1 /* General "disassemble this chunk" code. Used for debugging. */
11 /* Filled in by elfload.c. Simplistic, but will do for now. */
12 unsigned int disas_num_syms;
14 const char *disas_strtab;
16 /* Get LENGTH bytes from info's buffer, at target address memaddr.
17 Transfer them to myaddr. */
19 buffer_read_memory (memaddr, myaddr, length, info)
23 struct disassemble_info *info;
25 if (memaddr < info->buffer_vma
26 || memaddr + length > info->buffer_vma + info->buffer_length)
27 /* Out of bounds. Use EIO because GDB uses it. */
29 memcpy (myaddr, info->buffer + (memaddr - info->buffer_vma), length);
33 #if !defined(CONFIG_USER_ONLY)
34 /* Get LENGTH bytes from info's buffer, at target address memaddr.
35 Transfer them to myaddr. */
37 target_read_memory (memaddr, myaddr, length, info)
41 struct disassemble_info *info;
44 for(i = 0; i < length; i++) {
45 myaddr[i] = ldub_code((void *)((long)memaddr + i));
51 /* Print an error message. We can assume that this is in response to
52 an error return from buffer_read_memory. */
54 perror_memory (status, memaddr, info)
57 struct disassemble_info *info;
61 (*info->fprintf_func) (info->stream, "Unknown error %d\n", status);
63 /* Actually, address between memaddr and memaddr + len was
65 (*info->fprintf_func) (info->stream,
66 "Address 0x%llx is out of bounds.\n", memaddr);
69 /* This could be in a separate file, to save miniscule amounts of space
70 in statically linked executables. */
72 /* Just print the address is hex. This is included for completeness even
73 though both GDB and objdump provide their own (to print symbolic
77 generic_print_address (addr, info)
79 struct disassemble_info *info;
81 (*info->fprintf_func) (info->stream, "0x%llx", addr);
84 /* Just return the given address. */
87 generic_symbol_at_address (addr, info)
89 struct disassemble_info * info;
94 bfd_vma bfd_getl32 (const bfd_byte *addr)
98 v = (unsigned long) addr[0];
99 v |= (unsigned long) addr[1] << 8;
100 v |= (unsigned long) addr[2] << 16;
101 v |= (unsigned long) addr[3] << 24;
105 bfd_vma bfd_getb32 (const bfd_byte *addr)
109 v = (unsigned long) addr[0] << 24;
110 v |= (unsigned long) addr[1] << 16;
111 v |= (unsigned long) addr[2] << 8;
112 v |= (unsigned long) addr[3];
116 /* Disassemble this for me please... (debugging). 'flags' is only used
117 for i386: non zero means 16 bit code */
118 void disas(FILE *out, void *code, unsigned long size, int is_host, int flags)
122 struct disassemble_info disasm_info;
123 int (*print_insn)(bfd_vma pc, disassemble_info *info);
125 INIT_DISASSEMBLE_INFO(disasm_info, out, fprintf);
127 #if !defined(CONFIG_USER_ONLY)
129 disasm_info.read_memory_func = target_read_memory;
133 disasm_info.buffer = code;
134 disasm_info.buffer_vma = (unsigned long)code;
135 disasm_info.buffer_length = size;
138 #ifdef WORDS_BIGENDIAN
139 disasm_info.endian = BFD_ENDIAN_BIG;
141 disasm_info.endian = BFD_ENDIAN_LITTLE;
144 disasm_info.mach = bfd_mach_i386_i386;
145 print_insn = print_insn_i386;
146 #elif defined(__powerpc__)
147 print_insn = print_insn_ppc;
148 #elif defined(__alpha__)
149 print_insn = print_insn_alpha;
150 #elif defined(__sparc__)
151 print_insn = print_insn_sparc;
152 #elif defined(__arm__)
153 print_insn = print_insn_arm;
155 fprintf(out, "Asm output not supported on this arch\n");
159 #ifdef TARGET_WORDS_BIGENDIAN
160 disasm_info.endian = BFD_ENDIAN_BIG;
162 disasm_info.endian = BFD_ENDIAN_LITTLE;
164 #if defined(TARGET_I386)
166 disasm_info.mach = bfd_mach_i386_i386;
168 disasm_info.mach = bfd_mach_i386_i8086;
169 print_insn = print_insn_i386;
170 #elif defined(TARGET_ARM)
171 print_insn = print_insn_arm;
172 #elif defined(TARGET_SPARC)
173 print_insn = print_insn_sparc;
175 fprintf(out, "Asm output not supported on this arch\n");
180 for (pc = code; pc < (uint8_t *)code + size; pc += count) {
181 fprintf(out, "0x%08lx: ", (long)pc);
183 /* since data are included in the code, it is better to
184 display code data too */
186 fprintf(out, "%08x ", (int)bfd_getl32((const bfd_byte *)pc));
189 count = print_insn((unsigned long)pc, &disasm_info);
196 /* Look up symbol for debugging purpose. Returns "" if unknown. */
197 const char *lookup_symbol(void *orig_addr)
200 /* Hack, because we know this is x86. */
201 Elf32_Sym *sym = disas_symtab;
203 for (i = 0; i < disas_num_syms; i++) {
204 if (sym[i].st_shndx == SHN_UNDEF
205 || sym[i].st_shndx >= SHN_LORESERVE)
208 if (ELF_ST_TYPE(sym[i].st_info) != STT_FUNC)
211 if ((long)orig_addr >= sym[i].st_value
212 && (long)orig_addr < sym[i].st_value + sym[i].st_size)
213 return disas_strtab + sym[i].st_name;