return head;
}
-/* Get the load address of the executable. We assume that the dyld info are
- correct. */
+/* Check LOAD_ADDR points to a Mach-O executable header. Return LOAD_ADDR
+ in case of success, 0 in case of failure. */
static CORE_ADDR
-darwin_read_exec_load_addr (struct darwin_info *info)
+darwin_validate_exec_header (CORE_ADDR load_addr)
+{
+ enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch ());
+ struct mach_o_header_external hdr;
+ unsigned long hdr_val;
+
+ /* Read Mach-O header from memory. */
+ if (target_read_memory (load_addr, (gdb_byte *) &hdr, sizeof (hdr) - 4))
+ return 0;
+
+ /* Discard wrong magic numbers. Shouldn't happen. */
+ hdr_val = extract_unsigned_integer
+ (hdr.magic, sizeof (hdr.magic), byte_order);
+ if (hdr_val != BFD_MACH_O_MH_MAGIC && hdr_val != BFD_MACH_O_MH_MAGIC_64)
+ return 0;
+
+ /* Check executable. */
+ hdr_val = extract_unsigned_integer
+ (hdr.filetype, sizeof (hdr.filetype), byte_order);
+ if (hdr_val == BFD_MACH_O_MH_EXECUTE)
+ return load_addr;
+
+ return 0;
+}
+
+/* Get the load address of the executable using dyld list of images.
+ We assume that the dyld info are correct (which is wrong if the target
+ is stopped at the first instruction). */
+
+static CORE_ADDR
+darwin_read_exec_load_addr_from_dyld (struct darwin_info *info)
{
struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch ());
CORE_ADDR iinfo = info->all_image.info + i * image_info_size;
gdb_byte buf[image_info_size];
CORE_ADDR load_addr;
- struct mach_o_header_external hdr;
- unsigned long hdr_val;
/* Read image info from inferior. */
if (target_read_memory (iinfo, buf, image_info_size))
break;
load_addr = extract_typed_address (buf, ptr_type);
-
- /* Read Mach-O header from memory. */
- if (target_read_memory (load_addr, (gdb_byte *) &hdr, sizeof (hdr) - 4))
- break;
- /* Discard wrong magic numbers. Shouldn't happen. */
- hdr_val = extract_unsigned_integer
- (hdr.magic, sizeof (hdr.magic), byte_order);
- if (hdr_val != BFD_MACH_O_MH_MAGIC && hdr_val != BFD_MACH_O_MH_MAGIC_64)
- continue;
- /* Check executable. */
- hdr_val = extract_unsigned_integer
- (hdr.filetype, sizeof (hdr.filetype), byte_order);
- if (hdr_val == BFD_MACH_O_MH_EXECUTE)
+ if (darwin_validate_exec_header (load_addr) == load_addr)
return load_addr;
}
return 0;
}
+/* Get the load address of the executable when the PC is at the dyld
+ entry point using parameter passed by the kernel (at SP). */
+
+static CORE_ADDR
+darwin_read_exec_load_addr_at_init (struct darwin_info *info)
+{
+ struct gdbarch *gdbarch = target_gdbarch ();
+ enum bfd_endian byte_order = gdbarch_byte_order (gdbarch);
+ int addr_size = gdbarch_addr_bit (gdbarch) / 8;
+ ULONGEST load_ptr_addr;
+ ULONGEST load_addr;
+ gdb_byte buf[8];
+
+ /* Get SP. */
+ if (regcache_cooked_read_unsigned (get_current_regcache (),
+ gdbarch_sp_regnum (gdbarch),
+ &load_ptr_addr) != REG_VALID)
+ return 0;
+
+ /* Read value at SP (image load address). */
+ if (target_read_memory (load_ptr_addr, buf, addr_size))
+ return 0;
+
+ load_addr = extract_unsigned_integer (buf, addr_size, byte_order);
+
+ return darwin_validate_exec_header (load_addr);
+}
+
/* Return 1 if PC lies in the dynamic symbol resolution code of the
run time loader. */
bfd *sub;
make_cleanup_bfd_unref (dyld_bfd);
- sub = gdb_bfd_mach_o_fat_extract (dyld_bfd, bfd_object,
- gdbarch_bfd_arch_info (target_gdbarch ()));
+ sub = gdb_bfd_mach_o_fat_extract
+ (dyld_bfd, bfd_object, gdbarch_bfd_arch_info (target_gdbarch ()));
if (sub)
{
dyld_bfd = sub;
info->all_image_addr += load_addr;
}
-/* Extract dyld_all_image_addr reading it from
+/* Extract dyld_all_image_addr reading it from
TARGET_OBJECT_DARWIN_DYLD_INFO. */
static void
darwin_solib_read_all_image_info_addr (struct darwin_info *info)
{
- gdb_byte buf[8 + 8 + 4];
+ gdb_byte buf[8];
LONGEST len;
enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch ());
+ struct type *ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
+
+ /* Sanity check. */
+ if (ptr_type->length > sizeof (buf))
+ return;
len = target_read (¤t_target, TARGET_OBJECT_DARWIN_DYLD_INFO, NULL,
- buf, 0, sizeof (buf));
- if (len != sizeof (buf))
+ buf, 0, ptr_type->length);
+ if (len <= 0)
return;
- info->all_image_addr = extract_unsigned_integer (buf, 8, byte_order);
+ /* The use of BIG endian is intended, as BUF is a raw stream of bytes. This
+ makes the support of remote protocol easier. */
+ info->all_image_addr = extract_unsigned_integer (buf, len, BFD_ENDIAN_BIG);
}
/* Shared library startup support. See documentation in solib-svr4.c. */
return;
}
+ /* Add the breakpoint which is hit by dyld when the list of solib is
+ modified. */
create_solib_event_breakpoint (target_gdbarch (), info->all_image.notifier);
- /* Possible relocate the main executable (PIE). */
- load_addr = darwin_read_exec_load_addr (info);
+ if (info->all_image.count != 0)
+ {
+ /* Possible relocate the main executable (PIE). */
+ load_addr = darwin_read_exec_load_addr_from_dyld (info);
+ }
+ else
+ {
+ /* Possible issue:
+ Do not break on the notifier if dyld is not initialized (deduced from
+ count == 0). In that case, dyld hasn't relocated itself and the
+ notifier may point to a wrong address. */
+
+ load_addr = darwin_read_exec_load_addr_at_init (info);
+ }
+
if (load_addr != 0 && symfile_objfile != NULL)
{
CORE_ADDR vmaddr;