opcodes: sparc: support missing SPARC ASIs from UA2005, UA2007, OSA2011, & OSA2015
[deliverable/binutils-gdb.git] / gdb / auto-load.c
CommitLineData
e2207b9a
JK
1/* GDB routines for supporting auto-loaded scripts.
2
61baf725 3 Copyright (C) 2012-2017 Free Software Foundation, Inc.
e2207b9a
JK
4
5 This file is part of GDB.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
19
20#include "defs.h"
9f050062 21#include <ctype.h>
e2207b9a
JK
22#include "auto-load.h"
23#include "progspace.h"
e2207b9a
JK
24#include "gdb_regex.h"
25#include "ui-out.h"
26#include "filenames.h"
27#include "command.h"
28#include "observer.h"
29#include "objfiles.h"
bf88dd68
JK
30#include "cli/cli-script.h"
31#include "gdbcmd.h"
5b2bf947 32#include "cli/cli-cmds.h"
bf88dd68
JK
33#include "cli/cli-decode.h"
34#include "cli/cli-setshow.h"
bccbefd2
JK
35#include "gdb_vecs.h"
36#include "readline/tilde.h"
37#include "completer.h"
202cbf1c 38#include "fnmatch.h"
9a950c7c 39#include "top.h"
614c279d 40#include "filestuff.h"
6dddc817 41#include "extension.h"
ed3ef339 42#include "gdb/section-scripts.h"
bf88dd68 43
5b2bf947
DE
44/* The section to look in for auto-loaded scripts (in file formats that
45 support sections).
46 Each entry in this section is a record that begins with a leading byte
47 identifying the record type.
48 At the moment we only support one record type: A leading byte of 1,
49 followed by the path of a python script to load. */
50#define AUTO_SECTION_NAME ".debug_gdb_scripts"
51
9f050062
DE
52static void maybe_print_unsupported_script_warning
53 (struct auto_load_pspace_info *, struct objfile *objfile,
54 const struct extension_language_defn *language,
55 const char *section_name, unsigned offset);
6dddc817 56
9f050062
DE
57static void maybe_print_script_not_found_warning
58 (struct auto_load_pspace_info *, struct objfile *objfile,
59 const struct extension_language_defn *language,
60 const char *section_name, unsigned offset);
bf88dd68 61
4dc84fd1
JK
62/* Value of the 'set debug auto-load' configuration variable. */
63static int debug_auto_load = 0;
64
65/* "show" command for the debug_auto_load configuration variable. */
66
67static void
68show_debug_auto_load (struct ui_file *file, int from_tty,
69 struct cmd_list_element *c, const char *value)
70{
71 fprintf_filtered (file, _("Debugging output for files "
72 "of 'set auto-load ...' is %s.\n"),
73 value);
74}
75
bf88dd68
JK
76/* User-settable option to enable/disable auto-loading of GDB_AUTO_FILE_NAME
77 scripts:
78 set auto-load gdb-scripts on|off
79 This is true if we should auto-load associated scripts when an objfile
80 is opened, false otherwise. */
81static int auto_load_gdb_scripts = 1;
82
83/* "show" command for the auto_load_gdb_scripts configuration variable. */
84
85static void
86show_auto_load_gdb_scripts (struct ui_file *file, int from_tty,
87 struct cmd_list_element *c, const char *value)
88{
89 fprintf_filtered (file, _("Auto-loading of canned sequences of commands "
90 "scripts is %s.\n"),
91 value);
92}
e2207b9a 93
5b2bf947
DE
94/* Return non-zero if auto-loading gdb scripts is enabled. */
95
6dddc817
DE
96int
97auto_load_gdb_scripts_enabled (const struct extension_language_defn *extlang)
5b2bf947
DE
98{
99 return auto_load_gdb_scripts;
100}
101
e2207b9a
JK
102/* Internal-use flag to enable/disable auto-loading.
103 This is true if we should auto-load python code when an objfile is opened,
104 false otherwise.
105
bf88dd68 106 Both auto_load_scripts && global_auto_load must be true to enable
e2207b9a
JK
107 auto-loading.
108
109 This flag exists to facilitate deferring auto-loading during start-up
110 until after ./.gdbinit has been read; it may augment the search directories
111 used to find the scripts. */
bf88dd68
JK
112int global_auto_load = 1;
113
114/* Auto-load .gdbinit file from the current directory? */
115int auto_load_local_gdbinit = 1;
116
117/* Absolute pathname to the current directory .gdbinit, if it exists. */
118char *auto_load_local_gdbinit_pathname = NULL;
119
120/* Boolean value if AUTO_LOAD_LOCAL_GDBINIT_PATHNAME has been loaded. */
121int auto_load_local_gdbinit_loaded = 0;
122
123/* "show" command for the auto_load_local_gdbinit configuration variable. */
124
125static void
126show_auto_load_local_gdbinit (struct ui_file *file, int from_tty,
127 struct cmd_list_element *c, const char *value)
128{
129 fprintf_filtered (file, _("Auto-loading of .gdbinit script from current "
130 "directory is %s.\n"),
131 value);
132}
133
7349ff92
JK
134/* Directory list from which to load auto-loaded scripts. It is not checked
135 for absolute paths but they are strongly recommended. It is initialized by
136 _initialize_auto_load. */
137static char *auto_load_dir;
138
139/* "set" command for the auto_load_dir configuration variable. */
140
141static void
142set_auto_load_dir (char *args, int from_tty, struct cmd_list_element *c)
143{
144 /* Setting the variable to "" resets it to the compile time defaults. */
145 if (auto_load_dir[0] == '\0')
146 {
147 xfree (auto_load_dir);
148 auto_load_dir = xstrdup (AUTO_LOAD_DIR);
149 }
150}
151
152/* "show" command for the auto_load_dir configuration variable. */
153
154static void
155show_auto_load_dir (struct ui_file *file, int from_tty,
156 struct cmd_list_element *c, const char *value)
157{
158 fprintf_filtered (file, _("List of directories from which to load "
159 "auto-loaded scripts is %s.\n"),
160 value);
161}
162
bccbefd2
JK
163/* Directory list safe to hold auto-loaded files. It is not checked for
164 absolute paths but they are strongly recommended. It is initialized by
165 _initialize_auto_load. */
166static char *auto_load_safe_path;
167
168/* Vector of directory elements of AUTO_LOAD_SAFE_PATH with each one normalized
169 by tilde_expand and possibly each entries has added its gdb_realpath
170 counterpart. */
171static VEC (char_ptr) *auto_load_safe_path_vec;
172
1564a261
JK
173/* Expand $datadir and $debugdir in STRING according to the rules of
174 substitute_path_component. Return vector from dirnames_to_char_ptr_vec,
175 this vector must be freed by free_char_ptr_vec by the caller. */
176
177static VEC (char_ptr) *
178auto_load_expand_dir_vars (const char *string)
179{
180 VEC (char_ptr) *dir_vec;
181 char *s;
182
183 s = xstrdup (string);
184 substitute_path_component (&s, "$datadir", gdb_datadir);
185 substitute_path_component (&s, "$debugdir", debug_file_directory);
186
187 if (debug_auto_load && strcmp (s, string) != 0)
188 fprintf_unfiltered (gdb_stdlog,
189 _("auto-load: Expanded $-variables to \"%s\".\n"), s);
190
191 dir_vec = dirnames_to_char_ptr_vec (s);
192 xfree(s);
193
194 return dir_vec;
195}
196
bccbefd2
JK
197/* Update auto_load_safe_path_vec from current AUTO_LOAD_SAFE_PATH. */
198
199static void
200auto_load_safe_path_vec_update (void)
201{
bccbefd2
JK
202 unsigned len;
203 int ix;
204
4dc84fd1
JK
205 if (debug_auto_load)
206 fprintf_unfiltered (gdb_stdlog,
207 _("auto-load: Updating directories of \"%s\".\n"),
208 auto_load_safe_path);
209
bccbefd2
JK
210 free_char_ptr_vec (auto_load_safe_path_vec);
211
1564a261 212 auto_load_safe_path_vec = auto_load_expand_dir_vars (auto_load_safe_path);
bccbefd2
JK
213 len = VEC_length (char_ptr, auto_load_safe_path_vec);
214
215 /* Apply tilde_expand and gdb_realpath to each AUTO_LOAD_SAFE_PATH_VEC
216 element. */
217 for (ix = 0; ix < len; ix++)
218 {
219 char *dir = VEC_index (char_ptr, auto_load_safe_path_vec, ix);
1564a261
JK
220 char *expanded = tilde_expand (dir);
221 char *real_path = gdb_realpath (expanded);
bccbefd2 222
1564a261 223 /* Ensure the current entry is at least tilde_expand-ed. */
bccbefd2
JK
224 VEC_replace (char_ptr, auto_load_safe_path_vec, ix, expanded);
225
4dc84fd1
JK
226 if (debug_auto_load)
227 {
228 if (strcmp (expanded, dir) == 0)
229 fprintf_unfiltered (gdb_stdlog,
230 _("auto-load: Using directory \"%s\".\n"),
231 expanded);
232 else
233 fprintf_unfiltered (gdb_stdlog,
234 _("auto-load: Resolved directory \"%s\" "
235 "as \"%s\".\n"),
236 dir, expanded);
237 }
238 xfree (dir);
239
bccbefd2
JK
240 /* If gdb_realpath returns a different content, append it. */
241 if (strcmp (real_path, expanded) == 0)
242 xfree (real_path);
243 else
4dc84fd1
JK
244 {
245 VEC_safe_push (char_ptr, auto_load_safe_path_vec, real_path);
246
247 if (debug_auto_load)
248 fprintf_unfiltered (gdb_stdlog,
249 _("auto-load: And canonicalized as \"%s\".\n"),
250 real_path);
251 }
bccbefd2
JK
252 }
253}
254
aff139ff 255/* Variable gdb_datadir has been set. Update content depending on $datadir. */
6dea1fbd
JK
256
257static void
258auto_load_gdb_datadir_changed (void)
259{
260 auto_load_safe_path_vec_update ();
261}
262
bccbefd2
JK
263/* "set" command for the auto_load_safe_path configuration variable. */
264
265static void
266set_auto_load_safe_path (char *args, int from_tty, struct cmd_list_element *c)
267{
6dea1fbd 268 /* Setting the variable to "" resets it to the compile time defaults. */
af2c1515
JK
269 if (auto_load_safe_path[0] == '\0')
270 {
271 xfree (auto_load_safe_path);
6dea1fbd 272 auto_load_safe_path = xstrdup (AUTO_LOAD_SAFE_PATH);
af2c1515
JK
273 }
274
bccbefd2
JK
275 auto_load_safe_path_vec_update ();
276}
277
278/* "show" command for the auto_load_safe_path configuration variable. */
279
280static void
281show_auto_load_safe_path (struct ui_file *file, int from_tty,
282 struct cmd_list_element *c, const char *value)
283{
f7bfa992
JK
284 const char *cs;
285
286 /* Check if user has entered either "/" or for example ":".
287 But while more complicate content like ":/foo" would still also
288 permit any location do not hide those. */
289
290 for (cs = value; *cs && (*cs == DIRNAME_SEPARATOR || IS_DIR_SEPARATOR (*cs));
291 cs++);
292 if (*cs == 0)
bccbefd2
JK
293 fprintf_filtered (file, _("Auto-load files are safe to load from any "
294 "directory.\n"));
295 else
296 fprintf_filtered (file, _("List of directories from which it is safe to "
297 "auto-load files is %s.\n"),
298 value);
299}
300
301/* "add-auto-load-safe-path" command for the auto_load_safe_path configuration
302 variable. */
303
304static void
305add_auto_load_safe_path (char *args, int from_tty)
306{
307 char *s;
308
309 if (args == NULL || *args == 0)
310 error (_("\
af2c1515
JK
311Directory argument required.\n\
312Use 'set auto-load safe-path /' for disabling the auto-load safe-path security.\
313"));
bccbefd2
JK
314
315 s = xstrprintf ("%s%c%s", auto_load_safe_path, DIRNAME_SEPARATOR, args);
316 xfree (auto_load_safe_path);
317 auto_load_safe_path = s;
318
319 auto_load_safe_path_vec_update ();
320}
321
f10c5b19
JK
322/* "add-auto-load-scripts-directory" command for the auto_load_dir configuration
323 variable. */
324
325static void
326add_auto_load_dir (char *args, int from_tty)
327{
328 char *s;
329
330 if (args == NULL || *args == 0)
331 error (_("Directory argument required."));
332
333 s = xstrprintf ("%s%c%s", auto_load_dir, DIRNAME_SEPARATOR, args);
334 xfree (auto_load_dir);
335 auto_load_dir = s;
336}
337
202cbf1c
JK
338/* Implementation for filename_is_in_pattern overwriting the caller's FILENAME
339 and PATTERN. */
bccbefd2 340
202cbf1c
JK
341static int
342filename_is_in_pattern_1 (char *filename, char *pattern)
bccbefd2 343{
202cbf1c
JK
344 size_t pattern_len = strlen (pattern);
345 size_t filename_len = strlen (filename);
346
347 if (debug_auto_load)
348 fprintf_unfiltered (gdb_stdlog, _("auto-load: Matching file \"%s\" "
349 "to pattern \"%s\"\n"),
350 filename, pattern);
bccbefd2 351
202cbf1c
JK
352 /* Trim trailing slashes ("/") from PATTERN. Even for "d:\" paths as
353 trailing slashes are trimmed also from FILENAME it still matches
354 correctly. */
355 while (pattern_len && IS_DIR_SEPARATOR (pattern[pattern_len - 1]))
356 pattern_len--;
357 pattern[pattern_len] = '\0';
bccbefd2 358
1ef71717
JK
359 /* Ensure auto_load_safe_path "/" matches any FILENAME. On MS-Windows
360 platform FILENAME even after gdb_realpath does not have to start with
361 IS_DIR_SEPARATOR character, such as the 'C:\x.exe' filename. */
202cbf1c
JK
362 if (pattern_len == 0)
363 {
364 if (debug_auto_load)
365 fprintf_unfiltered (gdb_stdlog,
366 _("auto-load: Matched - empty pattern\n"));
367 return 1;
368 }
369
370 for (;;)
371 {
372 /* Trim trailing slashes ("/"). PATTERN also has slashes trimmed the
373 same way so they will match. */
374 while (filename_len && IS_DIR_SEPARATOR (filename[filename_len - 1]))
375 filename_len--;
376 filename[filename_len] = '\0';
377 if (filename_len == 0)
378 {
379 if (debug_auto_load)
380 fprintf_unfiltered (gdb_stdlog,
381 _("auto-load: Not matched - pattern \"%s\".\n"),
382 pattern);
383 return 0;
384 }
385
386 if (gdb_filename_fnmatch (pattern, filename, FNM_FILE_NAME | FNM_NOESCAPE)
387 == 0)
388 {
389 if (debug_auto_load)
390 fprintf_unfiltered (gdb_stdlog, _("auto-load: Matched - file "
391 "\"%s\" to pattern \"%s\".\n"),
392 filename, pattern);
393 return 1;
394 }
395
396 /* Trim trailing FILENAME component. */
397 while (filename_len > 0 && !IS_DIR_SEPARATOR (filename[filename_len - 1]))
398 filename_len--;
399 }
400}
401
402/* Return 1 if FILENAME matches PATTERN or if FILENAME resides in
403 a subdirectory of a directory that matches PATTERN. Return 0 otherwise.
404 gdb_realpath normalization is never done here. */
405
406static ATTRIBUTE_PURE int
407filename_is_in_pattern (const char *filename, const char *pattern)
408{
409 char *filename_copy, *pattern_copy;
410
224c3ddb 411 filename_copy = (char *) alloca (strlen (filename) + 1);
202cbf1c 412 strcpy (filename_copy, filename);
224c3ddb 413 pattern_copy = (char *) alloca (strlen (pattern) + 1);
202cbf1c 414 strcpy (pattern_copy, pattern);
1ef71717 415
202cbf1c 416 return filename_is_in_pattern_1 (filename_copy, pattern_copy);
bccbefd2
JK
417}
418
419/* Return 1 if FILENAME belongs to one of directory components of
420 AUTO_LOAD_SAFE_PATH_VEC. Return 0 otherwise.
421 auto_load_safe_path_vec_update is never called.
422 *FILENAME_REALP may be updated by gdb_realpath of FILENAME - it has to be
423 freed by the caller. */
424
425static int
426filename_is_in_auto_load_safe_path_vec (const char *filename,
427 char **filename_realp)
428{
202cbf1c 429 char *pattern;
bccbefd2
JK
430 int ix;
431
202cbf1c
JK
432 for (ix = 0; VEC_iterate (char_ptr, auto_load_safe_path_vec, ix, pattern);
433 ++ix)
434 if (*filename_realp == NULL && filename_is_in_pattern (filename, pattern))
bccbefd2
JK
435 break;
436
202cbf1c 437 if (pattern == NULL)
bccbefd2
JK
438 {
439 if (*filename_realp == NULL)
4dc84fd1
JK
440 {
441 *filename_realp = gdb_realpath (filename);
442 if (debug_auto_load && strcmp (*filename_realp, filename) != 0)
443 fprintf_unfiltered (gdb_stdlog,
444 _("auto-load: Resolved "
445 "file \"%s\" as \"%s\".\n"),
446 filename, *filename_realp);
447 }
bccbefd2 448
4dc84fd1 449 if (strcmp (*filename_realp, filename) != 0)
202cbf1c
JK
450 for (ix = 0;
451 VEC_iterate (char_ptr, auto_load_safe_path_vec, ix, pattern); ++ix)
452 if (filename_is_in_pattern (*filename_realp, pattern))
4dc84fd1 453 break;
bccbefd2
JK
454 }
455
202cbf1c 456 if (pattern != NULL)
4dc84fd1
JK
457 {
458 if (debug_auto_load)
459 fprintf_unfiltered (gdb_stdlog, _("auto-load: File \"%s\" matches "
460 "directory \"%s\".\n"),
202cbf1c 461 filename, pattern);
4dc84fd1
JK
462 return 1;
463 }
bccbefd2
JK
464
465 return 0;
466}
467
468/* Return 1 if FILENAME is located in one of the directories of
469 AUTO_LOAD_SAFE_PATH. Otherwise call warning and return 0. FILENAME does
470 not have to be an absolute path.
471
472 Existence of FILENAME is not checked. Function will still give a warning
473 even if the caller would quietly skip non-existing file in unsafe
474 directory. */
475
476int
4dc84fd1 477file_is_auto_load_safe (const char *filename, const char *debug_fmt, ...)
bccbefd2
JK
478{
479 char *filename_real = NULL;
480 struct cleanup *back_to;
9a950c7c 481 static int advice_printed = 0;
bccbefd2 482
4dc84fd1
JK
483 if (debug_auto_load)
484 {
485 va_list debug_args;
486
487 va_start (debug_args, debug_fmt);
488 vfprintf_unfiltered (gdb_stdlog, debug_fmt, debug_args);
489 va_end (debug_args);
490 }
491
bccbefd2
JK
492 back_to = make_cleanup (free_current_contents, &filename_real);
493
494 if (filename_is_in_auto_load_safe_path_vec (filename, &filename_real))
495 {
496 do_cleanups (back_to);
497 return 1;
498 }
499
500 auto_load_safe_path_vec_update ();
501 if (filename_is_in_auto_load_safe_path_vec (filename, &filename_real))
502 {
503 do_cleanups (back_to);
504 return 1;
505 }
506
507 warning (_("File \"%s\" auto-loading has been declined by your "
508 "`auto-load safe-path' set to \"%s\"."),
509 filename_real, auto_load_safe_path);
510
9a950c7c
JK
511 if (!advice_printed)
512 {
513 const char *homedir = getenv ("HOME");
514 char *homeinit;
515
516 if (homedir == NULL)
517 homedir = "$HOME";
518 homeinit = xstrprintf ("%s/%s", homedir, gdbinit);
519 make_cleanup (xfree, homeinit);
520
521 printf_filtered (_("\
522To enable execution of this file add\n\
523\tadd-auto-load-safe-path %s\n\
524line to your configuration file \"%s\".\n\
525To completely disable this security protection add\n\
526\tset auto-load safe-path /\n\
527line to your configuration file \"%s\".\n\
528For more information about this security protection see the\n\
529\"Auto-loading safe path\" section in the GDB manual. E.g., run from the shell:\n\
530\tinfo \"(gdb)Auto-loading safe path\"\n"),
531 filename_real, homeinit, homeinit);
532 advice_printed = 1;
533 }
534
bccbefd2
JK
535 do_cleanups (back_to);
536 return 0;
537}
538
e2207b9a
JK
539/* For scripts specified in .debug_gdb_scripts, multiple objfiles may load
540 the same script. There's no point in loading the script multiple times,
541 and there can be a lot of objfiles and scripts, so we keep track of scripts
542 loaded this way. */
543
544struct auto_load_pspace_info
545{
9f050062
DE
546 /* For each program space we keep track of loaded scripts, both when
547 specified as file names and as scripts to be executed directly. */
548 struct htab *loaded_script_files;
549 struct htab *loaded_script_texts;
e2207b9a 550
6dddc817
DE
551 /* Non-zero if we've issued the warning about an auto-load script not being
552 supported. We only want to issue this warning once. */
553 int unsupported_script_warning_printed;
554
e2207b9a
JK
555 /* Non-zero if we've issued the warning about an auto-load script not being
556 found. We only want to issue this warning once. */
557 int script_not_found_warning_printed;
558};
559
9f050062 560/* Objects of this type are stored in the loaded_script hash table. */
e2207b9a
JK
561
562struct loaded_script
563{
564 /* Name as provided by the objfile. */
565 const char *name;
bf88dd68 566
e2207b9a 567 /* Full path name or NULL if script wasn't found (or was otherwise
9f050062 568 inaccessible), or NULL for loaded_script_texts. */
e2207b9a 569 const char *full_path;
bf88dd68 570
bccbefd2
JK
571 /* Non-zero if this script has been loaded. */
572 int loaded;
573
6dddc817 574 const struct extension_language_defn *language;
e2207b9a
JK
575};
576
577/* Per-program-space data key. */
578static const struct program_space_data *auto_load_pspace_data;
579
580static void
581auto_load_pspace_data_cleanup (struct program_space *pspace, void *arg)
582{
9a3c8263 583 struct auto_load_pspace_info *info = (struct auto_load_pspace_info *) arg;
e2207b9a 584
9f050062
DE
585 if (info->loaded_script_files)
586 htab_delete (info->loaded_script_files);
587 if (info->loaded_script_texts)
588 htab_delete (info->loaded_script_texts);
487ad57c 589 xfree (info);
e2207b9a
JK
590}
591
592/* Get the current autoload data. If none is found yet, add it now. This
593 function always returns a valid object. */
594
595static struct auto_load_pspace_info *
596get_auto_load_pspace_data (struct program_space *pspace)
597{
598 struct auto_load_pspace_info *info;
599
9a3c8263
SM
600 info = ((struct auto_load_pspace_info *)
601 program_space_data (pspace, auto_load_pspace_data));
e2207b9a
JK
602 if (info == NULL)
603 {
41bf6aca 604 info = XCNEW (struct auto_load_pspace_info);
e2207b9a
JK
605 set_program_space_data (pspace, auto_load_pspace_data, info);
606 }
607
608 return info;
609}
610
611/* Hash function for the loaded script hash. */
612
613static hashval_t
614hash_loaded_script_entry (const void *data)
615{
9a3c8263 616 const struct loaded_script *e = (const struct loaded_script *) data;
e2207b9a 617
bf88dd68 618 return htab_hash_string (e->name) ^ htab_hash_pointer (e->language);
e2207b9a
JK
619}
620
621/* Equality function for the loaded script hash. */
622
623static int
624eq_loaded_script_entry (const void *a, const void *b)
625{
9a3c8263
SM
626 const struct loaded_script *ea = (const struct loaded_script *) a;
627 const struct loaded_script *eb = (const struct loaded_script *) b;
e2207b9a 628
bf88dd68 629 return strcmp (ea->name, eb->name) == 0 && ea->language == eb->language;
e2207b9a
JK
630}
631
632/* Initialize the table to track loaded scripts.
633 Each entry is hashed by the full path name. */
634
635static void
636init_loaded_scripts_info (struct auto_load_pspace_info *pspace_info)
637{
638 /* Choose 31 as the starting size of the hash table, somewhat arbitrarily.
639 Space for each entry is obtained with one malloc so we can free them
640 easily. */
641
9f050062
DE
642 pspace_info->loaded_script_files = htab_create (31,
643 hash_loaded_script_entry,
644 eq_loaded_script_entry,
645 xfree);
646 pspace_info->loaded_script_texts = htab_create (31,
647 hash_loaded_script_entry,
648 eq_loaded_script_entry,
649 xfree);
e2207b9a 650
6dddc817 651 pspace_info->unsupported_script_warning_printed = FALSE;
e2207b9a
JK
652 pspace_info->script_not_found_warning_printed = FALSE;
653}
654
655/* Wrapper on get_auto_load_pspace_data to also allocate the hash table
656 for loading scripts. */
657
658struct auto_load_pspace_info *
659get_auto_load_pspace_data_for_loading (struct program_space *pspace)
660{
661 struct auto_load_pspace_info *info;
662
663 info = get_auto_load_pspace_data (pspace);
9f050062 664 if (info->loaded_script_files == NULL)
e2207b9a
JK
665 init_loaded_scripts_info (info);
666
667 return info;
668}
669
9f050062
DE
670/* Add script file NAME in LANGUAGE to hash table of PSPACE_INFO.
671 LOADED 1 if the script has been (is going to) be loaded, 0 otherwise
672 (such as if it has not been found).
673 FULL_PATH is NULL if the script wasn't found.
674 The result is true if the script was already in the hash table. */
e2207b9a 675
6dddc817 676static int
9f050062
DE
677maybe_add_script_file (struct auto_load_pspace_info *pspace_info, int loaded,
678 const char *name, const char *full_path,
679 const struct extension_language_defn *language)
e2207b9a 680{
9f050062 681 struct htab *htab = pspace_info->loaded_script_files;
e2207b9a
JK
682 struct loaded_script **slot, entry;
683 int in_hash_table;
684
685 entry.name = name;
bf88dd68 686 entry.language = language;
e2207b9a
JK
687 slot = (struct loaded_script **) htab_find_slot (htab, &entry, INSERT);
688 in_hash_table = *slot != NULL;
689
690 /* If this script is not in the hash table, add it. */
691
9f050062 692 if (!in_hash_table)
e2207b9a
JK
693 {
694 char *p;
695
696 /* Allocate all space in one chunk so it's easier to free. */
224c3ddb
SM
697 *slot = ((struct loaded_script *)
698 xmalloc (sizeof (**slot)
699 + strlen (name) + 1
700 + (full_path != NULL ? (strlen (full_path) + 1) : 0)));
e2207b9a
JK
701 p = ((char*) *slot) + sizeof (**slot);
702 strcpy (p, name);
703 (*slot)->name = p;
704 if (full_path != NULL)
705 {
706 p += strlen (p) + 1;
707 strcpy (p, full_path);
708 (*slot)->full_path = p;
709 }
710 else
711 (*slot)->full_path = NULL;
bccbefd2 712 (*slot)->loaded = loaded;
bf88dd68 713 (*slot)->language = language;
e2207b9a
JK
714 }
715
716 return in_hash_table;
717}
718
9f050062
DE
719/* Add script contents NAME in LANGUAGE to hash table of PSPACE_INFO.
720 LOADED 1 if the script has been (is going to) be loaded, 0 otherwise
721 (such as if it has not been found).
722 The result is true if the script was already in the hash table. */
723
724static int
725maybe_add_script_text (struct auto_load_pspace_info *pspace_info,
726 int loaded, const char *name,
727 const struct extension_language_defn *language)
728{
729 struct htab *htab = pspace_info->loaded_script_texts;
730 struct loaded_script **slot, entry;
731 int in_hash_table;
732
733 entry.name = name;
734 entry.language = language;
735 slot = (struct loaded_script **) htab_find_slot (htab, &entry, INSERT);
736 in_hash_table = *slot != NULL;
737
738 /* If this script is not in the hash table, add it. */
739
740 if (!in_hash_table)
741 {
742 char *p;
743
744 /* Allocate all space in one chunk so it's easier to free. */
224c3ddb
SM
745 *slot = ((struct loaded_script *)
746 xmalloc (sizeof (**slot) + strlen (name) + 1));
9f050062
DE
747 p = ((char*) *slot) + sizeof (**slot);
748 strcpy (p, name);
749 (*slot)->name = p;
750 (*slot)->full_path = NULL;
751 (*slot)->loaded = loaded;
752 (*slot)->language = language;
753 }
754
755 return in_hash_table;
756}
757
e2207b9a
JK
758/* Clear the table of loaded section scripts. */
759
760static void
761clear_section_scripts (void)
762{
763 struct program_space *pspace = current_program_space;
764 struct auto_load_pspace_info *info;
765
9a3c8263
SM
766 info = ((struct auto_load_pspace_info *)
767 program_space_data (pspace, auto_load_pspace_data));
9f050062 768 if (info != NULL && info->loaded_script_files != NULL)
e2207b9a 769 {
9f050062
DE
770 htab_delete (info->loaded_script_files);
771 htab_delete (info->loaded_script_texts);
772 info->loaded_script_files = NULL;
773 info->loaded_script_texts = NULL;
6dddc817 774 info->unsupported_script_warning_printed = FALSE;
e2207b9a
JK
775 info->script_not_found_warning_printed = FALSE;
776 }
777}
778
e9687799
JK
779/* Look for the auto-load script in LANGUAGE associated with OBJFILE where
780 OBJFILE's gdb_realpath is REALNAME and load it. Return 1 if we found any
781 matching script, return 0 otherwise. */
e2207b9a 782
e9687799
JK
783static int
784auto_load_objfile_script_1 (struct objfile *objfile, const char *realname,
6dddc817 785 const struct extension_language_defn *language)
e2207b9a 786{
e2207b9a 787 char *filename, *debugfile;
e9687799 788 int len, retval;
e2207b9a
JK
789 FILE *input;
790 struct cleanup *cleanups;
6dddc817 791 const char *suffix = ext_lang_auto_load_suffix (language);
e2207b9a 792
e2207b9a 793 len = strlen (realname);
224c3ddb 794 filename = (char *) xmalloc (len + strlen (suffix) + 1);
e2207b9a 795 memcpy (filename, realname, len);
6dddc817 796 strcpy (filename + len, suffix);
e2207b9a
JK
797
798 cleanups = make_cleanup (xfree, filename);
e2207b9a 799
614c279d 800 input = gdb_fopen_cloexec (filename, "r");
e2207b9a 801 debugfile = filename;
7349ff92
JK
802 if (debug_auto_load)
803 fprintf_unfiltered (gdb_stdlog, _("auto-load: Attempted file \"%s\" %s.\n"),
804 debugfile, input ? _("exists") : _("does not exist"));
e2207b9a 805
7349ff92 806 if (!input)
e2207b9a 807 {
7349ff92
JK
808 VEC (char_ptr) *vec;
809 int ix;
810 char *dir;
811
e2207b9a
JK
812 /* Also try the same file in a subdirectory of gdb's data
813 directory. */
7349ff92 814
1564a261 815 vec = auto_load_expand_dir_vars (auto_load_dir);
7349ff92
JK
816 make_cleanup_free_char_ptr_vec (vec);
817
818 if (debug_auto_load)
819 fprintf_unfiltered (gdb_stdlog, _("auto-load: Searching 'set auto-load "
820 "scripts-directory' path \"%s\".\n"),
821 auto_load_dir);
822
823 for (ix = 0; VEC_iterate (char_ptr, vec, ix, dir); ++ix)
824 {
224c3ddb 825 debugfile = (char *) xmalloc (strlen (dir) + strlen (filename) + 1);
1564a261 826 strcpy (debugfile, dir);
7349ff92
JK
827
828 /* FILENAME is absolute, so we don't need a "/" here. */
829 strcat (debugfile, filename);
830
831 make_cleanup (xfree, debugfile);
614c279d 832 input = gdb_fopen_cloexec (debugfile, "r");
7349ff92
JK
833 if (debug_auto_load)
834 fprintf_unfiltered (gdb_stdlog, _("auto-load: Attempted file "
835 "\"%s\" %s.\n"),
836 debugfile,
837 input ? _("exists") : _("does not exist"));
838 if (input != NULL)
839 break;
840 }
e2207b9a
JK
841 }
842
843 if (input)
844 {
5b2bf947
DE
845 int is_safe;
846 struct auto_load_pspace_info *pspace_info;
847
e2207b9a
JK
848 make_cleanup_fclose (input);
849
5b2bf947 850 is_safe
849c862e 851 = file_is_auto_load_safe (debugfile,
5b2bf947
DE
852 _("auto-load: Loading %s script \"%s\""
853 " by extension for objfile \"%s\".\n"),
6dddc817 854 ext_lang_name (language),
849c862e 855 debugfile, objfile_name (objfile));
5b2bf947
DE
856
857 /* Add this script to the hash table too so
858 "info auto-load ${lang}-scripts" can print it. */
859 pspace_info
860 = get_auto_load_pspace_data_for_loading (current_program_space);
9f050062
DE
861 maybe_add_script_file (pspace_info, is_safe, debugfile, debugfile,
862 language);
5b2bf947 863
e2207b9a
JK
864 /* To preserve existing behaviour we don't check for whether the
865 script was already in the table, and always load it.
866 It's highly unlikely that we'd ever load it twice,
867 and these scripts are required to be idempotent under multiple
868 loads anyway. */
5b2bf947 869 if (is_safe)
6dddc817
DE
870 {
871 objfile_script_sourcer_func *sourcer
872 = ext_lang_objfile_script_sourcer (language);
873
874 /* We shouldn't get here if support for the language isn't
875 compiled in. And the extension language is required to implement
876 this function. */
877 gdb_assert (sourcer != NULL);
878 sourcer (language, objfile, input, debugfile);
879 }
e9687799
JK
880
881 retval = 1;
882 }
883 else
884 retval = 0;
885
886 do_cleanups (cleanups);
887 return retval;
888}
889
890/* Look for the auto-load script in LANGUAGE associated with OBJFILE and load
891 it. */
892
6dddc817 893void
e9687799 894auto_load_objfile_script (struct objfile *objfile,
6dddc817 895 const struct extension_language_defn *language)
e9687799 896{
6dddc817
DE
897 char *realname = gdb_realpath (objfile_name (objfile));
898 struct cleanup *cleanups = make_cleanup (xfree, realname);
e9687799
JK
899
900 if (!auto_load_objfile_script_1 (objfile, realname, language))
901 {
902 /* For Windows/DOS .exe executables, strip the .exe suffix, so that
903 FOO-gdb.gdb could be used for FOO.exe, and try again. */
904
905 size_t len = strlen (realname);
906 const size_t lexe = sizeof (".exe") - 1;
907
908 if (len > lexe && strcasecmp (realname + len - lexe, ".exe") == 0)
909 {
910 len -= lexe;
911 realname[len] = '\0';
912 if (debug_auto_load)
913 fprintf_unfiltered (gdb_stdlog, _("auto-load: Stripped .exe suffix, "
914 "retrying with \"%s\".\n"),
915 realname);
916 auto_load_objfile_script_1 (objfile, realname, language);
917 }
e2207b9a
JK
918 }
919
920 do_cleanups (cleanups);
921}
922
9f050062
DE
923/* Subroutine of source_section_scripts to simplify it.
924 Load FILE as a script in extension language LANGUAGE.
925 The script is from section SECTION_NAME in OBJFILE at offset OFFSET. */
926
927static void
928source_script_file (struct auto_load_pspace_info *pspace_info,
929 struct objfile *objfile,
930 const struct extension_language_defn *language,
931 const char *section_name, unsigned int offset,
932 const char *file)
933{
934 FILE *stream;
935 char *full_path;
936 int opened, in_hash_table;
937 struct cleanup *cleanups;
938 objfile_script_sourcer_func *sourcer;
939
940 /* Skip this script if support is not compiled in. */
941 sourcer = ext_lang_objfile_script_sourcer (language);
942 if (sourcer == NULL)
943 {
944 /* We don't throw an error, the program is still debuggable. */
945 maybe_print_unsupported_script_warning (pspace_info, objfile, language,
946 section_name, offset);
947 /* We *could* still try to open it, but there's no point. */
948 maybe_add_script_file (pspace_info, 0, file, NULL, language);
949 return;
950 }
951
952 /* Skip this script if auto-loading it has been disabled. */
953 if (!ext_lang_auto_load_enabled (language))
954 {
955 /* No message is printed, just skip it. */
956 return;
957 }
958
959 opened = find_and_open_script (file, 1 /*search_path*/,
960 &stream, &full_path);
961
962 cleanups = make_cleanup (null_cleanup, NULL);
963 if (opened)
964 {
965 make_cleanup_fclose (stream);
966 make_cleanup (xfree, full_path);
967
968 if (!file_is_auto_load_safe (full_path,
969 _("auto-load: Loading %s script "
970 "\"%s\" from section \"%s\" of "
971 "objfile \"%s\".\n"),
972 ext_lang_name (language), full_path,
973 section_name, objfile_name (objfile)))
974 opened = 0;
975 }
976 else
977 {
978 full_path = NULL;
979
980 /* If one script isn't found it's not uncommon for more to not be
981 found either. We don't want to print a message for each script,
982 too much noise. Instead, we print the warning once and tell the
983 user how to find the list of scripts that weren't loaded.
984 We don't throw an error, the program is still debuggable.
985
986 IWBN if complaints.c were more general-purpose. */
987
988 maybe_print_script_not_found_warning (pspace_info, objfile, language,
989 section_name, offset);
990 }
991
992 in_hash_table = maybe_add_script_file (pspace_info, opened, file, full_path,
993 language);
994
995 /* If this file is not currently loaded, load it. */
996 if (opened && !in_hash_table)
997 sourcer (language, objfile, stream, full_path);
998
999 do_cleanups (cleanups);
1000}
1001
1002/* Subroutine of source_section_scripts to simplify it.
1003 Execute SCRIPT as a script in extension language LANG.
1004 The script is from section SECTION_NAME in OBJFILE at offset OFFSET. */
1005
1006static void
1007execute_script_contents (struct auto_load_pspace_info *pspace_info,
1008 struct objfile *objfile,
1009 const struct extension_language_defn *language,
1010 const char *section_name, unsigned int offset,
1011 const char *script)
1012{
1013 objfile_script_executor_func *executor;
1014 const char *newline, *script_text;
870f88f7 1015 char *name;
9f050062
DE
1016 int is_safe, in_hash_table;
1017 struct cleanup *cleanups;
1018
1019 cleanups = make_cleanup (null_cleanup, NULL);
1020
1021 /* The first line of the script is the name of the script.
1022 It must not contain any kind of space character. */
1023 name = NULL;
1024 newline = strchr (script, '\n');
1025 if (newline != NULL)
1026 {
1027 char *buf, *p;
1028
1029 /* Put the name in a buffer and validate it. */
1030 buf = xstrndup (script, newline - script);
1031 make_cleanup (xfree, buf);
1032 for (p = buf; *p != '\0'; ++p)
1033 {
1034 if (isspace (*p))
1035 break;
1036 }
1037 /* We don't allow nameless scripts, they're not helpful to the user. */
1038 if (p != buf && *p == '\0')
1039 name = buf;
1040 }
1041 if (name == NULL)
1042 {
1043 /* We don't throw an error, the program is still debuggable. */
1044 warning (_("\
1045Missing/bad script name in entry at offset %u in section %s\n\
1046of file %s."),
1047 offset, section_name, objfile_name (objfile));
1048 do_cleanups (cleanups);
1049 return;
1050 }
1051 script_text = newline + 1;
1052
1053 /* Skip this script if support is not compiled in. */
1054 executor = ext_lang_objfile_script_executor (language);
1055 if (executor == NULL)
1056 {
1057 /* We don't throw an error, the program is still debuggable. */
1058 maybe_print_unsupported_script_warning (pspace_info, objfile, language,
1059 section_name, offset);
1060 maybe_add_script_text (pspace_info, 0, name, language);
1061 do_cleanups (cleanups);
1062 return;
1063 }
1064
1065 /* Skip this script if auto-loading it has been disabled. */
1066 if (!ext_lang_auto_load_enabled (language))
1067 {
1068 /* No message is printed, just skip it. */
1069 do_cleanups (cleanups);
1070 return;
1071 }
1072
1073 is_safe = file_is_auto_load_safe (objfile_name (objfile),
1074 _("auto-load: Loading %s script "
1075 "\"%s\" from section \"%s\" of "
1076 "objfile \"%s\".\n"),
1077 ext_lang_name (language), name,
1078 section_name, objfile_name (objfile));
1079
1080 in_hash_table = maybe_add_script_text (pspace_info, is_safe, name, language);
1081
1082 /* If this file is not currently loaded, load it. */
1083 if (is_safe && !in_hash_table)
1084 executor (language, objfile, name, script_text);
1085
1086 do_cleanups (cleanups);
1087}
1088
5b2bf947
DE
1089/* Load scripts specified in OBJFILE.
1090 START,END delimit a buffer containing a list of nul-terminated
1091 file names.
1092 SECTION_NAME is used in error messages.
1093
9f050062
DE
1094 Scripts specified as file names are found per normal "source -s" command
1095 processing. First the script is looked for in $cwd. If not found there
1096 the source search path is used.
5b2bf947 1097
9f050062
DE
1098 The section contains a list of path names of script files to load or
1099 actual script contents. Each entry is nul-terminated. */
5b2bf947
DE
1100
1101static void
1102source_section_scripts (struct objfile *objfile, const char *section_name,
1103 const char *start, const char *end)
1104{
1105 const char *p;
1106 struct auto_load_pspace_info *pspace_info;
1107
1108 pspace_info = get_auto_load_pspace_data_for_loading (current_program_space);
1109
1110 for (p = start; p < end; ++p)
1111 {
9f050062 1112 const char *entry;
ed3ef339 1113 const struct extension_language_defn *language;
9f050062
DE
1114 unsigned int offset = p - start;
1115 int code = *p;
5b2bf947 1116
9f050062 1117 switch (code)
5b2bf947 1118 {
ed3ef339 1119 case SECTION_SCRIPT_ID_PYTHON_FILE:
9f050062 1120 case SECTION_SCRIPT_ID_PYTHON_TEXT:
ed3ef339
DE
1121 language = get_ext_lang_defn (EXT_LANG_PYTHON);
1122 break;
1123 case SECTION_SCRIPT_ID_SCHEME_FILE:
9f050062 1124 case SECTION_SCRIPT_ID_SCHEME_TEXT:
ed3ef339
DE
1125 language = get_ext_lang_defn (EXT_LANG_GUILE);
1126 break;
1127 default:
5b2bf947
DE
1128 warning (_("Invalid entry in %s section"), section_name);
1129 /* We could try various heuristics to find the next valid entry,
1130 but it's safer to just punt. */
ed3ef339 1131 return;
5b2bf947 1132 }
9f050062 1133 entry = ++p;
5b2bf947
DE
1134
1135 while (p < end && *p != '\0')
1136 ++p;
1137 if (p == end)
1138 {
9f050062
DE
1139 warning (_("Non-nul-terminated entry in %s at offset %u"),
1140 section_name, offset);
1141 /* Don't load/execute it. */
5b2bf947
DE
1142 break;
1143 }
6dddc817 1144
9f050062 1145 switch (code)
6dddc817 1146 {
9f050062
DE
1147 case SECTION_SCRIPT_ID_PYTHON_FILE:
1148 case SECTION_SCRIPT_ID_SCHEME_FILE:
1149 if (p == entry)
6dddc817 1150 {
9f050062
DE
1151 warning (_("Empty entry in %s at offset %u"),
1152 section_name, offset);
1153 continue;
6dddc817 1154 }
9f050062
DE
1155 source_script_file (pspace_info, objfile, language,
1156 section_name, offset, entry);
1157 break;
1158 case SECTION_SCRIPT_ID_PYTHON_TEXT:
1159 case SECTION_SCRIPT_ID_SCHEME_TEXT:
1160 execute_script_contents (pspace_info, objfile, language,
1161 section_name, offset, entry);
1162 break;
5b2bf947 1163 }
5b2bf947
DE
1164 }
1165}
1166
1167/* Load scripts specified in section SECTION_NAME of OBJFILE. */
1168
1169static void
1170auto_load_section_scripts (struct objfile *objfile, const char *section_name)
1171{
1172 bfd *abfd = objfile->obfd;
1173 asection *scripts_sect;
1174 bfd_byte *data = NULL;
1175
1176 scripts_sect = bfd_get_section_by_name (abfd, section_name);
1177 if (scripts_sect == NULL)
1178 return;
1179
1180 if (!bfd_get_full_section_contents (abfd, scripts_sect, &data))
1181 warning (_("Couldn't read %s section of %s"),
1182 section_name, bfd_get_filename (abfd));
1183 else
1184 {
1185 struct cleanup *cleanups;
1186 char *p = (char *) data;
1187
1188 cleanups = make_cleanup (xfree, p);
1189 source_section_scripts (objfile, section_name, p,
1190 p + bfd_get_section_size (scripts_sect));
1191 do_cleanups (cleanups);
1192 }
1193}
1194
bf88dd68
JK
1195/* Load any auto-loaded scripts for OBJFILE. */
1196
1197void
1198load_auto_scripts_for_objfile (struct objfile *objfile)
1199{
c47cf547
DE
1200 /* Return immediately if auto-loading has been globally disabled.
1201 This is to handle sequencing of operations during gdb startup.
5fbae7d1
GB
1202 Also return immediately if OBJFILE was not created from a file
1203 on the local filesystem. */
1204 if (!global_auto_load
1205 || (objfile->flags & OBJF_NOT_FILENAME) != 0
1206 || is_target_filename (objfile->original_name))
bf88dd68
JK
1207 return;
1208
6dddc817
DE
1209 /* Load any extension language scripts for this objfile.
1210 E.g., foo-gdb.gdb, foo-gdb.py. */
1211 auto_load_ext_lang_scripts_for_objfile (objfile);
bf88dd68 1212
c47cf547 1213 /* Load any scripts mentioned in AUTO_SECTION_NAME (.debug_gdb_scripts). */
5b2bf947 1214 auto_load_section_scripts (objfile, AUTO_SECTION_NAME);
bf88dd68
JK
1215}
1216
e2207b9a
JK
1217/* This is a new_objfile observer callback to auto-load scripts.
1218
1219 Two flavors of auto-loaded scripts are supported.
1220 1) based on the path to the objfile
1221 2) from .debug_gdb_scripts section */
1222
1223static void
1224auto_load_new_objfile (struct objfile *objfile)
1225{
1226 if (!objfile)
1227 {
1228 /* OBJFILE is NULL when loading a new "main" symbol-file. */
1229 clear_section_scripts ();
1230 return;
1231 }
1232
1233 load_auto_scripts_for_objfile (objfile);
1234}
1235
1236/* Collect scripts to be printed in a vec. */
1237
1238typedef struct loaded_script *loaded_script_ptr;
1239DEF_VEC_P (loaded_script_ptr);
1240
bf88dd68
JK
1241struct collect_matching_scripts_data
1242{
1243 VEC (loaded_script_ptr) **scripts_p;
1244
6dddc817 1245 const struct extension_language_defn *language;
bf88dd68
JK
1246};
1247
e2207b9a
JK
1248/* Traversal function for htab_traverse.
1249 Collect the entry if it matches the regexp. */
1250
1251static int
1252collect_matching_scripts (void **slot, void *info)
1253{
9a3c8263
SM
1254 struct loaded_script *script = (struct loaded_script *) *slot;
1255 struct collect_matching_scripts_data *data
1256 = (struct collect_matching_scripts_data *) info;
e2207b9a 1257
bf88dd68
JK
1258 if (script->language == data->language && re_exec (script->name))
1259 VEC_safe_push (loaded_script_ptr, *data->scripts_p, script);
e2207b9a
JK
1260
1261 return 1;
1262}
1263
1264/* Print SCRIPT. */
1265
1266static void
1267print_script (struct loaded_script *script)
1268{
1269 struct ui_out *uiout = current_uiout;
1270 struct cleanup *chain;
1271
1272 chain = make_cleanup_ui_out_tuple_begin_end (uiout, NULL);
1273
112e8700
SM
1274 uiout->field_string ("loaded", script->loaded ? "Yes" : "No");
1275 uiout->field_string ("script", script->name);
1276 uiout->text ("\n");
e2207b9a
JK
1277
1278 /* If the name isn't the full path, print it too. */
1279 if (script->full_path != NULL
1280 && strcmp (script->name, script->full_path) != 0)
1281 {
112e8700
SM
1282 uiout->text ("\tfull name: ");
1283 uiout->field_string ("full_path", script->full_path);
1284 uiout->text ("\n");
e2207b9a
JK
1285 }
1286
1287 do_cleanups (chain);
1288}
1289
1290/* Helper for info_auto_load_scripts to sort the scripts by name. */
1291
1292static int
1293sort_scripts_by_name (const void *ap, const void *bp)
1294{
1295 const struct loaded_script *a = *(const struct loaded_script **) ap;
1296 const struct loaded_script *b = *(const struct loaded_script **) bp;
1297
1298 return FILENAME_CMP (a->name, b->name);
1299}
1300
bf88dd68
JK
1301/* Special internal GDB value of auto_load_info_scripts's PATTERN identify
1302 the "info auto-load XXX" command has been executed through the general
1303 "info auto-load" invocation. Extra newline will be printed if needed. */
1304char auto_load_info_scripts_pattern_nl[] = "";
e2207b9a 1305
9f050062
DE
1306/* Subroutine of auto_load_info_scripts to simplify it.
1307 Print SCRIPTS. */
1308
1309static void
1310print_scripts (VEC (loaded_script_ptr) *scripts)
1311{
9f050062
DE
1312 int i;
1313 loaded_script_ptr script;
1314
1315 qsort (VEC_address (loaded_script_ptr, scripts),
1316 VEC_length (loaded_script_ptr, scripts),
1317 sizeof (loaded_script_ptr), sort_scripts_by_name);
1318 for (i = 0; VEC_iterate (loaded_script_ptr, scripts, i, script); ++i)
1319 print_script (script);
1320}
1321
bf88dd68
JK
1322/* Implementation for "info auto-load gdb-scripts"
1323 (and "info auto-load python-scripts"). List scripts in LANGUAGE matching
1324 PATTERN. FROM_TTY is the usual GDB boolean for user interactivity. */
1325
1326void
1327auto_load_info_scripts (char *pattern, int from_tty,
6dddc817 1328 const struct extension_language_defn *language)
e2207b9a
JK
1329{
1330 struct ui_out *uiout = current_uiout;
1331 struct auto_load_pspace_info *pspace_info;
1332 struct cleanup *script_chain;
9f050062 1333 VEC (loaded_script_ptr) *script_files, *script_texts;
e2207b9a
JK
1334 int nr_scripts;
1335
1336 dont_repeat ();
1337
1338 pspace_info = get_auto_load_pspace_data (current_program_space);
1339
1340 if (pattern && *pattern)
1341 {
1342 char *re_err = re_comp (pattern);
1343
1344 if (re_err)
1345 error (_("Invalid regexp: %s"), re_err);
1346 }
1347 else
1348 {
1349 re_comp ("");
1350 }
1351
1352 /* We need to know the number of rows before we build the table.
1353 Plus we want to sort the scripts by name.
1354 So first traverse the hash table collecting the matching scripts. */
1355
9f050062
DE
1356 script_files = VEC_alloc (loaded_script_ptr, 10);
1357 script_texts = VEC_alloc (loaded_script_ptr, 10);
1358 script_chain = make_cleanup (VEC_cleanup (loaded_script_ptr), &script_files);
1359 make_cleanup (VEC_cleanup (loaded_script_ptr), &script_texts);
1360
1361 if (pspace_info != NULL && pspace_info->loaded_script_files != NULL)
1362 {
1363 struct collect_matching_scripts_data data = { &script_files, language };
1364
1365 /* Pass a pointer to scripts as VEC_safe_push can realloc space. */
1366 htab_traverse_noresize (pspace_info->loaded_script_files,
1367 collect_matching_scripts, &data);
1368 }
e2207b9a 1369
9f050062 1370 if (pspace_info != NULL && pspace_info->loaded_script_texts != NULL)
e2207b9a 1371 {
9f050062 1372 struct collect_matching_scripts_data data = { &script_texts, language };
bf88dd68 1373
e2207b9a 1374 /* Pass a pointer to scripts as VEC_safe_push can realloc space. */
9f050062 1375 htab_traverse_noresize (pspace_info->loaded_script_texts,
bf88dd68 1376 collect_matching_scripts, &data);
e2207b9a
JK
1377 }
1378
9f050062
DE
1379 nr_scripts = (VEC_length (loaded_script_ptr, script_files)
1380 + VEC_length (loaded_script_ptr, script_texts));
bf88dd68
JK
1381
1382 /* Table header shifted right by preceding "gdb-scripts: " would not match
1383 its columns. */
1384 if (nr_scripts > 0 && pattern == auto_load_info_scripts_pattern_nl)
112e8700 1385 uiout->text ("\n");
bf88dd68 1386
9f050062 1387 /* Note: This creates a cleanup to output the table end marker. */
e2207b9a
JK
1388 make_cleanup_ui_out_table_begin_end (uiout, 2, nr_scripts,
1389 "AutoLoadedScriptsTable");
1390
112e8700
SM
1391 uiout->table_header (7, ui_left, "loaded", "Loaded");
1392 uiout->table_header (70, ui_left, "script", "Script");
1393 uiout->table_body ();
e2207b9a 1394
9f050062
DE
1395 print_scripts (script_files);
1396 print_scripts (script_texts);
e2207b9a 1397
9f050062 1398 /* Finish up the table before checking for no matching scripts. */
e2207b9a
JK
1399 do_cleanups (script_chain);
1400
1401 if (nr_scripts == 0)
1402 {
1403 if (pattern && *pattern)
112e8700 1404 uiout->message ("No auto-load scripts matching %s.\n", pattern);
e2207b9a 1405 else
112e8700 1406 uiout->message ("No auto-load scripts.\n");
e2207b9a
JK
1407 }
1408}
1409
bf88dd68
JK
1410/* Wrapper for "info auto-load gdb-scripts". */
1411
1412static void
1413info_auto_load_gdb_scripts (char *pattern, int from_tty)
1414{
6dddc817 1415 auto_load_info_scripts (pattern, from_tty, &extension_language_gdb);
bf88dd68
JK
1416}
1417
1418/* Implement 'info auto-load local-gdbinit'. */
1419
1420static void
1421info_auto_load_local_gdbinit (char *args, int from_tty)
1422{
1423 if (auto_load_local_gdbinit_pathname == NULL)
1424 printf_filtered (_("Local .gdbinit file was not found.\n"));
1425 else if (auto_load_local_gdbinit_loaded)
1426 printf_filtered (_("Local .gdbinit file \"%s\" has been loaded.\n"),
1427 auto_load_local_gdbinit_pathname);
1428 else
1429 printf_filtered (_("Local .gdbinit file \"%s\" has not been loaded.\n"),
1430 auto_load_local_gdbinit_pathname);
1431}
1432
9f050062
DE
1433/* Print an "unsupported script" warning if it has not already been printed.
1434 The script is in language LANGUAGE at offset OFFSET in section SECTION_NAME
1435 of OBJFILE. */
6dddc817 1436
9f050062
DE
1437static void
1438maybe_print_unsupported_script_warning
1439 (struct auto_load_pspace_info *pspace_info,
1440 struct objfile *objfile, const struct extension_language_defn *language,
1441 const char *section_name, unsigned offset)
6dddc817 1442{
9f050062
DE
1443 if (!pspace_info->unsupported_script_warning_printed)
1444 {
1445 warning (_("\
1446Unsupported auto-load script at offset %u in section %s\n\
1447of file %s.\n\
1448Use `info auto-load %s-scripts [REGEXP]' to list them."),
1449 offset, section_name, objfile_name (objfile),
1450 ext_lang_name (language));
1451 pspace_info->unsupported_script_warning_printed = 1;
1452 }
6dddc817
DE
1453}
1454
e2207b9a
JK
1455/* Return non-zero if SCRIPT_NOT_FOUND_WARNING_PRINTED of PSPACE_INFO was unset
1456 before calling this function. Always set SCRIPT_NOT_FOUND_WARNING_PRINTED
1457 of PSPACE_INFO. */
1458
9f050062
DE
1459static void
1460maybe_print_script_not_found_warning
1461 (struct auto_load_pspace_info *pspace_info,
1462 struct objfile *objfile, const struct extension_language_defn *language,
1463 const char *section_name, unsigned offset)
e2207b9a 1464{
9f050062
DE
1465 if (!pspace_info->script_not_found_warning_printed)
1466 {
1467 warning (_("\
1468Missing auto-load script at offset %u in section %s\n\
1469of file %s.\n\
1470Use `info auto-load %s-scripts [REGEXP]' to list them."),
1471 offset, section_name, objfile_name (objfile),
1472 ext_lang_name (language));
1473 pspace_info->script_not_found_warning_printed = 1;
1474 }
e2207b9a
JK
1475}
1476
bf88dd68
JK
1477/* The only valid "set auto-load" argument is off|0|no|disable. */
1478
1479static void
1480set_auto_load_cmd (char *args, int from_tty)
1481{
1482 struct cmd_list_element *list;
1483 size_t length;
1484
1485 /* See parse_binary_operation in use by the sub-commands. */
1486
1487 length = args ? strlen (args) : 0;
1488
1489 while (length > 0 && (args[length - 1] == ' ' || args[length - 1] == '\t'))
1490 length--;
1491
1492 if (length == 0 || (strncmp (args, "off", length) != 0
1493 && strncmp (args, "0", length) != 0
1494 && strncmp (args, "no", length) != 0
1495 && strncmp (args, "disable", length) != 0))
1496 error (_("Valid is only global 'set auto-load no'; "
1497 "otherwise check the auto-load sub-commands."));
1498
1499 for (list = *auto_load_set_cmdlist_get (); list != NULL; list = list->next)
1500 if (list->var_type == var_boolean)
1501 {
1502 gdb_assert (list->type == set_cmd);
5b9afe8a 1503 do_set_command (args, from_tty, list);
bf88dd68
JK
1504 }
1505}
1506
1507/* Initialize "set auto-load " commands prefix and return it. */
1508
1509struct cmd_list_element **
1510auto_load_set_cmdlist_get (void)
1511{
1512 static struct cmd_list_element *retval;
1513
1514 if (retval == NULL)
1515 add_prefix_cmd ("auto-load", class_maintenance, set_auto_load_cmd, _("\
1516Auto-loading specific settings.\n\
1517Configure various auto-load-specific variables such as\n\
1518automatic loading of Python scripts."),
1519 &retval, "set auto-load ",
1520 1/*allow-unknown*/, &setlist);
1521
1522 return &retval;
1523}
1524
1525/* Command "show auto-load" displays summary of all the current
1526 "show auto-load " settings. */
1527
1528static void
1529show_auto_load_cmd (char *args, int from_tty)
1530{
1531 cmd_show_list (*auto_load_show_cmdlist_get (), from_tty, "");
1532}
1533
1534/* Initialize "show auto-load " commands prefix and return it. */
1535
1536struct cmd_list_element **
1537auto_load_show_cmdlist_get (void)
1538{
1539 static struct cmd_list_element *retval;
1540
1541 if (retval == NULL)
1542 add_prefix_cmd ("auto-load", class_maintenance, show_auto_load_cmd, _("\
1543Show auto-loading specific settings.\n\
1544Show configuration of various auto-load-specific variables such as\n\
1545automatic loading of Python scripts."),
1546 &retval, "show auto-load ",
1547 0/*allow-unknown*/, &showlist);
1548
1549 return &retval;
1550}
1551
1552/* Command "info auto-load" displays whether the various auto-load files have
1553 been loaded. This is reimplementation of cmd_show_list which inserts
1554 newlines at proper places. */
1555
1556static void
1557info_auto_load_cmd (char *args, int from_tty)
1558{
1559 struct cmd_list_element *list;
1560 struct cleanup *infolist_chain;
1561 struct ui_out *uiout = current_uiout;
1562
1563 infolist_chain = make_cleanup_ui_out_tuple_begin_end (uiout, "infolist");
1564
1565 for (list = *auto_load_info_cmdlist_get (); list != NULL; list = list->next)
1566 {
1567 struct cleanup *option_chain
1568 = make_cleanup_ui_out_tuple_begin_end (uiout, "option");
1569
1570 gdb_assert (!list->prefixlist);
1571 gdb_assert (list->type == not_set_cmd);
1572
112e8700
SM
1573 uiout->field_string ("name", list->name);
1574 uiout->text (": ");
bf88dd68
JK
1575 cmd_func (list, auto_load_info_scripts_pattern_nl, from_tty);
1576
1577 /* Close the tuple. */
1578 do_cleanups (option_chain);
1579 }
1580
1581 /* Close the tuple. */
1582 do_cleanups (infolist_chain);
1583}
1584
1585/* Initialize "info auto-load " commands prefix and return it. */
1586
1587struct cmd_list_element **
1588auto_load_info_cmdlist_get (void)
1589{
1590 static struct cmd_list_element *retval;
1591
1592 if (retval == NULL)
1593 add_prefix_cmd ("auto-load", class_info, info_auto_load_cmd, _("\
1594Print current status of auto-loaded files.\n\
1595Print whether various files like Python scripts or .gdbinit files have been\n\
1596found and/or loaded."),
1597 &retval, "info auto-load ",
1598 0/*allow-unknown*/, &infolist);
1599
1600 return &retval;
1601}
1602
e2207b9a
JK
1603void _initialize_auto_load (void);
1604
1605void
1606_initialize_auto_load (void)
1607{
bccbefd2 1608 struct cmd_list_element *cmd;
6dddc817 1609 char *scripts_directory_help, *gdb_name_help, *python_name_help;
ed3ef339
DE
1610 char *guile_name_help;
1611 const char *suffix;
bccbefd2 1612
e2207b9a 1613 auto_load_pspace_data
8e260fc0
TT
1614 = register_program_space_data_with_cleanup (NULL,
1615 auto_load_pspace_data_cleanup);
e2207b9a
JK
1616
1617 observer_attach_new_objfile (auto_load_new_objfile);
1618
bf88dd68
JK
1619 add_setshow_boolean_cmd ("gdb-scripts", class_support,
1620 &auto_load_gdb_scripts, _("\
1621Enable or disable auto-loading of canned sequences of commands scripts."), _("\
1622Show whether auto-loading of canned sequences of commands scripts is enabled."),
1623 _("\
1624If enabled, canned sequences of commands are loaded when the debugger reads\n\
1625an executable or shared library.\n\
1626This options has security implications for untrusted inferiors."),
1627 NULL, show_auto_load_gdb_scripts,
1628 auto_load_set_cmdlist_get (),
1629 auto_load_show_cmdlist_get ());
1630
1631 add_cmd ("gdb-scripts", class_info, info_auto_load_gdb_scripts,
1632 _("Print the list of automatically loaded sequences of commands.\n\
1633Usage: info auto-load gdb-scripts [REGEXP]"),
1634 auto_load_info_cmdlist_get ());
1635
1636 add_setshow_boolean_cmd ("local-gdbinit", class_support,
1637 &auto_load_local_gdbinit, _("\
1638Enable or disable auto-loading of .gdbinit script in current directory."), _("\
1639Show whether auto-loading .gdbinit script in current directory is enabled."),
1640 _("\
1641If enabled, canned sequences of commands are loaded when debugger starts\n\
1642from .gdbinit file in current directory. Such files are deprecated,\n\
1643use a script associated with inferior executable file instead.\n\
1644This options has security implications for untrusted inferiors."),
1645 NULL, show_auto_load_local_gdbinit,
1646 auto_load_set_cmdlist_get (),
1647 auto_load_show_cmdlist_get ());
1648
1649 add_cmd ("local-gdbinit", class_info, info_auto_load_local_gdbinit,
1650 _("Print whether current directory .gdbinit file has been loaded.\n\
1651Usage: info auto-load local-gdbinit"),
1652 auto_load_info_cmdlist_get ());
bccbefd2 1653
7349ff92 1654 auto_load_dir = xstrdup (AUTO_LOAD_DIR);
6dddc817 1655
ed3ef339 1656 suffix = ext_lang_auto_load_suffix (get_ext_lang_defn (EXT_LANG_GDB));
6dddc817
DE
1657 gdb_name_help
1658 = xstrprintf (_("\
1659GDB scripts: OBJFILE%s\n"),
ed3ef339 1660 suffix);
6dddc817 1661 python_name_help = NULL;
9a950c7c 1662#ifdef HAVE_PYTHON
ed3ef339 1663 suffix = ext_lang_auto_load_suffix (get_ext_lang_defn (EXT_LANG_PYTHON));
6dddc817
DE
1664 python_name_help
1665 = xstrprintf (_("\
1666Python scripts: OBJFILE%s\n"),
ed3ef339
DE
1667 suffix);
1668#endif
1669 guile_name_help = NULL;
1670#ifdef HAVE_GUILE
1671 suffix = ext_lang_auto_load_suffix (get_ext_lang_defn (EXT_LANG_GUILE));
1672 guile_name_help
1673 = xstrprintf (_("\
1674Guile scripts: OBJFILE%s\n"),
1675 suffix);
9a950c7c 1676#endif
6dddc817
DE
1677 scripts_directory_help
1678 = xstrprintf (_("\
1679Automatically loaded scripts are located in one of the directories listed\n\
1680by this option.\n\
1681\n\
1682Script names:\n\
ed3ef339 1683%s%s%s\
6dddc817 1684\n\
9a950c7c
JK
1685This option is ignored for the kinds of scripts \
1686having 'set auto-load ... off'.\n\
1687Directories listed here need to be present also \
1688in the 'set auto-load safe-path'\n\
6dddc817
DE
1689option."),
1690 gdb_name_help,
ed3ef339
DE
1691 python_name_help ? python_name_help : "",
1692 guile_name_help ? guile_name_help : "");
6dddc817 1693
7349ff92
JK
1694 add_setshow_optional_filename_cmd ("scripts-directory", class_support,
1695 &auto_load_dir, _("\
1696Set the list of directories from which to load auto-loaded scripts."), _("\
9a950c7c
JK
1697Show the list of directories from which to load auto-loaded scripts."),
1698 scripts_directory_help,
7349ff92
JK
1699 set_auto_load_dir, show_auto_load_dir,
1700 auto_load_set_cmdlist_get (),
1701 auto_load_show_cmdlist_get ());
9a950c7c 1702 xfree (scripts_directory_help);
6dddc817
DE
1703 xfree (python_name_help);
1704 xfree (gdb_name_help);
ed3ef339 1705 xfree (guile_name_help);
7349ff92 1706
6dea1fbd 1707 auto_load_safe_path = xstrdup (AUTO_LOAD_SAFE_PATH);
bccbefd2
JK
1708 auto_load_safe_path_vec_update ();
1709 add_setshow_optional_filename_cmd ("safe-path", class_support,
1710 &auto_load_safe_path, _("\
9a950c7c
JK
1711Set the list of files and directories that are safe for auto-loading."), _("\
1712Show the list of files and directories that are safe for auto-loading."), _("\
bccbefd2
JK
1713Various files loaded automatically for the 'set auto-load ...' options must\n\
1714be located in one of the directories listed by this option. Warning will be\n\
af2c1515 1715printed and file will not be used otherwise.\n\
9a950c7c 1716You can mix both directory and filename entries.\n\
af2c1515
JK
1717Setting this parameter to an empty list resets it to its default value.\n\
1718Setting this parameter to '/' (without the quotes) allows any file\n\
9a950c7c 1719for the 'set auto-load ...' options. Each path entry can be also shell\n\
202cbf1c 1720wildcard pattern; '*' does not match directory separator.\n\
bccbefd2
JK
1721This option is ignored for the kinds of files having 'set auto-load ... off'.\n\
1722This options has security implications for untrusted inferiors."),
1723 set_auto_load_safe_path,
1724 show_auto_load_safe_path,
1725 auto_load_set_cmdlist_get (),
1726 auto_load_show_cmdlist_get ());
6dea1fbd 1727 observer_attach_gdb_datadir_changed (auto_load_gdb_datadir_changed);
bccbefd2
JK
1728
1729 cmd = add_cmd ("add-auto-load-safe-path", class_support,
1730 add_auto_load_safe_path,
1731 _("Add entries to the list of directories from which it is safe "
1732 "to auto-load files.\n\
1733See the commands 'set auto-load safe-path' and 'show auto-load safe-path' to\n\
1734access the current full list setting."),
1735 &cmdlist);
1736 set_cmd_completer (cmd, filename_completer);
4dc84fd1 1737
f10c5b19
JK
1738 cmd = add_cmd ("add-auto-load-scripts-directory", class_support,
1739 add_auto_load_dir,
1740 _("Add entries to the list of directories from which to load "
1741 "auto-loaded scripts.\n\
1742See the commands 'set auto-load scripts-directory' and\n\
1743'show auto-load scripts-directory' to access the current full list setting."),
1744 &cmdlist);
1745 set_cmd_completer (cmd, filename_completer);
1746
4dc84fd1
JK
1747 add_setshow_boolean_cmd ("auto-load", class_maintenance,
1748 &debug_auto_load, _("\
1749Set auto-load verifications debugging."), _("\
1750Show auto-load verifications debugging."), _("\
1751When non-zero, debugging output for files of 'set auto-load ...'\n\
1752is displayed."),
1753 NULL, show_debug_auto_load,
1754 &setdebuglist, &showdebuglist);
e2207b9a 1755}
This page took 0.651933 seconds and 4 git commands to generate.