]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blob - gdb/solib-spu.c
GDB copyright headers update after running GDB's copyright.py script.
[thirdparty/binutils-gdb.git] / gdb / solib-spu.c
1 /* Cell SPU GNU/Linux support -- shared library handling.
2 Copyright (C) 2009-2016 Free Software Foundation, Inc.
3
4 Contributed by Ulrich Weigand <uweigand@de.ibm.com>.
5
6 This file is part of GDB.
7
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
12
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>. */
20
21 #include "defs.h"
22 #include "solib-spu.h"
23 #include "gdbcore.h"
24 #include <sys/stat.h>
25 #include "arch-utils.h"
26 #include "bfd.h"
27 #include "symtab.h"
28 #include "solib.h"
29 #include "solib-svr4.h"
30 #include "solist.h"
31 #include "inferior.h"
32 #include "objfiles.h"
33 #include "observer.h"
34 #include "breakpoint.h"
35 #include "gdbthread.h"
36 #include "gdb_bfd.h"
37
38 #include "spu-tdep.h"
39
40 /* Highest SPE id (file handle) the inferior may have. */
41 #define MAX_SPE_FD 1024
42
43 /* Stand-alone SPE executable? */
44 #define spu_standalone_p() \
45 (symfile_objfile && symfile_objfile->obfd \
46 && bfd_get_arch (symfile_objfile->obfd) == bfd_arch_spu)
47
48
49 /* Relocate main SPE executable. */
50 static void
51 spu_relocate_main_executable (int spufs_fd)
52 {
53 struct section_offsets *new_offsets;
54 int i;
55
56 if (symfile_objfile == NULL)
57 return;
58
59 new_offsets = XALLOCAVEC (struct section_offsets,
60 symfile_objfile->num_sections);
61
62 for (i = 0; i < symfile_objfile->num_sections; i++)
63 new_offsets->offsets[i] = SPUADDR (spufs_fd, 0);
64
65 objfile_relocate (symfile_objfile, new_offsets);
66 }
67
68 /* When running a stand-alone SPE executable, we may need to skip one more
69 exec event on startup, to get past the binfmt_misc loader. */
70 static void
71 spu_skip_standalone_loader (void)
72 {
73 if (target_has_execution && !current_inferior ()->attach_flag)
74 {
75 struct target_waitstatus ws;
76
77 /* Only some kernels report an extra SIGTRAP with the binfmt_misc
78 loader; others do not. In addition, if we have attached to an
79 already running inferior instead of starting a new one, we will
80 not see the extra SIGTRAP -- and we cannot readily distinguish
81 the two cases, in particular with the extended-remote target.
82
83 Thus we issue a single-step here. If no extra SIGTRAP was pending,
84 this will step past the first instruction of the stand-alone SPE
85 executable loader, but we don't care about that. */
86
87 inferior_thread ()->control.in_infcall = 1; /* Suppress MI messages. */
88
89 target_resume (inferior_ptid, 1, GDB_SIGNAL_0);
90 target_wait (minus_one_ptid, &ws, 0);
91 set_executing (minus_one_ptid, 0);
92
93 inferior_thread ()->control.in_infcall = 0;
94 }
95 }
96
97 static const struct objfile_data *ocl_program_data_key;
98
99 /* Appends OpenCL programs to the list of `struct so_list' objects. */
100 static void
101 append_ocl_sos (struct so_list **link_ptr)
102 {
103 CORE_ADDR *ocl_program_addr_base;
104 struct objfile *objfile;
105
106 ALL_OBJFILES (objfile)
107 {
108 ocl_program_addr_base
109 = (CORE_ADDR *) objfile_data (objfile, ocl_program_data_key);
110 if (ocl_program_addr_base != NULL)
111 {
112 enum bfd_endian byte_order = bfd_big_endian (objfile->obfd)?
113 BFD_ENDIAN_BIG : BFD_ENDIAN_LITTLE;
114 TRY
115 {
116 CORE_ADDR data =
117 read_memory_unsigned_integer (*ocl_program_addr_base,
118 sizeof (CORE_ADDR),
119 byte_order);
120 if (data != 0x0)
121 {
122 struct so_list *newobj;
123
124 /* Allocate so_list structure. */
125 newobj = XCNEW (struct so_list);
126
127 /* Encode FD and object ID in path name. */
128 xsnprintf (newobj->so_name, sizeof newobj->so_name, "@%s <%d>",
129 hex_string (data),
130 SPUADDR_SPU (*ocl_program_addr_base));
131 strcpy (newobj->so_original_name, newobj->so_name);
132
133 *link_ptr = newobj;
134 link_ptr = &newobj->next;
135 }
136 }
137 CATCH (ex, RETURN_MASK_ALL)
138 {
139 /* Ignore memory errors. */
140 switch (ex.error)
141 {
142 case MEMORY_ERROR:
143 break;
144 default:
145 throw_exception (ex);
146 break;
147 }
148 }
149 END_CATCH
150 }
151 }
152 }
153
154 /* Build a list of `struct so_list' objects describing the shared
155 objects currently loaded in the inferior. */
156 static struct so_list *
157 spu_current_sos (void)
158 {
159 enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch ());
160 struct so_list *head;
161 struct so_list **link_ptr;
162
163 gdb_byte buf[MAX_SPE_FD * 4];
164 int i, size;
165
166 /* First, retrieve the SVR4 shared library list. */
167 head = svr4_so_ops.current_sos ();
168
169 /* Append our libraries to the end of the list. */
170 for (link_ptr = &head; *link_ptr; link_ptr = &(*link_ptr)->next)
171 ;
172
173 /* Determine list of SPU ids. */
174 size = target_read (&current_target, TARGET_OBJECT_SPU, NULL,
175 buf, 0, sizeof buf);
176
177 /* Do not add stand-alone SPE executable context as shared library,
178 but relocate main SPE executable objfile. */
179 if (spu_standalone_p ())
180 {
181 if (size == 4)
182 {
183 int fd = extract_unsigned_integer (buf, 4, byte_order);
184
185 spu_relocate_main_executable (fd);
186
187 /* Re-enable breakpoints after main SPU context was established;
188 see also comments in spu_solib_create_inferior_hook. */
189 enable_breakpoints_after_startup ();
190 }
191
192 return head;
193 }
194
195 /* Create an so_list entry for each SPU id. */
196 for (i = 0; i < size; i += 4)
197 {
198 int fd = extract_unsigned_integer (buf + i, 4, byte_order);
199 struct so_list *newobj;
200
201 unsigned long long addr;
202 char annex[32], id[100];
203 int len;
204
205 /* Read object ID. There's a race window where the inferior may have
206 already created the SPE context, but not installed the object-id
207 yet. Skip such entries; we'll be back for them later. */
208 xsnprintf (annex, sizeof annex, "%d/object-id", fd);
209 len = target_read (&current_target, TARGET_OBJECT_SPU, annex,
210 (gdb_byte *) id, 0, sizeof id);
211 if (len <= 0 || len >= sizeof id)
212 continue;
213 id[len] = 0;
214 if (sscanf (id, "0x%llx", &addr) != 1 || !addr)
215 continue;
216
217 /* Allocate so_list structure. */
218 newobj = XCNEW (struct so_list);
219
220 /* Encode FD and object ID in path name. Choose the name so as not
221 to conflict with any (normal) SVR4 library path name. */
222 xsnprintf (newobj->so_name, sizeof newobj->so_name, "@%s <%d>",
223 hex_string (addr), fd);
224 strcpy (newobj->so_original_name, newobj->so_name);
225
226 *link_ptr = newobj;
227 link_ptr = &newobj->next;
228 }
229
230 /* Append OpenCL sos. */
231 append_ocl_sos (link_ptr);
232
233 return head;
234 }
235
236 /* Free so_list information. */
237 static void
238 spu_free_so (struct so_list *so)
239 {
240 if (so->so_original_name[0] != '@')
241 svr4_so_ops.free_so (so);
242 }
243
244 /* Relocate section addresses. */
245 static void
246 spu_relocate_section_addresses (struct so_list *so,
247 struct target_section *sec)
248 {
249 if (so->so_original_name[0] != '@')
250 svr4_so_ops.relocate_section_addresses (so, sec);
251 else
252 {
253 unsigned long long addr;
254 int fd;
255
256 /* Set addr_low/high to just LS offset for display. */
257 if (so->addr_low == 0 && so->addr_high == 0
258 && strcmp (sec->the_bfd_section->name, ".text") == 0)
259 {
260 so->addr_low = sec->addr;
261 so->addr_high = sec->endaddr;
262 }
263
264 /* Decode object ID. */
265 if (sscanf (so->so_original_name, "@0x%llx <%d>", &addr, &fd) != 2)
266 internal_error (__FILE__, __LINE__, "bad object ID");
267
268 sec->addr = SPUADDR (fd, sec->addr);
269 sec->endaddr = SPUADDR (fd, sec->endaddr);
270 }
271 }
272
273
274 /* Inferior memory should contain an SPE executable image at location ADDR.
275 Allocate a BFD representing that executable. Return NULL on error. */
276
277 static void *
278 spu_bfd_iovec_open (bfd *nbfd, void *open_closure)
279 {
280 return open_closure;
281 }
282
283 static int
284 spu_bfd_iovec_close (bfd *nbfd, void *stream)
285 {
286 xfree (stream);
287
288 /* Zero means success. */
289 return 0;
290 }
291
292 static file_ptr
293 spu_bfd_iovec_pread (bfd *abfd, void *stream, void *buf,
294 file_ptr nbytes, file_ptr offset)
295 {
296 CORE_ADDR addr = *(CORE_ADDR *)stream;
297 int ret;
298
299 ret = target_read_memory (addr + offset, (gdb_byte *) buf, nbytes);
300 if (ret != 0)
301 {
302 bfd_set_error (bfd_error_invalid_operation);
303 return -1;
304 }
305
306 return nbytes;
307 }
308
309 static int
310 spu_bfd_iovec_stat (bfd *abfd, void *stream, struct stat *sb)
311 {
312 /* We don't have an easy way of finding the size of embedded spu
313 images. We could parse the in-memory ELF header and section
314 table to find the extent of the last section but that seems
315 pointless when the size is needed only for checks of other
316 parsed values in dbxread.c. */
317 memset (sb, 0, sizeof (struct stat));
318 sb->st_size = INT_MAX;
319 return 0;
320 }
321
322 static bfd *
323 spu_bfd_fopen (char *name, CORE_ADDR addr)
324 {
325 bfd *nbfd;
326 CORE_ADDR *open_closure = XNEW (CORE_ADDR);
327
328 *open_closure = addr;
329
330 nbfd = gdb_bfd_openr_iovec (name, "elf32-spu",
331 spu_bfd_iovec_open, open_closure,
332 spu_bfd_iovec_pread, spu_bfd_iovec_close,
333 spu_bfd_iovec_stat);
334 if (!nbfd)
335 return NULL;
336
337 if (!bfd_check_format (nbfd, bfd_object))
338 {
339 gdb_bfd_unref (nbfd);
340 return NULL;
341 }
342
343 return nbfd;
344 }
345
346 /* Open shared library BFD. */
347 static bfd *
348 spu_bfd_open (char *pathname)
349 {
350 char *original_name = strrchr (pathname, '@');
351 bfd *abfd;
352 asection *spu_name;
353 unsigned long long addr;
354 int fd;
355
356 /* Handle regular SVR4 libraries. */
357 if (!original_name)
358 return svr4_so_ops.bfd_open (pathname);
359
360 /* Decode object ID. */
361 if (sscanf (original_name, "@0x%llx <%d>", &addr, &fd) != 2)
362 internal_error (__FILE__, __LINE__, "bad object ID");
363
364 /* Open BFD representing SPE executable. */
365 abfd = spu_bfd_fopen (original_name, (CORE_ADDR) addr);
366 if (!abfd)
367 error (_("Cannot read SPE executable at %s"), original_name);
368
369 /* Retrieve SPU name note. */
370 spu_name = bfd_get_section_by_name (abfd, ".note.spu_name");
371 if (spu_name)
372 {
373 int sect_size = bfd_section_size (abfd, spu_name);
374
375 if (sect_size > 20)
376 {
377 char *buf
378 = (char *) alloca (sect_size - 20 + strlen (original_name) + 1);
379
380 bfd_get_section_contents (abfd, spu_name, buf, 20, sect_size - 20);
381 buf[sect_size - 20] = '\0';
382
383 strcat (buf, original_name);
384
385 xfree ((char *)abfd->filename);
386 abfd->filename = xstrdup (buf);
387 }
388 }
389
390 return abfd;
391 }
392
393 /* Lookup global symbol in a SPE executable. */
394 static struct block_symbol
395 spu_lookup_lib_symbol (struct objfile *objfile,
396 const char *name,
397 const domain_enum domain)
398 {
399 if (bfd_get_arch (objfile->obfd) == bfd_arch_spu)
400 return lookup_global_symbol_from_objfile (objfile, name, domain);
401
402 if (svr4_so_ops.lookup_lib_global_symbol != NULL)
403 return svr4_so_ops.lookup_lib_global_symbol (objfile, name, domain);
404 return (struct block_symbol) {NULL, NULL};
405 }
406
407 /* Enable shared library breakpoint. */
408 static int
409 spu_enable_break (struct objfile *objfile)
410 {
411 struct bound_minimal_symbol spe_event_sym;
412
413 /* The libspe library will call __spe_context_update_event whenever any
414 SPE context is allocated or destroyed. */
415 spe_event_sym = lookup_minimal_symbol ("__spe_context_update_event",
416 NULL, objfile);
417
418 /* Place a solib_event breakpoint on the symbol. */
419 if (spe_event_sym.minsym)
420 {
421 CORE_ADDR addr = BMSYMBOL_VALUE_ADDRESS (spe_event_sym);
422
423 addr = gdbarch_convert_from_func_ptr_addr (target_gdbarch (), addr,
424 &current_target);
425 create_solib_event_breakpoint (target_gdbarch (), addr);
426 return 1;
427 }
428
429 return 0;
430 }
431
432 /* Enable shared library breakpoint for the
433 OpenCL runtime running on the SPU. */
434 static void
435 ocl_enable_break (struct objfile *objfile)
436 {
437 struct bound_minimal_symbol event_sym;
438 struct bound_minimal_symbol addr_sym;
439
440 /* The OpenCL runtime on the SPU will call __opencl_program_update_event
441 whenever an OpenCL program is loaded. */
442 event_sym = lookup_minimal_symbol ("__opencl_program_update_event", NULL,
443 objfile);
444 /* The PPU address of the OpenCL program can be found
445 at opencl_elf_image_address. */
446 addr_sym = lookup_minimal_symbol ("opencl_elf_image_address", NULL, objfile);
447
448 if (event_sym.minsym && addr_sym.minsym)
449 {
450 /* Place a solib_event breakpoint on the symbol. */
451 CORE_ADDR event_addr = BMSYMBOL_VALUE_ADDRESS (event_sym);
452 create_solib_event_breakpoint (get_objfile_arch (objfile), event_addr);
453
454 /* Store the address of the symbol that will point to OpenCL program
455 using the per-objfile private data mechanism. */
456 if (objfile_data (objfile, ocl_program_data_key) == NULL)
457 {
458 CORE_ADDR *ocl_program_addr_base = OBSTACK_CALLOC (
459 &objfile->objfile_obstack,
460 objfile->sections_end - objfile->sections,
461 CORE_ADDR);
462 *ocl_program_addr_base = BMSYMBOL_VALUE_ADDRESS (addr_sym);
463 set_objfile_data (objfile, ocl_program_data_key,
464 ocl_program_addr_base);
465 }
466 }
467 }
468
469 /* Create inferior hook. */
470 static void
471 spu_solib_create_inferior_hook (int from_tty)
472 {
473 /* Handle SPE stand-alone executables. */
474 if (spu_standalone_p ())
475 {
476 /* After an SPE stand-alone executable was loaded, we'll receive
477 an additional trap due to the binfmt_misc handler. Make sure
478 to skip that trap. */
479 spu_skip_standalone_loader ();
480
481 /* If the user established breakpoints before starting the inferior, GDB
482 would attempt to insert those now. This would fail because the SPU
483 context has not yet been created and the SPU executable has not yet
484 been loaded. To prevent such failures, we disable all user-created
485 breakpoints now; they will be re-enabled in spu_current_sos once the
486 main SPU context has been detected. */
487 disable_breakpoints_before_startup ();
488
489 /* A special case arises when re-starting an executable, because at
490 this point it still resides at the relocated address range that was
491 determined during its last execution. We need to undo the relocation
492 so that that multi-architecture target recognizes the stand-alone
493 initialization special case. */
494 spu_relocate_main_executable (-1);
495 }
496
497 /* Call SVR4 hook -- this will re-insert the SVR4 solib breakpoints. */
498 svr4_so_ops.solib_create_inferior_hook (from_tty);
499
500 /* If the inferior is statically linked against libspe, we need to install
501 our own solib breakpoint right now. Otherwise, it will be installed by
502 the solib_loaded observer below as soon as libspe is loaded. */
503 spu_enable_break (NULL);
504 }
505
506 /* Install SPE "shared library" handling. This is called by -tdep code
507 that wants to support SPU as a secondary architecture. */
508 void
509 set_spu_solib_ops (struct gdbarch *gdbarch)
510 {
511 static struct target_so_ops spu_so_ops;
512
513 /* Initialize this lazily, to avoid an initialization order
514 dependency on solib-svr4.c's _initialize routine. */
515 if (spu_so_ops.current_sos == NULL)
516 {
517 spu_so_ops = svr4_so_ops;
518 spu_so_ops.solib_create_inferior_hook = spu_solib_create_inferior_hook;
519 spu_so_ops.relocate_section_addresses = spu_relocate_section_addresses;
520 spu_so_ops.free_so = spu_free_so;
521 spu_so_ops.current_sos = spu_current_sos;
522 spu_so_ops.bfd_open = spu_bfd_open;
523 spu_so_ops.lookup_lib_global_symbol = spu_lookup_lib_symbol;
524 }
525
526 set_solib_ops (gdbarch, &spu_so_ops);
527 }
528
529 /* Observer for the solib_loaded event. Used to install our breakpoint
530 if libspe is a shared library. */
531 static void
532 spu_solib_loaded (struct so_list *so)
533 {
534 if (strstr (so->so_original_name, "/libspe") != NULL)
535 {
536 solib_read_symbols (so, 0);
537 spu_enable_break (so->objfile);
538 }
539 /* In case the OpenCL runtime is loaded we install a breakpoint
540 to get notified whenever an OpenCL program gets loaded. */
541 if (strstr (so->so_name, "CLRuntimeAccelCellSPU@") != NULL)
542 {
543 solib_read_symbols (so, 0);
544 ocl_enable_break (so->objfile);
545 }
546 }
547
548 /* -Wmissing-prototypes */
549 extern initialize_file_ftype _initialize_spu_solib;
550
551 void
552 _initialize_spu_solib (void)
553 {
554 observer_attach_solib_loaded (spu_solib_loaded);
555 ocl_program_data_key = register_objfile_data ();
556 }
557