391 static struct symbol *
392 spu_lookup_lib_symbol (const struct objfile *objfile,
394 const domain_enum domain)
396 if (bfd_get_arch (objfile->obfd) == bfd_arch_spu)
397 return lookup_global_symbol_from_objfile (objfile, name, domain);
399 if (svr4_so_ops.lookup_lib_global_symbol != NULL)
400 return svr4_so_ops.lookup_lib_global_symbol (objfile, name, domain);
404 /* Enable shared library breakpoint. */
406 spu_enable_break (struct objfile *objfile)
408 struct minimal_symbol *spe_event_sym = NULL;
410 /* The libspe library will call __spe_context_update_event whenever any
411 SPE context is allocated or destroyed. */
412 spe_event_sym = lookup_minimal_symbol ("__spe_context_update_event",
415 /* Place a solib_event breakpoint on the symbol. */
418 CORE_ADDR addr = SYMBOL_VALUE_ADDRESS (spe_event_sym);
420 addr = gdbarch_convert_from_func_ptr_addr (target_gdbarch, addr,
422 create_solib_event_breakpoint (target_gdbarch, addr);
429 /* Enable shared library breakpoint for the
430 OpenCL runtime running on the SPU. */
432 ocl_enable_break (struct objfile *objfile)
434 struct minimal_symbol *event_sym = NULL;
435 struct minimal_symbol *addr_sym = NULL;
437 /* The OpenCL runtime on the SPU will call __opencl_program_update_event
438 whenever an OpenCL program is loaded. */
439 event_sym = lookup_minimal_symbol ("__opencl_program_update_event", NULL,
441 /* The PPU address of the OpenCL program can be found
442 at opencl_elf_image_address. */
443 addr_sym = lookup_minimal_symbol ("opencl_elf_image_address", NULL, objfile);
445 if (event_sym && addr_sym)
447 /* Place a solib_event breakpoint on the symbol. */
448 CORE_ADDR event_addr = SYMBOL_VALUE_ADDRESS (event_sym);
449 create_solib_event_breakpoint (get_objfile_arch (objfile), event_addr);
451 /* Store the address of the symbol that will point to OpenCL program
452 using the per-objfile private data mechanism. */
453 if (objfile_data (objfile, ocl_program_data_key) == NULL)
455 CORE_ADDR *ocl_program_addr_base = OBSTACK_CALLOC (
456 &objfile->objfile_obstack,
457 objfile->sections_end - objfile->sections,
459 *ocl_program_addr_base = SYMBOL_VALUE_ADDRESS (addr_sym);
460 set_objfile_data (objfile, ocl_program_data_key,
461 ocl_program_addr_base);
466 /* Create inferior hook. */
468 spu_solib_create_inferior_hook (int from_tty)
470 /* Handle SPE stand-alone executables. */
471 if (spu_standalone_p ())
473 /* After an SPE stand-alone executable was loaded, we'll receive
474 an additional trap due to the binfmt_misc handler. Make sure
475 to skip that trap. */
476 spu_skip_standalone_loader ();
478 /* If the user established breakpoints before starting the inferior, GDB
479 would attempt to insert those now. This would fail because the SPU
480 context has not yet been created and the SPU executable has not yet
481 been loaded. To prevent such failures, we disable all user-created
482 breakpoints now; they will be re-enabled in spu_current_sos once the
483 main SPU context has been detected. */
484 disable_breakpoints_before_startup ();
486 /* A special case arises when re-starting an executable, because at
487 this point it still resides at the relocated address range that was
488 determined during its last execution. We need to undo the relocation
489 so that that multi-architecture target recognizes the stand-alone
490 initialization special case. */
491 spu_relocate_main_executable (-1);
494 /* Call SVR4 hook -- this will re-insert the SVR4 solib breakpoints. */
495 svr4_so_ops.solib_create_inferior_hook (from_tty);
497 /* If the inferior is statically linked against libspe, we need to install
498 our own solib breakpoint right now. Otherwise, it will be installed by
499 the solib_loaded observer below as soon as libspe is loaded. */
500 spu_enable_break (NULL);
503 /* Install SPE "shared library" handling. This is called by -tdep code
504 that wants to support SPU as a secondary architecture. */
506 set_spu_solib_ops (struct gdbarch *gdbarch)
508 static struct target_so_ops spu_so_ops;
510 /* Initialize this lazily, to avoid an initialization order
511 dependency on solib-svr4.c's _initialize routine. */
512 if (spu_so_ops.current_sos == NULL)
514 spu_so_ops = svr4_so_ops;
515 spu_so_ops.solib_create_inferior_hook = spu_solib_create_inferior_hook;
516 spu_so_ops.relocate_section_addresses = spu_relocate_section_addresses;
517 spu_so_ops.free_so = spu_free_so;
518 spu_so_ops.current_sos = spu_current_sos;
519 spu_so_ops.bfd_open = spu_bfd_open;
520 spu_so_ops.lookup_lib_global_symbol = spu_lookup_lib_symbol;
523 set_solib_ops (gdbarch, &spu_so_ops);
526 /* Observer for the solib_loaded event. Used to install our breakpoint
527 if libspe is a shared library. */
529 spu_solib_loaded (struct so_list *so)
531 if (strstr (so->so_original_name, "/libspe") != NULL)
533 solib_read_symbols (so, 0);
534 spu_enable_break (so->objfile);
536 /* In case the OpenCL runtime is loaded we install a breakpoint
537 to get notified whenever an OpenCL program gets loaded. */
538 if (strstr (so->so_name, "CLRuntimeAccelCellSPU@") != NULL)
540 solib_read_symbols (so, 0);
541 ocl_enable_break (so->objfile);
545 /* -Wmissing-prototypes */
546 extern initialize_file_ftype _initialize_spu_solib;
549 _initialize_spu_solib (void)
551 observer_attach_solib_loaded (spu_solib_loaded);
552 ocl_program_data_key = register_objfile_data ();