OpenCores
URL https://opencores.org/ocsvn/or1k/or1k/trunk

Subversion Repositories or1k

[/] [or1k/] [trunk/] [gdb-5.3/] [gdb/] [pa64solib.c] - Blame information for rev 1765

Details | Compare with Previous | View Log

Line No. Rev Author Line
1 1181 sfurman
/* Handle HP ELF shared libraries for GDB, the GNU Debugger.
2
 
3
   Copyright 1999, 2000, 2001, 2002 Free Software Foundation, Inc.
4
 
5
   This file is part of GDB.
6
 
7
   This program is free software; you can redistribute it and/or modify
8
   it under the terms of the GNU General Public License as published by
9
   the Free Software Foundation; either version 2 of the License, or
10
   (at your option) any later version.
11
 
12
   This program is distributed in the hope that it will be useful,
13
   but WITHOUT ANY WARRANTY; without even the implied warranty of
14
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15
   GNU General Public License for more details.
16
 
17
   You should have received a copy of the GNU General Public License
18
   along with this program; if not, write to the Free Software
19
   Foundation, Inc., 59 Temple Place - Suite 330,
20
   Boston, MA 02111-1307, USA.
21
 
22
   HP in their infinite stupidity choose not to use standard ELF dynamic
23
   linker interfaces.  They also choose not to make their ELF dymamic
24
   linker interfaces compatible with the SOM dynamic linker.  The
25
   net result is we can not use either of the existing somsolib.c or
26
   solib.c.  What a crock.
27
 
28
   Even more disgusting.  This file depends on functions provided only
29
   in certain PA64 libraries.  Thus this file is supposed to only be
30
   used native.  When will HP ever learn that they need to provide the
31
   same functionality in all their libraries!  */
32
 
33
#include <dlfcn.h>
34
#include <elf.h>
35
#include <elf_hp.h>
36
 
37
#include "defs.h"
38
 
39
#include "frame.h"
40
#include "bfd.h"
41
#include "libhppa.h"
42
#include "gdbcore.h"
43
#include "symtab.h"
44
#include "breakpoint.h"
45
#include "symfile.h"
46
#include "objfiles.h"
47
#include "inferior.h"
48
#include "gdb-stabs.h"
49
#include "gdb_stat.h"
50
#include "gdbcmd.h"
51
#include "language.h"
52
#include "regcache.h"
53
 
54
#include <fcntl.h>
55
 
56
#ifndef O_BINARY
57
#define O_BINARY 0
58
#endif
59
 
60
/* Defined in exec.c; used to prevent dangling pointer bug.  */
61
extern struct target_ops exec_ops;
62
 
63
static CORE_ADDR bfd_lookup_symbol (bfd *, char *);
64
/* This lives in hppa-tdep.c. */
65
extern struct unwind_table_entry *find_unwind_entry (CORE_ADDR pc);
66
 
67
/* These ought to be defined in some public interface, but aren't.  They
68
   identify dynamic linker events.  */
69
#define DLD_CB_LOAD     1
70
#define DLD_CB_UNLOAD   0
71
 
72
/* A structure to keep track of all the known shared objects.  */
73
struct so_list
74
  {
75
    bfd *abfd;
76
    char *name;
77
    struct so_list *next;
78
    struct objfile *objfile;
79
    CORE_ADDR pa64_solib_desc_addr;
80
    struct load_module_desc pa64_solib_desc;
81
    struct section_table *sections;
82
    struct section_table *sections_end;
83
    boolean loaded;
84
  };
85
 
86
static struct so_list *so_list_head;
87
 
88
/* This is the cumulative size in bytes of the symbol tables of all
89
   shared objects on the so_list_head list.  (When we say size, here
90
   we mean of the information before it is brought into memory and
91
   potentially expanded by GDB.)  When adding a new shlib, this value
92
   is compared against a threshold size, held by auto_solib_limit (in
93
   megabytes).  If adding symbols for the new shlib would cause the
94
   total size to exceed the threshold, then the new shlib's symbols
95
   are not loaded. */
96
static LONGEST pa64_solib_total_st_size;
97
 
98
/* When the threshold is reached for any shlib, we refuse to add
99
   symbols for subsequent shlibs, even if those shlibs' symbols would
100
   be small enough to fit under the threshold.  Although this may
101
   result in one, early large shlib preventing the loading of later,
102
   smaller shlibs' symbols, it allows us to issue one informational
103
   message.  The alternative, to issue a message for each shlib whose
104
   symbols aren't loaded, could be a big annoyance where the threshold
105
   is exceeded due to a very large number of shlibs. */
106
static int pa64_solib_st_size_threshold_exceeded;
107
 
108
/* When adding fields, be sure to clear them in _initialize_pa64_solib. */
109
typedef struct
110
  {
111
    CORE_ADDR dld_flags_addr;
112
    LONGEST dld_flags;
113
    sec_ptr dyninfo_sect;
114
    boolean have_read_dld_descriptor;
115
    boolean is_valid;
116
    CORE_ADDR load_map;
117
    CORE_ADDR load_map_addr;
118
    struct load_module_desc dld_desc;
119
  }
120
dld_cache_t;
121
 
122
static dld_cache_t dld_cache;
123
 
124
static void pa64_sharedlibrary_info_command (char *, int);
125
 
126
static void pa64_solib_sharedlibrary_command (char *, int);
127
 
128
static void *pa64_target_read_memory (void *, CORE_ADDR, size_t, int);
129
 
130
static boolean read_dld_descriptor (struct target_ops *, int readsyms);
131
 
132
static boolean read_dynamic_info (asection *, dld_cache_t *);
133
 
134
static void add_to_solist (boolean, char *, int, struct load_module_desc *,
135
                           CORE_ADDR, struct target_ops *);
136
 
137
/* When examining the shared library for debugging information we have to
138
   look for HP debug symbols, stabs and dwarf2 debug symbols.  */
139
static char *pa64_debug_section_names[] = {
140
  ".debug_header", ".debug_gntt", ".debug_lntt", ".debug_slt", ".debug_vt",
141
  ".stabs", ".stabstr", ".debug_info", ".debug_abbrev", ".debug_aranges",
142
  ".debug_macinfo", ".debug_line", ".debug_loc", ".debug_pubnames",
143
  ".debug_str", NULL
144
};
145
 
146
/* Return a ballbark figure for the amount of memory GDB will need to
147
   allocate to read in the debug symbols from FILENAME.  */
148
static LONGEST
149
pa64_solib_sizeof_symbol_table (char *filename)
150
{
151
  bfd *abfd;
152
  int i;
153
  int desc;
154
  char *absolute_name;
155
  LONGEST st_size = (LONGEST) 0;
156
  asection *sect;
157
 
158
  /* We believe that filename was handed to us by the dynamic linker, and
159
     is therefore always an absolute path.  */
160
  desc = openp (getenv ("PATH"), 1, filename, O_RDONLY | O_BINARY,
161
                0, &absolute_name);
162
  if (desc < 0)
163
    {
164
      perror_with_name (filename);
165
    }
166
  filename = absolute_name;
167
 
168
  abfd = bfd_fdopenr (filename, gnutarget, desc);
169
  if (!abfd)
170
    {
171
      close (desc);
172
      make_cleanup (xfree, filename);
173
      error ("\"%s\": can't open to read symbols: %s.", filename,
174
             bfd_errmsg (bfd_get_error ()));
175
    }
176
 
177
  if (!bfd_check_format (abfd, bfd_object))
178
    {
179
      bfd_close (abfd);
180
      make_cleanup (xfree, filename);
181
      error ("\"%s\": can't read symbols: %s.", filename,
182
             bfd_errmsg (bfd_get_error ()));
183
    }
184
 
185
  /* Sum the sizes of the various sections that compose debug info. */
186
  for (i = 0; pa64_debug_section_names[i] != NULL; i++)
187
    {
188
      asection *sect;
189
 
190
      sect = bfd_get_section_by_name (abfd, pa64_debug_section_names[i]);
191
      if (sect)
192
        st_size += (LONGEST)bfd_section_size (abfd, sect);
193
    }
194
 
195
  bfd_close (abfd);
196
  xfree (filename);
197
 
198
  /* Unfortunately, just summing the sizes of various debug info
199
     sections isn't a very accurate measurement of how much heap
200
     space the debugger will need to hold them.  It also doesn't
201
     account for space needed by linker (aka "minimal") symbols.
202
 
203
     Anecdotal evidence suggests that just summing the sizes of
204
     debug-info-related sections understates the heap space needed
205
     to represent it internally by about an order of magnitude.
206
 
207
     Since it's not exactly brain surgery we're doing here, rather
208
     than attempt to more accurately measure the size of a shlib's
209
     symbol table in GDB's heap, we'll just apply a 10x fudge-
210
     factor to the debug info sections' size-sum.  No, this doesn't
211
     account for minimal symbols in non-debuggable shlibs.  But it
212
     all roughly washes out in the end.  */
213
  return st_size * (LONGEST) 10;
214
}
215
 
216
/* Add a shared library to the objfile list and load its symbols into
217
   GDB's symbol table.  */
218
static void
219
pa64_solib_add_solib_objfile (struct so_list *so, char *name, int from_tty,
220
                              CORE_ADDR text_addr)
221
{
222
  bfd *tmp_bfd;
223
  asection *sec;
224
  obj_private_data_t *obj_private;
225
  struct section_addr_info section_addrs;
226
 
227
  memset (&section_addrs, 0, sizeof (section_addrs));
228
  /* We need the BFD so that we can look at its sections.  We open up the
229
     file temporarily, then close it when we are done.  */
230
  tmp_bfd = bfd_openr (name, gnutarget);
231
  if (tmp_bfd == NULL)
232
    {
233
      perror_with_name (name);
234
      return;
235
    }
236
 
237
  if (!bfd_check_format (tmp_bfd, bfd_object))
238
    {
239
      bfd_close (tmp_bfd);
240
      error ("\"%s\" is not an object file: %s", name,
241
             bfd_errmsg (bfd_get_error ()));
242
    }
243
 
244
 
245
  /* Undo some braindamage from symfile.c.
246
 
247
     First, symfile.c will subtract the VMA of the first .text section
248
     in the shared library that it finds.  Undo that.  */
249
  sec = bfd_get_section_by_name (tmp_bfd, ".text");
250
  text_addr += bfd_section_vma (tmp_bfd, sec);
251
 
252
  /* Now find the true lowest section in the shared library.  */
253
  sec = NULL;
254
  bfd_map_over_sections (tmp_bfd, find_lowest_section, &sec);
255
 
256
  if (sec)
257
    {
258
      /* Subtract out the VMA of the lowest section.  */
259
      text_addr -= bfd_section_vma (tmp_bfd, sec);
260
 
261
      /* ??? Add back in the filepos of that lowest section. */
262
      text_addr += sec->filepos;
263
    }
264
 
265
  /* We are done with the temporary bfd.  Get rid of it and make sure
266
     nobody else can us it.  */
267
  bfd_close (tmp_bfd);
268
  tmp_bfd = NULL;
269
 
270
  /* Now let the generic code load up symbols for this library.  */
271
  section_addrs.other[0].addr = text_addr;
272
  section_addrs.other[0].name = ".text";
273
  so->objfile = symbol_file_add (name, from_tty, &section_addrs, 0, OBJF_SHARED);
274
  so->abfd = so->objfile->obfd;
275
 
276
  /* Mark this as a shared library and save private data.  */
277
  so->objfile->flags |= OBJF_SHARED;
278
 
279
  if (so->objfile->obj_private == NULL)
280
    {
281
      obj_private = (obj_private_data_t *)
282
        obstack_alloc (&so->objfile->psymbol_obstack,
283
                       sizeof (obj_private_data_t));
284
      obj_private->unwind_info = NULL;
285
      obj_private->so_info = NULL;
286
      so->objfile->obj_private = obj_private;
287
    }
288
 
289
  obj_private = (obj_private_data_t *) so->objfile->obj_private;
290
  obj_private->so_info = so;
291
  obj_private->dp = so->pa64_solib_desc.linkage_ptr;
292
}
293
 
294
/* Load debugging information for a shared library.  TARGET may be
295
   NULL if we are not attaching to a process or reading a core file.  */
296
 
297
static void
298
pa64_solib_load_symbols (struct so_list *so, char *name, int from_tty,
299
                         CORE_ADDR text_addr, struct target_ops *target)
300
{
301
  struct section_table *p;
302
  asection *sec;
303
  int status;
304
  char buf[4];
305
  CORE_ADDR presumed_data_start;
306
 
307
  if (text_addr == 0)
308
    text_addr = so->pa64_solib_desc.text_base;
309
 
310
  pa64_solib_add_solib_objfile (so, name, from_tty, text_addr);
311
 
312
  /* Now we need to build a section table for this library since
313
     we might be debugging a core file from a dynamically linked
314
     executable in which the libraries were not privately mapped.  */
315
  if (build_section_table (so->abfd,
316
                           &so->sections,
317
                           &so->sections_end))
318
    {
319
      error ("Unable to build section table for shared library\n.");
320
      return;
321
    }
322
 
323
  (so->objfile->section_offsets)->offsets[SECT_OFF_TEXT (so->objfile)]
324
    = so->pa64_solib_desc.text_base;
325
  (so->objfile->section_offsets)->offsets[SECT_OFF_DATA (so->objfile)]
326
    = so->pa64_solib_desc.data_base;
327
 
328
  /* Relocate all the sections based on where they got loaded.  */
329
  for (p = so->sections; p < so->sections_end; p++)
330
    {
331
      if (p->the_bfd_section->flags & SEC_CODE)
332
        {
333
          p->addr += ANOFFSET (so->objfile->section_offsets, SECT_OFF_TEXT (so->objfile));
334
          p->endaddr += ANOFFSET (so->objfile->section_offsets, SECT_OFF_TEXT (so->objfile));
335
        }
336
      else if (p->the_bfd_section->flags & SEC_DATA)
337
        {
338
          p->addr += ANOFFSET (so->objfile->section_offsets, SECT_OFF_DATA (so->objfile));
339
          p->endaddr += ANOFFSET (so->objfile->section_offsets, SECT_OFF_DATA (so->objfile));
340
        }
341
    }
342
 
343
  /* Now see if we need to map in the text and data for this shared
344
     library (for example debugging a core file which does not use
345
     private shared libraries.).
346
 
347
     Carefully peek at the first text address in the library.  If the
348
     read succeeds, then the libraries were privately mapped and were
349
     included in the core dump file.
350
 
351
     If the peek failed, then the libraries were not privately mapped
352
     and are not in the core file, we'll have to read them in ourselves.  */
353
  status = target_read_memory (text_addr, buf, 4);
354
  if (status != 0)
355
    {
356
      int new, old;
357
 
358
      new = so->sections_end - so->sections;
359
 
360
      old = target_resize_to_sections (target, new);
361
 
362
      /* Copy over the old data before it gets clobbered.  */
363
      memcpy ((char *) (target->to_sections + old),
364
              so->sections,
365
              ((sizeof (struct section_table)) * new));
366
    }
367
}
368
 
369
 
370
/* Add symbols from shared libraries into the symtab list, unless the
371
   size threshold specified by auto_solib_limit (in megabytes) would
372
   be exceeded.  */
373
 
374
void
375
pa64_solib_add (char *arg_string, int from_tty, struct target_ops *target, int readsyms)
376
{
377
  struct minimal_symbol *msymbol;
378
  CORE_ADDR addr;
379
  asection *shlib_info;
380
  int status;
381
  unsigned int dld_flags;
382
  char buf[4], *re_err;
383
  int threshold_warning_given = 0;
384
  int dll_index;
385
  struct load_module_desc dll_desc;
386
  char *dll_path;
387
 
388
  /* First validate our arguments.  */
389
  if ((re_err = re_comp (arg_string ? arg_string : ".")) != NULL)
390
    {
391
      error ("Invalid regexp: %s", re_err);
392
    }
393
 
394
  /* If we're debugging a core file, or have attached to a running
395
     process, then pa64_solib_create_inferior_hook will not have been
396
     called.
397
 
398
     We need to first determine if we're dealing with a dynamically
399
     linked executable.  If not, then return without an error or warning.
400
 
401
     We also need to examine __dld_flags to determine if the shared library
402
     list is valid and to determine if the libraries have been privately
403
     mapped.  */
404
  if (symfile_objfile == NULL)
405
    return;
406
 
407
  /* First see if the objfile was dynamically linked.  */
408
  shlib_info = bfd_get_section_by_name (symfile_objfile->obfd, ".dynamic");
409
  if (!shlib_info)
410
    return;
411
 
412
  /* It's got a .dynamic section, make sure it's not empty.  */
413
  if (bfd_section_size (symfile_objfile->obfd, shlib_info) == 0)
414
    return;
415
 
416
  /* Read in the load map pointer if we have not done so already.  */
417
  if (! dld_cache.have_read_dld_descriptor)
418
    if (! read_dld_descriptor (target, readsyms))
419
      return;
420
 
421
  /* If the libraries were not mapped private, warn the user.  */
422
  if ((dld_cache.dld_flags & DT_HP_DEBUG_PRIVATE) == 0)
423
    warning ("The shared libraries were not privately mapped; setting a\nbreakpoint in a shared library will not work until you rerun the program.\n");
424
 
425
  /* For each shaerd library, add it to the shared library list.  */
426
  for (dll_index = 1; ; dll_index++)
427
    {
428
      /* Read in the load module descriptor.  */
429
      if (dlgetmodinfo (dll_index, &dll_desc, sizeof (dll_desc),
430
                        pa64_target_read_memory, 0, dld_cache.load_map)
431
          == 0)
432
        return;
433
 
434
      /* Get the name of the shared library.  */
435
      dll_path = (char *)dlgetname (&dll_desc, sizeof (dll_desc),
436
                            pa64_target_read_memory,
437
                            0, dld_cache.load_map);
438
 
439
      if (!dll_path)
440
        error ("pa64_solib_add, unable to read shared library path.");
441
 
442
      add_to_solist (from_tty, dll_path, readsyms, &dll_desc, 0, target);
443
    }
444
}
445
 
446
 
447
/* This hook gets called just before the first instruction in the
448
   inferior process is executed.
449
 
450
   This is our opportunity to set magic flags in the inferior so
451
   that GDB can be notified when a shared library is mapped in and
452
   to tell the dynamic linker that a private copy of the library is
453
   needed (so GDB can set breakpoints in the library).
454
 
455
   We need to set two flag bits in this routine.
456
 
457
     DT_HP_DEBUG_PRIVATE to indicate that shared libraries should be
458
     mapped private.
459
 
460
     DT_HP_DEBUG_CALLBACK to indicate that we want the dynamic linker to
461
     call the breakpoint routine for significant events.  */
462
 
463
void
464
pa64_solib_create_inferior_hook (void)
465
{
466
  struct minimal_symbol *msymbol;
467
  unsigned int dld_flags, status;
468
  asection *shlib_info, *interp_sect;
469
  char buf[4];
470
  struct objfile *objfile;
471
  CORE_ADDR anaddr;
472
 
473
  /* First, remove all the solib event breakpoints.  Their addresses
474
     may have changed since the last time we ran the program.  */
475
  remove_solib_event_breakpoints ();
476
 
477
  if (symfile_objfile == NULL)
478
    return;
479
 
480
  /* First see if the objfile was dynamically linked.  */
481
  shlib_info = bfd_get_section_by_name (symfile_objfile->obfd, ".dynamic");
482
  if (!shlib_info)
483
    return;
484
 
485
  /* It's got a .dynamic section, make sure it's not empty.  */
486
  if (bfd_section_size (symfile_objfile->obfd, shlib_info) == 0)
487
    return;
488
 
489
  /* Read in the .dynamic section.  */
490
  if (! read_dynamic_info (shlib_info, &dld_cache))
491
    error ("Unable to read the .dynamic section.");
492
 
493
  /* Turn on the flags we care about.  */
494
  dld_cache.dld_flags |= DT_HP_DEBUG_PRIVATE;
495
  dld_cache.dld_flags |= DT_HP_DEBUG_CALLBACK;
496
  status = target_write_memory (dld_cache.dld_flags_addr,
497
                                (char *) &dld_cache.dld_flags,
498
                                sizeof (dld_cache.dld_flags));
499
  if (status != 0)
500
    error ("Unable to modify dynamic linker flags.");
501
 
502
  /* Now we have to create a shared library breakpoint in the dynamic
503
     linker.  This can be somewhat tricky since the symbol is inside
504
     the dynamic linker (for which we do not have symbols or a base
505
     load address!   Luckily I wrote this code for solib.c years ago.  */
506
  interp_sect = bfd_get_section_by_name (exec_bfd, ".interp");
507
  if (interp_sect)
508
    {
509
      unsigned int interp_sect_size;
510
      char *buf;
511
      CORE_ADDR load_addr;
512
      bfd *tmp_bfd;
513
      CORE_ADDR sym_addr = 0;
514
 
515
      /* Read the contents of the .interp section into a local buffer;
516
         the contents specify the dynamic linker this program uses.  */
517
      interp_sect_size = bfd_section_size (exec_bfd, interp_sect);
518
      buf = alloca (interp_sect_size);
519
      bfd_get_section_contents (exec_bfd, interp_sect,
520
                                buf, 0, interp_sect_size);
521
 
522
      /* Now we need to figure out where the dynamic linker was
523
         loaded so that we can load its symbols and place a breakpoint
524
         in the dynamic linker itself.
525
 
526
         This address is stored on the stack.  However, I've been unable
527
         to find any magic formula to find it for Solaris (appears to
528
         be trivial on GNU/Linux).  Therefore, we have to try an alternate
529
         mechanism to find the dynamic linker's base address.  */
530
      tmp_bfd = bfd_openr (buf, gnutarget);
531
      if (tmp_bfd == NULL)
532
        goto get_out;
533
 
534
      /* Make sure the dynamic linker's really a useful object.  */
535
      if (!bfd_check_format (tmp_bfd, bfd_object))
536
        {
537
          warning ("Unable to grok dynamic linker %s as an object file", buf);
538
          bfd_close (tmp_bfd);
539
          goto get_out;
540
        }
541
 
542
      /* We find the dynamic linker's base address by examining the
543
         current pc (which point at the entry point for the dynamic
544
         linker) and subtracting the offset of the entry point.
545
 
546
         Also note the breakpoint is the second instruction in the
547
         routine.  */
548
      load_addr = read_pc () - tmp_bfd->start_address;
549
      sym_addr = bfd_lookup_symbol (tmp_bfd, "__dld_break");
550
      sym_addr = load_addr + sym_addr + 4;
551
 
552
      /* Create the shared library breakpoint.  */
553
      {
554
        struct breakpoint *b
555
          = create_solib_event_breakpoint (sym_addr);
556
 
557
        /* The breakpoint is actually hard-coded into the dynamic linker,
558
           so we don't need to actually insert a breakpoint instruction
559
           there.  In fact, the dynamic linker's code is immutable, even to
560
           ttrace, so we shouldn't even try to do that.  For cases like
561
           this, we have "permanent" breakpoints.  */
562
        make_breakpoint_permanent (b);
563
      }
564
 
565
      /* We're done with the temporary bfd.  */
566
      bfd_close (tmp_bfd);
567
    }
568
 
569
get_out:
570
  /* Wipe out all knowledge of old shared libraries since their
571
     mapping can change from one exec to another!  */
572
  while (so_list_head)
573
    {
574
      struct so_list *temp;
575
 
576
      temp = so_list_head;
577
      xfree (so_list_head);
578
      so_list_head = temp->next;
579
    }
580
  clear_symtab_users ();
581
}
582
 
583
/* This operation removes the "hook" between GDB and the dynamic linker,
584
   which causes the dld to notify GDB of shared library events.
585
 
586
   After this operation completes, the dld will no longer notify GDB of
587
   shared library events.  To resume notifications, GDB must call
588
   pa64_solib_create_inferior_hook.
589
 
590
   This operation does not remove any knowledge of shared libraries which
591
   GDB may already have been notified of.  */
592
 
593
void
594
pa64_solib_remove_inferior_hook (int pid)
595
{
596
  /* Turn off the DT_HP_DEBUG_CALLBACK bit in the dynamic linker flags.  */
597
  dld_cache.dld_flags &= ~DT_HP_DEBUG_CALLBACK;
598
  target_write_memory (dld_cache.dld_flags_addr,
599
                       (char *)&dld_cache.dld_flags,
600
                       sizeof (dld_cache.dld_flags));
601
}
602
 
603
/* This function creates a breakpoint on the dynamic linker hook, which
604
   is called when e.g., a shl_load or shl_unload call is made.  This
605
   breakpoint will only trigger when a shl_load call is made.
606
 
607
   If filename is NULL, then loads of any dll will be caught.  Else,
608
   only loads of the file whose pathname is the string contained by
609
   filename will be caught.
610
 
611
   Undefined behaviour is guaranteed if this function is called before
612
   pa64_solib_create_inferior_hook.  */
613
 
614
void
615
pa64_solib_create_catch_load_hook (int pid, int tempflag, char *filename,
616
                                   char *cond_string)
617
{
618
  create_solib_load_event_breakpoint ("", tempflag, filename, cond_string);
619
}
620
 
621
/* This function creates a breakpoint on the dynamic linker hook, which
622
   is called when e.g., a shl_load or shl_unload call is made.  This
623
   breakpoint will only trigger when a shl_unload call is made.
624
 
625
   If filename is NULL, then unloads of any dll will be caught.  Else,
626
   only unloads of the file whose pathname is the string contained by
627
   filename will be caught.
628
 
629
   Undefined behaviour is guaranteed if this function is called before
630
   pa64_solib_create_inferior_hook.  */
631
 
632
void
633
pa64_solib_create_catch_unload_hook (int pid, int tempflag, char *filename,
634
                                     char *cond_string)
635
{
636
  create_solib_unload_event_breakpoint ("", tempflag, filename, cond_string);
637
}
638
 
639
/* Return nonzero if the dynamic linker has reproted that a library
640
   has been loaded.  */
641
 
642
int
643
pa64_solib_have_load_event (int pid)
644
{
645
  CORE_ADDR event_kind;
646
 
647
  event_kind = read_register (ARG0_REGNUM);
648
  return (event_kind == DLD_CB_LOAD);
649
}
650
 
651
/* Return nonzero if the dynamic linker has reproted that a library
652
   has been unloaded.  */
653
int
654
pa64_solib_have_unload_event (int pid)
655
{
656
  CORE_ADDR event_kind;
657
 
658
  event_kind = read_register (ARG0_REGNUM);
659
  return (event_kind == DLD_CB_UNLOAD);
660
}
661
 
662
/* Return a pointer to a string indicating the pathname of the most
663
   recently loaded library.
664
 
665
   The caller is reposible for copying the string before the inferior is
666
   restarted.  */
667
 
668
char *
669
pa64_solib_loaded_library_pathname (int pid)
670
{
671
  static char dll_path[MAXPATHLEN];
672
  CORE_ADDR  dll_path_addr = read_register (ARG3_REGNUM);
673
  read_memory_string (dll_path_addr, dll_path, MAXPATHLEN);
674
  return dll_path;
675
}
676
 
677
/* Return a pointer to a string indicating the pathname of the most
678
   recently unloaded library.
679
 
680
   The caller is reposible for copying the string before the inferior is
681
   restarted.  */
682
 
683
char *
684
pa64_solib_unloaded_library_pathname (int pid)
685
{
686
  static char dll_path[MAXPATHLEN];
687
  CORE_ADDR dll_path_addr = read_register (ARG3_REGNUM);
688
  read_memory_string (dll_path_addr, dll_path, MAXPATHLEN);
689
  return dll_path;
690
}
691
 
692
/* Return nonzero if PC is an address inside the dynamic linker.  */
693
 
694
int
695
pa64_solib_in_dynamic_linker (int pid, CORE_ADDR pc)
696
{
697
  asection *shlib_info;
698
 
699
  if (symfile_objfile == NULL)
700
    return 0;
701
 
702
  if (!dld_cache.have_read_dld_descriptor)
703
    if (!read_dld_descriptor (&current_target, auto_solib_add))
704
      return 0;
705
 
706
  return (pc >= dld_cache.dld_desc.text_base
707
          && pc < dld_cache.dld_desc.text_base + dld_cache.dld_desc.text_size);
708
}
709
 
710
 
711
/* Return the GOT value for the shared library in which ADDR belongs.  If
712
   ADDR isn't in any known shared library, return zero.  */
713
 
714
CORE_ADDR
715
pa64_solib_get_got_by_pc (CORE_ADDR addr)
716
{
717
  struct so_list *so_list = so_list_head;
718
  CORE_ADDR got_value = 0;
719
 
720
  while (so_list)
721
    {
722
      if (so_list->pa64_solib_desc.text_base <= addr
723
          && ((so_list->pa64_solib_desc.text_base
724
               + so_list->pa64_solib_desc.text_size)
725
              > addr))
726
        {
727
          got_value = so_list->pa64_solib_desc.linkage_ptr;
728
          break;
729
        }
730
      so_list = so_list->next;
731
    }
732
  return got_value;
733
}
734
 
735
/* Return the address of the handle of the shared library in which ADDR
736
   belongs.  If ADDR isn't in any known shared library, return zero.
737
 
738
   This function is used in hppa_fix_call_dummy in hppa-tdep.c.  */
739
 
740
CORE_ADDR
741
pa64_solib_get_solib_by_pc (CORE_ADDR addr)
742
{
743
  struct so_list *so_list = so_list_head;
744
  CORE_ADDR retval = 0;
745
 
746
  while (so_list)
747
    {
748
      if (so_list->pa64_solib_desc.text_base <= addr
749
          && ((so_list->pa64_solib_desc.text_base
750
               + so_list->pa64_solib_desc.text_size)
751
              > addr))
752
        {
753
          retval = so_list->pa64_solib_desc_addr;
754
          break;
755
        }
756
      so_list = so_list->next;
757
    }
758
  return retval;
759
}
760
 
761
/* Dump information about all the currently loaded shared libraries.  */
762
 
763
static void
764
pa64_sharedlibrary_info_command (char *ignore, int from_tty)
765
{
766
  struct so_list *so_list = so_list_head;
767
 
768
  if (exec_bfd == NULL)
769
    {
770
      printf_unfiltered ("No executable file.\n");
771
      return;
772
    }
773
 
774
  if (so_list == NULL)
775
    {
776
      printf_unfiltered ("No shared libraries loaded at this time.\n");
777
      return;
778
    }
779
 
780
  printf_unfiltered ("Shared Object Libraries\n");
781
  printf_unfiltered ("   %-19s%-19s%-19s%-19s\n",
782
                     "  text start", "   text end",
783
                     "  data start", "   data end");
784
  while (so_list)
785
    {
786
      unsigned int flags;
787
 
788
      printf_unfiltered ("%s", so_list->name);
789
      if (so_list->objfile == NULL)
790
        printf_unfiltered ("  (symbols not loaded)");
791
      if (so_list->loaded == 0)
792
        printf_unfiltered ("  (shared library unloaded)");
793
      printf_unfiltered ("  %-18s",
794
        local_hex_string_custom (so_list->pa64_solib_desc.linkage_ptr,
795
                                 "016l"));
796
      printf_unfiltered ("\n");
797
      printf_unfiltered ("%-18s",
798
        local_hex_string_custom (so_list->pa64_solib_desc.text_base,
799
                                 "016l"));
800
      printf_unfiltered (" %-18s",
801
        local_hex_string_custom ((so_list->pa64_solib_desc.text_base
802
                                  + so_list->pa64_solib_desc.text_size),
803
                                 "016l"));
804
      printf_unfiltered (" %-18s",
805
        local_hex_string_custom (so_list->pa64_solib_desc.data_base,
806
                                 "016l"));
807
      printf_unfiltered (" %-18s\n",
808
        local_hex_string_custom ((so_list->pa64_solib_desc.data_base
809
                                  + so_list->pa64_solib_desc.data_size),
810
                                 "016l"));
811
      so_list = so_list->next;
812
    }
813
}
814
 
815
/* Load up one or more shared libraries as directed by the user.  */
816
 
817
static void
818
pa64_solib_sharedlibrary_command (char *args, int from_tty)
819
{
820
  dont_repeat ();
821
  pa64_solib_add (args, from_tty, (struct target_ops *) 0, 1);
822
}
823
 
824
/* Return the name of the shared library containing ADDR or NULL if ADDR
825
   is not contained in any known shared library.  */
826
 
827
char *
828
pa64_solib_address (CORE_ADDR addr)
829
{
830
  struct so_list *so = so_list_head;
831
 
832
  while (so)
833
    {
834
      /* Is this address within this shlib's text range?  If so,
835
         return the shlib's name.  */
836
      if (addr >= so->pa64_solib_desc.text_base
837
          && addr < (so->pa64_solib_desc.text_base
838
                     | so->pa64_solib_desc.text_size))
839
        return so->name;
840
 
841
      /* Nope, keep looking... */
842
      so = so->next;
843
    }
844
 
845
  /* No, we couldn't prove that the address is within a shlib. */
846
  return NULL;
847
}
848
 
849
/* We are killing the inferior and restarting the program.  */
850
 
851
void
852
pa64_solib_restart (void)
853
{
854
  struct so_list *sl = so_list_head;
855
 
856
  /* Before the shlib info vanishes, use it to disable any breakpoints
857
     that may still be active in those shlibs.  */
858
  disable_breakpoints_in_shlibs (0);
859
 
860
  /* Discard all the shlib descriptors.  */
861
  while (sl)
862
    {
863
      struct so_list *next_sl = sl->next;
864
      xfree (sl);
865
      sl = next_sl;
866
    }
867
  so_list_head = NULL;
868
 
869
  pa64_solib_total_st_size = (LONGEST) 0;
870
  pa64_solib_st_size_threshold_exceeded = 0;
871
 
872
  dld_cache.is_valid = 0;
873
  dld_cache.have_read_dld_descriptor = 0;
874
  dld_cache.dld_flags_addr = 0;
875
  dld_cache.load_map = 0;
876
  dld_cache.load_map_addr = 0;
877
  dld_cache.dld_desc.data_base = 0;
878
  dld_cache.dld_flags = 0;
879
  dld_cache.dyninfo_sect = 0;
880
}
881
 
882
void
883
_initialize_pa64_solib (void)
884
{
885
  add_com ("sharedlibrary", class_files, pa64_solib_sharedlibrary_command,
886
           "Load shared object library symbols for files matching REGEXP.");
887
  add_info ("sharedlibrary", pa64_sharedlibrary_info_command,
888
            "Status of loaded shared object libraries.");
889
 
890
  add_show_from_set
891
    (add_set_cmd ("auto-solib-add", class_support, var_boolean,
892
                  (char *) &auto_solib_add,
893
                  "Set autoloading of shared library symbols.\n\
894
If \"on\", symbols from all shared object libraries will be loaded\n\
895
automatically when the inferior begins execution, when the dynamic linker\n\
896
informs gdb that a new library has been loaded, or when attaching to the\n\
897
inferior.  Otherwise, symbols must be loaded manually, using `sharedlibrary'.",
898
                  &setlist),
899
     &showlist);
900
 
901
  add_show_from_set
902
    (add_set_cmd ("auto-solib-limit", class_support, var_zinteger,
903
                  (char *) &auto_solib_limit,
904
                  "Set threshold (in Mb) for autoloading shared library symbols.\n\
905
When shared library autoloading is enabled, new libraries will be loaded\n\
906
only until the total size of shared library symbols exceeds this\n\
907
threshold in megabytes.  Is ignored when using `sharedlibrary'.",
908
                  &setlist),
909
     &showlist);
910
 
911
  /* ??rehrauer: On HP-UX, the kernel parameter MAXDSIZ limits how
912
     much data space a process can use.  We ought to be reading
913
     MAXDSIZ and setting auto_solib_limit to some large fraction of
914
     that value.  If not that, we maybe ought to be setting it smaller
915
     than the default for MAXDSIZ (that being 64Mb, I believe).
916
     However, [1] this threshold is only crudely approximated rather
917
     than actually measured, and [2] 50 Mbytes is too small for
918
     debugging gdb itself.  Thus, the arbitrary 100 figure.  */
919
  auto_solib_limit = 100;       /* Megabytes */
920
 
921
  pa64_solib_restart ();
922
}
923
 
924
/* Get some HPUX-specific data from a shared lib.  */
925
CORE_ADDR
926
so_lib_thread_start_addr (struct so_list *so)
927
{
928
  return so->pa64_solib_desc.tls_start_addr;
929
}
930
 
931
/* Read the dynamic linker's internal shared library descriptor.
932
 
933
   This must happen after dld starts running, so we can't do it in
934
   read_dynamic_info.  Record the fact that we have loaded the
935
   descriptor.  If the library is archive bound, then return zero, else
936
   return nonzero.  */
937
 
938
static boolean
939
read_dld_descriptor (struct target_ops *target, int readsyms)
940
{
941
  char *dll_path;
942
  asection *dyninfo_sect;
943
 
944
  /* If necessary call read_dynamic_info to extract the contents of the
945
     .dynamic section from the shared library.  */
946
  if (!dld_cache.is_valid)
947
    {
948
      if (symfile_objfile == NULL)
949
        error ("No object file symbols.");
950
 
951
      dyninfo_sect = bfd_get_section_by_name (symfile_objfile->obfd,
952
                                              ".dynamic");
953
      if (!dyninfo_sect)
954
        {
955
          return 0;
956
        }
957
 
958
      if (!read_dynamic_info (dyninfo_sect, &dld_cache))
959
        error ("Unable to read in .dynamic section information.");
960
    }
961
 
962
  /* Read the load map pointer.  */
963
  if (target_read_memory (dld_cache.load_map_addr,
964
                          (char*) &dld_cache.load_map,
965
                          sizeof(dld_cache.load_map))
966
      != 0)
967
    {
968
      error ("Error while reading in load map pointer.");
969
    }
970
 
971
  /* Read in the dld load module descriptor */
972
  if (dlgetmodinfo (-1,
973
                    &dld_cache.dld_desc,
974
                    sizeof(dld_cache.dld_desc),
975
                    pa64_target_read_memory,
976
                    0,
977
                    dld_cache.load_map)
978
      == 0)
979
    {
980
      error ("Error trying to get information about dynamic linker.");
981
    }
982
 
983
  /* Indicate that we have loaded the dld descriptor.  */
984
  dld_cache.have_read_dld_descriptor = 1;
985
 
986
  /* Add dld.sl to the list of known shared libraries so that we can
987
     do unwind, etc.
988
 
989
     ?!? This may not be correct.  Consider of dld.sl contains symbols
990
     which are also referenced/defined by the user program or some user
991
     shared library.  We need to make absolutely sure that we do not
992
     pollute the namespace from GDB's point of view.  */
993
  dll_path = dlgetname (&dld_cache.dld_desc,
994
                        sizeof(dld_cache.dld_desc),
995
                        pa64_target_read_memory,
996
                        0,
997
                        dld_cache.load_map);
998
  add_to_solist(0, dll_path, readsyms, &dld_cache.dld_desc, 0, target);
999
 
1000
  return 1;
1001
}
1002
 
1003
/* Read the .dynamic section and extract the information of interest,
1004
   which is stored in dld_cache.  The routine elf_locate_base in solib.c
1005
   was used as a model for this.  */
1006
 
1007
static boolean
1008
read_dynamic_info (asection *dyninfo_sect, dld_cache_t *dld_cache_p)
1009
{
1010
  char *buf;
1011
  char *bufend;
1012
  CORE_ADDR dyninfo_addr;
1013
  int dyninfo_sect_size;
1014
  CORE_ADDR entry_addr;
1015
 
1016
  /* Read in .dynamic section, silently ignore errors.  */
1017
  dyninfo_addr = bfd_section_vma (symfile_objfile->obfd, dyninfo_sect);
1018
  dyninfo_sect_size = bfd_section_size (exec_bfd, dyninfo_sect);
1019
  buf = alloca (dyninfo_sect_size);
1020
  if (target_read_memory (dyninfo_addr, buf, dyninfo_sect_size))
1021
    return 0;
1022
 
1023
  /* Scan the .dynamic section and record the items of interest.
1024
     In particular, DT_HP_DLD_FLAGS */
1025
  for (bufend = buf + dyninfo_sect_size, entry_addr = dyninfo_addr;
1026
       buf < bufend;
1027
       buf += sizeof (Elf64_Dyn), entry_addr += sizeof (Elf64_Dyn))
1028
    {
1029
      Elf64_Dyn *x_dynp = (Elf64_Dyn*)buf;
1030
      Elf64_Sxword dyn_tag;
1031
      CORE_ADDR dyn_ptr;
1032
      char *pbuf;
1033
 
1034
      pbuf = alloca (TARGET_PTR_BIT / HOST_CHAR_BIT);
1035
      dyn_tag = bfd_h_get_64 (symfile_objfile->obfd,
1036
                              (bfd_byte*) &x_dynp->d_tag);
1037
 
1038
      /* We can't use a switch here because dyn_tag is 64 bits and HP's
1039
         lame comiler does not handle 64bit items in switch statements.  */
1040
      if (dyn_tag == DT_NULL)
1041
        break;
1042
      else if (dyn_tag == DT_HP_DLD_FLAGS)
1043
        {
1044
          /* Set dld_flags_addr and dld_flags in *dld_cache_p */
1045
          dld_cache_p->dld_flags_addr = entry_addr + offsetof(Elf64_Dyn, d_un);
1046
          if (target_read_memory (dld_cache_p->dld_flags_addr,
1047
                                  (char*) &dld_cache_p->dld_flags,
1048
                                  sizeof(dld_cache_p->dld_flags))
1049
              != 0)
1050
            {
1051
              error ("Error while reading in .dynamic section of the program.");
1052
            }
1053
        }
1054
      else if (dyn_tag == DT_HP_LOAD_MAP)
1055
        {
1056
          /* Dld will place the address of the load map at load_map_addr
1057
             after it starts running.  */
1058
          if (target_read_memory (entry_addr + offsetof(Elf64_Dyn,
1059
                                                        d_un.d_ptr),
1060
                                  (char*) &dld_cache_p->load_map_addr,
1061
                                  sizeof(dld_cache_p->load_map_addr))
1062
              != 0)
1063
            {
1064
              error ("Error while reading in .dynamic section of the program.");
1065
            }
1066
        }
1067
      else
1068
        {
1069
          /* tag is not of interest */
1070
        }
1071
    }
1072
 
1073
  /* Record other information and set is_valid to 1. */
1074
  dld_cache_p->dyninfo_sect = dyninfo_sect;
1075
 
1076
  /* Verify that we read in required info.  These fields are re-set to zero
1077
     in pa64_solib_restart.  */
1078
 
1079
  if (dld_cache_p->dld_flags_addr != 0 && dld_cache_p->load_map_addr != 0)
1080
    dld_cache_p->is_valid = 1;
1081
  else
1082
    return 0;
1083
 
1084
  return 1;
1085
}
1086
 
1087
/* Wrapper for target_read_memory to make dlgetmodinfo happy.  */
1088
 
1089
static void *
1090
pa64_target_read_memory (void *buffer, CORE_ADDR ptr, size_t bufsiz, int ident)
1091
{
1092
  if (target_read_memory (ptr, buffer, bufsiz) != 0)
1093
    return 0;
1094
  return buffer;
1095
}
1096
 
1097
/* Called from handle_dynlink_load_event and pa64_solib_add to add
1098
   a shared library to so_list_head list and possibly to read in the
1099
   debug information for the library.
1100
 
1101
   If load_module_desc_p is NULL, then the load module descriptor must
1102
   be read from the inferior process at the address load_module_desc_addr.  */
1103
 
1104
static void
1105
add_to_solist (boolean from_tty, char *dll_path, int readsyms,
1106
               struct load_module_desc *load_module_desc_p,
1107
               CORE_ADDR load_module_desc_addr, struct target_ops *target)
1108
{
1109
  struct so_list *new_so, *so_list_tail;
1110
  int pa64_solib_st_size_threshhold_exceeded;
1111
  LONGEST st_size;
1112
 
1113
  if (symfile_objfile == NULL)
1114
    return;
1115
 
1116
  so_list_tail = so_list_head;
1117
  /* Find the end of the list of shared objects.  */
1118
  while (so_list_tail && so_list_tail->next)
1119
    {
1120
      if (strcmp (so_list_tail->name, dll_path) == 0)
1121
        return;
1122
      so_list_tail = so_list_tail->next;
1123
    }
1124
 
1125
  if (so_list_tail && strcmp (so_list_tail->name, dll_path) == 0)
1126
    return;
1127
 
1128
  /* Add the shared library to the so_list_head list */
1129
  new_so = (struct so_list *) xmalloc (sizeof (struct so_list));
1130
  memset ((char *)new_so, 0, sizeof (struct so_list));
1131
  if (so_list_head == NULL)
1132
    {
1133
      so_list_head = new_so;
1134
      so_list_tail = new_so;
1135
    }
1136
  else
1137
    {
1138
      so_list_tail->next = new_so;
1139
      so_list_tail = new_so;
1140
    }
1141
 
1142
  /* Initialize the new_so */
1143
  if (load_module_desc_p)
1144
    {
1145
      new_so->pa64_solib_desc = *load_module_desc_p;
1146
    }
1147
  else
1148
    {
1149
      if (target_read_memory (load_module_desc_addr,
1150
                              (char*) &new_so->pa64_solib_desc,
1151
                              sizeof(struct load_module_desc))
1152
          != 0)
1153
      {
1154
        error ("Error while reading in dynamic library %s", dll_path);
1155
      }
1156
    }
1157
 
1158
  new_so->pa64_solib_desc_addr = load_module_desc_addr;
1159
  new_so->loaded = 1;
1160
  new_so->name = obsavestring (dll_path, strlen(dll_path),
1161
                               &symfile_objfile->symbol_obstack);
1162
 
1163
  /* If we are not going to load the library, tell the user if we
1164
     haven't already and return.  */
1165
 
1166
  st_size = pa64_solib_sizeof_symbol_table (dll_path);
1167
  pa64_solib_st_size_threshhold_exceeded =
1168
       !from_tty
1169
    && readsyms
1170
    && (  (st_size + pa64_solib_total_st_size)
1171
        > (auto_solib_limit * (LONGEST) (1024 * 1024)));
1172
  if (pa64_solib_st_size_threshhold_exceeded)
1173
    {
1174
      pa64_solib_add_solib_objfile (new_so, dll_path, from_tty, 1);
1175
      return;
1176
    }
1177
 
1178
  /* Now read in debug info. */
1179
  pa64_solib_total_st_size += st_size;
1180
 
1181
  /* This fills in new_so->objfile, among others. */
1182
  pa64_solib_load_symbols (new_so,
1183
                           dll_path,
1184
                           from_tty,
1185
                           0,
1186
                           target);
1187
  return;
1188
}
1189
 
1190
 
1191
/*
1192
   LOCAL FUNCTION
1193
 
1194
   bfd_lookup_symbol -- lookup the value for a specific symbol
1195
 
1196
   SYNOPSIS
1197
 
1198
   CORE_ADDR bfd_lookup_symbol (bfd *abfd, char *symname)
1199
 
1200
   DESCRIPTION
1201
 
1202
   An expensive way to lookup the value of a single symbol for
1203
   bfd's that are only temporary anyway.  This is used by the
1204
   shared library support to find the address of the debugger
1205
   interface structures in the shared library.
1206
 
1207
   Note that 0 is specifically allowed as an error return (no
1208
   such symbol).
1209
 */
1210
 
1211
static CORE_ADDR
1212
bfd_lookup_symbol (bfd *abfd, char *symname)
1213
{
1214
  unsigned int storage_needed;
1215
  asymbol *sym;
1216
  asymbol **symbol_table;
1217
  unsigned int number_of_symbols;
1218
  unsigned int i;
1219
  struct cleanup *back_to;
1220
  CORE_ADDR symaddr = 0;
1221
 
1222
  storage_needed = bfd_get_symtab_upper_bound (abfd);
1223
 
1224
  if (storage_needed > 0)
1225
    {
1226
      symbol_table = (asymbol **) xmalloc (storage_needed);
1227
      back_to = make_cleanup (xfree, symbol_table);
1228
      number_of_symbols = bfd_canonicalize_symtab (abfd, symbol_table);
1229
 
1230
      for (i = 0; i < number_of_symbols; i++)
1231
        {
1232
          sym = *symbol_table++;
1233
          if (strcmp (sym->name, symname) == 0)
1234
            {
1235
              /* Bfd symbols are section relative. */
1236
              symaddr = sym->value + sym->section->vma;
1237
              break;
1238
            }
1239
        }
1240
      do_cleanups (back_to);
1241
    }
1242
  return (symaddr);
1243
}
1244
 

powered by: WebSVN 2.1.0

© copyright 1999-2024 OpenCores.org, equivalent to Oliscience, all rights reserved. OpenCores®, registered trademark.