2013-03-12 Sebastian Huber <sebastian.huber@embedded-brains.de>
[binutils-gdb.git] / gdb / solib-som.c
blobff7fbaa1ffb8699232810d5ab0c6a4ca4936a501
1 /* Handle SOM shared libraries.
3 Copyright (C) 2004-2013 Free Software Foundation, Inc.
5 This file is part of GDB.
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
20 #include "defs.h"
21 #include "symtab.h"
22 #include "bfd.h"
23 #include "symfile.h"
24 #include "objfiles.h"
25 #include "gdbcore.h"
26 #include "target.h"
27 #include "inferior.h"
29 #include "hppa-tdep.h"
30 #include "solist.h"
31 #include "solib.h"
32 #include "solib-som.h"
34 #include <string.h>
36 #undef SOLIB_SOM_DBG
38 /* These ought to be defined in some public interface, but aren't. They
39 define the meaning of the various bits in the distinguished __dld_flags
40 variable that is declared in every debuggable a.out on HP-UX, and that
41 is shared between the debugger and the dynamic linker. */
43 #define DLD_FLAGS_MAPPRIVATE 0x1
44 #define DLD_FLAGS_HOOKVALID 0x2
45 #define DLD_FLAGS_LISTVALID 0x4
46 #define DLD_FLAGS_BOR_ENABLE 0x8
48 struct lm_info
50 /* Version of this structure (it is expected to change again in
51 hpux10). */
52 unsigned char struct_version;
54 /* Binding mode for this library. */
55 unsigned char bind_mode;
57 /* Version of this library. */
58 short library_version;
60 /* Start of text address,
61 link-time text location (length of text area),
62 end of text address. */
63 CORE_ADDR text_addr;
64 CORE_ADDR text_link_addr;
65 CORE_ADDR text_end;
67 /* Start of data, start of bss and end of data. */
68 CORE_ADDR data_start;
69 CORE_ADDR bss_start;
70 CORE_ADDR data_end;
72 /* Value of linkage pointer (%r19). */
73 CORE_ADDR got_value;
75 /* Address in target of offset from thread-local register of
76 start of this thread's data. I.e., the first thread-local
77 variable in this shared library starts at *(tsd_start_addr)
78 from that area pointed to by cr27 (mpsfu_hi).
80 We do the indirection as soon as we read it, so from then
81 on it's the offset itself. */
82 CORE_ADDR tsd_start_addr;
84 /* Address of the link map entry in the loader. */
85 CORE_ADDR lm_addr;
88 /* These addresses should be filled in by som_solib_create_inferior_hook.
89 They are also used elsewhere in this module. */
91 typedef struct
93 CORE_ADDR address;
94 struct unwind_table_entry *unwind;
96 addr_and_unwind_t;
98 /* When adding fields, be sure to clear them in _initialize_som_solib. */
99 static struct
101 int is_valid;
102 addr_and_unwind_t hook;
103 addr_and_unwind_t hook_stub;
104 addr_and_unwind_t load;
105 addr_and_unwind_t load_stub;
106 addr_and_unwind_t unload;
107 addr_and_unwind_t unload2;
108 addr_and_unwind_t unload_stub;
110 dld_cache;
112 static void
113 som_relocate_section_addresses (struct so_list *so,
114 struct target_section *sec)
116 flagword aflag = bfd_get_section_flags(so->abfd, sec->the_bfd_section);
118 if (aflag & SEC_CODE)
120 sec->addr += so->lm_info->text_addr - so->lm_info->text_link_addr;
121 sec->endaddr += so->lm_info->text_addr - so->lm_info->text_link_addr;
123 else if (aflag & SEC_DATA)
125 sec->addr += so->lm_info->data_start;
126 sec->endaddr += so->lm_info->data_start;
128 else
130 /* Nothing. */
135 /* Variable storing HP-UX major release number.
137 On non-native system, simply assume that the major release number
138 is 11. On native systems, hppa-hpux-nat.c initialization code
139 sets this number to the real one on startup.
141 We cannot compute this value here, because we need to make a native
142 call to "uname". We are are not allowed to do that from here, as
143 this file is used for both native and cross debugging. */
145 #define DEFAULT_HPUX_MAJOR_RELEASE 11
146 int hpux_major_release = DEFAULT_HPUX_MAJOR_RELEASE;
148 static int
149 get_hpux_major_release (void)
151 return hpux_major_release;
154 /* DL header flag defines. */
155 #define SHLIB_TEXT_PRIVATE_ENABLE 0x4000
157 /* The DL header is documented in <shl.h>. We are only interested
158 in the flags field to determine whether the executable wants shared
159 libraries mapped private. */
160 struct {
161 short junk[37];
162 short flags;
163 } dl_header;
165 /* This hook gets called just before the first instruction in the
166 inferior process is executed.
168 This is our opportunity to set magic flags in the inferior so
169 that GDB can be notified when a shared library is mapped in and
170 to tell the dynamic linker that a private copy of the library is
171 needed (so GDB can set breakpoints in the library).
173 __dld_flags is the location of the magic flags; as of this implementation
174 there are 3 flags of interest:
176 bit 0 when set indicates that private copies of the libraries are needed
177 bit 1 when set indicates that the callback hook routine is valid
178 bit 2 when set indicates that the dynamic linker should maintain the
179 __dld_list structure when loading/unloading libraries.
181 Note that shared libraries are not mapped in at this time, so we have
182 run the inferior until the libraries are mapped in. Typically this
183 means running until the "_start" is called. */
185 static void
186 som_solib_create_inferior_hook (int from_tty)
188 enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch ());
189 struct minimal_symbol *msymbol;
190 unsigned int dld_flags, status, have_endo;
191 asection *shlib_info;
192 gdb_byte buf[4];
193 CORE_ADDR anaddr;
195 if (symfile_objfile == NULL)
196 return;
198 /* First see if the objfile was dynamically linked. */
199 shlib_info = bfd_get_section_by_name (symfile_objfile->obfd, "$SHLIB_INFO$");
200 if (!shlib_info)
201 return;
203 /* It's got a $SHLIB_INFO$ section, make sure it's not empty. */
204 if (bfd_section_size (symfile_objfile->obfd, shlib_info) == 0)
205 return;
207 /* Read the DL header. */
208 bfd_get_section_contents (symfile_objfile->obfd, shlib_info,
209 (char *) &dl_header, 0, sizeof (dl_header));
211 have_endo = 0;
212 /* Slam the pid of the process into __d_pid.
214 We used to warn when this failed, but that warning is only useful
215 on very old HP systems (hpux9 and older). The warnings are an
216 annoyance to users of modern systems and foul up the testsuite as
217 well. As a result, the warnings have been disabled. */
218 msymbol = lookup_minimal_symbol ("__d_pid", NULL, symfile_objfile);
219 if (msymbol == NULL)
220 goto keep_going;
222 anaddr = SYMBOL_VALUE_ADDRESS (msymbol);
223 store_unsigned_integer (buf, 4, byte_order, PIDGET (inferior_ptid));
224 status = target_write_memory (anaddr, buf, 4);
225 if (status != 0)
227 warning (_("\
228 Unable to write __d_pid.\n\
229 Suggest linking with /opt/langtools/lib/end.o.\n\
230 GDB will be unable to track shl_load/shl_unload calls"));
231 goto keep_going;
234 /* Get the value of _DLD_HOOK (an export stub) and put it in __dld_hook;
235 This will force the dynamic linker to call __d_trap when significant
236 events occur.
238 Note that the above is the pre-HP-UX 9.0 behaviour. At 9.0 and above,
239 the dld provides an export stub named "__d_trap" as well as the
240 function named "__d_trap" itself, but doesn't provide "_DLD_HOOK".
241 We'll look first for the old flavor and then the new. */
243 msymbol = lookup_minimal_symbol ("_DLD_HOOK", NULL, symfile_objfile);
244 if (msymbol == NULL)
245 msymbol = lookup_minimal_symbol ("__d_trap", NULL, symfile_objfile);
246 if (msymbol == NULL)
248 warning (_("\
249 Unable to find _DLD_HOOK symbol in object file.\n\
250 Suggest linking with /opt/langtools/lib/end.o.\n\
251 GDB will be unable to track shl_load/shl_unload calls"));
252 goto keep_going;
254 anaddr = SYMBOL_VALUE_ADDRESS (msymbol);
255 dld_cache.hook.address = anaddr;
257 /* Grrr, this might not be an export symbol! We have to find the
258 export stub. */
259 msymbol = hppa_lookup_stub_minimal_symbol (SYMBOL_LINKAGE_NAME (msymbol),
260 EXPORT);
261 if (msymbol != NULL)
263 anaddr = SYMBOL_VALUE (msymbol);
264 dld_cache.hook_stub.address = anaddr;
266 store_unsigned_integer (buf, 4, byte_order, anaddr);
268 msymbol = lookup_minimal_symbol ("__dld_hook", NULL, symfile_objfile);
269 if (msymbol == NULL)
271 warning (_("\
272 Unable to find __dld_hook symbol in object file.\n\
273 Suggest linking with /opt/langtools/lib/end.o.\n\
274 GDB will be unable to track shl_load/shl_unload calls"));
275 goto keep_going;
277 anaddr = SYMBOL_VALUE_ADDRESS (msymbol);
278 status = target_write_memory (anaddr, buf, 4);
280 /* Now set a shlib_event breakpoint at __d_trap so we can track
281 significant shared library events. */
282 msymbol = lookup_minimal_symbol ("__d_trap", NULL, symfile_objfile);
283 if (msymbol == NULL)
285 warning (_("\
286 Unable to find __dld_d_trap symbol in object file.\n\
287 Suggest linking with /opt/langtools/lib/end.o.\n\
288 GDB will be unable to track shl_load/shl_unload calls"));
289 goto keep_going;
291 create_solib_event_breakpoint (target_gdbarch (),
292 SYMBOL_VALUE_ADDRESS (msymbol));
294 /* We have all the support usually found in end.o, so we can track
295 shl_load and shl_unload calls. */
296 have_endo = 1;
298 keep_going:
300 /* Get the address of __dld_flags, if no such symbol exists, then we can
301 not debug the shared code. */
302 msymbol = lookup_minimal_symbol ("__dld_flags", NULL, NULL);
303 if (msymbol == NULL)
305 error (_("Unable to find __dld_flags symbol in object file."));
308 anaddr = SYMBOL_VALUE_ADDRESS (msymbol);
310 /* Read the current contents. */
311 status = target_read_memory (anaddr, buf, 4);
312 if (status != 0)
313 error (_("Unable to read __dld_flags."));
314 dld_flags = extract_unsigned_integer (buf, 4, byte_order);
316 /* If the libraries were not mapped private on HP-UX 11 and later, warn
317 the user. On HP-UX 10 and earlier, there is no easy way to specify
318 that shared libraries should be privately mapped. So, we just force
319 private mapping. */
320 if (get_hpux_major_release () >= 11
321 && (dl_header.flags & SHLIB_TEXT_PRIVATE_ENABLE) == 0
322 && (dld_flags & DLD_FLAGS_MAPPRIVATE) == 0)
323 warning
324 (_("\
325 Private mapping of shared library text was not specified\n\
326 by the executable; setting a breakpoint in a shared library which\n\
327 is not privately mapped will not work. See the HP-UX 11i v3 chatr\n\
328 manpage for methods to privately map shared library text."));
330 /* Turn on the flags we care about. */
331 if (get_hpux_major_release () < 11)
332 dld_flags |= DLD_FLAGS_MAPPRIVATE;
333 if (have_endo)
334 dld_flags |= DLD_FLAGS_HOOKVALID;
335 store_unsigned_integer (buf, 4, byte_order, dld_flags);
336 status = target_write_memory (anaddr, buf, 4);
337 if (status != 0)
338 error (_("Unable to write __dld_flags."));
340 /* Now find the address of _start and set a breakpoint there.
341 We still need this code for two reasons:
343 * Not all sites have /opt/langtools/lib/end.o, so it's not always
344 possible to track the dynamic linker's events.
346 * At this time no events are triggered for shared libraries
347 loaded at startup time (what a crock). */
349 msymbol = lookup_minimal_symbol ("_start", NULL, symfile_objfile);
350 if (msymbol == NULL)
351 error (_("Unable to find _start symbol in object file."));
353 anaddr = SYMBOL_VALUE_ADDRESS (msymbol);
355 /* Make the breakpoint at "_start" a shared library event breakpoint. */
356 create_solib_event_breakpoint (target_gdbarch (), anaddr);
358 clear_symtab_users (0);
361 static void
362 som_special_symbol_handling (void)
366 static void
367 som_solib_desire_dynamic_linker_symbols (void)
369 struct objfile *objfile;
370 struct unwind_table_entry *u;
371 struct minimal_symbol *dld_msymbol;
373 /* Do we already know the value of these symbols? If so, then
374 we've no work to do.
376 (If you add clauses to this test, be sure to likewise update the
377 test within the loop.) */
379 if (dld_cache.is_valid)
380 return;
382 ALL_OBJFILES (objfile)
384 dld_msymbol = lookup_minimal_symbol ("shl_load", NULL, objfile);
385 if (dld_msymbol != NULL)
387 dld_cache.load.address = SYMBOL_VALUE (dld_msymbol);
388 dld_cache.load.unwind = find_unwind_entry (dld_cache.load.address);
391 dld_msymbol = lookup_minimal_symbol_solib_trampoline ("shl_load",
392 objfile);
393 if (dld_msymbol != NULL)
395 if (MSYMBOL_TYPE (dld_msymbol) == mst_solib_trampoline)
397 u = find_unwind_entry (SYMBOL_VALUE (dld_msymbol));
398 if ((u != NULL) && (u->stub_unwind.stub_type == EXPORT))
400 dld_cache.load_stub.address = SYMBOL_VALUE (dld_msymbol);
401 dld_cache.load_stub.unwind = u;
406 dld_msymbol = lookup_minimal_symbol ("shl_unload", NULL, objfile);
407 if (dld_msymbol != NULL)
409 dld_cache.unload.address = SYMBOL_VALUE (dld_msymbol);
410 dld_cache.unload.unwind = find_unwind_entry (dld_cache.unload.address);
412 /* ??rehrauer: I'm not sure exactly what this is, but it appears
413 that on some HPUX 10.x versions, there's two unwind regions to
414 cover the body of "shl_unload", the second being 4 bytes past
415 the end of the first. This is a large hack to handle that
416 case, but since I don't seem to have any legitimate way to
417 look for this thing via the symbol table... */
419 if (dld_cache.unload.unwind != NULL)
421 u = find_unwind_entry (dld_cache.unload.unwind->region_end + 4);
422 if (u != NULL)
424 dld_cache.unload2.address = u->region_start;
425 dld_cache.unload2.unwind = u;
430 dld_msymbol = lookup_minimal_symbol_solib_trampoline ("shl_unload",
431 objfile);
432 if (dld_msymbol != NULL)
434 if (MSYMBOL_TYPE (dld_msymbol) == mst_solib_trampoline)
436 u = find_unwind_entry (SYMBOL_VALUE (dld_msymbol));
437 if ((u != NULL) && (u->stub_unwind.stub_type == EXPORT))
439 dld_cache.unload_stub.address = SYMBOL_VALUE (dld_msymbol);
440 dld_cache.unload_stub.unwind = u;
445 /* Did we find everything we were looking for? If so, stop. */
446 if ((dld_cache.load.address != 0)
447 && (dld_cache.load_stub.address != 0)
448 && (dld_cache.unload.address != 0)
449 && (dld_cache.unload_stub.address != 0))
451 dld_cache.is_valid = 1;
452 break;
456 dld_cache.hook.unwind = find_unwind_entry (dld_cache.hook.address);
457 dld_cache.hook_stub.unwind = find_unwind_entry (dld_cache.hook_stub.address);
459 /* We're prepared not to find some of these symbols, which is why
460 this function is a "desire" operation, and not a "require". */
463 static int
464 som_in_dynsym_resolve_code (CORE_ADDR pc)
466 struct unwind_table_entry *u_pc;
468 /* Are we in the dld itself?
470 ??rehrauer: Large hack -- We'll assume that any address in a
471 shared text region is the dld's text. This would obviously
472 fall down if the user attached to a process, whose shlibs
473 weren't mapped to a (writeable) private region. However, in
474 that case the debugger probably isn't able to set the fundamental
475 breakpoint in the dld callback anyways, so this hack should be
476 safe. */
478 if ((pc & (CORE_ADDR) 0xc0000000) == (CORE_ADDR) 0xc0000000)
479 return 1;
481 /* Cache the address of some symbols that are part of the dynamic
482 linker, if not already known. */
484 som_solib_desire_dynamic_linker_symbols ();
486 /* Are we in the dld callback? Or its export stub? */
487 u_pc = find_unwind_entry (pc);
488 if (u_pc == NULL)
489 return 0;
491 if ((u_pc == dld_cache.hook.unwind) || (u_pc == dld_cache.hook_stub.unwind))
492 return 1;
494 /* Or the interface of the dld (i.e., "shl_load" or friends)? */
495 if ((u_pc == dld_cache.load.unwind)
496 || (u_pc == dld_cache.unload.unwind)
497 || (u_pc == dld_cache.unload2.unwind)
498 || (u_pc == dld_cache.load_stub.unwind)
499 || (u_pc == dld_cache.unload_stub.unwind))
500 return 1;
502 /* Apparently this address isn't part of the dld's text. */
503 return 0;
506 static void
507 som_clear_solib (void)
511 struct dld_list {
512 char name[4];
513 char info[4];
514 char text_addr[4];
515 char text_link_addr[4];
516 char text_end[4];
517 char data_start[4];
518 char bss_start[4];
519 char data_end[4];
520 char got_value[4];
521 char next[4];
522 char tsd_start_addr_ptr[4];
525 static CORE_ADDR
526 link_map_start (void)
528 enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch ());
529 struct minimal_symbol *sym;
530 CORE_ADDR addr;
531 gdb_byte buf[4];
532 unsigned int dld_flags;
534 sym = lookup_minimal_symbol ("__dld_flags", NULL, NULL);
535 if (!sym)
536 error (_("Unable to find __dld_flags symbol in object file."));
537 addr = SYMBOL_VALUE_ADDRESS (sym);
538 read_memory (addr, buf, 4);
539 dld_flags = extract_unsigned_integer (buf, 4, byte_order);
540 if ((dld_flags & DLD_FLAGS_LISTVALID) == 0)
541 error (_("__dld_list is not valid according to __dld_flags."));
543 sym = lookup_minimal_symbol ("__dld_list", NULL, NULL);
544 if (!sym)
546 /* Older crt0.o files (hpux8) don't have __dld_list as a symbol,
547 but the data is still available if you know where to look. */
548 sym = lookup_minimal_symbol ("__dld_flags", NULL, NULL);
549 if (!sym)
551 error (_("Unable to find dynamic library list."));
552 return 0;
554 addr = SYMBOL_VALUE_ADDRESS (sym) - 8;
556 else
557 addr = SYMBOL_VALUE_ADDRESS (sym);
559 read_memory (addr, buf, 4);
560 addr = extract_unsigned_integer (buf, 4, byte_order);
561 if (addr == 0)
562 return 0;
564 read_memory (addr, buf, 4);
565 return extract_unsigned_integer (buf, 4, byte_order);
568 /* Does this so's name match the main binary? */
569 static int
570 match_main (const char *name)
572 return strcmp (name, symfile_objfile->name) == 0;
575 static struct so_list *
576 som_current_sos (void)
578 enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch ());
579 CORE_ADDR lm;
580 struct so_list *head = 0;
581 struct so_list **link_ptr = &head;
583 for (lm = link_map_start (); lm; )
585 char *namebuf;
586 CORE_ADDR addr;
587 struct so_list *new;
588 struct cleanup *old_chain;
589 int errcode;
590 struct dld_list dbuf;
591 char tsdbuf[4];
593 new = (struct so_list *) xmalloc (sizeof (struct so_list));
594 old_chain = make_cleanup (xfree, new);
596 memset (new, 0, sizeof (*new));
597 new->lm_info = xmalloc (sizeof (struct lm_info));
598 make_cleanup (xfree, new->lm_info);
600 read_memory (lm, (gdb_byte *)&dbuf, sizeof (struct dld_list));
602 addr = extract_unsigned_integer ((gdb_byte *)&dbuf.name,
603 sizeof (dbuf.name), byte_order);
604 target_read_string (addr, &namebuf, SO_NAME_MAX_PATH_SIZE - 1, &errcode);
605 if (errcode != 0)
606 warning (_("Can't read pathname for load map: %s."),
607 safe_strerror (errcode));
608 else
610 strncpy (new->so_name, namebuf, SO_NAME_MAX_PATH_SIZE - 1);
611 new->so_name[SO_NAME_MAX_PATH_SIZE - 1] = '\0';
612 xfree (namebuf);
613 strcpy (new->so_original_name, new->so_name);
616 if (new->so_name[0] && !match_main (new->so_name))
618 struct lm_info *lmi = new->lm_info;
619 unsigned int tmp;
621 lmi->lm_addr = lm;
623 #define EXTRACT(_fld) \
624 extract_unsigned_integer ((gdb_byte *)&dbuf._fld, \
625 sizeof (dbuf._fld), byte_order);
627 lmi->text_addr = EXTRACT (text_addr);
628 tmp = EXTRACT (info);
629 lmi->library_version = (tmp >> 16) & 0xffff;
630 lmi->bind_mode = (tmp >> 8) & 0xff;
631 lmi->struct_version = tmp & 0xff;
632 lmi->text_link_addr = EXTRACT (text_link_addr);
633 lmi->text_end = EXTRACT (text_end);
634 lmi->data_start = EXTRACT (data_start);
635 lmi->bss_start = EXTRACT (bss_start);
636 lmi->data_end = EXTRACT (data_end);
637 lmi->got_value = EXTRACT (got_value);
638 tmp = EXTRACT (tsd_start_addr_ptr);
639 read_memory (tmp, tsdbuf, 4);
640 lmi->tsd_start_addr
641 = extract_unsigned_integer (tsdbuf, 4, byte_order);
643 #ifdef SOLIB_SOM_DBG
644 printf ("\n+ library \"%s\" is described at %s\n", new->so_name,
645 paddress (target_gdbarch (), lm));
646 printf (" 'version' is %d\n", new->lm_info->struct_version);
647 printf (" 'bind_mode' is %d\n", new->lm_info->bind_mode);
648 printf (" 'library_version' is %d\n",
649 new->lm_info->library_version);
650 printf (" 'text_addr' is %s\n",
651 paddress (target_gdbarch (), new->lm_info->text_addr));
652 printf (" 'text_link_addr' is %s\n",
653 paddress (target_gdbarch (), new->lm_info->text_link_addr));
654 printf (" 'text_end' is %s\n",
655 paddress (target_gdbarch (), new->lm_info->text_end));
656 printf (" 'data_start' is %s\n",
657 paddress (target_gdbarch (), new->lm_info->data_start));
658 printf (" 'bss_start' is %s\n",
659 paddress (target_gdbarch (), new->lm_info->bss_start));
660 printf (" 'data_end' is %s\n",
661 paddress (target_gdbarch (), new->lm_info->data_end));
662 printf (" 'got_value' is %s\n",
663 paddress (target_gdbarch (), new->lm_info->got_value));
664 printf (" 'tsd_start_addr' is %s\n",
665 paddress (target_gdbarch (), new->lm_info->tsd_start_addr));
666 #endif
668 new->addr_low = lmi->text_addr;
669 new->addr_high = lmi->text_end;
671 /* Link the new object onto the list. */
672 new->next = NULL;
673 *link_ptr = new;
674 link_ptr = &new->next;
676 else
678 free_so (new);
681 lm = EXTRACT (next);
682 discard_cleanups (old_chain);
683 #undef EXTRACT
686 /* TODO: The original somsolib code has logic to detect and eliminate
687 duplicate entries. Do we need that? */
689 return head;
692 static int
693 som_open_symbol_file_object (void *from_ttyp)
695 enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch ());
696 CORE_ADDR lm, l_name;
697 char *filename;
698 int errcode;
699 int from_tty = *(int *)from_ttyp;
700 gdb_byte buf[4];
702 if (symfile_objfile)
703 if (!query (_("Attempt to reload symbols from process? ")))
704 return 0;
706 /* First link map member should be the executable. */
707 if ((lm = link_map_start ()) == 0)
708 return 0; /* failed somehow... */
710 /* Read address of name from target memory to GDB. */
711 read_memory (lm + offsetof (struct dld_list, name), buf, 4);
713 /* Convert the address to host format. Assume that the address is
714 unsigned. */
715 l_name = extract_unsigned_integer (buf, 4, byte_order);
717 if (l_name == 0)
718 return 0; /* No filename. */
720 /* Now fetch the filename from target memory. */
721 target_read_string (l_name, &filename, SO_NAME_MAX_PATH_SIZE - 1, &errcode);
723 if (errcode)
725 warning (_("failed to read exec filename from attached file: %s"),
726 safe_strerror (errcode));
727 return 0;
730 make_cleanup (xfree, filename);
731 /* Have a pathname: read the symbol file. */
732 symbol_file_add_main (filename, from_tty);
734 return 1;
737 static void
738 som_free_so (struct so_list *so)
740 xfree (so->lm_info);
743 static CORE_ADDR
744 som_solib_thread_start_addr (struct so_list *so)
746 return so->lm_info->tsd_start_addr;
749 /* Return the GOT value for the shared library in which ADDR belongs. If
750 ADDR isn't in any known shared library, return zero. */
752 static CORE_ADDR
753 som_solib_get_got_by_pc (CORE_ADDR addr)
755 struct so_list *so_list = master_so_list ();
756 CORE_ADDR got_value = 0;
758 while (so_list)
760 if (so_list->lm_info->text_addr <= addr
761 && so_list->lm_info->text_end > addr)
763 got_value = so_list->lm_info->got_value;
764 break;
766 so_list = so_list->next;
768 return got_value;
771 /* Return the address of the handle of the shared library in which
772 ADDR belongs. If ADDR isn't in any known shared library, return
773 zero. */
774 /* This function is used in initialize_hp_cxx_exception_support in
775 hppa-hpux-tdep.c. */
777 static CORE_ADDR
778 som_solib_get_solib_by_pc (CORE_ADDR addr)
780 struct so_list *so_list = master_so_list ();
782 while (so_list)
784 if (so_list->lm_info->text_addr <= addr
785 && so_list->lm_info->text_end > addr)
787 break;
789 so_list = so_list->next;
791 if (so_list)
792 return so_list->lm_info->lm_addr;
793 else
794 return 0;
798 static struct target_so_ops som_so_ops;
800 extern initialize_file_ftype _initialize_som_solib; /* -Wmissing-prototypes */
802 void
803 _initialize_som_solib (void)
805 som_so_ops.relocate_section_addresses = som_relocate_section_addresses;
806 som_so_ops.free_so = som_free_so;
807 som_so_ops.clear_solib = som_clear_solib;
808 som_so_ops.solib_create_inferior_hook = som_solib_create_inferior_hook;
809 som_so_ops.special_symbol_handling = som_special_symbol_handling;
810 som_so_ops.current_sos = som_current_sos;
811 som_so_ops.open_symbol_file_object = som_open_symbol_file_object;
812 som_so_ops.in_dynsym_resolve_code = som_in_dynsym_resolve_code;
813 som_so_ops.bfd_open = solib_bfd_open;
816 void
817 som_solib_select (struct gdbarch *gdbarch)
819 struct gdbarch_tdep *tdep = gdbarch_tdep (gdbarch);
821 set_solib_ops (gdbarch, &som_so_ops);
822 tdep->solib_thread_start_addr = som_solib_thread_start_addr;
823 tdep->solib_get_got_by_pc = som_solib_get_got_by_pc;
824 tdep->solib_get_solib_by_pc = som_solib_get_solib_by_pc;
827 /* The rest of these functions are not part of the solib interface; they
828 are used by somread.c or hppa-hpux-tdep.c. */
831 som_solib_section_offsets (struct objfile *objfile,
832 struct section_offsets *offsets)
834 struct so_list *so_list = master_so_list ();
836 while (so_list)
838 /* Oh what a pain! We need the offsets before so_list->objfile
839 is valid. The BFDs will never match. Make a best guess. */
840 if (strstr (objfile->name, so_list->so_name))
842 asection *private_section;
844 /* The text offset is easy. */
845 offsets->offsets[SECT_OFF_TEXT (objfile)]
846 = (so_list->lm_info->text_addr
847 - so_list->lm_info->text_link_addr);
848 offsets->offsets[SECT_OFF_RODATA (objfile)]
849 = ANOFFSET (offsets, SECT_OFF_TEXT (objfile));
851 /* We should look at presumed_dp in the SOM header, but
852 that's not easily available. This should be OK though. */
853 private_section = bfd_get_section_by_name (objfile->obfd,
854 "$PRIVATE$");
855 if (!private_section)
857 warning (_("Unable to find $PRIVATE$ in shared library!"));
858 offsets->offsets[SECT_OFF_DATA (objfile)] = 0;
859 offsets->offsets[SECT_OFF_BSS (objfile)] = 0;
860 return 1;
862 offsets->offsets[SECT_OFF_DATA (objfile)]
863 = (so_list->lm_info->data_start - private_section->vma);
864 offsets->offsets[SECT_OFF_BSS (objfile)]
865 = ANOFFSET (offsets, SECT_OFF_DATA (objfile));
866 return 1;
868 so_list = so_list->next;
870 return 0;