1 /* Target-dependent code for HP-UX on PA-RISC.
3 Copyright (C) 2002-2013 Free Software Foundation, Inc.
5 This file is part of GDB.
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
21 #include "arch-utils.h"
25 #include "frame-unwind.h"
26 #include "trad-frame.h"
32 #include "hppa-tdep.h"
33 #include "solib-som.h"
34 #include "solib-pa64.h"
37 #include "exceptions.h"
39 #include "gdb_string.h"
41 #define IS_32BIT_TARGET(_gdbarch) \
42 ((gdbarch_tdep (_gdbarch))->bytes_per_address == 4)
44 /* Bit in the `ss_flag' member of `struct save_state' that indicates
45 that the 64-bit register values are live. From
46 <machine/save_state.h>. */
47 #define HPPA_HPUX_SS_WIDEREGS 0x40
49 /* Offsets of various parts of `struct save_state'. From
50 <machine/save_state.h>. */
51 #define HPPA_HPUX_SS_FLAGS_OFFSET 0
52 #define HPPA_HPUX_SS_NARROW_OFFSET 4
53 #define HPPA_HPUX_SS_FPBLOCK_OFFSET 256
54 #define HPPA_HPUX_SS_WIDE_OFFSET 640
56 /* The size of `struct save_state. */
57 #define HPPA_HPUX_SAVE_STATE_SIZE 1152
59 /* The size of `struct pa89_save_state', which corresponds to PA-RISC
60 1.1, the lowest common denominator that we support. */
61 #define HPPA_HPUX_PA89_SAVE_STATE_SIZE 512
64 /* Forward declarations. */
65 extern void _initialize_hppa_hpux_tdep (void);
66 extern initialize_file_ftype _initialize_hppa_hpux_tdep
;
69 in_opd_section (CORE_ADDR pc
)
71 struct obj_section
*s
;
74 s
= find_pc_section (pc
);
77 && s
->the_bfd_section
->name
!= NULL
78 && strcmp (s
->the_bfd_section
->name
, ".opd") == 0);
82 /* Return one if PC is in the call path of a trampoline, else return zero.
84 Note we return one for *any* call trampoline (long-call, arg-reloc), not
85 just shared library trampolines (import, export). */
88 hppa32_hpux_in_solib_call_trampoline (struct gdbarch
*gdbarch
,
89 CORE_ADDR pc
, char *name
)
91 enum bfd_endian byte_order
= gdbarch_byte_order (gdbarch
);
92 struct minimal_symbol
*minsym
;
93 struct unwind_table_entry
*u
;
95 /* First see if PC is in one of the two C-library trampolines. */
96 if (pc
== hppa_symbol_address("$$dyncall")
97 || pc
== hppa_symbol_address("_sr4export"))
100 minsym
= lookup_minimal_symbol_by_pc (pc
);
101 if (minsym
&& strcmp (SYMBOL_LINKAGE_NAME (minsym
), ".stub") == 0)
104 /* Get the unwind descriptor corresponding to PC, return zero
105 if no unwind was found. */
106 u
= find_unwind_entry (pc
);
110 /* If this isn't a linker stub, then return now. */
111 if (u
->stub_unwind
.stub_type
== 0)
114 /* By definition a long-branch stub is a call stub. */
115 if (u
->stub_unwind
.stub_type
== LONG_BRANCH
)
118 /* The call and return path execute the same instructions within
119 an IMPORT stub! So an IMPORT stub is both a call and return
121 if (u
->stub_unwind
.stub_type
== IMPORT
)
124 /* Parameter relocation stubs always have a call path and may have a
126 if (u
->stub_unwind
.stub_type
== PARAMETER_RELOCATION
127 || u
->stub_unwind
.stub_type
== EXPORT
)
131 /* Search forward from the current PC until we hit a branch
132 or the end of the stub. */
133 for (addr
= pc
; addr
<= u
->region_end
; addr
+= 4)
137 insn
= read_memory_integer (addr
, 4, byte_order
);
139 /* Does it look like a bl? If so then it's the call path, if
140 we find a bv or be first, then we're on the return path. */
141 if ((insn
& 0xfc00e000) == 0xe8000000)
143 else if ((insn
& 0xfc00e001) == 0xe800c000
144 || (insn
& 0xfc000000) == 0xe0000000)
148 /* Should never happen. */
149 warning (_("Unable to find branch in parameter relocation stub."));
153 /* Unknown stub type. For now, just return zero. */
158 hppa64_hpux_in_solib_call_trampoline (struct gdbarch
*gdbarch
,
159 CORE_ADDR pc
, char *name
)
161 enum bfd_endian byte_order
= gdbarch_byte_order (gdbarch
);
163 /* PA64 has a completely different stub/trampoline scheme. Is it
164 better? Maybe. It's certainly harder to determine with any
165 certainty that we are in a stub because we can not refer to the
168 The heuristic is simple. Try to lookup the current PC value in th
169 minimal symbol table. If that fails, then assume we are not in a
172 Then see if the PC value falls within the section bounds for the
173 section containing the minimal symbol we found in the first
174 step. If it does, then assume we are not in a stub and return.
176 Finally peek at the instructions to see if they look like a stub. */
177 struct minimal_symbol
*minsym
;
182 minsym
= lookup_minimal_symbol_by_pc (pc
);
186 sec
= SYMBOL_OBJ_SECTION (minsym
)->the_bfd_section
;
188 if (bfd_get_section_vma (sec
->owner
, sec
) <= pc
189 && pc
< (bfd_get_section_vma (sec
->owner
, sec
)
190 + bfd_section_size (sec
->owner
, sec
)))
193 /* We might be in a stub. Peek at the instructions. Stubs are 3
194 instructions long. */
195 insn
= read_memory_integer (pc
, 4, byte_order
);
197 /* Find out where we think we are within the stub. */
198 if ((insn
& 0xffffc00e) == 0x53610000)
200 else if ((insn
& 0xffffffff) == 0xe820d000)
202 else if ((insn
& 0xffffc00e) == 0x537b0000)
207 /* Now verify each insn in the range looks like a stub instruction. */
208 insn
= read_memory_integer (addr
, 4, byte_order
);
209 if ((insn
& 0xffffc00e) != 0x53610000)
212 /* Now verify each insn in the range looks like a stub instruction. */
213 insn
= read_memory_integer (addr
+ 4, 4, byte_order
);
214 if ((insn
& 0xffffffff) != 0xe820d000)
217 /* Now verify each insn in the range looks like a stub instruction. */
218 insn
= read_memory_integer (addr
+ 8, 4, byte_order
);
219 if ((insn
& 0xffffc00e) != 0x537b0000)
222 /* Looks like a stub. */
226 /* Return one if PC is in the return path of a trampoline, else return zero.
228 Note we return one for *any* call trampoline (long-call, arg-reloc), not
229 just shared library trampolines (import, export). */
232 hppa_hpux_in_solib_return_trampoline (struct gdbarch
*gdbarch
,
233 CORE_ADDR pc
, const char *name
)
235 enum bfd_endian byte_order
= gdbarch_byte_order (gdbarch
);
236 struct unwind_table_entry
*u
;
238 /* Get the unwind descriptor corresponding to PC, return zero
239 if no unwind was found. */
240 u
= find_unwind_entry (pc
);
244 /* If this isn't a linker stub or it's just a long branch stub, then
246 if (u
->stub_unwind
.stub_type
== 0 || u
->stub_unwind
.stub_type
== LONG_BRANCH
)
249 /* The call and return path execute the same instructions within
250 an IMPORT stub! So an IMPORT stub is both a call and return
252 if (u
->stub_unwind
.stub_type
== IMPORT
)
255 /* Parameter relocation stubs always have a call path and may have a
257 if (u
->stub_unwind
.stub_type
== PARAMETER_RELOCATION
258 || u
->stub_unwind
.stub_type
== EXPORT
)
262 /* Search forward from the current PC until we hit a branch
263 or the end of the stub. */
264 for (addr
= pc
; addr
<= u
->region_end
; addr
+= 4)
268 insn
= read_memory_integer (addr
, 4, byte_order
);
270 /* Does it look like a bl? If so then it's the call path, if
271 we find a bv or be first, then we're on the return path. */
272 if ((insn
& 0xfc00e000) == 0xe8000000)
274 else if ((insn
& 0xfc00e001) == 0xe800c000
275 || (insn
& 0xfc000000) == 0xe0000000)
279 /* Should never happen. */
280 warning (_("Unable to find branch in parameter relocation stub."));
284 /* Unknown stub type. For now, just return zero. */
289 /* Figure out if PC is in a trampoline, and if so find out where
290 the trampoline will jump to. If not in a trampoline, return zero.
292 Simple code examination probably is not a good idea since the code
293 sequences in trampolines can also appear in user code.
295 We use unwinds and information from the minimal symbol table to
296 determine when we're in a trampoline. This won't work for ELF
297 (yet) since it doesn't create stub unwind entries. Whether or
298 not ELF will create stub unwinds or normal unwinds for linker
299 stubs is still being debated.
301 This should handle simple calls through dyncall or sr4export,
302 long calls, argument relocation stubs, and dyncall/sr4export
303 calling an argument relocation stub. It even handles some stubs
304 used in dynamic executables. */
307 hppa_hpux_skip_trampoline_code (struct frame_info
*frame
, CORE_ADDR pc
)
309 struct gdbarch
*gdbarch
= get_frame_arch (frame
);
310 enum bfd_endian byte_order
= gdbarch_byte_order (gdbarch
);
311 int word_size
= gdbarch_ptr_bit (gdbarch
) / 8;
313 long prev_inst
, curr_inst
, loc
;
314 struct minimal_symbol
*msym
;
315 struct unwind_table_entry
*u
;
317 /* Addresses passed to dyncall may *NOT* be the actual address
318 of the function. So we may have to do something special. */
319 if (pc
== hppa_symbol_address("$$dyncall"))
321 pc
= (CORE_ADDR
) get_frame_register_unsigned (frame
, 22);
323 /* If bit 30 (counting from the left) is on, then pc is the address of
324 the PLT entry for this function, not the address of the function
325 itself. Bit 31 has meaning too, but only for MPE. */
327 pc
= (CORE_ADDR
) read_memory_integer (pc
& ~0x3, word_size
,
330 if (pc
== hppa_symbol_address("$$dyncall_external"))
332 pc
= (CORE_ADDR
) get_frame_register_unsigned (frame
, 22);
333 pc
= (CORE_ADDR
) read_memory_integer (pc
& ~0x3, word_size
, byte_order
);
335 else if (pc
== hppa_symbol_address("_sr4export"))
336 pc
= (CORE_ADDR
) get_frame_register_unsigned (frame
, 22);
338 /* Get the unwind descriptor corresponding to PC, return zero
339 if no unwind was found. */
340 u
= find_unwind_entry (pc
);
344 /* If this isn't a linker stub, then return now. */
345 /* elz: attention here! (FIXME) because of a compiler/linker
346 error, some stubs which should have a non zero stub_unwind.stub_type
347 have unfortunately a value of zero. So this function would return here
348 as if we were not in a trampoline. To fix this, we go look at the partial
349 symbol information, which reports this guy as a stub.
350 (FIXME): Unfortunately, we are not that lucky: it turns out that the
351 partial symbol information is also wrong sometimes. This is because
352 when it is entered (somread.c::som_symtab_read()) it can happen that
353 if the type of the symbol (from the som) is Entry, and the symbol is
354 in a shared library, then it can also be a trampoline. This would be OK,
355 except that I believe the way they decide if we are ina shared library
356 does not work. SOOOO..., even if we have a regular function w/o
357 trampolines its minimal symbol can be assigned type mst_solib_trampoline.
358 Also, if we find that the symbol is a real stub, then we fix the unwind
359 descriptor, and define the stub type to be EXPORT.
360 Hopefully this is correct most of the times. */
361 if (u
->stub_unwind
.stub_type
== 0)
364 /* elz: NOTE (FIXME!) once the problem with the unwind information is fixed
365 we can delete all the code which appears between the lines. */
366 /*--------------------------------------------------------------------------*/
367 msym
= lookup_minimal_symbol_by_pc (pc
);
369 if (msym
== NULL
|| MSYMBOL_TYPE (msym
) != mst_solib_trampoline
)
370 return orig_pc
== pc
? 0 : pc
& ~0x3;
372 else if (msym
!= NULL
&& MSYMBOL_TYPE (msym
) == mst_solib_trampoline
)
374 struct objfile
*objfile
;
375 struct minimal_symbol
*msymbol
;
376 int function_found
= 0;
378 /* Go look if there is another minimal symbol with the same name as
379 this one, but with type mst_text. This would happen if the msym
380 is an actual trampoline, in which case there would be another
381 symbol with the same name corresponding to the real function. */
383 ALL_MSYMBOLS (objfile
, msymbol
)
385 if (MSYMBOL_TYPE (msymbol
) == mst_text
386 && strcmp (SYMBOL_LINKAGE_NAME (msymbol
),
387 SYMBOL_LINKAGE_NAME (msym
)) == 0)
395 /* The type of msym is correct (mst_solib_trampoline), but
396 the unwind info is wrong, so set it to the correct value. */
397 u
->stub_unwind
.stub_type
= EXPORT
;
399 /* The stub type info in the unwind is correct (this is not a
400 trampoline), but the msym type information is wrong, it
401 should be mst_text. So we need to fix the msym, and also
402 get out of this function. */
404 MSYMBOL_TYPE (msym
) = mst_text
;
405 return orig_pc
== pc
? 0 : pc
& ~0x3;
409 /*--------------------------------------------------------------------------*/
412 /* It's a stub. Search for a branch and figure out where it goes.
413 Note we have to handle multi insn branch sequences like ldil;ble.
414 Most (all?) other branches can be determined by examining the contents
415 of certain registers and the stack. */
422 /* Make sure we haven't walked outside the range of this stub. */
423 if (u
!= find_unwind_entry (loc
))
425 warning (_("Unable to find branch in linker stub"));
426 return orig_pc
== pc
? 0 : pc
& ~0x3;
429 prev_inst
= curr_inst
;
430 curr_inst
= read_memory_integer (loc
, 4, byte_order
);
432 /* Does it look like a branch external using %r1? Then it's the
433 branch from the stub to the actual function. */
434 if ((curr_inst
& 0xffe0e000) == 0xe0202000)
436 /* Yup. See if the previous instruction loaded
437 a value into %r1. If so compute and return the jump address. */
438 if ((prev_inst
& 0xffe00000) == 0x20200000)
439 return (hppa_extract_21 (prev_inst
)
440 + hppa_extract_17 (curr_inst
)) & ~0x3;
443 warning (_("Unable to find ldil X,%%r1 "
444 "before ble Y(%%sr4,%%r1)."));
445 return orig_pc
== pc
? 0 : pc
& ~0x3;
449 /* Does it look like a be 0(sr0,%r21)? OR
450 Does it look like a be, n 0(sr0,%r21)? OR
451 Does it look like a bve (r21)? (this is on PA2.0)
452 Does it look like a bve, n(r21)? (this is also on PA2.0)
453 That's the branch from an
454 import stub to an export stub.
456 It is impossible to determine the target of the branch via
457 simple examination of instructions and/or data (consider
458 that the address in the plabel may be the address of the
459 bind-on-reference routine in the dynamic loader).
461 So we have try an alternative approach.
463 Get the name of the symbol at our current location; it should
464 be a stub symbol with the same name as the symbol in the
467 Then lookup a minimal symbol with the same name; we should
468 get the minimal symbol for the target routine in the shared
469 library as those take precedence of import/export stubs. */
470 if ((curr_inst
== 0xe2a00000) ||
471 (curr_inst
== 0xe2a00002) ||
472 (curr_inst
== 0xeaa0d000) ||
473 (curr_inst
== 0xeaa0d002))
475 struct minimal_symbol
*stubsym
, *libsym
;
477 stubsym
= lookup_minimal_symbol_by_pc (loc
);
480 warning (_("Unable to find symbol for 0x%lx"), loc
);
481 return orig_pc
== pc
? 0 : pc
& ~0x3;
484 libsym
= lookup_minimal_symbol (SYMBOL_LINKAGE_NAME (stubsym
),
488 warning (_("Unable to find library symbol for %s."),
489 SYMBOL_PRINT_NAME (stubsym
));
490 return orig_pc
== pc
? 0 : pc
& ~0x3;
493 return SYMBOL_VALUE (libsym
);
496 /* Does it look like bl X,%rp or bl X,%r0? Another way to do a
497 branch from the stub to the actual function. */
499 else if ((curr_inst
& 0xffe0e000) == 0xe8400000
500 || (curr_inst
& 0xffe0e000) == 0xe8000000
501 || (curr_inst
& 0xffe0e000) == 0xe800A000)
502 return (loc
+ hppa_extract_17 (curr_inst
) + 8) & ~0x3;
504 /* Does it look like bv (rp)? Note this depends on the
505 current stack pointer being the same as the stack
506 pointer in the stub itself! This is a branch on from the
507 stub back to the original caller. */
508 /*else if ((curr_inst & 0xffe0e000) == 0xe840c000) */
509 else if ((curr_inst
& 0xffe0f000) == 0xe840c000)
511 /* Yup. See if the previous instruction loaded
513 if (prev_inst
== 0x4bc23ff1)
516 sp
= get_frame_register_unsigned (frame
, HPPA_SP_REGNUM
);
517 return read_memory_integer (sp
- 8, 4, byte_order
) & ~0x3;
521 warning (_("Unable to find restore of %%rp before bv (%%rp)."));
522 return orig_pc
== pc
? 0 : pc
& ~0x3;
526 /* elz: added this case to capture the new instruction
527 at the end of the return part of an export stub used by
528 the PA2.0: BVE, n (rp) */
529 else if ((curr_inst
& 0xffe0f000) == 0xe840d000)
531 return (read_memory_integer
532 (get_frame_register_unsigned (frame
, HPPA_SP_REGNUM
) - 24,
533 word_size
, byte_order
)) & ~0x3;
536 /* What about be,n 0(sr0,%rp)? It's just another way we return to
537 the original caller from the stub. Used in dynamic executables. */
538 else if (curr_inst
== 0xe0400002)
540 /* The value we jump to is sitting in sp - 24. But that's
541 loaded several instructions before the be instruction.
542 I guess we could check for the previous instruction being
543 mtsp %r1,%sr0 if we want to do sanity checking. */
544 return (read_memory_integer
545 (get_frame_register_unsigned (frame
, HPPA_SP_REGNUM
) - 24,
546 word_size
, byte_order
)) & ~0x3;
549 /* Haven't found the branch yet, but we're still in the stub.
556 hppa_skip_permanent_breakpoint (struct regcache
*regcache
)
558 /* To step over a breakpoint instruction on the PA takes some
559 fiddling with the instruction address queue.
561 When we stop at a breakpoint, the IA queue front (the instruction
562 we're executing now) points at the breakpoint instruction, and
563 the IA queue back (the next instruction to execute) points to
564 whatever instruction we would execute after the breakpoint, if it
565 were an ordinary instruction. This is the case even if the
566 breakpoint is in the delay slot of a branch instruction.
568 Clearly, to step past the breakpoint, we need to set the queue
569 front to the back. But what do we put in the back? What
570 instruction comes after that one? Because of the branch delay
571 slot, the next insn is always at the back + 4. */
573 ULONGEST pcoq_tail
, pcsq_tail
;
574 regcache_cooked_read_unsigned (regcache
, HPPA_PCOQ_TAIL_REGNUM
, &pcoq_tail
);
575 regcache_cooked_read_unsigned (regcache
, HPPA_PCSQ_TAIL_REGNUM
, &pcsq_tail
);
577 regcache_cooked_write_unsigned (regcache
, HPPA_PCOQ_HEAD_REGNUM
, pcoq_tail
);
578 regcache_cooked_write_unsigned (regcache
, HPPA_PCSQ_HEAD_REGNUM
, pcsq_tail
);
580 regcache_cooked_write_unsigned (regcache
,
581 HPPA_PCOQ_TAIL_REGNUM
, pcoq_tail
+ 4);
582 /* We can leave the tail's space the same, since there's no jump. */
587 struct hppa_hpux_sigtramp_unwind_cache
590 struct trad_frame_saved_reg
*saved_regs
;
593 static int hppa_hpux_tramp_reg
[] = {
595 HPPA_PCOQ_HEAD_REGNUM
,
596 HPPA_PCSQ_HEAD_REGNUM
,
597 HPPA_PCOQ_TAIL_REGNUM
,
598 HPPA_PCSQ_TAIL_REGNUM
,
625 static struct hppa_hpux_sigtramp_unwind_cache
*
626 hppa_hpux_sigtramp_frame_unwind_cache (struct frame_info
*this_frame
,
630 struct gdbarch
*gdbarch
= get_frame_arch (this_frame
);
631 struct gdbarch_tdep
*tdep
= gdbarch_tdep (gdbarch
);
632 enum bfd_endian byte_order
= gdbarch_byte_order (gdbarch
);
633 struct hppa_hpux_sigtramp_unwind_cache
*info
;
635 CORE_ADDR sp
, scptr
, off
;
641 info
= FRAME_OBSTACK_ZALLOC (struct hppa_hpux_sigtramp_unwind_cache
);
643 info
->saved_regs
= trad_frame_alloc_saved_regs (this_frame
);
645 sp
= get_frame_register_unsigned (this_frame
, HPPA_SP_REGNUM
);
647 if (IS_32BIT_TARGET (gdbarch
))
654 /* See /usr/include/machine/save_state.h for the structure of the
655 save_state_t structure. */
657 flag
= read_memory_unsigned_integer (scptr
+ HPPA_HPUX_SS_FLAGS_OFFSET
,
660 if (!(flag
& HPPA_HPUX_SS_WIDEREGS
))
662 /* Narrow registers. */
663 off
= scptr
+ HPPA_HPUX_SS_NARROW_OFFSET
;
669 /* Wide registers. */
670 off
= scptr
+ HPPA_HPUX_SS_WIDE_OFFSET
+ 8;
672 szoff
= (tdep
->bytes_per_address
== 4 ? 4 : 0);
675 for (i
= 1; i
< 32; i
++)
677 info
->saved_regs
[HPPA_R0_REGNUM
+ i
].addr
= off
+ szoff
;
681 for (i
= 0; i
< ARRAY_SIZE (hppa_hpux_tramp_reg
); i
++)
683 if (hppa_hpux_tramp_reg
[i
] > 0)
684 info
->saved_regs
[hppa_hpux_tramp_reg
[i
]].addr
= off
+ szoff
;
691 info
->base
= get_frame_register_unsigned (this_frame
, HPPA_SP_REGNUM
);
697 hppa_hpux_sigtramp_frame_this_id (struct frame_info
*this_frame
,
698 void **this_prologue_cache
,
699 struct frame_id
*this_id
)
701 struct hppa_hpux_sigtramp_unwind_cache
*info
702 = hppa_hpux_sigtramp_frame_unwind_cache (this_frame
, this_prologue_cache
);
704 *this_id
= frame_id_build (info
->base
, get_frame_pc (this_frame
));
707 static struct value
*
708 hppa_hpux_sigtramp_frame_prev_register (struct frame_info
*this_frame
,
709 void **this_prologue_cache
,
712 struct hppa_hpux_sigtramp_unwind_cache
*info
713 = hppa_hpux_sigtramp_frame_unwind_cache (this_frame
, this_prologue_cache
);
715 return hppa_frame_prev_register_helper (this_frame
,
716 info
->saved_regs
, regnum
);
720 hppa_hpux_sigtramp_unwind_sniffer (const struct frame_unwind
*self
,
721 struct frame_info
*this_frame
,
724 struct gdbarch
*gdbarch
= get_frame_arch (this_frame
);
725 enum bfd_endian byte_order
= gdbarch_byte_order (gdbarch
);
726 struct unwind_table_entry
*u
;
727 CORE_ADDR pc
= get_frame_pc (this_frame
);
729 u
= find_unwind_entry (pc
);
731 /* If this is an export stub, try to get the unwind descriptor for
732 the actual function itself. */
733 if (u
&& u
->stub_unwind
.stub_type
== EXPORT
)
735 gdb_byte buf
[HPPA_INSN_SIZE
];
738 if (!safe_frame_unwind_memory (this_frame
, u
->region_start
,
742 insn
= extract_unsigned_integer (buf
, sizeof buf
, byte_order
);
743 if ((insn
& 0xffe0e000) == 0xe8400000)
744 u
= find_unwind_entry(u
->region_start
+ hppa_extract_17 (insn
) + 8);
747 if (u
&& u
->HP_UX_interrupt_marker
)
753 static const struct frame_unwind hppa_hpux_sigtramp_frame_unwind
= {
755 default_frame_unwind_stop_reason
,
756 hppa_hpux_sigtramp_frame_this_id
,
757 hppa_hpux_sigtramp_frame_prev_register
,
759 hppa_hpux_sigtramp_unwind_sniffer
763 hppa32_hpux_find_global_pointer (struct gdbarch
*gdbarch
,
764 struct value
*function
)
766 enum bfd_endian byte_order
= gdbarch_byte_order (gdbarch
);
769 faddr
= value_as_address (function
);
771 /* Is this a plabel? If so, dereference it to get the gp value. */
779 status
= target_read_memory (faddr
+ 4, buf
, sizeof (buf
));
781 return extract_unsigned_integer (buf
, sizeof (buf
), byte_order
);
784 return gdbarch_tdep (gdbarch
)->solib_get_got_by_pc (faddr
);
788 hppa64_hpux_find_global_pointer (struct gdbarch
*gdbarch
,
789 struct value
*function
)
791 enum bfd_endian byte_order
= gdbarch_byte_order (gdbarch
);
795 faddr
= value_as_address (function
);
797 if (in_opd_section (faddr
))
799 target_read_memory (faddr
, buf
, sizeof (buf
));
800 return extract_unsigned_integer (&buf
[24], 8, byte_order
);
804 return gdbarch_tdep (gdbarch
)->solib_get_got_by_pc (faddr
);
808 static unsigned int ldsid_pattern
[] = {
809 0x000010a0, /* ldsid (rX),rY */
810 0x00001820, /* mtsp rY,sr0 */
811 0xe0000000 /* be,n (sr0,rX) */
815 hppa_hpux_search_pattern (struct gdbarch
*gdbarch
,
816 CORE_ADDR start
, CORE_ADDR end
,
817 unsigned int *patterns
, int count
)
819 enum bfd_endian byte_order
= gdbarch_byte_order (gdbarch
);
820 int num_insns
= (end
- start
+ HPPA_INSN_SIZE
) / HPPA_INSN_SIZE
;
825 buf
= alloca (num_insns
* HPPA_INSN_SIZE
);
826 insns
= alloca (num_insns
* sizeof (unsigned int));
828 read_memory (start
, buf
, num_insns
* HPPA_INSN_SIZE
);
829 for (i
= 0; i
< num_insns
; i
++, buf
+= HPPA_INSN_SIZE
)
830 insns
[i
] = extract_unsigned_integer (buf
, HPPA_INSN_SIZE
, byte_order
);
832 for (offset
= 0; offset
<= num_insns
- count
; offset
++)
834 for (i
= 0; i
< count
; i
++)
836 if ((insns
[offset
+ i
] & patterns
[i
]) != patterns
[i
])
843 if (offset
<= num_insns
- count
)
844 return start
+ offset
* HPPA_INSN_SIZE
;
850 hppa32_hpux_search_dummy_call_sequence (struct gdbarch
*gdbarch
, CORE_ADDR pc
,
853 enum bfd_endian byte_order
= gdbarch_byte_order (gdbarch
);
855 struct obj_section
*sec
;
856 struct hppa_objfile_private
*priv
;
857 struct frame_info
*frame
;
858 struct unwind_table_entry
*u
;
863 sec
= find_pc_section (pc
);
865 priv
= objfile_data (obj
, hppa_objfile_priv_data
);
868 priv
= hppa_init_objfile_priv_data (obj
);
870 error (_("Internal error creating objfile private data."));
872 /* Use the cached value if we have one. */
873 if (priv
->dummy_call_sequence_addr
!= 0)
875 *argreg
= priv
->dummy_call_sequence_reg
;
876 return priv
->dummy_call_sequence_addr
;
879 /* First try a heuristic; if we are in a shared library call, our return
880 pointer is likely to point at an export stub. */
881 frame
= get_current_frame ();
882 rp
= frame_unwind_register_unsigned (frame
, 2);
883 u
= find_unwind_entry (rp
);
884 if (u
&& u
->stub_unwind
.stub_type
== EXPORT
)
886 addr
= hppa_hpux_search_pattern (gdbarch
,
887 u
->region_start
, u
->region_end
,
889 ARRAY_SIZE (ldsid_pattern
));
894 /* Next thing to try is to look for an export stub. */
895 if (priv
->unwind_info
)
899 for (i
= 0; i
< priv
->unwind_info
->last
; i
++)
901 struct unwind_table_entry
*u
;
902 u
= &priv
->unwind_info
->table
[i
];
903 if (u
->stub_unwind
.stub_type
== EXPORT
)
905 addr
= hppa_hpux_search_pattern (gdbarch
,
906 u
->region_start
, u
->region_end
,
908 ARRAY_SIZE (ldsid_pattern
));
917 /* Finally, if this is the main executable, try to locate a sequence
919 addr
= hppa_symbol_address ("noshlibs");
920 sec
= find_pc_section (addr
);
922 if (sec
&& sec
->objfile
== obj
)
924 CORE_ADDR start
, end
;
926 find_pc_partial_function (addr
, NULL
, &start
, &end
);
927 if (start
!= 0 && end
!= 0)
929 addr
= hppa_hpux_search_pattern (gdbarch
, start
, end
, ldsid_pattern
,
930 ARRAY_SIZE (ldsid_pattern
));
936 /* Can't find a suitable sequence. */
940 target_read_memory (addr
, buf
, sizeof (buf
));
941 insn
= extract_unsigned_integer (buf
, sizeof (buf
), byte_order
);
942 priv
->dummy_call_sequence_addr
= addr
;
943 priv
->dummy_call_sequence_reg
= (insn
>> 21) & 0x1f;
945 *argreg
= priv
->dummy_call_sequence_reg
;
946 return priv
->dummy_call_sequence_addr
;
950 hppa64_hpux_search_dummy_call_sequence (struct gdbarch
*gdbarch
, CORE_ADDR pc
,
953 enum bfd_endian byte_order
= gdbarch_byte_order (gdbarch
);
955 struct obj_section
*sec
;
956 struct hppa_objfile_private
*priv
;
958 struct minimal_symbol
*msym
;
960 sec
= find_pc_section (pc
);
962 priv
= objfile_data (obj
, hppa_objfile_priv_data
);
965 priv
= hppa_init_objfile_priv_data (obj
);
967 error (_("Internal error creating objfile private data."));
969 /* Use the cached value if we have one. */
970 if (priv
->dummy_call_sequence_addr
!= 0)
972 *argreg
= priv
->dummy_call_sequence_reg
;
973 return priv
->dummy_call_sequence_addr
;
976 /* FIXME: Without stub unwind information, locating a suitable sequence is
977 fairly difficult. For now, we implement a very naive and inefficient
978 scheme; try to read in blocks of code, and look for a "bve,n (rp)"
979 instruction. These are likely to occur at the end of functions, so
980 we only look at the last two instructions of each function. */
981 ALL_OBJFILE_MSYMBOLS (obj
, msym
)
983 CORE_ADDR begin
, end
;
985 gdb_byte buf
[2 * HPPA_INSN_SIZE
];
988 find_pc_partial_function (SYMBOL_VALUE_ADDRESS (msym
), &name
,
991 if (name
== NULL
|| begin
== 0 || end
== 0)
994 if (target_read_memory (end
- sizeof (buf
), buf
, sizeof (buf
)) == 0)
996 for (offset
= 0; offset
< sizeof (buf
); offset
++)
1000 insn
= extract_unsigned_integer (buf
+ offset
,
1001 HPPA_INSN_SIZE
, byte_order
);
1002 if (insn
== 0xe840d002) /* bve,n (rp) */
1004 addr
= (end
- sizeof (buf
)) + offset
;
1011 /* Can't find a suitable sequence. */
1015 priv
->dummy_call_sequence_addr
= addr
;
1016 /* Right now we only look for a "bve,l (rp)" sequence, so the register is
1017 always HPPA_RP_REGNUM. */
1018 priv
->dummy_call_sequence_reg
= HPPA_RP_REGNUM
;
1020 *argreg
= priv
->dummy_call_sequence_reg
;
1021 return priv
->dummy_call_sequence_addr
;
1025 hppa_hpux_find_import_stub_for_addr (CORE_ADDR funcaddr
)
1027 struct objfile
*objfile
;
1028 struct minimal_symbol
*funsym
, *stubsym
;
1031 funsym
= lookup_minimal_symbol_by_pc (funcaddr
);
1034 ALL_OBJFILES (objfile
)
1036 stubsym
= lookup_minimal_symbol_solib_trampoline
1037 (SYMBOL_LINKAGE_NAME (funsym
), objfile
);
1041 struct unwind_table_entry
*u
;
1043 u
= find_unwind_entry (SYMBOL_VALUE (stubsym
));
1045 || (u
->stub_unwind
.stub_type
!= IMPORT
1046 && u
->stub_unwind
.stub_type
!= IMPORT_SHLIB
))
1049 stubaddr
= SYMBOL_VALUE (stubsym
);
1051 /* If we found an IMPORT stub, then we can stop searching;
1052 if we found an IMPORT_SHLIB, we want to continue the search
1053 in the hopes that we will find an IMPORT stub. */
1054 if (u
->stub_unwind
.stub_type
== IMPORT
)
1063 hppa_hpux_sr_for_addr (struct gdbarch
*gdbarch
, CORE_ADDR addr
)
1066 /* The space register to use is encoded in the top 2 bits of the address. */
1067 sr
= addr
>> (gdbarch_tdep (gdbarch
)->bytes_per_address
* 8 - 2);
1072 hppa_hpux_find_dummy_bpaddr (CORE_ADDR addr
)
1074 /* In order for us to restore the space register to its starting state,
1075 we need the dummy trampoline to return to an instruction address in
1076 the same space as where we started the call. We used to place the
1077 breakpoint near the current pc, however, this breaks nested dummy calls
1078 as the nested call will hit the breakpoint address and terminate
1079 prematurely. Instead, we try to look for an address in the same space to
1082 This is similar in spirit to putting the breakpoint at the "entry point"
1083 of an executable. */
1085 struct obj_section
*sec
;
1086 struct unwind_table_entry
*u
;
1087 struct minimal_symbol
*msym
;
1090 sec
= find_pc_section (addr
);
1093 /* First try the lowest address in the section; we can use it as long
1094 as it is "regular" code (i.e. not a stub). */
1095 u
= find_unwind_entry (obj_section_addr (sec
));
1096 if (!u
|| u
->stub_unwind
.stub_type
== 0)
1097 return obj_section_addr (sec
);
1099 /* Otherwise, we need to find a symbol for a regular function. We
1100 do this by walking the list of msymbols in the objfile. The symbol
1101 we find should not be the same as the function that was passed in. */
1103 /* FIXME: this is broken, because we can find a function that will be
1104 called by the dummy call target function, which will still not
1107 find_pc_partial_function (addr
, NULL
, &func
, NULL
);
1108 ALL_OBJFILE_MSYMBOLS (sec
->objfile
, msym
)
1110 u
= find_unwind_entry (SYMBOL_VALUE_ADDRESS (msym
));
1111 if (func
!= SYMBOL_VALUE_ADDRESS (msym
)
1112 && (!u
|| u
->stub_unwind
.stub_type
== 0))
1113 return SYMBOL_VALUE_ADDRESS (msym
);
1117 warning (_("Cannot find suitable address to place dummy breakpoint; nested "
1118 "calls may fail."));
1123 hppa_hpux_push_dummy_code (struct gdbarch
*gdbarch
, CORE_ADDR sp
,
1125 struct value
**args
, int nargs
,
1126 struct type
*value_type
,
1127 CORE_ADDR
*real_pc
, CORE_ADDR
*bp_addr
,
1128 struct regcache
*regcache
)
1130 CORE_ADDR pc
, stubaddr
;
1133 pc
= regcache_read_pc (regcache
);
1135 /* Note: we don't want to pass a function descriptor here; push_dummy_call
1136 fills in the PIC register for us. */
1137 funcaddr
= gdbarch_convert_from_func_ptr_addr (gdbarch
, funcaddr
, NULL
);
1139 /* The simple case is where we call a function in the same space that we are
1140 currently in; in that case we don't really need to do anything. */
1141 if (hppa_hpux_sr_for_addr (gdbarch
, pc
)
1142 == hppa_hpux_sr_for_addr (gdbarch
, funcaddr
))
1144 /* Intraspace call. */
1145 *bp_addr
= hppa_hpux_find_dummy_bpaddr (pc
);
1146 *real_pc
= funcaddr
;
1147 regcache_cooked_write_unsigned (regcache
, HPPA_RP_REGNUM
, *bp_addr
);
1152 /* In order to make an interspace call, we need to go through a stub.
1153 gcc supplies an appropriate stub called "__gcc_plt_call", however, if
1154 an application is compiled with HP compilers then this stub is not
1155 available. We used to fallback to "__d_plt_call", however that stub
1156 is not entirely useful for us because it doesn't do an interspace
1157 return back to the caller. Also, on hppa64-hpux, there is no
1158 __gcc_plt_call available. In order to keep the code uniform, we
1159 instead don't use either of these stubs, but instead write our own
1162 A problem arises since the stack is located in a different space than
1163 code, so in order to branch to a stack stub, we will need to do an
1164 interspace branch. Previous versions of gdb did this by modifying code
1165 at the current pc and doing single-stepping to set the pcsq. Since this
1166 is highly undesirable, we use a different scheme:
1168 All we really need to do the branch to the stub is a short instruction
1179 Instead of writing these sequences ourselves, we can find it in
1180 the instruction stream that belongs to the current space. While this
1181 seems difficult at first, we are actually guaranteed to find the sequences
1185 - in export stubs for shared libraries
1186 - in the "noshlibs" routine in the main module
1189 - at the end of each "regular" function
1191 We cache the address of these sequences in the objfile's private data
1192 since these operations can potentially be quite expensive.
1195 - write a stack trampoline
1196 - look for a suitable instruction sequence in the current space
1197 - point the sequence at the trampoline
1198 - set the return address of the trampoline to the current space
1199 (see hppa_hpux_find_dummy_call_bpaddr)
1200 - set the continuing address of the "dummy code" as the sequence. */
1202 if (IS_32BIT_TARGET (gdbarch
))
1204 static unsigned int hppa32_tramp
[] = {
1205 0x0fdf1291, /* stw r31,-8(,sp) */
1206 0x02c010a1, /* ldsid (,r22),r1 */
1207 0x00011820, /* mtsp r1,sr0 */
1208 0xe6c00000, /* be,l 0(sr0,r22),%sr0,%r31 */
1209 0x081f0242, /* copy r31,rp */
1210 0x0fd11082, /* ldw -8(,sp),rp */
1211 0x004010a1, /* ldsid (,rp),r1 */
1212 0x00011820, /* mtsp r1,sr0 */
1213 0xe0400000, /* be 0(sr0,rp) */
1214 0x08000240 /* nop */
1217 /* for hppa32, we must call the function through a stub so that on
1218 return it can return to the space of our trampoline. */
1219 stubaddr
= hppa_hpux_find_import_stub_for_addr (funcaddr
);
1221 error (_("Cannot call external function not referenced by application "
1222 "(no import stub).\n"));
1223 regcache_cooked_write_unsigned (regcache
, 22, stubaddr
);
1225 write_memory (sp
, (char *)&hppa32_tramp
, sizeof (hppa32_tramp
));
1227 *bp_addr
= hppa_hpux_find_dummy_bpaddr (pc
);
1228 regcache_cooked_write_unsigned (regcache
, 31, *bp_addr
);
1230 *real_pc
= hppa32_hpux_search_dummy_call_sequence (gdbarch
, pc
, &argreg
);
1232 error (_("Cannot make interspace call from here."));
1234 regcache_cooked_write_unsigned (regcache
, argreg
, sp
);
1236 sp
+= sizeof (hppa32_tramp
);
1240 static unsigned int hppa64_tramp
[] = {
1241 0xeac0f000, /* bve,l (r22),%r2 */
1242 0x0fdf12d1, /* std r31,-8(,sp) */
1243 0x0fd110c2, /* ldd -8(,sp),rp */
1244 0xe840d002, /* bve,n (rp) */
1245 0x08000240 /* nop */
1248 /* for hppa64, we don't need to call through a stub; all functions
1249 return via a bve. */
1250 regcache_cooked_write_unsigned (regcache
, 22, funcaddr
);
1251 write_memory (sp
, (char *)&hppa64_tramp
, sizeof (hppa64_tramp
));
1254 regcache_cooked_write_unsigned (regcache
, 31, *bp_addr
);
1256 *real_pc
= hppa64_hpux_search_dummy_call_sequence (gdbarch
, pc
, &argreg
);
1258 error (_("Cannot make interspace call from here."));
1260 regcache_cooked_write_unsigned (regcache
, argreg
, sp
);
1262 sp
+= sizeof (hppa64_tramp
);
1265 sp
= gdbarch_frame_align (gdbarch
, sp
);
1273 hppa_hpux_supply_ss_narrow (struct regcache
*regcache
,
1274 int regnum
, const char *save_state
)
1276 const char *ss_narrow
= save_state
+ HPPA_HPUX_SS_NARROW_OFFSET
;
1279 for (i
= HPPA_R1_REGNUM
; i
< HPPA_FP0_REGNUM
; i
++)
1281 if (regnum
== i
|| regnum
== -1)
1282 regcache_raw_supply (regcache
, i
, ss_narrow
+ offset
);
1289 hppa_hpux_supply_ss_fpblock (struct regcache
*regcache
,
1290 int regnum
, const char *save_state
)
1292 const char *ss_fpblock
= save_state
+ HPPA_HPUX_SS_FPBLOCK_OFFSET
;
1295 /* FIXME: We view the floating-point state as 64 single-precision
1296 registers for 32-bit code, and 32 double-precision register for
1297 64-bit code. This distinction is artificial and should be
1298 eliminated. If that ever happens, we should remove the if-clause
1301 if (register_size (get_regcache_arch (regcache
), HPPA_FP0_REGNUM
) == 4)
1303 for (i
= HPPA_FP0_REGNUM
; i
< HPPA_FP0_REGNUM
+ 64; i
++)
1305 if (regnum
== i
|| regnum
== -1)
1306 regcache_raw_supply (regcache
, i
, ss_fpblock
+ offset
);
1313 for (i
= HPPA_FP0_REGNUM
; i
< HPPA_FP0_REGNUM
+ 32; i
++)
1315 if (regnum
== i
|| regnum
== -1)
1316 regcache_raw_supply (regcache
, i
, ss_fpblock
+ offset
);
1324 hppa_hpux_supply_ss_wide (struct regcache
*regcache
,
1325 int regnum
, const char *save_state
)
1327 const char *ss_wide
= save_state
+ HPPA_HPUX_SS_WIDE_OFFSET
;
1330 if (register_size (get_regcache_arch (regcache
), HPPA_R1_REGNUM
) == 4)
1333 for (i
= HPPA_R1_REGNUM
; i
< HPPA_FP0_REGNUM
; i
++)
1335 if (regnum
== i
|| regnum
== -1)
1336 regcache_raw_supply (regcache
, i
, ss_wide
+ offset
);
1343 hppa_hpux_supply_save_state (const struct regset
*regset
,
1344 struct regcache
*regcache
,
1345 int regnum
, const void *regs
, size_t len
)
1347 struct gdbarch
*gdbarch
= get_regcache_arch (regcache
);
1348 enum bfd_endian byte_order
= gdbarch_byte_order (gdbarch
);
1349 const char *proc_info
= regs
;
1350 const char *save_state
= proc_info
+ 8;
1353 flags
= extract_unsigned_integer (save_state
+ HPPA_HPUX_SS_FLAGS_OFFSET
,
1355 if (regnum
== -1 || regnum
== HPPA_FLAGS_REGNUM
)
1357 size_t size
= register_size (gdbarch
, HPPA_FLAGS_REGNUM
);
1360 store_unsigned_integer (buf
, size
, byte_order
, flags
);
1361 regcache_raw_supply (regcache
, HPPA_FLAGS_REGNUM
, buf
);
1364 /* If the SS_WIDEREGS flag is set, we really do need the full
1365 `struct save_state'. */
1366 if (flags
& HPPA_HPUX_SS_WIDEREGS
&& len
< HPPA_HPUX_SAVE_STATE_SIZE
)
1367 error (_("Register set contents too small"));
1369 if (flags
& HPPA_HPUX_SS_WIDEREGS
)
1370 hppa_hpux_supply_ss_wide (regcache
, regnum
, save_state
);
1372 hppa_hpux_supply_ss_narrow (regcache
, regnum
, save_state
);
1374 hppa_hpux_supply_ss_fpblock (regcache
, regnum
, save_state
);
1377 /* HP-UX register set. */
1379 static struct regset hppa_hpux_regset
=
1382 hppa_hpux_supply_save_state
1385 static const struct regset
*
1386 hppa_hpux_regset_from_core_section (struct gdbarch
*gdbarch
,
1387 const char *sect_name
, size_t sect_size
)
1389 if (strcmp (sect_name
, ".reg") == 0
1390 && sect_size
>= HPPA_HPUX_PA89_SAVE_STATE_SIZE
+ 8)
1391 return &hppa_hpux_regset
;
1397 /* Bit in the `ss_flag' member of `struct save_state' that indicates
1398 the state was saved from a system call. From
1399 <machine/save_state.h>. */
1400 #define HPPA_HPUX_SS_INSYSCALL 0x02
1403 hppa_hpux_read_pc (struct regcache
*regcache
)
1407 /* If we're currently in a system call return the contents of %r31. */
1408 regcache_cooked_read_unsigned (regcache
, HPPA_FLAGS_REGNUM
, &flags
);
1409 if (flags
& HPPA_HPUX_SS_INSYSCALL
)
1412 regcache_cooked_read_unsigned (regcache
, HPPA_R31_REGNUM
, &pc
);
1416 return hppa_read_pc (regcache
);
1420 hppa_hpux_write_pc (struct regcache
*regcache
, CORE_ADDR pc
)
1424 /* If we're currently in a system call also write PC into %r31. */
1425 regcache_cooked_read_unsigned (regcache
, HPPA_FLAGS_REGNUM
, &flags
);
1426 if (flags
& HPPA_HPUX_SS_INSYSCALL
)
1427 regcache_cooked_write_unsigned (regcache
, HPPA_R31_REGNUM
, pc
| 0x3);
1429 hppa_write_pc (regcache
, pc
);
1433 hppa_hpux_unwind_pc (struct gdbarch
*gdbarch
, struct frame_info
*next_frame
)
1437 /* If we're currently in a system call return the contents of %r31. */
1438 flags
= frame_unwind_register_unsigned (next_frame
, HPPA_FLAGS_REGNUM
);
1439 if (flags
& HPPA_HPUX_SS_INSYSCALL
)
1440 return frame_unwind_register_unsigned (next_frame
, HPPA_R31_REGNUM
) & ~0x3;
1442 return hppa_unwind_pc (gdbarch
, next_frame
);
1446 /* Given the current value of the pc, check to see if it is inside a stub, and
1447 if so, change the value of the pc to point to the caller of the stub.
1448 THIS_FRAME is the current frame in the current list of frames.
1449 BASE contains to stack frame base of the current frame.
1450 SAVE_REGS is the register file stored in the frame cache. */
1452 hppa_hpux_unwind_adjust_stub (struct frame_info
*this_frame
, CORE_ADDR base
,
1453 struct trad_frame_saved_reg
*saved_regs
)
1455 struct gdbarch
*gdbarch
= get_frame_arch (this_frame
);
1456 enum bfd_endian byte_order
= gdbarch_byte_order (gdbarch
);
1457 int word_size
= gdbarch_ptr_bit (gdbarch
) / 8;
1458 struct value
*pcoq_head_val
;
1461 struct unwind_table_entry
*u
;
1463 pcoq_head_val
= trad_frame_get_prev_register (this_frame
, saved_regs
,
1464 HPPA_PCOQ_HEAD_REGNUM
);
1466 extract_unsigned_integer (value_contents_all (pcoq_head_val
),
1467 register_size (gdbarch
, HPPA_PCOQ_HEAD_REGNUM
),
1470 u
= find_unwind_entry (pcoq_head
);
1471 if (u
&& u
->stub_unwind
.stub_type
== EXPORT
)
1473 stubpc
= read_memory_integer (base
- 24, word_size
, byte_order
);
1474 trad_frame_set_value (saved_regs
, HPPA_PCOQ_HEAD_REGNUM
, stubpc
);
1476 else if (hppa_symbol_address ("__gcc_plt_call")
1477 == get_pc_function_start (pcoq_head
))
1479 stubpc
= read_memory_integer (base
- 8, word_size
, byte_order
);
1480 trad_frame_set_value (saved_regs
, HPPA_PCOQ_HEAD_REGNUM
, stubpc
);
1485 hppa_hpux_init_abi (struct gdbarch_info info
, struct gdbarch
*gdbarch
)
1487 struct gdbarch_tdep
*tdep
= gdbarch_tdep (gdbarch
);
1489 if (IS_32BIT_TARGET (gdbarch
))
1490 tdep
->in_solib_call_trampoline
= hppa32_hpux_in_solib_call_trampoline
;
1492 tdep
->in_solib_call_trampoline
= hppa64_hpux_in_solib_call_trampoline
;
1494 tdep
->unwind_adjust_stub
= hppa_hpux_unwind_adjust_stub
;
1496 set_gdbarch_in_solib_return_trampoline
1497 (gdbarch
, hppa_hpux_in_solib_return_trampoline
);
1498 set_gdbarch_skip_trampoline_code (gdbarch
, hppa_hpux_skip_trampoline_code
);
1500 set_gdbarch_push_dummy_code (gdbarch
, hppa_hpux_push_dummy_code
);
1501 set_gdbarch_call_dummy_location (gdbarch
, ON_STACK
);
1503 set_gdbarch_read_pc (gdbarch
, hppa_hpux_read_pc
);
1504 set_gdbarch_write_pc (gdbarch
, hppa_hpux_write_pc
);
1505 set_gdbarch_unwind_pc (gdbarch
, hppa_hpux_unwind_pc
);
1506 set_gdbarch_skip_permanent_breakpoint
1507 (gdbarch
, hppa_skip_permanent_breakpoint
);
1509 set_gdbarch_regset_from_core_section
1510 (gdbarch
, hppa_hpux_regset_from_core_section
);
1512 frame_unwind_append_unwinder (gdbarch
, &hppa_hpux_sigtramp_frame_unwind
);
1516 hppa_hpux_som_init_abi (struct gdbarch_info info
, struct gdbarch
*gdbarch
)
1518 struct gdbarch_tdep
*tdep
= gdbarch_tdep (gdbarch
);
1522 tdep
->find_global_pointer
= hppa32_hpux_find_global_pointer
;
1524 hppa_hpux_init_abi (info
, gdbarch
);
1525 som_solib_select (gdbarch
);
1529 hppa_hpux_elf_init_abi (struct gdbarch_info info
, struct gdbarch
*gdbarch
)
1531 struct gdbarch_tdep
*tdep
= gdbarch_tdep (gdbarch
);
1534 tdep
->find_global_pointer
= hppa64_hpux_find_global_pointer
;
1536 hppa_hpux_init_abi (info
, gdbarch
);
1537 pa64_solib_select (gdbarch
);
1540 static enum gdb_osabi
1541 hppa_hpux_core_osabi_sniffer (bfd
*abfd
)
1543 if (strcmp (bfd_get_target (abfd
), "hpux-core") == 0)
1544 return GDB_OSABI_HPUX_SOM
;
1545 else if (strcmp (bfd_get_target (abfd
), "elf64-hppa") == 0)
1549 section
= bfd_get_section_by_name (abfd
, ".kernel");
1555 size
= bfd_section_size (abfd
, section
);
1556 contents
= alloca (size
);
1557 if (bfd_get_section_contents (abfd
, section
, contents
,
1559 && strcmp (contents
, "HP-UX") == 0)
1560 return GDB_OSABI_HPUX_ELF
;
1564 return GDB_OSABI_UNKNOWN
;
1568 _initialize_hppa_hpux_tdep (void)
1570 /* BFD doesn't set a flavour for HP-UX style core files. It doesn't
1571 set the architecture either. */
1572 gdbarch_register_osabi_sniffer (bfd_arch_unknown
,
1573 bfd_target_unknown_flavour
,
1574 hppa_hpux_core_osabi_sniffer
);
1575 gdbarch_register_osabi_sniffer (bfd_arch_hppa
,
1576 bfd_target_elf_flavour
,
1577 hppa_hpux_core_osabi_sniffer
);
1579 gdbarch_register_osabi (bfd_arch_hppa
, 0, GDB_OSABI_HPUX_SOM
,
1580 hppa_hpux_som_init_abi
);
1581 gdbarch_register_osabi (bfd_arch_hppa
, bfd_mach_hppa20w
, GDB_OSABI_HPUX_ELF
,
1582 hppa_hpux_elf_init_abi
);