solib-svr4.c revision 1.9 1 1.1 christos /* Handle SVR4 shared libraries for GDB, the GNU Debugger.
2 1.1 christos
3 1.9 christos Copyright (C) 1990-2020 Free Software Foundation, Inc.
4 1.1 christos
5 1.1 christos This file is part of GDB.
6 1.1 christos
7 1.1 christos This program is free software; you can redistribute it and/or modify
8 1.1 christos it under the terms of the GNU General Public License as published by
9 1.1 christos the Free Software Foundation; either version 3 of the License, or
10 1.1 christos (at your option) any later version.
11 1.1 christos
12 1.1 christos This program is distributed in the hope that it will be useful,
13 1.1 christos but WITHOUT ANY WARRANTY; without even the implied warranty of
14 1.1 christos MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 1.1 christos GNU General Public License for more details.
16 1.1 christos
17 1.1 christos You should have received a copy of the GNU General Public License
18 1.1 christos along with this program. If not, see <http://www.gnu.org/licenses/>. */
19 1.1 christos
20 1.1 christos #include "defs.h"
21 1.1 christos
22 1.1 christos #include "elf/external.h"
23 1.1 christos #include "elf/common.h"
24 1.1 christos #include "elf/mips.h"
25 1.1 christos
26 1.1 christos #include "symtab.h"
27 1.1 christos #include "bfd.h"
28 1.1 christos #include "symfile.h"
29 1.1 christos #include "objfiles.h"
30 1.1 christos #include "gdbcore.h"
31 1.1 christos #include "target.h"
32 1.1 christos #include "inferior.h"
33 1.3 christos #include "infrun.h"
34 1.1 christos #include "regcache.h"
35 1.1 christos #include "gdbthread.h"
36 1.8 christos #include "observable.h"
37 1.1 christos
38 1.1 christos #include "solist.h"
39 1.1 christos #include "solib.h"
40 1.1 christos #include "solib-svr4.h"
41 1.1 christos
42 1.1 christos #include "bfd-target.h"
43 1.1 christos #include "elf-bfd.h"
44 1.1 christos #include "exec.h"
45 1.1 christos #include "auxv.h"
46 1.1 christos #include "gdb_bfd.h"
47 1.1 christos #include "probe.h"
48 1.1 christos
49 1.1 christos static struct link_map_offsets *svr4_fetch_link_map_offsets (void);
50 1.1 christos static int svr4_have_link_map_offsets (void);
51 1.1 christos static void svr4_relocate_main_executable (void);
52 1.1 christos static void svr4_free_library_list (void *p_list);
53 1.9 christos static void probes_table_remove_objfile_probes (struct objfile *objfile);
54 1.9 christos static void svr4_iterate_over_objfiles_in_search_order (
55 1.9 christos struct gdbarch *gdbarch, iterate_over_objfiles_in_search_order_cb_ftype *cb,
56 1.9 christos void *cb_data, struct objfile *objfile);
57 1.9 christos
58 1.1 christos
59 1.1 christos /* On SVR4 systems, a list of symbols in the dynamic linker where
60 1.1 christos GDB can try to place a breakpoint to monitor shared library
61 1.1 christos events.
62 1.1 christos
63 1.1 christos If none of these symbols are found, or other errors occur, then
64 1.1 christos SVR4 systems will fall back to using a symbol as the "startup
65 1.1 christos mapping complete" breakpoint address. */
66 1.1 christos
67 1.1 christos static const char * const solib_break_names[] =
68 1.1 christos {
69 1.1 christos "r_debug_state",
70 1.1 christos "_r_debug_state",
71 1.1 christos "_dl_debug_state",
72 1.1 christos "rtld_db_dlactivity",
73 1.1 christos "__dl_rtld_db_dlactivity",
74 1.1 christos "_rtld_debug_state",
75 1.1 christos
76 1.1 christos NULL
77 1.1 christos };
78 1.1 christos
79 1.1 christos static const char * const bkpt_names[] =
80 1.1 christos {
81 1.1 christos "_start",
82 1.1 christos "__start",
83 1.1 christos "main",
84 1.1 christos NULL
85 1.1 christos };
86 1.1 christos
87 1.1 christos static const char * const main_name_list[] =
88 1.1 christos {
89 1.1 christos "main_$main",
90 1.1 christos NULL
91 1.1 christos };
92 1.1 christos
93 1.1 christos /* What to do when a probe stop occurs. */
94 1.1 christos
95 1.1 christos enum probe_action
96 1.1 christos {
97 1.1 christos /* Something went seriously wrong. Stop using probes and
98 1.1 christos revert to using the older interface. */
99 1.1 christos PROBES_INTERFACE_FAILED,
100 1.1 christos
101 1.1 christos /* No action is required. The shared object list is still
102 1.1 christos valid. */
103 1.1 christos DO_NOTHING,
104 1.1 christos
105 1.1 christos /* The shared object list should be reloaded entirely. */
106 1.1 christos FULL_RELOAD,
107 1.1 christos
108 1.1 christos /* Attempt to incrementally update the shared object list. If
109 1.1 christos the update fails or is not possible, fall back to reloading
110 1.1 christos the list in full. */
111 1.1 christos UPDATE_OR_RELOAD,
112 1.1 christos };
113 1.1 christos
114 1.1 christos /* A probe's name and its associated action. */
115 1.1 christos
116 1.1 christos struct probe_info
117 1.1 christos {
118 1.1 christos /* The name of the probe. */
119 1.1 christos const char *name;
120 1.1 christos
121 1.1 christos /* What to do when a probe stop occurs. */
122 1.1 christos enum probe_action action;
123 1.1 christos };
124 1.1 christos
125 1.1 christos /* A list of named probes and their associated actions. If all
126 1.1 christos probes are present in the dynamic linker then the probes-based
127 1.1 christos interface will be used. */
128 1.1 christos
129 1.1 christos static const struct probe_info probe_info[] =
130 1.1 christos {
131 1.1 christos { "init_start", DO_NOTHING },
132 1.1 christos { "init_complete", FULL_RELOAD },
133 1.1 christos { "map_start", DO_NOTHING },
134 1.1 christos { "map_failed", DO_NOTHING },
135 1.1 christos { "reloc_complete", UPDATE_OR_RELOAD },
136 1.1 christos { "unmap_start", DO_NOTHING },
137 1.1 christos { "unmap_complete", FULL_RELOAD },
138 1.1 christos };
139 1.1 christos
140 1.1 christos #define NUM_PROBES ARRAY_SIZE (probe_info)
141 1.1 christos
142 1.1 christos /* Return non-zero if GDB_SO_NAME and INFERIOR_SO_NAME represent
143 1.1 christos the same shared library. */
144 1.1 christos
145 1.1 christos static int
146 1.1 christos svr4_same_1 (const char *gdb_so_name, const char *inferior_so_name)
147 1.1 christos {
148 1.1 christos if (strcmp (gdb_so_name, inferior_so_name) == 0)
149 1.1 christos return 1;
150 1.1 christos
151 1.1 christos /* On Solaris, when starting inferior we think that dynamic linker is
152 1.1 christos /usr/lib/ld.so.1, but later on, the table of loaded shared libraries
153 1.1 christos contains /lib/ld.so.1. Sometimes one file is a link to another, but
154 1.1 christos sometimes they have identical content, but are not linked to each
155 1.1 christos other. We don't restrict this check for Solaris, but the chances
156 1.1 christos of running into this situation elsewhere are very low. */
157 1.1 christos if (strcmp (gdb_so_name, "/usr/lib/ld.so.1") == 0
158 1.1 christos && strcmp (inferior_so_name, "/lib/ld.so.1") == 0)
159 1.1 christos return 1;
160 1.1 christos
161 1.8 christos /* Similarly, we observed the same issue with amd64 and sparcv9, but with
162 1.1 christos different locations. */
163 1.8 christos if (strcmp (gdb_so_name, "/usr/lib/amd64/ld.so.1") == 0
164 1.8 christos && strcmp (inferior_so_name, "/lib/amd64/ld.so.1") == 0)
165 1.8 christos return 1;
166 1.8 christos
167 1.1 christos if (strcmp (gdb_so_name, "/usr/lib/sparcv9/ld.so.1") == 0
168 1.1 christos && strcmp (inferior_so_name, "/lib/sparcv9/ld.so.1") == 0)
169 1.1 christos return 1;
170 1.1 christos
171 1.1 christos return 0;
172 1.1 christos }
173 1.1 christos
174 1.1 christos static int
175 1.1 christos svr4_same (struct so_list *gdb, struct so_list *inferior)
176 1.1 christos {
177 1.1 christos return (svr4_same_1 (gdb->so_original_name, inferior->so_original_name));
178 1.1 christos }
179 1.1 christos
180 1.8 christos static std::unique_ptr<lm_info_svr4>
181 1.1 christos lm_info_read (CORE_ADDR lm_addr)
182 1.1 christos {
183 1.1 christos struct link_map_offsets *lmo = svr4_fetch_link_map_offsets ();
184 1.8 christos std::unique_ptr<lm_info_svr4> lm_info;
185 1.1 christos
186 1.8 christos gdb::byte_vector lm (lmo->link_map_size);
187 1.1 christos
188 1.8 christos if (target_read_memory (lm_addr, lm.data (), lmo->link_map_size) != 0)
189 1.8 christos warning (_("Error reading shared library list entry at %s"),
190 1.8 christos paddress (target_gdbarch (), lm_addr));
191 1.1 christos else
192 1.1 christos {
193 1.1 christos struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
194 1.1 christos
195 1.8 christos lm_info.reset (new lm_info_svr4);
196 1.1 christos lm_info->lm_addr = lm_addr;
197 1.1 christos
198 1.1 christos lm_info->l_addr_inferior = extract_typed_address (&lm[lmo->l_addr_offset],
199 1.1 christos ptr_type);
200 1.1 christos lm_info->l_ld = extract_typed_address (&lm[lmo->l_ld_offset], ptr_type);
201 1.1 christos lm_info->l_next = extract_typed_address (&lm[lmo->l_next_offset],
202 1.1 christos ptr_type);
203 1.1 christos lm_info->l_prev = extract_typed_address (&lm[lmo->l_prev_offset],
204 1.1 christos ptr_type);
205 1.1 christos lm_info->l_name = extract_typed_address (&lm[lmo->l_name_offset],
206 1.1 christos ptr_type);
207 1.1 christos }
208 1.1 christos
209 1.1 christos return lm_info;
210 1.1 christos }
211 1.1 christos
212 1.1 christos static int
213 1.1 christos has_lm_dynamic_from_link_map (void)
214 1.1 christos {
215 1.1 christos struct link_map_offsets *lmo = svr4_fetch_link_map_offsets ();
216 1.1 christos
217 1.1 christos return lmo->l_ld_offset >= 0;
218 1.1 christos }
219 1.1 christos
220 1.1 christos static CORE_ADDR
221 1.1 christos lm_addr_check (const struct so_list *so, bfd *abfd)
222 1.1 christos {
223 1.8 christos lm_info_svr4 *li = (lm_info_svr4 *) so->lm_info;
224 1.8 christos
225 1.8 christos if (!li->l_addr_p)
226 1.1 christos {
227 1.1 christos struct bfd_section *dyninfo_sect;
228 1.1 christos CORE_ADDR l_addr, l_dynaddr, dynaddr;
229 1.1 christos
230 1.8 christos l_addr = li->l_addr_inferior;
231 1.1 christos
232 1.1 christos if (! abfd || ! has_lm_dynamic_from_link_map ())
233 1.1 christos goto set_addr;
234 1.1 christos
235 1.8 christos l_dynaddr = li->l_ld;
236 1.1 christos
237 1.1 christos dyninfo_sect = bfd_get_section_by_name (abfd, ".dynamic");
238 1.1 christos if (dyninfo_sect == NULL)
239 1.1 christos goto set_addr;
240 1.1 christos
241 1.9 christos dynaddr = bfd_section_vma (dyninfo_sect);
242 1.1 christos
243 1.1 christos if (dynaddr + l_addr != l_dynaddr)
244 1.1 christos {
245 1.1 christos CORE_ADDR align = 0x1000;
246 1.1 christos CORE_ADDR minpagesize = align;
247 1.1 christos
248 1.1 christos if (bfd_get_flavour (abfd) == bfd_target_elf_flavour)
249 1.1 christos {
250 1.1 christos Elf_Internal_Ehdr *ehdr = elf_tdata (abfd)->elf_header;
251 1.1 christos Elf_Internal_Phdr *phdr = elf_tdata (abfd)->phdr;
252 1.1 christos int i;
253 1.1 christos
254 1.1 christos align = 1;
255 1.1 christos
256 1.1 christos for (i = 0; i < ehdr->e_phnum; i++)
257 1.1 christos if (phdr[i].p_type == PT_LOAD && phdr[i].p_align > align)
258 1.1 christos align = phdr[i].p_align;
259 1.1 christos
260 1.1 christos minpagesize = get_elf_backend_data (abfd)->minpagesize;
261 1.1 christos }
262 1.1 christos
263 1.1 christos /* Turn it into a mask. */
264 1.1 christos align--;
265 1.1 christos
266 1.1 christos /* If the changes match the alignment requirements, we
267 1.1 christos assume we're using a core file that was generated by the
268 1.1 christos same binary, just prelinked with a different base offset.
269 1.1 christos If it doesn't match, we may have a different binary, the
270 1.1 christos same binary with the dynamic table loaded at an unrelated
271 1.1 christos location, or anything, really. To avoid regressions,
272 1.1 christos don't adjust the base offset in the latter case, although
273 1.1 christos odds are that, if things really changed, debugging won't
274 1.1 christos quite work.
275 1.1 christos
276 1.1 christos One could expect more the condition
277 1.1 christos ((l_addr & align) == 0 && ((l_dynaddr - dynaddr) & align) == 0)
278 1.1 christos but the one below is relaxed for PPC. The PPC kernel supports
279 1.1 christos either 4k or 64k page sizes. To be prepared for 64k pages,
280 1.1 christos PPC ELF files are built using an alignment requirement of 64k.
281 1.1 christos However, when running on a kernel supporting 4k pages, the memory
282 1.1 christos mapping of the library may not actually happen on a 64k boundary!
283 1.1 christos
284 1.1 christos (In the usual case where (l_addr & align) == 0, this check is
285 1.1 christos equivalent to the possibly expected check above.)
286 1.1 christos
287 1.1 christos Even on PPC it must be zero-aligned at least for MINPAGESIZE. */
288 1.1 christos
289 1.1 christos l_addr = l_dynaddr - dynaddr;
290 1.1 christos
291 1.1 christos if ((l_addr & (minpagesize - 1)) == 0
292 1.1 christos && (l_addr & align) == ((l_dynaddr - dynaddr) & align))
293 1.1 christos {
294 1.1 christos if (info_verbose)
295 1.1 christos printf_unfiltered (_("Using PIC (Position Independent Code) "
296 1.1 christos "prelink displacement %s for \"%s\".\n"),
297 1.1 christos paddress (target_gdbarch (), l_addr),
298 1.1 christos so->so_name);
299 1.1 christos }
300 1.1 christos else
301 1.1 christos {
302 1.1 christos /* There is no way to verify the library file matches. prelink
303 1.1 christos can during prelinking of an unprelinked file (or unprelinking
304 1.1 christos of a prelinked file) shift the DYNAMIC segment by arbitrary
305 1.1 christos offset without any page size alignment. There is no way to
306 1.1 christos find out the ELF header and/or Program Headers for a limited
307 1.1 christos verification if it they match. One could do a verification
308 1.1 christos of the DYNAMIC segment. Still the found address is the best
309 1.1 christos one GDB could find. */
310 1.1 christos
311 1.1 christos warning (_(".dynamic section for \"%s\" "
312 1.1 christos "is not at the expected address "
313 1.1 christos "(wrong library or version mismatch?)"), so->so_name);
314 1.1 christos }
315 1.1 christos }
316 1.1 christos
317 1.1 christos set_addr:
318 1.8 christos li->l_addr = l_addr;
319 1.8 christos li->l_addr_p = 1;
320 1.1 christos }
321 1.1 christos
322 1.8 christos return li->l_addr;
323 1.1 christos }
324 1.1 christos
325 1.1 christos /* Per pspace SVR4 specific data. */
326 1.1 christos
327 1.1 christos struct svr4_info
328 1.1 christos {
329 1.9 christos svr4_info () = default;
330 1.9 christos ~svr4_info ();
331 1.9 christos
332 1.9 christos /* Base of dynamic linker structures. */
333 1.9 christos CORE_ADDR debug_base = 0;
334 1.1 christos
335 1.1 christos /* Validity flag for debug_loader_offset. */
336 1.9 christos int debug_loader_offset_p = 0;
337 1.1 christos
338 1.1 christos /* Load address for the dynamic linker, inferred. */
339 1.9 christos CORE_ADDR debug_loader_offset = 0;
340 1.1 christos
341 1.1 christos /* Name of the dynamic linker, valid if debug_loader_offset_p. */
342 1.9 christos char *debug_loader_name = nullptr;
343 1.1 christos
344 1.1 christos /* Load map address for the main executable. */
345 1.9 christos CORE_ADDR main_lm_addr = 0;
346 1.1 christos
347 1.9 christos CORE_ADDR interp_text_sect_low = 0;
348 1.9 christos CORE_ADDR interp_text_sect_high = 0;
349 1.9 christos CORE_ADDR interp_plt_sect_low = 0;
350 1.9 christos CORE_ADDR interp_plt_sect_high = 0;
351 1.1 christos
352 1.1 christos /* Nonzero if the list of objects was last obtained from the target
353 1.1 christos via qXfer:libraries-svr4:read. */
354 1.9 christos int using_xfer = 0;
355 1.1 christos
356 1.1 christos /* Table of struct probe_and_action instances, used by the
357 1.1 christos probes-based interface to map breakpoint addresses to probes
358 1.1 christos and their associated actions. Lookup is performed using
359 1.8 christos probe_and_action->prob->address. */
360 1.9 christos htab_up probes_table;
361 1.1 christos
362 1.1 christos /* List of objects loaded into the inferior, used by the probes-
363 1.1 christos based interface. */
364 1.9 christos struct so_list *solib_list = nullptr;
365 1.1 christos };
366 1.1 christos
367 1.1 christos /* Per-program-space data key. */
368 1.9 christos static const struct program_space_key<svr4_info> solib_svr4_pspace_data;
369 1.1 christos
370 1.1 christos /* Free the probes table. */
371 1.1 christos
372 1.1 christos static void
373 1.1 christos free_probes_table (struct svr4_info *info)
374 1.1 christos {
375 1.9 christos info->probes_table.reset (nullptr);
376 1.1 christos }
377 1.1 christos
378 1.1 christos /* Free the solib list. */
379 1.1 christos
380 1.1 christos static void
381 1.1 christos free_solib_list (struct svr4_info *info)
382 1.1 christos {
383 1.1 christos svr4_free_library_list (&info->solib_list);
384 1.1 christos info->solib_list = NULL;
385 1.1 christos }
386 1.1 christos
387 1.9 christos svr4_info::~svr4_info ()
388 1.1 christos {
389 1.9 christos free_solib_list (this);
390 1.1 christos }
391 1.1 christos
392 1.9 christos /* Get the svr4 data for program space PSPACE. If none is found yet, add it now.
393 1.9 christos This function always returns a valid object. */
394 1.1 christos
395 1.1 christos static struct svr4_info *
396 1.9 christos get_svr4_info (program_space *pspace)
397 1.1 christos {
398 1.9 christos struct svr4_info *info = solib_svr4_pspace_data.get (pspace);
399 1.1 christos
400 1.9 christos if (info == NULL)
401 1.9 christos info = solib_svr4_pspace_data.emplace (pspace);
402 1.1 christos
403 1.1 christos return info;
404 1.1 christos }
405 1.1 christos
406 1.1 christos /* Local function prototypes */
407 1.1 christos
408 1.1 christos static int match_main (const char *);
409 1.1 christos
410 1.1 christos /* Read program header TYPE from inferior memory. The header is found
411 1.8 christos by scanning the OS auxiliary vector.
412 1.1 christos
413 1.1 christos If TYPE == -1, return the program headers instead of the contents of
414 1.1 christos one program header.
415 1.1 christos
416 1.8 christos Return vector of bytes holding the program header contents, or an empty
417 1.8 christos optional on failure. If successful and P_ARCH_SIZE is non-NULL, the target
418 1.8 christos architecture size (32-bit or 64-bit) is returned to *P_ARCH_SIZE. Likewise,
419 1.8 christos the base address of the section is returned in *BASE_ADDR. */
420 1.8 christos
421 1.8 christos static gdb::optional<gdb::byte_vector>
422 1.8 christos read_program_header (int type, int *p_arch_size, CORE_ADDR *base_addr)
423 1.1 christos {
424 1.1 christos enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch ());
425 1.1 christos CORE_ADDR at_phdr, at_phent, at_phnum, pt_phdr = 0;
426 1.1 christos int arch_size, sect_size;
427 1.1 christos CORE_ADDR sect_addr;
428 1.1 christos int pt_phdr_p = 0;
429 1.1 christos
430 1.1 christos /* Get required auxv elements from target. */
431 1.8 christos if (target_auxv_search (current_top_target (), AT_PHDR, &at_phdr) <= 0)
432 1.8 christos return {};
433 1.8 christos if (target_auxv_search (current_top_target (), AT_PHENT, &at_phent) <= 0)
434 1.8 christos return {};
435 1.8 christos if (target_auxv_search (current_top_target (), AT_PHNUM, &at_phnum) <= 0)
436 1.8 christos return {};
437 1.1 christos if (!at_phdr || !at_phnum)
438 1.8 christos return {};
439 1.1 christos
440 1.1 christos /* Determine ELF architecture type. */
441 1.1 christos if (at_phent == sizeof (Elf32_External_Phdr))
442 1.1 christos arch_size = 32;
443 1.1 christos else if (at_phent == sizeof (Elf64_External_Phdr))
444 1.1 christos arch_size = 64;
445 1.1 christos else
446 1.8 christos return {};
447 1.1 christos
448 1.1 christos /* Find the requested segment. */
449 1.1 christos if (type == -1)
450 1.1 christos {
451 1.1 christos sect_addr = at_phdr;
452 1.1 christos sect_size = at_phent * at_phnum;
453 1.1 christos }
454 1.1 christos else if (arch_size == 32)
455 1.1 christos {
456 1.1 christos Elf32_External_Phdr phdr;
457 1.1 christos int i;
458 1.1 christos
459 1.1 christos /* Search for requested PHDR. */
460 1.1 christos for (i = 0; i < at_phnum; i++)
461 1.1 christos {
462 1.1 christos int p_type;
463 1.1 christos
464 1.1 christos if (target_read_memory (at_phdr + i * sizeof (phdr),
465 1.1 christos (gdb_byte *)&phdr, sizeof (phdr)))
466 1.8 christos return {};
467 1.1 christos
468 1.1 christos p_type = extract_unsigned_integer ((gdb_byte *) phdr.p_type,
469 1.1 christos 4, byte_order);
470 1.1 christos
471 1.1 christos if (p_type == PT_PHDR)
472 1.1 christos {
473 1.1 christos pt_phdr_p = 1;
474 1.1 christos pt_phdr = extract_unsigned_integer ((gdb_byte *) phdr.p_vaddr,
475 1.1 christos 4, byte_order);
476 1.1 christos }
477 1.1 christos
478 1.1 christos if (p_type == type)
479 1.1 christos break;
480 1.1 christos }
481 1.1 christos
482 1.1 christos if (i == at_phnum)
483 1.8 christos return {};
484 1.1 christos
485 1.1 christos /* Retrieve address and size. */
486 1.1 christos sect_addr = extract_unsigned_integer ((gdb_byte *)phdr.p_vaddr,
487 1.1 christos 4, byte_order);
488 1.1 christos sect_size = extract_unsigned_integer ((gdb_byte *)phdr.p_memsz,
489 1.1 christos 4, byte_order);
490 1.1 christos }
491 1.1 christos else
492 1.1 christos {
493 1.1 christos Elf64_External_Phdr phdr;
494 1.1 christos int i;
495 1.1 christos
496 1.1 christos /* Search for requested PHDR. */
497 1.1 christos for (i = 0; i < at_phnum; i++)
498 1.1 christos {
499 1.1 christos int p_type;
500 1.1 christos
501 1.1 christos if (target_read_memory (at_phdr + i * sizeof (phdr),
502 1.1 christos (gdb_byte *)&phdr, sizeof (phdr)))
503 1.8 christos return {};
504 1.1 christos
505 1.1 christos p_type = extract_unsigned_integer ((gdb_byte *) phdr.p_type,
506 1.1 christos 4, byte_order);
507 1.1 christos
508 1.1 christos if (p_type == PT_PHDR)
509 1.1 christos {
510 1.1 christos pt_phdr_p = 1;
511 1.1 christos pt_phdr = extract_unsigned_integer ((gdb_byte *) phdr.p_vaddr,
512 1.1 christos 8, byte_order);
513 1.1 christos }
514 1.1 christos
515 1.1 christos if (p_type == type)
516 1.1 christos break;
517 1.1 christos }
518 1.1 christos
519 1.1 christos if (i == at_phnum)
520 1.8 christos return {};
521 1.1 christos
522 1.1 christos /* Retrieve address and size. */
523 1.1 christos sect_addr = extract_unsigned_integer ((gdb_byte *)phdr.p_vaddr,
524 1.1 christos 8, byte_order);
525 1.1 christos sect_size = extract_unsigned_integer ((gdb_byte *)phdr.p_memsz,
526 1.1 christos 8, byte_order);
527 1.1 christos }
528 1.1 christos
529 1.1 christos /* PT_PHDR is optional, but we really need it
530 1.1 christos for PIE to make this work in general. */
531 1.1 christos
532 1.1 christos if (pt_phdr_p)
533 1.1 christos {
534 1.1 christos /* at_phdr is real address in memory. pt_phdr is what pheader says it is.
535 1.1 christos Relocation offset is the difference between the two. */
536 1.1 christos sect_addr = sect_addr + (at_phdr - pt_phdr);
537 1.1 christos }
538 1.1 christos
539 1.1 christos /* Read in requested program header. */
540 1.8 christos gdb::byte_vector buf (sect_size);
541 1.8 christos if (target_read_memory (sect_addr, buf.data (), sect_size))
542 1.8 christos return {};
543 1.1 christos
544 1.9 christos #if defined(__NetBSD__) && defined(__m68k__)
545 1.9 christos /*
546 1.9 christos * XXX PR toolchain/56268
547 1.9 christos *
548 1.9 christos * For NetBSD/m68k, program header is erroneously readable from core dump,
549 1.9 christos * although a page containing it is missing. This spoils relocation for
550 1.9 christos * the main executable, and debugging with core dumps becomes impossible,
551 1.9 christos * as described in toolchain/56268.
552 1.9 christos *
553 1.9 christos * In order to avoid this failure, we carry out consistency check for
554 1.9 christos * program header; for NetBSD, 1st entry of program header refers program
555 1.9 christos * header itself. If this is not the case, we should be reading random
556 1.9 christos * garbage from core dump.
557 1.9 christos */
558 1.9 christos if (type == -1 && arch_size == 32)
559 1.9 christos {
560 1.9 christos Elf32_External_Phdr phdr;
561 1.9 christos int p_type, p_filesz, p_memsz;
562 1.9 christos
563 1.9 christos if (target_read_memory (at_phdr, (gdb_byte *)&phdr, sizeof (phdr)))
564 1.9 christos return {};
565 1.9 christos
566 1.9 christos p_type = extract_unsigned_integer ((gdb_byte *) phdr.p_type, 4,
567 1.9 christos byte_order);
568 1.9 christos p_filesz = extract_unsigned_integer ((gdb_byte *)phdr.p_filesz, 4,
569 1.9 christos byte_order);
570 1.9 christos p_memsz = extract_unsigned_integer ((gdb_byte *)phdr.p_memsz, 4,
571 1.9 christos byte_order);
572 1.9 christos
573 1.9 christos if (p_type != PT_PHDR || p_filesz != sect_size || p_memsz != sect_size)
574 1.9 christos return {};
575 1.9 christos }
576 1.9 christos #endif
577 1.9 christos
578 1.1 christos if (p_arch_size)
579 1.1 christos *p_arch_size = arch_size;
580 1.6 christos if (base_addr)
581 1.6 christos *base_addr = sect_addr;
582 1.1 christos
583 1.1 christos return buf;
584 1.1 christos }
585 1.1 christos
586 1.1 christos
587 1.1 christos /* Return program interpreter string. */
588 1.8 christos static gdb::optional<gdb::byte_vector>
589 1.1 christos find_program_interpreter (void)
590 1.1 christos {
591 1.1 christos /* If we have an exec_bfd, use its section table. */
592 1.1 christos if (exec_bfd
593 1.1 christos && bfd_get_flavour (exec_bfd) == bfd_target_elf_flavour)
594 1.1 christos {
595 1.1 christos struct bfd_section *interp_sect;
596 1.1 christos
597 1.1 christos interp_sect = bfd_get_section_by_name (exec_bfd, ".interp");
598 1.1 christos if (interp_sect != NULL)
599 1.1 christos {
600 1.9 christos int sect_size = bfd_section_size (interp_sect);
601 1.1 christos
602 1.8 christos gdb::byte_vector buf (sect_size);
603 1.8 christos bfd_get_section_contents (exec_bfd, interp_sect, buf.data (), 0,
604 1.8 christos sect_size);
605 1.8 christos return buf;
606 1.1 christos }
607 1.1 christos }
608 1.1 christos
609 1.8 christos /* If we didn't find it, use the target auxiliary vector. */
610 1.8 christos return read_program_header (PT_INTERP, NULL, NULL);
611 1.1 christos }
612 1.1 christos
613 1.1 christos
614 1.3 christos /* Scan for DESIRED_DYNTAG in .dynamic section of ABFD. If DESIRED_DYNTAG is
615 1.3 christos found, 1 is returned and the corresponding PTR is set. */
616 1.1 christos
617 1.1 christos static int
618 1.6 christos scan_dyntag (const int desired_dyntag, bfd *abfd, CORE_ADDR *ptr,
619 1.6 christos CORE_ADDR *ptr_addr)
620 1.1 christos {
621 1.1 christos int arch_size, step, sect_size;
622 1.3 christos long current_dyntag;
623 1.1 christos CORE_ADDR dyn_ptr, dyn_addr;
624 1.1 christos gdb_byte *bufend, *bufstart, *buf;
625 1.1 christos Elf32_External_Dyn *x_dynp_32;
626 1.1 christos Elf64_External_Dyn *x_dynp_64;
627 1.1 christos struct bfd_section *sect;
628 1.1 christos struct target_section *target_section;
629 1.1 christos
630 1.1 christos if (abfd == NULL)
631 1.1 christos return 0;
632 1.1 christos
633 1.1 christos if (bfd_get_flavour (abfd) != bfd_target_elf_flavour)
634 1.1 christos return 0;
635 1.1 christos
636 1.1 christos arch_size = bfd_get_arch_size (abfd);
637 1.1 christos if (arch_size == -1)
638 1.1 christos return 0;
639 1.1 christos
640 1.1 christos /* Find the start address of the .dynamic section. */
641 1.1 christos sect = bfd_get_section_by_name (abfd, ".dynamic");
642 1.1 christos if (sect == NULL)
643 1.1 christos return 0;
644 1.1 christos
645 1.1 christos for (target_section = current_target_sections->sections;
646 1.1 christos target_section < current_target_sections->sections_end;
647 1.1 christos target_section++)
648 1.1 christos if (sect == target_section->the_bfd_section)
649 1.1 christos break;
650 1.1 christos if (target_section < current_target_sections->sections_end)
651 1.1 christos dyn_addr = target_section->addr;
652 1.1 christos else
653 1.1 christos {
654 1.1 christos /* ABFD may come from OBJFILE acting only as a symbol file without being
655 1.1 christos loaded into the target (see add_symbol_file_command). This case is
656 1.1 christos such fallback to the file VMA address without the possibility of
657 1.1 christos having the section relocated to its actual in-memory address. */
658 1.1 christos
659 1.9 christos dyn_addr = bfd_section_vma (sect);
660 1.1 christos }
661 1.1 christos
662 1.1 christos /* Read in .dynamic from the BFD. We will get the actual value
663 1.1 christos from memory later. */
664 1.9 christos sect_size = bfd_section_size (sect);
665 1.6 christos buf = bufstart = (gdb_byte *) alloca (sect_size);
666 1.1 christos if (!bfd_get_section_contents (abfd, sect,
667 1.1 christos buf, 0, sect_size))
668 1.1 christos return 0;
669 1.1 christos
670 1.1 christos /* Iterate over BUF and scan for DYNTAG. If found, set PTR and return. */
671 1.1 christos step = (arch_size == 32) ? sizeof (Elf32_External_Dyn)
672 1.1 christos : sizeof (Elf64_External_Dyn);
673 1.1 christos for (bufend = buf + sect_size;
674 1.1 christos buf < bufend;
675 1.1 christos buf += step)
676 1.1 christos {
677 1.1 christos if (arch_size == 32)
678 1.1 christos {
679 1.1 christos x_dynp_32 = (Elf32_External_Dyn *) buf;
680 1.3 christos current_dyntag = bfd_h_get_32 (abfd, (bfd_byte *) x_dynp_32->d_tag);
681 1.1 christos dyn_ptr = bfd_h_get_32 (abfd, (bfd_byte *) x_dynp_32->d_un.d_ptr);
682 1.1 christos }
683 1.1 christos else
684 1.1 christos {
685 1.1 christos x_dynp_64 = (Elf64_External_Dyn *) buf;
686 1.3 christos current_dyntag = bfd_h_get_64 (abfd, (bfd_byte *) x_dynp_64->d_tag);
687 1.1 christos dyn_ptr = bfd_h_get_64 (abfd, (bfd_byte *) x_dynp_64->d_un.d_ptr);
688 1.1 christos }
689 1.3 christos if (current_dyntag == DT_NULL)
690 1.1 christos return 0;
691 1.3 christos if (current_dyntag == desired_dyntag)
692 1.1 christos {
693 1.1 christos /* If requested, try to read the runtime value of this .dynamic
694 1.1 christos entry. */
695 1.1 christos if (ptr)
696 1.1 christos {
697 1.1 christos struct type *ptr_type;
698 1.1 christos gdb_byte ptr_buf[8];
699 1.6 christos CORE_ADDR ptr_addr_1;
700 1.1 christos
701 1.1 christos ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
702 1.6 christos ptr_addr_1 = dyn_addr + (buf - bufstart) + arch_size / 8;
703 1.6 christos if (target_read_memory (ptr_addr_1, ptr_buf, arch_size / 8) == 0)
704 1.1 christos dyn_ptr = extract_typed_address (ptr_buf, ptr_type);
705 1.1 christos *ptr = dyn_ptr;
706 1.6 christos if (ptr_addr)
707 1.6 christos *ptr_addr = dyn_addr + (buf - bufstart);
708 1.1 christos }
709 1.1 christos return 1;
710 1.1 christos }
711 1.1 christos }
712 1.1 christos
713 1.1 christos return 0;
714 1.1 christos }
715 1.1 christos
716 1.3 christos /* Scan for DESIRED_DYNTAG in .dynamic section of the target's main executable,
717 1.3 christos found by consulting the OS auxillary vector. If DESIRED_DYNTAG is found, 1
718 1.3 christos is returned and the corresponding PTR is set. */
719 1.1 christos
720 1.1 christos static int
721 1.6 christos scan_dyntag_auxv (const int desired_dyntag, CORE_ADDR *ptr,
722 1.6 christos CORE_ADDR *ptr_addr)
723 1.1 christos {
724 1.1 christos enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch ());
725 1.8 christos int arch_size, step;
726 1.3 christos long current_dyntag;
727 1.1 christos CORE_ADDR dyn_ptr;
728 1.6 christos CORE_ADDR base_addr;
729 1.1 christos
730 1.1 christos /* Read in .dynamic section. */
731 1.8 christos gdb::optional<gdb::byte_vector> ph_data
732 1.8 christos = read_program_header (PT_DYNAMIC, &arch_size, &base_addr);
733 1.8 christos if (!ph_data)
734 1.1 christos return 0;
735 1.1 christos
736 1.1 christos /* Iterate over BUF and scan for DYNTAG. If found, set PTR and return. */
737 1.1 christos step = (arch_size == 32) ? sizeof (Elf32_External_Dyn)
738 1.1 christos : sizeof (Elf64_External_Dyn);
739 1.8 christos for (gdb_byte *buf = ph_data->data (), *bufend = buf + ph_data->size ();
740 1.8 christos buf < bufend; buf += step)
741 1.1 christos {
742 1.1 christos if (arch_size == 32)
743 1.1 christos {
744 1.1 christos Elf32_External_Dyn *dynp = (Elf32_External_Dyn *) buf;
745 1.1 christos
746 1.3 christos current_dyntag = extract_unsigned_integer ((gdb_byte *) dynp->d_tag,
747 1.1 christos 4, byte_order);
748 1.1 christos dyn_ptr = extract_unsigned_integer ((gdb_byte *) dynp->d_un.d_ptr,
749 1.1 christos 4, byte_order);
750 1.1 christos }
751 1.1 christos else
752 1.1 christos {
753 1.1 christos Elf64_External_Dyn *dynp = (Elf64_External_Dyn *) buf;
754 1.1 christos
755 1.3 christos current_dyntag = extract_unsigned_integer ((gdb_byte *) dynp->d_tag,
756 1.1 christos 8, byte_order);
757 1.1 christos dyn_ptr = extract_unsigned_integer ((gdb_byte *) dynp->d_un.d_ptr,
758 1.1 christos 8, byte_order);
759 1.1 christos }
760 1.3 christos if (current_dyntag == DT_NULL)
761 1.1 christos break;
762 1.1 christos
763 1.3 christos if (current_dyntag == desired_dyntag)
764 1.1 christos {
765 1.1 christos if (ptr)
766 1.1 christos *ptr = dyn_ptr;
767 1.1 christos
768 1.6 christos if (ptr_addr)
769 1.8 christos *ptr_addr = base_addr + buf - ph_data->data ();
770 1.6 christos
771 1.1 christos return 1;
772 1.1 christos }
773 1.1 christos }
774 1.1 christos
775 1.1 christos return 0;
776 1.1 christos }
777 1.1 christos
778 1.1 christos /* Locate the base address of dynamic linker structs for SVR4 elf
779 1.1 christos targets.
780 1.1 christos
781 1.1 christos For SVR4 elf targets the address of the dynamic linker's runtime
782 1.1 christos structure is contained within the dynamic info section in the
783 1.1 christos executable file. The dynamic section is also mapped into the
784 1.1 christos inferior address space. Because the runtime loader fills in the
785 1.1 christos real address before starting the inferior, we have to read in the
786 1.1 christos dynamic info section from the inferior address space.
787 1.1 christos If there are any errors while trying to find the address, we
788 1.1 christos silently return 0, otherwise the found address is returned. */
789 1.1 christos
790 1.1 christos static CORE_ADDR
791 1.1 christos elf_locate_base (void)
792 1.1 christos {
793 1.3 christos struct bound_minimal_symbol msymbol;
794 1.6 christos CORE_ADDR dyn_ptr, dyn_ptr_addr;
795 1.1 christos
796 1.1 christos /* Look for DT_MIPS_RLD_MAP first. MIPS executables use this
797 1.1 christos instead of DT_DEBUG, although they sometimes contain an unused
798 1.1 christos DT_DEBUG. */
799 1.6 christos if (scan_dyntag (DT_MIPS_RLD_MAP, exec_bfd, &dyn_ptr, NULL)
800 1.6 christos || scan_dyntag_auxv (DT_MIPS_RLD_MAP, &dyn_ptr, NULL))
801 1.1 christos {
802 1.1 christos struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
803 1.1 christos gdb_byte *pbuf;
804 1.1 christos int pbuf_size = TYPE_LENGTH (ptr_type);
805 1.1 christos
806 1.6 christos pbuf = (gdb_byte *) alloca (pbuf_size);
807 1.1 christos /* DT_MIPS_RLD_MAP contains a pointer to the address
808 1.1 christos of the dynamic link structure. */
809 1.1 christos if (target_read_memory (dyn_ptr, pbuf, pbuf_size))
810 1.1 christos return 0;
811 1.1 christos return extract_typed_address (pbuf, ptr_type);
812 1.1 christos }
813 1.1 christos
814 1.6 christos /* Then check DT_MIPS_RLD_MAP_REL. MIPS executables now use this form
815 1.6 christos because of needing to support PIE. DT_MIPS_RLD_MAP will also exist
816 1.6 christos in non-PIE. */
817 1.6 christos if (scan_dyntag (DT_MIPS_RLD_MAP_REL, exec_bfd, &dyn_ptr, &dyn_ptr_addr)
818 1.6 christos || scan_dyntag_auxv (DT_MIPS_RLD_MAP_REL, &dyn_ptr, &dyn_ptr_addr))
819 1.6 christos {
820 1.6 christos struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
821 1.6 christos gdb_byte *pbuf;
822 1.6 christos int pbuf_size = TYPE_LENGTH (ptr_type);
823 1.6 christos
824 1.6 christos pbuf = (gdb_byte *) alloca (pbuf_size);
825 1.6 christos /* DT_MIPS_RLD_MAP_REL contains an offset from the address of the
826 1.6 christos DT slot to the address of the dynamic link structure. */
827 1.6 christos if (target_read_memory (dyn_ptr + dyn_ptr_addr, pbuf, pbuf_size))
828 1.6 christos return 0;
829 1.6 christos return extract_typed_address (pbuf, ptr_type);
830 1.6 christos }
831 1.6 christos
832 1.1 christos /* Find DT_DEBUG. */
833 1.6 christos if (scan_dyntag (DT_DEBUG, exec_bfd, &dyn_ptr, NULL)
834 1.6 christos || scan_dyntag_auxv (DT_DEBUG, &dyn_ptr, NULL))
835 1.1 christos return dyn_ptr;
836 1.1 christos
837 1.1 christos /* This may be a static executable. Look for the symbol
838 1.1 christos conventionally named _r_debug, as a last resort. */
839 1.1 christos msymbol = lookup_minimal_symbol ("_r_debug", NULL, symfile_objfile);
840 1.3 christos if (msymbol.minsym != NULL)
841 1.3 christos return BMSYMBOL_VALUE_ADDRESS (msymbol);
842 1.1 christos
843 1.1 christos /* DT_DEBUG entry not found. */
844 1.1 christos return 0;
845 1.1 christos }
846 1.1 christos
847 1.1 christos /* Locate the base address of dynamic linker structs.
848 1.1 christos
849 1.1 christos For both the SunOS and SVR4 shared library implementations, if the
850 1.1 christos inferior executable has been linked dynamically, there is a single
851 1.1 christos address somewhere in the inferior's data space which is the key to
852 1.1 christos locating all of the dynamic linker's runtime structures. This
853 1.1 christos address is the value of the debug base symbol. The job of this
854 1.1 christos function is to find and return that address, or to return 0 if there
855 1.1 christos is no such address (the executable is statically linked for example).
856 1.1 christos
857 1.1 christos For SunOS, the job is almost trivial, since the dynamic linker and
858 1.1 christos all of it's structures are statically linked to the executable at
859 1.1 christos link time. Thus the symbol for the address we are looking for has
860 1.1 christos already been added to the minimal symbol table for the executable's
861 1.1 christos objfile at the time the symbol file's symbols were read, and all we
862 1.1 christos have to do is look it up there. Note that we explicitly do NOT want
863 1.1 christos to find the copies in the shared library.
864 1.1 christos
865 1.1 christos The SVR4 version is a bit more complicated because the address
866 1.1 christos is contained somewhere in the dynamic info section. We have to go
867 1.1 christos to a lot more work to discover the address of the debug base symbol.
868 1.1 christos Because of this complexity, we cache the value we find and return that
869 1.1 christos value on subsequent invocations. Note there is no copy in the
870 1.1 christos executable symbol tables. */
871 1.1 christos
872 1.1 christos static CORE_ADDR
873 1.1 christos locate_base (struct svr4_info *info)
874 1.1 christos {
875 1.1 christos /* Check to see if we have a currently valid address, and if so, avoid
876 1.1 christos doing all this work again and just return the cached address. If
877 1.1 christos we have no cached address, try to locate it in the dynamic info
878 1.1 christos section for ELF executables. There's no point in doing any of this
879 1.1 christos though if we don't have some link map offsets to work with. */
880 1.1 christos
881 1.1 christos if (info->debug_base == 0 && svr4_have_link_map_offsets ())
882 1.1 christos info->debug_base = elf_locate_base ();
883 1.1 christos return info->debug_base;
884 1.1 christos }
885 1.1 christos
886 1.1 christos /* Find the first element in the inferior's dynamic link map, and
887 1.1 christos return its address in the inferior. Return zero if the address
888 1.1 christos could not be determined.
889 1.1 christos
890 1.1 christos FIXME: Perhaps we should validate the info somehow, perhaps by
891 1.1 christos checking r_version for a known version number, or r_state for
892 1.1 christos RT_CONSISTENT. */
893 1.1 christos
894 1.1 christos static CORE_ADDR
895 1.1 christos solib_svr4_r_map (struct svr4_info *info)
896 1.1 christos {
897 1.1 christos struct link_map_offsets *lmo = svr4_fetch_link_map_offsets ();
898 1.1 christos struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
899 1.1 christos CORE_ADDR addr = 0;
900 1.1 christos
901 1.9 christos try
902 1.1 christos {
903 1.1 christos addr = read_memory_typed_address (info->debug_base + lmo->r_map_offset,
904 1.1 christos ptr_type);
905 1.1 christos }
906 1.9 christos catch (const gdb_exception_error &ex)
907 1.5 christos {
908 1.5 christos exception_print (gdb_stderr, ex);
909 1.5 christos }
910 1.5 christos
911 1.1 christos return addr;
912 1.1 christos }
913 1.1 christos
914 1.1 christos /* Find r_brk from the inferior's debug base. */
915 1.1 christos
916 1.1 christos static CORE_ADDR
917 1.1 christos solib_svr4_r_brk (struct svr4_info *info)
918 1.1 christos {
919 1.1 christos struct link_map_offsets *lmo = svr4_fetch_link_map_offsets ();
920 1.1 christos struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
921 1.1 christos
922 1.1 christos return read_memory_typed_address (info->debug_base + lmo->r_brk_offset,
923 1.1 christos ptr_type);
924 1.1 christos }
925 1.1 christos
926 1.1 christos /* Find the link map for the dynamic linker (if it is not in the
927 1.1 christos normal list of loaded shared objects). */
928 1.1 christos
929 1.1 christos static CORE_ADDR
930 1.1 christos solib_svr4_r_ldsomap (struct svr4_info *info)
931 1.1 christos {
932 1.1 christos struct link_map_offsets *lmo = svr4_fetch_link_map_offsets ();
933 1.1 christos struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
934 1.9 christos enum bfd_endian byte_order = type_byte_order (ptr_type);
935 1.5 christos ULONGEST version = 0;
936 1.5 christos
937 1.9 christos try
938 1.5 christos {
939 1.5 christos /* Check version, and return zero if `struct r_debug' doesn't have
940 1.5 christos the r_ldsomap member. */
941 1.5 christos version
942 1.5 christos = read_memory_unsigned_integer (info->debug_base + lmo->r_version_offset,
943 1.5 christos lmo->r_version_size, byte_order);
944 1.5 christos }
945 1.9 christos catch (const gdb_exception_error &ex)
946 1.5 christos {
947 1.5 christos exception_print (gdb_stderr, ex);
948 1.5 christos }
949 1.1 christos
950 1.1 christos if (version < 2 || lmo->r_ldsomap_offset == -1)
951 1.1 christos return 0;
952 1.1 christos
953 1.1 christos return read_memory_typed_address (info->debug_base + lmo->r_ldsomap_offset,
954 1.1 christos ptr_type);
955 1.1 christos }
956 1.1 christos
957 1.1 christos /* On Solaris systems with some versions of the dynamic linker,
958 1.1 christos ld.so's l_name pointer points to the SONAME in the string table
959 1.1 christos rather than into writable memory. So that GDB can find shared
960 1.1 christos libraries when loading a core file generated by gcore, ensure that
961 1.1 christos memory areas containing the l_name string are saved in the core
962 1.1 christos file. */
963 1.1 christos
964 1.1 christos static int
965 1.1 christos svr4_keep_data_in_core (CORE_ADDR vaddr, unsigned long size)
966 1.1 christos {
967 1.1 christos struct svr4_info *info;
968 1.1 christos CORE_ADDR ldsomap;
969 1.1 christos CORE_ADDR name_lm;
970 1.1 christos
971 1.9 christos info = get_svr4_info (current_program_space);
972 1.1 christos
973 1.1 christos info->debug_base = 0;
974 1.1 christos locate_base (info);
975 1.1 christos if (!info->debug_base)
976 1.1 christos return 0;
977 1.1 christos
978 1.1 christos ldsomap = solib_svr4_r_ldsomap (info);
979 1.1 christos if (!ldsomap)
980 1.1 christos return 0;
981 1.1 christos
982 1.8 christos std::unique_ptr<lm_info_svr4> li = lm_info_read (ldsomap);
983 1.8 christos name_lm = li != NULL ? li->l_name : 0;
984 1.1 christos
985 1.1 christos return (name_lm >= vaddr && name_lm < vaddr + size);
986 1.1 christos }
987 1.1 christos
988 1.8 christos /* See solist.h. */
989 1.1 christos
990 1.1 christos static int
991 1.8 christos open_symbol_file_object (int from_tty)
992 1.1 christos {
993 1.1 christos CORE_ADDR lm, l_name;
994 1.1 christos struct link_map_offsets *lmo = svr4_fetch_link_map_offsets ();
995 1.1 christos struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
996 1.1 christos int l_name_size = TYPE_LENGTH (ptr_type);
997 1.8 christos gdb::byte_vector l_name_buf (l_name_size);
998 1.9 christos struct svr4_info *info = get_svr4_info (current_program_space);
999 1.7 christos symfile_add_flags add_flags = 0;
1000 1.7 christos
1001 1.7 christos if (from_tty)
1002 1.7 christos add_flags |= SYMFILE_VERBOSE;
1003 1.1 christos
1004 1.1 christos if (symfile_objfile)
1005 1.1 christos if (!query (_("Attempt to reload symbols from process? ")))
1006 1.8 christos return 0;
1007 1.1 christos
1008 1.1 christos /* Always locate the debug struct, in case it has moved. */
1009 1.1 christos info->debug_base = 0;
1010 1.1 christos if (locate_base (info) == 0)
1011 1.8 christos return 0; /* failed somehow... */
1012 1.1 christos
1013 1.1 christos /* First link map member should be the executable. */
1014 1.1 christos lm = solib_svr4_r_map (info);
1015 1.1 christos if (lm == 0)
1016 1.8 christos return 0; /* failed somehow... */
1017 1.1 christos
1018 1.1 christos /* Read address of name from target memory to GDB. */
1019 1.8 christos read_memory (lm + lmo->l_name_offset, l_name_buf.data (), l_name_size);
1020 1.1 christos
1021 1.1 christos /* Convert the address to host format. */
1022 1.8 christos l_name = extract_typed_address (l_name_buf.data (), ptr_type);
1023 1.1 christos
1024 1.1 christos if (l_name == 0)
1025 1.8 christos return 0; /* No filename. */
1026 1.1 christos
1027 1.1 christos /* Now fetch the filename from target memory. */
1028 1.9 christos gdb::unique_xmalloc_ptr<char> filename
1029 1.9 christos = target_read_string (l_name, SO_NAME_MAX_PATH_SIZE - 1);
1030 1.1 christos
1031 1.9 christos if (filename == nullptr)
1032 1.1 christos {
1033 1.9 christos warning (_("failed to read exec filename from attached file"));
1034 1.1 christos return 0;
1035 1.1 christos }
1036 1.1 christos
1037 1.1 christos /* Have a pathname: read the symbol file. */
1038 1.8 christos symbol_file_add_main (filename.get (), add_flags);
1039 1.1 christos
1040 1.1 christos return 1;
1041 1.1 christos }
1042 1.1 christos
1043 1.1 christos /* Data exchange structure for the XML parser as returned by
1044 1.1 christos svr4_current_sos_via_xfer_libraries. */
1045 1.1 christos
1046 1.1 christos struct svr4_library_list
1047 1.1 christos {
1048 1.1 christos struct so_list *head, **tailp;
1049 1.1 christos
1050 1.1 christos /* Inferior address of struct link_map used for the main executable. It is
1051 1.1 christos NULL if not known. */
1052 1.1 christos CORE_ADDR main_lm;
1053 1.1 christos };
1054 1.1 christos
1055 1.9 christos /* This module's 'free_objfile' observer. */
1056 1.9 christos
1057 1.9 christos static void
1058 1.9 christos svr4_free_objfile_observer (struct objfile *objfile)
1059 1.9 christos {
1060 1.9 christos probes_table_remove_objfile_probes (objfile);
1061 1.9 christos }
1062 1.9 christos
1063 1.1 christos /* Implementation for target_so_ops.free_so. */
1064 1.1 christos
1065 1.1 christos static void
1066 1.1 christos svr4_free_so (struct so_list *so)
1067 1.1 christos {
1068 1.8 christos lm_info_svr4 *li = (lm_info_svr4 *) so->lm_info;
1069 1.8 christos
1070 1.8 christos delete li;
1071 1.1 christos }
1072 1.1 christos
1073 1.1 christos /* Implement target_so_ops.clear_so. */
1074 1.1 christos
1075 1.1 christos static void
1076 1.1 christos svr4_clear_so (struct so_list *so)
1077 1.1 christos {
1078 1.8 christos lm_info_svr4 *li = (lm_info_svr4 *) so->lm_info;
1079 1.8 christos
1080 1.8 christos if (li != NULL)
1081 1.8 christos li->l_addr_p = 0;
1082 1.1 christos }
1083 1.1 christos
1084 1.1 christos /* Free so_list built so far (called via cleanup). */
1085 1.1 christos
1086 1.1 christos static void
1087 1.1 christos svr4_free_library_list (void *p_list)
1088 1.1 christos {
1089 1.1 christos struct so_list *list = *(struct so_list **) p_list;
1090 1.1 christos
1091 1.1 christos while (list != NULL)
1092 1.1 christos {
1093 1.1 christos struct so_list *next = list->next;
1094 1.1 christos
1095 1.1 christos free_so (list);
1096 1.1 christos list = next;
1097 1.1 christos }
1098 1.1 christos }
1099 1.1 christos
1100 1.1 christos /* Copy library list. */
1101 1.1 christos
1102 1.1 christos static struct so_list *
1103 1.1 christos svr4_copy_library_list (struct so_list *src)
1104 1.1 christos {
1105 1.1 christos struct so_list *dst = NULL;
1106 1.1 christos struct so_list **link = &dst;
1107 1.1 christos
1108 1.1 christos while (src != NULL)
1109 1.1 christos {
1110 1.5 christos struct so_list *newobj;
1111 1.1 christos
1112 1.6 christos newobj = XNEW (struct so_list);
1113 1.5 christos memcpy (newobj, src, sizeof (struct so_list));
1114 1.1 christos
1115 1.8 christos lm_info_svr4 *src_li = (lm_info_svr4 *) src->lm_info;
1116 1.8 christos newobj->lm_info = new lm_info_svr4 (*src_li);
1117 1.1 christos
1118 1.5 christos newobj->next = NULL;
1119 1.5 christos *link = newobj;
1120 1.5 christos link = &newobj->next;
1121 1.1 christos
1122 1.1 christos src = src->next;
1123 1.1 christos }
1124 1.1 christos
1125 1.1 christos return dst;
1126 1.1 christos }
1127 1.1 christos
1128 1.1 christos #ifdef HAVE_LIBEXPAT
1129 1.1 christos
1130 1.1 christos #include "xml-support.h"
1131 1.1 christos
1132 1.1 christos /* Handle the start of a <library> element. Note: new elements are added
1133 1.1 christos at the tail of the list, keeping the list in order. */
1134 1.1 christos
1135 1.1 christos static void
1136 1.1 christos library_list_start_library (struct gdb_xml_parser *parser,
1137 1.1 christos const struct gdb_xml_element *element,
1138 1.8 christos void *user_data,
1139 1.8 christos std::vector<gdb_xml_value> &attributes)
1140 1.1 christos {
1141 1.6 christos struct svr4_library_list *list = (struct svr4_library_list *) user_data;
1142 1.6 christos const char *name
1143 1.8 christos = (const char *) xml_find_attribute (attributes, "name")->value.get ();
1144 1.6 christos ULONGEST *lmp
1145 1.8 christos = (ULONGEST *) xml_find_attribute (attributes, "lm")->value.get ();
1146 1.6 christos ULONGEST *l_addrp
1147 1.8 christos = (ULONGEST *) xml_find_attribute (attributes, "l_addr")->value.get ();
1148 1.6 christos ULONGEST *l_ldp
1149 1.8 christos = (ULONGEST *) xml_find_attribute (attributes, "l_ld")->value.get ();
1150 1.1 christos struct so_list *new_elem;
1151 1.1 christos
1152 1.3 christos new_elem = XCNEW (struct so_list);
1153 1.8 christos lm_info_svr4 *li = new lm_info_svr4;
1154 1.8 christos new_elem->lm_info = li;
1155 1.8 christos li->lm_addr = *lmp;
1156 1.8 christos li->l_addr_inferior = *l_addrp;
1157 1.8 christos li->l_ld = *l_ldp;
1158 1.1 christos
1159 1.1 christos strncpy (new_elem->so_name, name, sizeof (new_elem->so_name) - 1);
1160 1.1 christos new_elem->so_name[sizeof (new_elem->so_name) - 1] = 0;
1161 1.1 christos strcpy (new_elem->so_original_name, new_elem->so_name);
1162 1.1 christos
1163 1.1 christos *list->tailp = new_elem;
1164 1.1 christos list->tailp = &new_elem->next;
1165 1.1 christos }
1166 1.1 christos
1167 1.1 christos /* Handle the start of a <library-list-svr4> element. */
1168 1.1 christos
1169 1.1 christos static void
1170 1.1 christos svr4_library_list_start_list (struct gdb_xml_parser *parser,
1171 1.1 christos const struct gdb_xml_element *element,
1172 1.8 christos void *user_data,
1173 1.8 christos std::vector<gdb_xml_value> &attributes)
1174 1.1 christos {
1175 1.6 christos struct svr4_library_list *list = (struct svr4_library_list *) user_data;
1176 1.6 christos const char *version
1177 1.8 christos = (const char *) xml_find_attribute (attributes, "version")->value.get ();
1178 1.1 christos struct gdb_xml_value *main_lm = xml_find_attribute (attributes, "main-lm");
1179 1.1 christos
1180 1.1 christos if (strcmp (version, "1.0") != 0)
1181 1.1 christos gdb_xml_error (parser,
1182 1.1 christos _("SVR4 Library list has unsupported version \"%s\""),
1183 1.1 christos version);
1184 1.1 christos
1185 1.1 christos if (main_lm)
1186 1.8 christos list->main_lm = *(ULONGEST *) main_lm->value.get ();
1187 1.1 christos }
1188 1.1 christos
1189 1.1 christos /* The allowed elements and attributes for an XML library list.
1190 1.1 christos The root element is a <library-list>. */
1191 1.1 christos
1192 1.1 christos static const struct gdb_xml_attribute svr4_library_attributes[] =
1193 1.1 christos {
1194 1.1 christos { "name", GDB_XML_AF_NONE, NULL, NULL },
1195 1.1 christos { "lm", GDB_XML_AF_NONE, gdb_xml_parse_attr_ulongest, NULL },
1196 1.1 christos { "l_addr", GDB_XML_AF_NONE, gdb_xml_parse_attr_ulongest, NULL },
1197 1.1 christos { "l_ld", GDB_XML_AF_NONE, gdb_xml_parse_attr_ulongest, NULL },
1198 1.1 christos { NULL, GDB_XML_AF_NONE, NULL, NULL }
1199 1.1 christos };
1200 1.1 christos
1201 1.1 christos static const struct gdb_xml_element svr4_library_list_children[] =
1202 1.1 christos {
1203 1.1 christos {
1204 1.1 christos "library", svr4_library_attributes, NULL,
1205 1.1 christos GDB_XML_EF_REPEATABLE | GDB_XML_EF_OPTIONAL,
1206 1.1 christos library_list_start_library, NULL
1207 1.1 christos },
1208 1.1 christos { NULL, NULL, NULL, GDB_XML_EF_NONE, NULL, NULL }
1209 1.1 christos };
1210 1.1 christos
1211 1.1 christos static const struct gdb_xml_attribute svr4_library_list_attributes[] =
1212 1.1 christos {
1213 1.1 christos { "version", GDB_XML_AF_NONE, NULL, NULL },
1214 1.1 christos { "main-lm", GDB_XML_AF_OPTIONAL, gdb_xml_parse_attr_ulongest, NULL },
1215 1.1 christos { NULL, GDB_XML_AF_NONE, NULL, NULL }
1216 1.1 christos };
1217 1.1 christos
1218 1.1 christos static const struct gdb_xml_element svr4_library_list_elements[] =
1219 1.1 christos {
1220 1.1 christos { "library-list-svr4", svr4_library_list_attributes, svr4_library_list_children,
1221 1.1 christos GDB_XML_EF_NONE, svr4_library_list_start_list, NULL },
1222 1.1 christos { NULL, NULL, NULL, GDB_XML_EF_NONE, NULL, NULL }
1223 1.1 christos };
1224 1.1 christos
1225 1.1 christos /* Parse qXfer:libraries:read packet into *SO_LIST_RETURN. Return 1 if
1226 1.1 christos
1227 1.1 christos Return 0 if packet not supported, *SO_LIST_RETURN is not modified in such
1228 1.1 christos case. Return 1 if *SO_LIST_RETURN contains the library list, it may be
1229 1.1 christos empty, caller is responsible for freeing all its entries. */
1230 1.1 christos
1231 1.1 christos static int
1232 1.1 christos svr4_parse_libraries (const char *document, struct svr4_library_list *list)
1233 1.1 christos {
1234 1.9 christos auto cleanup = make_scope_exit ([&] ()
1235 1.9 christos {
1236 1.9 christos svr4_free_library_list (&list->head);
1237 1.9 christos });
1238 1.1 christos
1239 1.1 christos memset (list, 0, sizeof (*list));
1240 1.1 christos list->tailp = &list->head;
1241 1.3 christos if (gdb_xml_parse_quick (_("target library list"), "library-list-svr4.dtd",
1242 1.1 christos svr4_library_list_elements, document, list) == 0)
1243 1.1 christos {
1244 1.1 christos /* Parsed successfully, keep the result. */
1245 1.9 christos cleanup.release ();
1246 1.1 christos return 1;
1247 1.1 christos }
1248 1.1 christos
1249 1.1 christos return 0;
1250 1.1 christos }
1251 1.1 christos
1252 1.1 christos /* Attempt to get so_list from target via qXfer:libraries-svr4:read packet.
1253 1.1 christos
1254 1.1 christos Return 0 if packet not supported, *SO_LIST_RETURN is not modified in such
1255 1.1 christos case. Return 1 if *SO_LIST_RETURN contains the library list, it may be
1256 1.1 christos empty, caller is responsible for freeing all its entries.
1257 1.1 christos
1258 1.1 christos Note that ANNEX must be NULL if the remote does not explicitly allow
1259 1.1 christos qXfer:libraries-svr4:read packets with non-empty annexes. Support for
1260 1.1 christos this can be checked using target_augmented_libraries_svr4_read (). */
1261 1.1 christos
1262 1.1 christos static int
1263 1.1 christos svr4_current_sos_via_xfer_libraries (struct svr4_library_list *list,
1264 1.1 christos const char *annex)
1265 1.1 christos {
1266 1.1 christos gdb_assert (annex == NULL || target_augmented_libraries_svr4_read ());
1267 1.1 christos
1268 1.1 christos /* Fetch the list of shared libraries. */
1269 1.8 christos gdb::optional<gdb::char_vector> svr4_library_document
1270 1.8 christos = target_read_stralloc (current_top_target (), TARGET_OBJECT_LIBRARIES_SVR4,
1271 1.8 christos annex);
1272 1.8 christos if (!svr4_library_document)
1273 1.1 christos return 0;
1274 1.1 christos
1275 1.8 christos return svr4_parse_libraries (svr4_library_document->data (), list);
1276 1.1 christos }
1277 1.1 christos
1278 1.1 christos #else
1279 1.1 christos
1280 1.1 christos static int
1281 1.1 christos svr4_current_sos_via_xfer_libraries (struct svr4_library_list *list,
1282 1.1 christos const char *annex)
1283 1.1 christos {
1284 1.1 christos return 0;
1285 1.1 christos }
1286 1.1 christos
1287 1.1 christos #endif
1288 1.1 christos
1289 1.1 christos /* If no shared library information is available from the dynamic
1290 1.1 christos linker, build a fallback list from other sources. */
1291 1.1 christos
1292 1.1 christos static struct so_list *
1293 1.9 christos svr4_default_sos (svr4_info *info)
1294 1.1 christos {
1295 1.5 christos struct so_list *newobj;
1296 1.1 christos
1297 1.1 christos if (!info->debug_loader_offset_p)
1298 1.1 christos return NULL;
1299 1.1 christos
1300 1.5 christos newobj = XCNEW (struct so_list);
1301 1.8 christos lm_info_svr4 *li = new lm_info_svr4;
1302 1.8 christos newobj->lm_info = li;
1303 1.1 christos
1304 1.1 christos /* Nothing will ever check the other fields if we set l_addr_p. */
1305 1.8 christos li->l_addr = info->debug_loader_offset;
1306 1.8 christos li->l_addr_p = 1;
1307 1.1 christos
1308 1.5 christos strncpy (newobj->so_name, info->debug_loader_name, SO_NAME_MAX_PATH_SIZE - 1);
1309 1.5 christos newobj->so_name[SO_NAME_MAX_PATH_SIZE - 1] = '\0';
1310 1.5 christos strcpy (newobj->so_original_name, newobj->so_name);
1311 1.1 christos
1312 1.5 christos return newobj;
1313 1.1 christos }
1314 1.1 christos
1315 1.1 christos /* Read the whole inferior libraries chain starting at address LM.
1316 1.1 christos Expect the first entry in the chain's previous entry to be PREV_LM.
1317 1.1 christos Add the entries to the tail referenced by LINK_PTR_PTR. Ignore the
1318 1.1 christos first entry if IGNORE_FIRST and set global MAIN_LM_ADDR according
1319 1.1 christos to it. Returns nonzero upon success. If zero is returned the
1320 1.1 christos entries stored to LINK_PTR_PTR are still valid although they may
1321 1.1 christos represent only part of the inferior library list. */
1322 1.1 christos
1323 1.1 christos static int
1324 1.9 christos svr4_read_so_list (svr4_info *info, CORE_ADDR lm, CORE_ADDR prev_lm,
1325 1.1 christos struct so_list ***link_ptr_ptr, int ignore_first)
1326 1.1 christos {
1327 1.3 christos CORE_ADDR first_l_name = 0;
1328 1.1 christos CORE_ADDR next_lm;
1329 1.1 christos
1330 1.1 christos for (; lm != 0; prev_lm = lm, lm = next_lm)
1331 1.1 christos {
1332 1.8 christos so_list_up newobj (XCNEW (struct so_list));
1333 1.1 christos
1334 1.8 christos lm_info_svr4 *li = lm_info_read (lm).release ();
1335 1.8 christos newobj->lm_info = li;
1336 1.8 christos if (li == NULL)
1337 1.8 christos return 0;
1338 1.1 christos
1339 1.8 christos next_lm = li->l_next;
1340 1.1 christos
1341 1.8 christos if (li->l_prev != prev_lm)
1342 1.1 christos {
1343 1.1 christos warning (_("Corrupted shared library list: %s != %s"),
1344 1.1 christos paddress (target_gdbarch (), prev_lm),
1345 1.8 christos paddress (target_gdbarch (), li->l_prev));
1346 1.1 christos return 0;
1347 1.1 christos }
1348 1.1 christos
1349 1.1 christos /* For SVR4 versions, the first entry in the link map is for the
1350 1.1 christos inferior executable, so we must ignore it. For some versions of
1351 1.1 christos SVR4, it has no name. For others (Solaris 2.3 for example), it
1352 1.1 christos does have a name, so we can no longer use a missing name to
1353 1.1 christos decide when to ignore it. */
1354 1.8 christos if (ignore_first && li->l_prev == 0)
1355 1.1 christos {
1356 1.8 christos first_l_name = li->l_name;
1357 1.8 christos info->main_lm_addr = li->lm_addr;
1358 1.1 christos continue;
1359 1.1 christos }
1360 1.1 christos
1361 1.1 christos /* Extract this shared object's name. */
1362 1.9 christos gdb::unique_xmalloc_ptr<char> buffer
1363 1.9 christos = target_read_string (li->l_name, SO_NAME_MAX_PATH_SIZE - 1);
1364 1.9 christos if (buffer == nullptr)
1365 1.1 christos {
1366 1.1 christos /* If this entry's l_name address matches that of the
1367 1.1 christos inferior executable, then this is not a normal shared
1368 1.1 christos object, but (most likely) a vDSO. In this case, silently
1369 1.1 christos skip it; otherwise emit a warning. */
1370 1.8 christos if (first_l_name == 0 || li->l_name != first_l_name)
1371 1.9 christos warning (_("Can't read pathname for load map."));
1372 1.1 christos continue;
1373 1.1 christos }
1374 1.1 christos
1375 1.8 christos strncpy (newobj->so_name, buffer.get (), SO_NAME_MAX_PATH_SIZE - 1);
1376 1.5 christos newobj->so_name[SO_NAME_MAX_PATH_SIZE - 1] = '\0';
1377 1.5 christos strcpy (newobj->so_original_name, newobj->so_name);
1378 1.1 christos
1379 1.1 christos /* If this entry has no name, or its name matches the name
1380 1.1 christos for the main executable, don't include it in the list. */
1381 1.5 christos if (! newobj->so_name[0] || match_main (newobj->so_name))
1382 1.8 christos continue;
1383 1.1 christos
1384 1.5 christos newobj->next = 0;
1385 1.8 christos /* Don't free it now. */
1386 1.8 christos **link_ptr_ptr = newobj.release ();
1387 1.8 christos *link_ptr_ptr = &(**link_ptr_ptr)->next;
1388 1.1 christos }
1389 1.1 christos
1390 1.1 christos return 1;
1391 1.1 christos }
1392 1.1 christos
1393 1.1 christos /* Read the full list of currently loaded shared objects directly
1394 1.1 christos from the inferior, without referring to any libraries read and
1395 1.1 christos stored by the probes interface. Handle special cases relating
1396 1.1 christos to the first elements of the list. */
1397 1.1 christos
1398 1.1 christos static struct so_list *
1399 1.1 christos svr4_current_sos_direct (struct svr4_info *info)
1400 1.1 christos {
1401 1.1 christos CORE_ADDR lm;
1402 1.1 christos struct so_list *head = NULL;
1403 1.1 christos struct so_list **link_ptr = &head;
1404 1.1 christos int ignore_first;
1405 1.1 christos struct svr4_library_list library_list;
1406 1.1 christos
1407 1.1 christos /* Fall back to manual examination of the target if the packet is not
1408 1.1 christos supported or gdbserver failed to find DT_DEBUG. gdb.server/solib-list.exp
1409 1.1 christos tests a case where gdbserver cannot find the shared libraries list while
1410 1.1 christos GDB itself is able to find it via SYMFILE_OBJFILE.
1411 1.1 christos
1412 1.1 christos Unfortunately statically linked inferiors will also fall back through this
1413 1.1 christos suboptimal code path. */
1414 1.1 christos
1415 1.1 christos info->using_xfer = svr4_current_sos_via_xfer_libraries (&library_list,
1416 1.1 christos NULL);
1417 1.1 christos if (info->using_xfer)
1418 1.1 christos {
1419 1.1 christos if (library_list.main_lm)
1420 1.1 christos info->main_lm_addr = library_list.main_lm;
1421 1.1 christos
1422 1.9 christos return library_list.head ? library_list.head : svr4_default_sos (info);
1423 1.1 christos }
1424 1.1 christos
1425 1.1 christos /* Always locate the debug struct, in case it has moved. */
1426 1.1 christos info->debug_base = 0;
1427 1.1 christos locate_base (info);
1428 1.1 christos
1429 1.1 christos /* If we can't find the dynamic linker's base structure, this
1430 1.1 christos must not be a dynamically linked executable. Hmm. */
1431 1.1 christos if (! info->debug_base)
1432 1.9 christos return svr4_default_sos (info);
1433 1.1 christos
1434 1.1 christos /* Assume that everything is a library if the dynamic loader was loaded
1435 1.1 christos late by a static executable. */
1436 1.1 christos if (exec_bfd && bfd_get_section_by_name (exec_bfd, ".dynamic") == NULL)
1437 1.1 christos ignore_first = 0;
1438 1.1 christos else
1439 1.1 christos ignore_first = 1;
1440 1.1 christos
1441 1.9 christos auto cleanup = make_scope_exit ([&] ()
1442 1.9 christos {
1443 1.9 christos svr4_free_library_list (&head);
1444 1.9 christos });
1445 1.1 christos
1446 1.1 christos /* Walk the inferior's link map list, and build our list of
1447 1.1 christos `struct so_list' nodes. */
1448 1.1 christos lm = solib_svr4_r_map (info);
1449 1.1 christos if (lm)
1450 1.9 christos svr4_read_so_list (info, lm, 0, &link_ptr, ignore_first);
1451 1.1 christos
1452 1.1 christos /* On Solaris, the dynamic linker is not in the normal list of
1453 1.1 christos shared objects, so make sure we pick it up too. Having
1454 1.1 christos symbol information for the dynamic linker is quite crucial
1455 1.1 christos for skipping dynamic linker resolver code. */
1456 1.1 christos lm = solib_svr4_r_ldsomap (info);
1457 1.1 christos if (lm)
1458 1.9 christos svr4_read_so_list (info, lm, 0, &link_ptr, 0);
1459 1.1 christos
1460 1.9 christos cleanup.release ();
1461 1.1 christos
1462 1.1 christos if (head == NULL)
1463 1.9 christos return svr4_default_sos (info);
1464 1.1 christos
1465 1.1 christos return head;
1466 1.1 christos }
1467 1.1 christos
1468 1.3 christos /* Implement the main part of the "current_sos" target_so_ops
1469 1.3 christos method. */
1470 1.1 christos
1471 1.1 christos static struct so_list *
1472 1.9 christos svr4_current_sos_1 (svr4_info *info)
1473 1.1 christos {
1474 1.1 christos /* If the solib list has been read and stored by the probes
1475 1.1 christos interface then we return a copy of the stored list. */
1476 1.1 christos if (info->solib_list != NULL)
1477 1.1 christos return svr4_copy_library_list (info->solib_list);
1478 1.1 christos
1479 1.1 christos /* Otherwise obtain the solib list directly from the inferior. */
1480 1.1 christos return svr4_current_sos_direct (info);
1481 1.1 christos }
1482 1.1 christos
1483 1.3 christos /* Implement the "current_sos" target_so_ops method. */
1484 1.3 christos
1485 1.3 christos static struct so_list *
1486 1.3 christos svr4_current_sos (void)
1487 1.3 christos {
1488 1.9 christos svr4_info *info = get_svr4_info (current_program_space);
1489 1.9 christos struct so_list *so_head = svr4_current_sos_1 (info);
1490 1.3 christos struct mem_range vsyscall_range;
1491 1.3 christos
1492 1.3 christos /* Filter out the vDSO module, if present. Its symbol file would
1493 1.3 christos not be found on disk. The vDSO/vsyscall's OBJFILE is instead
1494 1.3 christos managed by symfile-mem.c:add_vsyscall_page. */
1495 1.3 christos if (gdbarch_vsyscall_range (target_gdbarch (), &vsyscall_range)
1496 1.3 christos && vsyscall_range.length != 0)
1497 1.3 christos {
1498 1.3 christos struct so_list **sop;
1499 1.3 christos
1500 1.3 christos sop = &so_head;
1501 1.3 christos while (*sop != NULL)
1502 1.3 christos {
1503 1.3 christos struct so_list *so = *sop;
1504 1.3 christos
1505 1.3 christos /* We can't simply match the vDSO by starting address alone,
1506 1.3 christos because lm_info->l_addr_inferior (and also l_addr) do not
1507 1.3 christos necessarily represent the real starting address of the
1508 1.3 christos ELF if the vDSO's ELF itself is "prelinked". The l_ld
1509 1.3 christos field (the ".dynamic" section of the shared object)
1510 1.3 christos always points at the absolute/resolved address though.
1511 1.3 christos So check whether that address is inside the vDSO's
1512 1.3 christos mapping instead.
1513 1.3 christos
1514 1.3 christos E.g., on Linux 3.16 (x86_64) the vDSO is a regular
1515 1.3 christos 0-based ELF, and we see:
1516 1.3 christos
1517 1.3 christos (gdb) info auxv
1518 1.3 christos 33 AT_SYSINFO_EHDR System-supplied DSO's ELF header 0x7ffff7ffb000
1519 1.3 christos (gdb) p/x *_r_debug.r_map.l_next
1520 1.3 christos $1 = {l_addr = 0x7ffff7ffb000, ..., l_ld = 0x7ffff7ffb318, ...}
1521 1.3 christos
1522 1.3 christos And on Linux 2.6.32 (x86_64) we see:
1523 1.3 christos
1524 1.3 christos (gdb) info auxv
1525 1.3 christos 33 AT_SYSINFO_EHDR System-supplied DSO's ELF header 0x7ffff7ffe000
1526 1.3 christos (gdb) p/x *_r_debug.r_map.l_next
1527 1.3 christos $5 = {l_addr = 0x7ffff88fe000, ..., l_ld = 0x7ffff7ffe580, ... }
1528 1.3 christos
1529 1.3 christos Dumping that vDSO shows:
1530 1.3 christos
1531 1.3 christos (gdb) info proc mappings
1532 1.3 christos 0x7ffff7ffe000 0x7ffff7fff000 0x1000 0 [vdso]
1533 1.3 christos (gdb) dump memory vdso.bin 0x7ffff7ffe000 0x7ffff7fff000
1534 1.3 christos # readelf -Wa vdso.bin
1535 1.3 christos [...]
1536 1.3 christos Entry point address: 0xffffffffff700700
1537 1.3 christos [...]
1538 1.3 christos Section Headers:
1539 1.3 christos [Nr] Name Type Address Off Size
1540 1.3 christos [ 0] NULL 0000000000000000 000000 000000
1541 1.3 christos [ 1] .hash HASH ffffffffff700120 000120 000038
1542 1.3 christos [ 2] .dynsym DYNSYM ffffffffff700158 000158 0000d8
1543 1.3 christos [...]
1544 1.3 christos [ 9] .dynamic DYNAMIC ffffffffff700580 000580 0000f0
1545 1.3 christos */
1546 1.8 christos
1547 1.8 christos lm_info_svr4 *li = (lm_info_svr4 *) so->lm_info;
1548 1.8 christos
1549 1.8 christos if (address_in_mem_range (li->l_ld, &vsyscall_range))
1550 1.3 christos {
1551 1.3 christos *sop = so->next;
1552 1.3 christos free_so (so);
1553 1.3 christos break;
1554 1.3 christos }
1555 1.3 christos
1556 1.3 christos sop = &so->next;
1557 1.3 christos }
1558 1.3 christos }
1559 1.3 christos
1560 1.3 christos return so_head;
1561 1.3 christos }
1562 1.3 christos
1563 1.1 christos /* Get the address of the link_map for a given OBJFILE. */
1564 1.1 christos
1565 1.1 christos CORE_ADDR
1566 1.1 christos svr4_fetch_objfile_link_map (struct objfile *objfile)
1567 1.1 christos {
1568 1.9 christos struct svr4_info *info = get_svr4_info (objfile->pspace);
1569 1.1 christos
1570 1.1 christos /* Cause svr4_current_sos() to be run if it hasn't been already. */
1571 1.1 christos if (info->main_lm_addr == 0)
1572 1.7 christos solib_add (NULL, 0, auto_solib_add);
1573 1.1 christos
1574 1.1 christos /* svr4_current_sos() will set main_lm_addr for the main executable. */
1575 1.1 christos if (objfile == symfile_objfile)
1576 1.1 christos return info->main_lm_addr;
1577 1.1 christos
1578 1.9 christos /* If OBJFILE is a separate debug object file, look for the
1579 1.9 christos original object file. */
1580 1.9 christos if (objfile->separate_debug_objfile_backlink != NULL)
1581 1.9 christos objfile = objfile->separate_debug_objfile_backlink;
1582 1.9 christos
1583 1.1 christos /* The other link map addresses may be found by examining the list
1584 1.1 christos of shared libraries. */
1585 1.9 christos for (struct so_list *so : current_program_space->solibs ())
1586 1.1 christos if (so->objfile == objfile)
1587 1.8 christos {
1588 1.8 christos lm_info_svr4 *li = (lm_info_svr4 *) so->lm_info;
1589 1.8 christos
1590 1.8 christos return li->lm_addr;
1591 1.8 christos }
1592 1.1 christos
1593 1.1 christos /* Not found! */
1594 1.1 christos return 0;
1595 1.1 christos }
1596 1.1 christos
1597 1.1 christos /* On some systems, the only way to recognize the link map entry for
1598 1.1 christos the main executable file is by looking at its name. Return
1599 1.1 christos non-zero iff SONAME matches one of the known main executable names. */
1600 1.1 christos
1601 1.1 christos static int
1602 1.1 christos match_main (const char *soname)
1603 1.1 christos {
1604 1.1 christos const char * const *mainp;
1605 1.1 christos
1606 1.1 christos for (mainp = main_name_list; *mainp != NULL; mainp++)
1607 1.1 christos {
1608 1.1 christos if (strcmp (soname, *mainp) == 0)
1609 1.1 christos return (1);
1610 1.1 christos }
1611 1.1 christos
1612 1.1 christos return (0);
1613 1.1 christos }
1614 1.1 christos
1615 1.1 christos /* Return 1 if PC lies in the dynamic symbol resolution code of the
1616 1.1 christos SVR4 run time loader. */
1617 1.1 christos
1618 1.1 christos int
1619 1.1 christos svr4_in_dynsym_resolve_code (CORE_ADDR pc)
1620 1.1 christos {
1621 1.9 christos struct svr4_info *info = get_svr4_info (current_program_space);
1622 1.1 christos
1623 1.1 christos return ((pc >= info->interp_text_sect_low
1624 1.1 christos && pc < info->interp_text_sect_high)
1625 1.1 christos || (pc >= info->interp_plt_sect_low
1626 1.1 christos && pc < info->interp_plt_sect_high)
1627 1.1 christos || in_plt_section (pc)
1628 1.1 christos || in_gnu_ifunc_stub (pc));
1629 1.1 christos }
1630 1.1 christos
1631 1.1 christos /* Given an executable's ABFD and target, compute the entry-point
1632 1.1 christos address. */
1633 1.1 christos
1634 1.1 christos static CORE_ADDR
1635 1.1 christos exec_entry_point (struct bfd *abfd, struct target_ops *targ)
1636 1.1 christos {
1637 1.1 christos CORE_ADDR addr;
1638 1.1 christos
1639 1.1 christos /* KevinB wrote ... for most targets, the address returned by
1640 1.1 christos bfd_get_start_address() is the entry point for the start
1641 1.1 christos function. But, for some targets, bfd_get_start_address() returns
1642 1.1 christos the address of a function descriptor from which the entry point
1643 1.1 christos address may be extracted. This address is extracted by
1644 1.1 christos gdbarch_convert_from_func_ptr_addr(). The method
1645 1.1 christos gdbarch_convert_from_func_ptr_addr() is the merely the identify
1646 1.1 christos function for targets which don't use function descriptors. */
1647 1.1 christos addr = gdbarch_convert_from_func_ptr_addr (target_gdbarch (),
1648 1.1 christos bfd_get_start_address (abfd),
1649 1.1 christos targ);
1650 1.1 christos return gdbarch_addr_bits_remove (target_gdbarch (), addr);
1651 1.1 christos }
1652 1.1 christos
1653 1.1 christos /* A probe and its associated action. */
1654 1.1 christos
1655 1.1 christos struct probe_and_action
1656 1.1 christos {
1657 1.1 christos /* The probe. */
1658 1.8 christos probe *prob;
1659 1.1 christos
1660 1.3 christos /* The relocated address of the probe. */
1661 1.3 christos CORE_ADDR address;
1662 1.3 christos
1663 1.1 christos /* The action. */
1664 1.1 christos enum probe_action action;
1665 1.9 christos
1666 1.9 christos /* The objfile where this probe was found. */
1667 1.9 christos struct objfile *objfile;
1668 1.1 christos };
1669 1.1 christos
1670 1.1 christos /* Returns a hash code for the probe_and_action referenced by p. */
1671 1.1 christos
1672 1.1 christos static hashval_t
1673 1.1 christos hash_probe_and_action (const void *p)
1674 1.1 christos {
1675 1.6 christos const struct probe_and_action *pa = (const struct probe_and_action *) p;
1676 1.1 christos
1677 1.3 christos return (hashval_t) pa->address;
1678 1.1 christos }
1679 1.1 christos
1680 1.1 christos /* Returns non-zero if the probe_and_actions referenced by p1 and p2
1681 1.1 christos are equal. */
1682 1.1 christos
1683 1.1 christos static int
1684 1.1 christos equal_probe_and_action (const void *p1, const void *p2)
1685 1.1 christos {
1686 1.6 christos const struct probe_and_action *pa1 = (const struct probe_and_action *) p1;
1687 1.6 christos const struct probe_and_action *pa2 = (const struct probe_and_action *) p2;
1688 1.1 christos
1689 1.3 christos return pa1->address == pa2->address;
1690 1.1 christos }
1691 1.1 christos
1692 1.9 christos /* Traversal function for probes_table_remove_objfile_probes. */
1693 1.9 christos
1694 1.9 christos static int
1695 1.9 christos probes_table_htab_remove_objfile_probes (void **slot, void *info)
1696 1.9 christos {
1697 1.9 christos probe_and_action *pa = (probe_and_action *) *slot;
1698 1.9 christos struct objfile *objfile = (struct objfile *) info;
1699 1.9 christos
1700 1.9 christos if (pa->objfile == objfile)
1701 1.9 christos htab_clear_slot (get_svr4_info (objfile->pspace)->probes_table.get (),
1702 1.9 christos slot);
1703 1.9 christos
1704 1.9 christos return 1;
1705 1.9 christos }
1706 1.9 christos
1707 1.9 christos /* Remove all probes that belong to OBJFILE from the probes table. */
1708 1.9 christos
1709 1.9 christos static void
1710 1.9 christos probes_table_remove_objfile_probes (struct objfile *objfile)
1711 1.9 christos {
1712 1.9 christos svr4_info *info = get_svr4_info (objfile->pspace);
1713 1.9 christos if (info->probes_table != nullptr)
1714 1.9 christos htab_traverse_noresize (info->probes_table.get (),
1715 1.9 christos probes_table_htab_remove_objfile_probes, objfile);
1716 1.9 christos }
1717 1.9 christos
1718 1.1 christos /* Register a solib event probe and its associated action in the
1719 1.1 christos probes table. */
1720 1.1 christos
1721 1.1 christos static void
1722 1.9 christos register_solib_event_probe (svr4_info *info, struct objfile *objfile,
1723 1.9 christos probe *prob, CORE_ADDR address,
1724 1.3 christos enum probe_action action)
1725 1.1 christos {
1726 1.1 christos struct probe_and_action lookup, *pa;
1727 1.1 christos void **slot;
1728 1.1 christos
1729 1.1 christos /* Create the probes table, if necessary. */
1730 1.1 christos if (info->probes_table == NULL)
1731 1.9 christos info->probes_table.reset (htab_create_alloc (1, hash_probe_and_action,
1732 1.9 christos equal_probe_and_action,
1733 1.9 christos xfree, xcalloc, xfree));
1734 1.1 christos
1735 1.3 christos lookup.address = address;
1736 1.9 christos slot = htab_find_slot (info->probes_table.get (), &lookup, INSERT);
1737 1.1 christos gdb_assert (*slot == HTAB_EMPTY_ENTRY);
1738 1.1 christos
1739 1.1 christos pa = XCNEW (struct probe_and_action);
1740 1.8 christos pa->prob = prob;
1741 1.3 christos pa->address = address;
1742 1.1 christos pa->action = action;
1743 1.9 christos pa->objfile = objfile;
1744 1.1 christos
1745 1.1 christos *slot = pa;
1746 1.1 christos }
1747 1.1 christos
1748 1.1 christos /* Get the solib event probe at the specified location, and the
1749 1.1 christos action associated with it. Returns NULL if no solib event probe
1750 1.1 christos was found. */
1751 1.1 christos
1752 1.1 christos static struct probe_and_action *
1753 1.1 christos solib_event_probe_at (struct svr4_info *info, CORE_ADDR address)
1754 1.1 christos {
1755 1.1 christos struct probe_and_action lookup;
1756 1.1 christos void **slot;
1757 1.1 christos
1758 1.3 christos lookup.address = address;
1759 1.9 christos slot = htab_find_slot (info->probes_table.get (), &lookup, NO_INSERT);
1760 1.1 christos
1761 1.1 christos if (slot == NULL)
1762 1.1 christos return NULL;
1763 1.1 christos
1764 1.1 christos return (struct probe_and_action *) *slot;
1765 1.1 christos }
1766 1.1 christos
1767 1.1 christos /* Decide what action to take when the specified solib event probe is
1768 1.1 christos hit. */
1769 1.1 christos
1770 1.1 christos static enum probe_action
1771 1.1 christos solib_event_probe_action (struct probe_and_action *pa)
1772 1.1 christos {
1773 1.1 christos enum probe_action action;
1774 1.6 christos unsigned probe_argc = 0;
1775 1.1 christos struct frame_info *frame = get_current_frame ();
1776 1.1 christos
1777 1.1 christos action = pa->action;
1778 1.1 christos if (action == DO_NOTHING || action == PROBES_INTERFACE_FAILED)
1779 1.1 christos return action;
1780 1.1 christos
1781 1.1 christos gdb_assert (action == FULL_RELOAD || action == UPDATE_OR_RELOAD);
1782 1.1 christos
1783 1.1 christos /* Check that an appropriate number of arguments has been supplied.
1784 1.1 christos We expect:
1785 1.1 christos arg0: Lmid_t lmid (mandatory)
1786 1.1 christos arg1: struct r_debug *debug_base (mandatory)
1787 1.1 christos arg2: struct link_map *new (optional, for incremental updates) */
1788 1.9 christos try
1789 1.6 christos {
1790 1.9 christos probe_argc = pa->prob->get_argument_count (get_frame_arch (frame));
1791 1.6 christos }
1792 1.9 christos catch (const gdb_exception_error &ex)
1793 1.6 christos {
1794 1.6 christos exception_print (gdb_stderr, ex);
1795 1.6 christos probe_argc = 0;
1796 1.6 christos }
1797 1.6 christos
1798 1.8 christos /* If get_argument_count throws an exception, probe_argc will be set
1799 1.8 christos to zero. However, if pa->prob does not have arguments, then
1800 1.8 christos get_argument_count will succeed but probe_argc will also be zero.
1801 1.8 christos Both cases happen because of different things, but they are
1802 1.8 christos treated equally here: action will be set to
1803 1.6 christos PROBES_INTERFACE_FAILED. */
1804 1.1 christos if (probe_argc == 2)
1805 1.1 christos action = FULL_RELOAD;
1806 1.1 christos else if (probe_argc < 2)
1807 1.1 christos action = PROBES_INTERFACE_FAILED;
1808 1.1 christos
1809 1.1 christos return action;
1810 1.1 christos }
1811 1.1 christos
1812 1.1 christos /* Populate the shared object list by reading the entire list of
1813 1.1 christos shared objects from the inferior. Handle special cases relating
1814 1.1 christos to the first elements of the list. Returns nonzero on success. */
1815 1.1 christos
1816 1.1 christos static int
1817 1.1 christos solist_update_full (struct svr4_info *info)
1818 1.1 christos {
1819 1.1 christos free_solib_list (info);
1820 1.1 christos info->solib_list = svr4_current_sos_direct (info);
1821 1.1 christos
1822 1.1 christos return 1;
1823 1.1 christos }
1824 1.1 christos
1825 1.1 christos /* Update the shared object list starting from the link-map entry
1826 1.1 christos passed by the linker in the probe's third argument. Returns
1827 1.1 christos nonzero if the list was successfully updated, or zero to indicate
1828 1.1 christos failure. */
1829 1.1 christos
1830 1.1 christos static int
1831 1.1 christos solist_update_incremental (struct svr4_info *info, CORE_ADDR lm)
1832 1.1 christos {
1833 1.1 christos struct so_list *tail;
1834 1.1 christos CORE_ADDR prev_lm;
1835 1.1 christos
1836 1.1 christos /* svr4_current_sos_direct contains logic to handle a number of
1837 1.1 christos special cases relating to the first elements of the list. To
1838 1.1 christos avoid duplicating this logic we defer to solist_update_full
1839 1.1 christos if the list is empty. */
1840 1.1 christos if (info->solib_list == NULL)
1841 1.1 christos return 0;
1842 1.1 christos
1843 1.1 christos /* Fall back to a full update if we are using a remote target
1844 1.1 christos that does not support incremental transfers. */
1845 1.1 christos if (info->using_xfer && !target_augmented_libraries_svr4_read ())
1846 1.1 christos return 0;
1847 1.1 christos
1848 1.1 christos /* Walk to the end of the list. */
1849 1.1 christos for (tail = info->solib_list; tail->next != NULL; tail = tail->next)
1850 1.1 christos /* Nothing. */;
1851 1.8 christos
1852 1.8 christos lm_info_svr4 *li = (lm_info_svr4 *) tail->lm_info;
1853 1.8 christos prev_lm = li->lm_addr;
1854 1.1 christos
1855 1.1 christos /* Read the new objects. */
1856 1.1 christos if (info->using_xfer)
1857 1.1 christos {
1858 1.1 christos struct svr4_library_list library_list;
1859 1.1 christos char annex[64];
1860 1.1 christos
1861 1.1 christos xsnprintf (annex, sizeof (annex), "start=%s;prev=%s",
1862 1.1 christos phex_nz (lm, sizeof (lm)),
1863 1.1 christos phex_nz (prev_lm, sizeof (prev_lm)));
1864 1.1 christos if (!svr4_current_sos_via_xfer_libraries (&library_list, annex))
1865 1.1 christos return 0;
1866 1.1 christos
1867 1.1 christos tail->next = library_list.head;
1868 1.1 christos }
1869 1.1 christos else
1870 1.1 christos {
1871 1.1 christos struct so_list **link = &tail->next;
1872 1.1 christos
1873 1.1 christos /* IGNORE_FIRST may safely be set to zero here because the
1874 1.1 christos above check and deferral to solist_update_full ensures
1875 1.1 christos that this call to svr4_read_so_list will never see the
1876 1.1 christos first element. */
1877 1.9 christos if (!svr4_read_so_list (info, lm, prev_lm, &link, 0))
1878 1.1 christos return 0;
1879 1.1 christos }
1880 1.1 christos
1881 1.1 christos return 1;
1882 1.1 christos }
1883 1.1 christos
1884 1.1 christos /* Disable the probes-based linker interface and revert to the
1885 1.1 christos original interface. We don't reset the breakpoints as the
1886 1.1 christos ones set up for the probes-based interface are adequate. */
1887 1.1 christos
1888 1.1 christos static void
1889 1.9 christos disable_probes_interface (svr4_info *info)
1890 1.1 christos {
1891 1.1 christos warning (_("Probes-based dynamic linker interface failed.\n"
1892 1.9 christos "Reverting to original interface."));
1893 1.1 christos
1894 1.1 christos free_probes_table (info);
1895 1.1 christos free_solib_list (info);
1896 1.1 christos }
1897 1.1 christos
1898 1.1 christos /* Update the solib list as appropriate when using the
1899 1.1 christos probes-based linker interface. Do nothing if using the
1900 1.1 christos standard interface. */
1901 1.1 christos
1902 1.1 christos static void
1903 1.1 christos svr4_handle_solib_event (void)
1904 1.1 christos {
1905 1.9 christos struct svr4_info *info = get_svr4_info (current_program_space);
1906 1.1 christos struct probe_and_action *pa;
1907 1.1 christos enum probe_action action;
1908 1.6 christos struct value *val = NULL;
1909 1.1 christos CORE_ADDR pc, debug_base, lm = 0;
1910 1.1 christos struct frame_info *frame = get_current_frame ();
1911 1.1 christos
1912 1.1 christos /* Do nothing if not using the probes interface. */
1913 1.1 christos if (info->probes_table == NULL)
1914 1.1 christos return;
1915 1.1 christos
1916 1.1 christos /* If anything goes wrong we revert to the original linker
1917 1.1 christos interface. */
1918 1.9 christos auto cleanup = make_scope_exit ([info] ()
1919 1.9 christos {
1920 1.9 christos disable_probes_interface (info);
1921 1.9 christos });
1922 1.1 christos
1923 1.1 christos pc = regcache_read_pc (get_current_regcache ());
1924 1.1 christos pa = solib_event_probe_at (info, pc);
1925 1.1 christos if (pa == NULL)
1926 1.9 christos return;
1927 1.1 christos
1928 1.1 christos action = solib_event_probe_action (pa);
1929 1.1 christos if (action == PROBES_INTERFACE_FAILED)
1930 1.9 christos return;
1931 1.1 christos
1932 1.1 christos if (action == DO_NOTHING)
1933 1.1 christos {
1934 1.9 christos cleanup.release ();
1935 1.1 christos return;
1936 1.1 christos }
1937 1.1 christos
1938 1.8 christos /* evaluate_argument looks up symbols in the dynamic linker
1939 1.1 christos using find_pc_section. find_pc_section is accelerated by a cache
1940 1.1 christos called the section map. The section map is invalidated every
1941 1.1 christos time a shared library is loaded or unloaded, and if the inferior
1942 1.1 christos is generating a lot of shared library events then the section map
1943 1.1 christos will be updated every time svr4_handle_solib_event is called.
1944 1.1 christos We called find_pc_section in svr4_create_solib_event_breakpoints,
1945 1.1 christos so we can guarantee that the dynamic linker's sections are in the
1946 1.1 christos section map. We can therefore inhibit section map updates across
1947 1.8 christos these calls to evaluate_argument and save a lot of time. */
1948 1.8 christos {
1949 1.8 christos scoped_restore inhibit_updates
1950 1.8 christos = inhibit_section_map_updates (current_program_space);
1951 1.1 christos
1952 1.9 christos try
1953 1.8 christos {
1954 1.8 christos val = pa->prob->evaluate_argument (1, frame);
1955 1.8 christos }
1956 1.9 christos catch (const gdb_exception_error &ex)
1957 1.8 christos {
1958 1.8 christos exception_print (gdb_stderr, ex);
1959 1.8 christos val = NULL;
1960 1.8 christos }
1961 1.6 christos
1962 1.8 christos if (val == NULL)
1963 1.9 christos return;
1964 1.1 christos
1965 1.8 christos debug_base = value_as_address (val);
1966 1.8 christos if (debug_base == 0)
1967 1.9 christos return;
1968 1.1 christos
1969 1.8 christos /* Always locate the debug struct, in case it moved. */
1970 1.8 christos info->debug_base = 0;
1971 1.8 christos if (locate_base (info) == 0)
1972 1.8 christos {
1973 1.9 christos /* It's possible for the reloc_complete probe to be triggered before
1974 1.9 christos the linker has set the DT_DEBUG pointer (for example, when the
1975 1.9 christos linker has finished relocating an LD_AUDIT library or its
1976 1.9 christos dependencies). Since we can't yet handle libraries from other link
1977 1.9 christos namespaces, we don't lose anything by ignoring them here. */
1978 1.9 christos struct value *link_map_id_val;
1979 1.9 christos try
1980 1.9 christos {
1981 1.9 christos link_map_id_val = pa->prob->evaluate_argument (0, frame);
1982 1.9 christos }
1983 1.9 christos catch (const gdb_exception_error)
1984 1.9 christos {
1985 1.9 christos link_map_id_val = NULL;
1986 1.9 christos }
1987 1.9 christos /* glibc and illumos' libc both define LM_ID_BASE as zero. */
1988 1.9 christos if (link_map_id_val != NULL && value_as_long (link_map_id_val) != 0)
1989 1.9 christos action = DO_NOTHING;
1990 1.9 christos else
1991 1.9 christos return;
1992 1.8 christos }
1993 1.1 christos
1994 1.8 christos /* GDB does not currently support libraries loaded via dlmopen
1995 1.8 christos into namespaces other than the initial one. We must ignore
1996 1.8 christos any namespace other than the initial namespace here until
1997 1.8 christos support for this is added to GDB. */
1998 1.8 christos if (debug_base != info->debug_base)
1999 1.8 christos action = DO_NOTHING;
2000 1.1 christos
2001 1.8 christos if (action == UPDATE_OR_RELOAD)
2002 1.8 christos {
2003 1.9 christos try
2004 1.8 christos {
2005 1.8 christos val = pa->prob->evaluate_argument (2, frame);
2006 1.8 christos }
2007 1.9 christos catch (const gdb_exception_error &ex)
2008 1.8 christos {
2009 1.8 christos exception_print (gdb_stderr, ex);
2010 1.8 christos return;
2011 1.8 christos }
2012 1.6 christos
2013 1.8 christos if (val != NULL)
2014 1.8 christos lm = value_as_address (val);
2015 1.1 christos
2016 1.8 christos if (lm == 0)
2017 1.8 christos action = FULL_RELOAD;
2018 1.8 christos }
2019 1.1 christos
2020 1.8 christos /* Resume section map updates. Closing the scope is
2021 1.8 christos sufficient. */
2022 1.8 christos }
2023 1.1 christos
2024 1.1 christos if (action == UPDATE_OR_RELOAD)
2025 1.1 christos {
2026 1.1 christos if (!solist_update_incremental (info, lm))
2027 1.1 christos action = FULL_RELOAD;
2028 1.1 christos }
2029 1.1 christos
2030 1.1 christos if (action == FULL_RELOAD)
2031 1.1 christos {
2032 1.1 christos if (!solist_update_full (info))
2033 1.9 christos return;
2034 1.1 christos }
2035 1.1 christos
2036 1.9 christos cleanup.release ();
2037 1.1 christos }
2038 1.1 christos
2039 1.1 christos /* Helper function for svr4_update_solib_event_breakpoints. */
2040 1.1 christos
2041 1.9 christos static bool
2042 1.9 christos svr4_update_solib_event_breakpoint (struct breakpoint *b)
2043 1.1 christos {
2044 1.1 christos struct bp_location *loc;
2045 1.1 christos
2046 1.1 christos if (b->type != bp_shlib_event)
2047 1.1 christos {
2048 1.1 christos /* Continue iterating. */
2049 1.9 christos return false;
2050 1.1 christos }
2051 1.1 christos
2052 1.1 christos for (loc = b->loc; loc != NULL; loc = loc->next)
2053 1.1 christos {
2054 1.1 christos struct svr4_info *info;
2055 1.1 christos struct probe_and_action *pa;
2056 1.1 christos
2057 1.9 christos info = solib_svr4_pspace_data.get (loc->pspace);
2058 1.1 christos if (info == NULL || info->probes_table == NULL)
2059 1.1 christos continue;
2060 1.1 christos
2061 1.1 christos pa = solib_event_probe_at (info, loc->address);
2062 1.1 christos if (pa == NULL)
2063 1.1 christos continue;
2064 1.1 christos
2065 1.1 christos if (pa->action == DO_NOTHING)
2066 1.1 christos {
2067 1.1 christos if (b->enable_state == bp_disabled && stop_on_solib_events)
2068 1.1 christos enable_breakpoint (b);
2069 1.1 christos else if (b->enable_state == bp_enabled && !stop_on_solib_events)
2070 1.1 christos disable_breakpoint (b);
2071 1.1 christos }
2072 1.1 christos
2073 1.1 christos break;
2074 1.1 christos }
2075 1.1 christos
2076 1.1 christos /* Continue iterating. */
2077 1.9 christos return false;
2078 1.1 christos }
2079 1.1 christos
2080 1.1 christos /* Enable or disable optional solib event breakpoints as appropriate.
2081 1.1 christos Called whenever stop_on_solib_events is changed. */
2082 1.1 christos
2083 1.1 christos static void
2084 1.1 christos svr4_update_solib_event_breakpoints (void)
2085 1.1 christos {
2086 1.9 christos iterate_over_breakpoints (svr4_update_solib_event_breakpoint);
2087 1.1 christos }
2088 1.1 christos
2089 1.1 christos /* Create and register solib event breakpoints. PROBES is an array
2090 1.1 christos of NUM_PROBES elements, each of which is vector of probes. A
2091 1.1 christos solib event breakpoint will be created and registered for each
2092 1.1 christos probe. */
2093 1.1 christos
2094 1.1 christos static void
2095 1.9 christos svr4_create_probe_breakpoints (svr4_info *info, struct gdbarch *gdbarch,
2096 1.8 christos const std::vector<probe *> *probes,
2097 1.3 christos struct objfile *objfile)
2098 1.1 christos {
2099 1.8 christos for (int i = 0; i < NUM_PROBES; i++)
2100 1.1 christos {
2101 1.1 christos enum probe_action action = probe_info[i].action;
2102 1.1 christos
2103 1.8 christos for (probe *p : probes[i])
2104 1.1 christos {
2105 1.8 christos CORE_ADDR address = p->get_relocated_address (objfile);
2106 1.3 christos
2107 1.3 christos create_solib_event_breakpoint (gdbarch, address);
2108 1.9 christos register_solib_event_probe (info, objfile, p, address, action);
2109 1.1 christos }
2110 1.1 christos }
2111 1.1 christos
2112 1.1 christos svr4_update_solib_event_breakpoints ();
2113 1.1 christos }
2114 1.1 christos
2115 1.9 christos /* Find all the glibc named probes. Only if all of the probes are found, then
2116 1.9 christos create them and return true. Otherwise return false. If WITH_PREFIX is set
2117 1.9 christos then add "rtld" to the front of the probe names. */
2118 1.9 christos static bool
2119 1.9 christos svr4_find_and_create_probe_breakpoints (svr4_info *info,
2120 1.9 christos struct gdbarch *gdbarch,
2121 1.9 christos struct obj_section *os,
2122 1.9 christos bool with_prefix)
2123 1.9 christos {
2124 1.9 christos std::vector<probe *> probes[NUM_PROBES];
2125 1.9 christos
2126 1.9 christos for (int i = 0; i < NUM_PROBES; i++)
2127 1.9 christos {
2128 1.9 christos const char *name = probe_info[i].name;
2129 1.9 christos char buf[32];
2130 1.9 christos
2131 1.9 christos /* Fedora 17 and Red Hat Enterprise Linux 6.2-6.4 shipped with an early
2132 1.9 christos version of the probes code in which the probes' names were prefixed
2133 1.9 christos with "rtld_" and the "map_failed" probe did not exist. The locations
2134 1.9 christos of the probes are otherwise the same, so we check for probes with
2135 1.9 christos prefixed names if probes with unprefixed names are not present. */
2136 1.9 christos if (with_prefix)
2137 1.9 christos {
2138 1.9 christos xsnprintf (buf, sizeof (buf), "rtld_%s", name);
2139 1.9 christos name = buf;
2140 1.9 christos }
2141 1.9 christos
2142 1.9 christos probes[i] = find_probes_in_objfile (os->objfile, "rtld", name);
2143 1.9 christos
2144 1.9 christos /* The "map_failed" probe did not exist in early
2145 1.9 christos versions of the probes code in which the probes'
2146 1.9 christos names were prefixed with "rtld_". */
2147 1.9 christos if (with_prefix && streq (name, "rtld_map_failed"))
2148 1.9 christos continue;
2149 1.9 christos
2150 1.9 christos /* Ensure at least one probe for the current name was found. */
2151 1.9 christos if (probes[i].empty ())
2152 1.9 christos return false;
2153 1.9 christos
2154 1.9 christos /* Ensure probe arguments can be evaluated. */
2155 1.9 christos for (probe *p : probes[i])
2156 1.9 christos {
2157 1.9 christos if (!p->can_evaluate_arguments ())
2158 1.9 christos return false;
2159 1.9 christos /* This will fail if the probe is invalid. This has been seen on Arm
2160 1.9 christos due to references to symbols that have been resolved away. */
2161 1.9 christos try
2162 1.9 christos {
2163 1.9 christos p->get_argument_count (gdbarch);
2164 1.9 christos }
2165 1.9 christos catch (const gdb_exception_error &ex)
2166 1.9 christos {
2167 1.9 christos exception_print (gdb_stderr, ex);
2168 1.9 christos warning (_("Initializing probes-based dynamic linker interface "
2169 1.9 christos "failed.\nReverting to original interface."));
2170 1.9 christos return false;
2171 1.9 christos }
2172 1.9 christos }
2173 1.9 christos }
2174 1.9 christos
2175 1.9 christos /* All probes found. Now create them. */
2176 1.9 christos svr4_create_probe_breakpoints (info, gdbarch, probes, os->objfile);
2177 1.9 christos return true;
2178 1.9 christos }
2179 1.9 christos
2180 1.1 christos /* Both the SunOS and the SVR4 dynamic linkers call a marker function
2181 1.1 christos before and after mapping and unmapping shared libraries. The sole
2182 1.1 christos purpose of this method is to allow debuggers to set a breakpoint so
2183 1.1 christos they can track these changes.
2184 1.1 christos
2185 1.1 christos Some versions of the glibc dynamic linker contain named probes
2186 1.1 christos to allow more fine grained stopping. Given the address of the
2187 1.1 christos original marker function, this function attempts to find these
2188 1.1 christos probes, and if found, sets breakpoints on those instead. If the
2189 1.1 christos probes aren't found, a single breakpoint is set on the original
2190 1.1 christos marker function. */
2191 1.1 christos
2192 1.1 christos static void
2193 1.9 christos svr4_create_solib_event_breakpoints (svr4_info *info, struct gdbarch *gdbarch,
2194 1.1 christos CORE_ADDR address)
2195 1.1 christos {
2196 1.9 christos struct obj_section *os = find_pc_section (address);
2197 1.1 christos
2198 1.9 christos if (os == nullptr
2199 1.9 christos || (!svr4_find_and_create_probe_breakpoints (info, gdbarch, os, false)
2200 1.9 christos && !svr4_find_and_create_probe_breakpoints (info, gdbarch, os, true)))
2201 1.9 christos create_solib_event_breakpoint (gdbarch, address);
2202 1.1 christos }
2203 1.1 christos
2204 1.1 christos /* Helper function for gdb_bfd_lookup_symbol. */
2205 1.1 christos
2206 1.1 christos static int
2207 1.6 christos cmp_name_and_sec_flags (const asymbol *sym, const void *data)
2208 1.1 christos {
2209 1.1 christos return (strcmp (sym->name, (const char *) data) == 0
2210 1.1 christos && (sym->section->flags & (SEC_CODE | SEC_DATA)) != 0);
2211 1.1 christos }
2212 1.1 christos /* Arrange for dynamic linker to hit breakpoint.
2213 1.1 christos
2214 1.1 christos Both the SunOS and the SVR4 dynamic linkers have, as part of their
2215 1.1 christos debugger interface, support for arranging for the inferior to hit
2216 1.1 christos a breakpoint after mapping in the shared libraries. This function
2217 1.1 christos enables that breakpoint.
2218 1.1 christos
2219 1.1 christos For SunOS, there is a special flag location (in_debugger) which we
2220 1.1 christos set to 1. When the dynamic linker sees this flag set, it will set
2221 1.1 christos a breakpoint at a location known only to itself, after saving the
2222 1.1 christos original contents of that place and the breakpoint address itself,
2223 1.1 christos in it's own internal structures. When we resume the inferior, it
2224 1.1 christos will eventually take a SIGTRAP when it runs into the breakpoint.
2225 1.1 christos We handle this (in a different place) by restoring the contents of
2226 1.1 christos the breakpointed location (which is only known after it stops),
2227 1.1 christos chasing around to locate the shared libraries that have been
2228 1.1 christos loaded, then resuming.
2229 1.1 christos
2230 1.1 christos For SVR4, the debugger interface structure contains a member (r_brk)
2231 1.1 christos which is statically initialized at the time the shared library is
2232 1.1 christos built, to the offset of a function (_r_debug_state) which is guaran-
2233 1.1 christos teed to be called once before mapping in a library, and again when
2234 1.1 christos the mapping is complete. At the time we are examining this member,
2235 1.1 christos it contains only the unrelocated offset of the function, so we have
2236 1.1 christos to do our own relocation. Later, when the dynamic linker actually
2237 1.1 christos runs, it relocates r_brk to be the actual address of _r_debug_state().
2238 1.1 christos
2239 1.1 christos The debugger interface structure also contains an enumeration which
2240 1.1 christos is set to either RT_ADD or RT_DELETE prior to changing the mapping,
2241 1.1 christos depending upon whether or not the library is being mapped or unmapped,
2242 1.1 christos and then set to RT_CONSISTENT after the library is mapped/unmapped. */
2243 1.1 christos
2244 1.1 christos static int
2245 1.1 christos enable_break (struct svr4_info *info, int from_tty)
2246 1.1 christos {
2247 1.3 christos struct bound_minimal_symbol msymbol;
2248 1.1 christos const char * const *bkpt_namep;
2249 1.1 christos asection *interp_sect;
2250 1.1 christos CORE_ADDR sym_addr;
2251 1.1 christos
2252 1.1 christos info->interp_text_sect_low = info->interp_text_sect_high = 0;
2253 1.1 christos info->interp_plt_sect_low = info->interp_plt_sect_high = 0;
2254 1.1 christos
2255 1.1 christos /* If we already have a shared library list in the target, and
2256 1.1 christos r_debug contains r_brk, set the breakpoint there - this should
2257 1.1 christos mean r_brk has already been relocated. Assume the dynamic linker
2258 1.1 christos is the object containing r_brk. */
2259 1.1 christos
2260 1.7 christos solib_add (NULL, from_tty, auto_solib_add);
2261 1.1 christos sym_addr = 0;
2262 1.1 christos if (info->debug_base && solib_svr4_r_map (info) != 0)
2263 1.1 christos sym_addr = solib_svr4_r_brk (info);
2264 1.1 christos
2265 1.1 christos if (sym_addr != 0)
2266 1.1 christos {
2267 1.1 christos struct obj_section *os;
2268 1.1 christos
2269 1.1 christos sym_addr = gdbarch_addr_bits_remove
2270 1.8 christos (target_gdbarch (),
2271 1.8 christos gdbarch_convert_from_func_ptr_addr (target_gdbarch (),
2272 1.8 christos sym_addr,
2273 1.8 christos current_top_target ()));
2274 1.1 christos
2275 1.1 christos /* On at least some versions of Solaris there's a dynamic relocation
2276 1.1 christos on _r_debug.r_brk and SYM_ADDR may not be relocated yet, e.g., if
2277 1.1 christos we get control before the dynamic linker has self-relocated.
2278 1.1 christos Check if SYM_ADDR is in a known section, if it is assume we can
2279 1.1 christos trust its value. This is just a heuristic though, it could go away
2280 1.1 christos or be replaced if it's getting in the way.
2281 1.1 christos
2282 1.1 christos On ARM we need to know whether the ISA of rtld_db_dlactivity (or
2283 1.1 christos however it's spelled in your particular system) is ARM or Thumb.
2284 1.1 christos That knowledge is encoded in the address, if it's Thumb the low bit
2285 1.1 christos is 1. However, we've stripped that info above and it's not clear
2286 1.1 christos what all the consequences are of passing a non-addr_bits_remove'd
2287 1.1 christos address to svr4_create_solib_event_breakpoints. The call to
2288 1.1 christos find_pc_section verifies we know about the address and have some
2289 1.1 christos hope of computing the right kind of breakpoint to use (via
2290 1.1 christos symbol info). It does mean that GDB needs to be pointed at a
2291 1.1 christos non-stripped version of the dynamic linker in order to obtain
2292 1.1 christos information it already knows about. Sigh. */
2293 1.1 christos
2294 1.1 christos os = find_pc_section (sym_addr);
2295 1.1 christos if (os != NULL)
2296 1.1 christos {
2297 1.1 christos /* Record the relocated start and end address of the dynamic linker
2298 1.1 christos text and plt section for svr4_in_dynsym_resolve_code. */
2299 1.1 christos bfd *tmp_bfd;
2300 1.1 christos CORE_ADDR load_addr;
2301 1.1 christos
2302 1.1 christos tmp_bfd = os->objfile->obfd;
2303 1.9 christos load_addr = os->objfile->text_section_offset ();
2304 1.1 christos
2305 1.1 christos interp_sect = bfd_get_section_by_name (tmp_bfd, ".text");
2306 1.1 christos if (interp_sect)
2307 1.1 christos {
2308 1.9 christos info->interp_text_sect_low
2309 1.9 christos = bfd_section_vma (interp_sect) + load_addr;
2310 1.9 christos info->interp_text_sect_high
2311 1.9 christos = info->interp_text_sect_low + bfd_section_size (interp_sect);
2312 1.1 christos }
2313 1.1 christos interp_sect = bfd_get_section_by_name (tmp_bfd, ".plt");
2314 1.1 christos if (interp_sect)
2315 1.1 christos {
2316 1.9 christos info->interp_plt_sect_low
2317 1.9 christos = bfd_section_vma (interp_sect) + load_addr;
2318 1.9 christos info->interp_plt_sect_high
2319 1.9 christos = info->interp_plt_sect_low + bfd_section_size (interp_sect);
2320 1.1 christos }
2321 1.1 christos
2322 1.9 christos svr4_create_solib_event_breakpoints (info, target_gdbarch (), sym_addr);
2323 1.1 christos return 1;
2324 1.1 christos }
2325 1.1 christos }
2326 1.1 christos
2327 1.1 christos /* Find the program interpreter; if not found, warn the user and drop
2328 1.1 christos into the old breakpoint at symbol code. */
2329 1.8 christos gdb::optional<gdb::byte_vector> interp_name_holder
2330 1.8 christos = find_program_interpreter ();
2331 1.8 christos if (interp_name_holder)
2332 1.1 christos {
2333 1.8 christos const char *interp_name = (const char *) interp_name_holder->data ();
2334 1.1 christos CORE_ADDR load_addr = 0;
2335 1.1 christos int load_addr_found = 0;
2336 1.1 christos int loader_found_in_list = 0;
2337 1.1 christos struct target_ops *tmp_bfd_target;
2338 1.1 christos
2339 1.1 christos sym_addr = 0;
2340 1.1 christos
2341 1.1 christos /* Now we need to figure out where the dynamic linker was
2342 1.1 christos loaded so that we can load its symbols and place a breakpoint
2343 1.1 christos in the dynamic linker itself.
2344 1.1 christos
2345 1.1 christos This address is stored on the stack. However, I've been unable
2346 1.1 christos to find any magic formula to find it for Solaris (appears to
2347 1.1 christos be trivial on GNU/Linux). Therefore, we have to try an alternate
2348 1.1 christos mechanism to find the dynamic linker's base address. */
2349 1.1 christos
2350 1.7 christos gdb_bfd_ref_ptr tmp_bfd;
2351 1.9 christos try
2352 1.1 christos {
2353 1.1 christos tmp_bfd = solib_bfd_open (interp_name);
2354 1.1 christos }
2355 1.9 christos catch (const gdb_exception &ex)
2356 1.5 christos {
2357 1.5 christos }
2358 1.5 christos
2359 1.1 christos if (tmp_bfd == NULL)
2360 1.1 christos goto bkpt_at_symbol;
2361 1.1 christos
2362 1.1 christos /* Now convert the TMP_BFD into a target. That way target, as
2363 1.7 christos well as BFD operations can be used. target_bfd_reopen
2364 1.7 christos acquires its own reference. */
2365 1.7 christos tmp_bfd_target = target_bfd_reopen (tmp_bfd.get ());
2366 1.1 christos
2367 1.1 christos /* On a running target, we can get the dynamic linker's base
2368 1.1 christos address from the shared library table. */
2369 1.9 christos for (struct so_list *so : current_program_space->solibs ())
2370 1.1 christos {
2371 1.1 christos if (svr4_same_1 (interp_name, so->so_original_name))
2372 1.1 christos {
2373 1.1 christos load_addr_found = 1;
2374 1.1 christos loader_found_in_list = 1;
2375 1.7 christos load_addr = lm_addr_check (so, tmp_bfd.get ());
2376 1.1 christos break;
2377 1.1 christos }
2378 1.1 christos }
2379 1.1 christos
2380 1.1 christos /* If we were not able to find the base address of the loader
2381 1.1 christos from our so_list, then try using the AT_BASE auxilliary entry. */
2382 1.1 christos if (!load_addr_found)
2383 1.8 christos if (target_auxv_search (current_top_target (), AT_BASE, &load_addr) > 0)
2384 1.1 christos {
2385 1.1 christos int addr_bit = gdbarch_addr_bit (target_gdbarch ());
2386 1.1 christos
2387 1.1 christos /* Ensure LOAD_ADDR has proper sign in its possible upper bits so
2388 1.1 christos that `+ load_addr' will overflow CORE_ADDR width not creating
2389 1.1 christos invalid addresses like 0x101234567 for 32bit inferiors on 64bit
2390 1.1 christos GDB. */
2391 1.1 christos
2392 1.1 christos if (addr_bit < (sizeof (CORE_ADDR) * HOST_CHAR_BIT))
2393 1.1 christos {
2394 1.1 christos CORE_ADDR space_size = (CORE_ADDR) 1 << addr_bit;
2395 1.7 christos CORE_ADDR tmp_entry_point = exec_entry_point (tmp_bfd.get (),
2396 1.1 christos tmp_bfd_target);
2397 1.1 christos
2398 1.1 christos gdb_assert (load_addr < space_size);
2399 1.1 christos
2400 1.1 christos /* TMP_ENTRY_POINT exceeding SPACE_SIZE would be for prelinked
2401 1.1 christos 64bit ld.so with 32bit executable, it should not happen. */
2402 1.1 christos
2403 1.1 christos if (tmp_entry_point < space_size
2404 1.1 christos && tmp_entry_point + load_addr >= space_size)
2405 1.1 christos load_addr -= space_size;
2406 1.1 christos }
2407 1.1 christos
2408 1.1 christos load_addr_found = 1;
2409 1.1 christos }
2410 1.1 christos
2411 1.1 christos /* Otherwise we find the dynamic linker's base address by examining
2412 1.1 christos the current pc (which should point at the entry point for the
2413 1.1 christos dynamic linker) and subtracting the offset of the entry point.
2414 1.1 christos
2415 1.1 christos This is more fragile than the previous approaches, but is a good
2416 1.1 christos fallback method because it has actually been working well in
2417 1.1 christos most cases. */
2418 1.1 christos if (!load_addr_found)
2419 1.1 christos {
2420 1.1 christos struct regcache *regcache
2421 1.9 christos = get_thread_arch_regcache (current_inferior ()->process_target (),
2422 1.9 christos inferior_ptid, target_gdbarch ());
2423 1.1 christos
2424 1.1 christos load_addr = (regcache_read_pc (regcache)
2425 1.7 christos - exec_entry_point (tmp_bfd.get (), tmp_bfd_target));
2426 1.1 christos }
2427 1.1 christos
2428 1.1 christos if (!loader_found_in_list)
2429 1.1 christos {
2430 1.1 christos info->debug_loader_name = xstrdup (interp_name);
2431 1.1 christos info->debug_loader_offset_p = 1;
2432 1.1 christos info->debug_loader_offset = load_addr;
2433 1.7 christos solib_add (NULL, from_tty, auto_solib_add);
2434 1.1 christos }
2435 1.1 christos
2436 1.1 christos /* Record the relocated start and end address of the dynamic linker
2437 1.1 christos text and plt section for svr4_in_dynsym_resolve_code. */
2438 1.7 christos interp_sect = bfd_get_section_by_name (tmp_bfd.get (), ".text");
2439 1.1 christos if (interp_sect)
2440 1.1 christos {
2441 1.9 christos info->interp_text_sect_low
2442 1.9 christos = bfd_section_vma (interp_sect) + load_addr;
2443 1.9 christos info->interp_text_sect_high
2444 1.9 christos = info->interp_text_sect_low + bfd_section_size (interp_sect);
2445 1.1 christos }
2446 1.7 christos interp_sect = bfd_get_section_by_name (tmp_bfd.get (), ".plt");
2447 1.1 christos if (interp_sect)
2448 1.1 christos {
2449 1.9 christos info->interp_plt_sect_low
2450 1.9 christos = bfd_section_vma (interp_sect) + load_addr;
2451 1.9 christos info->interp_plt_sect_high
2452 1.9 christos = info->interp_plt_sect_low + bfd_section_size (interp_sect);
2453 1.1 christos }
2454 1.1 christos
2455 1.1 christos /* Now try to set a breakpoint in the dynamic linker. */
2456 1.1 christos for (bkpt_namep = solib_break_names; *bkpt_namep != NULL; bkpt_namep++)
2457 1.1 christos {
2458 1.7 christos sym_addr = gdb_bfd_lookup_symbol (tmp_bfd.get (),
2459 1.7 christos cmp_name_and_sec_flags,
2460 1.6 christos *bkpt_namep);
2461 1.1 christos if (sym_addr != 0)
2462 1.1 christos break;
2463 1.1 christos }
2464 1.1 christos
2465 1.1 christos if (sym_addr != 0)
2466 1.1 christos /* Convert 'sym_addr' from a function pointer to an address.
2467 1.1 christos Because we pass tmp_bfd_target instead of the current
2468 1.1 christos target, this will always produce an unrelocated value. */
2469 1.1 christos sym_addr = gdbarch_convert_from_func_ptr_addr (target_gdbarch (),
2470 1.1 christos sym_addr,
2471 1.1 christos tmp_bfd_target);
2472 1.1 christos
2473 1.1 christos /* We're done with both the temporary bfd and target. Closing
2474 1.1 christos the target closes the underlying bfd, because it holds the
2475 1.1 christos only remaining reference. */
2476 1.1 christos target_close (tmp_bfd_target);
2477 1.1 christos
2478 1.1 christos if (sym_addr != 0)
2479 1.1 christos {
2480 1.9 christos svr4_create_solib_event_breakpoints (info, target_gdbarch (),
2481 1.1 christos load_addr + sym_addr);
2482 1.1 christos return 1;
2483 1.1 christos }
2484 1.1 christos
2485 1.1 christos /* For whatever reason we couldn't set a breakpoint in the dynamic
2486 1.1 christos linker. Warn and drop into the old code. */
2487 1.1 christos bkpt_at_symbol:
2488 1.1 christos warning (_("Unable to find dynamic linker breakpoint function.\n"
2489 1.1 christos "GDB will be unable to debug shared library initializers\n"
2490 1.1 christos "and track explicitly loaded dynamic code."));
2491 1.1 christos }
2492 1.1 christos
2493 1.1 christos /* Scan through the lists of symbols, trying to look up the symbol and
2494 1.1 christos set a breakpoint there. Terminate loop when we/if we succeed. */
2495 1.1 christos
2496 1.1 christos for (bkpt_namep = solib_break_names; *bkpt_namep != NULL; bkpt_namep++)
2497 1.1 christos {
2498 1.1 christos msymbol = lookup_minimal_symbol (*bkpt_namep, NULL, symfile_objfile);
2499 1.3 christos if ((msymbol.minsym != NULL)
2500 1.3 christos && (BMSYMBOL_VALUE_ADDRESS (msymbol) != 0))
2501 1.1 christos {
2502 1.3 christos sym_addr = BMSYMBOL_VALUE_ADDRESS (msymbol);
2503 1.1 christos sym_addr = gdbarch_convert_from_func_ptr_addr (target_gdbarch (),
2504 1.1 christos sym_addr,
2505 1.8 christos current_top_target ());
2506 1.9 christos svr4_create_solib_event_breakpoints (info, target_gdbarch (),
2507 1.9 christos sym_addr);
2508 1.1 christos return 1;
2509 1.1 christos }
2510 1.1 christos }
2511 1.1 christos
2512 1.8 christos if (interp_name_holder && !current_inferior ()->attach_flag)
2513 1.1 christos {
2514 1.1 christos for (bkpt_namep = bkpt_names; *bkpt_namep != NULL; bkpt_namep++)
2515 1.1 christos {
2516 1.1 christos msymbol = lookup_minimal_symbol (*bkpt_namep, NULL, symfile_objfile);
2517 1.3 christos if ((msymbol.minsym != NULL)
2518 1.3 christos && (BMSYMBOL_VALUE_ADDRESS (msymbol) != 0))
2519 1.1 christos {
2520 1.3 christos sym_addr = BMSYMBOL_VALUE_ADDRESS (msymbol);
2521 1.1 christos sym_addr = gdbarch_convert_from_func_ptr_addr (target_gdbarch (),
2522 1.1 christos sym_addr,
2523 1.8 christos current_top_target ());
2524 1.9 christos svr4_create_solib_event_breakpoints (info, target_gdbarch (),
2525 1.9 christos sym_addr);
2526 1.1 christos return 1;
2527 1.1 christos }
2528 1.1 christos }
2529 1.1 christos }
2530 1.1 christos return 0;
2531 1.1 christos }
2532 1.1 christos
2533 1.8 christos /* Read the ELF program headers from ABFD. */
2534 1.1 christos
2535 1.8 christos static gdb::optional<gdb::byte_vector>
2536 1.8 christos read_program_headers_from_bfd (bfd *abfd)
2537 1.1 christos {
2538 1.8 christos Elf_Internal_Ehdr *ehdr = elf_elfheader (abfd);
2539 1.8 christos int phdrs_size = ehdr->e_phnum * ehdr->e_phentsize;
2540 1.8 christos if (phdrs_size == 0)
2541 1.8 christos return {};
2542 1.1 christos
2543 1.8 christos gdb::byte_vector buf (phdrs_size);
2544 1.1 christos if (bfd_seek (abfd, ehdr->e_phoff, SEEK_SET) != 0
2545 1.8 christos || bfd_bread (buf.data (), phdrs_size, abfd) != phdrs_size)
2546 1.8 christos return {};
2547 1.1 christos
2548 1.1 christos return buf;
2549 1.1 christos }
2550 1.1 christos
2551 1.1 christos /* Return 1 and fill *DISPLACEMENTP with detected PIE offset of inferior
2552 1.1 christos exec_bfd. Otherwise return 0.
2553 1.1 christos
2554 1.1 christos We relocate all of the sections by the same amount. This
2555 1.1 christos behavior is mandated by recent editions of the System V ABI.
2556 1.1 christos According to the System V Application Binary Interface,
2557 1.1 christos Edition 4.1, page 5-5:
2558 1.1 christos
2559 1.1 christos ... Though the system chooses virtual addresses for
2560 1.1 christos individual processes, it maintains the segments' relative
2561 1.1 christos positions. Because position-independent code uses relative
2562 1.9 christos addressing between segments, the difference between
2563 1.1 christos virtual addresses in memory must match the difference
2564 1.1 christos between virtual addresses in the file. The difference
2565 1.1 christos between the virtual address of any segment in memory and
2566 1.1 christos the corresponding virtual address in the file is thus a
2567 1.1 christos single constant value for any one executable or shared
2568 1.1 christos object in a given process. This difference is the base
2569 1.1 christos address. One use of the base address is to relocate the
2570 1.1 christos memory image of the program during dynamic linking.
2571 1.1 christos
2572 1.1 christos The same language also appears in Edition 4.0 of the System V
2573 1.1 christos ABI and is left unspecified in some of the earlier editions.
2574 1.1 christos
2575 1.1 christos Decide if the objfile needs to be relocated. As indicated above, we will
2576 1.1 christos only be here when execution is stopped. But during attachment PC can be at
2577 1.1 christos arbitrary address therefore regcache_read_pc can be misleading (contrary to
2578 1.1 christos the auxv AT_ENTRY value). Moreover for executable with interpreter section
2579 1.1 christos regcache_read_pc would point to the interpreter and not the main executable.
2580 1.1 christos
2581 1.1 christos So, to summarize, relocations are necessary when the start address obtained
2582 1.1 christos from the executable is different from the address in auxv AT_ENTRY entry.
2583 1.1 christos
2584 1.1 christos [ The astute reader will note that we also test to make sure that
2585 1.1 christos the executable in question has the DYNAMIC flag set. It is my
2586 1.1 christos opinion that this test is unnecessary (undesirable even). It
2587 1.1 christos was added to avoid inadvertent relocation of an executable
2588 1.1 christos whose e_type member in the ELF header is not ET_DYN. There may
2589 1.1 christos be a time in the future when it is desirable to do relocations
2590 1.1 christos on other types of files as well in which case this condition
2591 1.1 christos should either be removed or modified to accomodate the new file
2592 1.1 christos type. - Kevin, Nov 2000. ] */
2593 1.1 christos
2594 1.1 christos static int
2595 1.1 christos svr4_exec_displacement (CORE_ADDR *displacementp)
2596 1.1 christos {
2597 1.1 christos /* ENTRY_POINT is a possible function descriptor - before
2598 1.1 christos a call to gdbarch_convert_from_func_ptr_addr. */
2599 1.5 christos CORE_ADDR entry_point, exec_displacement;
2600 1.1 christos
2601 1.1 christos if (exec_bfd == NULL)
2602 1.1 christos return 0;
2603 1.1 christos
2604 1.1 christos /* Therefore for ELF it is ET_EXEC and not ET_DYN. Both shared libraries
2605 1.1 christos being executed themselves and PIE (Position Independent Executable)
2606 1.1 christos executables are ET_DYN. */
2607 1.1 christos
2608 1.1 christos if ((bfd_get_file_flags (exec_bfd) & DYNAMIC) == 0)
2609 1.1 christos return 0;
2610 1.1 christos
2611 1.8 christos if (target_auxv_search (current_top_target (), AT_ENTRY, &entry_point) <= 0)
2612 1.1 christos return 0;
2613 1.1 christos
2614 1.5 christos exec_displacement = entry_point - bfd_get_start_address (exec_bfd);
2615 1.1 christos
2616 1.5 christos /* Verify the EXEC_DISPLACEMENT candidate complies with the required page
2617 1.1 christos alignment. It is cheaper than the program headers comparison below. */
2618 1.1 christos
2619 1.1 christos if (bfd_get_flavour (exec_bfd) == bfd_target_elf_flavour)
2620 1.1 christos {
2621 1.1 christos const struct elf_backend_data *elf = get_elf_backend_data (exec_bfd);
2622 1.1 christos
2623 1.1 christos /* p_align of PT_LOAD segments does not specify any alignment but
2624 1.1 christos only congruency of addresses:
2625 1.1 christos p_offset % p_align == p_vaddr % p_align
2626 1.1 christos Kernel is free to load the executable with lower alignment. */
2627 1.1 christos
2628 1.5 christos if ((exec_displacement & (elf->minpagesize - 1)) != 0)
2629 1.1 christos return 0;
2630 1.1 christos }
2631 1.1 christos
2632 1.1 christos /* Verify that the auxilliary vector describes the same file as exec_bfd, by
2633 1.1 christos comparing their program headers. If the program headers in the auxilliary
2634 1.1 christos vector do not match the program headers in the executable, then we are
2635 1.1 christos looking at a different file than the one used by the kernel - for
2636 1.1 christos instance, "gdb program" connected to "gdbserver :PORT ld.so program". */
2637 1.1 christos
2638 1.1 christos if (bfd_get_flavour (exec_bfd) == bfd_target_elf_flavour)
2639 1.1 christos {
2640 1.8 christos /* Be optimistic and return 0 only if GDB was able to verify the headers
2641 1.1 christos really do not match. */
2642 1.1 christos int arch_size;
2643 1.1 christos
2644 1.8 christos gdb::optional<gdb::byte_vector> phdrs_target
2645 1.8 christos = read_program_header (-1, &arch_size, NULL);
2646 1.8 christos gdb::optional<gdb::byte_vector> phdrs_binary
2647 1.8 christos = read_program_headers_from_bfd (exec_bfd);
2648 1.8 christos if (phdrs_target && phdrs_binary)
2649 1.1 christos {
2650 1.1 christos enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch ());
2651 1.1 christos
2652 1.1 christos /* We are dealing with three different addresses. EXEC_BFD
2653 1.1 christos represents current address in on-disk file. target memory content
2654 1.1 christos may be different from EXEC_BFD as the file may have been prelinked
2655 1.1 christos to a different address after the executable has been loaded.
2656 1.1 christos Moreover the address of placement in target memory can be
2657 1.1 christos different from what the program headers in target memory say -
2658 1.1 christos this is the goal of PIE.
2659 1.1 christos
2660 1.1 christos Detected DISPLACEMENT covers both the offsets of PIE placement and
2661 1.1 christos possible new prelink performed after start of the program. Here
2662 1.1 christos relocate BUF and BUF2 just by the EXEC_BFD vs. target memory
2663 1.1 christos content offset for the verification purpose. */
2664 1.1 christos
2665 1.8 christos if (phdrs_target->size () != phdrs_binary->size ()
2666 1.1 christos || bfd_get_arch_size (exec_bfd) != arch_size)
2667 1.8 christos return 0;
2668 1.1 christos else if (arch_size == 32
2669 1.8 christos && phdrs_target->size () >= sizeof (Elf32_External_Phdr)
2670 1.8 christos && phdrs_target->size () % sizeof (Elf32_External_Phdr) == 0)
2671 1.1 christos {
2672 1.1 christos Elf_Internal_Ehdr *ehdr2 = elf_tdata (exec_bfd)->elf_header;
2673 1.1 christos Elf_Internal_Phdr *phdr2 = elf_tdata (exec_bfd)->phdr;
2674 1.1 christos CORE_ADDR displacement = 0;
2675 1.1 christos int i;
2676 1.1 christos
2677 1.1 christos /* DISPLACEMENT could be found more easily by the difference of
2678 1.1 christos ehdr2->e_entry. But we haven't read the ehdr yet, and we
2679 1.1 christos already have enough information to compute that displacement
2680 1.1 christos with what we've read. */
2681 1.1 christos
2682 1.1 christos for (i = 0; i < ehdr2->e_phnum; i++)
2683 1.1 christos if (phdr2[i].p_type == PT_LOAD)
2684 1.1 christos {
2685 1.1 christos Elf32_External_Phdr *phdrp;
2686 1.1 christos gdb_byte *buf_vaddr_p, *buf_paddr_p;
2687 1.1 christos CORE_ADDR vaddr, paddr;
2688 1.1 christos CORE_ADDR displacement_vaddr = 0;
2689 1.1 christos CORE_ADDR displacement_paddr = 0;
2690 1.1 christos
2691 1.8 christos phdrp = &((Elf32_External_Phdr *) phdrs_target->data ())[i];
2692 1.1 christos buf_vaddr_p = (gdb_byte *) &phdrp->p_vaddr;
2693 1.1 christos buf_paddr_p = (gdb_byte *) &phdrp->p_paddr;
2694 1.1 christos
2695 1.1 christos vaddr = extract_unsigned_integer (buf_vaddr_p, 4,
2696 1.1 christos byte_order);
2697 1.1 christos displacement_vaddr = vaddr - phdr2[i].p_vaddr;
2698 1.1 christos
2699 1.1 christos paddr = extract_unsigned_integer (buf_paddr_p, 4,
2700 1.1 christos byte_order);
2701 1.1 christos displacement_paddr = paddr - phdr2[i].p_paddr;
2702 1.1 christos
2703 1.1 christos if (displacement_vaddr == displacement_paddr)
2704 1.1 christos displacement = displacement_vaddr;
2705 1.1 christos
2706 1.1 christos break;
2707 1.1 christos }
2708 1.1 christos
2709 1.8 christos /* Now compare program headers from the target and the binary
2710 1.8 christos with optional DISPLACEMENT. */
2711 1.1 christos
2712 1.8 christos for (i = 0;
2713 1.8 christos i < phdrs_target->size () / sizeof (Elf32_External_Phdr);
2714 1.8 christos i++)
2715 1.1 christos {
2716 1.1 christos Elf32_External_Phdr *phdrp;
2717 1.1 christos Elf32_External_Phdr *phdr2p;
2718 1.1 christos gdb_byte *buf_vaddr_p, *buf_paddr_p;
2719 1.1 christos CORE_ADDR vaddr, paddr;
2720 1.1 christos asection *plt2_asect;
2721 1.1 christos
2722 1.8 christos phdrp = &((Elf32_External_Phdr *) phdrs_target->data ())[i];
2723 1.1 christos buf_vaddr_p = (gdb_byte *) &phdrp->p_vaddr;
2724 1.1 christos buf_paddr_p = (gdb_byte *) &phdrp->p_paddr;
2725 1.8 christos phdr2p = &((Elf32_External_Phdr *) phdrs_binary->data ())[i];
2726 1.1 christos
2727 1.1 christos /* PT_GNU_STACK is an exception by being never relocated by
2728 1.1 christos prelink as its addresses are always zero. */
2729 1.1 christos
2730 1.1 christos if (memcmp (phdrp, phdr2p, sizeof (*phdrp)) == 0)
2731 1.1 christos continue;
2732 1.1 christos
2733 1.1 christos /* Check also other adjustment combinations - PR 11786. */
2734 1.1 christos
2735 1.1 christos vaddr = extract_unsigned_integer (buf_vaddr_p, 4,
2736 1.1 christos byte_order);
2737 1.1 christos vaddr -= displacement;
2738 1.1 christos store_unsigned_integer (buf_vaddr_p, 4, byte_order, vaddr);
2739 1.1 christos
2740 1.1 christos paddr = extract_unsigned_integer (buf_paddr_p, 4,
2741 1.1 christos byte_order);
2742 1.1 christos paddr -= displacement;
2743 1.1 christos store_unsigned_integer (buf_paddr_p, 4, byte_order, paddr);
2744 1.1 christos
2745 1.1 christos if (memcmp (phdrp, phdr2p, sizeof (*phdrp)) == 0)
2746 1.1 christos continue;
2747 1.1 christos
2748 1.1 christos /* Strip modifies the flags and alignment of PT_GNU_RELRO.
2749 1.1 christos CentOS-5 has problems with filesz, memsz as well.
2750 1.8 christos Strip also modifies memsz of PT_TLS.
2751 1.1 christos See PR 11786. */
2752 1.8 christos if (phdr2[i].p_type == PT_GNU_RELRO
2753 1.8 christos || phdr2[i].p_type == PT_TLS)
2754 1.1 christos {
2755 1.1 christos Elf32_External_Phdr tmp_phdr = *phdrp;
2756 1.1 christos Elf32_External_Phdr tmp_phdr2 = *phdr2p;
2757 1.1 christos
2758 1.1 christos memset (tmp_phdr.p_filesz, 0, 4);
2759 1.1 christos memset (tmp_phdr.p_memsz, 0, 4);
2760 1.1 christos memset (tmp_phdr.p_flags, 0, 4);
2761 1.1 christos memset (tmp_phdr.p_align, 0, 4);
2762 1.1 christos memset (tmp_phdr2.p_filesz, 0, 4);
2763 1.1 christos memset (tmp_phdr2.p_memsz, 0, 4);
2764 1.1 christos memset (tmp_phdr2.p_flags, 0, 4);
2765 1.1 christos memset (tmp_phdr2.p_align, 0, 4);
2766 1.1 christos
2767 1.1 christos if (memcmp (&tmp_phdr, &tmp_phdr2, sizeof (tmp_phdr))
2768 1.1 christos == 0)
2769 1.1 christos continue;
2770 1.1 christos }
2771 1.1 christos
2772 1.1 christos /* prelink can convert .plt SHT_NOBITS to SHT_PROGBITS. */
2773 1.1 christos plt2_asect = bfd_get_section_by_name (exec_bfd, ".plt");
2774 1.1 christos if (plt2_asect)
2775 1.1 christos {
2776 1.1 christos int content2;
2777 1.1 christos gdb_byte *buf_filesz_p = (gdb_byte *) &phdrp->p_filesz;
2778 1.1 christos CORE_ADDR filesz;
2779 1.1 christos
2780 1.9 christos content2 = (bfd_section_flags (plt2_asect)
2781 1.1 christos & SEC_HAS_CONTENTS) != 0;
2782 1.1 christos
2783 1.1 christos filesz = extract_unsigned_integer (buf_filesz_p, 4,
2784 1.1 christos byte_order);
2785 1.1 christos
2786 1.1 christos /* PLT2_ASECT is from on-disk file (exec_bfd) while
2787 1.1 christos FILESZ is from the in-memory image. */
2788 1.1 christos if (content2)
2789 1.9 christos filesz += bfd_section_size (plt2_asect);
2790 1.1 christos else
2791 1.9 christos filesz -= bfd_section_size (plt2_asect);
2792 1.1 christos
2793 1.1 christos store_unsigned_integer (buf_filesz_p, 4, byte_order,
2794 1.1 christos filesz);
2795 1.1 christos
2796 1.1 christos if (memcmp (phdrp, phdr2p, sizeof (*phdrp)) == 0)
2797 1.1 christos continue;
2798 1.1 christos }
2799 1.1 christos
2800 1.8 christos return 0;
2801 1.1 christos }
2802 1.1 christos }
2803 1.1 christos else if (arch_size == 64
2804 1.8 christos && phdrs_target->size () >= sizeof (Elf64_External_Phdr)
2805 1.8 christos && phdrs_target->size () % sizeof (Elf64_External_Phdr) == 0)
2806 1.1 christos {
2807 1.1 christos Elf_Internal_Ehdr *ehdr2 = elf_tdata (exec_bfd)->elf_header;
2808 1.1 christos Elf_Internal_Phdr *phdr2 = elf_tdata (exec_bfd)->phdr;
2809 1.1 christos CORE_ADDR displacement = 0;
2810 1.1 christos int i;
2811 1.1 christos
2812 1.1 christos /* DISPLACEMENT could be found more easily by the difference of
2813 1.1 christos ehdr2->e_entry. But we haven't read the ehdr yet, and we
2814 1.1 christos already have enough information to compute that displacement
2815 1.1 christos with what we've read. */
2816 1.1 christos
2817 1.1 christos for (i = 0; i < ehdr2->e_phnum; i++)
2818 1.1 christos if (phdr2[i].p_type == PT_LOAD)
2819 1.1 christos {
2820 1.1 christos Elf64_External_Phdr *phdrp;
2821 1.1 christos gdb_byte *buf_vaddr_p, *buf_paddr_p;
2822 1.1 christos CORE_ADDR vaddr, paddr;
2823 1.1 christos CORE_ADDR displacement_vaddr = 0;
2824 1.1 christos CORE_ADDR displacement_paddr = 0;
2825 1.1 christos
2826 1.8 christos phdrp = &((Elf64_External_Phdr *) phdrs_target->data ())[i];
2827 1.1 christos buf_vaddr_p = (gdb_byte *) &phdrp->p_vaddr;
2828 1.1 christos buf_paddr_p = (gdb_byte *) &phdrp->p_paddr;
2829 1.1 christos
2830 1.1 christos vaddr = extract_unsigned_integer (buf_vaddr_p, 8,
2831 1.1 christos byte_order);
2832 1.1 christos displacement_vaddr = vaddr - phdr2[i].p_vaddr;
2833 1.1 christos
2834 1.1 christos paddr = extract_unsigned_integer (buf_paddr_p, 8,
2835 1.1 christos byte_order);
2836 1.1 christos displacement_paddr = paddr - phdr2[i].p_paddr;
2837 1.1 christos
2838 1.1 christos if (displacement_vaddr == displacement_paddr)
2839 1.1 christos displacement = displacement_vaddr;
2840 1.1 christos
2841 1.1 christos break;
2842 1.1 christos }
2843 1.1 christos
2844 1.1 christos /* Now compare BUF and BUF2 with optional DISPLACEMENT. */
2845 1.1 christos
2846 1.8 christos for (i = 0;
2847 1.8 christos i < phdrs_target->size () / sizeof (Elf64_External_Phdr);
2848 1.8 christos i++)
2849 1.1 christos {
2850 1.1 christos Elf64_External_Phdr *phdrp;
2851 1.1 christos Elf64_External_Phdr *phdr2p;
2852 1.1 christos gdb_byte *buf_vaddr_p, *buf_paddr_p;
2853 1.1 christos CORE_ADDR vaddr, paddr;
2854 1.1 christos asection *plt2_asect;
2855 1.1 christos
2856 1.8 christos phdrp = &((Elf64_External_Phdr *) phdrs_target->data ())[i];
2857 1.1 christos buf_vaddr_p = (gdb_byte *) &phdrp->p_vaddr;
2858 1.1 christos buf_paddr_p = (gdb_byte *) &phdrp->p_paddr;
2859 1.8 christos phdr2p = &((Elf64_External_Phdr *) phdrs_binary->data ())[i];
2860 1.1 christos
2861 1.1 christos /* PT_GNU_STACK is an exception by being never relocated by
2862 1.1 christos prelink as its addresses are always zero. */
2863 1.1 christos
2864 1.1 christos if (memcmp (phdrp, phdr2p, sizeof (*phdrp)) == 0)
2865 1.1 christos continue;
2866 1.1 christos
2867 1.1 christos /* Check also other adjustment combinations - PR 11786. */
2868 1.1 christos
2869 1.1 christos vaddr = extract_unsigned_integer (buf_vaddr_p, 8,
2870 1.1 christos byte_order);
2871 1.1 christos vaddr -= displacement;
2872 1.1 christos store_unsigned_integer (buf_vaddr_p, 8, byte_order, vaddr);
2873 1.1 christos
2874 1.1 christos paddr = extract_unsigned_integer (buf_paddr_p, 8,
2875 1.1 christos byte_order);
2876 1.1 christos paddr -= displacement;
2877 1.1 christos store_unsigned_integer (buf_paddr_p, 8, byte_order, paddr);
2878 1.1 christos
2879 1.1 christos if (memcmp (phdrp, phdr2p, sizeof (*phdrp)) == 0)
2880 1.1 christos continue;
2881 1.1 christos
2882 1.1 christos /* Strip modifies the flags and alignment of PT_GNU_RELRO.
2883 1.1 christos CentOS-5 has problems with filesz, memsz as well.
2884 1.8 christos Strip also modifies memsz of PT_TLS.
2885 1.1 christos See PR 11786. */
2886 1.8 christos if (phdr2[i].p_type == PT_GNU_RELRO
2887 1.8 christos || phdr2[i].p_type == PT_TLS)
2888 1.1 christos {
2889 1.1 christos Elf64_External_Phdr tmp_phdr = *phdrp;
2890 1.1 christos Elf64_External_Phdr tmp_phdr2 = *phdr2p;
2891 1.1 christos
2892 1.1 christos memset (tmp_phdr.p_filesz, 0, 8);
2893 1.1 christos memset (tmp_phdr.p_memsz, 0, 8);
2894 1.1 christos memset (tmp_phdr.p_flags, 0, 4);
2895 1.1 christos memset (tmp_phdr.p_align, 0, 8);
2896 1.1 christos memset (tmp_phdr2.p_filesz, 0, 8);
2897 1.1 christos memset (tmp_phdr2.p_memsz, 0, 8);
2898 1.1 christos memset (tmp_phdr2.p_flags, 0, 4);
2899 1.1 christos memset (tmp_phdr2.p_align, 0, 8);
2900 1.1 christos
2901 1.1 christos if (memcmp (&tmp_phdr, &tmp_phdr2, sizeof (tmp_phdr))
2902 1.1 christos == 0)
2903 1.1 christos continue;
2904 1.1 christos }
2905 1.1 christos
2906 1.1 christos /* prelink can convert .plt SHT_NOBITS to SHT_PROGBITS. */
2907 1.1 christos plt2_asect = bfd_get_section_by_name (exec_bfd, ".plt");
2908 1.1 christos if (plt2_asect)
2909 1.1 christos {
2910 1.1 christos int content2;
2911 1.1 christos gdb_byte *buf_filesz_p = (gdb_byte *) &phdrp->p_filesz;
2912 1.1 christos CORE_ADDR filesz;
2913 1.1 christos
2914 1.9 christos content2 = (bfd_section_flags (plt2_asect)
2915 1.1 christos & SEC_HAS_CONTENTS) != 0;
2916 1.1 christos
2917 1.1 christos filesz = extract_unsigned_integer (buf_filesz_p, 8,
2918 1.1 christos byte_order);
2919 1.1 christos
2920 1.1 christos /* PLT2_ASECT is from on-disk file (exec_bfd) while
2921 1.1 christos FILESZ is from the in-memory image. */
2922 1.1 christos if (content2)
2923 1.9 christos filesz += bfd_section_size (plt2_asect);
2924 1.1 christos else
2925 1.9 christos filesz -= bfd_section_size (plt2_asect);
2926 1.1 christos
2927 1.1 christos store_unsigned_integer (buf_filesz_p, 8, byte_order,
2928 1.1 christos filesz);
2929 1.1 christos
2930 1.1 christos if (memcmp (phdrp, phdr2p, sizeof (*phdrp)) == 0)
2931 1.1 christos continue;
2932 1.1 christos }
2933 1.1 christos
2934 1.8 christos return 0;
2935 1.1 christos }
2936 1.1 christos }
2937 1.1 christos else
2938 1.8 christos return 0;
2939 1.1 christos }
2940 1.1 christos }
2941 1.1 christos
2942 1.1 christos if (info_verbose)
2943 1.1 christos {
2944 1.1 christos /* It can be printed repeatedly as there is no easy way to check
2945 1.1 christos the executable symbols/file has been already relocated to
2946 1.1 christos displacement. */
2947 1.1 christos
2948 1.1 christos printf_unfiltered (_("Using PIE (Position Independent Executable) "
2949 1.1 christos "displacement %s for \"%s\".\n"),
2950 1.5 christos paddress (target_gdbarch (), exec_displacement),
2951 1.1 christos bfd_get_filename (exec_bfd));
2952 1.1 christos }
2953 1.1 christos
2954 1.5 christos *displacementp = exec_displacement;
2955 1.1 christos return 1;
2956 1.1 christos }
2957 1.1 christos
2958 1.1 christos /* Relocate the main executable. This function should be called upon
2959 1.1 christos stopping the inferior process at the entry point to the program.
2960 1.1 christos The entry point from BFD is compared to the AT_ENTRY of AUXV and if they are
2961 1.1 christos different, the main executable is relocated by the proper amount. */
2962 1.1 christos
2963 1.1 christos static void
2964 1.1 christos svr4_relocate_main_executable (void)
2965 1.1 christos {
2966 1.1 christos CORE_ADDR displacement;
2967 1.1 christos
2968 1.1 christos /* If we are re-running this executable, SYMFILE_OBJFILE->SECTION_OFFSETS
2969 1.1 christos probably contains the offsets computed using the PIE displacement
2970 1.1 christos from the previous run, which of course are irrelevant for this run.
2971 1.1 christos So we need to determine the new PIE displacement and recompute the
2972 1.1 christos section offsets accordingly, even if SYMFILE_OBJFILE->SECTION_OFFSETS
2973 1.1 christos already contains pre-computed offsets.
2974 1.1 christos
2975 1.1 christos If we cannot compute the PIE displacement, either:
2976 1.1 christos
2977 1.1 christos - The executable is not PIE.
2978 1.1 christos
2979 1.1 christos - SYMFILE_OBJFILE does not match the executable started in the target.
2980 1.1 christos This can happen for main executable symbols loaded at the host while
2981 1.1 christos `ld.so --ld-args main-executable' is loaded in the target.
2982 1.1 christos
2983 1.1 christos Then we leave the section offsets untouched and use them as is for
2984 1.1 christos this run. Either:
2985 1.1 christos
2986 1.1 christos - These section offsets were properly reset earlier, and thus
2987 1.1 christos already contain the correct values. This can happen for instance
2988 1.1 christos when reconnecting via the remote protocol to a target that supports
2989 1.1 christos the `qOffsets' packet.
2990 1.1 christos
2991 1.1 christos - The section offsets were not reset earlier, and the best we can
2992 1.1 christos hope is that the old offsets are still applicable to the new run. */
2993 1.1 christos
2994 1.1 christos if (! svr4_exec_displacement (&displacement))
2995 1.1 christos return;
2996 1.1 christos
2997 1.1 christos /* Even DISPLACEMENT 0 is a valid new difference of in-memory vs. in-file
2998 1.1 christos addresses. */
2999 1.1 christos
3000 1.1 christos if (symfile_objfile)
3001 1.1 christos {
3002 1.9 christos section_offsets new_offsets (symfile_objfile->section_offsets.size (),
3003 1.9 christos displacement);
3004 1.1 christos objfile_relocate (symfile_objfile, new_offsets);
3005 1.1 christos }
3006 1.1 christos else if (exec_bfd)
3007 1.1 christos {
3008 1.1 christos asection *asect;
3009 1.1 christos
3010 1.1 christos for (asect = exec_bfd->sections; asect != NULL; asect = asect->next)
3011 1.1 christos exec_set_section_address (bfd_get_filename (exec_bfd), asect->index,
3012 1.9 christos bfd_section_vma (asect) + displacement);
3013 1.1 christos }
3014 1.1 christos }
3015 1.1 christos
3016 1.1 christos /* Implement the "create_inferior_hook" target_solib_ops method.
3017 1.1 christos
3018 1.1 christos For SVR4 executables, this first instruction is either the first
3019 1.1 christos instruction in the dynamic linker (for dynamically linked
3020 1.1 christos executables) or the instruction at "start" for statically linked
3021 1.1 christos executables. For dynamically linked executables, the system
3022 1.1 christos first exec's /lib/libc.so.N, which contains the dynamic linker,
3023 1.1 christos and starts it running. The dynamic linker maps in any needed
3024 1.1 christos shared libraries, maps in the actual user executable, and then
3025 1.1 christos jumps to "start" in the user executable.
3026 1.1 christos
3027 1.1 christos We can arrange to cooperate with the dynamic linker to discover the
3028 1.1 christos names of shared libraries that are dynamically linked, and the base
3029 1.1 christos addresses to which they are linked.
3030 1.1 christos
3031 1.1 christos This function is responsible for discovering those names and
3032 1.1 christos addresses, and saving sufficient information about them to allow
3033 1.1 christos their symbols to be read at a later time. */
3034 1.1 christos
3035 1.1 christos static void
3036 1.1 christos svr4_solib_create_inferior_hook (int from_tty)
3037 1.1 christos {
3038 1.1 christos struct svr4_info *info;
3039 1.1 christos
3040 1.9 christos info = get_svr4_info (current_program_space);
3041 1.1 christos
3042 1.1 christos /* Clear the probes-based interface's state. */
3043 1.1 christos free_probes_table (info);
3044 1.1 christos free_solib_list (info);
3045 1.1 christos
3046 1.1 christos /* Relocate the main executable if necessary. */
3047 1.1 christos svr4_relocate_main_executable ();
3048 1.1 christos
3049 1.1 christos /* No point setting a breakpoint in the dynamic linker if we can't
3050 1.1 christos hit it (e.g., a core file, or a trace file). */
3051 1.1 christos if (!target_has_execution)
3052 1.1 christos return;
3053 1.1 christos
3054 1.1 christos if (!svr4_have_link_map_offsets ())
3055 1.1 christos return;
3056 1.1 christos
3057 1.1 christos if (!enable_break (info, from_tty))
3058 1.1 christos return;
3059 1.1 christos }
3060 1.1 christos
3061 1.1 christos static void
3062 1.1 christos svr4_clear_solib (void)
3063 1.1 christos {
3064 1.1 christos struct svr4_info *info;
3065 1.1 christos
3066 1.9 christos info = get_svr4_info (current_program_space);
3067 1.1 christos info->debug_base = 0;
3068 1.1 christos info->debug_loader_offset_p = 0;
3069 1.1 christos info->debug_loader_offset = 0;
3070 1.1 christos xfree (info->debug_loader_name);
3071 1.1 christos info->debug_loader_name = NULL;
3072 1.1 christos }
3073 1.1 christos
3074 1.1 christos /* Clear any bits of ADDR that wouldn't fit in a target-format
3075 1.1 christos data pointer. "Data pointer" here refers to whatever sort of
3076 1.1 christos address the dynamic linker uses to manage its sections. At the
3077 1.1 christos moment, we don't support shared libraries on any processors where
3078 1.1 christos code and data pointers are different sizes.
3079 1.1 christos
3080 1.1 christos This isn't really the right solution. What we really need here is
3081 1.1 christos a way to do arithmetic on CORE_ADDR values that respects the
3082 1.1 christos natural pointer/address correspondence. (For example, on the MIPS,
3083 1.1 christos converting a 32-bit pointer to a 64-bit CORE_ADDR requires you to
3084 1.1 christos sign-extend the value. There, simply truncating the bits above
3085 1.1 christos gdbarch_ptr_bit, as we do below, is no good.) This should probably
3086 1.1 christos be a new gdbarch method or something. */
3087 1.1 christos static CORE_ADDR
3088 1.1 christos svr4_truncate_ptr (CORE_ADDR addr)
3089 1.1 christos {
3090 1.1 christos if (gdbarch_ptr_bit (target_gdbarch ()) == sizeof (CORE_ADDR) * 8)
3091 1.1 christos /* We don't need to truncate anything, and the bit twiddling below
3092 1.1 christos will fail due to overflow problems. */
3093 1.1 christos return addr;
3094 1.1 christos else
3095 1.1 christos return addr & (((CORE_ADDR) 1 << gdbarch_ptr_bit (target_gdbarch ())) - 1);
3096 1.1 christos }
3097 1.1 christos
3098 1.1 christos
3099 1.1 christos static void
3100 1.1 christos svr4_relocate_section_addresses (struct so_list *so,
3101 1.1 christos struct target_section *sec)
3102 1.1 christos {
3103 1.1 christos bfd *abfd = sec->the_bfd_section->owner;
3104 1.1 christos
3105 1.1 christos sec->addr = svr4_truncate_ptr (sec->addr + lm_addr_check (so, abfd));
3106 1.1 christos sec->endaddr = svr4_truncate_ptr (sec->endaddr + lm_addr_check (so, abfd));
3107 1.1 christos }
3108 1.1 christos
3109 1.1 christos
3111 1.1 christos /* Architecture-specific operations. */
3112 1.1 christos
3113 1.1 christos /* Per-architecture data key. */
3114 1.1 christos static struct gdbarch_data *solib_svr4_data;
3115 1.1 christos
3116 1.1 christos struct solib_svr4_ops
3117 1.1 christos {
3118 1.1 christos /* Return a description of the layout of `struct link_map'. */
3119 1.1 christos struct link_map_offsets *(*fetch_link_map_offsets)(void);
3120 1.1 christos };
3121 1.1 christos
3122 1.1 christos /* Return a default for the architecture-specific operations. */
3123 1.1 christos
3124 1.1 christos static void *
3125 1.1 christos solib_svr4_init (struct obstack *obstack)
3126 1.1 christos {
3127 1.1 christos struct solib_svr4_ops *ops;
3128 1.1 christos
3129 1.1 christos ops = OBSTACK_ZALLOC (obstack, struct solib_svr4_ops);
3130 1.1 christos ops->fetch_link_map_offsets = NULL;
3131 1.1 christos return ops;
3132 1.1 christos }
3133 1.1 christos
3134 1.1 christos /* Set the architecture-specific `struct link_map_offsets' fetcher for
3135 1.1 christos GDBARCH to FLMO. Also, install SVR4 solib_ops into GDBARCH. */
3136 1.1 christos
3137 1.1 christos void
3138 1.1 christos set_solib_svr4_fetch_link_map_offsets (struct gdbarch *gdbarch,
3139 1.1 christos struct link_map_offsets *(*flmo) (void))
3140 1.6 christos {
3141 1.6 christos struct solib_svr4_ops *ops
3142 1.1 christos = (struct solib_svr4_ops *) gdbarch_data (gdbarch, solib_svr4_data);
3143 1.1 christos
3144 1.1 christos ops->fetch_link_map_offsets = flmo;
3145 1.1 christos
3146 1.9 christos set_solib_ops (gdbarch, &svr4_so_ops);
3147 1.9 christos set_gdbarch_iterate_over_objfiles_in_search_order
3148 1.1 christos (gdbarch, svr4_iterate_over_objfiles_in_search_order);
3149 1.1 christos }
3150 1.1 christos
3151 1.1 christos /* Fetch a link_map_offsets structure using the architecture-specific
3152 1.1 christos `struct link_map_offsets' fetcher. */
3153 1.1 christos
3154 1.1 christos static struct link_map_offsets *
3155 1.1 christos svr4_fetch_link_map_offsets (void)
3156 1.6 christos {
3157 1.6 christos struct solib_svr4_ops *ops
3158 1.6 christos = (struct solib_svr4_ops *) gdbarch_data (target_gdbarch (),
3159 1.1 christos solib_svr4_data);
3160 1.1 christos
3161 1.1 christos gdb_assert (ops->fetch_link_map_offsets);
3162 1.1 christos return ops->fetch_link_map_offsets ();
3163 1.1 christos }
3164 1.1 christos
3165 1.1 christos /* Return 1 if a link map offset fetcher has been defined, 0 otherwise. */
3166 1.1 christos
3167 1.1 christos static int
3168 1.1 christos svr4_have_link_map_offsets (void)
3169 1.6 christos {
3170 1.6 christos struct solib_svr4_ops *ops
3171 1.6 christos = (struct solib_svr4_ops *) gdbarch_data (target_gdbarch (),
3172 1.1 christos solib_svr4_data);
3173 1.1 christos
3174 1.1 christos return (ops->fetch_link_map_offsets != NULL);
3175 1.1 christos }
3176 1.1 christos
3177 1.1 christos
3179 1.9 christos /* Most OS'es that have SVR4-style ELF dynamic libraries define a
3180 1.1 christos `struct r_debug' and a `struct link_map' that are binary compatible
3181 1.1 christos with the original SVR4 implementation. */
3182 1.1 christos
3183 1.1 christos /* Fetch (and possibly build) an appropriate `struct link_map_offsets'
3184 1.1 christos for an ILP32 SVR4 system. */
3185 1.1 christos
3186 1.1 christos struct link_map_offsets *
3187 1.1 christos svr4_ilp32_fetch_link_map_offsets (void)
3188 1.1 christos {
3189 1.1 christos static struct link_map_offsets lmo;
3190 1.1 christos static struct link_map_offsets *lmp = NULL;
3191 1.1 christos
3192 1.1 christos if (lmp == NULL)
3193 1.1 christos {
3194 1.1 christos lmp = &lmo;
3195 1.1 christos
3196 1.1 christos lmo.r_version_offset = 0;
3197 1.1 christos lmo.r_version_size = 4;
3198 1.1 christos lmo.r_map_offset = 4;
3199 1.1 christos lmo.r_brk_offset = 8;
3200 1.1 christos lmo.r_ldsomap_offset = 20;
3201 1.1 christos
3202 1.1 christos /* Everything we need is in the first 20 bytes. */
3203 1.1 christos lmo.link_map_size = 20;
3204 1.1 christos lmo.l_addr_offset = 0;
3205 1.1 christos lmo.l_name_offset = 4;
3206 1.1 christos lmo.l_ld_offset = 8;
3207 1.1 christos lmo.l_next_offset = 12;
3208 1.1 christos lmo.l_prev_offset = 16;
3209 1.1 christos }
3210 1.1 christos
3211 1.1 christos return lmp;
3212 1.1 christos }
3213 1.1 christos
3214 1.1 christos /* Fetch (and possibly build) an appropriate `struct link_map_offsets'
3215 1.1 christos for an LP64 SVR4 system. */
3216 1.1 christos
3217 1.1 christos struct link_map_offsets *
3218 1.1 christos svr4_lp64_fetch_link_map_offsets (void)
3219 1.1 christos {
3220 1.1 christos static struct link_map_offsets lmo;
3221 1.1 christos static struct link_map_offsets *lmp = NULL;
3222 1.1 christos
3223 1.1 christos if (lmp == NULL)
3224 1.1 christos {
3225 1.1 christos lmp = &lmo;
3226 1.1 christos
3227 1.1 christos lmo.r_version_offset = 0;
3228 1.1 christos lmo.r_version_size = 4;
3229 1.1 christos lmo.r_map_offset = 8;
3230 1.1 christos lmo.r_brk_offset = 16;
3231 1.1 christos lmo.r_ldsomap_offset = 40;
3232 1.1 christos
3233 1.1 christos /* Everything we need is in the first 40 bytes. */
3234 1.1 christos lmo.link_map_size = 40;
3235 1.1 christos lmo.l_addr_offset = 0;
3236 1.1 christos lmo.l_name_offset = 8;
3237 1.1 christos lmo.l_ld_offset = 16;
3238 1.1 christos lmo.l_next_offset = 24;
3239 1.1 christos lmo.l_prev_offset = 32;
3240 1.1 christos }
3241 1.1 christos
3242 1.1 christos return lmp;
3243 1.1 christos }
3244 1.1 christos
3245 1.1 christos
3247 1.1 christos struct target_so_ops svr4_so_ops;
3248 1.1 christos
3249 1.1 christos /* Search order for ELF DSOs linked with -Bsymbolic. Those DSOs have a
3250 1.9 christos different rule for symbol lookup. The lookup begins here in the DSO, not in
3251 1.9 christos the main executable. */
3252 1.9 christos
3253 1.9 christos static void
3254 1.9 christos svr4_iterate_over_objfiles_in_search_order
3255 1.1 christos (struct gdbarch *gdbarch,
3256 1.9 christos iterate_over_objfiles_in_search_order_cb_ftype *cb,
3257 1.9 christos void *cb_data, struct objfile *current_objfile)
3258 1.9 christos {
3259 1.9 christos bool checked_current_objfile = false;
3260 1.9 christos if (current_objfile != nullptr)
3261 1.9 christos {
3262 1.9 christos bfd *abfd;
3263 1.1 christos
3264 1.9 christos if (current_objfile->separate_debug_objfile_backlink != nullptr)
3265 1.9 christos current_objfile = current_objfile->separate_debug_objfile_backlink;
3266 1.9 christos
3267 1.9 christos if (current_objfile == symfile_objfile)
3268 1.1 christos abfd = exec_bfd;
3269 1.9 christos else
3270 1.9 christos abfd = current_objfile->obfd;
3271 1.9 christos
3272 1.9 christos if (abfd != nullptr
3273 1.9 christos && scan_dyntag (DT_SYMBOLIC, abfd, nullptr, nullptr) == 1)
3274 1.9 christos {
3275 1.9 christos checked_current_objfile = true;
3276 1.1 christos if (cb (current_objfile, cb_data) != 0)
3277 1.1 christos return;
3278 1.9 christos }
3279 1.9 christos }
3280 1.9 christos
3281 1.9 christos for (objfile *objfile : current_program_space->objfiles ())
3282 1.9 christos {
3283 1.9 christos if (checked_current_objfile && objfile == current_objfile)
3284 1.9 christos continue;
3285 1.1 christos if (cb (objfile, cb_data) != 0)
3286 1.1 christos return;
3287 1.9 christos }
3288 1.1 christos }
3289 1.9 christos
3290 1.1 christos void _initialize_svr4_solib ();
3291 1.1 christos void
3292 1.1 christos _initialize_svr4_solib ()
3293 1.1 christos {
3294 1.1 christos solib_svr4_data = gdbarch_data_register_pre_init (solib_svr4_init);
3295 1.1 christos
3296 1.1 christos svr4_so_ops.relocate_section_addresses = svr4_relocate_section_addresses;
3297 1.1 christos svr4_so_ops.free_so = svr4_free_so;
3298 1.1 christos svr4_so_ops.clear_so = svr4_clear_so;
3299 1.1 christos svr4_so_ops.clear_solib = svr4_clear_solib;
3300 1.1 christos svr4_so_ops.solib_create_inferior_hook = svr4_solib_create_inferior_hook;
3301 1.1 christos svr4_so_ops.current_sos = svr4_current_sos;
3302 1.1 christos svr4_so_ops.open_symbol_file_object = open_symbol_file_object;
3303 1.1 christos svr4_so_ops.in_dynsym_resolve_code = svr4_in_dynsym_resolve_code;
3304 1.1 christos svr4_so_ops.bfd_open = solib_bfd_open;
3305 1.1 christos svr4_so_ops.same = svr4_same;
3306 1.9 christos svr4_so_ops.keep_data_in_core = svr4_keep_data_in_core;
3307 1.9 christos svr4_so_ops.update_breakpoints = svr4_update_solib_event_breakpoints;
3308 1.1 christos svr4_so_ops.handle_event = svr4_handle_solib_event;
3309
3310 gdb::observers::free_objfile.attach (svr4_free_objfile_observer);
3311 }
3312