* hppa-hpux-tdep.c (hppa_hpux_push_dummy_code): Use ULONGEST as
[deliverable/binutils-gdb.git] / gdb / hppa-hpux-tdep.c
CommitLineData
273f8429 1/* Target-dependent code for HPUX running on PA-RISC, for GDB.
ef6e7e13
AC
2
3 Copyright 2002, 2003 Free Software Foundation, Inc.
273f8429
JB
4
5This file is part of GDB.
6
7This program is free software; you can redistribute it and/or modify
8it under the terms of the GNU General Public License as published by
9the Free Software Foundation; either version 2 of the License, or
10(at your option) any later version.
11
12This program is distributed in the hope that it will be useful,
13but WITHOUT ANY WARRANTY; without even the implied warranty of
14MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15GNU General Public License for more details.
16
17You should have received a copy of the GNU General Public License
18along with this program; if not, write to the Free Software
19Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
20
21#include "defs.h"
22#include "arch-utils.h"
60e1ff27 23#include "gdbcore.h"
273f8429 24#include "osabi.h"
65e82032 25#include "gdb_string.h"
222e5d1d 26#include "frame.h"
43613416
RC
27#include "frame-unwind.h"
28#include "trad-frame.h"
4c02c60c
AC
29#include "symtab.h"
30#include "objfiles.h"
31#include "inferior.h"
32#include "infcall.h"
90f943f1 33#include "observer.h"
fdd72f95 34#include "hppa-tdep.h"
4c02c60c
AC
35
36#include <dl.h>
37#include <machine/save_state.h>
273f8429 38
43613416
RC
39#ifndef offsetof
40#define offsetof(TYPE, MEMBER) ((unsigned long) &((TYPE *)0)->MEMBER)
41#endif
42
273f8429
JB
43/* Forward declarations. */
44extern void _initialize_hppa_hpux_tdep (void);
45extern initialize_file_ftype _initialize_hppa_hpux_tdep;
46
4c02c60c
AC
47typedef struct
48 {
49 struct minimal_symbol *msym;
50 CORE_ADDR solib_handle;
51 CORE_ADDR return_val;
52 }
53args_for_find_stub;
54
abc485a1
RC
55/* Return one if PC is in the call path of a trampoline, else return zero.
56
57 Note we return one for *any* call trampoline (long-call, arg-reloc), not
58 just shared library trampolines (import, export). */
59
60static int
61hppa32_hpux_in_solib_call_trampoline (CORE_ADDR pc, char *name)
62{
63 struct minimal_symbol *minsym;
64 struct unwind_table_entry *u;
abc485a1
RC
65
66 /* First see if PC is in one of the two C-library trampolines. */
3388d7ff
RC
67 if (pc == hppa_symbol_address("$$dyncall")
68 || pc == hppa_symbol_address("_sr4export"))
abc485a1
RC
69 return 1;
70
71 minsym = lookup_minimal_symbol_by_pc (pc);
72 if (minsym && strcmp (DEPRECATED_SYMBOL_NAME (minsym), ".stub") == 0)
73 return 1;
74
75 /* Get the unwind descriptor corresponding to PC, return zero
76 if no unwind was found. */
77 u = find_unwind_entry (pc);
78 if (!u)
79 return 0;
80
81 /* If this isn't a linker stub, then return now. */
82 if (u->stub_unwind.stub_type == 0)
83 return 0;
84
85 /* By definition a long-branch stub is a call stub. */
86 if (u->stub_unwind.stub_type == LONG_BRANCH)
87 return 1;
88
89 /* The call and return path execute the same instructions within
90 an IMPORT stub! So an IMPORT stub is both a call and return
91 trampoline. */
92 if (u->stub_unwind.stub_type == IMPORT)
93 return 1;
94
95 /* Parameter relocation stubs always have a call path and may have a
96 return path. */
97 if (u->stub_unwind.stub_type == PARAMETER_RELOCATION
98 || u->stub_unwind.stub_type == EXPORT)
99 {
100 CORE_ADDR addr;
101
102 /* Search forward from the current PC until we hit a branch
103 or the end of the stub. */
104 for (addr = pc; addr <= u->region_end; addr += 4)
105 {
106 unsigned long insn;
107
108 insn = read_memory_integer (addr, 4);
109
110 /* Does it look like a bl? If so then it's the call path, if
111 we find a bv or be first, then we're on the return path. */
112 if ((insn & 0xfc00e000) == 0xe8000000)
113 return 1;
114 else if ((insn & 0xfc00e001) == 0xe800c000
115 || (insn & 0xfc000000) == 0xe0000000)
116 return 0;
117 }
118
119 /* Should never happen. */
120 warning ("Unable to find branch in parameter relocation stub.\n");
121 return 0;
122 }
123
124 /* Unknown stub type. For now, just return zero. */
125 return 0;
126}
127
128static int
129hppa64_hpux_in_solib_call_trampoline (CORE_ADDR pc, char *name)
130{
131 /* PA64 has a completely different stub/trampoline scheme. Is it
132 better? Maybe. It's certainly harder to determine with any
133 certainty that we are in a stub because we can not refer to the
134 unwinders to help.
135
136 The heuristic is simple. Try to lookup the current PC value in th
137 minimal symbol table. If that fails, then assume we are not in a
138 stub and return.
139
140 Then see if the PC value falls within the section bounds for the
141 section containing the minimal symbol we found in the first
142 step. If it does, then assume we are not in a stub and return.
143
144 Finally peek at the instructions to see if they look like a stub. */
145 struct minimal_symbol *minsym;
146 asection *sec;
147 CORE_ADDR addr;
148 int insn, i;
149
150 minsym = lookup_minimal_symbol_by_pc (pc);
151 if (! minsym)
152 return 0;
153
154 sec = SYMBOL_BFD_SECTION (minsym);
155
156 if (bfd_get_section_vma (sec->owner, sec) <= pc
157 && pc < (bfd_get_section_vma (sec->owner, sec)
158 + bfd_section_size (sec->owner, sec)))
159 return 0;
160
161 /* We might be in a stub. Peek at the instructions. Stubs are 3
162 instructions long. */
163 insn = read_memory_integer (pc, 4);
164
165 /* Find out where we think we are within the stub. */
166 if ((insn & 0xffffc00e) == 0x53610000)
167 addr = pc;
168 else if ((insn & 0xffffffff) == 0xe820d000)
169 addr = pc - 4;
170 else if ((insn & 0xffffc00e) == 0x537b0000)
171 addr = pc - 8;
172 else
173 return 0;
174
175 /* Now verify each insn in the range looks like a stub instruction. */
176 insn = read_memory_integer (addr, 4);
177 if ((insn & 0xffffc00e) != 0x53610000)
178 return 0;
179
180 /* Now verify each insn in the range looks like a stub instruction. */
181 insn = read_memory_integer (addr + 4, 4);
182 if ((insn & 0xffffffff) != 0xe820d000)
183 return 0;
184
185 /* Now verify each insn in the range looks like a stub instruction. */
186 insn = read_memory_integer (addr + 8, 4);
187 if ((insn & 0xffffc00e) != 0x537b0000)
188 return 0;
189
190 /* Looks like a stub. */
191 return 1;
192}
193
194/* Return one if PC is in the return path of a trampoline, else return zero.
195
196 Note we return one for *any* call trampoline (long-call, arg-reloc), not
197 just shared library trampolines (import, export). */
198
199static int
200hppa_hpux_in_solib_return_trampoline (CORE_ADDR pc, char *name)
201{
202 struct unwind_table_entry *u;
203
204 /* Get the unwind descriptor corresponding to PC, return zero
205 if no unwind was found. */
206 u = find_unwind_entry (pc);
207 if (!u)
208 return 0;
209
210 /* If this isn't a linker stub or it's just a long branch stub, then
211 return zero. */
212 if (u->stub_unwind.stub_type == 0 || u->stub_unwind.stub_type == LONG_BRANCH)
213 return 0;
214
215 /* The call and return path execute the same instructions within
216 an IMPORT stub! So an IMPORT stub is both a call and return
217 trampoline. */
218 if (u->stub_unwind.stub_type == IMPORT)
219 return 1;
220
221 /* Parameter relocation stubs always have a call path and may have a
222 return path. */
223 if (u->stub_unwind.stub_type == PARAMETER_RELOCATION
224 || u->stub_unwind.stub_type == EXPORT)
225 {
226 CORE_ADDR addr;
227
228 /* Search forward from the current PC until we hit a branch
229 or the end of the stub. */
230 for (addr = pc; addr <= u->region_end; addr += 4)
231 {
232 unsigned long insn;
233
234 insn = read_memory_integer (addr, 4);
235
236 /* Does it look like a bl? If so then it's the call path, if
237 we find a bv or be first, then we're on the return path. */
238 if ((insn & 0xfc00e000) == 0xe8000000)
239 return 0;
240 else if ((insn & 0xfc00e001) == 0xe800c000
241 || (insn & 0xfc000000) == 0xe0000000)
242 return 1;
243 }
244
245 /* Should never happen. */
246 warning ("Unable to find branch in parameter relocation stub.\n");
247 return 0;
248 }
249
250 /* Unknown stub type. For now, just return zero. */
251 return 0;
252
253}
254
255/* Figure out if PC is in a trampoline, and if so find out where
256 the trampoline will jump to. If not in a trampoline, return zero.
257
258 Simple code examination probably is not a good idea since the code
259 sequences in trampolines can also appear in user code.
260
261 We use unwinds and information from the minimal symbol table to
262 determine when we're in a trampoline. This won't work for ELF
263 (yet) since it doesn't create stub unwind entries. Whether or
264 not ELF will create stub unwinds or normal unwinds for linker
265 stubs is still being debated.
266
267 This should handle simple calls through dyncall or sr4export,
268 long calls, argument relocation stubs, and dyncall/sr4export
269 calling an argument relocation stub. It even handles some stubs
270 used in dynamic executables. */
271
272static CORE_ADDR
273hppa_hpux_skip_trampoline_code (CORE_ADDR pc)
274{
275 long orig_pc = pc;
276 long prev_inst, curr_inst, loc;
abc485a1
RC
277 struct minimal_symbol *msym;
278 struct unwind_table_entry *u;
279
abc485a1
RC
280 /* Addresses passed to dyncall may *NOT* be the actual address
281 of the function. So we may have to do something special. */
3388d7ff 282 if (pc == hppa_symbol_address("$$dyncall"))
abc485a1
RC
283 {
284 pc = (CORE_ADDR) read_register (22);
285
286 /* If bit 30 (counting from the left) is on, then pc is the address of
287 the PLT entry for this function, not the address of the function
288 itself. Bit 31 has meaning too, but only for MPE. */
289 if (pc & 0x2)
290 pc = (CORE_ADDR) read_memory_integer (pc & ~0x3, TARGET_PTR_BIT / 8);
291 }
3388d7ff 292 if (pc == hppa_symbol_address("$$dyncall_external"))
abc485a1
RC
293 {
294 pc = (CORE_ADDR) read_register (22);
295 pc = (CORE_ADDR) read_memory_integer (pc & ~0x3, TARGET_PTR_BIT / 8);
296 }
3388d7ff 297 else if (pc == hppa_symbol_address("_sr4export"))
abc485a1
RC
298 pc = (CORE_ADDR) (read_register (22));
299
300 /* Get the unwind descriptor corresponding to PC, return zero
301 if no unwind was found. */
302 u = find_unwind_entry (pc);
303 if (!u)
304 return 0;
305
306 /* If this isn't a linker stub, then return now. */
307 /* elz: attention here! (FIXME) because of a compiler/linker
308 error, some stubs which should have a non zero stub_unwind.stub_type
309 have unfortunately a value of zero. So this function would return here
310 as if we were not in a trampoline. To fix this, we go look at the partial
311 symbol information, which reports this guy as a stub.
312 (FIXME): Unfortunately, we are not that lucky: it turns out that the
313 partial symbol information is also wrong sometimes. This is because
314 when it is entered (somread.c::som_symtab_read()) it can happen that
315 if the type of the symbol (from the som) is Entry, and the symbol is
316 in a shared library, then it can also be a trampoline. This would
317 be OK, except that I believe the way they decide if we are ina shared library
318 does not work. SOOOO..., even if we have a regular function w/o trampolines
319 its minimal symbol can be assigned type mst_solib_trampoline.
320 Also, if we find that the symbol is a real stub, then we fix the unwind
321 descriptor, and define the stub type to be EXPORT.
322 Hopefully this is correct most of the times. */
323 if (u->stub_unwind.stub_type == 0)
324 {
325
326/* elz: NOTE (FIXME!) once the problem with the unwind information is fixed
327 we can delete all the code which appears between the lines */
328/*--------------------------------------------------------------------------*/
329 msym = lookup_minimal_symbol_by_pc (pc);
330
331 if (msym == NULL || MSYMBOL_TYPE (msym) != mst_solib_trampoline)
332 return orig_pc == pc ? 0 : pc & ~0x3;
333
334 else if (msym != NULL && MSYMBOL_TYPE (msym) == mst_solib_trampoline)
335 {
336 struct objfile *objfile;
337 struct minimal_symbol *msymbol;
338 int function_found = 0;
339
340 /* go look if there is another minimal symbol with the same name as
341 this one, but with type mst_text. This would happen if the msym
342 is an actual trampoline, in which case there would be another
343 symbol with the same name corresponding to the real function */
344
345 ALL_MSYMBOLS (objfile, msymbol)
346 {
347 if (MSYMBOL_TYPE (msymbol) == mst_text
348 && DEPRECATED_STREQ (DEPRECATED_SYMBOL_NAME (msymbol), DEPRECATED_SYMBOL_NAME (msym)))
349 {
350 function_found = 1;
351 break;
352 }
353 }
354
355 if (function_found)
356 /* the type of msym is correct (mst_solib_trampoline), but
357 the unwind info is wrong, so set it to the correct value */
358 u->stub_unwind.stub_type = EXPORT;
359 else
360 /* the stub type info in the unwind is correct (this is not a
361 trampoline), but the msym type information is wrong, it
362 should be mst_text. So we need to fix the msym, and also
363 get out of this function */
364 {
365 MSYMBOL_TYPE (msym) = mst_text;
366 return orig_pc == pc ? 0 : pc & ~0x3;
367 }
368 }
369
370/*--------------------------------------------------------------------------*/
371 }
372
373 /* It's a stub. Search for a branch and figure out where it goes.
374 Note we have to handle multi insn branch sequences like ldil;ble.
375 Most (all?) other branches can be determined by examining the contents
376 of certain registers and the stack. */
377
378 loc = pc;
379 curr_inst = 0;
380 prev_inst = 0;
381 while (1)
382 {
383 /* Make sure we haven't walked outside the range of this stub. */
384 if (u != find_unwind_entry (loc))
385 {
386 warning ("Unable to find branch in linker stub");
387 return orig_pc == pc ? 0 : pc & ~0x3;
388 }
389
390 prev_inst = curr_inst;
391 curr_inst = read_memory_integer (loc, 4);
392
393 /* Does it look like a branch external using %r1? Then it's the
394 branch from the stub to the actual function. */
395 if ((curr_inst & 0xffe0e000) == 0xe0202000)
396 {
397 /* Yup. See if the previous instruction loaded
398 a value into %r1. If so compute and return the jump address. */
399 if ((prev_inst & 0xffe00000) == 0x20200000)
400 return (hppa_extract_21 (prev_inst) + hppa_extract_17 (curr_inst)) & ~0x3;
401 else
402 {
403 warning ("Unable to find ldil X,%%r1 before ble Y(%%sr4,%%r1).");
404 return orig_pc == pc ? 0 : pc & ~0x3;
405 }
406 }
407
408 /* Does it look like a be 0(sr0,%r21)? OR
409 Does it look like a be, n 0(sr0,%r21)? OR
410 Does it look like a bve (r21)? (this is on PA2.0)
411 Does it look like a bve, n(r21)? (this is also on PA2.0)
412 That's the branch from an
413 import stub to an export stub.
414
415 It is impossible to determine the target of the branch via
416 simple examination of instructions and/or data (consider
417 that the address in the plabel may be the address of the
418 bind-on-reference routine in the dynamic loader).
419
420 So we have try an alternative approach.
421
422 Get the name of the symbol at our current location; it should
423 be a stub symbol with the same name as the symbol in the
424 shared library.
425
426 Then lookup a minimal symbol with the same name; we should
427 get the minimal symbol for the target routine in the shared
428 library as those take precedence of import/export stubs. */
429 if ((curr_inst == 0xe2a00000) ||
430 (curr_inst == 0xe2a00002) ||
431 (curr_inst == 0xeaa0d000) ||
432 (curr_inst == 0xeaa0d002))
433 {
434 struct minimal_symbol *stubsym, *libsym;
435
436 stubsym = lookup_minimal_symbol_by_pc (loc);
437 if (stubsym == NULL)
438 {
439 warning ("Unable to find symbol for 0x%lx", loc);
440 return orig_pc == pc ? 0 : pc & ~0x3;
441 }
442
443 libsym = lookup_minimal_symbol (DEPRECATED_SYMBOL_NAME (stubsym), NULL, NULL);
444 if (libsym == NULL)
445 {
446 warning ("Unable to find library symbol for %s\n",
447 DEPRECATED_SYMBOL_NAME (stubsym));
448 return orig_pc == pc ? 0 : pc & ~0x3;
449 }
450
451 return SYMBOL_VALUE (libsym);
452 }
453
454 /* Does it look like bl X,%rp or bl X,%r0? Another way to do a
455 branch from the stub to the actual function. */
456 /*elz */
457 else if ((curr_inst & 0xffe0e000) == 0xe8400000
458 || (curr_inst & 0xffe0e000) == 0xe8000000
459 || (curr_inst & 0xffe0e000) == 0xe800A000)
460 return (loc + hppa_extract_17 (curr_inst) + 8) & ~0x3;
461
462 /* Does it look like bv (rp)? Note this depends on the
463 current stack pointer being the same as the stack
464 pointer in the stub itself! This is a branch on from the
465 stub back to the original caller. */
466 /*else if ((curr_inst & 0xffe0e000) == 0xe840c000) */
467 else if ((curr_inst & 0xffe0f000) == 0xe840c000)
468 {
469 /* Yup. See if the previous instruction loaded
470 rp from sp - 8. */
471 if (prev_inst == 0x4bc23ff1)
472 return (read_memory_integer
473 (read_register (HPPA_SP_REGNUM) - 8, 4)) & ~0x3;
474 else
475 {
476 warning ("Unable to find restore of %%rp before bv (%%rp).");
477 return orig_pc == pc ? 0 : pc & ~0x3;
478 }
479 }
480
481 /* elz: added this case to capture the new instruction
482 at the end of the return part of an export stub used by
483 the PA2.0: BVE, n (rp) */
484 else if ((curr_inst & 0xffe0f000) == 0xe840d000)
485 {
486 return (read_memory_integer
487 (read_register (HPPA_SP_REGNUM) - 24, TARGET_PTR_BIT / 8)) & ~0x3;
488 }
489
490 /* What about be,n 0(sr0,%rp)? It's just another way we return to
491 the original caller from the stub. Used in dynamic executables. */
492 else if (curr_inst == 0xe0400002)
493 {
494 /* The value we jump to is sitting in sp - 24. But that's
495 loaded several instructions before the be instruction.
496 I guess we could check for the previous instruction being
497 mtsp %r1,%sr0 if we want to do sanity checking. */
498 return (read_memory_integer
499 (read_register (HPPA_SP_REGNUM) - 24, TARGET_PTR_BIT / 8)) & ~0x3;
500 }
501
502 /* Haven't found the branch yet, but we're still in the stub.
503 Keep looking. */
504 loc += 4;
505 }
506}
507
5aac166f
RC
508void
509hppa_skip_permanent_breakpoint (void)
510{
511 /* To step over a breakpoint instruction on the PA takes some
512 fiddling with the instruction address queue.
513
514 When we stop at a breakpoint, the IA queue front (the instruction
515 we're executing now) points at the breakpoint instruction, and
516 the IA queue back (the next instruction to execute) points to
517 whatever instruction we would execute after the breakpoint, if it
518 were an ordinary instruction. This is the case even if the
519 breakpoint is in the delay slot of a branch instruction.
520
521 Clearly, to step past the breakpoint, we need to set the queue
522 front to the back. But what do we put in the back? What
523 instruction comes after that one? Because of the branch delay
524 slot, the next insn is always at the back + 4. */
525 write_register (HPPA_PCOQ_HEAD_REGNUM, read_register (HPPA_PCOQ_TAIL_REGNUM));
526 write_register (HPPA_PCSQ_HEAD_REGNUM, read_register (HPPA_PCSQ_TAIL_REGNUM));
527
528 write_register (HPPA_PCOQ_TAIL_REGNUM, read_register (HPPA_PCOQ_TAIL_REGNUM) + 4);
529 /* We can leave the tail's space the same, since there's no jump. */
530}
abc485a1 531
4c02c60c
AC
532/* Exception handling support for the HP-UX ANSI C++ compiler.
533 The compiler (aCC) provides a callback for exception events;
534 GDB can set a breakpoint on this callback and find out what
535 exception event has occurred. */
536
537/* The name of the hook to be set to point to the callback function */
538static char HP_ACC_EH_notify_hook[] = "__eh_notify_hook";
539/* The name of the function to be used to set the hook value */
540static char HP_ACC_EH_set_hook_value[] = "__eh_set_hook_value";
541/* The name of the callback function in end.o */
542static char HP_ACC_EH_notify_callback[] = "__d_eh_notify_callback";
543/* Name of function in end.o on which a break is set (called by above) */
544static char HP_ACC_EH_break[] = "__d_eh_break";
545/* Name of flag (in end.o) that enables catching throws */
546static char HP_ACC_EH_catch_throw[] = "__d_eh_catch_throw";
547/* Name of flag (in end.o) that enables catching catching */
548static char HP_ACC_EH_catch_catch[] = "__d_eh_catch_catch";
549/* The enum used by aCC */
550typedef enum
551 {
552 __EH_NOTIFY_THROW,
553 __EH_NOTIFY_CATCH
554 }
555__eh_notification;
556
557/* Is exception-handling support available with this executable? */
558static int hp_cxx_exception_support = 0;
559/* Has the initialize function been run? */
90f943f1 560static int hp_cxx_exception_support_initialized = 0;
4c02c60c
AC
561/* Address of __eh_notify_hook */
562static CORE_ADDR eh_notify_hook_addr = 0;
563/* Address of __d_eh_notify_callback */
564static CORE_ADDR eh_notify_callback_addr = 0;
565/* Address of __d_eh_break */
566static CORE_ADDR eh_break_addr = 0;
567/* Address of __d_eh_catch_catch */
568static CORE_ADDR eh_catch_catch_addr = 0;
569/* Address of __d_eh_catch_throw */
570static CORE_ADDR eh_catch_throw_addr = 0;
571/* Sal for __d_eh_break */
572static struct symtab_and_line *break_callback_sal = 0;
573
574/* Code in end.c expects __d_pid to be set in the inferior,
575 otherwise __d_eh_notify_callback doesn't bother to call
576 __d_eh_break! So we poke the pid into this symbol
577 ourselves.
578 0 => success
579 1 => failure */
580int
581setup_d_pid_in_inferior (void)
582{
583 CORE_ADDR anaddr;
584 struct minimal_symbol *msymbol;
585 char buf[4]; /* FIXME 32x64? */
586
587 /* Slam the pid of the process into __d_pid; failing is only a warning! */
588 msymbol = lookup_minimal_symbol ("__d_pid", NULL, symfile_objfile);
589 if (msymbol == NULL)
590 {
591 warning ("Unable to find __d_pid symbol in object file.");
592 warning ("Suggest linking executable with -g (links in /opt/langtools/lib/end.o).");
593 return 1;
594 }
595
596 anaddr = SYMBOL_VALUE_ADDRESS (msymbol);
597 store_unsigned_integer (buf, 4, PIDGET (inferior_ptid)); /* FIXME 32x64? */
598 if (target_write_memory (anaddr, buf, 4)) /* FIXME 32x64? */
599 {
600 warning ("Unable to write __d_pid");
601 warning ("Suggest linking executable with -g (links in /opt/langtools/lib/end.o).");
602 return 1;
603 }
604 return 0;
605}
606
607/* elz: Used to lookup a symbol in the shared libraries.
608 This function calls shl_findsym, indirectly through a
609 call to __d_shl_get. __d_shl_get is in end.c, which is always
610 linked in by the hp compilers/linkers.
611 The call to shl_findsym cannot be made directly because it needs
612 to be active in target address space.
613 inputs: - minimal symbol pointer for the function we want to look up
614 - address in target space of the descriptor for the library
615 where we want to look the symbol up.
616 This address is retrieved using the
617 som_solib_get_solib_by_pc function (somsolib.c).
618 output: - real address in the library of the function.
619 note: the handle can be null, in which case shl_findsym will look for
620 the symbol in all the loaded shared libraries.
621 files to look at if you need reference on this stuff:
622 dld.c, dld_shl_findsym.c
623 end.c
624 man entry for shl_findsym */
625
626CORE_ADDR
627find_stub_with_shl_get (struct minimal_symbol *function, CORE_ADDR handle)
628{
629 struct symbol *get_sym, *symbol2;
630 struct minimal_symbol *buff_minsym, *msymbol;
631 struct type *ftype;
632 struct value **args;
633 struct value *funcval;
634 struct value *val;
635
636 int x, namelen, err_value, tmp = -1;
637 CORE_ADDR endo_buff_addr, value_return_addr, errno_return_addr;
638 CORE_ADDR stub_addr;
639
640
641 args = alloca (sizeof (struct value *) * 8); /* 6 for the arguments and one null one??? */
642 funcval = find_function_in_inferior ("__d_shl_get");
643 get_sym = lookup_symbol ("__d_shl_get", NULL, VAR_DOMAIN, NULL, NULL);
644 buff_minsym = lookup_minimal_symbol ("__buffer", NULL, NULL);
645 msymbol = lookup_minimal_symbol ("__shldp", NULL, NULL);
646 symbol2 = lookup_symbol ("__shldp", NULL, VAR_DOMAIN, NULL, NULL);
647 endo_buff_addr = SYMBOL_VALUE_ADDRESS (buff_minsym);
648 namelen = strlen (DEPRECATED_SYMBOL_NAME (function));
649 value_return_addr = endo_buff_addr + namelen;
650 ftype = check_typedef (SYMBOL_TYPE (get_sym));
651
652 /* do alignment */
653 if ((x = value_return_addr % 64) != 0)
654 value_return_addr = value_return_addr + 64 - x;
655
656 errno_return_addr = value_return_addr + 64;
657
658
659 /* set up stuff needed by __d_shl_get in buffer in end.o */
660
661 target_write_memory (endo_buff_addr, DEPRECATED_SYMBOL_NAME (function), namelen);
662
663 target_write_memory (value_return_addr, (char *) &tmp, 4);
664
665 target_write_memory (errno_return_addr, (char *) &tmp, 4);
666
667 target_write_memory (SYMBOL_VALUE_ADDRESS (msymbol),
668 (char *) &handle, 4);
669
670 /* now prepare the arguments for the call */
671
672 args[0] = value_from_longest (TYPE_FIELD_TYPE (ftype, 0), 12);
673 args[1] = value_from_pointer (TYPE_FIELD_TYPE (ftype, 1), SYMBOL_VALUE_ADDRESS (msymbol));
674 args[2] = value_from_pointer (TYPE_FIELD_TYPE (ftype, 2), endo_buff_addr);
675 args[3] = value_from_longest (TYPE_FIELD_TYPE (ftype, 3), TYPE_PROCEDURE);
676 args[4] = value_from_pointer (TYPE_FIELD_TYPE (ftype, 4), value_return_addr);
677 args[5] = value_from_pointer (TYPE_FIELD_TYPE (ftype, 5), errno_return_addr);
678
679 /* now call the function */
680
681 val = call_function_by_hand (funcval, 6, args);
682
683 /* now get the results */
684
685 target_read_memory (errno_return_addr, (char *) &err_value, sizeof (err_value));
686
687 target_read_memory (value_return_addr, (char *) &stub_addr, sizeof (stub_addr));
688 if (stub_addr <= 0)
689 error ("call to __d_shl_get failed, error code is %d", err_value);
690
691 return (stub_addr);
692}
693
694/* Cover routine for find_stub_with_shl_get to pass to catch_errors */
695static int
696cover_find_stub_with_shl_get (void *args_untyped)
697{
698 args_for_find_stub *args = args_untyped;
699 args->return_val = find_stub_with_shl_get (args->msym, args->solib_handle);
700 return 0;
701}
702
703/* Initialize exception catchpoint support by looking for the
704 necessary hooks/callbacks in end.o, etc., and set the hook value to
705 point to the required debug function
706
707 Return 0 => failure
708 1 => success */
709
710static int
711initialize_hp_cxx_exception_support (void)
712{
713 struct symtabs_and_lines sals;
714 struct cleanup *old_chain;
715 struct cleanup *canonical_strings_chain = NULL;
716 int i;
717 char *addr_start;
718 char *addr_end = NULL;
719 char **canonical = (char **) NULL;
720 int thread = -1;
721 struct symbol *sym = NULL;
722 struct minimal_symbol *msym = NULL;
723 struct objfile *objfile;
724 asection *shlib_info;
725
726 /* Detect and disallow recursion. On HP-UX with aCC, infinite
727 recursion is a possibility because finding the hook for exception
728 callbacks involves making a call in the inferior, which means
729 re-inserting breakpoints which can re-invoke this code */
730
731 static int recurse = 0;
732 if (recurse > 0)
733 {
734 hp_cxx_exception_support_initialized = 0;
f83f82bc 735 deprecated_exception_support_initialized = 0;
4c02c60c
AC
736 return 0;
737 }
738
739 hp_cxx_exception_support = 0;
740
741 /* First check if we have seen any HP compiled objects; if not,
742 it is very unlikely that HP's idiosyncratic callback mechanism
743 for exception handling debug support will be available!
744 This will percolate back up to breakpoint.c, where our callers
745 will decide to try the g++ exception-handling support instead. */
f83f82bc 746 if (!deprecated_hp_som_som_object_present)
4c02c60c
AC
747 return 0;
748
749 /* We have a SOM executable with SOM debug info; find the hooks */
750
751 /* First look for the notify hook provided by aCC runtime libs */
752 /* If we find this symbol, we conclude that the executable must
753 have HP aCC exception support built in. If this symbol is not
754 found, even though we're a HP SOM-SOM file, we may have been
755 built with some other compiler (not aCC). This results percolates
756 back up to our callers in breakpoint.c which can decide to
757 try the g++ style of exception support instead.
758 If this symbol is found but the other symbols we require are
759 not found, there is something weird going on, and g++ support
760 should *not* be tried as an alternative.
761
762 ASSUMPTION: Only HP aCC code will have __eh_notify_hook defined.
763 ASSUMPTION: HP aCC and g++ modules cannot be linked together. */
764
765 /* libCsup has this hook; it'll usually be non-debuggable */
766 msym = lookup_minimal_symbol (HP_ACC_EH_notify_hook, NULL, NULL);
767 if (msym)
768 {
769 eh_notify_hook_addr = SYMBOL_VALUE_ADDRESS (msym);
770 hp_cxx_exception_support = 1;
771 }
772 else
773 {
774 warning ("Unable to find exception callback hook (%s).", HP_ACC_EH_notify_hook);
775 warning ("Executable may not have been compiled debuggable with HP aCC.");
776 warning ("GDB will be unable to intercept exception events.");
777 eh_notify_hook_addr = 0;
778 hp_cxx_exception_support = 0;
779 return 0;
780 }
781
782 /* Next look for the notify callback routine in end.o */
783 /* This is always available in the SOM symbol dictionary if end.o is linked in */
784 msym = lookup_minimal_symbol (HP_ACC_EH_notify_callback, NULL, NULL);
785 if (msym)
786 {
787 eh_notify_callback_addr = SYMBOL_VALUE_ADDRESS (msym);
788 hp_cxx_exception_support = 1;
789 }
790 else
791 {
792 warning ("Unable to find exception callback routine (%s).", HP_ACC_EH_notify_callback);
793 warning ("Suggest linking executable with -g (links in /opt/langtools/lib/end.o).");
794 warning ("GDB will be unable to intercept exception events.");
795 eh_notify_callback_addr = 0;
796 return 0;
797 }
798
799#ifndef GDB_TARGET_IS_HPPA_20W
800 /* Check whether the executable is dynamically linked or archive bound */
801 /* With an archive-bound executable we can use the raw addresses we find
802 for the callback function, etc. without modification. For an executable
803 with shared libraries, we have to do more work to find the plabel, which
804 can be the target of a call through $$dyncall from the aCC runtime support
805 library (libCsup) which is linked shared by default by aCC. */
806 /* This test below was copied from somsolib.c/somread.c. It may not be a very
807 reliable one to test that an executable is linked shared. pai/1997-07-18 */
808 shlib_info = bfd_get_section_by_name (symfile_objfile->obfd, "$SHLIB_INFO$");
809 if (shlib_info && (bfd_section_size (symfile_objfile->obfd, shlib_info) != 0))
810 {
811 /* The minsym we have has the local code address, but that's not the
812 plabel that can be used by an inter-load-module call. */
813 /* Find solib handle for main image (which has end.o), and use that
814 and the min sym as arguments to __d_shl_get() (which does the equivalent
815 of shl_findsym()) to find the plabel. */
816
817 args_for_find_stub args;
818 static char message[] = "Error while finding exception callback hook:\n";
819
820 args.solib_handle = som_solib_get_solib_by_pc (eh_notify_callback_addr);
821 args.msym = msym;
822 args.return_val = 0;
823
824 recurse++;
825 catch_errors (cover_find_stub_with_shl_get, &args, message,
826 RETURN_MASK_ALL);
827 eh_notify_callback_addr = args.return_val;
828 recurse--;
829
f83f82bc 830 deprecated_exception_catchpoints_are_fragile = 1;
4c02c60c
AC
831
832 if (!eh_notify_callback_addr)
833 {
834 /* We can get here either if there is no plabel in the export list
835 for the main image, or if something strange happened (?) */
836 warning ("Couldn't find a plabel (indirect function label) for the exception callback.");
837 warning ("GDB will not be able to intercept exception events.");
838 return 0;
839 }
840 }
841 else
f83f82bc 842 deprecated_exception_catchpoints_are_fragile = 0;
4c02c60c
AC
843#endif
844
845 /* Now, look for the breakpointable routine in end.o */
846 /* This should also be available in the SOM symbol dict. if end.o linked in */
847 msym = lookup_minimal_symbol (HP_ACC_EH_break, NULL, NULL);
848 if (msym)
849 {
850 eh_break_addr = SYMBOL_VALUE_ADDRESS (msym);
851 hp_cxx_exception_support = 1;
852 }
853 else
854 {
855 warning ("Unable to find exception callback routine to set breakpoint (%s).", HP_ACC_EH_break);
856 warning ("Suggest linking executable with -g (link in /opt/langtools/lib/end.o).");
857 warning ("GDB will be unable to intercept exception events.");
858 eh_break_addr = 0;
859 return 0;
860 }
861
862 /* Next look for the catch enable flag provided in end.o */
863 sym = lookup_symbol (HP_ACC_EH_catch_catch, (struct block *) NULL,
864 VAR_DOMAIN, 0, (struct symtab **) NULL);
865 if (sym) /* sometimes present in debug info */
866 {
867 eh_catch_catch_addr = SYMBOL_VALUE_ADDRESS (sym);
868 hp_cxx_exception_support = 1;
869 }
870 else
871 /* otherwise look in SOM symbol dict. */
872 {
873 msym = lookup_minimal_symbol (HP_ACC_EH_catch_catch, NULL, NULL);
874 if (msym)
875 {
876 eh_catch_catch_addr = SYMBOL_VALUE_ADDRESS (msym);
877 hp_cxx_exception_support = 1;
878 }
879 else
880 {
881 warning ("Unable to enable interception of exception catches.");
882 warning ("Executable may not have been compiled debuggable with HP aCC.");
883 warning ("Suggest linking executable with -g (link in /opt/langtools/lib/end.o).");
884 return 0;
885 }
886 }
887
888 /* Next look for the catch enable flag provided end.o */
889 sym = lookup_symbol (HP_ACC_EH_catch_catch, (struct block *) NULL,
890 VAR_DOMAIN, 0, (struct symtab **) NULL);
891 if (sym) /* sometimes present in debug info */
892 {
893 eh_catch_throw_addr = SYMBOL_VALUE_ADDRESS (sym);
894 hp_cxx_exception_support = 1;
895 }
896 else
897 /* otherwise look in SOM symbol dict. */
898 {
899 msym = lookup_minimal_symbol (HP_ACC_EH_catch_throw, NULL, NULL);
900 if (msym)
901 {
902 eh_catch_throw_addr = SYMBOL_VALUE_ADDRESS (msym);
903 hp_cxx_exception_support = 1;
904 }
905 else
906 {
907 warning ("Unable to enable interception of exception throws.");
908 warning ("Executable may not have been compiled debuggable with HP aCC.");
909 warning ("Suggest linking executable with -g (link in /opt/langtools/lib/end.o).");
910 return 0;
911 }
912 }
913
914 /* Set the flags */
915 hp_cxx_exception_support = 2; /* everything worked so far */
916 hp_cxx_exception_support_initialized = 1;
f83f82bc 917 deprecated_exception_support_initialized = 1;
4c02c60c
AC
918
919 return 1;
920}
921
922/* Target operation for enabling or disabling interception of
923 exception events.
924 KIND is either EX_EVENT_THROW or EX_EVENT_CATCH
925 ENABLE is either 0 (disable) or 1 (enable).
926 Return value is NULL if no support found;
927 -1 if something went wrong,
928 or a pointer to a symtab/line struct if the breakpointable
929 address was found. */
930
931struct symtab_and_line *
932child_enable_exception_callback (enum exception_event_kind kind, int enable)
933{
934 char buf[4];
935
f83f82bc
AC
936 if (!deprecated_exception_support_initialized
937 || !hp_cxx_exception_support_initialized)
4c02c60c
AC
938 if (!initialize_hp_cxx_exception_support ())
939 return NULL;
940
941 switch (hp_cxx_exception_support)
942 {
943 case 0:
944 /* Assuming no HP support at all */
945 return NULL;
946 case 1:
947 /* HP support should be present, but something went wrong */
948 return (struct symtab_and_line *) -1; /* yuck! */
949 /* there may be other cases in the future */
950 }
951
952 /* Set the EH hook to point to the callback routine */
953 store_unsigned_integer (buf, 4, enable ? eh_notify_callback_addr : 0); /* FIXME 32x64 problem */
954 /* pai: (temp) FIXME should there be a pack operation first? */
955 if (target_write_memory (eh_notify_hook_addr, buf, 4)) /* FIXME 32x64 problem */
956 {
957 warning ("Could not write to target memory for exception event callback.");
958 warning ("Interception of exception events may not work.");
959 return (struct symtab_and_line *) -1;
960 }
961 if (enable)
962 {
963 /* Ensure that __d_pid is set up correctly -- end.c code checks this. :-( */
964 if (PIDGET (inferior_ptid) > 0)
965 {
966 if (setup_d_pid_in_inferior ())
967 return (struct symtab_and_line *) -1;
968 }
969 else
970 {
971 warning ("Internal error: Invalid inferior pid? Cannot intercept exception events.");
972 return (struct symtab_and_line *) -1;
973 }
974 }
975
976 switch (kind)
977 {
978 case EX_EVENT_THROW:
979 store_unsigned_integer (buf, 4, enable ? 1 : 0);
980 if (target_write_memory (eh_catch_throw_addr, buf, 4)) /* FIXME 32x64? */
981 {
982 warning ("Couldn't enable exception throw interception.");
983 return (struct symtab_and_line *) -1;
984 }
985 break;
986 case EX_EVENT_CATCH:
987 store_unsigned_integer (buf, 4, enable ? 1 : 0);
988 if (target_write_memory (eh_catch_catch_addr, buf, 4)) /* FIXME 32x64? */
989 {
990 warning ("Couldn't enable exception catch interception.");
991 return (struct symtab_and_line *) -1;
992 }
993 break;
994 default:
995 error ("Request to enable unknown or unsupported exception event.");
996 }
997
998 /* Copy break address into new sal struct, malloc'ing if needed. */
999 if (!break_callback_sal)
1000 {
1001 break_callback_sal = (struct symtab_and_line *) xmalloc (sizeof (struct symtab_and_line));
1002 }
1003 init_sal (break_callback_sal);
1004 break_callback_sal->symtab = NULL;
1005 break_callback_sal->pc = eh_break_addr;
1006 break_callback_sal->line = 0;
1007 break_callback_sal->end = eh_break_addr;
1008
1009 return break_callback_sal;
1010}
1011
1012/* Record some information about the current exception event */
1013static struct exception_event_record current_ex_event;
1014/* Convenience struct */
1015static struct symtab_and_line null_symtab_and_line =
1016{NULL, 0, 0, 0};
1017
1018/* Report current exception event. Returns a pointer to a record
1019 that describes the kind of the event, where it was thrown from,
1020 and where it will be caught. More information may be reported
1021 in the future */
1022struct exception_event_record *
1023child_get_current_exception_event (void)
1024{
1025 CORE_ADDR event_kind;
1026 CORE_ADDR throw_addr;
1027 CORE_ADDR catch_addr;
1028 struct frame_info *fi, *curr_frame;
1029 int level = 1;
1030
1031 curr_frame = get_current_frame ();
1032 if (!curr_frame)
1033 return (struct exception_event_record *) NULL;
1034
1035 /* Go up one frame to __d_eh_notify_callback, because at the
1036 point when this code is executed, there's garbage in the
1037 arguments of __d_eh_break. */
1038 fi = find_relative_frame (curr_frame, &level);
1039 if (level != 0)
1040 return (struct exception_event_record *) NULL;
1041
1042 select_frame (fi);
1043
1044 /* Read in the arguments */
1045 /* __d_eh_notify_callback() is called with 3 arguments:
1046 1. event kind catch or throw
1047 2. the target address if known
1048 3. a flag -- not sure what this is. pai/1997-07-17 */
34f75cc1
RC
1049 event_kind = read_register (HPPA_ARG0_REGNUM);
1050 catch_addr = read_register (HPPA_ARG1_REGNUM);
4c02c60c
AC
1051
1052 /* Now go down to a user frame */
1053 /* For a throw, __d_eh_break is called by
1054 __d_eh_notify_callback which is called by
1055 __notify_throw which is called
1056 from user code.
1057 For a catch, __d_eh_break is called by
1058 __d_eh_notify_callback which is called by
1059 <stackwalking stuff> which is called by
1060 __throw__<stuff> or __rethrow_<stuff> which is called
1061 from user code. */
1062 /* FIXME: Don't use such magic numbers; search for the frames */
1063 level = (event_kind == EX_EVENT_THROW) ? 3 : 4;
1064 fi = find_relative_frame (curr_frame, &level);
1065 if (level != 0)
1066 return (struct exception_event_record *) NULL;
1067
1068 select_frame (fi);
1069 throw_addr = get_frame_pc (fi);
1070
1071 /* Go back to original (top) frame */
1072 select_frame (curr_frame);
1073
1074 current_ex_event.kind = (enum exception_event_kind) event_kind;
1075 current_ex_event.throw_sal = find_pc_line (throw_addr, 1);
1076 current_ex_event.catch_sal = find_pc_line (catch_addr, 1);
1077
1078 return &current_ex_event;
1079}
1080
43613416
RC
1081/* Signal frames. */
1082struct hppa_hpux_sigtramp_unwind_cache
1083{
1084 CORE_ADDR base;
1085 struct trad_frame_saved_reg *saved_regs;
1086};
1087
1088static int hppa_hpux_tramp_reg[] = {
1089 HPPA_SAR_REGNUM,
1090 HPPA_PCOQ_HEAD_REGNUM,
1091 HPPA_PCSQ_HEAD_REGNUM,
1092 HPPA_PCOQ_TAIL_REGNUM,
1093 HPPA_PCSQ_TAIL_REGNUM,
1094 HPPA_EIEM_REGNUM,
1095 HPPA_IIR_REGNUM,
1096 HPPA_ISR_REGNUM,
1097 HPPA_IOR_REGNUM,
1098 HPPA_IPSW_REGNUM,
1099 -1,
1100 HPPA_SR4_REGNUM,
1101 HPPA_SR4_REGNUM + 1,
1102 HPPA_SR4_REGNUM + 2,
1103 HPPA_SR4_REGNUM + 3,
1104 HPPA_SR4_REGNUM + 4,
1105 HPPA_SR4_REGNUM + 5,
1106 HPPA_SR4_REGNUM + 6,
1107 HPPA_SR4_REGNUM + 7,
1108 HPPA_RCR_REGNUM,
1109 HPPA_PID0_REGNUM,
1110 HPPA_PID1_REGNUM,
1111 HPPA_CCR_REGNUM,
1112 HPPA_PID2_REGNUM,
1113 HPPA_PID3_REGNUM,
1114 HPPA_TR0_REGNUM,
1115 HPPA_TR0_REGNUM + 1,
1116 HPPA_TR0_REGNUM + 2,
1117 HPPA_CR27_REGNUM
1118};
1119
1120static struct hppa_hpux_sigtramp_unwind_cache *
1121hppa_hpux_sigtramp_frame_unwind_cache (struct frame_info *next_frame,
1122 void **this_cache)
1123
1124{
1125 struct gdbarch *gdbarch = get_frame_arch (next_frame);
1126 struct gdbarch_tdep *tdep = gdbarch_tdep (gdbarch);
1127 struct hppa_hpux_sigtramp_unwind_cache *info;
1128 unsigned int flag;
1129 CORE_ADDR sp, scptr;
1130 int i, incr, off, szoff;
1131
1132 if (*this_cache)
1133 return *this_cache;
1134
1135 info = FRAME_OBSTACK_ZALLOC (struct hppa_hpux_sigtramp_unwind_cache);
1136 *this_cache = info;
1137 info->saved_regs = trad_frame_alloc_saved_regs (next_frame);
1138
1139 sp = frame_unwind_register_unsigned (next_frame, HPPA_SP_REGNUM);
1140
1141 scptr = sp - 1352;
1142 off = scptr;
1143
1144 /* See /usr/include/machine/save_state.h for the structure of the save_state_t
1145 structure. */
1146
1147 flag = read_memory_unsigned_integer(scptr, 4);
1148
1149 if (!(flag & 0x40))
1150 {
1151 /* Narrow registers. */
1152 off = scptr + offsetof (save_state_t, ss_narrow);
1153 incr = 4;
1154 szoff = 0;
1155 }
1156 else
1157 {
1158 /* Wide registers. */
1159 off = scptr + offsetof (save_state_t, ss_wide) + 8;
1160 incr = 8;
1161 szoff = (tdep->bytes_per_address == 4 ? 4 : 0);
1162 }
1163
1164 for (i = 1; i < 32; i++)
1165 {
1166 info->saved_regs[HPPA_R0_REGNUM + i].addr = off + szoff;
1167 off += incr;
1168 }
1169
1170 for (i = 0;
1171 i < sizeof(hppa_hpux_tramp_reg) / sizeof(hppa_hpux_tramp_reg[0]);
1172 i++)
1173 {
1174 if (hppa_hpux_tramp_reg[i] > 0)
1175 info->saved_regs[hppa_hpux_tramp_reg[i]].addr = off + szoff;
1176 off += incr;
1177 }
1178
1179 /* TODO: fp regs */
1180
1181 info->base = frame_unwind_register_unsigned (next_frame, HPPA_SP_REGNUM);
1182
1183 return info;
1184}
1185
1186static void
1187hppa_hpux_sigtramp_frame_this_id (struct frame_info *next_frame,
1188 void **this_prologue_cache,
1189 struct frame_id *this_id)
1190{
1191 struct hppa_hpux_sigtramp_unwind_cache *info
1192 = hppa_hpux_sigtramp_frame_unwind_cache (next_frame, this_prologue_cache);
1193 *this_id = frame_id_build (info->base, frame_pc_unwind (next_frame));
1194}
1195
1196static void
1197hppa_hpux_sigtramp_frame_prev_register (struct frame_info *next_frame,
1198 void **this_prologue_cache,
1199 int regnum, int *optimizedp,
1200 enum lval_type *lvalp,
1201 CORE_ADDR *addrp,
1202 int *realnump, void *valuep)
1203{
1204 struct hppa_hpux_sigtramp_unwind_cache *info
1205 = hppa_hpux_sigtramp_frame_unwind_cache (next_frame, this_prologue_cache);
1206 hppa_frame_prev_register_helper (next_frame, info->saved_regs, regnum,
1207 optimizedp, lvalp, addrp, realnump, valuep);
1208}
1209
1210static const struct frame_unwind hppa_hpux_sigtramp_frame_unwind = {
1211 SIGTRAMP_FRAME,
1212 hppa_hpux_sigtramp_frame_this_id,
1213 hppa_hpux_sigtramp_frame_prev_register
1214};
1215
1216static const struct frame_unwind *
1217hppa_hpux_sigtramp_unwind_sniffer (struct frame_info *next_frame)
1218{
1219 CORE_ADDR pc = frame_pc_unwind (next_frame);
1220 char *name;
1221
1222 find_pc_partial_function (pc, &name, NULL, NULL);
1223
1224 if (name && strcmp(name, "_sigreturn") == 0)
1225 return &hppa_hpux_sigtramp_frame_unwind;
1226
1227 return NULL;
1228}
1229
c268433a
RC
1230static CORE_ADDR
1231hppa_hpux_som_find_global_pointer (struct value *function)
1232{
1233 CORE_ADDR faddr;
1234
1235 faddr = value_as_address (function);
1236
1237 /* Is this a plabel? If so, dereference it to get the gp value. */
1238 if (faddr & 2)
1239 {
1240 int status;
1241 char buf[4];
1242
1243 faddr &= ~3;
1244
1245 status = target_read_memory (faddr + 4, buf, sizeof (buf));
1246 if (status == 0)
1247 return extract_unsigned_integer (buf, sizeof (buf));
1248 }
1249
1250 return som_solib_get_got_by_pc (faddr);
1251}
1252
1253static CORE_ADDR
1254hppa_hpux_push_dummy_code (struct gdbarch *gdbarch, CORE_ADDR sp,
1255 CORE_ADDR funcaddr, int using_gcc,
1256 struct value **args, int nargs,
1257 struct type *value_type,
1258 CORE_ADDR *real_pc, CORE_ADDR *bp_addr)
1259{
1260 /* FIXME: tausq/2004-06-09: This needs much more testing. It is broken
1261 for pa64, but we should be able to get it to work with a little bit
1262 of work. gdb-6.1 has a lot of code to handle various cases; I've tried to
1263 simplify it and avoid compile-time conditionals. */
1264
1265 /* On HPUX, functions in the main executable and in libraries can be located
1266 in different spaces. In order for us to be able to select the right
1267 space for the function call, we need to go through an instruction seqeunce
1268 to select the right space for the target function, call it, and then
1269 restore the space on return.
1270
1271 There are two helper routines that can be used for this task -- if
1272 an application is linked with gcc, it will contain a __gcc_plt_call
1273 helper function. __gcc_plt_call, when passed the entry point of an
1274 import stub, will do the necessary space setting/restoration for the
1275 target function.
1276
1277 For programs that are compiled/linked with the HP compiler, a similar
1278 function called __d_plt_call exists; __d_plt_call expects a PLABEL instead
1279 of an import stub as an argument.
1280
080228b2 1281 // *INDENT-OFF*
c268433a
RC
1282 To summarize, the call flow is:
1283 current function -> dummy frame -> __gcc_plt_call (import stub)
1284 -> target function
1285 or
1286 current function -> dummy frame -> __d_plt_call (plabel)
1287 -> target function
080228b2 1288 // *INDENT-ON*
c268433a
RC
1289
1290 In general the "funcaddr" argument passed to push_dummy_code is the actual
1291 entry point of the target function. For __gcc_plt_call, we need to
1292 locate the import stub for the corresponding function. Failing that,
1293 we construct a dummy "import stub" on the stack to pass as an argument.
1294 For __d_plt_call, we similarly synthesize a PLABEL on the stack to
1295 pass to the helper function.
1296
1297 An additional twist is that, in order for us to restore the space register
1298 to its starting state, we need __gcc_plt_call/__d_plt_call to return
1299 to the instruction where we started the call. However, if we put
1300 the breakpoint there, gdb will complain because it will find two
1301 frames on the stack with the same (sp, pc) (with the dummy frame in
1302 between). Currently, we set the return pointer to (pc - 4) of the
1303 current function. FIXME: This is not an ideal solution; possibly if the
1304 current pc is at the beginning of a page, this will cause a page fault.
1305 Need to understand this better and figure out a better way to fix it. */
1306
1307 struct minimal_symbol *sym;
1308
1309 /* Nonzero if we will use GCC's PLT call routine. This routine must be
1310 passed an import stub, not a PLABEL. It is also necessary to get %r19
1311 before performing the call. (This is done by push_dummy_call.) */
1312 int use_gcc_plt_call = 1;
1313
1314 /* See if __gcc_plt_call is available; if not we will use the HP version
1315 instead. */
1316 sym = lookup_minimal_symbol ("__gcc_plt_call", NULL, NULL);
1317 if (sym == NULL)
1318 use_gcc_plt_call = 0;
1319
1320 /* If using __gcc_plt_call, we need to make sure we pass in an import
1321 stub. funcaddr can be pointing to an export stub or a real function,
1322 so we try to resolve it to the import stub. */
1323 if (use_gcc_plt_call)
1324 {
1325 struct objfile *objfile;
1326 struct minimal_symbol *funsym, *stubsym;
1327 CORE_ADDR stubaddr = 0;
1328
1329 funsym = lookup_minimal_symbol_by_pc (funcaddr);
1330 if (!funsym)
1331 error ("Unable to find symbol for target function.\n");
1332
1333 ALL_OBJFILES (objfile)
1334 {
1335 stubsym = lookup_minimal_symbol_solib_trampoline
1336 (SYMBOL_LINKAGE_NAME (funsym), objfile);
1337
1338 if (stubsym)
1339 {
1340 struct unwind_table_entry *u;
1341
1342 u = find_unwind_entry (SYMBOL_VALUE (stubsym));
1343 if (u == NULL
1344 || (u->stub_unwind.stub_type != IMPORT
1345 && u->stub_unwind.stub_type != IMPORT_SHLIB))
1346 continue;
1347
1348 stubaddr = SYMBOL_VALUE (stubsym);
1349
1350 /* If we found an IMPORT stub, then we can stop searching;
1351 if we found an IMPORT_SHLIB, we want to continue the search
1352 in the hopes that we will find an IMPORT stub. */
1353 if (u->stub_unwind.stub_type == IMPORT)
1354 break;
1355 }
1356 }
1357
1358 if (stubaddr != 0)
1359 {
1360 /* Argument to __gcc_plt_call is passed in r22. */
1361 regcache_cooked_write_unsigned (current_regcache, 22, stubaddr);
1362 }
1363 else
1364 {
1365 /* No import stub found; let's synthesize one. */
1366
1367 /* ldsid %r21, %r1 */
1368 write_memory_unsigned_integer (sp, 4, 0x02a010a1);
1369 /* mtsp %r1,%sr0 */
1370 write_memory_unsigned_integer (sp + 4, 4, 0x00011820);
1371 /* be 0(%sr0, %r21) */
1372 write_memory_unsigned_integer (sp + 8, 4, 0xe2a00000);
1373 /* nop */
1374 write_memory_unsigned_integer (sp + 12, 4, 0x08000240);
1375
1376 regcache_cooked_write_unsigned (current_regcache, 21, funcaddr);
1377 regcache_cooked_write_unsigned (current_regcache, 22, sp);
1378 }
1379
1380 /* We set the breakpoint address and r31 to (close to) where the current
1381 pc is; when __gcc_plt_call returns, it will restore pcsqh to the
1382 current value based on this. The -4 is needed for frame unwinding
1383 to work properly -- we need to land in a different function than
1384 the current function. */
1385 *bp_addr = (read_register (HPPA_PCOQ_HEAD_REGNUM) & ~3) - 4;
1386 regcache_cooked_write_unsigned (current_regcache, 31, *bp_addr);
1387
1388 /* Continue from __gcc_plt_call. */
1389 *real_pc = SYMBOL_VALUE (sym);
1390 }
1391 else
1392 {
dd515450 1393 ULONGEST gp;
c268433a
RC
1394
1395 /* Use __d_plt_call as a fallback; __d_plt_call expects to be called
1396 with a plabel, so we need to build one. */
1397
1398 sym = lookup_minimal_symbol ("__d_plt_call", NULL, NULL);
1399 if (sym == NULL)
1400 error("Can't find an address for __d_plt_call or __gcc_plt_call "
1401 "trampoline\nSuggest linking executable with -g or compiling "
1402 "with gcc.");
1403
1404 gp = gdbarch_tdep (gdbarch)->find_global_pointer (funcaddr);
1405 write_memory_unsigned_integer (sp, 4, funcaddr);
1406 write_memory_unsigned_integer (sp + 4, 4, gp);
1407
1408 /* plabel is passed in r22 */
1409 regcache_cooked_write_unsigned (current_regcache, 22, sp);
1410 }
1411
1412 /* Pushed one stack frame, which has to be 64-byte aligned. */
1413 sp += 64;
1414
1415 return sp;
1416}
1417
90f943f1
RC
1418static void
1419hppa_hpux_inferior_created (struct target_ops *objfile, int from_tty)
1420{
1421 /* Some HP-UX related globals to clear when a new "main"
1422 symbol file is loaded. HP-specific. */
1423 deprecated_hp_som_som_object_present = 0;
1424 hp_cxx_exception_support_initialized = 0;
1425}
1426
7d773d96
JB
1427static void
1428hppa_hpux_init_abi (struct gdbarch_info info, struct gdbarch *gdbarch)
1429{
abc485a1
RC
1430 struct gdbarch_tdep *tdep = gdbarch_tdep (gdbarch);
1431
abc485a1 1432 if (tdep->bytes_per_address == 4)
84674fe1 1433 tdep->in_solib_call_trampoline = hppa32_hpux_in_solib_call_trampoline;
abc485a1 1434 else
84674fe1 1435 tdep->in_solib_call_trampoline = hppa64_hpux_in_solib_call_trampoline;
abc485a1
RC
1436
1437 set_gdbarch_in_solib_return_trampoline (gdbarch,
1438 hppa_hpux_in_solib_return_trampoline);
1439 set_gdbarch_skip_trampoline_code (gdbarch, hppa_hpux_skip_trampoline_code);
43613416 1440
c268433a
RC
1441 set_gdbarch_push_dummy_code (gdbarch, hppa_hpux_push_dummy_code);
1442 set_gdbarch_call_dummy_location (gdbarch, ON_STACK);
1443
43613416 1444 frame_unwind_append_sniffer (gdbarch, hppa_hpux_sigtramp_unwind_sniffer);
90f943f1
RC
1445
1446 observer_attach_inferior_created (hppa_hpux_inferior_created);
7d773d96 1447}
60e1ff27 1448
273f8429
JB
1449static void
1450hppa_hpux_som_init_abi (struct gdbarch_info info, struct gdbarch *gdbarch)
1451{
fdd72f95
RC
1452 struct gdbarch_tdep *tdep = gdbarch_tdep (gdbarch);
1453
1454 tdep->is_elf = 0;
c268433a
RC
1455
1456 tdep->find_global_pointer = hppa_hpux_som_find_global_pointer;
7d773d96 1457 hppa_hpux_init_abi (info, gdbarch);
273f8429
JB
1458}
1459
1460static void
1461hppa_hpux_elf_init_abi (struct gdbarch_info info, struct gdbarch *gdbarch)
1462{
fdd72f95
RC
1463 struct gdbarch_tdep *tdep = gdbarch_tdep (gdbarch);
1464
1465 tdep->is_elf = 1;
7d773d96 1466 hppa_hpux_init_abi (info, gdbarch);
273f8429
JB
1467}
1468
1469void
1470_initialize_hppa_hpux_tdep (void)
1471{
05816f70 1472 gdbarch_register_osabi (bfd_arch_hppa, 0, GDB_OSABI_HPUX_SOM,
273f8429 1473 hppa_hpux_som_init_abi);
51db5742 1474 gdbarch_register_osabi (bfd_arch_hppa, bfd_mach_hppa20w, GDB_OSABI_HPUX_ELF,
273f8429
JB
1475 hppa_hpux_elf_init_abi);
1476}
This page took 0.268358 seconds and 4 git commands to generate.