mirror of
https://sourceware.org/git/binutils-gdb.git
synced 2024-11-28 04:25:10 +08:00
870f88f755
gdb/ChangeLog: 2016-05-07 Trevor Saunders <tbsaunde+binutils@tbsaunde.org> * aarch64-linux-tdep.c (aarch64_linux_sigframe_init): Remove unused variables. * aarch64-tdep.c (aarch64_skip_prologue): Likewise. (aarch64_scan_prologue): Likewise. (aarch64_prologue_prev_register): Likewise. (aarch64_dwarf2_prev_register): Likewise. (pass_in_v): Likewise. (aarch64_push_dummy_call): Likewise. (aarch64_breakpoint_from_pc): Likewise. (aarch64_return_in_memory): Likewise. (aarch64_return_value): Likewise. (aarch64_displaced_step_b_cond): Likewise. (aarch64_displaced_step_cb): Likewise. (aarch64_displaced_step_tb): Likewise. (aarch64_gdbarch_init): Likewise. (aarch64_process_record): Likewise. * alpha-mdebug-tdep.c (alpha_mdebug_init_abi): Likewise. * alpha-tdep.c (_initialize_alpha_tdep): Likewise. * amd64-dicos-tdep.c (amd64_dicos_init_abi): Likewise. * amd64-linux-tdep.c (amd64_dtrace_parse_probe_argument): Likewise. * amd64-tdep.c (fixup_riprel): Likewise. * amd64-windows-tdep.c (amd64_windows_frame_decode_epilogue): Likewise. (amd64_windows_frame_decode_insns): Likewise. (amd64_windows_frame_cache): Likewise. (amd64_windows_frame_prev_register): Likewise. (amd64_windows_frame_this_id): Likewise. (amd64_windows_init_abi): Likewise. * arm-linux-tdep.c (arm_linux_get_syscall_number): Likewise. (arm_linux_get_next_pcs_syscall_next_pc): Likewise. * arm-symbian-tdep.c (arm_symbian_init_abi): Likewise. * arm-tdep.c (arm_make_epilogue_frame_cache): Likewise. (arm_epilogue_frame_prev_register): Likewise. (arm_record_vdata_transfer_insn): Likewise. (arm_record_exreg_ld_st_insn): Likewise. * auto-load.c (execute_script_contents): Likewise. (print_scripts): Likewise. * avr-tdep.c (avr_frame_prev_register): Likewise. (avr_push_dummy_call): Likewise. * bfin-linux-tdep.c (bfin_linux_sigframe_init): Likewise. * bfin-tdep.c (bfin_gdbarch_init): Likewise. * blockframe.c (find_pc_partial_function_gnu_ifunc): Likewise. * break-catch-throw.c (fetch_probe_arguments): Likewise. * breakpoint.c (breakpoint_xfer_memory): Likewise. (breakpoint_init_inferior): Likewise. (breakpoint_inserted_here_p): Likewise. (software_breakpoint_inserted_here_p): Likewise. (hardware_breakpoint_inserted_here_p): Likewise. (bpstat_what): Likewise. (break_range_command): Likewise. (save_breakpoints): Likewise. * coffread.c (coff_symfile_read): Likewise. * cris-tdep.c (cris_push_dummy_call): Likewise. (cris_scan_prologue): Likewise. (cris_register_size): Likewise. (_initialize_cris_tdep): Likewise. * d-exp.y: Likewise. * dbxread.c (dbx_read_symtab): Likewise. (process_one_symbol): Likewise. (coffstab_build_psymtabs): Likewise. (elfstab_build_psymtabs): Likewise. * dicos-tdep.c (dicos_init_abi): Likewise. * disasm.c (do_mixed_source_and_assembly): Likewise. (gdb_disassembly): Likewise. * dtrace-probe.c (dtrace_process_dof): Likewise. * dwarf2read.c (error_check_comp_unit_head): Likewise. (build_type_psymtabs_1): Likewise. (skip_one_die): Likewise. (process_imported_unit_die): Likewise. (dwarf2_physname): Likewise. (read_file_scope): Likewise. (setup_type_unit_groups): Likewise. (create_dwo_cu_reader): Likewise. (create_dwo_cu): Likewise. (create_dwo_unit_in_dwp_v1): Likewise. (create_dwo_unit_in_dwp_v2): Likewise. (lookup_dwo_unit_in_dwp): Likewise. (free_dwo_file): Likewise. (check_producer): Likewise. (dwarf2_add_typedef): Likewise. (dwarf2_add_member_fn): Likewise. (read_unsigned_leb128): Likewise. (read_signed_leb128): Likewise. (dwarf2_const_value): Likewise. (follow_die_sig_1): Likewise. (dwarf_decode_macro_bytes): Likewise. * extension.c (restore_active_ext_lang): Likewise. * frv-linux-tdep.c (frv_linux_sigtramp_frame_cache): Likewise. * ft32-tdep.c (ft32_analyze_prologue): Likewise. * gdbtypes.c (lookup_typename): Likewise. (resolve_dynamic_range): Likewise. (check_typedef): Likewise. * h8300-tdep.c (h8300_is_argument_spill): Likewise. (h8300_gdbarch_init): Likewise. * hppa-tdep.c (hppa32_push_dummy_call): Likewise. (hppa_frame_this_id): Likewise. (_initialize_hppa_tdep): Likewise. * hppanbsd-tdep.c (hppanbsd_sigtramp_cache_init): Likewise. * hppaobsd-tdep.c (hppaobsd_supply_fpregset): Likewise. * i386-dicos-tdep.c (i386_dicos_init_abi): Likewise. * i386-tdep.c (i386_bnd_type): Likewise. (i386_gdbarch_init): Likewise. (i386_mpx_bd_base): Likewise. * i386nbsd-tdep.c (i386nbsd_sigtramp_cache_init): Likewise. * i386obsd-tdep.c (i386obsd_elf_init_abi): Likewise. * ia64-tdep.c (examine_prologue): Likewise. (ia64_frame_cache): Likewise. (ia64_push_dummy_call): Likewise. * infcmd.c (finish_command_fsm_async_reply_reason): Likewise. (default_print_one_register_info): Likewise. * infrun.c (infrun_thread_ptid_changed): Likewise. (thread_still_needs_step_over): Likewise. (stop_all_threads): Likewise. (restart_threads): Likewise. (keep_going_stepped_thread): Likewise. * iq2000-tdep.c (iq2000_scan_prologue): Likewise. * language.c (language_init_primitive_type_symbols): Likewise. * linespec.c (add_sal_to_sals): Likewise. * linux-nat.c (status_callback): Likewise. (kill_unfollowed_fork_children): Likewise. (linux_nat_kill): Likewise. * linux-tdep.c (linux_fill_prpsinfo): Likewise. * linux-thread-db.c (thread_db_notice_clone): Likewise. (record_thread): Likewise. * location.c (string_to_event_location_basic): Likewise. * m32c-tdep.c (m32c_prev_register): Likewise. * m32r-linux-tdep.c (m32r_linux_init_abi): Likewise. * m32r-tdep.c (decode_prologue): Likewise. * m68klinux-tdep.c (m68k_linux_sigtramp_frame_cache): Likewise. * machoread.c (macho_symtab_read): Likewise. (macho_symfile_read): Likewise. (macho_symfile_offsets): Likewise. * maint.c (set_per_command_cmd): Likewise. * mi/mi-cmd-stack.c (mi_cmd_stack_list_locals): Likewise. (mi_cmd_stack_list_variables): Likewise. * mi/mi-main.c (mi_cmd_exec_run): Likewise. (output_register): Likewise. (mi_cmd_execute): Likewise. (mi_cmd_trace_define_variable): Likewise. (print_variable_or_computed): Likewise. * minsyms.c (prim_record_minimal_symbol_full): Likewise. * mn10300-tdep.c (mn10300_frame_prev_register): Likewise. * msp430-tdep.c (msp430_pseudo_register_write): Likewise. * mt-tdep.c (mt_registers_info): Likewise. * nios2-tdep.c (nios2_analyze_prologue): Likewise. (nios2_push_dummy_call): Likewise. (nios2_frame_unwind_cache): Likewise. (nios2_stub_frame_cache): Likewise. (nios2_stub_frame_sniffer): Likewise. (nios2_gdbarch_init): Likewise. * ppc-ravenscar-thread.c: Likewise. * ppcfbsd-tdep.c (ppcfbsd_sigtramp_frame_cache): Likewise. * python/py-evts.c (add_new_registry): Likewise. * python/py-finishbreakpoint.c (bpfinishpy_init): Likewise. (bpfinishpy_detect_out_scope_cb): Likewise. * python/py-framefilter.c (py_print_value): Likewise. * python/py-inferior.c (infpy_write_memory): Likewise. * python/py-infevents.c (create_inferior_call_event_object): Likewise. * python/py-infthread.c (thpy_get_ptid): Likewise. * python/py-linetable.c (ltpy_get_pcs_for_line): Likewise. (ltpy_get_all_source_lines): Likewise. (ltpy_is_valid): Likewise. (ltpy_iternext): Likewise. * python/py-symtab.c (symtab_and_line_to_sal_object): Likewise. * python/py-unwind.c (pyuw_object_attribute_to_pointer): Likewise. (unwind_infopy_str): Likewise. * python/py-varobj.c (py_varobj_get_iterator): Likewise. * ravenscar-thread.c (ravenscar_inferior_created): Likewise. * rs6000-aix-tdep.c (rs6000_push_dummy_call): Likewise. * rs6000-lynx178-tdep.c (rs6000_lynx178_push_dummy_call): Likewise. * rs6000-tdep.c (ppc_deal_with_atomic_sequence): Likewise. * s390-linux-tdep.c (s390_supply_tdb_regset): Likewise. (s390_frame_prev_register): Likewise. (s390_dwarf2_frame_init_reg): Likewise. (s390_record_vr): Likewise. (s390_process_record): Likewise. * score-tdep.c (score_push_dummy_call): Likewise. (score3_analyze_prologue): Likewise. * sh-tdep.c (sh_extract_return_value_nofpu): Likewise. * sh64-tdep.c (sh64_analyze_prologue): Likewise. (sh64_push_dummy_call): Likewise. (sh64_extract_return_value): Likewise. (sh64_do_fp_register): Likewise. * solib-aix.c (solib_aix_get_section_offsets): Likewise. * solib-darwin.c (darwin_read_exec_load_addr_from_dyld): Likewise. (darwin_solib_read_all_image_info_addr): Likewise. * solib-dsbt.c (enable_break): Likewise. * solib-frv.c (enable_break2): Likewise. (frv_fdpic_find_canonical_descriptor): Likewise. * solib-svr4.c (svr4_handle_solib_event): Likewise. * sparc-tdep.c (sparc_skip_stack_check): Likewise. * sparc64-linux-tdep.c (sparc64_linux_get_longjmp_target): Likewise. * sparcobsd-tdep.c (sparc32obsd_init_abi): Likewise. * spu-tdep.c (info_spu_dma_cmdlist): Likewise. * stack.c (read_frame_local): Likewise. * symfile.c (symbol_file_add_separate): Likewise. (remove_symbol_file_command): Likewise. * symmisc.c (maintenance_print_one_line_table): Likewise. * symtab.c (symbol_cache_flush): Likewise. (basic_lookup_transparent_type): Likewise. (sort_search_symbols_remove_dups): Likewise. * target.c (target_memory_map): Likewise. (target_detach): Likewise. (target_resume): Likewise. (acquire_fileio_fd): Likewise. (target_store_registers): Likewise. * thread.c (print_thread_info_1): Likewise. * tic6x-tdep.c (tic6x_analyze_prologue): Likewise. * tilegx-linux-tdep.c (tilegx_linux_sigframe_init): Likewise. * tilegx-tdep.c (tilegx_push_dummy_call): Likewise. (tilegx_analyze_prologue): Likewise. (tilegx_stack_frame_destroyed_p): Likewise. (tilegx_frame_cache): Likewise. * tracefile.c (trace_save): Likewise. * tracepoint.c (encode_actions_and_make_cleanup): Likewise. (start_tracing): Likewise. (print_one_static_tracepoint_marker): Likewise. * tui/tui.c (tui_enable): Likewise. * valops.c (value_struct_elt_bitpos): Likewise. (find_overload_match): Likewise. (find_oload_champ): Likewise. * value.c (value_contents_copy_raw): Likewise. * windows-tdep.c (windows_get_tlb_type): Likewise. * x86-linux-nat.c (x86_linux_enable_btrace): Likewise. * xcoffread.c (record_minimal_symbol): Likewise. (scan_xcoff_symtab): Likewise. * xtensa-tdep.c (execute_code): Likewise. (xtensa_gdbarch_init): Likewise. (_initialize_xtensa_tdep): Likewise.
1093 lines
32 KiB
C
1093 lines
32 KiB
C
/* Handle TIC6X (DSBT) shared libraries for GDB, the GNU Debugger.
|
|
Copyright (C) 2010-2016 Free Software Foundation, Inc.
|
|
|
|
This file is part of GDB.
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>. */
|
|
|
|
|
|
#include "defs.h"
|
|
#include "inferior.h"
|
|
#include "gdbcore.h"
|
|
#include "solib.h"
|
|
#include "solist.h"
|
|
#include "objfiles.h"
|
|
#include "symtab.h"
|
|
#include "language.h"
|
|
#include "command.h"
|
|
#include "gdbcmd.h"
|
|
#include "elf-bfd.h"
|
|
#include "gdb_bfd.h"
|
|
|
|
#define GOT_MODULE_OFFSET 4
|
|
|
|
/* Flag which indicates whether internal debug messages should be printed. */
|
|
static unsigned int solib_dsbt_debug = 0;
|
|
|
|
/* TIC6X pointers are four bytes wide. */
|
|
enum { TIC6X_PTR_SIZE = 4 };
|
|
|
|
/* Representation of loadmap and related structs for the TIC6X DSBT. */
|
|
|
|
/* External versions; the size and alignment of the fields should be
|
|
the same as those on the target. When loaded, the placement of
|
|
the bits in each field will be the same as on the target. */
|
|
typedef gdb_byte ext_Elf32_Half[2];
|
|
typedef gdb_byte ext_Elf32_Addr[4];
|
|
typedef gdb_byte ext_Elf32_Word[4];
|
|
|
|
struct ext_elf32_dsbt_loadseg
|
|
{
|
|
/* Core address to which the segment is mapped. */
|
|
ext_Elf32_Addr addr;
|
|
/* VMA recorded in the program header. */
|
|
ext_Elf32_Addr p_vaddr;
|
|
/* Size of this segment in memory. */
|
|
ext_Elf32_Word p_memsz;
|
|
};
|
|
|
|
struct ext_elf32_dsbt_loadmap {
|
|
/* Protocol version number, must be zero. */
|
|
ext_Elf32_Word version;
|
|
/* A pointer to the DSBT table; the DSBT size and the index of this
|
|
module. */
|
|
ext_Elf32_Word dsbt_table_ptr;
|
|
ext_Elf32_Word dsbt_size;
|
|
ext_Elf32_Word dsbt_index;
|
|
/* Number of segments in this map. */
|
|
ext_Elf32_Word nsegs;
|
|
/* The actual memory map. */
|
|
struct ext_elf32_dsbt_loadseg segs[1 /* nsegs, actually */];
|
|
};
|
|
|
|
/* Internal versions; the types are GDB types and the data in each
|
|
of the fields is (or will be) decoded from the external struct
|
|
for ease of consumption. */
|
|
struct int_elf32_dsbt_loadseg
|
|
{
|
|
/* Core address to which the segment is mapped. */
|
|
CORE_ADDR addr;
|
|
/* VMA recorded in the program header. */
|
|
CORE_ADDR p_vaddr;
|
|
/* Size of this segment in memory. */
|
|
long p_memsz;
|
|
};
|
|
|
|
struct int_elf32_dsbt_loadmap
|
|
{
|
|
/* Protocol version number, must be zero. */
|
|
int version;
|
|
CORE_ADDR dsbt_table_ptr;
|
|
/* A pointer to the DSBT table; the DSBT size and the index of this
|
|
module. */
|
|
int dsbt_size, dsbt_index;
|
|
/* Number of segments in this map. */
|
|
int nsegs;
|
|
/* The actual memory map. */
|
|
struct int_elf32_dsbt_loadseg segs[1 /* nsegs, actually */];
|
|
};
|
|
|
|
/* External link_map and elf32_dsbt_loadaddr struct definitions. */
|
|
|
|
typedef gdb_byte ext_ptr[4];
|
|
|
|
struct ext_elf32_dsbt_loadaddr
|
|
{
|
|
ext_ptr map; /* struct elf32_dsbt_loadmap *map; */
|
|
};
|
|
|
|
struct ext_link_map
|
|
{
|
|
struct ext_elf32_dsbt_loadaddr l_addr;
|
|
|
|
/* Absolute file name object was found in. */
|
|
ext_ptr l_name; /* char *l_name; */
|
|
|
|
/* Dynamic section of the shared object. */
|
|
ext_ptr l_ld; /* ElfW(Dyn) *l_ld; */
|
|
|
|
/* Chain of loaded objects. */
|
|
ext_ptr l_next, l_prev; /* struct link_map *l_next, *l_prev; */
|
|
};
|
|
|
|
/* Link map info to include in an allocated so_list entry */
|
|
|
|
struct lm_info
|
|
{
|
|
/* The loadmap, digested into an easier to use form. */
|
|
struct int_elf32_dsbt_loadmap *map;
|
|
};
|
|
|
|
/* Per pspace dsbt specific data. */
|
|
|
|
struct dsbt_info
|
|
{
|
|
/* The load map, got value, etc. are not available from the chain
|
|
of loaded shared objects. ``main_executable_lm_info'' provides
|
|
a way to get at this information so that it doesn't need to be
|
|
frequently recomputed. Initialized by dsbt_relocate_main_executable. */
|
|
struct lm_info *main_executable_lm_info;
|
|
|
|
/* Load maps for the main executable and the interpreter. These are obtained
|
|
from ptrace. They are the starting point for getting into the program,
|
|
and are required to find the solib list with the individual load maps for
|
|
each module. */
|
|
struct int_elf32_dsbt_loadmap *exec_loadmap;
|
|
struct int_elf32_dsbt_loadmap *interp_loadmap;
|
|
|
|
/* Cached value for lm_base, below. */
|
|
CORE_ADDR lm_base_cache;
|
|
|
|
/* Link map address for main module. */
|
|
CORE_ADDR main_lm_addr;
|
|
|
|
CORE_ADDR interp_text_sect_low;
|
|
CORE_ADDR interp_text_sect_high;
|
|
CORE_ADDR interp_plt_sect_low;
|
|
CORE_ADDR interp_plt_sect_high;
|
|
};
|
|
|
|
/* Per-program-space data key. */
|
|
static const struct program_space_data *solib_dsbt_pspace_data;
|
|
|
|
static void
|
|
dsbt_pspace_data_cleanup (struct program_space *pspace, void *arg)
|
|
{
|
|
xfree (arg);
|
|
}
|
|
|
|
/* Get the current dsbt data. If none is found yet, add it now. This
|
|
function always returns a valid object. */
|
|
|
|
static struct dsbt_info *
|
|
get_dsbt_info (void)
|
|
{
|
|
struct dsbt_info *info;
|
|
|
|
info = (struct dsbt_info *) program_space_data (current_program_space,
|
|
solib_dsbt_pspace_data);
|
|
if (info != NULL)
|
|
return info;
|
|
|
|
info = XCNEW (struct dsbt_info);
|
|
set_program_space_data (current_program_space, solib_dsbt_pspace_data, info);
|
|
|
|
info->lm_base_cache = 0;
|
|
info->main_lm_addr = 0;
|
|
|
|
return info;
|
|
}
|
|
|
|
|
|
static void
|
|
dsbt_print_loadmap (struct int_elf32_dsbt_loadmap *map)
|
|
{
|
|
int i;
|
|
|
|
if (map == NULL)
|
|
printf_filtered ("(null)\n");
|
|
else if (map->version != 0)
|
|
printf_filtered (_("Unsupported map version: %d\n"), map->version);
|
|
else
|
|
{
|
|
printf_filtered ("version %d\n", map->version);
|
|
|
|
for (i = 0; i < map->nsegs; i++)
|
|
printf_filtered ("%s:%s -> %s:%s\n",
|
|
print_core_address (target_gdbarch (),
|
|
map->segs[i].p_vaddr),
|
|
print_core_address (target_gdbarch (),
|
|
map->segs[i].p_vaddr
|
|
+ map->segs[i].p_memsz),
|
|
print_core_address (target_gdbarch (), map->segs[i].addr),
|
|
print_core_address (target_gdbarch (), map->segs[i].addr
|
|
+ map->segs[i].p_memsz));
|
|
}
|
|
}
|
|
|
|
/* Decode int_elf32_dsbt_loadmap from BUF. */
|
|
|
|
static struct int_elf32_dsbt_loadmap *
|
|
decode_loadmap (gdb_byte *buf)
|
|
{
|
|
enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch ());
|
|
struct ext_elf32_dsbt_loadmap *ext_ldmbuf;
|
|
struct int_elf32_dsbt_loadmap *int_ldmbuf;
|
|
|
|
int version, seg, nsegs;
|
|
int int_ldmbuf_size;
|
|
|
|
ext_ldmbuf = (struct ext_elf32_dsbt_loadmap *) buf;
|
|
|
|
/* Extract the version. */
|
|
version = extract_unsigned_integer (ext_ldmbuf->version,
|
|
sizeof ext_ldmbuf->version,
|
|
byte_order);
|
|
if (version != 0)
|
|
{
|
|
/* We only handle version 0. */
|
|
return NULL;
|
|
}
|
|
|
|
/* Extract the number of segments. */
|
|
nsegs = extract_unsigned_integer (ext_ldmbuf->nsegs,
|
|
sizeof ext_ldmbuf->nsegs,
|
|
byte_order);
|
|
|
|
if (nsegs <= 0)
|
|
return NULL;
|
|
|
|
/* Allocate space into which to put information extract from the
|
|
external loadsegs. I.e, allocate the internal loadsegs. */
|
|
int_ldmbuf_size = (sizeof (struct int_elf32_dsbt_loadmap)
|
|
+ (nsegs - 1) * sizeof (struct int_elf32_dsbt_loadseg));
|
|
int_ldmbuf = (struct int_elf32_dsbt_loadmap *) xmalloc (int_ldmbuf_size);
|
|
|
|
/* Place extracted information in internal structs. */
|
|
int_ldmbuf->version = version;
|
|
int_ldmbuf->nsegs = nsegs;
|
|
for (seg = 0; seg < nsegs; seg++)
|
|
{
|
|
int_ldmbuf->segs[seg].addr
|
|
= extract_unsigned_integer (ext_ldmbuf->segs[seg].addr,
|
|
sizeof (ext_ldmbuf->segs[seg].addr),
|
|
byte_order);
|
|
int_ldmbuf->segs[seg].p_vaddr
|
|
= extract_unsigned_integer (ext_ldmbuf->segs[seg].p_vaddr,
|
|
sizeof (ext_ldmbuf->segs[seg].p_vaddr),
|
|
byte_order);
|
|
int_ldmbuf->segs[seg].p_memsz
|
|
= extract_unsigned_integer (ext_ldmbuf->segs[seg].p_memsz,
|
|
sizeof (ext_ldmbuf->segs[seg].p_memsz),
|
|
byte_order);
|
|
}
|
|
|
|
xfree (ext_ldmbuf);
|
|
return int_ldmbuf;
|
|
}
|
|
|
|
|
|
static struct dsbt_info *get_dsbt_info (void);
|
|
|
|
/* Interrogate the Linux kernel to find out where the program was loaded.
|
|
There are two load maps; one for the executable and one for the
|
|
interpreter (only in the case of a dynamically linked executable). */
|
|
|
|
static void
|
|
dsbt_get_initial_loadmaps (void)
|
|
{
|
|
gdb_byte *buf;
|
|
struct dsbt_info *info = get_dsbt_info ();
|
|
|
|
if (0 >= target_read_alloc (¤t_target, TARGET_OBJECT_FDPIC,
|
|
"exec", &buf))
|
|
{
|
|
info->exec_loadmap = NULL;
|
|
error (_("Error reading DSBT exec loadmap"));
|
|
}
|
|
info->exec_loadmap = decode_loadmap (buf);
|
|
if (solib_dsbt_debug)
|
|
dsbt_print_loadmap (info->exec_loadmap);
|
|
|
|
if (0 >= target_read_alloc (¤t_target, TARGET_OBJECT_FDPIC,
|
|
"interp", &buf))
|
|
{
|
|
info->interp_loadmap = NULL;
|
|
error (_("Error reading DSBT interp loadmap"));
|
|
}
|
|
info->interp_loadmap = decode_loadmap (buf);
|
|
if (solib_dsbt_debug)
|
|
dsbt_print_loadmap (info->interp_loadmap);
|
|
}
|
|
|
|
/* Given address LDMADDR, fetch and decode the loadmap at that address.
|
|
Return NULL if there is a problem reading the target memory or if
|
|
there doesn't appear to be a loadmap at the given address. The
|
|
allocated space (representing the loadmap) returned by this
|
|
function may be freed via a single call to xfree. */
|
|
|
|
static struct int_elf32_dsbt_loadmap *
|
|
fetch_loadmap (CORE_ADDR ldmaddr)
|
|
{
|
|
enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch ());
|
|
struct ext_elf32_dsbt_loadmap ext_ldmbuf_partial;
|
|
struct ext_elf32_dsbt_loadmap *ext_ldmbuf;
|
|
struct int_elf32_dsbt_loadmap *int_ldmbuf;
|
|
int ext_ldmbuf_size, int_ldmbuf_size;
|
|
int version, seg, nsegs;
|
|
|
|
/* Fetch initial portion of the loadmap. */
|
|
if (target_read_memory (ldmaddr, (gdb_byte *) &ext_ldmbuf_partial,
|
|
sizeof ext_ldmbuf_partial))
|
|
{
|
|
/* Problem reading the target's memory. */
|
|
return NULL;
|
|
}
|
|
|
|
/* Extract the version. */
|
|
version = extract_unsigned_integer (ext_ldmbuf_partial.version,
|
|
sizeof ext_ldmbuf_partial.version,
|
|
byte_order);
|
|
if (version != 0)
|
|
{
|
|
/* We only handle version 0. */
|
|
return NULL;
|
|
}
|
|
|
|
/* Extract the number of segments. */
|
|
nsegs = extract_unsigned_integer (ext_ldmbuf_partial.nsegs,
|
|
sizeof ext_ldmbuf_partial.nsegs,
|
|
byte_order);
|
|
|
|
if (nsegs <= 0)
|
|
return NULL;
|
|
|
|
/* Allocate space for the complete (external) loadmap. */
|
|
ext_ldmbuf_size = sizeof (struct ext_elf32_dsbt_loadmap)
|
|
+ (nsegs - 1) * sizeof (struct ext_elf32_dsbt_loadseg);
|
|
ext_ldmbuf = (struct ext_elf32_dsbt_loadmap *) xmalloc (ext_ldmbuf_size);
|
|
|
|
/* Copy over the portion of the loadmap that's already been read. */
|
|
memcpy (ext_ldmbuf, &ext_ldmbuf_partial, sizeof ext_ldmbuf_partial);
|
|
|
|
/* Read the rest of the loadmap from the target. */
|
|
if (target_read_memory (ldmaddr + sizeof ext_ldmbuf_partial,
|
|
(gdb_byte *) ext_ldmbuf + sizeof ext_ldmbuf_partial,
|
|
ext_ldmbuf_size - sizeof ext_ldmbuf_partial))
|
|
{
|
|
/* Couldn't read rest of the loadmap. */
|
|
xfree (ext_ldmbuf);
|
|
return NULL;
|
|
}
|
|
|
|
/* Allocate space into which to put information extract from the
|
|
external loadsegs. I.e, allocate the internal loadsegs. */
|
|
int_ldmbuf_size = sizeof (struct int_elf32_dsbt_loadmap)
|
|
+ (nsegs - 1) * sizeof (struct int_elf32_dsbt_loadseg);
|
|
int_ldmbuf = (struct int_elf32_dsbt_loadmap *) xmalloc (int_ldmbuf_size);
|
|
|
|
/* Place extracted information in internal structs. */
|
|
int_ldmbuf->version = version;
|
|
int_ldmbuf->nsegs = nsegs;
|
|
for (seg = 0; seg < nsegs; seg++)
|
|
{
|
|
int_ldmbuf->segs[seg].addr
|
|
= extract_unsigned_integer (ext_ldmbuf->segs[seg].addr,
|
|
sizeof (ext_ldmbuf->segs[seg].addr),
|
|
byte_order);
|
|
int_ldmbuf->segs[seg].p_vaddr
|
|
= extract_unsigned_integer (ext_ldmbuf->segs[seg].p_vaddr,
|
|
sizeof (ext_ldmbuf->segs[seg].p_vaddr),
|
|
byte_order);
|
|
int_ldmbuf->segs[seg].p_memsz
|
|
= extract_unsigned_integer (ext_ldmbuf->segs[seg].p_memsz,
|
|
sizeof (ext_ldmbuf->segs[seg].p_memsz),
|
|
byte_order);
|
|
}
|
|
|
|
xfree (ext_ldmbuf);
|
|
return int_ldmbuf;
|
|
}
|
|
|
|
static void dsbt_relocate_main_executable (void);
|
|
static int enable_break (void);
|
|
|
|
/* Scan for DYNTAG in .dynamic section of ABFD. If DYNTAG is found 1 is
|
|
returned and the corresponding PTR is set. */
|
|
|
|
static int
|
|
scan_dyntag (int dyntag, bfd *abfd, CORE_ADDR *ptr)
|
|
{
|
|
int arch_size, step, sect_size;
|
|
long dyn_tag;
|
|
CORE_ADDR dyn_ptr, dyn_addr;
|
|
gdb_byte *bufend, *bufstart, *buf;
|
|
Elf32_External_Dyn *x_dynp_32;
|
|
Elf64_External_Dyn *x_dynp_64;
|
|
struct bfd_section *sect;
|
|
struct target_section *target_section;
|
|
|
|
if (abfd == NULL)
|
|
return 0;
|
|
|
|
if (bfd_get_flavour (abfd) != bfd_target_elf_flavour)
|
|
return 0;
|
|
|
|
arch_size = bfd_get_arch_size (abfd);
|
|
if (arch_size == -1)
|
|
return 0;
|
|
|
|
/* Find the start address of the .dynamic section. */
|
|
sect = bfd_get_section_by_name (abfd, ".dynamic");
|
|
if (sect == NULL)
|
|
return 0;
|
|
|
|
for (target_section = current_target_sections->sections;
|
|
target_section < current_target_sections->sections_end;
|
|
target_section++)
|
|
if (sect == target_section->the_bfd_section)
|
|
break;
|
|
if (target_section < current_target_sections->sections_end)
|
|
dyn_addr = target_section->addr;
|
|
else
|
|
{
|
|
/* ABFD may come from OBJFILE acting only as a symbol file without being
|
|
loaded into the target (see add_symbol_file_command). This case is
|
|
such fallback to the file VMA address without the possibility of
|
|
having the section relocated to its actual in-memory address. */
|
|
|
|
dyn_addr = bfd_section_vma (abfd, sect);
|
|
}
|
|
|
|
/* Read in .dynamic from the BFD. We will get the actual value
|
|
from memory later. */
|
|
sect_size = bfd_section_size (abfd, sect);
|
|
buf = bufstart = (gdb_byte *) alloca (sect_size);
|
|
if (!bfd_get_section_contents (abfd, sect,
|
|
buf, 0, sect_size))
|
|
return 0;
|
|
|
|
/* Iterate over BUF and scan for DYNTAG. If found, set PTR and return. */
|
|
step = (arch_size == 32) ? sizeof (Elf32_External_Dyn)
|
|
: sizeof (Elf64_External_Dyn);
|
|
for (bufend = buf + sect_size;
|
|
buf < bufend;
|
|
buf += step)
|
|
{
|
|
if (arch_size == 32)
|
|
{
|
|
x_dynp_32 = (Elf32_External_Dyn *) buf;
|
|
dyn_tag = bfd_h_get_32 (abfd, (bfd_byte *) x_dynp_32->d_tag);
|
|
dyn_ptr = bfd_h_get_32 (abfd, (bfd_byte *) x_dynp_32->d_un.d_ptr);
|
|
}
|
|
else
|
|
{
|
|
x_dynp_64 = (Elf64_External_Dyn *) buf;
|
|
dyn_tag = bfd_h_get_64 (abfd, (bfd_byte *) x_dynp_64->d_tag);
|
|
dyn_ptr = bfd_h_get_64 (abfd, (bfd_byte *) x_dynp_64->d_un.d_ptr);
|
|
}
|
|
if (dyn_tag == DT_NULL)
|
|
return 0;
|
|
if (dyn_tag == dyntag)
|
|
{
|
|
/* If requested, try to read the runtime value of this .dynamic
|
|
entry. */
|
|
if (ptr)
|
|
{
|
|
struct type *ptr_type;
|
|
gdb_byte ptr_buf[8];
|
|
CORE_ADDR ptr_addr;
|
|
|
|
ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
|
|
ptr_addr = dyn_addr + (buf - bufstart) + arch_size / 8;
|
|
if (target_read_memory (ptr_addr, ptr_buf, arch_size / 8) == 0)
|
|
dyn_ptr = extract_typed_address (ptr_buf, ptr_type);
|
|
*ptr = dyn_ptr;
|
|
}
|
|
return 1;
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* If no open symbol file, attempt to locate and open the main symbol
|
|
file.
|
|
|
|
If FROM_TTYP dereferences to a non-zero integer, allow messages to
|
|
be printed. This parameter is a pointer rather than an int because
|
|
open_symbol_file_object is called via catch_errors and
|
|
catch_errors requires a pointer argument. */
|
|
|
|
static int
|
|
open_symbol_file_object (void *from_ttyp)
|
|
{
|
|
/* Unimplemented. */
|
|
return 0;
|
|
}
|
|
|
|
/* Given a loadmap and an address, return the displacement needed
|
|
to relocate the address. */
|
|
|
|
static CORE_ADDR
|
|
displacement_from_map (struct int_elf32_dsbt_loadmap *map,
|
|
CORE_ADDR addr)
|
|
{
|
|
int seg;
|
|
|
|
for (seg = 0; seg < map->nsegs; seg++)
|
|
if (map->segs[seg].p_vaddr <= addr
|
|
&& addr < map->segs[seg].p_vaddr + map->segs[seg].p_memsz)
|
|
return map->segs[seg].addr - map->segs[seg].p_vaddr;
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* Return the address from which the link map chain may be found. On
|
|
DSBT, a pointer to the start of the link map will be located at the
|
|
word found at base of GOT + GOT_MODULE_OFFSET.
|
|
|
|
The base of GOT may be found in a number of ways. Assuming that the
|
|
main executable has already been relocated,
|
|
1 The easiest way to find this value is to look up the address of
|
|
_GLOBAL_OFFSET_TABLE_.
|
|
2 The other way is to look for tag DT_PLTGOT, which contains the virtual
|
|
address of Global Offset Table. .*/
|
|
|
|
static CORE_ADDR
|
|
lm_base (void)
|
|
{
|
|
enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch ());
|
|
struct bound_minimal_symbol got_sym;
|
|
CORE_ADDR addr;
|
|
gdb_byte buf[TIC6X_PTR_SIZE];
|
|
struct dsbt_info *info = get_dsbt_info ();
|
|
|
|
/* One of our assumptions is that the main executable has been relocated.
|
|
Bail out if this has not happened. (Note that post_create_inferior
|
|
in infcmd.c will call solib_add prior to solib_create_inferior_hook.
|
|
If we allow this to happen, lm_base_cache will be initialized with
|
|
a bogus value. */
|
|
if (info->main_executable_lm_info == 0)
|
|
return 0;
|
|
|
|
/* If we already have a cached value, return it. */
|
|
if (info->lm_base_cache)
|
|
return info->lm_base_cache;
|
|
|
|
got_sym = lookup_minimal_symbol ("_GLOBAL_OFFSET_TABLE_", NULL,
|
|
symfile_objfile);
|
|
|
|
if (got_sym.minsym != 0)
|
|
{
|
|
addr = BMSYMBOL_VALUE_ADDRESS (got_sym);
|
|
if (solib_dsbt_debug)
|
|
fprintf_unfiltered (gdb_stdlog,
|
|
"lm_base: get addr %x by _GLOBAL_OFFSET_TABLE_.\n",
|
|
(unsigned int) addr);
|
|
}
|
|
else if (scan_dyntag (DT_PLTGOT, exec_bfd, &addr))
|
|
{
|
|
struct int_elf32_dsbt_loadmap *ldm;
|
|
|
|
dsbt_get_initial_loadmaps ();
|
|
ldm = info->exec_loadmap;
|
|
addr += displacement_from_map (ldm, addr);
|
|
if (solib_dsbt_debug)
|
|
fprintf_unfiltered (gdb_stdlog,
|
|
"lm_base: get addr %x by DT_PLTGOT.\n",
|
|
(unsigned int) addr);
|
|
}
|
|
else
|
|
{
|
|
if (solib_dsbt_debug)
|
|
fprintf_unfiltered (gdb_stdlog,
|
|
"lm_base: _GLOBAL_OFFSET_TABLE_ not found.\n");
|
|
return 0;
|
|
}
|
|
addr += GOT_MODULE_OFFSET;
|
|
|
|
if (solib_dsbt_debug)
|
|
fprintf_unfiltered (gdb_stdlog,
|
|
"lm_base: _GLOBAL_OFFSET_TABLE_ + %d = %s\n",
|
|
GOT_MODULE_OFFSET, hex_string_custom (addr, 8));
|
|
|
|
if (target_read_memory (addr, buf, sizeof buf) != 0)
|
|
return 0;
|
|
info->lm_base_cache = extract_unsigned_integer (buf, sizeof buf, byte_order);
|
|
|
|
if (solib_dsbt_debug)
|
|
fprintf_unfiltered (gdb_stdlog,
|
|
"lm_base: lm_base_cache = %s\n",
|
|
hex_string_custom (info->lm_base_cache, 8));
|
|
|
|
return info->lm_base_cache;
|
|
}
|
|
|
|
|
|
/* Build a list of `struct so_list' objects describing the shared
|
|
objects currently loaded in the inferior. This list does not
|
|
include an entry for the main executable file.
|
|
|
|
Note that we only gather information directly available from the
|
|
inferior --- we don't examine any of the shared library files
|
|
themselves. The declaration of `struct so_list' says which fields
|
|
we provide values for. */
|
|
|
|
static struct so_list *
|
|
dsbt_current_sos (void)
|
|
{
|
|
enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch ());
|
|
CORE_ADDR lm_addr;
|
|
struct so_list *sos_head = NULL;
|
|
struct so_list **sos_next_ptr = &sos_head;
|
|
struct dsbt_info *info = get_dsbt_info ();
|
|
|
|
/* Make sure that the main executable has been relocated. This is
|
|
required in order to find the address of the global offset table,
|
|
which in turn is used to find the link map info. (See lm_base
|
|
for details.)
|
|
|
|
Note that the relocation of the main executable is also performed
|
|
by solib_create_inferior_hook, however, in the case of core
|
|
files, this hook is called too late in order to be of benefit to
|
|
solib_add. solib_add eventually calls this function,
|
|
dsbt_current_sos, and also precedes the call to
|
|
solib_create_inferior_hook. (See post_create_inferior in
|
|
infcmd.c.) */
|
|
if (info->main_executable_lm_info == 0 && core_bfd != NULL)
|
|
dsbt_relocate_main_executable ();
|
|
|
|
/* Locate the address of the first link map struct. */
|
|
lm_addr = lm_base ();
|
|
|
|
/* We have at least one link map entry. Fetch the the lot of them,
|
|
building the solist chain. */
|
|
while (lm_addr)
|
|
{
|
|
struct ext_link_map lm_buf;
|
|
ext_Elf32_Word indexword;
|
|
CORE_ADDR map_addr;
|
|
int dsbt_index;
|
|
int ret;
|
|
|
|
if (solib_dsbt_debug)
|
|
fprintf_unfiltered (gdb_stdlog,
|
|
"current_sos: reading link_map entry at %s\n",
|
|
hex_string_custom (lm_addr, 8));
|
|
|
|
ret = target_read_memory (lm_addr, (gdb_byte *) &lm_buf, sizeof (lm_buf));
|
|
if (ret)
|
|
{
|
|
warning (_("dsbt_current_sos: Unable to read link map entry."
|
|
" Shared object chain may be incomplete."));
|
|
break;
|
|
}
|
|
|
|
/* Fetch the load map address. */
|
|
map_addr = extract_unsigned_integer (lm_buf.l_addr.map,
|
|
sizeof lm_buf.l_addr.map,
|
|
byte_order);
|
|
|
|
ret = target_read_memory (map_addr + 12, (gdb_byte *) &indexword,
|
|
sizeof indexword);
|
|
if (ret)
|
|
{
|
|
warning (_("dsbt_current_sos: Unable to read dsbt index."
|
|
" Shared object chain may be incomplete."));
|
|
break;
|
|
}
|
|
dsbt_index = extract_unsigned_integer (indexword, sizeof indexword,
|
|
byte_order);
|
|
|
|
/* If the DSBT index is zero, then we're looking at the entry
|
|
for the main executable. By convention, we don't include
|
|
this in the list of shared objects. */
|
|
if (dsbt_index != 0)
|
|
{
|
|
int errcode;
|
|
char *name_buf;
|
|
struct int_elf32_dsbt_loadmap *loadmap;
|
|
struct so_list *sop;
|
|
CORE_ADDR addr;
|
|
|
|
loadmap = fetch_loadmap (map_addr);
|
|
if (loadmap == NULL)
|
|
{
|
|
warning (_("dsbt_current_sos: Unable to fetch load map."
|
|
" Shared object chain may be incomplete."));
|
|
break;
|
|
}
|
|
|
|
sop = XCNEW (struct so_list);
|
|
sop->lm_info = XCNEW (struct lm_info);
|
|
sop->lm_info->map = loadmap;
|
|
/* Fetch the name. */
|
|
addr = extract_unsigned_integer (lm_buf.l_name,
|
|
sizeof (lm_buf.l_name),
|
|
byte_order);
|
|
target_read_string (addr, &name_buf, SO_NAME_MAX_PATH_SIZE - 1,
|
|
&errcode);
|
|
|
|
if (errcode != 0)
|
|
warning (_("Can't read pathname for link map entry: %s."),
|
|
safe_strerror (errcode));
|
|
else
|
|
{
|
|
if (solib_dsbt_debug)
|
|
fprintf_unfiltered (gdb_stdlog, "current_sos: name = %s\n",
|
|
name_buf);
|
|
|
|
strncpy (sop->so_name, name_buf, SO_NAME_MAX_PATH_SIZE - 1);
|
|
sop->so_name[SO_NAME_MAX_PATH_SIZE - 1] = '\0';
|
|
xfree (name_buf);
|
|
strcpy (sop->so_original_name, sop->so_name);
|
|
}
|
|
|
|
*sos_next_ptr = sop;
|
|
sos_next_ptr = &sop->next;
|
|
}
|
|
else
|
|
{
|
|
info->main_lm_addr = lm_addr;
|
|
}
|
|
|
|
lm_addr = extract_unsigned_integer (lm_buf.l_next,
|
|
sizeof (lm_buf.l_next), byte_order);
|
|
}
|
|
|
|
return sos_head;
|
|
}
|
|
|
|
/* Return 1 if PC lies in the dynamic symbol resolution code of the
|
|
run time loader. */
|
|
|
|
static int
|
|
dsbt_in_dynsym_resolve_code (CORE_ADDR pc)
|
|
{
|
|
struct dsbt_info *info = get_dsbt_info ();
|
|
|
|
return ((pc >= info->interp_text_sect_low && pc < info->interp_text_sect_high)
|
|
|| (pc >= info->interp_plt_sect_low && pc < info->interp_plt_sect_high)
|
|
|| in_plt_section (pc));
|
|
}
|
|
|
|
/* Print a warning about being unable to set the dynamic linker
|
|
breakpoint. */
|
|
|
|
static void
|
|
enable_break_failure_warning (void)
|
|
{
|
|
warning (_("Unable to find dynamic linker breakpoint function.\n"
|
|
"GDB will be unable to debug shared library initializers\n"
|
|
"and track explicitly loaded dynamic code."));
|
|
}
|
|
|
|
/* Helper function for gdb_bfd_lookup_symbol. */
|
|
|
|
static int
|
|
cmp_name (const asymbol *sym, const void *data)
|
|
{
|
|
return (strcmp (sym->name, (const char *) data) == 0);
|
|
}
|
|
|
|
/* The dynamic linkers has, as part of its debugger interface, support
|
|
for arranging for the inferior to hit a breakpoint after mapping in
|
|
the shared libraries. This function enables that breakpoint.
|
|
|
|
On the TIC6X, using the shared library (DSBT), GDB can try to place
|
|
a breakpoint on '_dl_debug_state' to monitor the shared library
|
|
event. */
|
|
|
|
static int
|
|
enable_break (void)
|
|
{
|
|
asection *interp_sect;
|
|
struct dsbt_info *info;
|
|
|
|
if (exec_bfd == NULL)
|
|
return 0;
|
|
|
|
if (!target_has_execution)
|
|
return 0;
|
|
|
|
info = get_dsbt_info ();
|
|
|
|
info->interp_text_sect_low = 0;
|
|
info->interp_text_sect_high = 0;
|
|
info->interp_plt_sect_low = 0;
|
|
info->interp_plt_sect_high = 0;
|
|
|
|
/* Find the .interp section; if not found, warn the user and drop
|
|
into the old breakpoint at symbol code. */
|
|
interp_sect = bfd_get_section_by_name (exec_bfd, ".interp");
|
|
if (interp_sect)
|
|
{
|
|
unsigned int interp_sect_size;
|
|
char *buf;
|
|
bfd *tmp_bfd = NULL;
|
|
CORE_ADDR addr;
|
|
struct int_elf32_dsbt_loadmap *ldm;
|
|
int ret;
|
|
|
|
/* Read the contents of the .interp section into a local buffer;
|
|
the contents specify the dynamic linker this program uses. */
|
|
interp_sect_size = bfd_section_size (exec_bfd, interp_sect);
|
|
buf = (char *) alloca (interp_sect_size);
|
|
bfd_get_section_contents (exec_bfd, interp_sect,
|
|
buf, 0, interp_sect_size);
|
|
|
|
/* Now we need to figure out where the dynamic linker was
|
|
loaded so that we can load its symbols and place a breakpoint
|
|
in the dynamic linker itself. */
|
|
|
|
TRY
|
|
{
|
|
tmp_bfd = solib_bfd_open (buf);
|
|
}
|
|
CATCH (ex, RETURN_MASK_ALL)
|
|
{
|
|
}
|
|
END_CATCH
|
|
|
|
if (tmp_bfd == NULL)
|
|
{
|
|
enable_break_failure_warning ();
|
|
return 0;
|
|
}
|
|
|
|
dsbt_get_initial_loadmaps ();
|
|
ldm = info->interp_loadmap;
|
|
|
|
/* Record the relocated start and end address of the dynamic linker
|
|
text and plt section for dsbt_in_dynsym_resolve_code. */
|
|
interp_sect = bfd_get_section_by_name (tmp_bfd, ".text");
|
|
if (interp_sect)
|
|
{
|
|
info->interp_text_sect_low
|
|
= bfd_section_vma (tmp_bfd, interp_sect);
|
|
info->interp_text_sect_low
|
|
+= displacement_from_map (ldm, info->interp_text_sect_low);
|
|
info->interp_text_sect_high
|
|
= info->interp_text_sect_low
|
|
+ bfd_section_size (tmp_bfd, interp_sect);
|
|
}
|
|
interp_sect = bfd_get_section_by_name (tmp_bfd, ".plt");
|
|
if (interp_sect)
|
|
{
|
|
info->interp_plt_sect_low =
|
|
bfd_section_vma (tmp_bfd, interp_sect);
|
|
info->interp_plt_sect_low
|
|
+= displacement_from_map (ldm, info->interp_plt_sect_low);
|
|
info->interp_plt_sect_high =
|
|
info->interp_plt_sect_low + bfd_section_size (tmp_bfd, interp_sect);
|
|
}
|
|
|
|
addr = gdb_bfd_lookup_symbol (tmp_bfd, cmp_name, "_dl_debug_state");
|
|
if (addr != 0)
|
|
{
|
|
if (solib_dsbt_debug)
|
|
fprintf_unfiltered (gdb_stdlog,
|
|
"enable_break: _dl_debug_state (prior to relocation) = %s\n",
|
|
hex_string_custom (addr, 8));
|
|
addr += displacement_from_map (ldm, addr);
|
|
|
|
if (solib_dsbt_debug)
|
|
fprintf_unfiltered (gdb_stdlog,
|
|
"enable_break: _dl_debug_state (after relocation) = %s\n",
|
|
hex_string_custom (addr, 8));
|
|
|
|
/* Now (finally!) create the solib breakpoint. */
|
|
create_solib_event_breakpoint (target_gdbarch (), addr);
|
|
|
|
ret = 1;
|
|
}
|
|
else
|
|
{
|
|
if (solib_dsbt_debug)
|
|
fprintf_unfiltered (gdb_stdlog,
|
|
"enable_break: _dl_debug_state is not found\n");
|
|
ret = 0;
|
|
}
|
|
|
|
/* We're done with the temporary bfd. */
|
|
gdb_bfd_unref (tmp_bfd);
|
|
|
|
/* We're also done with the loadmap. */
|
|
xfree (ldm);
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* Tell the user we couldn't set a dynamic linker breakpoint. */
|
|
enable_break_failure_warning ();
|
|
|
|
/* Failure return. */
|
|
return 0;
|
|
}
|
|
|
|
/* Once the symbols from a shared object have been loaded in the usual
|
|
way, we are called to do any system specific symbol handling that
|
|
is needed. */
|
|
|
|
static void
|
|
dsbt_special_symbol_handling (void)
|
|
{
|
|
}
|
|
|
|
static void
|
|
dsbt_relocate_main_executable (void)
|
|
{
|
|
struct int_elf32_dsbt_loadmap *ldm;
|
|
struct cleanup *old_chain;
|
|
struct section_offsets *new_offsets;
|
|
int changed;
|
|
struct obj_section *osect;
|
|
struct dsbt_info *info = get_dsbt_info ();
|
|
|
|
dsbt_get_initial_loadmaps ();
|
|
ldm = info->exec_loadmap;
|
|
|
|
xfree (info->main_executable_lm_info);
|
|
info->main_executable_lm_info = XCNEW (struct lm_info);
|
|
info->main_executable_lm_info->map = ldm;
|
|
|
|
new_offsets = XCNEWVEC (struct section_offsets,
|
|
symfile_objfile->num_sections);
|
|
old_chain = make_cleanup (xfree, new_offsets);
|
|
changed = 0;
|
|
|
|
ALL_OBJFILE_OSECTIONS (symfile_objfile, osect)
|
|
{
|
|
CORE_ADDR orig_addr, addr, offset;
|
|
int osect_idx;
|
|
int seg;
|
|
|
|
osect_idx = osect - symfile_objfile->sections;
|
|
|
|
/* Current address of section. */
|
|
addr = obj_section_addr (osect);
|
|
/* Offset from where this section started. */
|
|
offset = ANOFFSET (symfile_objfile->section_offsets, osect_idx);
|
|
/* Original address prior to any past relocations. */
|
|
orig_addr = addr - offset;
|
|
|
|
for (seg = 0; seg < ldm->nsegs; seg++)
|
|
{
|
|
if (ldm->segs[seg].p_vaddr <= orig_addr
|
|
&& orig_addr < ldm->segs[seg].p_vaddr + ldm->segs[seg].p_memsz)
|
|
{
|
|
new_offsets->offsets[osect_idx]
|
|
= ldm->segs[seg].addr - ldm->segs[seg].p_vaddr;
|
|
|
|
if (new_offsets->offsets[osect_idx] != offset)
|
|
changed = 1;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (changed)
|
|
objfile_relocate (symfile_objfile, new_offsets);
|
|
|
|
do_cleanups (old_chain);
|
|
|
|
/* Now that symfile_objfile has been relocated, we can compute the
|
|
GOT value and stash it away. */
|
|
}
|
|
|
|
/* When gdb starts up the inferior, it nurses it along (through the
|
|
shell) until it is ready to execute it's first instruction. At this
|
|
point, this function gets called via solib_create_inferior_hook.
|
|
|
|
For the DSBT shared library, the main executable needs to be relocated.
|
|
The shared library breakpoints also need to be enabled. */
|
|
|
|
static void
|
|
dsbt_solib_create_inferior_hook (int from_tty)
|
|
{
|
|
/* Relocate main executable. */
|
|
dsbt_relocate_main_executable ();
|
|
|
|
/* Enable shared library breakpoints. */
|
|
if (!enable_break ())
|
|
{
|
|
warning (_("shared library handler failed to enable breakpoint"));
|
|
return;
|
|
}
|
|
}
|
|
|
|
static void
|
|
dsbt_clear_solib (void)
|
|
{
|
|
struct dsbt_info *info = get_dsbt_info ();
|
|
|
|
info->lm_base_cache = 0;
|
|
info->main_lm_addr = 0;
|
|
if (info->main_executable_lm_info != 0)
|
|
{
|
|
xfree (info->main_executable_lm_info->map);
|
|
xfree (info->main_executable_lm_info);
|
|
info->main_executable_lm_info = 0;
|
|
}
|
|
}
|
|
|
|
static void
|
|
dsbt_free_so (struct so_list *so)
|
|
{
|
|
xfree (so->lm_info->map);
|
|
xfree (so->lm_info);
|
|
}
|
|
|
|
static void
|
|
dsbt_relocate_section_addresses (struct so_list *so,
|
|
struct target_section *sec)
|
|
{
|
|
int seg;
|
|
struct int_elf32_dsbt_loadmap *map;
|
|
|
|
map = so->lm_info->map;
|
|
|
|
for (seg = 0; seg < map->nsegs; seg++)
|
|
{
|
|
if (map->segs[seg].p_vaddr <= sec->addr
|
|
&& sec->addr < map->segs[seg].p_vaddr + map->segs[seg].p_memsz)
|
|
{
|
|
CORE_ADDR displ = map->segs[seg].addr - map->segs[seg].p_vaddr;
|
|
|
|
sec->addr += displ;
|
|
sec->endaddr += displ;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
static void
|
|
show_dsbt_debug (struct ui_file *file, int from_tty,
|
|
struct cmd_list_element *c, const char *value)
|
|
{
|
|
fprintf_filtered (file, _("solib-dsbt debugging is %s.\n"), value);
|
|
}
|
|
|
|
struct target_so_ops dsbt_so_ops;
|
|
|
|
/* Provide a prototype to silence -Wmissing-prototypes. */
|
|
extern initialize_file_ftype _initialize_dsbt_solib;
|
|
|
|
void
|
|
_initialize_dsbt_solib (void)
|
|
{
|
|
solib_dsbt_pspace_data
|
|
= register_program_space_data_with_cleanup (NULL, dsbt_pspace_data_cleanup);
|
|
|
|
dsbt_so_ops.relocate_section_addresses = dsbt_relocate_section_addresses;
|
|
dsbt_so_ops.free_so = dsbt_free_so;
|
|
dsbt_so_ops.clear_solib = dsbt_clear_solib;
|
|
dsbt_so_ops.solib_create_inferior_hook = dsbt_solib_create_inferior_hook;
|
|
dsbt_so_ops.special_symbol_handling = dsbt_special_symbol_handling;
|
|
dsbt_so_ops.current_sos = dsbt_current_sos;
|
|
dsbt_so_ops.open_symbol_file_object = open_symbol_file_object;
|
|
dsbt_so_ops.in_dynsym_resolve_code = dsbt_in_dynsym_resolve_code;
|
|
dsbt_so_ops.bfd_open = solib_bfd_open;
|
|
|
|
/* Debug this file's internals. */
|
|
add_setshow_zuinteger_cmd ("solib-dsbt", class_maintenance,
|
|
&solib_dsbt_debug, _("\
|
|
Set internal debugging of shared library code for DSBT ELF."), _("\
|
|
Show internal debugging of shared library code for DSBT ELF."), _("\
|
|
When non-zero, DSBT solib specific internal debugging is enabled."),
|
|
NULL,
|
|
show_dsbt_debug,
|
|
&setdebuglist, &showdebuglist);
|
|
}
|