Introduce and use ui_out_emit_table
[deliverable/binutils-gdb.git] / gdb / auto-load.c
CommitLineData
e2207b9a
JK
1/* GDB routines for supporting auto-loaded scripts.
2
61baf725 3 Copyright (C) 2012-2017 Free Software Foundation, Inc.
e2207b9a
JK
4
5 This file is part of GDB.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
19
20#include "defs.h"
9f050062 21#include <ctype.h>
e2207b9a
JK
22#include "auto-load.h"
23#include "progspace.h"
e2207b9a
JK
24#include "gdb_regex.h"
25#include "ui-out.h"
26#include "filenames.h"
27#include "command.h"
28#include "observer.h"
29#include "objfiles.h"
bf88dd68
JK
30#include "cli/cli-script.h"
31#include "gdbcmd.h"
5b2bf947 32#include "cli/cli-cmds.h"
bf88dd68
JK
33#include "cli/cli-decode.h"
34#include "cli/cli-setshow.h"
bccbefd2
JK
35#include "gdb_vecs.h"
36#include "readline/tilde.h"
37#include "completer.h"
202cbf1c 38#include "fnmatch.h"
9a950c7c 39#include "top.h"
614c279d 40#include "filestuff.h"
6dddc817 41#include "extension.h"
ed3ef339 42#include "gdb/section-scripts.h"
bf88dd68 43
5b2bf947
DE
44/* The section to look in for auto-loaded scripts (in file formats that
45 support sections).
46 Each entry in this section is a record that begins with a leading byte
47 identifying the record type.
48 At the moment we only support one record type: A leading byte of 1,
49 followed by the path of a python script to load. */
50#define AUTO_SECTION_NAME ".debug_gdb_scripts"
51
9f050062
DE
52static void maybe_print_unsupported_script_warning
53 (struct auto_load_pspace_info *, struct objfile *objfile,
54 const struct extension_language_defn *language,
55 const char *section_name, unsigned offset);
6dddc817 56
9f050062
DE
57static void maybe_print_script_not_found_warning
58 (struct auto_load_pspace_info *, struct objfile *objfile,
59 const struct extension_language_defn *language,
60 const char *section_name, unsigned offset);
bf88dd68 61
4dc84fd1
JK
62/* Value of the 'set debug auto-load' configuration variable. */
63static int debug_auto_load = 0;
64
65/* "show" command for the debug_auto_load configuration variable. */
66
67static void
68show_debug_auto_load (struct ui_file *file, int from_tty,
69 struct cmd_list_element *c, const char *value)
70{
71 fprintf_filtered (file, _("Debugging output for files "
72 "of 'set auto-load ...' is %s.\n"),
73 value);
74}
75
bf88dd68
JK
76/* User-settable option to enable/disable auto-loading of GDB_AUTO_FILE_NAME
77 scripts:
78 set auto-load gdb-scripts on|off
79 This is true if we should auto-load associated scripts when an objfile
80 is opened, false otherwise. */
81static int auto_load_gdb_scripts = 1;
82
83/* "show" command for the auto_load_gdb_scripts configuration variable. */
84
85static void
86show_auto_load_gdb_scripts (struct ui_file *file, int from_tty,
87 struct cmd_list_element *c, const char *value)
88{
89 fprintf_filtered (file, _("Auto-loading of canned sequences of commands "
90 "scripts is %s.\n"),
91 value);
92}
e2207b9a 93
5b2bf947
DE
94/* Return non-zero if auto-loading gdb scripts is enabled. */
95
6dddc817
DE
96int
97auto_load_gdb_scripts_enabled (const struct extension_language_defn *extlang)
5b2bf947
DE
98{
99 return auto_load_gdb_scripts;
100}
101
e2207b9a
JK
102/* Internal-use flag to enable/disable auto-loading.
103 This is true if we should auto-load python code when an objfile is opened,
104 false otherwise.
105
bf88dd68 106 Both auto_load_scripts && global_auto_load must be true to enable
e2207b9a
JK
107 auto-loading.
108
109 This flag exists to facilitate deferring auto-loading during start-up
110 until after ./.gdbinit has been read; it may augment the search directories
111 used to find the scripts. */
bf88dd68
JK
112int global_auto_load = 1;
113
114/* Auto-load .gdbinit file from the current directory? */
115int auto_load_local_gdbinit = 1;
116
117/* Absolute pathname to the current directory .gdbinit, if it exists. */
118char *auto_load_local_gdbinit_pathname = NULL;
119
120/* Boolean value if AUTO_LOAD_LOCAL_GDBINIT_PATHNAME has been loaded. */
121int auto_load_local_gdbinit_loaded = 0;
122
123/* "show" command for the auto_load_local_gdbinit configuration variable. */
124
125static void
126show_auto_load_local_gdbinit (struct ui_file *file, int from_tty,
127 struct cmd_list_element *c, const char *value)
128{
129 fprintf_filtered (file, _("Auto-loading of .gdbinit script from current "
130 "directory is %s.\n"),
131 value);
132}
133
7349ff92
JK
134/* Directory list from which to load auto-loaded scripts. It is not checked
135 for absolute paths but they are strongly recommended. It is initialized by
136 _initialize_auto_load. */
137static char *auto_load_dir;
138
139/* "set" command for the auto_load_dir configuration variable. */
140
141static void
142set_auto_load_dir (char *args, int from_tty, struct cmd_list_element *c)
143{
144 /* Setting the variable to "" resets it to the compile time defaults. */
145 if (auto_load_dir[0] == '\0')
146 {
147 xfree (auto_load_dir);
148 auto_load_dir = xstrdup (AUTO_LOAD_DIR);
149 }
150}
151
152/* "show" command for the auto_load_dir configuration variable. */
153
154static void
155show_auto_load_dir (struct ui_file *file, int from_tty,
156 struct cmd_list_element *c, const char *value)
157{
158 fprintf_filtered (file, _("List of directories from which to load "
159 "auto-loaded scripts is %s.\n"),
160 value);
161}
162
bccbefd2
JK
163/* Directory list safe to hold auto-loaded files. It is not checked for
164 absolute paths but they are strongly recommended. It is initialized by
165 _initialize_auto_load. */
166static char *auto_load_safe_path;
167
168/* Vector of directory elements of AUTO_LOAD_SAFE_PATH with each one normalized
169 by tilde_expand and possibly each entries has added its gdb_realpath
170 counterpart. */
171static VEC (char_ptr) *auto_load_safe_path_vec;
172
1564a261
JK
173/* Expand $datadir and $debugdir in STRING according to the rules of
174 substitute_path_component. Return vector from dirnames_to_char_ptr_vec,
175 this vector must be freed by free_char_ptr_vec by the caller. */
176
177static VEC (char_ptr) *
178auto_load_expand_dir_vars (const char *string)
179{
180 VEC (char_ptr) *dir_vec;
181 char *s;
182
183 s = xstrdup (string);
184 substitute_path_component (&s, "$datadir", gdb_datadir);
185 substitute_path_component (&s, "$debugdir", debug_file_directory);
186
187 if (debug_auto_load && strcmp (s, string) != 0)
188 fprintf_unfiltered (gdb_stdlog,
189 _("auto-load: Expanded $-variables to \"%s\".\n"), s);
190
191 dir_vec = dirnames_to_char_ptr_vec (s);
192 xfree(s);
193
194 return dir_vec;
195}
196
bccbefd2
JK
197/* Update auto_load_safe_path_vec from current AUTO_LOAD_SAFE_PATH. */
198
199static void
200auto_load_safe_path_vec_update (void)
201{
bccbefd2
JK
202 unsigned len;
203 int ix;
204
4dc84fd1
JK
205 if (debug_auto_load)
206 fprintf_unfiltered (gdb_stdlog,
207 _("auto-load: Updating directories of \"%s\".\n"),
208 auto_load_safe_path);
209
bccbefd2
JK
210 free_char_ptr_vec (auto_load_safe_path_vec);
211
1564a261 212 auto_load_safe_path_vec = auto_load_expand_dir_vars (auto_load_safe_path);
bccbefd2
JK
213 len = VEC_length (char_ptr, auto_load_safe_path_vec);
214
215 /* Apply tilde_expand and gdb_realpath to each AUTO_LOAD_SAFE_PATH_VEC
216 element. */
217 for (ix = 0; ix < len; ix++)
218 {
219 char *dir = VEC_index (char_ptr, auto_load_safe_path_vec, ix);
1564a261
JK
220 char *expanded = tilde_expand (dir);
221 char *real_path = gdb_realpath (expanded);
bccbefd2 222
1564a261 223 /* Ensure the current entry is at least tilde_expand-ed. */
bccbefd2
JK
224 VEC_replace (char_ptr, auto_load_safe_path_vec, ix, expanded);
225
4dc84fd1
JK
226 if (debug_auto_load)
227 {
228 if (strcmp (expanded, dir) == 0)
229 fprintf_unfiltered (gdb_stdlog,
230 _("auto-load: Using directory \"%s\".\n"),
231 expanded);
232 else
233 fprintf_unfiltered (gdb_stdlog,
234 _("auto-load: Resolved directory \"%s\" "
235 "as \"%s\".\n"),
236 dir, expanded);
237 }
238 xfree (dir);
239
bccbefd2
JK
240 /* If gdb_realpath returns a different content, append it. */
241 if (strcmp (real_path, expanded) == 0)
242 xfree (real_path);
243 else
4dc84fd1
JK
244 {
245 VEC_safe_push (char_ptr, auto_load_safe_path_vec, real_path);
246
247 if (debug_auto_load)
248 fprintf_unfiltered (gdb_stdlog,
249 _("auto-load: And canonicalized as \"%s\".\n"),
250 real_path);
251 }
bccbefd2
JK
252 }
253}
254
aff139ff 255/* Variable gdb_datadir has been set. Update content depending on $datadir. */
6dea1fbd
JK
256
257static void
258auto_load_gdb_datadir_changed (void)
259{
260 auto_load_safe_path_vec_update ();
261}
262
bccbefd2
JK
263/* "set" command for the auto_load_safe_path configuration variable. */
264
265static void
266set_auto_load_safe_path (char *args, int from_tty, struct cmd_list_element *c)
267{
6dea1fbd 268 /* Setting the variable to "" resets it to the compile time defaults. */
af2c1515
JK
269 if (auto_load_safe_path[0] == '\0')
270 {
271 xfree (auto_load_safe_path);
6dea1fbd 272 auto_load_safe_path = xstrdup (AUTO_LOAD_SAFE_PATH);
af2c1515
JK
273 }
274
bccbefd2
JK
275 auto_load_safe_path_vec_update ();
276}
277
278/* "show" command for the auto_load_safe_path configuration variable. */
279
280static void
281show_auto_load_safe_path (struct ui_file *file, int from_tty,
282 struct cmd_list_element *c, const char *value)
283{
f7bfa992
JK
284 const char *cs;
285
286 /* Check if user has entered either "/" or for example ":".
287 But while more complicate content like ":/foo" would still also
288 permit any location do not hide those. */
289
290 for (cs = value; *cs && (*cs == DIRNAME_SEPARATOR || IS_DIR_SEPARATOR (*cs));
291 cs++);
292 if (*cs == 0)
bccbefd2
JK
293 fprintf_filtered (file, _("Auto-load files are safe to load from any "
294 "directory.\n"));
295 else
296 fprintf_filtered (file, _("List of directories from which it is safe to "
297 "auto-load files is %s.\n"),
298 value);
299}
300
301/* "add-auto-load-safe-path" command for the auto_load_safe_path configuration
302 variable. */
303
304static void
305add_auto_load_safe_path (char *args, int from_tty)
306{
307 char *s;
308
309 if (args == NULL || *args == 0)
310 error (_("\
af2c1515
JK
311Directory argument required.\n\
312Use 'set auto-load safe-path /' for disabling the auto-load safe-path security.\
313"));
bccbefd2
JK
314
315 s = xstrprintf ("%s%c%s", auto_load_safe_path, DIRNAME_SEPARATOR, args);
316 xfree (auto_load_safe_path);
317 auto_load_safe_path = s;
318
319 auto_load_safe_path_vec_update ();
320}
321
f10c5b19
JK
322/* "add-auto-load-scripts-directory" command for the auto_load_dir configuration
323 variable. */
324
325static void
326add_auto_load_dir (char *args, int from_tty)
327{
328 char *s;
329
330 if (args == NULL || *args == 0)
331 error (_("Directory argument required."));
332
333 s = xstrprintf ("%s%c%s", auto_load_dir, DIRNAME_SEPARATOR, args);
334 xfree (auto_load_dir);
335 auto_load_dir = s;
336}
337
202cbf1c
JK
338/* Implementation for filename_is_in_pattern overwriting the caller's FILENAME
339 and PATTERN. */
bccbefd2 340
202cbf1c
JK
341static int
342filename_is_in_pattern_1 (char *filename, char *pattern)
bccbefd2 343{
202cbf1c
JK
344 size_t pattern_len = strlen (pattern);
345 size_t filename_len = strlen (filename);
346
347 if (debug_auto_load)
348 fprintf_unfiltered (gdb_stdlog, _("auto-load: Matching file \"%s\" "
349 "to pattern \"%s\"\n"),
350 filename, pattern);
bccbefd2 351
202cbf1c
JK
352 /* Trim trailing slashes ("/") from PATTERN. Even for "d:\" paths as
353 trailing slashes are trimmed also from FILENAME it still matches
354 correctly. */
355 while (pattern_len && IS_DIR_SEPARATOR (pattern[pattern_len - 1]))
356 pattern_len--;
357 pattern[pattern_len] = '\0';
bccbefd2 358
1ef71717
JK
359 /* Ensure auto_load_safe_path "/" matches any FILENAME. On MS-Windows
360 platform FILENAME even after gdb_realpath does not have to start with
361 IS_DIR_SEPARATOR character, such as the 'C:\x.exe' filename. */
202cbf1c
JK
362 if (pattern_len == 0)
363 {
364 if (debug_auto_load)
365 fprintf_unfiltered (gdb_stdlog,
366 _("auto-load: Matched - empty pattern\n"));
367 return 1;
368 }
369
370 for (;;)
371 {
372 /* Trim trailing slashes ("/"). PATTERN also has slashes trimmed the
373 same way so they will match. */
374 while (filename_len && IS_DIR_SEPARATOR (filename[filename_len - 1]))
375 filename_len--;
376 filename[filename_len] = '\0';
377 if (filename_len == 0)
378 {
379 if (debug_auto_load)
380 fprintf_unfiltered (gdb_stdlog,
381 _("auto-load: Not matched - pattern \"%s\".\n"),
382 pattern);
383 return 0;
384 }
385
386 if (gdb_filename_fnmatch (pattern, filename, FNM_FILE_NAME | FNM_NOESCAPE)
387 == 0)
388 {
389 if (debug_auto_load)
390 fprintf_unfiltered (gdb_stdlog, _("auto-load: Matched - file "
391 "\"%s\" to pattern \"%s\".\n"),
392 filename, pattern);
393 return 1;
394 }
395
396 /* Trim trailing FILENAME component. */
397 while (filename_len > 0 && !IS_DIR_SEPARATOR (filename[filename_len - 1]))
398 filename_len--;
399 }
400}
401
402/* Return 1 if FILENAME matches PATTERN or if FILENAME resides in
403 a subdirectory of a directory that matches PATTERN. Return 0 otherwise.
404 gdb_realpath normalization is never done here. */
405
406static ATTRIBUTE_PURE int
407filename_is_in_pattern (const char *filename, const char *pattern)
408{
409 char *filename_copy, *pattern_copy;
410
224c3ddb 411 filename_copy = (char *) alloca (strlen (filename) + 1);
202cbf1c 412 strcpy (filename_copy, filename);
224c3ddb 413 pattern_copy = (char *) alloca (strlen (pattern) + 1);
202cbf1c 414 strcpy (pattern_copy, pattern);
1ef71717 415
202cbf1c 416 return filename_is_in_pattern_1 (filename_copy, pattern_copy);
bccbefd2
JK
417}
418
419/* Return 1 if FILENAME belongs to one of directory components of
420 AUTO_LOAD_SAFE_PATH_VEC. Return 0 otherwise.
421 auto_load_safe_path_vec_update is never called.
422 *FILENAME_REALP may be updated by gdb_realpath of FILENAME - it has to be
423 freed by the caller. */
424
425static int
426filename_is_in_auto_load_safe_path_vec (const char *filename,
427 char **filename_realp)
428{
202cbf1c 429 char *pattern;
bccbefd2
JK
430 int ix;
431
202cbf1c
JK
432 for (ix = 0; VEC_iterate (char_ptr, auto_load_safe_path_vec, ix, pattern);
433 ++ix)
434 if (*filename_realp == NULL && filename_is_in_pattern (filename, pattern))
bccbefd2
JK
435 break;
436
202cbf1c 437 if (pattern == NULL)
bccbefd2
JK
438 {
439 if (*filename_realp == NULL)
4dc84fd1
JK
440 {
441 *filename_realp = gdb_realpath (filename);
442 if (debug_auto_load && strcmp (*filename_realp, filename) != 0)
443 fprintf_unfiltered (gdb_stdlog,
444 _("auto-load: Resolved "
445 "file \"%s\" as \"%s\".\n"),
446 filename, *filename_realp);
447 }
bccbefd2 448
4dc84fd1 449 if (strcmp (*filename_realp, filename) != 0)
202cbf1c
JK
450 for (ix = 0;
451 VEC_iterate (char_ptr, auto_load_safe_path_vec, ix, pattern); ++ix)
452 if (filename_is_in_pattern (*filename_realp, pattern))
4dc84fd1 453 break;
bccbefd2
JK
454 }
455
202cbf1c 456 if (pattern != NULL)
4dc84fd1
JK
457 {
458 if (debug_auto_load)
459 fprintf_unfiltered (gdb_stdlog, _("auto-load: File \"%s\" matches "
460 "directory \"%s\".\n"),
202cbf1c 461 filename, pattern);
4dc84fd1
JK
462 return 1;
463 }
bccbefd2
JK
464
465 return 0;
466}
467
468/* Return 1 if FILENAME is located in one of the directories of
469 AUTO_LOAD_SAFE_PATH. Otherwise call warning and return 0. FILENAME does
470 not have to be an absolute path.
471
472 Existence of FILENAME is not checked. Function will still give a warning
473 even if the caller would quietly skip non-existing file in unsafe
474 directory. */
475
476int
4dc84fd1 477file_is_auto_load_safe (const char *filename, const char *debug_fmt, ...)
bccbefd2
JK
478{
479 char *filename_real = NULL;
480 struct cleanup *back_to;
9a950c7c 481 static int advice_printed = 0;
bccbefd2 482
4dc84fd1
JK
483 if (debug_auto_load)
484 {
485 va_list debug_args;
486
487 va_start (debug_args, debug_fmt);
488 vfprintf_unfiltered (gdb_stdlog, debug_fmt, debug_args);
489 va_end (debug_args);
490 }
491
bccbefd2
JK
492 back_to = make_cleanup (free_current_contents, &filename_real);
493
494 if (filename_is_in_auto_load_safe_path_vec (filename, &filename_real))
495 {
496 do_cleanups (back_to);
497 return 1;
498 }
499
500 auto_load_safe_path_vec_update ();
501 if (filename_is_in_auto_load_safe_path_vec (filename, &filename_real))
502 {
503 do_cleanups (back_to);
504 return 1;
505 }
506
507 warning (_("File \"%s\" auto-loading has been declined by your "
508 "`auto-load safe-path' set to \"%s\"."),
509 filename_real, auto_load_safe_path);
510
9a950c7c
JK
511 if (!advice_printed)
512 {
513 const char *homedir = getenv ("HOME");
514 char *homeinit;
515
516 if (homedir == NULL)
517 homedir = "$HOME";
518 homeinit = xstrprintf ("%s/%s", homedir, gdbinit);
519 make_cleanup (xfree, homeinit);
520
521 printf_filtered (_("\
522To enable execution of this file add\n\
523\tadd-auto-load-safe-path %s\n\
524line to your configuration file \"%s\".\n\
525To completely disable this security protection add\n\
526\tset auto-load safe-path /\n\
527line to your configuration file \"%s\".\n\
528For more information about this security protection see the\n\
529\"Auto-loading safe path\" section in the GDB manual. E.g., run from the shell:\n\
530\tinfo \"(gdb)Auto-loading safe path\"\n"),
531 filename_real, homeinit, homeinit);
532 advice_printed = 1;
533 }
534
bccbefd2
JK
535 do_cleanups (back_to);
536 return 0;
537}
538
e2207b9a
JK
539/* For scripts specified in .debug_gdb_scripts, multiple objfiles may load
540 the same script. There's no point in loading the script multiple times,
541 and there can be a lot of objfiles and scripts, so we keep track of scripts
542 loaded this way. */
543
544struct auto_load_pspace_info
545{
9f050062
DE
546 /* For each program space we keep track of loaded scripts, both when
547 specified as file names and as scripts to be executed directly. */
548 struct htab *loaded_script_files;
549 struct htab *loaded_script_texts;
e2207b9a 550
6dddc817
DE
551 /* Non-zero if we've issued the warning about an auto-load script not being
552 supported. We only want to issue this warning once. */
553 int unsupported_script_warning_printed;
554
e2207b9a
JK
555 /* Non-zero if we've issued the warning about an auto-load script not being
556 found. We only want to issue this warning once. */
557 int script_not_found_warning_printed;
558};
559
9f050062 560/* Objects of this type are stored in the loaded_script hash table. */
e2207b9a
JK
561
562struct loaded_script
563{
564 /* Name as provided by the objfile. */
565 const char *name;
bf88dd68 566
e2207b9a 567 /* Full path name or NULL if script wasn't found (or was otherwise
9f050062 568 inaccessible), or NULL for loaded_script_texts. */
e2207b9a 569 const char *full_path;
bf88dd68 570
bccbefd2
JK
571 /* Non-zero if this script has been loaded. */
572 int loaded;
573
6dddc817 574 const struct extension_language_defn *language;
e2207b9a
JK
575};
576
577/* Per-program-space data key. */
578static const struct program_space_data *auto_load_pspace_data;
579
580static void
581auto_load_pspace_data_cleanup (struct program_space *pspace, void *arg)
582{
9a3c8263 583 struct auto_load_pspace_info *info = (struct auto_load_pspace_info *) arg;
e2207b9a 584
9f050062
DE
585 if (info->loaded_script_files)
586 htab_delete (info->loaded_script_files);
587 if (info->loaded_script_texts)
588 htab_delete (info->loaded_script_texts);
487ad57c 589 xfree (info);
e2207b9a
JK
590}
591
592/* Get the current autoload data. If none is found yet, add it now. This
593 function always returns a valid object. */
594
595static struct auto_load_pspace_info *
596get_auto_load_pspace_data (struct program_space *pspace)
597{
598 struct auto_load_pspace_info *info;
599
9a3c8263
SM
600 info = ((struct auto_load_pspace_info *)
601 program_space_data (pspace, auto_load_pspace_data));
e2207b9a
JK
602 if (info == NULL)
603 {
41bf6aca 604 info = XCNEW (struct auto_load_pspace_info);
e2207b9a
JK
605 set_program_space_data (pspace, auto_load_pspace_data, info);
606 }
607
608 return info;
609}
610
611/* Hash function for the loaded script hash. */
612
613static hashval_t
614hash_loaded_script_entry (const void *data)
615{
9a3c8263 616 const struct loaded_script *e = (const struct loaded_script *) data;
e2207b9a 617
bf88dd68 618 return htab_hash_string (e->name) ^ htab_hash_pointer (e->language);
e2207b9a
JK
619}
620
621/* Equality function for the loaded script hash. */
622
623static int
624eq_loaded_script_entry (const void *a, const void *b)
625{
9a3c8263
SM
626 const struct loaded_script *ea = (const struct loaded_script *) a;
627 const struct loaded_script *eb = (const struct loaded_script *) b;
e2207b9a 628
bf88dd68 629 return strcmp (ea->name, eb->name) == 0 && ea->language == eb->language;
e2207b9a
JK
630}
631
632/* Initialize the table to track loaded scripts.
633 Each entry is hashed by the full path name. */
634
635static void
636init_loaded_scripts_info (struct auto_load_pspace_info *pspace_info)
637{
638 /* Choose 31 as the starting size of the hash table, somewhat arbitrarily.
639 Space for each entry is obtained with one malloc so we can free them
640 easily. */
641
9f050062
DE
642 pspace_info->loaded_script_files = htab_create (31,
643 hash_loaded_script_entry,
644 eq_loaded_script_entry,
645 xfree);
646 pspace_info->loaded_script_texts = htab_create (31,
647 hash_loaded_script_entry,
648 eq_loaded_script_entry,
649 xfree);
e2207b9a 650
6dddc817 651 pspace_info->unsupported_script_warning_printed = FALSE;
e2207b9a
JK
652 pspace_info->script_not_found_warning_printed = FALSE;
653}
654
655/* Wrapper on get_auto_load_pspace_data to also allocate the hash table
656 for loading scripts. */
657
658struct auto_load_pspace_info *
659get_auto_load_pspace_data_for_loading (struct program_space *pspace)
660{
661 struct auto_load_pspace_info *info;
662
663 info = get_auto_load_pspace_data (pspace);
9f050062 664 if (info->loaded_script_files == NULL)
e2207b9a
JK
665 init_loaded_scripts_info (info);
666
667 return info;
668}
669
9f050062
DE
670/* Add script file NAME in LANGUAGE to hash table of PSPACE_INFO.
671 LOADED 1 if the script has been (is going to) be loaded, 0 otherwise
672 (such as if it has not been found).
673 FULL_PATH is NULL if the script wasn't found.
674 The result is true if the script was already in the hash table. */
e2207b9a 675
6dddc817 676static int
9f050062
DE
677maybe_add_script_file (struct auto_load_pspace_info *pspace_info, int loaded,
678 const char *name, const char *full_path,
679 const struct extension_language_defn *language)
e2207b9a 680{
9f050062 681 struct htab *htab = pspace_info->loaded_script_files;
e2207b9a
JK
682 struct loaded_script **slot, entry;
683 int in_hash_table;
684
685 entry.name = name;
bf88dd68 686 entry.language = language;
e2207b9a
JK
687 slot = (struct loaded_script **) htab_find_slot (htab, &entry, INSERT);
688 in_hash_table = *slot != NULL;
689
690 /* If this script is not in the hash table, add it. */
691
9f050062 692 if (!in_hash_table)
e2207b9a
JK
693 {
694 char *p;
695
696 /* Allocate all space in one chunk so it's easier to free. */
224c3ddb
SM
697 *slot = ((struct loaded_script *)
698 xmalloc (sizeof (**slot)
699 + strlen (name) + 1
700 + (full_path != NULL ? (strlen (full_path) + 1) : 0)));
e2207b9a
JK
701 p = ((char*) *slot) + sizeof (**slot);
702 strcpy (p, name);
703 (*slot)->name = p;
704 if (full_path != NULL)
705 {
706 p += strlen (p) + 1;
707 strcpy (p, full_path);
708 (*slot)->full_path = p;
709 }
710 else
711 (*slot)->full_path = NULL;
bccbefd2 712 (*slot)->loaded = loaded;
bf88dd68 713 (*slot)->language = language;
e2207b9a
JK
714 }
715
716 return in_hash_table;
717}
718
9f050062
DE
719/* Add script contents NAME in LANGUAGE to hash table of PSPACE_INFO.
720 LOADED 1 if the script has been (is going to) be loaded, 0 otherwise
721 (such as if it has not been found).
722 The result is true if the script was already in the hash table. */
723
724static int
725maybe_add_script_text (struct auto_load_pspace_info *pspace_info,
726 int loaded, const char *name,
727 const struct extension_language_defn *language)
728{
729 struct htab *htab = pspace_info->loaded_script_texts;
730 struct loaded_script **slot, entry;
731 int in_hash_table;
732
733 entry.name = name;
734 entry.language = language;
735 slot = (struct loaded_script **) htab_find_slot (htab, &entry, INSERT);
736 in_hash_table = *slot != NULL;
737
738 /* If this script is not in the hash table, add it. */
739
740 if (!in_hash_table)
741 {
742 char *p;
743
744 /* Allocate all space in one chunk so it's easier to free. */
224c3ddb
SM
745 *slot = ((struct loaded_script *)
746 xmalloc (sizeof (**slot) + strlen (name) + 1));
9f050062
DE
747 p = ((char*) *slot) + sizeof (**slot);
748 strcpy (p, name);
749 (*slot)->name = p;
750 (*slot)->full_path = NULL;
751 (*slot)->loaded = loaded;
752 (*slot)->language = language;
753 }
754
755 return in_hash_table;
756}
757
e2207b9a
JK
758/* Clear the table of loaded section scripts. */
759
760static void
761clear_section_scripts (void)
762{
763 struct program_space *pspace = current_program_space;
764 struct auto_load_pspace_info *info;
765
9a3c8263
SM
766 info = ((struct auto_load_pspace_info *)
767 program_space_data (pspace, auto_load_pspace_data));
9f050062 768 if (info != NULL && info->loaded_script_files != NULL)
e2207b9a 769 {
9f050062
DE
770 htab_delete (info->loaded_script_files);
771 htab_delete (info->loaded_script_texts);
772 info->loaded_script_files = NULL;
773 info->loaded_script_texts = NULL;
6dddc817 774 info->unsupported_script_warning_printed = FALSE;
e2207b9a
JK
775 info->script_not_found_warning_printed = FALSE;
776 }
777}
778
e9687799
JK
779/* Look for the auto-load script in LANGUAGE associated with OBJFILE where
780 OBJFILE's gdb_realpath is REALNAME and load it. Return 1 if we found any
781 matching script, return 0 otherwise. */
e2207b9a 782
e9687799
JK
783static int
784auto_load_objfile_script_1 (struct objfile *objfile, const char *realname,
6dddc817 785 const struct extension_language_defn *language)
e2207b9a 786{
e2207b9a 787 char *filename, *debugfile;
e9687799 788 int len, retval;
e2207b9a
JK
789 FILE *input;
790 struct cleanup *cleanups;
6dddc817 791 const char *suffix = ext_lang_auto_load_suffix (language);
e2207b9a 792
e2207b9a 793 len = strlen (realname);
224c3ddb 794 filename = (char *) xmalloc (len + strlen (suffix) + 1);
e2207b9a 795 memcpy (filename, realname, len);
6dddc817 796 strcpy (filename + len, suffix);
e2207b9a
JK
797
798 cleanups = make_cleanup (xfree, filename);
e2207b9a 799
614c279d 800 input = gdb_fopen_cloexec (filename, "r");
e2207b9a 801 debugfile = filename;
7349ff92
JK
802 if (debug_auto_load)
803 fprintf_unfiltered (gdb_stdlog, _("auto-load: Attempted file \"%s\" %s.\n"),
804 debugfile, input ? _("exists") : _("does not exist"));
e2207b9a 805
7349ff92 806 if (!input)
e2207b9a 807 {
7349ff92
JK
808 VEC (char_ptr) *vec;
809 int ix;
810 char *dir;
811
e2207b9a
JK
812 /* Also try the same file in a subdirectory of gdb's data
813 directory. */
7349ff92 814
1564a261 815 vec = auto_load_expand_dir_vars (auto_load_dir);
7349ff92
JK
816 make_cleanup_free_char_ptr_vec (vec);
817
818 if (debug_auto_load)
819 fprintf_unfiltered (gdb_stdlog, _("auto-load: Searching 'set auto-load "
820 "scripts-directory' path \"%s\".\n"),
821 auto_load_dir);
822
823 for (ix = 0; VEC_iterate (char_ptr, vec, ix, dir); ++ix)
824 {
224c3ddb 825 debugfile = (char *) xmalloc (strlen (dir) + strlen (filename) + 1);
1564a261 826 strcpy (debugfile, dir);
7349ff92
JK
827
828 /* FILENAME is absolute, so we don't need a "/" here. */
829 strcat (debugfile, filename);
830
831 make_cleanup (xfree, debugfile);
614c279d 832 input = gdb_fopen_cloexec (debugfile, "r");
7349ff92
JK
833 if (debug_auto_load)
834 fprintf_unfiltered (gdb_stdlog, _("auto-load: Attempted file "
835 "\"%s\" %s.\n"),
836 debugfile,
837 input ? _("exists") : _("does not exist"));
838 if (input != NULL)
839 break;
840 }
e2207b9a
JK
841 }
842
843 if (input)
844 {
5b2bf947
DE
845 int is_safe;
846 struct auto_load_pspace_info *pspace_info;
847
e2207b9a
JK
848 make_cleanup_fclose (input);
849
5b2bf947 850 is_safe
849c862e 851 = file_is_auto_load_safe (debugfile,
5b2bf947
DE
852 _("auto-load: Loading %s script \"%s\""
853 " by extension for objfile \"%s\".\n"),
6dddc817 854 ext_lang_name (language),
849c862e 855 debugfile, objfile_name (objfile));
5b2bf947
DE
856
857 /* Add this script to the hash table too so
858 "info auto-load ${lang}-scripts" can print it. */
859 pspace_info
860 = get_auto_load_pspace_data_for_loading (current_program_space);
9f050062
DE
861 maybe_add_script_file (pspace_info, is_safe, debugfile, debugfile,
862 language);
5b2bf947 863
e2207b9a
JK
864 /* To preserve existing behaviour we don't check for whether the
865 script was already in the table, and always load it.
866 It's highly unlikely that we'd ever load it twice,
867 and these scripts are required to be idempotent under multiple
868 loads anyway. */
5b2bf947 869 if (is_safe)
6dddc817
DE
870 {
871 objfile_script_sourcer_func *sourcer
872 = ext_lang_objfile_script_sourcer (language);
873
874 /* We shouldn't get here if support for the language isn't
875 compiled in. And the extension language is required to implement
876 this function. */
877 gdb_assert (sourcer != NULL);
878 sourcer (language, objfile, input, debugfile);
879 }
e9687799
JK
880
881 retval = 1;
882 }
883 else
884 retval = 0;
885
886 do_cleanups (cleanups);
887 return retval;
888}
889
890/* Look for the auto-load script in LANGUAGE associated with OBJFILE and load
891 it. */
892
6dddc817 893void
e9687799 894auto_load_objfile_script (struct objfile *objfile,
6dddc817 895 const struct extension_language_defn *language)
e9687799 896{
6dddc817
DE
897 char *realname = gdb_realpath (objfile_name (objfile));
898 struct cleanup *cleanups = make_cleanup (xfree, realname);
e9687799
JK
899
900 if (!auto_load_objfile_script_1 (objfile, realname, language))
901 {
902 /* For Windows/DOS .exe executables, strip the .exe suffix, so that
903 FOO-gdb.gdb could be used for FOO.exe, and try again. */
904
905 size_t len = strlen (realname);
906 const size_t lexe = sizeof (".exe") - 1;
907
908 if (len > lexe && strcasecmp (realname + len - lexe, ".exe") == 0)
909 {
910 len -= lexe;
911 realname[len] = '\0';
912 if (debug_auto_load)
913 fprintf_unfiltered (gdb_stdlog, _("auto-load: Stripped .exe suffix, "
914 "retrying with \"%s\".\n"),
915 realname);
916 auto_load_objfile_script_1 (objfile, realname, language);
917 }
e2207b9a
JK
918 }
919
920 do_cleanups (cleanups);
921}
922
9f050062
DE
923/* Subroutine of source_section_scripts to simplify it.
924 Load FILE as a script in extension language LANGUAGE.
925 The script is from section SECTION_NAME in OBJFILE at offset OFFSET. */
926
927static void
928source_script_file (struct auto_load_pspace_info *pspace_info,
929 struct objfile *objfile,
930 const struct extension_language_defn *language,
931 const char *section_name, unsigned int offset,
932 const char *file)
933{
934 FILE *stream;
935 char *full_path;
936 int opened, in_hash_table;
937 struct cleanup *cleanups;
938 objfile_script_sourcer_func *sourcer;
939
940 /* Skip this script if support is not compiled in. */
941 sourcer = ext_lang_objfile_script_sourcer (language);
942 if (sourcer == NULL)
943 {
944 /* We don't throw an error, the program is still debuggable. */
945 maybe_print_unsupported_script_warning (pspace_info, objfile, language,
946 section_name, offset);
947 /* We *could* still try to open it, but there's no point. */
948 maybe_add_script_file (pspace_info, 0, file, NULL, language);
949 return;
950 }
951
952 /* Skip this script if auto-loading it has been disabled. */
953 if (!ext_lang_auto_load_enabled (language))
954 {
955 /* No message is printed, just skip it. */
956 return;
957 }
958
959 opened = find_and_open_script (file, 1 /*search_path*/,
960 &stream, &full_path);
961
962 cleanups = make_cleanup (null_cleanup, NULL);
963 if (opened)
964 {
965 make_cleanup_fclose (stream);
966 make_cleanup (xfree, full_path);
967
968 if (!file_is_auto_load_safe (full_path,
969 _("auto-load: Loading %s script "
970 "\"%s\" from section \"%s\" of "
971 "objfile \"%s\".\n"),
972 ext_lang_name (language), full_path,
973 section_name, objfile_name (objfile)))
974 opened = 0;
975 }
976 else
977 {
978 full_path = NULL;
979
980 /* If one script isn't found it's not uncommon for more to not be
981 found either. We don't want to print a message for each script,
982 too much noise. Instead, we print the warning once and tell the
983 user how to find the list of scripts that weren't loaded.
984 We don't throw an error, the program is still debuggable.
985
986 IWBN if complaints.c were more general-purpose. */
987
988 maybe_print_script_not_found_warning (pspace_info, objfile, language,
989 section_name, offset);
990 }
991
992 in_hash_table = maybe_add_script_file (pspace_info, opened, file, full_path,
993 language);
994
995 /* If this file is not currently loaded, load it. */
996 if (opened && !in_hash_table)
997 sourcer (language, objfile, stream, full_path);
998
999 do_cleanups (cleanups);
1000}
1001
1002/* Subroutine of source_section_scripts to simplify it.
1003 Execute SCRIPT as a script in extension language LANG.
1004 The script is from section SECTION_NAME in OBJFILE at offset OFFSET. */
1005
1006static void
1007execute_script_contents (struct auto_load_pspace_info *pspace_info,
1008 struct objfile *objfile,
1009 const struct extension_language_defn *language,
1010 const char *section_name, unsigned int offset,
1011 const char *script)
1012{
1013 objfile_script_executor_func *executor;
1014 const char *newline, *script_text;
870f88f7 1015 char *name;
9f050062
DE
1016 int is_safe, in_hash_table;
1017 struct cleanup *cleanups;
1018
1019 cleanups = make_cleanup (null_cleanup, NULL);
1020
1021 /* The first line of the script is the name of the script.
1022 It must not contain any kind of space character. */
1023 name = NULL;
1024 newline = strchr (script, '\n');
1025 if (newline != NULL)
1026 {
1027 char *buf, *p;
1028
1029 /* Put the name in a buffer and validate it. */
1030 buf = xstrndup (script, newline - script);
1031 make_cleanup (xfree, buf);
1032 for (p = buf; *p != '\0'; ++p)
1033 {
1034 if (isspace (*p))
1035 break;
1036 }
1037 /* We don't allow nameless scripts, they're not helpful to the user. */
1038 if (p != buf && *p == '\0')
1039 name = buf;
1040 }
1041 if (name == NULL)
1042 {
1043 /* We don't throw an error, the program is still debuggable. */
1044 warning (_("\
1045Missing/bad script name in entry at offset %u in section %s\n\
1046of file %s."),
1047 offset, section_name, objfile_name (objfile));
1048 do_cleanups (cleanups);
1049 return;
1050 }
1051 script_text = newline + 1;
1052
1053 /* Skip this script if support is not compiled in. */
1054 executor = ext_lang_objfile_script_executor (language);
1055 if (executor == NULL)
1056 {
1057 /* We don't throw an error, the program is still debuggable. */
1058 maybe_print_unsupported_script_warning (pspace_info, objfile, language,
1059 section_name, offset);
1060 maybe_add_script_text (pspace_info, 0, name, language);
1061 do_cleanups (cleanups);
1062 return;
1063 }
1064
1065 /* Skip this script if auto-loading it has been disabled. */
1066 if (!ext_lang_auto_load_enabled (language))
1067 {
1068 /* No message is printed, just skip it. */
1069 do_cleanups (cleanups);
1070 return;
1071 }
1072
1073 is_safe = file_is_auto_load_safe (objfile_name (objfile),
1074 _("auto-load: Loading %s script "
1075 "\"%s\" from section \"%s\" of "
1076 "objfile \"%s\".\n"),
1077 ext_lang_name (language), name,
1078 section_name, objfile_name (objfile));
1079
1080 in_hash_table = maybe_add_script_text (pspace_info, is_safe, name, language);
1081
1082 /* If this file is not currently loaded, load it. */
1083 if (is_safe && !in_hash_table)
1084 executor (language, objfile, name, script_text);
1085
1086 do_cleanups (cleanups);
1087}
1088
5b2bf947
DE
1089/* Load scripts specified in OBJFILE.
1090 START,END delimit a buffer containing a list of nul-terminated
1091 file names.
1092 SECTION_NAME is used in error messages.
1093
9f050062
DE
1094 Scripts specified as file names are found per normal "source -s" command
1095 processing. First the script is looked for in $cwd. If not found there
1096 the source search path is used.
5b2bf947 1097
9f050062
DE
1098 The section contains a list of path names of script files to load or
1099 actual script contents. Each entry is nul-terminated. */
5b2bf947
DE
1100
1101static void
1102source_section_scripts (struct objfile *objfile, const char *section_name,
1103 const char *start, const char *end)
1104{
1105 const char *p;
1106 struct auto_load_pspace_info *pspace_info;
1107
1108 pspace_info = get_auto_load_pspace_data_for_loading (current_program_space);
1109
1110 for (p = start; p < end; ++p)
1111 {
9f050062 1112 const char *entry;
ed3ef339 1113 const struct extension_language_defn *language;
9f050062
DE
1114 unsigned int offset = p - start;
1115 int code = *p;
5b2bf947 1116
9f050062 1117 switch (code)
5b2bf947 1118 {
ed3ef339 1119 case SECTION_SCRIPT_ID_PYTHON_FILE:
9f050062 1120 case SECTION_SCRIPT_ID_PYTHON_TEXT:
ed3ef339
DE
1121 language = get_ext_lang_defn (EXT_LANG_PYTHON);
1122 break;
1123 case SECTION_SCRIPT_ID_SCHEME_FILE:
9f050062 1124 case SECTION_SCRIPT_ID_SCHEME_TEXT:
ed3ef339
DE
1125 language = get_ext_lang_defn (EXT_LANG_GUILE);
1126 break;
1127 default:
5b2bf947
DE
1128 warning (_("Invalid entry in %s section"), section_name);
1129 /* We could try various heuristics to find the next valid entry,
1130 but it's safer to just punt. */
ed3ef339 1131 return;
5b2bf947 1132 }
9f050062 1133 entry = ++p;
5b2bf947
DE
1134
1135 while (p < end && *p != '\0')
1136 ++p;
1137 if (p == end)
1138 {
9f050062
DE
1139 warning (_("Non-nul-terminated entry in %s at offset %u"),
1140 section_name, offset);
1141 /* Don't load/execute it. */
5b2bf947
DE
1142 break;
1143 }
6dddc817 1144
9f050062 1145 switch (code)
6dddc817 1146 {
9f050062
DE
1147 case SECTION_SCRIPT_ID_PYTHON_FILE:
1148 case SECTION_SCRIPT_ID_SCHEME_FILE:
1149 if (p == entry)
6dddc817 1150 {
9f050062
DE
1151 warning (_("Empty entry in %s at offset %u"),
1152 section_name, offset);
1153 continue;
6dddc817 1154 }
9f050062
DE
1155 source_script_file (pspace_info, objfile, language,
1156 section_name, offset, entry);
1157 break;
1158 case SECTION_SCRIPT_ID_PYTHON_TEXT:
1159 case SECTION_SCRIPT_ID_SCHEME_TEXT:
1160 execute_script_contents (pspace_info, objfile, language,
1161 section_name, offset, entry);
1162 break;
5b2bf947 1163 }
5b2bf947
DE
1164 }
1165}
1166
1167/* Load scripts specified in section SECTION_NAME of OBJFILE. */
1168
1169static void
1170auto_load_section_scripts (struct objfile *objfile, const char *section_name)
1171{
1172 bfd *abfd = objfile->obfd;
1173 asection *scripts_sect;
1174 bfd_byte *data = NULL;
1175
1176 scripts_sect = bfd_get_section_by_name (abfd, section_name);
ec13808e
JK
1177 if (scripts_sect == NULL
1178 || (bfd_get_section_flags (abfd, scripts_sect) & SEC_HAS_CONTENTS) == 0)
5b2bf947
DE
1179 return;
1180
1181 if (!bfd_get_full_section_contents (abfd, scripts_sect, &data))
1182 warning (_("Couldn't read %s section of %s"),
1183 section_name, bfd_get_filename (abfd));
1184 else
1185 {
1186 struct cleanup *cleanups;
1187 char *p = (char *) data;
1188
1189 cleanups = make_cleanup (xfree, p);
1190 source_section_scripts (objfile, section_name, p,
1191 p + bfd_get_section_size (scripts_sect));
1192 do_cleanups (cleanups);
1193 }
1194}
1195
bf88dd68
JK
1196/* Load any auto-loaded scripts for OBJFILE. */
1197
1198void
1199load_auto_scripts_for_objfile (struct objfile *objfile)
1200{
c47cf547
DE
1201 /* Return immediately if auto-loading has been globally disabled.
1202 This is to handle sequencing of operations during gdb startup.
5fbae7d1
GB
1203 Also return immediately if OBJFILE was not created from a file
1204 on the local filesystem. */
1205 if (!global_auto_load
1206 || (objfile->flags & OBJF_NOT_FILENAME) != 0
1207 || is_target_filename (objfile->original_name))
bf88dd68
JK
1208 return;
1209
6dddc817
DE
1210 /* Load any extension language scripts for this objfile.
1211 E.g., foo-gdb.gdb, foo-gdb.py. */
1212 auto_load_ext_lang_scripts_for_objfile (objfile);
bf88dd68 1213
c47cf547 1214 /* Load any scripts mentioned in AUTO_SECTION_NAME (.debug_gdb_scripts). */
5b2bf947 1215 auto_load_section_scripts (objfile, AUTO_SECTION_NAME);
bf88dd68
JK
1216}
1217
e2207b9a
JK
1218/* This is a new_objfile observer callback to auto-load scripts.
1219
1220 Two flavors of auto-loaded scripts are supported.
1221 1) based on the path to the objfile
1222 2) from .debug_gdb_scripts section */
1223
1224static void
1225auto_load_new_objfile (struct objfile *objfile)
1226{
1227 if (!objfile)
1228 {
1229 /* OBJFILE is NULL when loading a new "main" symbol-file. */
1230 clear_section_scripts ();
1231 return;
1232 }
1233
1234 load_auto_scripts_for_objfile (objfile);
1235}
1236
1237/* Collect scripts to be printed in a vec. */
1238
1239typedef struct loaded_script *loaded_script_ptr;
1240DEF_VEC_P (loaded_script_ptr);
1241
bf88dd68
JK
1242struct collect_matching_scripts_data
1243{
1244 VEC (loaded_script_ptr) **scripts_p;
1245
6dddc817 1246 const struct extension_language_defn *language;
bf88dd68
JK
1247};
1248
e2207b9a
JK
1249/* Traversal function for htab_traverse.
1250 Collect the entry if it matches the regexp. */
1251
1252static int
1253collect_matching_scripts (void **slot, void *info)
1254{
9a3c8263
SM
1255 struct loaded_script *script = (struct loaded_script *) *slot;
1256 struct collect_matching_scripts_data *data
1257 = (struct collect_matching_scripts_data *) info;
e2207b9a 1258
bf88dd68
JK
1259 if (script->language == data->language && re_exec (script->name))
1260 VEC_safe_push (loaded_script_ptr, *data->scripts_p, script);
e2207b9a
JK
1261
1262 return 1;
1263}
1264
1265/* Print SCRIPT. */
1266
1267static void
1268print_script (struct loaded_script *script)
1269{
1270 struct ui_out *uiout = current_uiout;
e2207b9a 1271
2e783024 1272 ui_out_emit_tuple tuple_emitter (uiout, NULL);
e2207b9a 1273
112e8700
SM
1274 uiout->field_string ("loaded", script->loaded ? "Yes" : "No");
1275 uiout->field_string ("script", script->name);
1276 uiout->text ("\n");
e2207b9a
JK
1277
1278 /* If the name isn't the full path, print it too. */
1279 if (script->full_path != NULL
1280 && strcmp (script->name, script->full_path) != 0)
1281 {
112e8700
SM
1282 uiout->text ("\tfull name: ");
1283 uiout->field_string ("full_path", script->full_path);
1284 uiout->text ("\n");
e2207b9a 1285 }
e2207b9a
JK
1286}
1287
1288/* Helper for info_auto_load_scripts to sort the scripts by name. */
1289
1290static int
1291sort_scripts_by_name (const void *ap, const void *bp)
1292{
1293 const struct loaded_script *a = *(const struct loaded_script **) ap;
1294 const struct loaded_script *b = *(const struct loaded_script **) bp;
1295
1296 return FILENAME_CMP (a->name, b->name);
1297}
1298
bf88dd68
JK
1299/* Special internal GDB value of auto_load_info_scripts's PATTERN identify
1300 the "info auto-load XXX" command has been executed through the general
1301 "info auto-load" invocation. Extra newline will be printed if needed. */
1302char auto_load_info_scripts_pattern_nl[] = "";
e2207b9a 1303
9f050062
DE
1304/* Subroutine of auto_load_info_scripts to simplify it.
1305 Print SCRIPTS. */
1306
1307static void
1308print_scripts (VEC (loaded_script_ptr) *scripts)
1309{
9f050062
DE
1310 int i;
1311 loaded_script_ptr script;
1312
1313 qsort (VEC_address (loaded_script_ptr, scripts),
1314 VEC_length (loaded_script_ptr, scripts),
1315 sizeof (loaded_script_ptr), sort_scripts_by_name);
1316 for (i = 0; VEC_iterate (loaded_script_ptr, scripts, i, script); ++i)
1317 print_script (script);
1318}
1319
bf88dd68
JK
1320/* Implementation for "info auto-load gdb-scripts"
1321 (and "info auto-load python-scripts"). List scripts in LANGUAGE matching
1322 PATTERN. FROM_TTY is the usual GDB boolean for user interactivity. */
1323
1324void
1325auto_load_info_scripts (char *pattern, int from_tty,
6dddc817 1326 const struct extension_language_defn *language)
e2207b9a
JK
1327{
1328 struct ui_out *uiout = current_uiout;
1329 struct auto_load_pspace_info *pspace_info;
1330 struct cleanup *script_chain;
9f050062 1331 VEC (loaded_script_ptr) *script_files, *script_texts;
e2207b9a
JK
1332 int nr_scripts;
1333
1334 dont_repeat ();
1335
1336 pspace_info = get_auto_load_pspace_data (current_program_space);
1337
1338 if (pattern && *pattern)
1339 {
1340 char *re_err = re_comp (pattern);
1341
1342 if (re_err)
1343 error (_("Invalid regexp: %s"), re_err);
1344 }
1345 else
1346 {
1347 re_comp ("");
1348 }
1349
1350 /* We need to know the number of rows before we build the table.
1351 Plus we want to sort the scripts by name.
1352 So first traverse the hash table collecting the matching scripts. */
1353
9f050062
DE
1354 script_files = VEC_alloc (loaded_script_ptr, 10);
1355 script_texts = VEC_alloc (loaded_script_ptr, 10);
1356 script_chain = make_cleanup (VEC_cleanup (loaded_script_ptr), &script_files);
1357 make_cleanup (VEC_cleanup (loaded_script_ptr), &script_texts);
1358
1359 if (pspace_info != NULL && pspace_info->loaded_script_files != NULL)
1360 {
1361 struct collect_matching_scripts_data data = { &script_files, language };
1362
1363 /* Pass a pointer to scripts as VEC_safe_push can realloc space. */
1364 htab_traverse_noresize (pspace_info->loaded_script_files,
1365 collect_matching_scripts, &data);
1366 }
e2207b9a 1367
9f050062 1368 if (pspace_info != NULL && pspace_info->loaded_script_texts != NULL)
e2207b9a 1369 {
9f050062 1370 struct collect_matching_scripts_data data = { &script_texts, language };
bf88dd68 1371
e2207b9a 1372 /* Pass a pointer to scripts as VEC_safe_push can realloc space. */
9f050062 1373 htab_traverse_noresize (pspace_info->loaded_script_texts,
bf88dd68 1374 collect_matching_scripts, &data);
e2207b9a
JK
1375 }
1376
9f050062
DE
1377 nr_scripts = (VEC_length (loaded_script_ptr, script_files)
1378 + VEC_length (loaded_script_ptr, script_texts));
bf88dd68
JK
1379
1380 /* Table header shifted right by preceding "gdb-scripts: " would not match
1381 its columns. */
1382 if (nr_scripts > 0 && pattern == auto_load_info_scripts_pattern_nl)
112e8700 1383 uiout->text ("\n");
bf88dd68 1384
4a2b031d
TT
1385 {
1386 ui_out_emit_table table_emitter (uiout, 2, nr_scripts,
1387 "AutoLoadedScriptsTable");
e2207b9a 1388
4a2b031d
TT
1389 uiout->table_header (7, ui_left, "loaded", "Loaded");
1390 uiout->table_header (70, ui_left, "script", "Script");
1391 uiout->table_body ();
e2207b9a 1392
4a2b031d
TT
1393 print_scripts (script_files);
1394 print_scripts (script_texts);
1395 }
e2207b9a
JK
1396
1397 do_cleanups (script_chain);
1398
1399 if (nr_scripts == 0)
1400 {
1401 if (pattern && *pattern)
112e8700 1402 uiout->message ("No auto-load scripts matching %s.\n", pattern);
e2207b9a 1403 else
112e8700 1404 uiout->message ("No auto-load scripts.\n");
e2207b9a
JK
1405 }
1406}
1407
bf88dd68
JK
1408/* Wrapper for "info auto-load gdb-scripts". */
1409
1410static void
1411info_auto_load_gdb_scripts (char *pattern, int from_tty)
1412{
6dddc817 1413 auto_load_info_scripts (pattern, from_tty, &extension_language_gdb);
bf88dd68
JK
1414}
1415
1416/* Implement 'info auto-load local-gdbinit'. */
1417
1418static void
1419info_auto_load_local_gdbinit (char *args, int from_tty)
1420{
1421 if (auto_load_local_gdbinit_pathname == NULL)
1422 printf_filtered (_("Local .gdbinit file was not found.\n"));
1423 else if (auto_load_local_gdbinit_loaded)
1424 printf_filtered (_("Local .gdbinit file \"%s\" has been loaded.\n"),
1425 auto_load_local_gdbinit_pathname);
1426 else
1427 printf_filtered (_("Local .gdbinit file \"%s\" has not been loaded.\n"),
1428 auto_load_local_gdbinit_pathname);
1429}
1430
9f050062
DE
1431/* Print an "unsupported script" warning if it has not already been printed.
1432 The script is in language LANGUAGE at offset OFFSET in section SECTION_NAME
1433 of OBJFILE. */
6dddc817 1434
9f050062
DE
1435static void
1436maybe_print_unsupported_script_warning
1437 (struct auto_load_pspace_info *pspace_info,
1438 struct objfile *objfile, const struct extension_language_defn *language,
1439 const char *section_name, unsigned offset)
6dddc817 1440{
9f050062
DE
1441 if (!pspace_info->unsupported_script_warning_printed)
1442 {
1443 warning (_("\
1444Unsupported auto-load script at offset %u in section %s\n\
1445of file %s.\n\
1446Use `info auto-load %s-scripts [REGEXP]' to list them."),
1447 offset, section_name, objfile_name (objfile),
1448 ext_lang_name (language));
1449 pspace_info->unsupported_script_warning_printed = 1;
1450 }
6dddc817
DE
1451}
1452
e2207b9a
JK
1453/* Return non-zero if SCRIPT_NOT_FOUND_WARNING_PRINTED of PSPACE_INFO was unset
1454 before calling this function. Always set SCRIPT_NOT_FOUND_WARNING_PRINTED
1455 of PSPACE_INFO. */
1456
9f050062
DE
1457static void
1458maybe_print_script_not_found_warning
1459 (struct auto_load_pspace_info *pspace_info,
1460 struct objfile *objfile, const struct extension_language_defn *language,
1461 const char *section_name, unsigned offset)
e2207b9a 1462{
9f050062
DE
1463 if (!pspace_info->script_not_found_warning_printed)
1464 {
1465 warning (_("\
1466Missing auto-load script at offset %u in section %s\n\
1467of file %s.\n\
1468Use `info auto-load %s-scripts [REGEXP]' to list them."),
1469 offset, section_name, objfile_name (objfile),
1470 ext_lang_name (language));
1471 pspace_info->script_not_found_warning_printed = 1;
1472 }
e2207b9a
JK
1473}
1474
bf88dd68
JK
1475/* The only valid "set auto-load" argument is off|0|no|disable. */
1476
1477static void
1478set_auto_load_cmd (char *args, int from_tty)
1479{
1480 struct cmd_list_element *list;
1481 size_t length;
1482
1483 /* See parse_binary_operation in use by the sub-commands. */
1484
1485 length = args ? strlen (args) : 0;
1486
1487 while (length > 0 && (args[length - 1] == ' ' || args[length - 1] == '\t'))
1488 length--;
1489
1490 if (length == 0 || (strncmp (args, "off", length) != 0
1491 && strncmp (args, "0", length) != 0
1492 && strncmp (args, "no", length) != 0
1493 && strncmp (args, "disable", length) != 0))
1494 error (_("Valid is only global 'set auto-load no'; "
1495 "otherwise check the auto-load sub-commands."));
1496
1497 for (list = *auto_load_set_cmdlist_get (); list != NULL; list = list->next)
1498 if (list->var_type == var_boolean)
1499 {
1500 gdb_assert (list->type == set_cmd);
5b9afe8a 1501 do_set_command (args, from_tty, list);
bf88dd68
JK
1502 }
1503}
1504
1505/* Initialize "set auto-load " commands prefix and return it. */
1506
1507struct cmd_list_element **
1508auto_load_set_cmdlist_get (void)
1509{
1510 static struct cmd_list_element *retval;
1511
1512 if (retval == NULL)
1513 add_prefix_cmd ("auto-load", class_maintenance, set_auto_load_cmd, _("\
1514Auto-loading specific settings.\n\
1515Configure various auto-load-specific variables such as\n\
1516automatic loading of Python scripts."),
1517 &retval, "set auto-load ",
1518 1/*allow-unknown*/, &setlist);
1519
1520 return &retval;
1521}
1522
1523/* Command "show auto-load" displays summary of all the current
1524 "show auto-load " settings. */
1525
1526static void
1527show_auto_load_cmd (char *args, int from_tty)
1528{
1529 cmd_show_list (*auto_load_show_cmdlist_get (), from_tty, "");
1530}
1531
1532/* Initialize "show auto-load " commands prefix and return it. */
1533
1534struct cmd_list_element **
1535auto_load_show_cmdlist_get (void)
1536{
1537 static struct cmd_list_element *retval;
1538
1539 if (retval == NULL)
1540 add_prefix_cmd ("auto-load", class_maintenance, show_auto_load_cmd, _("\
1541Show auto-loading specific settings.\n\
1542Show configuration of various auto-load-specific variables such as\n\
1543automatic loading of Python scripts."),
1544 &retval, "show auto-load ",
1545 0/*allow-unknown*/, &showlist);
1546
1547 return &retval;
1548}
1549
1550/* Command "info auto-load" displays whether the various auto-load files have
1551 been loaded. This is reimplementation of cmd_show_list which inserts
1552 newlines at proper places. */
1553
1554static void
1555info_auto_load_cmd (char *args, int from_tty)
1556{
1557 struct cmd_list_element *list;
1558 struct cleanup *infolist_chain;
1559 struct ui_out *uiout = current_uiout;
1560
2e783024 1561 ui_out_emit_tuple tuple_emitter (uiout, "infolist");
bf88dd68
JK
1562
1563 for (list = *auto_load_info_cmdlist_get (); list != NULL; list = list->next)
1564 {
2e783024 1565 ui_out_emit_tuple option_emitter (uiout, "option");
bf88dd68
JK
1566
1567 gdb_assert (!list->prefixlist);
1568 gdb_assert (list->type == not_set_cmd);
1569
112e8700
SM
1570 uiout->field_string ("name", list->name);
1571 uiout->text (": ");
bf88dd68 1572 cmd_func (list, auto_load_info_scripts_pattern_nl, from_tty);
bf88dd68 1573 }
bf88dd68
JK
1574}
1575
1576/* Initialize "info auto-load " commands prefix and return it. */
1577
1578struct cmd_list_element **
1579auto_load_info_cmdlist_get (void)
1580{
1581 static struct cmd_list_element *retval;
1582
1583 if (retval == NULL)
1584 add_prefix_cmd ("auto-load", class_info, info_auto_load_cmd, _("\
1585Print current status of auto-loaded files.\n\
1586Print whether various files like Python scripts or .gdbinit files have been\n\
1587found and/or loaded."),
1588 &retval, "info auto-load ",
1589 0/*allow-unknown*/, &infolist);
1590
1591 return &retval;
1592}
1593
e2207b9a
JK
1594void _initialize_auto_load (void);
1595
1596void
1597_initialize_auto_load (void)
1598{
bccbefd2 1599 struct cmd_list_element *cmd;
6dddc817 1600 char *scripts_directory_help, *gdb_name_help, *python_name_help;
ed3ef339
DE
1601 char *guile_name_help;
1602 const char *suffix;
bccbefd2 1603
e2207b9a 1604 auto_load_pspace_data
8e260fc0
TT
1605 = register_program_space_data_with_cleanup (NULL,
1606 auto_load_pspace_data_cleanup);
e2207b9a
JK
1607
1608 observer_attach_new_objfile (auto_load_new_objfile);
1609
bf88dd68
JK
1610 add_setshow_boolean_cmd ("gdb-scripts", class_support,
1611 &auto_load_gdb_scripts, _("\
1612Enable or disable auto-loading of canned sequences of commands scripts."), _("\
1613Show whether auto-loading of canned sequences of commands scripts is enabled."),
1614 _("\
1615If enabled, canned sequences of commands are loaded when the debugger reads\n\
1616an executable or shared library.\n\
1617This options has security implications for untrusted inferiors."),
1618 NULL, show_auto_load_gdb_scripts,
1619 auto_load_set_cmdlist_get (),
1620 auto_load_show_cmdlist_get ());
1621
1622 add_cmd ("gdb-scripts", class_info, info_auto_load_gdb_scripts,
1623 _("Print the list of automatically loaded sequences of commands.\n\
1624Usage: info auto-load gdb-scripts [REGEXP]"),
1625 auto_load_info_cmdlist_get ());
1626
1627 add_setshow_boolean_cmd ("local-gdbinit", class_support,
1628 &auto_load_local_gdbinit, _("\
1629Enable or disable auto-loading of .gdbinit script in current directory."), _("\
1630Show whether auto-loading .gdbinit script in current directory is enabled."),
1631 _("\
1632If enabled, canned sequences of commands are loaded when debugger starts\n\
1633from .gdbinit file in current directory. Such files are deprecated,\n\
1634use a script associated with inferior executable file instead.\n\
1635This options has security implications for untrusted inferiors."),
1636 NULL, show_auto_load_local_gdbinit,
1637 auto_load_set_cmdlist_get (),
1638 auto_load_show_cmdlist_get ());
1639
1640 add_cmd ("local-gdbinit", class_info, info_auto_load_local_gdbinit,
1641 _("Print whether current directory .gdbinit file has been loaded.\n\
1642Usage: info auto-load local-gdbinit"),
1643 auto_load_info_cmdlist_get ());
bccbefd2 1644
7349ff92 1645 auto_load_dir = xstrdup (AUTO_LOAD_DIR);
6dddc817 1646
ed3ef339 1647 suffix = ext_lang_auto_load_suffix (get_ext_lang_defn (EXT_LANG_GDB));
6dddc817
DE
1648 gdb_name_help
1649 = xstrprintf (_("\
1650GDB scripts: OBJFILE%s\n"),
ed3ef339 1651 suffix);
6dddc817 1652 python_name_help = NULL;
9a950c7c 1653#ifdef HAVE_PYTHON
ed3ef339 1654 suffix = ext_lang_auto_load_suffix (get_ext_lang_defn (EXT_LANG_PYTHON));
6dddc817
DE
1655 python_name_help
1656 = xstrprintf (_("\
1657Python scripts: OBJFILE%s\n"),
ed3ef339
DE
1658 suffix);
1659#endif
1660 guile_name_help = NULL;
1661#ifdef HAVE_GUILE
1662 suffix = ext_lang_auto_load_suffix (get_ext_lang_defn (EXT_LANG_GUILE));
1663 guile_name_help
1664 = xstrprintf (_("\
1665Guile scripts: OBJFILE%s\n"),
1666 suffix);
9a950c7c 1667#endif
6dddc817
DE
1668 scripts_directory_help
1669 = xstrprintf (_("\
1670Automatically loaded scripts are located in one of the directories listed\n\
1671by this option.\n\
1672\n\
1673Script names:\n\
ed3ef339 1674%s%s%s\
6dddc817 1675\n\
9a950c7c
JK
1676This option is ignored for the kinds of scripts \
1677having 'set auto-load ... off'.\n\
1678Directories listed here need to be present also \
1679in the 'set auto-load safe-path'\n\
6dddc817
DE
1680option."),
1681 gdb_name_help,
ed3ef339
DE
1682 python_name_help ? python_name_help : "",
1683 guile_name_help ? guile_name_help : "");
6dddc817 1684
7349ff92
JK
1685 add_setshow_optional_filename_cmd ("scripts-directory", class_support,
1686 &auto_load_dir, _("\
1687Set the list of directories from which to load auto-loaded scripts."), _("\
9a950c7c
JK
1688Show the list of directories from which to load auto-loaded scripts."),
1689 scripts_directory_help,
7349ff92
JK
1690 set_auto_load_dir, show_auto_load_dir,
1691 auto_load_set_cmdlist_get (),
1692 auto_load_show_cmdlist_get ());
9a950c7c 1693 xfree (scripts_directory_help);
6dddc817
DE
1694 xfree (python_name_help);
1695 xfree (gdb_name_help);
ed3ef339 1696 xfree (guile_name_help);
7349ff92 1697
6dea1fbd 1698 auto_load_safe_path = xstrdup (AUTO_LOAD_SAFE_PATH);
bccbefd2
JK
1699 auto_load_safe_path_vec_update ();
1700 add_setshow_optional_filename_cmd ("safe-path", class_support,
1701 &auto_load_safe_path, _("\
9a950c7c
JK
1702Set the list of files and directories that are safe for auto-loading."), _("\
1703Show the list of files and directories that are safe for auto-loading."), _("\
bccbefd2
JK
1704Various files loaded automatically for the 'set auto-load ...' options must\n\
1705be located in one of the directories listed by this option. Warning will be\n\
af2c1515 1706printed and file will not be used otherwise.\n\
9a950c7c 1707You can mix both directory and filename entries.\n\
af2c1515
JK
1708Setting this parameter to an empty list resets it to its default value.\n\
1709Setting this parameter to '/' (without the quotes) allows any file\n\
9a950c7c 1710for the 'set auto-load ...' options. Each path entry can be also shell\n\
202cbf1c 1711wildcard pattern; '*' does not match directory separator.\n\
bccbefd2
JK
1712This option is ignored for the kinds of files having 'set auto-load ... off'.\n\
1713This options has security implications for untrusted inferiors."),
1714 set_auto_load_safe_path,
1715 show_auto_load_safe_path,
1716 auto_load_set_cmdlist_get (),
1717 auto_load_show_cmdlist_get ());
6dea1fbd 1718 observer_attach_gdb_datadir_changed (auto_load_gdb_datadir_changed);
bccbefd2
JK
1719
1720 cmd = add_cmd ("add-auto-load-safe-path", class_support,
1721 add_auto_load_safe_path,
1722 _("Add entries to the list of directories from which it is safe "
1723 "to auto-load files.\n\
1724See the commands 'set auto-load safe-path' and 'show auto-load safe-path' to\n\
1725access the current full list setting."),
1726 &cmdlist);
1727 set_cmd_completer (cmd, filename_completer);
4dc84fd1 1728
f10c5b19
JK
1729 cmd = add_cmd ("add-auto-load-scripts-directory", class_support,
1730 add_auto_load_dir,
1731 _("Add entries to the list of directories from which to load "
1732 "auto-loaded scripts.\n\
1733See the commands 'set auto-load scripts-directory' and\n\
1734'show auto-load scripts-directory' to access the current full list setting."),
1735 &cmdlist);
1736 set_cmd_completer (cmd, filename_completer);
1737
4dc84fd1
JK
1738 add_setshow_boolean_cmd ("auto-load", class_maintenance,
1739 &debug_auto_load, _("\
1740Set auto-load verifications debugging."), _("\
1741Show auto-load verifications debugging."), _("\
1742When non-zero, debugging output for files of 'set auto-load ...'\n\
1743is displayed."),
1744 NULL, show_debug_auto_load,
1745 &setdebuglist, &showdebuglist);
e2207b9a 1746}
This page took 0.675441 seconds and 4 git commands to generate.