daily update
[deliverable/binutils-gdb.git] / gdb / solib.c
CommitLineData
13437d4b 1/* Handle shared libraries for GDB, the GNU Debugger.
14a5e767 2
6aba47ca 3 Copyright (C) 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999,
0fb0cc75 4 2000, 2001, 2002, 2003, 2005, 2006, 2007, 2008, 2009
9b254dd1 5 Free Software Foundation, Inc.
c906108c 6
c5aa993b 7 This file is part of GDB.
c906108c 8
c5aa993b
JM
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
a9762ec7 11 the Free Software Foundation; either version 3 of the License, or
c5aa993b 12 (at your option) any later version.
c906108c 13
c5aa993b
JM
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License
a9762ec7 20 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c 21
c906108c
SS
22#include "defs.h"
23
c906108c 24#include <sys/types.h>
c906108c 25#include <fcntl.h>
13437d4b 26#include "gdb_string.h"
c906108c
SS
27#include "symtab.h"
28#include "bfd.h"
29#include "symfile.h"
30#include "objfiles.h"
60250e8b 31#include "exceptions.h"
c906108c
SS
32#include "gdbcore.h"
33#include "command.h"
34#include "target.h"
35#include "frame.h"
88987551 36#include "gdb_regex.h"
c906108c
SS
37#include "inferior.h"
38#include "environ.h"
39#include "language.h"
40#include "gdbcmd.h"
fa58ee11 41#include "completer.h"
fe4e3eb8 42#include "filenames.h" /* for DOSish file names */
4646aa9d 43#include "exec.h"
13437d4b 44#include "solist.h"
84acb35a 45#include "observer.h"
dbda9972 46#include "readline/readline.h"
f1838a98 47#include "remote.h"
c906108c 48
66aba65d
MK
49/* Architecture-specific operations. */
50
51/* Per-architecture data key. */
52static struct gdbarch_data *solib_data;
53
54static void *
55solib_init (struct obstack *obstack)
56{
57 struct target_so_ops **ops;
58
59 ops = OBSTACK_ZALLOC (obstack, struct target_so_ops *);
60 *ops = current_target_so_ops;
61 return ops;
62}
63
64static struct target_so_ops *
65solib_ops (struct gdbarch *gdbarch)
66{
67 struct target_so_ops **ops = gdbarch_data (gdbarch, solib_data);
68 return *ops;
69}
7d522c90
DJ
70
71/* Set the solib operations for GDBARCH to NEW_OPS. */
72
73void
74set_solib_ops (struct gdbarch *gdbarch, struct target_so_ops *new_ops)
75{
76 struct target_so_ops **ops = gdbarch_data (gdbarch, solib_data);
77 *ops = new_ops;
78}
66aba65d
MK
79\f
80
13437d4b 81/* external data declarations */
c906108c 82
7d522c90
DJ
83/* FIXME: gdbarch needs to control this variable, or else every
84 configuration needs to call set_solib_ops. */
13437d4b 85struct target_so_ops *current_target_so_ops;
23e04971
MS
86
87/* local data declarations */
07cd4b97 88
c906108c 89static struct so_list *so_list_head; /* List of known shared objects */
23e04971 90
c906108c
SS
91/* Local function prototypes */
92
c906108c
SS
93/* If non-empty, this is a search path for loading non-absolute shared library
94 symbol files. This takes precedence over the environment variables PATH
95 and LD_LIBRARY_PATH. */
96static char *solib_search_path = NULL;
920d2a44
AC
97static void
98show_solib_search_path (struct ui_file *file, int from_tty,
99 struct cmd_list_element *c, const char *value)
100{
101 fprintf_filtered (file, _("\
102The search path for loading non-absolute shared library symbol files is %s.\n"),
103 value);
104}
c906108c 105
e4f7b8c8
MS
106/*
107
108 GLOBAL FUNCTION
109
572d275c 110 solib_find -- Find a shared library file.
e4f7b8c8
MS
111
112 SYNOPSIS
113
572d275c 114 char *solib_find (char *in_pathname, int *fd);
e4f7b8c8
MS
115
116 DESCRIPTION
117
f822c95b 118 Global variable GDB_SYSROOT is used as a prefix directory
e4f7b8c8
MS
119 to search for shared libraries if they have an absolute path.
120
121 Global variable SOLIB_SEARCH_PATH is used as a prefix directory
122 (or set of directories, as in LD_LIBRARY_PATH) to search for all
f822c95b 123 shared libraries if not found in GDB_SYSROOT.
e4f7b8c8 124
c8c18e65 125 Search algorithm:
f822c95b
DJ
126 * If there is a gdb_sysroot and path is absolute:
127 * Search for gdb_sysroot/path.
c8c18e65
KW
128 * else
129 * Look for it literally (unmodified).
e4f7b8c8 130 * Look in SOLIB_SEARCH_PATH.
f43caff8 131 * If available, use target defined search function.
f822c95b 132 * If gdb_sysroot is NOT set, perform the following two searches:
c8c18e65
KW
133 * Look in inferior's $PATH.
134 * Look in inferior's $LD_LIBRARY_PATH.
135 *
136 * The last check avoids doing this search when targetting remote
f822c95b 137 * machines since gdb_sysroot will almost always be set.
e4f7b8c8
MS
138
139 RETURNS
b21f0843 140
572d275c
UW
141 Full pathname of the shared library file, or NULL if not found.
142 (The pathname is malloc'ed; it needs to be freed by the caller.)
143 *FD is set to either -1 or an open file handle for the library. */
e4f7b8c8 144
572d275c
UW
145char *
146solib_find (char *in_pathname, int *fd)
e4f7b8c8 147{
1cf3db46 148 struct target_so_ops *ops = solib_ops (target_gdbarch);
e4f7b8c8
MS
149 int found_file = -1;
150 char *temp_pathname = NULL;
f822c95b 151 int gdb_sysroot_is_empty;
58dc52c3 152
f822c95b 153 gdb_sysroot_is_empty = (gdb_sysroot == NULL || *gdb_sysroot == 0);
e4f7b8c8 154
f822c95b 155 if (! IS_ABSOLUTE_PATH (in_pathname) || gdb_sysroot_is_empty)
f1d10cfb
AS
156 temp_pathname = in_pathname;
157 else
e4f7b8c8 158 {
f822c95b 159 int prefix_len = strlen (gdb_sysroot);
f1d10cfb
AS
160
161 /* Remove trailing slashes from absolute prefix. */
162 while (prefix_len > 0
f822c95b 163 && IS_DIR_SEPARATOR (gdb_sysroot[prefix_len - 1]))
f1d10cfb
AS
164 prefix_len--;
165
166 /* Cat the prefixed pathname together. */
167 temp_pathname = alloca (prefix_len + strlen (in_pathname) + 1);
f822c95b 168 strncpy (temp_pathname, gdb_sysroot, prefix_len);
f1d10cfb
AS
169 temp_pathname[prefix_len] = '\0';
170 strcat (temp_pathname, in_pathname);
e4f7b8c8
MS
171 }
172
f1838a98
UW
173 /* Handle remote files. */
174 if (remote_filename_p (temp_pathname))
175 {
572d275c
UW
176 *fd = -1;
177 return xstrdup (temp_pathname);
f1838a98
UW
178 }
179
f1d10cfb
AS
180 /* Now see if we can open it. */
181 found_file = open (temp_pathname, O_RDONLY | O_BINARY, 0);
182
0997b535
MS
183 /* We try to find the library in various ways. After each attempt
184 (except for the one above), either found_file >= 0 and
185 temp_pathname is a malloc'd string, or found_file < 0 and
186 temp_pathname does not point to storage that needs to be
187 freed. */
188
189 if (found_file < 0)
190 temp_pathname = NULL;
191 else
192 temp_pathname = xstrdup (temp_pathname);
193
f822c95b 194 /* If the search in gdb_sysroot failed, and the path name is
ba5f0d88
OF
195 absolute at this point, make it relative. (openp will try and open the
196 file according to its absolute path otherwise, which is not what we want.)
197 Affects subsequent searches for this solib. */
198 if (found_file < 0 && IS_ABSOLUTE_PATH (in_pathname))
199 {
200 /* First, get rid of any drive letters etc. */
201 while (!IS_DIR_SEPARATOR (*in_pathname))
202 in_pathname++;
203
204 /* Next, get rid of all leading dir separators. */
205 while (IS_DIR_SEPARATOR (*in_pathname))
206 in_pathname++;
207 }
208
c8c18e65 209 /* If not found, search the solib_search_path (if any). */
e4f7b8c8 210 if (found_file < 0 && solib_search_path != NULL)
014d698b 211 found_file = openp (solib_search_path, OPF_TRY_CWD_FIRST,
637d6690 212 in_pathname, O_RDONLY | O_BINARY, 0, &temp_pathname);
ba5f0d88
OF
213
214 /* If not found, next search the solib_search_path (if any) for the basename
215 only (ignoring the path). This is to allow reading solibs from a path
216 that differs from the opened path. */
217 if (found_file < 0 && solib_search_path != NULL)
014d698b 218 found_file = openp (solib_search_path, OPF_TRY_CWD_FIRST,
637d6690 219 lbasename (in_pathname), O_RDONLY | O_BINARY, 0,
ba5f0d88 220 &temp_pathname);
e4f7b8c8 221
2610b0bf 222 /* If not found, try to use target supplied solib search method */
66aba65d 223 if (found_file < 0 && ops->find_and_open_solib)
637d6690 224 found_file = ops->find_and_open_solib (in_pathname, O_RDONLY | O_BINARY,
66aba65d 225 &temp_pathname);
2610b0bf 226
e4f7b8c8 227 /* If not found, next search the inferior's $PATH environment variable. */
f822c95b 228 if (found_file < 0 && gdb_sysroot_is_empty)
e4f7b8c8 229 found_file = openp (get_in_environ (inferior_environ, "PATH"),
637d6690 230 OPF_TRY_CWD_FIRST, in_pathname, O_RDONLY | O_BINARY, 0,
014d698b 231 &temp_pathname);
e4f7b8c8
MS
232
233 /* If not found, next search the inferior's $LD_LIBRARY_PATH
234 environment variable. */
f822c95b 235 if (found_file < 0 && gdb_sysroot_is_empty)
e4f7b8c8 236 found_file = openp (get_in_environ (inferior_environ, "LD_LIBRARY_PATH"),
637d6690 237 OPF_TRY_CWD_FIRST, in_pathname, O_RDONLY | O_BINARY, 0,
014d698b 238 &temp_pathname);
e4f7b8c8 239
572d275c
UW
240 *fd = found_file;
241 return temp_pathname;
242}
243
244/* Open and return a BFD for the shared library PATHNAME. If FD is not -1,
245 it is used as file handle to open the file. Throws an error if the file
246 could not be opened. Handles both local and remote file access.
247
248 PATHNAME must be malloc'ed by the caller. If successful, the new BFD's
249 name will point to it. If unsuccessful, PATHNAME will be freed and the
250 FD will be closed (unless FD was -1). */
251
252bfd *
253solib_bfd_fopen (char *pathname, int fd)
254{
255 bfd *abfd;
256
257 if (remote_filename_p (pathname))
258 {
259 gdb_assert (fd == -1);
260 abfd = remote_bfd_open (pathname, gnutarget);
261 }
262 else
263 {
264 abfd = bfd_fopen (pathname, gnutarget, FOPEN_RB, fd);
265
266 if (abfd)
267 bfd_set_cacheable (abfd, 1);
268 else if (fd != -1)
269 close (fd);
270 }
f1838a98 271
f1838a98
UW
272 if (!abfd)
273 {
572d275c 274 make_cleanup (xfree, pathname);
f1838a98 275 error (_("Could not open `%s' as an executable file: %s"),
572d275c 276 pathname, bfd_errmsg (bfd_get_error ()));
f1838a98
UW
277 }
278
572d275c
UW
279 return abfd;
280}
281
282/* Find shared library PATHNAME and open a BFD for it. */
283
284bfd *
285solib_bfd_open (char *pathname)
286{
287 struct target_so_ops *ops = solib_ops (target_gdbarch);
288 char *found_pathname;
289 int found_file;
290 bfd *abfd;
291
292 /* Use target-specific override if present. */
293 if (ops->bfd_open)
294 return ops->bfd_open (pathname);
295
296 /* Search for shared library file. */
297 found_pathname = solib_find (pathname, &found_file);
298 if (found_pathname == NULL)
299 perror_with_name (pathname);
300
301 /* Open bfd for shared library. */
302 abfd = solib_bfd_fopen (found_pathname, found_file);
303
304 /* Check bfd format. */
f1838a98 305 if (!bfd_check_format (abfd, bfd_object))
0997b535 306 {
f1838a98 307 bfd_close (abfd);
572d275c 308 make_cleanup (xfree, found_pathname);
f1838a98 309 error (_("`%s': not in executable format: %s"),
572d275c 310 found_pathname, bfd_errmsg (bfd_get_error ()));
0997b535 311 }
f1838a98 312
f1838a98 313 return abfd;
e4f7b8c8
MS
314}
315
316
c906108c
SS
317/*
318
c5aa993b 319 LOCAL FUNCTION
c906108c 320
c5aa993b 321 solib_map_sections -- open bfd and build sections for shared lib
c906108c 322
c5aa993b 323 SYNOPSIS
c906108c 324
c5aa993b 325 static int solib_map_sections (struct so_list *so)
c906108c 326
c5aa993b 327 DESCRIPTION
c906108c 328
c5aa993b
JM
329 Given a pointer to one of the shared objects in our list
330 of mapped objects, use the recorded name to open a bfd
331 descriptor for the object, build a section table, and then
332 relocate all the section addresses by the base address at
333 which the shared object was mapped.
c906108c 334
c5aa993b 335 FIXMES
c906108c 336
c5aa993b
JM
337 In most (all?) cases the shared object file name recorded in the
338 dynamic linkage tables will be a fully qualified pathname. For
339 cases where it isn't, do we really mimic the systems search
340 mechanism correctly in the below code (particularly the tilde
341 expansion stuff?).
c906108c
SS
342 */
343
344static int
4efb68b1 345solib_map_sections (void *arg)
c906108c
SS
346{
347 struct so_list *so = (struct so_list *) arg; /* catch_errors bogon */
348 char *filename;
c906108c
SS
349 struct section_table *p;
350 struct cleanup *old_chain;
351 bfd *abfd;
c5aa993b
JM
352
353 filename = tilde_expand (so->so_name);
b8c9b27d 354 old_chain = make_cleanup (xfree, filename);
f1838a98
UW
355 abfd = solib_bfd_open (filename);
356 do_cleanups (old_chain);
e4f7b8c8 357
13437d4b
KB
358 /* Leave bfd open, core_xfer_memory and "info files" need it. */
359 so->abfd = abfd;
23e04971 360
e4f7b8c8
MS
361 /* copy full path name into so_name, so that later symbol_file_add
362 can find it */
f1838a98
UW
363 if (strlen (bfd_get_filename (abfd)) >= SO_NAME_MAX_PATH_SIZE)
364 error (_("Shared library file name is too long."));
365 strcpy (so->so_name, bfd_get_filename (abfd));
23e04971 366
13437d4b 367 if (build_section_table (abfd, &so->sections, &so->sections_end))
23e04971 368 {
8a3fe4f8 369 error (_("Can't find the file sections in `%s': %s"),
13437d4b 370 bfd_get_filename (abfd), bfd_errmsg (bfd_get_error ()));
23e04971 371 }
104c1213 372
13437d4b 373 for (p = so->sections; p < so->sections_end; p++)
104c1213 374 {
1cf3db46 375 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 376
13437d4b
KB
377 /* Relocate the section binding addresses as recorded in the shared
378 object's file by the base address to which the object was actually
379 mapped. */
66aba65d 380 ops->relocate_section_addresses (so, p);
cfa9d6d9
DJ
381
382 /* If the target didn't provide information about the address
383 range of the shared object, assume we want the location of
384 the .text section. */
385 if (so->addr_low == 0 && so->addr_high == 0
386 && strcmp (p->the_bfd_section->name, ".text") == 0)
13437d4b 387 {
cfa9d6d9
DJ
388 so->addr_low = p->addr;
389 so->addr_high = p->endaddr;
13437d4b 390 }
104c1213
JM
391 }
392
13437d4b 393 return (1);
104c1213 394}
c906108c 395
07cd4b97 396/* LOCAL FUNCTION
c906108c 397
07cd4b97 398 free_so --- free a `struct so_list' object
c906108c 399
c5aa993b 400 SYNOPSIS
c906108c 401
07cd4b97 402 void free_so (struct so_list *so)
c906108c 403
c5aa993b 404 DESCRIPTION
c906108c 405
07cd4b97
JB
406 Free the storage associated with the `struct so_list' object SO.
407 If we have opened a BFD for SO, close it.
c906108c 408
07cd4b97
JB
409 The caller is responsible for removing SO from whatever list it is
410 a member of. If we have placed SO's sections in some target's
411 section table, the caller is responsible for removing them.
c906108c 412
07cd4b97
JB
413 This function doesn't mess with objfiles at all. If there is an
414 objfile associated with SO that needs to be removed, the caller is
415 responsible for taking care of that. */
416
13437d4b 417void
07cd4b97 418free_so (struct so_list *so)
c906108c 419{
1cf3db46 420 struct target_so_ops *ops = solib_ops (target_gdbarch);
07cd4b97 421 char *bfd_filename = 0;
c5aa993b 422
07cd4b97 423 if (so->sections)
b8c9b27d 424 xfree (so->sections);
07cd4b97
JB
425
426 if (so->abfd)
c906108c 427 {
07cd4b97
JB
428 bfd_filename = bfd_get_filename (so->abfd);
429 if (! bfd_close (so->abfd))
8a3fe4f8 430 warning (_("cannot close \"%s\": %s"),
07cd4b97 431 bfd_filename, bfd_errmsg (bfd_get_error ()));
c906108c 432 }
07cd4b97
JB
433
434 if (bfd_filename)
b8c9b27d 435 xfree (bfd_filename);
07cd4b97 436
66aba65d 437 ops->free_so (so);
07cd4b97 438
b8c9b27d 439 xfree (so);
c906108c
SS
440}
441
07cd4b97 442
f8766ec1
KB
443/* Return address of first so_list entry in master shared object list. */
444struct so_list *
445master_so_list (void)
446{
447 return so_list_head;
448}
449
450
c906108c
SS
451/* A small stub to get us past the arg-passing pinhole of catch_errors. */
452
453static int
4efb68b1 454symbol_add_stub (void *arg)
c906108c 455{
52f0bd74 456 struct so_list *so = (struct so_list *) arg; /* catch_errs bogon */
62557bbc 457 struct section_addr_info *sap;
c906108c 458
07cd4b97
JB
459 /* Have we already loaded this shared object? */
460 ALL_OBJFILES (so->objfile)
461 {
462 if (strcmp (so->objfile->name, so->so_name) == 0)
463 return 1;
464 }
465
62557bbc
KB
466 sap = build_section_addr_info_from_section_table (so->sections,
467 so->sections_end);
e7cf9df1 468
572d275c
UW
469 so->objfile = symbol_file_add_from_bfd (so->abfd, so->from_tty,
470 sap, 0, OBJF_SHARED | OBJF_KEEPBFD);
62557bbc 471 free_section_addr_info (sap);
c906108c 472
07cd4b97 473 return (1);
c906108c
SS
474}
475
42a6e6a0
MK
476/* Read in symbols for shared object SO. If FROM_TTY is non-zero, be
477 chatty about it. Return non-zero if any symbols were actually
478 loaded. */
479
480int
481solib_read_symbols (struct so_list *so, int from_tty)
482{
483 if (so->symbols_loaded)
484 {
485 if (from_tty)
a3f17187 486 printf_unfiltered (_("Symbols already loaded for %s\n"), so->so_name);
42a6e6a0 487 }
8bb75286
DJ
488 else if (so->abfd == NULL)
489 {
490 if (from_tty)
491 printf_unfiltered (_("Symbol file not found for %s\n"), so->so_name);
492 }
42a6e6a0
MK
493 else
494 {
495 if (catch_errors (symbol_add_stub, so,
496 "Error while reading shared library symbols:\n",
497 RETURN_MASK_ALL))
498 {
bf250677 499 if (from_tty && print_symbol_loading)
a3f17187 500 printf_unfiltered (_("Loaded symbols for %s\n"), so->so_name);
42a6e6a0
MK
501 so->symbols_loaded = 1;
502 return 1;
503 }
504 }
505
506 return 0;
507}
c906108c 508
07cd4b97 509/* LOCAL FUNCTION
c906108c 510
105b175f 511 update_solib_list --- synchronize GDB's shared object list with inferior's
c906108c 512
c5aa993b 513 SYNOPSIS
c906108c 514
105b175f 515 void update_solib_list (int from_tty, struct target_ops *TARGET)
c906108c 516
07cd4b97 517 Extract the list of currently loaded shared objects from the
105b175f
JB
518 inferior, and compare it with the list of shared objects currently
519 in GDB's so_list_head list. Edit so_list_head to bring it in sync
520 with the inferior's new list.
c906108c 521
105b175f
JB
522 If we notice that the inferior has unloaded some shared objects,
523 free any symbolic info GDB had read about those shared objects.
524
525 Don't load symbolic info for any new shared objects; just add them
526 to the list, and leave their symbols_loaded flag clear.
07cd4b97
JB
527
528 If FROM_TTY is non-null, feel free to print messages about what
529 we're doing.
c906108c 530
07cd4b97
JB
531 If TARGET is non-null, add the sections of all new shared objects
532 to TARGET's section table. Note that this doesn't remove any
533 sections for shared objects that have been unloaded, and it
534 doesn't check to see if the new shared objects are already present in
535 the section table. But we only use this for core files and
536 processes we've just attached to, so that's okay. */
c906108c 537
a78f21af 538static void
105b175f 539update_solib_list (int from_tty, struct target_ops *target)
07cd4b97 540{
1cf3db46 541 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 542 struct so_list *inferior = ops->current_sos();
07cd4b97
JB
543 struct so_list *gdb, **gdb_link;
544
181e7f93
PA
545 /* We can reach here due to changing solib-search-path or the
546 sysroot, before having any inferior. */
50c71eaf 547 if (target_has_execution && !ptid_equal (inferior_ptid, null_ptid))
181e7f93
PA
548 {
549 struct inferior *inf = current_inferior ();
550
551 /* If we are attaching to a running process for which we
552 have not opened a symbol file, we may be able to get its
553 symbols now! */
554 if (inf->attach_flag && symfile_objfile == NULL)
555 catch_errors (ops->open_symbol_file_object, &from_tty,
556 "Error reading attached process's symbol file.\n",
557 RETURN_MASK_ALL);
558 }
104c1213 559
07cd4b97
JB
560 /* GDB and the inferior's dynamic linker each maintain their own
561 list of currently loaded shared objects; we want to bring the
562 former in sync with the latter. Scan both lists, seeing which
563 shared objects appear where. There are three cases:
564
565 - A shared object appears on both lists. This means that GDB
105b175f
JB
566 knows about it already, and it's still loaded in the inferior.
567 Nothing needs to happen.
07cd4b97
JB
568
569 - A shared object appears only on GDB's list. This means that
105b175f
JB
570 the inferior has unloaded it. We should remove the shared
571 object from GDB's tables.
07cd4b97
JB
572
573 - A shared object appears only on the inferior's list. This
105b175f
JB
574 means that it's just been loaded. We should add it to GDB's
575 tables.
07cd4b97
JB
576
577 So we walk GDB's list, checking each entry to see if it appears
578 in the inferior's list too. If it does, no action is needed, and
579 we remove it from the inferior's list. If it doesn't, the
580 inferior has unloaded it, and we remove it from GDB's list. By
581 the time we're done walking GDB's list, the inferior's list
582 contains only the new shared objects, which we then add. */
583
584 gdb = so_list_head;
585 gdb_link = &so_list_head;
586 while (gdb)
c906108c 587 {
07cd4b97
JB
588 struct so_list *i = inferior;
589 struct so_list **i_link = &inferior;
590
591 /* Check to see whether the shared object *gdb also appears in
592 the inferior's current list. */
593 while (i)
c906108c 594 {
a7c02bc8
VP
595 if (ops->same)
596 {
597 if (ops->same (gdb, i))
598 break;
599 }
600 else
601 {
602 if (! strcmp (gdb->so_original_name, i->so_original_name))
603 break;
604 }
07cd4b97
JB
605
606 i_link = &i->next;
607 i = *i_link;
c906108c 608 }
c5aa993b 609
07cd4b97
JB
610 /* If the shared object appears on the inferior's list too, then
611 it's still loaded, so we don't need to do anything. Delete
612 it from the inferior's list, and leave it on GDB's list. */
613 if (i)
c906108c 614 {
07cd4b97 615 *i_link = i->next;
07cd4b97
JB
616 free_so (i);
617 gdb_link = &gdb->next;
618 gdb = *gdb_link;
619 }
620
621 /* If it's not on the inferior's list, remove it from GDB's tables. */
622 else
623 {
42a6e6a0
MK
624 /* Notify any observer that the shared object has been
625 unloaded before we remove it from GDB's tables. */
84acb35a
JJ
626 observer_notify_solib_unloaded (gdb);
627
07cd4b97 628 *gdb_link = gdb->next;
07cd4b97
JB
629
630 /* Unless the user loaded it explicitly, free SO's objfile. */
e8930304 631 if (gdb->objfile && ! (gdb->objfile->flags & OBJF_USERLOADED))
07cd4b97
JB
632 free_objfile (gdb->objfile);
633
634 /* Some targets' section tables might be referring to
635 sections from so->abfd; remove them. */
636 remove_target_sections (gdb->abfd);
637
638 free_so (gdb);
639 gdb = *gdb_link;
c906108c
SS
640 }
641 }
c5aa993b 642
07cd4b97
JB
643 /* Now the inferior's list contains only shared objects that don't
644 appear in GDB's list --- those that are newly loaded. Add them
e8930304 645 to GDB's shared object list. */
07cd4b97 646 if (inferior)
c906108c 647 {
07cd4b97
JB
648 struct so_list *i;
649
650 /* Add the new shared objects to GDB's list. */
651 *gdb_link = inferior;
652
e8930304 653 /* Fill in the rest of each of the `struct so_list' nodes. */
07cd4b97 654 for (i = inferior; i; i = i->next)
c906108c 655 {
07cd4b97
JB
656 i->from_tty = from_tty;
657
658 /* Fill in the rest of the `struct so_list' node. */
659 catch_errors (solib_map_sections, i,
660 "Error while mapping shared library sections:\n",
661 RETURN_MASK_ALL);
07cd4b97 662
b41be06e
ND
663 /* If requested, add the shared object's sections to the TARGET's
664 section table. Do this immediately after mapping the object so
665 that later nodes in the list can query this object, as is needed
666 in solib-osf.c. */
667 if (target)
c906108c 668 {
b41be06e
ND
669 int count = (i->sections_end - i->sections);
670 if (count > 0)
07cd4b97 671 {
b41be06e 672 int space = target_resize_to_sections (target, count);
07cd4b97
JB
673 memcpy (target->to_sections + space,
674 i->sections,
675 count * sizeof (i->sections[0]));
07cd4b97 676 }
c906108c 677 }
42a6e6a0
MK
678
679 /* Notify any observer that the shared object has been
680 loaded now that we've added it to GDB's tables. */
681 observer_notify_solib_loaded (i);
c906108c 682 }
e8930304 683 }
105b175f
JB
684}
685
6612ad7f
JB
686/* Return non-zero if SO is the libpthread shared library.
687
688 Uses a fairly simplistic heuristic approach where we check
689 the file name against "/libpthread". This can lead to false
690 positives, but this should be good enough in practice. */
691
692static int
693libpthread_solib_p (struct so_list *so)
694{
695 return (strstr (so->so_name, "/libpthread") != NULL);
696}
105b175f
JB
697
698/* GLOBAL FUNCTION
699
700 solib_add -- read in symbol info for newly added shared libraries
701
702 SYNOPSIS
703
990f9fe3
FF
704 void solib_add (char *pattern, int from_tty, struct target_ops
705 *TARGET, int readsyms)
105b175f
JB
706
707 DESCRIPTION
708
709 Read in symbolic information for any shared objects whose names
710 match PATTERN. (If we've already read a shared object's symbol
711 info, leave it alone.) If PATTERN is zero, read them all.
712
990f9fe3
FF
713 If READSYMS is 0, defer reading symbolic information until later
714 but still do any needed low level processing.
715
105b175f
JB
716 FROM_TTY and TARGET are as described for update_solib_list, above. */
717
718void
990f9fe3 719solib_add (char *pattern, int from_tty, struct target_ops *target, int readsyms)
105b175f
JB
720{
721 struct so_list *gdb;
722
723 if (pattern)
724 {
725 char *re_err = re_comp (pattern);
726
727 if (re_err)
8a3fe4f8 728 error (_("Invalid regexp: %s"), re_err);
105b175f
JB
729 }
730
731 update_solib_list (from_tty, target);
c906108c 732
105b175f
JB
733 /* Walk the list of currently loaded shared libraries, and read
734 symbols for any that match the pattern --- or any whose symbols
735 aren't already loaded, if no pattern was given. */
e8930304
JB
736 {
737 int any_matches = 0;
738 int loaded_any_symbols = 0;
c906108c 739
e8930304
JB
740 for (gdb = so_list_head; gdb; gdb = gdb->next)
741 if (! pattern || re_exec (gdb->so_name))
742 {
6612ad7f
JB
743 /* Normally, we would read the symbols from that library
744 only if READSYMS is set. However, we're making a small
745 exception for the pthread library, because we sometimes
746 need the library symbols to be loaded in order to provide
747 thread support (x86-linux for instance). */
748 const int add_this_solib =
749 (readsyms || libpthread_solib_p (gdb));
750
e8930304 751 any_matches = 1;
6612ad7f 752 if (add_this_solib && solib_read_symbols (gdb, from_tty))
42a6e6a0 753 loaded_any_symbols = 1;
e8930304
JB
754 }
755
756 if (from_tty && pattern && ! any_matches)
757 printf_unfiltered
758 ("No loaded shared libraries match the pattern `%s'.\n", pattern);
759
760 if (loaded_any_symbols)
761 {
1cf3db46 762 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 763
e8930304
JB
764 /* Getting new symbols may change our opinion about what is
765 frameless. */
766 reinit_frame_cache ();
767
66aba65d 768 ops->special_symbol_handling ();
e8930304
JB
769 }
770 }
c906108c
SS
771}
772
07cd4b97 773
c906108c
SS
774/*
775
c5aa993b 776 LOCAL FUNCTION
c906108c 777
c5aa993b 778 info_sharedlibrary_command -- code for "info sharedlibrary"
c906108c 779
c5aa993b 780 SYNOPSIS
c906108c 781
c5aa993b 782 static void info_sharedlibrary_command ()
c906108c 783
c5aa993b 784 DESCRIPTION
c906108c 785
c5aa993b
JM
786 Walk through the shared library list and print information
787 about each attached library.
788 */
c906108c
SS
789
790static void
fba45db2 791info_sharedlibrary_command (char *ignore, int from_tty)
c906108c 792{
52f0bd74 793 struct so_list *so = NULL; /* link map state variable */
c906108c
SS
794 int header_done = 0;
795 int addr_width;
c906108c 796
84eb3c4f 797 /* "0x", a little whitespace, and two hex digits per byte of pointers. */
1cf3db46 798 addr_width = 4 + (gdbarch_ptr_bit (target_gdbarch) / 4);
c906108c 799
105b175f 800 update_solib_list (from_tty, 0);
07cd4b97
JB
801
802 for (so = so_list_head; so; so = so->next)
c906108c 803 {
c5aa993b 804 if (so->so_name[0])
c906108c
SS
805 {
806 if (!header_done)
807 {
c5aa993b
JM
808 printf_unfiltered ("%-*s%-*s%-12s%s\n", addr_width, "From",
809 addr_width, "To", "Syms Read",
810 "Shared Object Library");
c906108c
SS
811 header_done++;
812 }
813
814 printf_unfiltered ("%-*s", addr_width,
cfa9d6d9 815 so->addr_high != 0
bb599908 816 ? hex_string_custom (
cfa9d6d9 817 (LONGEST) so->addr_low,
bb599908 818 addr_width - 4)
749499cb 819 : "");
c906108c 820 printf_unfiltered ("%-*s", addr_width,
cfa9d6d9 821 so->addr_high != 0
bb599908 822 ? hex_string_custom (
cfa9d6d9 823 (LONGEST) so->addr_high,
bb599908 824 addr_width - 4)
749499cb 825 : "");
c5aa993b
JM
826 printf_unfiltered ("%-12s", so->symbols_loaded ? "Yes" : "No");
827 printf_unfiltered ("%s\n", so->so_name);
c906108c
SS
828 }
829 }
830 if (so_list_head == NULL)
831 {
a3f17187 832 printf_unfiltered (_("No shared libraries loaded at this time.\n"));
c906108c
SS
833 }
834}
835
836/*
837
c5aa993b 838 GLOBAL FUNCTION
c906108c 839
c5aa993b 840 solib_address -- check to see if an address is in a shared lib
c906108c 841
c5aa993b 842 SYNOPSIS
c906108c 843
c5aa993b 844 char * solib_address (CORE_ADDR address)
c906108c 845
c5aa993b 846 DESCRIPTION
c906108c 847
c5aa993b
JM
848 Provides a hook for other gdb routines to discover whether or
849 not a particular address is within the mapped address space of
749499cb 850 a shared library.
c906108c 851
c5aa993b
JM
852 For example, this routine is called at one point to disable
853 breakpoints which are in shared libraries that are not currently
854 mapped in.
c906108c
SS
855 */
856
857char *
fba45db2 858solib_address (CORE_ADDR address)
c906108c 859{
52f0bd74 860 struct so_list *so = 0; /* link map state variable */
c5aa993b 861
07cd4b97 862 for (so = so_list_head; so; so = so->next)
c906108c 863 {
749499cb
KB
864 struct section_table *p;
865
866 for (p = so->sections; p < so->sections_end; p++)
867 {
868 if (p->addr <= address && address < p->endaddr)
869 return (so->so_name);
870 }
c906108c 871 }
07cd4b97 872
c906108c
SS
873 return (0);
874}
875
876/* Called by free_all_symtabs */
877
c5aa993b 878void
fba45db2 879clear_solib (void)
c906108c 880{
1cf3db46 881 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 882
085dd6e6
JM
883 /* This function is expected to handle ELF shared libraries. It is
884 also used on Solaris, which can run either ELF or a.out binaries
885 (for compatibility with SunOS 4), both of which can use shared
886 libraries. So we don't know whether we have an ELF executable or
887 an a.out executable until the user chooses an executable file.
888
889 ELF shared libraries don't get mapped into the address space
890 until after the program starts, so we'd better not try to insert
891 breakpoints in them immediately. We have to wait until the
892 dynamic linker has loaded them; we'll hit a bp_shlib_event
893 breakpoint (look for calls to create_solib_event_breakpoint) when
894 it's ready.
895
896 SunOS shared libraries seem to be different --- they're present
897 as soon as the process begins execution, so there's no need to
898 put off inserting breakpoints. There's also nowhere to put a
899 bp_shlib_event breakpoint, so if we put it off, we'll never get
900 around to it.
901
902 So: disable breakpoints only if we're using ELF shared libs. */
903 if (exec_bfd != NULL
904 && bfd_get_flavour (exec_bfd) != bfd_target_aout_flavour)
cb851954 905 disable_breakpoints_in_shlibs ();
085dd6e6 906
c906108c
SS
907 while (so_list_head)
908 {
07cd4b97
JB
909 struct so_list *so = so_list_head;
910 so_list_head = so->next;
c86cf029 911 observer_notify_solib_unloaded (so);
2069d78d
KB
912 if (so->abfd)
913 remove_target_sections (so->abfd);
07cd4b97 914 free_so (so);
c906108c 915 }
07cd4b97 916
66aba65d 917 ops->clear_solib ();
c906108c
SS
918}
919
13437d4b 920/* GLOBAL FUNCTION
c5aa993b
JM
921
922 solib_create_inferior_hook -- shared library startup support
923
924 SYNOPSIS
925
7095b863 926 void solib_create_inferior_hook ()
c5aa993b
JM
927
928 DESCRIPTION
929
930 When gdb starts up the inferior, it nurses it along (through the
931 shell) until it is ready to execute it's first instruction. At this
932 point, this function gets called via expansion of the macro
13437d4b 933 SOLIB_CREATE_INFERIOR_HOOK. */
c5aa993b
JM
934
935void
fba45db2 936solib_create_inferior_hook (void)
c906108c 937{
1cf3db46 938 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 939 ops->solib_create_inferior_hook();
c906108c
SS
940}
941
d7fa2ae2
KB
942/* GLOBAL FUNCTION
943
944 in_solib_dynsym_resolve_code -- check to see if an address is in
945 dynamic loader's dynamic symbol
946 resolution code
947
948 SYNOPSIS
949
950 int in_solib_dynsym_resolve_code (CORE_ADDR pc)
951
952 DESCRIPTION
953
954 Determine if PC is in the dynamic linker's symbol resolution
955 code. Return 1 if so, 0 otherwise.
956*/
957
958int
959in_solib_dynsym_resolve_code (CORE_ADDR pc)
960{
1cf3db46 961 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 962 return ops->in_dynsym_resolve_code (pc);
d7fa2ae2 963}
c906108c
SS
964
965/*
966
c5aa993b 967 LOCAL FUNCTION
c906108c 968
c5aa993b 969 sharedlibrary_command -- handle command to explicitly add library
c906108c 970
c5aa993b 971 SYNOPSIS
c906108c 972
c5aa993b 973 static void sharedlibrary_command (char *args, int from_tty)
c906108c 974
c5aa993b 975 DESCRIPTION
c906108c 976
c5aa993b 977 */
c906108c
SS
978
979static void
fba45db2 980sharedlibrary_command (char *args, int from_tty)
c906108c
SS
981{
982 dont_repeat ();
990f9fe3 983 solib_add (args, from_tty, (struct target_ops *) 0, 1);
c906108c
SS
984}
985
cb0ba49e
MS
986/* LOCAL FUNCTION
987
988 no_shared_libraries -- handle command to explicitly discard symbols
989 from shared libraries.
990
991 DESCRIPTION
992
993 Implements the command "nosharedlibrary", which discards symbols
994 that have been auto-loaded from shared libraries. Symbols from
995 shared libraries that were added by explicit request of the user
996 are not discarded. Also called from remote.c. */
997
c60a7562
MS
998void
999no_shared_libraries (char *ignored, int from_tty)
1000{
1001 objfile_purge_solibs ();
615b9dba 1002 clear_solib ();
c60a7562 1003}
c906108c 1004
cf466558 1005static void
f397e303
AC
1006reload_shared_libraries (char *ignored, int from_tty,
1007 struct cmd_list_element *e)
cf466558
KB
1008{
1009 no_shared_libraries (NULL, from_tty);
1010 solib_add (NULL, from_tty, NULL, auto_solib_add);
1011}
1012
920d2a44
AC
1013static void
1014show_auto_solib_add (struct ui_file *file, int from_tty,
1015 struct cmd_list_element *c, const char *value)
1016{
1017 fprintf_filtered (file, _("Autoloading of shared library symbols is %s.\n"),
1018 value);
1019}
1020
1021
3a40aaa0
UW
1022/* Handler for library-specific lookup of global symbol NAME in OBJFILE. Call
1023 the library-specific handler if it is installed for the current target. */
1024
1025struct symbol *
1026solib_global_lookup (const struct objfile *objfile,
1027 const char *name,
1028 const char *linkage_name,
21b556f4 1029 const domain_enum domain)
3a40aaa0 1030{
1cf3db46 1031 struct target_so_ops *ops = solib_ops (target_gdbarch);
3a40aaa0 1032
e8a92f7b 1033 if (ops->lookup_lib_global_symbol != NULL)
21b556f4 1034 return ops->lookup_lib_global_symbol (objfile, name, linkage_name, domain);
3a40aaa0
UW
1035 return NULL;
1036}
1037
1038
a78f21af
AC
1039extern initialize_file_ftype _initialize_solib; /* -Wmissing-prototypes */
1040
c906108c 1041void
fba45db2 1042_initialize_solib (void)
c906108c 1043{
fa58ee11
EZ
1044 struct cmd_list_element *c;
1045
66aba65d
MK
1046 solib_data = gdbarch_data_register_pre_init (solib_init);
1047
c906108c 1048 add_com ("sharedlibrary", class_files, sharedlibrary_command,
1bedd215 1049 _("Load shared object library symbols for files matching REGEXP."));
c5aa993b 1050 add_info ("sharedlibrary", info_sharedlibrary_command,
1bedd215 1051 _("Status of loaded shared object libraries."));
c60a7562 1052 add_com ("nosharedlibrary", class_files, no_shared_libraries,
1bedd215 1053 _("Unload all shared object library symbols."));
c906108c 1054
5bf193a2
AC
1055 add_setshow_boolean_cmd ("auto-solib-add", class_support,
1056 &auto_solib_add, _("\
1057Set autoloading of shared library symbols."), _("\
1058Show autoloading of shared library symbols."), _("\
b7209cb4
FF
1059If \"on\", symbols from all shared object libraries will be loaded\n\
1060automatically when the inferior begins execution, when the dynamic linker\n\
1061informs gdb that a new library has been loaded, or when attaching to the\n\
5bf193a2
AC
1062inferior. Otherwise, symbols must be loaded manually, using `sharedlibrary'."),
1063 NULL,
920d2a44 1064 show_auto_solib_add,
5bf193a2 1065 &setlist, &showlist);
c906108c 1066
f822c95b
DJ
1067 add_setshow_filename_cmd ("sysroot", class_support,
1068 &gdb_sysroot, _("\
1069Set an alternate system root."), _("\
1070Show the current system root."), _("\
1071The system root is used to load absolute shared library symbol files.\n\
1072For other (relative) files, you can add directories using\n\
1073`set solib-search-path'."),
f397e303
AC
1074 reload_shared_libraries,
1075 NULL,
1076 &setlist, &showlist);
c906108c 1077
f822c95b
DJ
1078 add_alias_cmd ("solib-absolute-prefix", "sysroot", class_support, 0,
1079 &setlist);
1080 add_alias_cmd ("solib-absolute-prefix", "sysroot", class_support, 0,
1081 &showlist);
030292b7 1082
525226b5
AC
1083 add_setshow_optional_filename_cmd ("solib-search-path", class_support,
1084 &solib_search_path, _("\
1085Set the search path for loading non-absolute shared library symbol files."), _("\
1086Show the search path for loading non-absolute shared library symbol files."), _("\
1087This takes precedence over the environment variables PATH and LD_LIBRARY_PATH."),
1088 reload_shared_libraries,
920d2a44 1089 show_solib_search_path,
525226b5 1090 &setlist, &showlist);
c906108c 1091}
This page took 0.876426 seconds and 4 git commands to generate.