]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/solib-darwin.c
x86: Change PLT32 reloc against section to PC32
[thirdparty/binutils-gdb.git] / gdb / solib-darwin.c
CommitLineData
cf1061c0
TG
1/* Handle Darwin shared libraries for GDB, the GNU Debugger.
2
b811d2c2 3 Copyright (C) 2009-2020 Free Software Foundation, Inc.
cf1061c0
TG
4
5 This file is part of GDB.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
19
20#include "defs.h"
21
22#include "symtab.h"
23#include "bfd.h"
24#include "symfile.h"
25#include "objfiles.h"
26#include "gdbcore.h"
27#include "target.h"
28#include "inferior.h"
fb14de7b 29#include "regcache.h"
cf1061c0 30#include "gdbthread.h"
cbb099e8 31#include "gdb_bfd.h"
cf1061c0 32
cf1061c0
TG
33#include "solist.h"
34#include "solib.h"
35#include "solib-svr4.h"
36
37#include "bfd-target.h"
38#include "elf-bfd.h"
39#include "exec.h"
40#include "auxv.h"
cf1061c0 41#include "mach-o.h"
8544a150 42#include "mach-o/external.h"
cf1061c0
TG
43
44struct gdb_dyld_image_info
45{
46 /* Base address (which corresponds to the Mach-O header). */
47 CORE_ADDR mach_header;
48 /* Image file path. */
49 CORE_ADDR file_path;
50 /* st.m_time of image file. */
51 unsigned long mtime;
52};
53
066d7383
TG
54/* Content of inferior dyld_all_image_infos structure.
55 See /usr/include/mach-o/dyld_images.h for the documentation. */
cf1061c0
TG
56struct gdb_dyld_all_image_infos
57{
58 /* Version (1). */
59 unsigned int version;
60 /* Number of images. */
61 unsigned int count;
62 /* Image description. */
63 CORE_ADDR info;
64 /* Notifier (function called when a library is added or removed). */
65 CORE_ADDR notifier;
66};
67
68/* Current all_image_infos version. */
066d7383 69#define DYLD_VERSION_MIN 1
4bbd4ef2 70#define DYLD_VERSION_MAX 15
cf1061c0 71
ec95993c
TG
72/* Per PSPACE specific data. */
73struct darwin_info
74{
75 /* Address of structure dyld_all_image_infos in inferior. */
51df2ae3 76 CORE_ADDR all_image_addr = 0;
ec95993c
TG
77
78 /* Gdb copy of dyld_all_info_infos. */
51df2ae3 79 struct gdb_dyld_all_image_infos all_image {};
ec95993c
TG
80};
81
82/* Per-program-space data key. */
51df2ae3 83static program_space_key<darwin_info> solib_darwin_pspace_data;
cf1061c0 84
ec95993c
TG
85/* Get the current darwin data. If none is found yet, add it now. This
86 function always returns a valid object. */
87
88static struct darwin_info *
89get_darwin_info (void)
90{
91 struct darwin_info *info;
92
51df2ae3 93 info = solib_darwin_pspace_data.get (current_program_space);
ec95993c
TG
94 if (info != NULL)
95 return info;
96
51df2ae3 97 return solib_darwin_pspace_data.emplace (current_program_space);
ec95993c 98}
cf1061c0 99
066d7383
TG
100/* Return non-zero if the version in dyld_all_image is known. */
101
102static int
ec95993c 103darwin_dyld_version_ok (const struct darwin_info *info)
066d7383 104{
ec95993c
TG
105 return info->all_image.version >= DYLD_VERSION_MIN
106 && info->all_image.version <= DYLD_VERSION_MAX;
066d7383
TG
107}
108
cf1061c0 109/* Read dyld_all_image from inferior. */
066d7383 110
cf1061c0 111static void
ec95993c 112darwin_load_image_infos (struct darwin_info *info)
cf1061c0
TG
113{
114 gdb_byte buf[24];
f5656ead
TT
115 enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch ());
116 struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
cf1061c0
TG
117 int len;
118
119 /* If the structure address is not known, don't continue. */
ec95993c 120 if (info->all_image_addr == 0)
cf1061c0
TG
121 return;
122
123 /* The structure has 4 fields: version (4 bytes), count (4 bytes),
124 info (pointer) and notifier (pointer). */
132874d7 125 len = 4 + 4 + 2 * TYPE_LENGTH (ptr_type);
cf1061c0 126 gdb_assert (len <= sizeof (buf));
ec95993c 127 memset (&info->all_image, 0, sizeof (info->all_image));
cf1061c0
TG
128
129 /* Read structure raw bytes from target. */
ec95993c 130 if (target_read_memory (info->all_image_addr, buf, len))
cf1061c0
TG
131 return;
132
133 /* Extract the fields. */
ec95993c
TG
134 info->all_image.version = extract_unsigned_integer (buf, 4, byte_order);
135 if (!darwin_dyld_version_ok (info))
cf1061c0
TG
136 return;
137
ec95993c
TG
138 info->all_image.count = extract_unsigned_integer (buf + 4, 4, byte_order);
139 info->all_image.info = extract_typed_address (buf + 8, ptr_type);
140 info->all_image.notifier = extract_typed_address
132874d7 141 (buf + 8 + TYPE_LENGTH (ptr_type), ptr_type);
cf1061c0
TG
142}
143
144/* Link map info to include in an allocated so_list entry. */
145
d0e449a1 146struct lm_info_darwin : public lm_info_base
cf1061c0
TG
147{
148 /* The target location of lm. */
9ccbfd7b 149 CORE_ADDR lm_addr = 0;
cf1061c0
TG
150};
151
cf1061c0 152/* Lookup the value for a specific symbol. */
066d7383 153
cf1061c0 154static CORE_ADDR
a121b7c1 155lookup_symbol_from_bfd (bfd *abfd, const char *symname)
cf1061c0
TG
156{
157 long storage_needed;
158 asymbol **symbol_table;
159 unsigned int number_of_symbols;
160 unsigned int i;
161 CORE_ADDR symaddr = 0;
162
163 storage_needed = bfd_get_symtab_upper_bound (abfd);
164
165 if (storage_needed <= 0)
166 return 0;
167
168 symbol_table = (asymbol **) xmalloc (storage_needed);
169 number_of_symbols = bfd_canonicalize_symtab (abfd, symbol_table);
70d4c673 170
cf1061c0
TG
171 for (i = 0; i < number_of_symbols; i++)
172 {
173 asymbol *sym = symbol_table[i];
433759f7 174
cf1061c0
TG
175 if (strcmp (sym->name, symname) == 0
176 && (sym->section->flags & (SEC_CODE | SEC_DATA)) != 0)
177 {
178 /* BFD symbols are section relative. */
179 symaddr = sym->value + sym->section->vma;
180 break;
181 }
182 }
183 xfree (symbol_table);
184
185 return symaddr;
186}
187
188/* Return program interpreter string. */
023e4e81 189
001f13d8 190static char *
cf1061c0
TG
191find_program_interpreter (void)
192{
001f13d8 193 char *buf = NULL;
cf1061c0 194
023e4e81 195 /* If we have an exec_bfd, get the interpreter from the load commands. */
cf1061c0
TG
196 if (exec_bfd)
197 {
023e4e81 198 bfd_mach_o_load_command *cmd;
70d4c673 199
023e4e81
TG
200 if (bfd_mach_o_lookup_command (exec_bfd,
201 BFD_MACH_O_LC_LOAD_DYLINKER, &cmd) == 1)
202 return cmd->command.dylinker.name_str;
cf1061c0
TG
203 }
204
205 /* If we didn't find it, read from memory.
206 FIXME: todo. */
207 return buf;
208}
209
210/* Not used. I don't see how the main symbol file can be found: the
211 interpreter name is needed and it is known from the executable file.
212 Note that darwin-nat.c implements pid_to_exec_file. */
066d7383 213
cf1061c0 214static int
bf469271 215open_symbol_file_object (int from_tty)
cf1061c0
TG
216{
217 return 0;
218}
219
c378eb4e 220/* Build a list of currently loaded shared objects. See solib-svr4.c. */
066d7383 221
cf1061c0
TG
222static struct so_list *
223darwin_current_sos (void)
224{
f5656ead 225 struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
34877895 226 enum bfd_endian byte_order = type_byte_order (ptr_type);
cf1061c0
TG
227 int ptr_len = TYPE_LENGTH (ptr_type);
228 unsigned int image_info_size;
cf1061c0
TG
229 struct so_list *head = NULL;
230 struct so_list *tail = NULL;
231 int i;
ec95993c 232 struct darwin_info *info = get_darwin_info ();
cf1061c0
TG
233
234 /* Be sure image infos are loaded. */
ec95993c 235 darwin_load_image_infos (info);
cf1061c0 236
ec95993c 237 if (!darwin_dyld_version_ok (info))
cf1061c0
TG
238 return NULL;
239
240 image_info_size = ptr_len * 3;
241
242 /* Read infos for each solib.
8544a150
TG
243 The first entry was rumored to be the executable itself, but this is not
244 true when a large number of shared libraries are used (table expanded ?).
245 We now check all entries, but discard executable images. */
ec95993c 246 for (i = 0; i < info->all_image.count; i++)
cf1061c0 247 {
ec95993c 248 CORE_ADDR iinfo = info->all_image.info + i * image_info_size;
e362b510 249 gdb_byte buf[image_info_size];
cf1061c0
TG
250 CORE_ADDR load_addr;
251 CORE_ADDR path_addr;
8544a150
TG
252 struct mach_o_header_external hdr;
253 unsigned long hdr_val;
cf1061c0
TG
254
255 /* Read image info from inferior. */
ec95993c 256 if (target_read_memory (iinfo, buf, image_info_size))
cf1061c0
TG
257 break;
258
259 load_addr = extract_typed_address (buf, ptr_type);
260 path_addr = extract_typed_address (buf + ptr_len, ptr_type);
261
8544a150 262 /* Read Mach-O header from memory. */
948f8e3d 263 if (target_read_memory (load_addr, (gdb_byte *) &hdr, sizeof (hdr) - 4))
8544a150
TG
264 break;
265 /* Discard wrong magic numbers. Shouldn't happen. */
266 hdr_val = extract_unsigned_integer
267 (hdr.magic, sizeof (hdr.magic), byte_order);
268 if (hdr_val != BFD_MACH_O_MH_MAGIC && hdr_val != BFD_MACH_O_MH_MAGIC_64)
269 continue;
270 /* Discard executable. Should happen only once. */
271 hdr_val = extract_unsigned_integer
272 (hdr.filetype, sizeof (hdr.filetype), byte_order);
273 if (hdr_val == BFD_MACH_O_MH_EXECUTE)
274 continue;
275
66920317
TT
276 gdb::unique_xmalloc_ptr<char> file_path
277 = target_read_string (path_addr, SO_NAME_MAX_PATH_SIZE - 1);
278 if (file_path == nullptr)
cf1061c0
TG
279 break;
280
281 /* Create and fill the new so_list element. */
668eb2f0 282 gdb::unique_xmalloc_ptr<struct so_list> newobj (XCNEW (struct so_list));
cf1061c0 283
9ccbfd7b 284 lm_info_darwin *li = new lm_info_darwin;
d0e449a1 285 newobj->lm_info = li;
cf1061c0 286
e83e4e24 287 strncpy (newobj->so_name, file_path.get (), SO_NAME_MAX_PATH_SIZE - 1);
fe978cb0
PA
288 newobj->so_name[SO_NAME_MAX_PATH_SIZE - 1] = '\0';
289 strcpy (newobj->so_original_name, newobj->so_name);
d0e449a1 290 li->lm_addr = load_addr;
cf1061c0
TG
291
292 if (head == NULL)
668eb2f0 293 head = newobj.get ();
cf1061c0 294 else
668eb2f0
TT
295 tail->next = newobj.get ();
296 tail = newobj.release ();
cf1061c0
TG
297 }
298
299 return head;
300}
301
ad2073b0
TG
302/* Check LOAD_ADDR points to a Mach-O executable header. Return LOAD_ADDR
303 in case of success, 0 in case of failure. */
4141a416
JB
304
305static CORE_ADDR
ad2073b0
TG
306darwin_validate_exec_header (CORE_ADDR load_addr)
307{
308 enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch ());
309 struct mach_o_header_external hdr;
310 unsigned long hdr_val;
311
312 /* Read Mach-O header from memory. */
313 if (target_read_memory (load_addr, (gdb_byte *) &hdr, sizeof (hdr) - 4))
314 return 0;
315
316 /* Discard wrong magic numbers. Shouldn't happen. */
317 hdr_val = extract_unsigned_integer
318 (hdr.magic, sizeof (hdr.magic), byte_order);
319 if (hdr_val != BFD_MACH_O_MH_MAGIC && hdr_val != BFD_MACH_O_MH_MAGIC_64)
320 return 0;
321
322 /* Check executable. */
323 hdr_val = extract_unsigned_integer
324 (hdr.filetype, sizeof (hdr.filetype), byte_order);
325 if (hdr_val == BFD_MACH_O_MH_EXECUTE)
326 return load_addr;
327
328 return 0;
329}
330
331/* Get the load address of the executable using dyld list of images.
332 We assume that the dyld info are correct (which is wrong if the target
333 is stopped at the first instruction). */
334
335static CORE_ADDR
336darwin_read_exec_load_addr_from_dyld (struct darwin_info *info)
4141a416
JB
337{
338 struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
4141a416
JB
339 int ptr_len = TYPE_LENGTH (ptr_type);
340 unsigned int image_info_size = ptr_len * 3;
341 int i;
342
343 /* Read infos for each solib. One of them should be the executable. */
344 for (i = 0; i < info->all_image.count; i++)
345 {
346 CORE_ADDR iinfo = info->all_image.info + i * image_info_size;
e362b510 347 gdb_byte buf[image_info_size];
4141a416 348 CORE_ADDR load_addr;
4141a416
JB
349
350 /* Read image info from inferior. */
351 if (target_read_memory (iinfo, buf, image_info_size))
352 break;
353
354 load_addr = extract_typed_address (buf, ptr_type);
ad2073b0 355 if (darwin_validate_exec_header (load_addr) == load_addr)
4141a416
JB
356 return load_addr;
357 }
358
359 return 0;
360}
361
ad2073b0
TG
362/* Get the load address of the executable when the PC is at the dyld
363 entry point using parameter passed by the kernel (at SP). */
364
365static CORE_ADDR
366darwin_read_exec_load_addr_at_init (struct darwin_info *info)
367{
368 struct gdbarch *gdbarch = target_gdbarch ();
369 enum bfd_endian byte_order = gdbarch_byte_order (gdbarch);
370 int addr_size = gdbarch_addr_bit (gdbarch) / 8;
371 ULONGEST load_ptr_addr;
372 ULONGEST load_addr;
373 gdb_byte buf[8];
374
375 /* Get SP. */
376 if (regcache_cooked_read_unsigned (get_current_regcache (),
377 gdbarch_sp_regnum (gdbarch),
378 &load_ptr_addr) != REG_VALID)
379 return 0;
380
381 /* Read value at SP (image load address). */
382 if (target_read_memory (load_ptr_addr, buf, addr_size))
383 return 0;
384
385 load_addr = extract_unsigned_integer (buf, addr_size, byte_order);
386
387 return darwin_validate_exec_header (load_addr);
388}
389
cf1061c0
TG
390/* Return 1 if PC lies in the dynamic symbol resolution code of the
391 run time loader. */
066d7383 392
693be288 393static int
cf1061c0
TG
394darwin_in_dynsym_resolve_code (CORE_ADDR pc)
395{
396 return 0;
397}
398
0cd61f44
TT
399/* A wrapper for bfd_mach_o_fat_extract that handles reference
400 counting properly. This will either return NULL, or return a new
401 reference to a BFD. */
402
192b62ce 403static gdb_bfd_ref_ptr
0cd61f44
TT
404gdb_bfd_mach_o_fat_extract (bfd *abfd, bfd_format format,
405 const bfd_arch_info_type *arch)
406{
407 bfd *result = bfd_mach_o_fat_extract (abfd, format, arch);
408
409 if (result == NULL)
410 return NULL;
411
412 if (result == abfd)
413 gdb_bfd_ref (result);
414 else
415 gdb_bfd_mark_parent (result, abfd);
416
192b62ce 417 return gdb_bfd_ref_ptr (result);
0cd61f44
TT
418}
419
79b32f4a 420/* Return the BFD for the program interpreter. */
066d7383 421
79b32f4a
XR
422static gdb_bfd_ref_ptr
423darwin_get_dyld_bfd ()
cf1061c0 424{
001f13d8 425 char *interp_name;
f00c55f8
TG
426
427 /* This method doesn't work with an attached process. */
428 if (current_inferior ()->attach_flag)
79b32f4a 429 return NULL;
cf1061c0 430
cf1061c0
TG
431 /* Find the program interpreter. */
432 interp_name = find_program_interpreter ();
433 if (!interp_name)
79b32f4a 434 return NULL;
cf1061c0
TG
435
436 /* Create a bfd for the interpreter. */
ad80db5b 437 gdb_bfd_ref_ptr dyld_bfd (gdb_bfd_open (interp_name, gnutarget));
192b62ce 438 if (dyld_bfd != NULL)
cf1061c0 439 {
192b62ce
TT
440 gdb_bfd_ref_ptr sub
441 (gdb_bfd_mach_o_fat_extract (dyld_bfd.get (), bfd_object,
442 gdbarch_bfd_arch_info (target_gdbarch ())));
cd5a152c 443 dyld_bfd = sub;
d6ad71ba 444 }
79b32f4a
XR
445 return dyld_bfd;
446}
447
448/* Extract dyld_all_image_addr when the process was just created, assuming the
449 current PC is at the entry of the dynamic linker. */
450
451static void
452darwin_solib_get_all_image_info_addr_at_init (struct darwin_info *info)
453{
454 CORE_ADDR load_addr = 0;
455 gdb_bfd_ref_ptr dyld_bfd = darwin_get_dyld_bfd ();
456
192b62ce
TT
457 if (dyld_bfd == NULL)
458 return;
70d4c673 459
f00c55f8
TG
460 /* We find the dynamic linker's base address by examining
461 the current pc (which should point at the entry point for the
462 dynamic linker) and subtracting the offset of the entry point. */
463 load_addr = (regcache_read_pc (get_current_regcache ())
192b62ce 464 - bfd_get_start_address (dyld_bfd.get ()));
cf1061c0
TG
465
466 /* Now try to set a breakpoint in the dynamic linker. */
ec95993c 467 info->all_image_addr =
192b62ce 468 lookup_symbol_from_bfd (dyld_bfd.get (), "_dyld_all_image_infos");
cf1061c0 469
ec95993c 470 if (info->all_image_addr == 0)
cf1061c0
TG
471 return;
472
ec95993c 473 info->all_image_addr += load_addr;
f00c55f8
TG
474}
475
ad2073b0 476/* Extract dyld_all_image_addr reading it from
f00c55f8
TG
477 TARGET_OBJECT_DARWIN_DYLD_INFO. */
478
479static void
ec95993c 480darwin_solib_read_all_image_info_addr (struct darwin_info *info)
f00c55f8 481{
ad2073b0 482 gdb_byte buf[8];
f00c55f8 483 LONGEST len;
ad2073b0
TG
484 struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
485
486 /* Sanity check. */
132874d7 487 if (TYPE_LENGTH (ptr_type) > sizeof (buf))
ad2073b0 488 return;
f00c55f8 489
8b88a78e
PA
490 len = target_read (current_top_target (), TARGET_OBJECT_DARWIN_DYLD_INFO,
491 NULL, buf, 0, TYPE_LENGTH (ptr_type));
ad2073b0 492 if (len <= 0)
f00c55f8
TG
493 return;
494
ad2073b0
TG
495 /* The use of BIG endian is intended, as BUF is a raw stream of bytes. This
496 makes the support of remote protocol easier. */
497 info->all_image_addr = extract_unsigned_integer (buf, len, BFD_ENDIAN_BIG);
f00c55f8
TG
498}
499
500/* Shared library startup support. See documentation in solib-svr4.c. */
501
502static void
503darwin_solib_create_inferior_hook (int from_tty)
504{
ec95993c 505 struct darwin_info *info = get_darwin_info ();
4141a416 506 CORE_ADDR load_addr;
ec95993c
TG
507
508 info->all_image_addr = 0;
f00c55f8 509
ec95993c 510 darwin_solib_read_all_image_info_addr (info);
f00c55f8 511
ec95993c
TG
512 if (info->all_image_addr == 0)
513 darwin_solib_get_all_image_info_addr_at_init (info);
f00c55f8 514
ec95993c 515 if (info->all_image_addr == 0)
f00c55f8 516 return;
cf1061c0 517
ec95993c 518 darwin_load_image_infos (info);
cf1061c0 519
4141a416 520 if (!darwin_dyld_version_ok (info))
d4ccb5e0
TG
521 {
522 warning (_("unhandled dyld version (%d)"), info->all_image.version);
523 return;
524 }
4141a416 525
ad2073b0
TG
526 if (info->all_image.count != 0)
527 {
528 /* Possible relocate the main executable (PIE). */
529 load_addr = darwin_read_exec_load_addr_from_dyld (info);
530 }
531 else
532 {
533 /* Possible issue:
534 Do not break on the notifier if dyld is not initialized (deduced from
535 count == 0). In that case, dyld hasn't relocated itself and the
536 notifier may point to a wrong address. */
537
538 load_addr = darwin_read_exec_load_addr_at_init (info);
539 }
540
4141a416
JB
541 if (load_addr != 0 && symfile_objfile != NULL)
542 {
1bdad2e0 543 CORE_ADDR vmaddr;
4141a416
JB
544
545 /* Find the base address of the executable. */
1bdad2e0 546 vmaddr = bfd_mach_o_get_base_address (exec_bfd);
4141a416
JB
547
548 /* Relocate. */
549 if (vmaddr != load_addr)
550 objfile_rebase (symfile_objfile, load_addr - vmaddr);
551 }
79b32f4a
XR
552
553 /* Set solib notifier (to reload list of shared libraries). */
554 CORE_ADDR notifier = info->all_image.notifier;
555
556 if (info->all_image.count == 0)
557 {
558 /* Dyld hasn't yet relocated itself, so the notifier address may
559 be incorrect (as it has to be relocated). */
560 CORE_ADDR start = bfd_get_start_address (exec_bfd);
561 if (start == 0)
562 notifier = 0;
563 else
564 {
565 gdb_bfd_ref_ptr dyld_bfd = darwin_get_dyld_bfd ();
566 if (dyld_bfd != NULL)
567 {
568 CORE_ADDR dyld_bfd_start_address;
569 CORE_ADDR dyld_relocated_base_address;
570 CORE_ADDR pc;
571
572 dyld_bfd_start_address = bfd_get_start_address (dyld_bfd.get());
573
574 /* We find the dynamic linker's base address by examining
575 the current pc (which should point at the entry point
576 for the dynamic linker) and subtracting the offset of
577 the entry point. */
578
579 pc = regcache_read_pc (get_current_regcache ());
580 dyld_relocated_base_address = pc - dyld_bfd_start_address;
581
582 /* We get the proper notifier relocated address by
583 adding the dyld relocated base address to the current
584 notifier offset value. */
585
586 notifier += dyld_relocated_base_address;
587 }
588 }
589 }
590
591 /* Add the breakpoint which is hit by dyld when the list of solib is
592 modified. */
593 if (notifier != 0)
594 create_solib_event_breakpoint (target_gdbarch (), notifier);
cf1061c0
TG
595}
596
597static void
598darwin_clear_solib (void)
599{
ec95993c
TG
600 struct darwin_info *info = get_darwin_info ();
601
602 info->all_image_addr = 0;
603 info->all_image.version = 0;
cf1061c0
TG
604}
605
606static void
607darwin_free_so (struct so_list *so)
608{
9ccbfd7b
SM
609 lm_info_darwin *li = (lm_info_darwin *) so->lm_info;
610
611 delete li;
cf1061c0
TG
612}
613
614/* The section table is built from bfd sections using bfd VMAs.
615 Relocate these VMAs according to solib info. */
066d7383 616
cf1061c0
TG
617static void
618darwin_relocate_section_addresses (struct so_list *so,
0542c86d 619 struct target_section *sec)
cf1061c0 620{
d0e449a1
SM
621 lm_info_darwin *li = (lm_info_darwin *) so->lm_info;
622
623 sec->addr += li->lm_addr;
624 sec->endaddr += li->lm_addr;
cf1061c0
TG
625
626 /* Best effort to set addr_high/addr_low. This is used only by
627 'info sharedlibary'. */
628 if (so->addr_high == 0)
629 {
630 so->addr_low = sec->addr;
631 so->addr_high = sec->endaddr;
632 }
633 if (sec->endaddr > so->addr_high)
634 so->addr_high = sec->endaddr;
635 if (sec->addr < so->addr_low)
636 so->addr_low = sec->addr;
637}
638\f
192b62ce 639static gdb_bfd_ref_ptr
692d6f97 640darwin_bfd_open (const char *pathname)
cf1061c0 641{
cf1061c0 642 int found_file;
cf1061c0
TG
643
644 /* Search for shared library file. */
797bc1cb
TT
645 gdb::unique_xmalloc_ptr<char> found_pathname
646 = solib_find (pathname, &found_file);
cf1061c0
TG
647 if (found_pathname == NULL)
648 perror_with_name (pathname);
649
650 /* Open bfd for shared library. */
797bc1cb 651 gdb_bfd_ref_ptr abfd (solib_bfd_fopen (found_pathname.get (), found_file));
cf1061c0 652
192b62ce
TT
653 gdb_bfd_ref_ptr res
654 (gdb_bfd_mach_o_fat_extract (abfd.get (), bfd_object,
655 gdbarch_bfd_arch_info (target_gdbarch ())));
656 if (res == NULL)
657 error (_("`%s': not a shared-library: %s"),
658 bfd_get_filename (abfd.get ()), bfd_errmsg (bfd_get_error ()));
0cd61f44 659
b030cf11
JB
660 /* The current filename for fat-binary BFDs is a name generated
661 by BFD, usually a string containing the name of the architecture.
662 Reset its value to the actual filename. */
7b958a48 663 bfd_set_filename (res.get (), pathname);
b030cf11 664
cf1061c0
TG
665 return res;
666}
667
668struct target_so_ops darwin_so_ops;
669
6c265988 670void _initialize_darwin_solib ();
cf1061c0 671void
6c265988 672_initialize_darwin_solib ()
cf1061c0
TG
673{
674 darwin_so_ops.relocate_section_addresses = darwin_relocate_section_addresses;
675 darwin_so_ops.free_so = darwin_free_so;
676 darwin_so_ops.clear_solib = darwin_clear_solib;
677 darwin_so_ops.solib_create_inferior_hook = darwin_solib_create_inferior_hook;
cf1061c0
TG
678 darwin_so_ops.current_sos = darwin_current_sos;
679 darwin_so_ops.open_symbol_file_object = open_symbol_file_object;
680 darwin_so_ops.in_dynsym_resolve_code = darwin_in_dynsym_resolve_code;
cf1061c0
TG
681 darwin_so_ops.bfd_open = darwin_bfd_open;
682}