]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/sparc64-linux-tdep.c
gdb: remove extract_long_unsigned_integer
[thirdparty/binutils-gdb.git] / gdb / sparc64-linux-tdep.c
CommitLineData
386c036b
MK
1/* Target-dependent code for GNU/Linux UltraSPARC.
2
1d506c26 3 Copyright (C) 2003-2024 Free Software Foundation, Inc.
386c036b
MK
4
5 This file is part of GDB.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
386c036b
MK
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
386c036b 19
78a0fd57
DM
20#include "frame.h"
21#include "frame-unwind.h"
82ca8957 22#include "dwarf2/frame.h"
07c5f590 23#include "regset.h"
0b4294d3 24#include "regcache.h"
386c036b 25#include "gdbarch.h"
0b4294d3 26#include "gdbcore.h"
386c036b 27#include "osabi.h"
b2756930 28#include "solib-svr4.h"
78a0fd57
DM
29#include "symtab.h"
30#include "trad-frame.h"
70f1dc74 31#include "tramp-frame.h"
09de9781 32#include "xml-syscall.h"
a5ee0f0c 33#include "linux-tdep.h"
09de9781 34
58afddc6
WP
35/* ADI specific si_code */
36#ifndef SEGV_ACCADI
37#define SEGV_ACCADI 3
38#endif
39#ifndef SEGV_ADIDERR
40#define SEGV_ADIDERR 4
41#endif
42#ifndef SEGV_ADIPERR
43#define SEGV_ADIPERR 5
44#endif
45
09de9781
DM
46/* The syscall's XML filename for sparc 64-bit. */
47#define XML_SYSCALL_FILENAME_SPARC64 "syscalls/sparc64-linux.xml"
78a0fd57 48
386c036b
MK
49#include "sparc64-tdep.h"
50
70f1dc74 51/* Signal trampoline support. */
78a0fd57 52
81f726ab 53static void sparc64_linux_sigframe_init (const struct tramp_frame *self,
8480a37e 54 const frame_info_ptr &this_frame,
81f726ab
DM
55 struct trad_frame_cache *this_cache,
56 CORE_ADDR func);
78a0fd57 57
70f1dc74
MK
58/* See sparc-linux-tdep.c for details. Note that 64-bit binaries only
59 use RT signals. */
60
61static const struct tramp_frame sparc64_linux_rt_sigframe =
62{
81f726ab
DM
63 SIGTRAMP_FRAME,
64 4,
65 {
7bc02706
TT
66 { 0x82102065, ULONGEST_MAX }, /* mov __NR_rt_sigreturn, %g1 */
67 { 0x91d0206d, ULONGEST_MAX }, /* ta 0x6d */
68 { TRAMP_SENTINEL_INSN, ULONGEST_MAX }
81f726ab
DM
69 },
70 sparc64_linux_sigframe_init
71};
78a0fd57 72
81f726ab
DM
73static void
74sparc64_linux_sigframe_init (const struct tramp_frame *self,
8480a37e 75 const frame_info_ptr &this_frame,
81f726ab
DM
76 struct trad_frame_cache *this_cache,
77 CORE_ADDR func)
78a0fd57 78{
80f9e3aa 79 CORE_ADDR base, addr, sp_addr;
78a0fd57
DM
80 int regnum;
81
5366653e 82 base = get_frame_register_unsigned (this_frame, SPARC_O1_REGNUM);
81f726ab 83 base += 128;
78a0fd57 84
70f1dc74 85 /* Offsets from <bits/sigcontext.h>. */
78a0fd57
DM
86
87 /* Since %g0 is always zero, keep the identity encoding. */
70f1dc74 88 addr = base + 8;
80f9e3aa 89 sp_addr = base + ((SPARC_SP_REGNUM - SPARC_G0_REGNUM) * 8);
81f726ab
DM
90 for (regnum = SPARC_G1_REGNUM; regnum <= SPARC_O7_REGNUM; regnum++)
91 {
92 trad_frame_set_reg_addr (this_cache, regnum, addr);
93 addr += 8;
94 }
78a0fd57 95
70f1dc74
MK
96 trad_frame_set_reg_addr (this_cache, SPARC64_STATE_REGNUM, addr + 0);
97 trad_frame_set_reg_addr (this_cache, SPARC64_PC_REGNUM, addr + 8);
98 trad_frame_set_reg_addr (this_cache, SPARC64_NPC_REGNUM, addr + 16);
99 trad_frame_set_reg_addr (this_cache, SPARC64_Y_REGNUM, addr + 24);
100 trad_frame_set_reg_addr (this_cache, SPARC64_FPRS_REGNUM, addr + 28);
78a0fd57 101
5366653e 102 base = get_frame_register_unsigned (this_frame, SPARC_SP_REGNUM);
80f9e3aa
DM
103 if (base & 1)
104 base += BIAS;
105
5366653e 106 addr = get_frame_memory_unsigned (this_frame, sp_addr, 8);
81f726ab
DM
107 if (addr & 1)
108 addr += BIAS;
78a0fd57 109
81f726ab
DM
110 for (regnum = SPARC_L0_REGNUM; regnum <= SPARC_I7_REGNUM; regnum++)
111 {
112 trad_frame_set_reg_addr (this_cache, regnum, addr);
113 addr += 8;
114 }
115 trad_frame_set_id (this_cache, frame_id_build (base, func));
78a0fd57 116}
58afddc6 117
0e42f66a 118/* sparc64 GNU/Linux implementation of the report_signal_info
58afddc6
WP
119 gdbarch hook.
120 Displays information related to ADI memory corruptions. */
121
cb8c24b6 122static void
0e42f66a
JB
123sparc64_linux_report_signal_info (struct gdbarch *gdbarch, struct ui_out *uiout,
124 enum gdb_signal siggnal)
58afddc6 125{
0e42f66a
JB
126 if (gdbarch_bfd_arch_info (gdbarch)->bits_per_word != 64
127 || siggnal != GDB_SIGNAL_SEGV)
58afddc6
WP
128 return;
129
130 CORE_ADDR addr = 0;
131 long si_code = 0;
132
a70b8144 133 try
58afddc6
WP
134 {
135 /* Evaluate si_code to see if the segfault is ADI related. */
136 si_code = parse_and_eval_long ("$_siginfo.si_code\n");
137
138 if (si_code >= SEGV_ACCADI && si_code <= SEGV_ADIPERR)
dda83cd7 139 addr = parse_and_eval_long ("$_siginfo._sifields._sigfault.si_addr");
58afddc6 140 }
b1ffd112 141 catch (const gdb_exception_error &exception)
58afddc6
WP
142 {
143 return;
144 }
58afddc6
WP
145
146 /* Print out ADI event based on sig_code value */
147 switch (si_code)
148 {
149 case SEGV_ACCADI: /* adi not enabled */
150 uiout->text ("\n");
151 uiout->field_string ("sigcode-meaning", _("ADI disabled"));
152 uiout->text (_(" while accessing address "));
ca8d69be 153 uiout->field_core_addr ("bound-access", gdbarch, addr);
58afddc6
WP
154 break;
155 case SEGV_ADIDERR: /* disrupting mismatch */
156 uiout->text ("\n");
157 uiout->field_string ("sigcode-meaning", _("ADI deferred mismatch"));
158 uiout->text (_(" while accessing address "));
ca8d69be 159 uiout->field_core_addr ("bound-access", gdbarch, addr);
58afddc6
WP
160 break;
161 case SEGV_ADIPERR: /* precise mismatch */
162 uiout->text ("\n");
163 uiout->field_string ("sigcode-meaning", _("ADI precise mismatch"));
164 uiout->text (_(" while accessing address "));
ca8d69be 165 uiout->field_core_addr ("bound-access", gdbarch, addr);
58afddc6
WP
166 break;
167 default:
168 break;
169 }
170
171}
172
78a0fd57 173\f
0b4294d3
DM
174/* Return the address of a system call's alternative return
175 address. */
176
177static CORE_ADDR
8480a37e 178sparc64_linux_step_trap (const frame_info_ptr &frame, unsigned long insn)
0b4294d3 179{
401e27fd
JM
180 /* __NR_rt_sigreturn is 101 */
181 if ((insn == 0x91d0206d)
182 && (get_frame_register_unsigned (frame, SPARC_G1_REGNUM) == 101))
0b4294d3 183 {
e17a4113
UW
184 struct gdbarch *gdbarch = get_frame_arch (frame);
185 enum bfd_endian byte_order = gdbarch_byte_order (gdbarch);
186
0b1b3e42 187 ULONGEST sp = get_frame_register_unsigned (frame, SPARC_SP_REGNUM);
0b4294d3
DM
188 if (sp & 1)
189 sp += BIAS;
190
191 /* The kernel puts the sigreturn registers on the stack,
192 and this is where the signal unwinding state is take from
193 when returning from a signal.
194
195 A siginfo_t sits 192 bytes from the base of the stack. This
196 siginfo_t is 128 bytes, and is followed by the sigreturn
197 register save area. The saved PC sits at a 136 byte offset
198 into there. */
199
e17a4113
UW
200 return read_memory_unsigned_integer (sp + 192 + 128 + 136,
201 8, byte_order);
0b4294d3
DM
202 }
203
204 return 0;
205}
206\f
70f1dc74 207
b4fd25c9 208const struct sparc_gregmap sparc64_linux_core_gregmap =
07c5f590
DM
209{
210 32 * 8, /* %tstate */
211 33 * 8, /* %tpc */
212 34 * 8, /* %tnpc */
213 35 * 8, /* %y */
214 -1, /* %wim */
215 -1, /* %tbr */
216 1 * 8, /* %g1 */
217 16 * 8, /* %l0 */
218 8, /* y size */
219};
220\f
221
222static void
223sparc64_linux_supply_core_gregset (const struct regset *regset,
224 struct regcache *regcache,
225 int regnum, const void *gregs, size_t len)
226{
b4fd25c9 227 sparc64_supply_gregset (&sparc64_linux_core_gregmap,
c378eb4e 228 regcache, regnum, gregs);
07c5f590
DM
229}
230
231static void
232sparc64_linux_collect_core_gregset (const struct regset *regset,
233 const struct regcache *regcache,
234 int regnum, void *gregs, size_t len)
235{
b4fd25c9 236 sparc64_collect_gregset (&sparc64_linux_core_gregmap,
c378eb4e 237 regcache, regnum, gregs);
07c5f590
DM
238}
239
240static void
241sparc64_linux_supply_core_fpregset (const struct regset *regset,
242 struct regcache *regcache,
243 int regnum, const void *fpregs, size_t len)
244{
b4fd25c9 245 sparc64_supply_fpregset (&sparc64_bsd_fpregmap, regcache, regnum, fpregs);
07c5f590
DM
246}
247
248static void
249sparc64_linux_collect_core_fpregset (const struct regset *regset,
250 const struct regcache *regcache,
251 int regnum, void *fpregs, size_t len)
252{
b4fd25c9 253 sparc64_collect_fpregset (&sparc64_bsd_fpregmap, regcache, regnum, fpregs);
07c5f590
DM
254}
255
e8467b5a
DM
256/* Set the program counter for process PTID to PC. */
257
258#define TSTATE_SYSCALL 0x0000000000000020ULL
259
260static void
261sparc64_linux_write_pc (struct regcache *regcache, CORE_ADDR pc)
262{
345bd07c 263 gdbarch *arch = regcache->arch ();
08106042 264 sparc_gdbarch_tdep *tdep = gdbarch_tdep<sparc_gdbarch_tdep> (arch);
e8467b5a
DM
265 ULONGEST state;
266
267 regcache_cooked_write_unsigned (regcache, tdep->pc_regnum, pc);
268 regcache_cooked_write_unsigned (regcache, tdep->npc_regnum, pc + 4);
269
270 /* Clear the "in syscall" bit to prevent the kernel from
271 messing with the PCs we just installed, if we happen to be
272 within an interrupted system call that the kernel wants to
273 restart.
274
275 Note that after we return from the dummy call, the TSTATE et al.
276 registers will be automatically restored, and the kernel
277 continues to restart the system call at this point. */
278 regcache_cooked_read_unsigned (regcache, SPARC64_STATE_REGNUM, &state);
279 state &= ~TSTATE_SYSCALL;
280 regcache_cooked_write_unsigned (regcache, SPARC64_STATE_REGNUM, state);
281}
282
09de9781
DM
283static LONGEST
284sparc64_linux_get_syscall_number (struct gdbarch *gdbarch,
00431a78 285 thread_info *thread)
09de9781 286{
00431a78 287 struct regcache *regcache = get_thread_regcache (thread);
09de9781
DM
288 enum bfd_endian byte_order = gdbarch_byte_order (gdbarch);
289 /* The content of a register. */
290 gdb_byte buf[8];
291 /* The result. */
292 LONGEST ret;
293
294 /* Getting the system call number from the register.
295 When dealing with the sparc architecture, this information
296 is stored at the %g1 register. */
dca08e1f 297 regcache->cooked_read (SPARC_G1_REGNUM, buf);
09de9781
DM
298
299 ret = extract_signed_integer (buf, 8, byte_order);
300
301 return ret;
302}
303
d0b5971a
JM
304\f
305/* Implement the "get_longjmp_target" gdbarch method. */
306
307static int
8480a37e 308sparc64_linux_get_longjmp_target (const frame_info_ptr &frame, CORE_ADDR *pc)
d0b5971a
JM
309{
310 struct gdbarch *gdbarch = get_frame_arch (frame);
d0b5971a
JM
311 CORE_ADDR jb_addr;
312 gdb_byte buf[8];
313
314 jb_addr = get_frame_register_unsigned (frame, SPARC_O0_REGNUM);
315
316 /* setjmp and longjmp in SPARC64 are implemented in glibc using the
317 setcontext and getcontext system calls respectively. These
318 system calls operate on ucontext_t structures, which happen to
319 partially have the same structure than jmp_buf. However the
320 ucontext returned by getcontext, and thus the jmp_buf structure
321 returned by setjmp, contains the context of the trap instruction
322 in the glibc __[sig]setjmp wrapper, not the context of the user
323 code calling setjmp.
324
325 %o7 in the jmp_buf structure is stored at offset 18*8 in the
326 mc_gregs array, which is itself located at offset 32 into
327 jmp_buf. See bits/setjmp.h. This register contains the address
328 of the 'call setjmp' instruction in user code.
329
330 In order to determine the longjmp target address in the
331 initiating frame we need to examine the call instruction itself,
332 in particular whether the annul bit is set. If it is not set
333 then we need to jump over the instruction at the delay slot. */
334
335 if (target_read_memory (jb_addr + 32 + (18 * 8), buf, 8))
336 return 0;
337
338 *pc = extract_unsigned_integer (buf, 8, gdbarch_byte_order (gdbarch));
339
340 if (!sparc_is_annulled_branch_insn (*pc))
341 *pc += 4; /* delay slot insn */
342 *pc += 4; /* call insn */
343
344 return 1;
345}
346
07c5f590
DM
347\f
348
b13feb94
AA
349static const struct regset sparc64_linux_gregset =
350 {
351 NULL,
352 sparc64_linux_supply_core_gregset,
353 sparc64_linux_collect_core_gregset
354 };
355
356static const struct regset sparc64_linux_fpregset =
357 {
358 NULL,
359 sparc64_linux_supply_core_fpregset,
360 sparc64_linux_collect_core_fpregset
361 };
362
386c036b
MK
363static void
364sparc64_linux_init_abi (struct gdbarch_info info, struct gdbarch *gdbarch)
365{
08106042 366 sparc_gdbarch_tdep *tdep = gdbarch_tdep<sparc_gdbarch_tdep> (gdbarch);
386c036b 367
480af54c 368 linux_init_abi (info, gdbarch, 0);
a5ee0f0c 369
b13feb94 370 tdep->gregset = &sparc64_linux_gregset;
07c5f590
DM
371 tdep->sizeof_gregset = 288;
372
b13feb94 373 tdep->fpregset = &sparc64_linux_fpregset;
07c5f590
DM
374 tdep->sizeof_fpregset = 280;
375
81f726ab 376 tramp_frame_prepend_unwinder (gdbarch, &sparc64_linux_rt_sigframe);
78a0fd57 377
b2a0b9b2 378 /* Hook in the DWARF CFI frame unwinder. */
87a7da84 379 dwarf2_append_unwinders (gdbarch);
b2a0b9b2 380
20338726
DM
381 sparc64_init_abi (info, gdbarch);
382
a33e488c
MK
383 /* GNU/Linux has SVR4-style shared libraries... */
384 set_gdbarch_skip_trampoline_code (gdbarch, find_solib_trampoline_target);
385 set_solib_svr4_fetch_link_map_offsets
c0154a4a 386 (gdbarch, linux_lp64_fetch_link_map_offsets);
386c036b 387
a33e488c
MK
388 /* ...which means that we need some special handling when doing
389 prologue analysis. */
390 tdep->plt_entry_size = 16;
b2756930
KB
391
392 /* Enable TLS support. */
393 set_gdbarch_fetch_tls_load_module_address (gdbarch,
dda83cd7 394 svr4_fetch_objfile_link_map);
0b4294d3
DM
395
396 /* Make sure we can single-step over signal return system calls. */
397 tdep->step_trap = sparc64_linux_step_trap;
e8467b5a 398
d0b5971a
JM
399 /* Make sure we can single-step over longjmp calls. */
400 set_gdbarch_get_longjmp_target (gdbarch, sparc64_linux_get_longjmp_target);
401
e8467b5a 402 set_gdbarch_write_pc (gdbarch, sparc64_linux_write_pc);
09de9781
DM
403
404 /* Functions for 'catch syscall'. */
458c8db8 405 set_xml_syscall_file_name (gdbarch, XML_SYSCALL_FILENAME_SPARC64);
09de9781 406 set_gdbarch_get_syscall_number (gdbarch,
dda83cd7 407 sparc64_linux_get_syscall_number);
0e42f66a 408 set_gdbarch_report_signal_info (gdbarch, sparc64_linux_report_signal_info);
386c036b 409}
386c036b 410
6c265988 411void _initialize_sparc64_linux_tdep ();
386c036b 412void
6c265988 413_initialize_sparc64_linux_tdep ()
386c036b
MK
414{
415 gdbarch_register_osabi (bfd_arch_sparc, bfd_mach_sparc_v9,
416 GDB_OSABI_LINUX, sparc64_linux_init_abi);
417}