2011-08-04 Pedro Alves <pedro@codesourcery.com>
[deliverable/binutils-gdb.git] / gdb / solib.c
CommitLineData
13437d4b 1/* Handle shared libraries for GDB, the GNU Debugger.
14a5e767 2
6aba47ca 3 Copyright (C) 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999,
7b6bb8da 4 2000, 2001, 2002, 2003, 2005, 2006, 2007, 2008, 2009, 2010, 2011
9b254dd1 5 Free Software Foundation, Inc.
c906108c 6
c5aa993b 7 This file is part of GDB.
c906108c 8
c5aa993b
JM
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
a9762ec7 11 the Free Software Foundation; either version 3 of the License, or
c5aa993b 12 (at your option) any later version.
c906108c 13
c5aa993b
JM
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License
a9762ec7 20 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c 21
c906108c
SS
22#include "defs.h"
23
c906108c 24#include <sys/types.h>
c906108c 25#include <fcntl.h>
13437d4b 26#include "gdb_string.h"
c906108c
SS
27#include "symtab.h"
28#include "bfd.h"
29#include "symfile.h"
30#include "objfiles.h"
60250e8b 31#include "exceptions.h"
c906108c
SS
32#include "gdbcore.h"
33#include "command.h"
34#include "target.h"
35#include "frame.h"
88987551 36#include "gdb_regex.h"
c906108c
SS
37#include "inferior.h"
38#include "environ.h"
39#include "language.h"
40#include "gdbcmd.h"
fa58ee11 41#include "completer.h"
fe4e3eb8 42#include "filenames.h" /* for DOSish file names */
4646aa9d 43#include "exec.h"
13437d4b 44#include "solist.h"
84acb35a 45#include "observer.h"
dbda9972 46#include "readline/readline.h"
f1838a98 47#include "remote.h"
2c0b251b 48#include "solib.h"
55333a84 49#include "interps.h"
ab38a727 50#include "filesystem.h"
c906108c 51
66aba65d
MK
52/* Architecture-specific operations. */
53
54/* Per-architecture data key. */
55static struct gdbarch_data *solib_data;
56
57static void *
58solib_init (struct obstack *obstack)
59{
60 struct target_so_ops **ops;
61
62 ops = OBSTACK_ZALLOC (obstack, struct target_so_ops *);
63 *ops = current_target_so_ops;
64 return ops;
65}
66
67static struct target_so_ops *
68solib_ops (struct gdbarch *gdbarch)
69{
70 struct target_so_ops **ops = gdbarch_data (gdbarch, solib_data);
433759f7 71
66aba65d
MK
72 return *ops;
73}
7d522c90
DJ
74
75/* Set the solib operations for GDBARCH to NEW_OPS. */
76
77void
78set_solib_ops (struct gdbarch *gdbarch, struct target_so_ops *new_ops)
79{
80 struct target_so_ops **ops = gdbarch_data (gdbarch, solib_data);
433759f7 81
7d522c90
DJ
82 *ops = new_ops;
83}
66aba65d
MK
84\f
85
13437d4b 86/* external data declarations */
c906108c 87
7d522c90
DJ
88/* FIXME: gdbarch needs to control this variable, or else every
89 configuration needs to call set_solib_ops. */
13437d4b 90struct target_so_ops *current_target_so_ops;
23e04971 91
6c95b8df
PA
92/* List of known shared objects */
93#define so_list_head current_program_space->so_list
23e04971 94
c906108c
SS
95/* Local function prototypes */
96
c906108c
SS
97/* If non-empty, this is a search path for loading non-absolute shared library
98 symbol files. This takes precedence over the environment variables PATH
99 and LD_LIBRARY_PATH. */
100static char *solib_search_path = NULL;
920d2a44
AC
101static void
102show_solib_search_path (struct ui_file *file, int from_tty,
103 struct cmd_list_element *c, const char *value)
104{
3e43a32a
MS
105 fprintf_filtered (file, _("The search path for loading non-absolute "
106 "shared library symbol files is %s.\n"),
920d2a44
AC
107 value);
108}
c906108c 109
ab38a727
PA
110/* Same as HAVE_DOS_BASED_FILE_SYSTEM, but useable as an rvalue. */
111#if (HAVE_DOS_BASED_FILE_SYSTEM)
112# define DOS_BASED_FILE_SYSTEM 1
113#else
114# define DOS_BASED_FILE_SYSTEM 0
115#endif
116
e4f7b8c8
MS
117/*
118
119 GLOBAL FUNCTION
120
572d275c 121 solib_find -- Find a shared library file.
e4f7b8c8
MS
122
123 SYNOPSIS
124
572d275c 125 char *solib_find (char *in_pathname, int *fd);
e4f7b8c8
MS
126
127 DESCRIPTION
128
f822c95b 129 Global variable GDB_SYSROOT is used as a prefix directory
e4f7b8c8
MS
130 to search for shared libraries if they have an absolute path.
131
132 Global variable SOLIB_SEARCH_PATH is used as a prefix directory
133 (or set of directories, as in LD_LIBRARY_PATH) to search for all
f822c95b 134 shared libraries if not found in GDB_SYSROOT.
e4f7b8c8 135
c8c18e65 136 Search algorithm:
f822c95b
DJ
137 * If there is a gdb_sysroot and path is absolute:
138 * Search for gdb_sysroot/path.
c8c18e65
KW
139 * else
140 * Look for it literally (unmodified).
e4f7b8c8 141 * Look in SOLIB_SEARCH_PATH.
f43caff8 142 * If available, use target defined search function.
f822c95b 143 * If gdb_sysroot is NOT set, perform the following two searches:
c8c18e65
KW
144 * Look in inferior's $PATH.
145 * Look in inferior's $LD_LIBRARY_PATH.
ab38a727 146 *
c8c18e65 147 * The last check avoids doing this search when targetting remote
f822c95b 148 * machines since gdb_sysroot will almost always be set.
e4f7b8c8
MS
149
150 RETURNS
b21f0843 151
572d275c
UW
152 Full pathname of the shared library file, or NULL if not found.
153 (The pathname is malloc'ed; it needs to be freed by the caller.)
154 *FD is set to either -1 or an open file handle for the library. */
e4f7b8c8 155
572d275c
UW
156char *
157solib_find (char *in_pathname, int *fd)
e4f7b8c8 158{
1cf3db46 159 struct target_so_ops *ops = solib_ops (target_gdbarch);
e4f7b8c8
MS
160 int found_file = -1;
161 char *temp_pathname = NULL;
f822c95b 162 int gdb_sysroot_is_empty;
08105857
PA
163 const char *solib_symbols_extension
164 = gdbarch_solib_symbols_extension (target_gdbarch);
ab38a727
PA
165 const char *fskind = effective_target_file_system_kind ();
166 struct cleanup *old_chain = make_cleanup (null_cleanup, NULL);
167 char *sysroot = NULL;
08105857
PA
168
169 /* If solib_symbols_extension is set, replace the file's
170 extension. */
171 if (solib_symbols_extension)
172 {
173 char *p = in_pathname + strlen (in_pathname);
433759f7 174
08105857
PA
175 while (p > in_pathname && *p != '.')
176 p--;
177
178 if (*p == '.')
179 {
180 char *new_pathname;
181
182 new_pathname = alloca (p - in_pathname + 1
183 + strlen (solib_symbols_extension) + 1);
184 memcpy (new_pathname, in_pathname, p - in_pathname + 1);
185 strcpy (new_pathname + (p - in_pathname) + 1,
186 solib_symbols_extension);
187
188 in_pathname = new_pathname;
189 }
190 }
58dc52c3 191
f822c95b 192 gdb_sysroot_is_empty = (gdb_sysroot == NULL || *gdb_sysroot == 0);
e4f7b8c8 193
ab38a727 194 if (!gdb_sysroot_is_empty)
e4f7b8c8 195 {
f822c95b 196 int prefix_len = strlen (gdb_sysroot);
f1d10cfb
AS
197
198 /* Remove trailing slashes from absolute prefix. */
199 while (prefix_len > 0
f822c95b 200 && IS_DIR_SEPARATOR (gdb_sysroot[prefix_len - 1]))
f1d10cfb
AS
201 prefix_len--;
202
ab38a727
PA
203 sysroot = savestring (gdb_sysroot, prefix_len);
204 make_cleanup (xfree, sysroot);
205 }
206
207 /* If we're on a non-DOS-based system, backslashes won't be
208 understood as directory separator, so, convert them to forward
209 slashes, iff we're supposed to handle DOS-based file system
210 semantics for target paths. */
211 if (!DOS_BASED_FILE_SYSTEM && fskind == file_system_kind_dos_based)
212 {
213 char *p;
214
215 /* Avoid clobbering our input. */
216 p = alloca (strlen (in_pathname) + 1);
217 strcpy (p, in_pathname);
218 in_pathname = p;
219
220 for (; *p; p++)
221 {
222 if (*p == '\\')
223 *p = '/';
224 }
225 }
226
227 /* Note, we're interested in IS_TARGET_ABSOLUTE_PATH, not
228 IS_ABSOLUTE_PATH. The latter is for host paths only, while
229 IN_PATHNAME is a target path. For example, if we're supposed to
230 be handling DOS-like semantics we want to consider a
231 'c:/foo/bar.dll' path as an absolute path, even on a Unix box.
232 With such a path, before giving up on the sysroot, we'll try:
233
234 1st attempt, c:/foo/bar.dll ==> /sysroot/c:/foo/bar.dll
235 2nd attempt, c:/foo/bar.dll ==> /sysroot/c/foo/bar.dll
236 3rd attempt, c:/foo/bar.dll ==> /sysroot/foo/bar.dll
237 */
238
239 if (!IS_TARGET_ABSOLUTE_PATH (fskind, in_pathname) || gdb_sysroot_is_empty)
240 temp_pathname = xstrdup (in_pathname);
241 else
242 {
243 int need_dir_separator;
244
245 need_dir_separator = !IS_DIR_SEPARATOR (in_pathname[0]);
246
f1d10cfb 247 /* Cat the prefixed pathname together. */
ab38a727
PA
248 temp_pathname = concat (sysroot,
249 need_dir_separator ? SLASH_STRING : "",
250 in_pathname, (char *) NULL);
e4f7b8c8
MS
251 }
252
f1838a98
UW
253 /* Handle remote files. */
254 if (remote_filename_p (temp_pathname))
255 {
572d275c 256 *fd = -1;
f748fb40 257 do_cleanups (old_chain);
ab38a727 258 return temp_pathname;
f1838a98
UW
259 }
260
f1d10cfb
AS
261 /* Now see if we can open it. */
262 found_file = open (temp_pathname, O_RDONLY | O_BINARY, 0);
ab38a727
PA
263 if (found_file < 0)
264 xfree (temp_pathname);
265
266 /* If the search in gdb_sysroot failed, and the path name has a
267 drive spec (e.g, c:/foo), try stripping ':' from the drive spec,
268 and retrying in the sysroot:
269 c:/foo/bar.dll ==> /sysroot/c/foo/bar.dll. */
f1d10cfb 270
ab38a727
PA
271 if (found_file < 0
272 && !gdb_sysroot_is_empty
273 && HAS_TARGET_DRIVE_SPEC (fskind, in_pathname))
274 {
275 int need_dir_separator = !IS_DIR_SEPARATOR (in_pathname[2]);
276 char *drive = savestring (in_pathname, 1);
277
278 temp_pathname = concat (sysroot,
279 SLASH_STRING,
280 drive,
281 need_dir_separator ? SLASH_STRING : "",
282 in_pathname + 2, (char *) NULL);
283 xfree (drive);
284
285 found_file = open (temp_pathname, O_RDONLY | O_BINARY, 0);
286 if (found_file < 0)
287 {
ab38a727
PA
288 xfree (temp_pathname);
289
290 /* If the search in gdb_sysroot still failed, try fully
291 stripping the drive spec, and trying once more in the
292 sysroot before giving up.
293
294 c:/foo/bar.dll ==> /sysroot/foo/bar.dll. */
295
296 temp_pathname = concat (sysroot,
297 need_dir_separator ? SLASH_STRING : "",
298 in_pathname + 2, (char *) NULL);
299
300 found_file = open (temp_pathname, O_RDONLY | O_BINARY, 0);
301 if (found_file < 0)
302 xfree (temp_pathname);
303 }
304 }
0997b535 305
ab38a727
PA
306 do_cleanups (old_chain);
307
308 /* We try to find the library in various ways. After each attempt,
309 either found_file >= 0 and temp_pathname is a malloc'd string, or
310 found_file < 0 and temp_pathname does not point to storage that
311 needs to be freed. */
312
313 if (found_file < 0)
314 temp_pathname = NULL;
315
316 /* If not found, search the solib_search_path (if any). */
317 if (found_file < 0 && solib_search_path != NULL)
318 found_file = openp (solib_search_path, OPF_TRY_CWD_FIRST,
319 in_pathname, O_RDONLY | O_BINARY, &temp_pathname);
0997b535 320
f822c95b 321 /* If the search in gdb_sysroot failed, and the path name is
ba5f0d88
OF
322 absolute at this point, make it relative. (openp will try and open the
323 file according to its absolute path otherwise, which is not what we want.)
324 Affects subsequent searches for this solib. */
ab38a727 325 if (found_file < 0 && IS_TARGET_ABSOLUTE_PATH (fskind, in_pathname))
ba5f0d88
OF
326 {
327 /* First, get rid of any drive letters etc. */
ab38a727
PA
328 while (!IS_TARGET_DIR_SEPARATOR (fskind, *in_pathname))
329 in_pathname++;
ba5f0d88
OF
330
331 /* Next, get rid of all leading dir separators. */
ab38a727
PA
332 while (IS_TARGET_DIR_SEPARATOR (fskind, *in_pathname))
333 in_pathname++;
ba5f0d88 334 }
ab38a727 335
c8c18e65 336 /* If not found, search the solib_search_path (if any). */
e4f7b8c8 337 if (found_file < 0 && solib_search_path != NULL)
014d698b 338 found_file = openp (solib_search_path, OPF_TRY_CWD_FIRST,
fbdebf46 339 in_pathname, O_RDONLY | O_BINARY, &temp_pathname);
ab38a727 340
ba5f0d88
OF
341 /* If not found, next search the solib_search_path (if any) for the basename
342 only (ignoring the path). This is to allow reading solibs from a path
343 that differs from the opened path. */
344 if (found_file < 0 && solib_search_path != NULL)
014d698b 345 found_file = openp (solib_search_path, OPF_TRY_CWD_FIRST,
ab38a727
PA
346 target_lbasename (fskind, in_pathname),
347 O_RDONLY | O_BINARY, &temp_pathname);
e4f7b8c8 348
c378eb4e 349 /* If not found, try to use target supplied solib search method. */
66aba65d 350 if (found_file < 0 && ops->find_and_open_solib)
637d6690 351 found_file = ops->find_and_open_solib (in_pathname, O_RDONLY | O_BINARY,
66aba65d 352 &temp_pathname);
2610b0bf 353
c378eb4e 354 /* If not found, next search the inferior's $PATH environment variable. */
f822c95b 355 if (found_file < 0 && gdb_sysroot_is_empty)
3f81c18a
VP
356 found_file = openp (get_in_environ (current_inferior ()->environment,
357 "PATH"),
fbdebf46 358 OPF_TRY_CWD_FIRST, in_pathname, O_RDONLY | O_BINARY,
014d698b 359 &temp_pathname);
e4f7b8c8 360
ab38a727 361 /* If not found, next search the inferior's $LD_LIBRARY_PATH
c378eb4e 362 environment variable. */
f822c95b 363 if (found_file < 0 && gdb_sysroot_is_empty)
3f81c18a
VP
364 found_file = openp (get_in_environ (current_inferior ()->environment,
365 "LD_LIBRARY_PATH"),
fbdebf46 366 OPF_TRY_CWD_FIRST, in_pathname, O_RDONLY | O_BINARY,
014d698b 367 &temp_pathname);
e4f7b8c8 368
572d275c
UW
369 *fd = found_file;
370 return temp_pathname;
371}
372
373/* Open and return a BFD for the shared library PATHNAME. If FD is not -1,
374 it is used as file handle to open the file. Throws an error if the file
375 could not be opened. Handles both local and remote file access.
376
377 PATHNAME must be malloc'ed by the caller. If successful, the new BFD's
378 name will point to it. If unsuccessful, PATHNAME will be freed and the
379 FD will be closed (unless FD was -1). */
380
381bfd *
382solib_bfd_fopen (char *pathname, int fd)
383{
384 bfd *abfd;
385
386 if (remote_filename_p (pathname))
387 {
388 gdb_assert (fd == -1);
389 abfd = remote_bfd_open (pathname, gnutarget);
390 }
391 else
392 {
393 abfd = bfd_fopen (pathname, gnutarget, FOPEN_RB, fd);
394
395 if (abfd)
396 bfd_set_cacheable (abfd, 1);
397 else if (fd != -1)
398 close (fd);
399 }
f1838a98 400
f1838a98
UW
401 if (!abfd)
402 {
572d275c 403 make_cleanup (xfree, pathname);
f1838a98 404 error (_("Could not open `%s' as an executable file: %s"),
572d275c 405 pathname, bfd_errmsg (bfd_get_error ()));
f1838a98
UW
406 }
407
572d275c
UW
408 return abfd;
409}
410
411/* Find shared library PATHNAME and open a BFD for it. */
412
413bfd *
414solib_bfd_open (char *pathname)
415{
572d275c
UW
416 char *found_pathname;
417 int found_file;
418 bfd *abfd;
378d2b72 419 const struct bfd_arch_info *b;
572d275c 420
572d275c
UW
421 /* Search for shared library file. */
422 found_pathname = solib_find (pathname, &found_file);
423 if (found_pathname == NULL)
048d532d
PA
424 {
425 /* Return failure if the file could not be found, so that we can
426 accumulate messages about missing libraries. */
427 if (errno == ENOENT)
428 return NULL;
429
430 perror_with_name (pathname);
431 }
572d275c
UW
432
433 /* Open bfd for shared library. */
434 abfd = solib_bfd_fopen (found_pathname, found_file);
435
436 /* Check bfd format. */
f1838a98 437 if (!bfd_check_format (abfd, bfd_object))
0997b535 438 {
f1838a98 439 bfd_close (abfd);
572d275c 440 make_cleanup (xfree, found_pathname);
f1838a98 441 error (_("`%s': not in executable format: %s"),
572d275c 442 found_pathname, bfd_errmsg (bfd_get_error ()));
0997b535 443 }
f1838a98 444
378d2b72
HZ
445 /* Check bfd arch. */
446 b = gdbarch_bfd_arch_info (target_gdbarch);
69e2bf17 447 if (!b->compatible (b, bfd_get_arch_info (abfd)))
378d2b72
HZ
448 warning (_("`%s': Shared library architecture %s is not compatible "
449 "with target architecture %s."), found_pathname,
450 bfd_get_arch_info (abfd)->printable_name, b->printable_name);
451
f1838a98 452 return abfd;
e4f7b8c8
MS
453}
454
455
c906108c
SS
456/*
457
c5aa993b 458 LOCAL FUNCTION
c906108c 459
c5aa993b 460 solib_map_sections -- open bfd and build sections for shared lib
c906108c 461
c5aa993b 462 SYNOPSIS
c906108c 463
c5aa993b 464 static int solib_map_sections (struct so_list *so)
c906108c 465
c5aa993b 466 DESCRIPTION
c906108c 467
c5aa993b
JM
468 Given a pointer to one of the shared objects in our list
469 of mapped objects, use the recorded name to open a bfd
470 descriptor for the object, build a section table, and then
471 relocate all the section addresses by the base address at
472 which the shared object was mapped.
c906108c 473
c5aa993b 474 FIXMES
c906108c 475
c5aa993b
JM
476 In most (all?) cases the shared object file name recorded in the
477 dynamic linkage tables will be a fully qualified pathname. For
478 cases where it isn't, do we really mimic the systems search
479 mechanism correctly in the below code (particularly the tilde
480 expansion stuff?).
c906108c
SS
481 */
482
483static int
048d532d 484solib_map_sections (struct so_list *so)
c906108c 485{
831a0c44 486 struct target_so_ops *ops = solib_ops (target_gdbarch);
c906108c 487 char *filename;
0542c86d 488 struct target_section *p;
c906108c
SS
489 struct cleanup *old_chain;
490 bfd *abfd;
c5aa993b
JM
491
492 filename = tilde_expand (so->so_name);
b8c9b27d 493 old_chain = make_cleanup (xfree, filename);
831a0c44 494 abfd = ops->bfd_open (filename);
f1838a98 495 do_cleanups (old_chain);
e4f7b8c8 496
048d532d
PA
497 if (abfd == NULL)
498 return 0;
499
13437d4b 500 /* Leave bfd open, core_xfer_memory and "info files" need it. */
3db741ef 501 so->abfd = gdb_bfd_ref (abfd);
23e04971 502
e4f7b8c8 503 /* copy full path name into so_name, so that later symbol_file_add
c378eb4e 504 can find it. */
f1838a98
UW
505 if (strlen (bfd_get_filename (abfd)) >= SO_NAME_MAX_PATH_SIZE)
506 error (_("Shared library file name is too long."));
507 strcpy (so->so_name, bfd_get_filename (abfd));
23e04971 508
13437d4b 509 if (build_section_table (abfd, &so->sections, &so->sections_end))
23e04971 510 {
8a3fe4f8 511 error (_("Can't find the file sections in `%s': %s"),
13437d4b 512 bfd_get_filename (abfd), bfd_errmsg (bfd_get_error ()));
23e04971 513 }
104c1213 514
13437d4b 515 for (p = so->sections; p < so->sections_end; p++)
104c1213 516 {
13437d4b
KB
517 /* Relocate the section binding addresses as recorded in the shared
518 object's file by the base address to which the object was actually
c378eb4e 519 mapped. */
66aba65d 520 ops->relocate_section_addresses (so, p);
cfa9d6d9
DJ
521
522 /* If the target didn't provide information about the address
523 range of the shared object, assume we want the location of
524 the .text section. */
525 if (so->addr_low == 0 && so->addr_high == 0
526 && strcmp (p->the_bfd_section->name, ".text") == 0)
13437d4b 527 {
cfa9d6d9
DJ
528 so->addr_low = p->addr;
529 so->addr_high = p->endaddr;
13437d4b 530 }
104c1213
JM
531 }
532
048d532d
PA
533 /* Add the shared object's sections to the current set of file
534 section tables. Do this immediately after mapping the object so
535 that later nodes in the list can query this object, as is needed
536 in solib-osf.c. */
537 add_target_sections (so->sections, so->sections_end);
538
539 return 1;
104c1213 540}
c906108c 541
a86988f2
PA
542/* Free symbol-file related contents of SO. If we have opened a BFD
543 for SO, close it. If we have placed SO's sections in some target's
544 section table, the caller is responsible for removing them.
545
546 This function doesn't mess with objfiles at all. If there is an
547 objfile associated with SO that needs to be removed, the caller is
548 responsible for taking care of that. */
549
550static void
551free_so_symbols (struct so_list *so)
552{
a86988f2
PA
553 if (so->sections)
554 {
555 xfree (so->sections);
556 so->sections = so->sections_end = NULL;
557 }
558
559 gdb_bfd_unref (so->abfd);
560 so->abfd = NULL;
561
562 /* Our caller closed the objfile, possibly via objfile_purge_solibs. */
563 so->symbols_loaded = 0;
564 so->objfile = NULL;
565
566 so->addr_low = so->addr_high = 0;
567
568 /* Restore the target-supplied file name. SO_NAME may be the path
569 of the symbol file. */
570 strcpy (so->so_name, so->so_original_name);
571}
572
07cd4b97 573/* LOCAL FUNCTION
c906108c 574
07cd4b97 575 free_so --- free a `struct so_list' object
c906108c 576
c5aa993b 577 SYNOPSIS
c906108c 578
07cd4b97 579 void free_so (struct so_list *so)
c906108c 580
c5aa993b 581 DESCRIPTION
c906108c 582
07cd4b97 583 Free the storage associated with the `struct so_list' object SO.
c378eb4e 584 If we have opened a BFD for SO, close it.
c906108c 585
07cd4b97
JB
586 The caller is responsible for removing SO from whatever list it is
587 a member of. If we have placed SO's sections in some target's
588 section table, the caller is responsible for removing them.
c906108c 589
07cd4b97
JB
590 This function doesn't mess with objfiles at all. If there is an
591 objfile associated with SO that needs to be removed, the caller is
592 responsible for taking care of that. */
593
13437d4b 594void
07cd4b97 595free_so (struct so_list *so)
c906108c 596{
1cf3db46 597 struct target_so_ops *ops = solib_ops (target_gdbarch);
c5aa993b 598
a86988f2 599 free_so_symbols (so);
66aba65d 600 ops->free_so (so);
07cd4b97 601
b8c9b27d 602 xfree (so);
c906108c
SS
603}
604
07cd4b97 605
f8766ec1
KB
606/* Return address of first so_list entry in master shared object list. */
607struct so_list *
608master_so_list (void)
609{
610 return so_list_head;
611}
612
7eedccfa
PP
613/* Read in symbols for shared object SO. If SYMFILE_VERBOSE is set in FLAGS,
614 be chatty about it. Return non-zero if any symbols were actually
42a6e6a0
MK
615 loaded. */
616
617int
7eedccfa 618solib_read_symbols (struct so_list *so, int flags)
42a6e6a0 619{
7eedccfa
PP
620 const int from_tty = flags & SYMFILE_VERBOSE;
621
42a6e6a0
MK
622 if (so->symbols_loaded)
623 {
a86988f2 624 /* If needed, we've already warned in our caller. */
42a6e6a0 625 }
8bb75286
DJ
626 else if (so->abfd == NULL)
627 {
048d532d
PA
628 /* We've already warned about this library, when trying to open
629 it. */
8bb75286 630 }
42a6e6a0
MK
631 else
632 {
048d532d
PA
633 volatile struct gdb_exception e;
634
635 TRY_CATCH (e, RETURN_MASK_ERROR)
636 {
637 struct section_addr_info *sap;
638
639 /* Have we already loaded this shared object? */
640 ALL_OBJFILES (so->objfile)
641 {
0ba1096a 642 if (filename_cmp (so->objfile->name, so->so_name) == 0
e4f6d2ec 643 && so->objfile->addr_low == so->addr_low)
048d532d
PA
644 break;
645 }
646 if (so->objfile != NULL)
647 break;
648
649 sap = build_section_addr_info_from_section_table (so->sections,
650 so->sections_end);
651 so->objfile = symbol_file_add_from_bfd (so->abfd,
63524580
JK
652 flags, sap, OBJF_SHARED,
653 NULL);
e4f6d2ec 654 so->objfile->addr_low = so->addr_low;
048d532d
PA
655 free_section_addr_info (sap);
656 }
657
658 if (e.reason < 0)
14ad3217
JK
659 exception_fprintf (gdb_stderr, e, _("Error while reading shared"
660 " library symbols for %s:\n"),
661 so->so_name);
048d532d
PA
662 else
663 {
664 if (from_tty || info_verbose)
665 printf_unfiltered (_("Loaded symbols for %s\n"), so->so_name);
666 so->symbols_loaded = 1;
667 }
7eedccfa 668 return 1;
42a6e6a0
MK
669 }
670
671 return 0;
672}
c906108c 673
07cd4b97 674/* LOCAL FUNCTION
c906108c 675
105b175f 676 update_solib_list --- synchronize GDB's shared object list with inferior's
c906108c 677
c5aa993b 678 SYNOPSIS
c906108c 679
105b175f 680 void update_solib_list (int from_tty, struct target_ops *TARGET)
c906108c 681
07cd4b97 682 Extract the list of currently loaded shared objects from the
105b175f
JB
683 inferior, and compare it with the list of shared objects currently
684 in GDB's so_list_head list. Edit so_list_head to bring it in sync
685 with the inferior's new list.
c906108c 686
105b175f
JB
687 If we notice that the inferior has unloaded some shared objects,
688 free any symbolic info GDB had read about those shared objects.
689
690 Don't load symbolic info for any new shared objects; just add them
691 to the list, and leave their symbols_loaded flag clear.
07cd4b97
JB
692
693 If FROM_TTY is non-null, feel free to print messages about what
694 we're doing.
c906108c 695
07cd4b97
JB
696 If TARGET is non-null, add the sections of all new shared objects
697 to TARGET's section table. Note that this doesn't remove any
698 sections for shared objects that have been unloaded, and it
699 doesn't check to see if the new shared objects are already present in
700 the section table. But we only use this for core files and
701 processes we've just attached to, so that's okay. */
c906108c 702
a78f21af 703static void
105b175f 704update_solib_list (int from_tty, struct target_ops *target)
07cd4b97 705{
1cf3db46 706 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 707 struct so_list *inferior = ops->current_sos();
07cd4b97
JB
708 struct so_list *gdb, **gdb_link;
709
181e7f93
PA
710 /* We can reach here due to changing solib-search-path or the
711 sysroot, before having any inferior. */
50c71eaf 712 if (target_has_execution && !ptid_equal (inferior_ptid, null_ptid))
181e7f93
PA
713 {
714 struct inferior *inf = current_inferior ();
715
716 /* If we are attaching to a running process for which we
717 have not opened a symbol file, we may be able to get its
718 symbols now! */
719 if (inf->attach_flag && symfile_objfile == NULL)
720 catch_errors (ops->open_symbol_file_object, &from_tty,
721 "Error reading attached process's symbol file.\n",
722 RETURN_MASK_ALL);
723 }
104c1213 724
07cd4b97
JB
725 /* GDB and the inferior's dynamic linker each maintain their own
726 list of currently loaded shared objects; we want to bring the
727 former in sync with the latter. Scan both lists, seeing which
728 shared objects appear where. There are three cases:
729
730 - A shared object appears on both lists. This means that GDB
105b175f
JB
731 knows about it already, and it's still loaded in the inferior.
732 Nothing needs to happen.
07cd4b97
JB
733
734 - A shared object appears only on GDB's list. This means that
105b175f
JB
735 the inferior has unloaded it. We should remove the shared
736 object from GDB's tables.
07cd4b97
JB
737
738 - A shared object appears only on the inferior's list. This
105b175f
JB
739 means that it's just been loaded. We should add it to GDB's
740 tables.
07cd4b97
JB
741
742 So we walk GDB's list, checking each entry to see if it appears
743 in the inferior's list too. If it does, no action is needed, and
744 we remove it from the inferior's list. If it doesn't, the
745 inferior has unloaded it, and we remove it from GDB's list. By
746 the time we're done walking GDB's list, the inferior's list
747 contains only the new shared objects, which we then add. */
748
749 gdb = so_list_head;
750 gdb_link = &so_list_head;
751 while (gdb)
c906108c 752 {
07cd4b97
JB
753 struct so_list *i = inferior;
754 struct so_list **i_link = &inferior;
755
756 /* Check to see whether the shared object *gdb also appears in
757 the inferior's current list. */
758 while (i)
c906108c 759 {
a7c02bc8
VP
760 if (ops->same)
761 {
762 if (ops->same (gdb, i))
763 break;
764 }
765 else
766 {
0ba1096a 767 if (! filename_cmp (gdb->so_original_name, i->so_original_name))
a7c02bc8
VP
768 break;
769 }
07cd4b97
JB
770
771 i_link = &i->next;
772 i = *i_link;
c906108c 773 }
c5aa993b 774
07cd4b97
JB
775 /* If the shared object appears on the inferior's list too, then
776 it's still loaded, so we don't need to do anything. Delete
777 it from the inferior's list, and leave it on GDB's list. */
778 if (i)
c906108c 779 {
07cd4b97 780 *i_link = i->next;
07cd4b97
JB
781 free_so (i);
782 gdb_link = &gdb->next;
783 gdb = *gdb_link;
784 }
785
786 /* If it's not on the inferior's list, remove it from GDB's tables. */
787 else
788 {
42a6e6a0
MK
789 /* Notify any observer that the shared object has been
790 unloaded before we remove it from GDB's tables. */
84acb35a
JJ
791 observer_notify_solib_unloaded (gdb);
792
07cd4b97 793 *gdb_link = gdb->next;
07cd4b97
JB
794
795 /* Unless the user loaded it explicitly, free SO's objfile. */
e8930304 796 if (gdb->objfile && ! (gdb->objfile->flags & OBJF_USERLOADED))
07cd4b97
JB
797 free_objfile (gdb->objfile);
798
799 /* Some targets' section tables might be referring to
800 sections from so->abfd; remove them. */
801 remove_target_sections (gdb->abfd);
802
803 free_so (gdb);
804 gdb = *gdb_link;
c906108c
SS
805 }
806 }
c5aa993b 807
07cd4b97
JB
808 /* Now the inferior's list contains only shared objects that don't
809 appear in GDB's list --- those that are newly loaded. Add them
e8930304 810 to GDB's shared object list. */
07cd4b97 811 if (inferior)
c906108c 812 {
048d532d
PA
813 int not_found = 0;
814 const char *not_found_filename = NULL;
815
07cd4b97
JB
816 struct so_list *i;
817
818 /* Add the new shared objects to GDB's list. */
819 *gdb_link = inferior;
820
e8930304 821 /* Fill in the rest of each of the `struct so_list' nodes. */
07cd4b97 822 for (i = inferior; i; i = i->next)
c906108c 823 {
048d532d
PA
824 volatile struct gdb_exception e;
825
6c95b8df 826 i->pspace = current_program_space;
07cd4b97 827
048d532d
PA
828 TRY_CATCH (e, RETURN_MASK_ERROR)
829 {
830 /* Fill in the rest of the `struct so_list' node. */
831 if (!solib_map_sections (i))
832 {
833 not_found++;
834 if (not_found_filename == NULL)
835 not_found_filename = i->so_original_name;
836 }
837 }
07cd4b97 838
048d532d 839 if (e.reason < 0)
3e43a32a
MS
840 exception_fprintf (gdb_stderr, e,
841 _("Error while mapping shared "
842 "library sections:\n"));
42a6e6a0
MK
843
844 /* Notify any observer that the shared object has been
048d532d 845 loaded now that we've added it to GDB's tables. */
42a6e6a0 846 observer_notify_solib_loaded (i);
c906108c 847 }
048d532d
PA
848
849 /* If a library was not found, issue an appropriate warning
850 message. We have to use a single call to warning in case the
851 front end does something special with warnings, e.g., pop up
852 a dialog box. It Would Be Nice if we could get a "warning: "
853 prefix on each line in the CLI front end, though - it doesn't
854 stand out well. */
855
856 if (not_found == 1)
3e43a32a
MS
857 warning (_("Could not load shared library symbols for %s.\n"
858 "Do you need \"set solib-search-path\" "
859 "or \"set sysroot\"?"),
048d532d
PA
860 not_found_filename);
861 else if (not_found > 1)
862 warning (_("\
863Could not load shared library symbols for %d libraries, e.g. %s.\n\
864Use the \"info sharedlibrary\" command to see the complete listing.\n\
865Do you need \"set solib-search-path\" or \"set sysroot\"?"),
866 not_found, not_found_filename);
e8930304 867 }
105b175f
JB
868}
869
17a37d48
PP
870
871/* Return non-zero if NAME is the libpthread shared library.
6612ad7f
JB
872
873 Uses a fairly simplistic heuristic approach where we check
874 the file name against "/libpthread". This can lead to false
875 positives, but this should be good enough in practice. */
876
17a37d48
PP
877int
878libpthread_name_p (const char *name)
879{
880 return (strstr (name, "/libpthread") != NULL);
881}
882
883/* Return non-zero if SO is the libpthread shared library. */
884
6612ad7f
JB
885static int
886libpthread_solib_p (struct so_list *so)
887{
17a37d48 888 return libpthread_name_p (so->so_name);
6612ad7f 889}
105b175f
JB
890
891/* GLOBAL FUNCTION
892
893 solib_add -- read in symbol info for newly added shared libraries
894
895 SYNOPSIS
896
990f9fe3
FF
897 void solib_add (char *pattern, int from_tty, struct target_ops
898 *TARGET, int readsyms)
105b175f
JB
899
900 DESCRIPTION
901
902 Read in symbolic information for any shared objects whose names
903 match PATTERN. (If we've already read a shared object's symbol
904 info, leave it alone.) If PATTERN is zero, read them all.
905
990f9fe3
FF
906 If READSYMS is 0, defer reading symbolic information until later
907 but still do any needed low level processing.
908
105b175f
JB
909 FROM_TTY and TARGET are as described for update_solib_list, above. */
910
911void
3e43a32a
MS
912solib_add (char *pattern, int from_tty,
913 struct target_ops *target, int readsyms)
105b175f
JB
914{
915 struct so_list *gdb;
916
2eff07b3
PP
917 current_program_space->solib_add_generation++;
918
105b175f
JB
919 if (pattern)
920 {
921 char *re_err = re_comp (pattern);
922
923 if (re_err)
8a3fe4f8 924 error (_("Invalid regexp: %s"), re_err);
105b175f
JB
925 }
926
927 update_solib_list (from_tty, target);
c906108c 928
105b175f
JB
929 /* Walk the list of currently loaded shared libraries, and read
930 symbols for any that match the pattern --- or any whose symbols
931 aren't already loaded, if no pattern was given. */
e8930304
JB
932 {
933 int any_matches = 0;
934 int loaded_any_symbols = 0;
7eedccfa
PP
935 const int flags =
936 SYMFILE_DEFER_BP_RESET | (from_tty ? SYMFILE_VERBOSE : 0);
c906108c 937
e8930304
JB
938 for (gdb = so_list_head; gdb; gdb = gdb->next)
939 if (! pattern || re_exec (gdb->so_name))
940 {
6612ad7f
JB
941 /* Normally, we would read the symbols from that library
942 only if READSYMS is set. However, we're making a small
943 exception for the pthread library, because we sometimes
944 need the library symbols to be loaded in order to provide
945 thread support (x86-linux for instance). */
946 const int add_this_solib =
947 (readsyms || libpthread_solib_p (gdb));
948
e8930304 949 any_matches = 1;
a86988f2
PA
950 if (add_this_solib)
951 {
952 if (gdb->symbols_loaded)
953 {
954 /* If no pattern was given, be quiet for shared
955 libraries we have already loaded. */
956 if (pattern && (from_tty || info_verbose))
957 printf_unfiltered (_("Symbols already loaded for %s\n"),
958 gdb->so_name);
959 }
960 else if (solib_read_symbols (gdb, flags))
961 loaded_any_symbols = 1;
962 }
e8930304
JB
963 }
964
7eedccfa
PP
965 if (loaded_any_symbols)
966 breakpoint_re_set ();
967
e8930304
JB
968 if (from_tty && pattern && ! any_matches)
969 printf_unfiltered
970 ("No loaded shared libraries match the pattern `%s'.\n", pattern);
971
972 if (loaded_any_symbols)
973 {
1cf3db46 974 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 975
e8930304
JB
976 /* Getting new symbols may change our opinion about what is
977 frameless. */
978 reinit_frame_cache ();
979
66aba65d 980 ops->special_symbol_handling ();
e8930304
JB
981 }
982 }
c906108c
SS
983}
984
07cd4b97 985
c906108c
SS
986/*
987
c5aa993b 988 LOCAL FUNCTION
c906108c 989
c5aa993b 990 info_sharedlibrary_command -- code for "info sharedlibrary"
c906108c 991
c5aa993b 992 SYNOPSIS
c906108c 993
c5aa993b 994 static void info_sharedlibrary_command ()
c906108c 995
c5aa993b 996 DESCRIPTION
c906108c 997
c5aa993b 998 Walk through the shared library list and print information
55333a84
DE
999 about each attached library matching PATTERN. If PATTERN is elided,
1000 print them all.
c5aa993b 1001 */
c906108c
SS
1002
1003static void
55333a84 1004info_sharedlibrary_command (char *pattern, int from_tty)
c906108c 1005{
52f0bd74 1006 struct so_list *so = NULL; /* link map state variable */
55333a84 1007 int so_missing_debug_info = 0;
c906108c 1008 int addr_width;
55333a84
DE
1009 int nr_libs;
1010 struct cleanup *table_cleanup;
1011 struct gdbarch *gdbarch = target_gdbarch;
1012
1013 if (pattern)
1014 {
1015 char *re_err = re_comp (pattern);
1016
1017 if (re_err)
1018 error (_("Invalid regexp: %s"), re_err);
1019 }
c906108c 1020
84eb3c4f 1021 /* "0x", a little whitespace, and two hex digits per byte of pointers. */
55333a84 1022 addr_width = 4 + (gdbarch_ptr_bit (gdbarch) / 4);
c906108c 1023
105b175f 1024 update_solib_list (from_tty, 0);
07cd4b97 1025
55333a84
DE
1026 /* make_cleanup_ui_out_table_begin_end needs to know the number of
1027 rows, so we need to make two passes over the libs. */
1028
1029 for (nr_libs = 0, so = so_list_head; so; so = so->next)
c906108c 1030 {
c5aa993b 1031 if (so->so_name[0])
c906108c 1032 {
55333a84
DE
1033 if (pattern && ! re_exec (so->so_name))
1034 continue;
1035 ++nr_libs;
1036 }
1037 }
1038
1039 table_cleanup =
1040 make_cleanup_ui_out_table_begin_end (uiout, 4, nr_libs,
1041 "SharedLibraryTable");
1042
1043 /* The "- 1" is because ui_out adds one space between columns. */
1044 ui_out_table_header (uiout, addr_width - 1, ui_left, "from", "From");
1045 ui_out_table_header (uiout, addr_width - 1, ui_left, "to", "To");
1046 ui_out_table_header (uiout, 12 - 1, ui_left, "syms-read", "Syms Read");
1047 ui_out_table_header (uiout, 0, ui_noalign,
1048 "name", "Shared Object Library");
1049
1050 ui_out_table_body (uiout);
1051
1052 for (so = so_list_head; so; so = so->next)
1053 {
1054 struct cleanup *lib_cleanup;
c906108c 1055
55333a84
DE
1056 if (! so->so_name[0])
1057 continue;
1058 if (pattern && ! re_exec (so->so_name))
1059 continue;
1060
1061 lib_cleanup = make_cleanup_ui_out_tuple_begin_end (uiout, "lib");
1062
1063 if (so->addr_high != 0)
1064 {
1065 ui_out_field_core_addr (uiout, "from", gdbarch, so->addr_low);
1066 ui_out_field_core_addr (uiout, "to", gdbarch, so->addr_high);
1067 }
1068 else
1069 {
1070 ui_out_field_skip (uiout, "from");
1071 ui_out_field_skip (uiout, "to");
c906108c 1072 }
55333a84
DE
1073
1074 if (! ui_out_is_mi_like_p (interp_ui_out (top_level_interpreter ()))
1075 && so->symbols_loaded
e0ae4240 1076 && !objfile_has_symbols (so->objfile))
55333a84
DE
1077 {
1078 so_missing_debug_info = 1;
1079 ui_out_field_string (uiout, "syms-read", "Yes (*)");
1080 }
1081 else
1082 ui_out_field_string (uiout, "syms-read",
1083 so->symbols_loaded ? "Yes" : "No");
1084
1085 ui_out_field_string (uiout, "name", so->so_name);
1086
1087 ui_out_text (uiout, "\n");
1088
1089 do_cleanups (lib_cleanup);
c906108c 1090 }
55333a84
DE
1091
1092 do_cleanups (table_cleanup);
1093
1094 if (nr_libs == 0)
1095 {
1096 if (pattern)
1097 ui_out_message (uiout, 0,
1098 _("No shared libraries matched.\n"));
1099 else
1100 ui_out_message (uiout, 0,
1101 _("No shared libraries loaded at this time.\n"));
1102 }
1103 else
c906108c 1104 {
55333a84
DE
1105 if (so_missing_debug_info)
1106 ui_out_message (uiout, 0,
3e43a32a
MS
1107 _("(*): Shared library is missing "
1108 "debugging information.\n"));
c906108c
SS
1109 }
1110}
1111
5fd1a349
PP
1112/* Return 1 if ADDRESS lies within SOLIB. */
1113
1114int
1115solib_contains_address_p (const struct so_list *const solib,
1116 CORE_ADDR address)
1117{
0542c86d 1118 struct target_section *p;
5fd1a349
PP
1119
1120 for (p = solib->sections; p < solib->sections_end; p++)
1121 if (p->addr <= address && address < p->endaddr)
1122 return 1;
1123
1124 return 0;
1125}
1126
c906108c
SS
1127/*
1128
c5aa993b 1129 GLOBAL FUNCTION
c906108c 1130
f5c9a895
PP
1131 solib_name_from_address -- if an address is in a shared lib, return
1132 its name.
c906108c 1133
c5aa993b 1134 SYNOPSIS
c906108c 1135
f5c9a895 1136 char * solib_name_from_address (CORE_ADDR address)
c906108c 1137
c5aa993b 1138 DESCRIPTION
c906108c 1139
c5aa993b
JM
1140 Provides a hook for other gdb routines to discover whether or
1141 not a particular address is within the mapped address space of
749499cb 1142 a shared library.
c906108c 1143
c5aa993b
JM
1144 For example, this routine is called at one point to disable
1145 breakpoints which are in shared libraries that are not currently
1146 mapped in.
c906108c
SS
1147 */
1148
1149char *
6c95b8df 1150solib_name_from_address (struct program_space *pspace, CORE_ADDR address)
c906108c 1151{
6c95b8df 1152 struct so_list *so = NULL;
c5aa993b 1153
6c95b8df 1154 for (so = pspace->so_list; so; so = so->next)
5fd1a349
PP
1155 if (solib_contains_address_p (so, address))
1156 return (so->so_name);
07cd4b97 1157
c906108c
SS
1158 return (0);
1159}
1160
de18c1d8
JM
1161/* Return whether the data starting at VADDR, size SIZE, must be kept
1162 in a core file for shared libraries loaded before "gcore" is used
1163 to be handled correctly when the core file is loaded. This only
1164 applies when the section would otherwise not be kept in the core
1165 file (in particular, for readonly sections). */
1166
1167int
1168solib_keep_data_in_core (CORE_ADDR vaddr, unsigned long size)
1169{
1170 struct target_so_ops *ops = solib_ops (target_gdbarch);
1171
1172 if (ops->keep_data_in_core)
1173 return ops->keep_data_in_core (vaddr, size);
1174 else
1175 return 0;
1176}
1177
c906108c
SS
1178/* Called by free_all_symtabs */
1179
c5aa993b 1180void
fba45db2 1181clear_solib (void)
c906108c 1182{
1cf3db46 1183 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 1184
085dd6e6
JM
1185 /* This function is expected to handle ELF shared libraries. It is
1186 also used on Solaris, which can run either ELF or a.out binaries
1187 (for compatibility with SunOS 4), both of which can use shared
1188 libraries. So we don't know whether we have an ELF executable or
1189 an a.out executable until the user chooses an executable file.
1190
1191 ELF shared libraries don't get mapped into the address space
1192 until after the program starts, so we'd better not try to insert
1193 breakpoints in them immediately. We have to wait until the
1194 dynamic linker has loaded them; we'll hit a bp_shlib_event
1195 breakpoint (look for calls to create_solib_event_breakpoint) when
1196 it's ready.
1197
1198 SunOS shared libraries seem to be different --- they're present
1199 as soon as the process begins execution, so there's no need to
1200 put off inserting breakpoints. There's also nowhere to put a
1201 bp_shlib_event breakpoint, so if we put it off, we'll never get
1202 around to it.
1203
1204 So: disable breakpoints only if we're using ELF shared libs. */
1205 if (exec_bfd != NULL
1206 && bfd_get_flavour (exec_bfd) != bfd_target_aout_flavour)
cb851954 1207 disable_breakpoints_in_shlibs ();
085dd6e6 1208
c906108c
SS
1209 while (so_list_head)
1210 {
07cd4b97 1211 struct so_list *so = so_list_head;
433759f7 1212
07cd4b97 1213 so_list_head = so->next;
c86cf029 1214 observer_notify_solib_unloaded (so);
2069d78d
KB
1215 if (so->abfd)
1216 remove_target_sections (so->abfd);
07cd4b97 1217 free_so (so);
c906108c 1218 }
07cd4b97 1219
66aba65d 1220 ops->clear_solib ();
c906108c
SS
1221}
1222
13437d4b 1223/* GLOBAL FUNCTION
c5aa993b
JM
1224
1225 solib_create_inferior_hook -- shared library startup support
1226
1227 SYNOPSIS
1228
268a4a75 1229 void solib_create_inferior_hook (int from_tty)
c5aa993b
JM
1230
1231 DESCRIPTION
1232
1233 When gdb starts up the inferior, it nurses it along (through the
1234 shell) until it is ready to execute it's first instruction. At this
1235 point, this function gets called via expansion of the macro
13437d4b 1236 SOLIB_CREATE_INFERIOR_HOOK. */
c5aa993b
JM
1237
1238void
268a4a75 1239solib_create_inferior_hook (int from_tty)
c906108c 1240{
1cf3db46 1241 struct target_so_ops *ops = solib_ops (target_gdbarch);
433759f7 1242
268a4a75 1243 ops->solib_create_inferior_hook (from_tty);
c906108c
SS
1244}
1245
d7fa2ae2
KB
1246/* GLOBAL FUNCTION
1247
1248 in_solib_dynsym_resolve_code -- check to see if an address is in
1249 dynamic loader's dynamic symbol
1250 resolution code
1251
1252 SYNOPSIS
1253
1254 int in_solib_dynsym_resolve_code (CORE_ADDR pc)
1255
1256 DESCRIPTION
1257
1258 Determine if PC is in the dynamic linker's symbol resolution
1259 code. Return 1 if so, 0 otherwise.
1260*/
1261
1262int
1263in_solib_dynsym_resolve_code (CORE_ADDR pc)
1264{
1cf3db46 1265 struct target_so_ops *ops = solib_ops (target_gdbarch);
433759f7 1266
66aba65d 1267 return ops->in_dynsym_resolve_code (pc);
d7fa2ae2 1268}
c906108c
SS
1269
1270/*
1271
c5aa993b 1272 LOCAL FUNCTION
c906108c 1273
c5aa993b 1274 sharedlibrary_command -- handle command to explicitly add library
c906108c 1275
c5aa993b 1276 SYNOPSIS
c906108c 1277
c5aa993b 1278 static void sharedlibrary_command (char *args, int from_tty)
c906108c 1279
c5aa993b 1280 DESCRIPTION
c906108c 1281
c5aa993b 1282 */
c906108c
SS
1283
1284static void
fba45db2 1285sharedlibrary_command (char *args, int from_tty)
c906108c
SS
1286{
1287 dont_repeat ();
990f9fe3 1288 solib_add (args, from_tty, (struct target_ops *) 0, 1);
c906108c
SS
1289}
1290
cb0ba49e
MS
1291/* LOCAL FUNCTION
1292
1293 no_shared_libraries -- handle command to explicitly discard symbols
1294 from shared libraries.
1295
1296 DESCRIPTION
1297
1298 Implements the command "nosharedlibrary", which discards symbols
1299 that have been auto-loaded from shared libraries. Symbols from
1300 shared libraries that were added by explicit request of the user
1301 are not discarded. Also called from remote.c. */
1302
c60a7562
MS
1303void
1304no_shared_libraries (char *ignored, int from_tty)
1305{
a3247a22
PP
1306 /* The order of the two routines below is important: clear_solib notifies
1307 the solib_unloaded observers, and some of these observers might need
1308 access to their associated objfiles. Therefore, we can not purge the
1309 solibs' objfiles before clear_solib has been called. */
1310
615b9dba 1311 clear_solib ();
a3247a22 1312 objfile_purge_solibs ();
c60a7562 1313}
c906108c 1314
a86988f2
PA
1315/* Reload shared libraries, but avoid reloading the same symbol file
1316 we already have loaded. */
1317
1318static void
1319reload_shared_libraries_1 (int from_tty)
1320{
1321 struct so_list *so;
1322 struct cleanup *old_chain = make_cleanup (null_cleanup, NULL);
1323
1324 for (so = so_list_head; so != NULL; so = so->next)
1325 {
1326 char *filename, *found_pathname = NULL;
1327 bfd *abfd;
a86988f2
PA
1328 int was_loaded = so->symbols_loaded;
1329 const int flags =
1330 SYMFILE_DEFER_BP_RESET | (from_tty ? SYMFILE_VERBOSE : 0);
1331
1332 filename = tilde_expand (so->so_original_name);
42b1321c 1333 make_cleanup (xfree, filename);
a86988f2
PA
1334 abfd = solib_bfd_open (filename);
1335 if (abfd != NULL)
1336 {
1337 found_pathname = xstrdup (bfd_get_filename (abfd));
1338 make_cleanup (xfree, found_pathname);
1339 gdb_bfd_close_or_warn (abfd);
1340 }
1341
1342 /* If this shared library is no longer associated with its previous
1343 symbol file, close that. */
1344 if ((found_pathname == NULL && was_loaded)
1345 || (found_pathname != NULL
0ba1096a 1346 && filename_cmp (found_pathname, so->so_name) != 0))
a86988f2
PA
1347 {
1348 if (so->objfile && ! (so->objfile->flags & OBJF_USERLOADED))
1349 free_objfile (so->objfile);
1350 remove_target_sections (so->abfd);
1351 free_so_symbols (so);
1352 }
1353
1354 /* If this shared library is now associated with a new symbol
1355 file, open it. */
1356 if (found_pathname != NULL
1357 && (!was_loaded
0ba1096a 1358 || filename_cmp (found_pathname, so->so_name) != 0))
a86988f2
PA
1359 {
1360 volatile struct gdb_exception e;
1361
1362 TRY_CATCH (e, RETURN_MASK_ERROR)
1363 solib_map_sections (so);
1364
1365 if (e.reason < 0)
3e43a32a
MS
1366 exception_fprintf (gdb_stderr, e,
1367 _("Error while mapping "
1368 "shared library sections:\n"));
a86988f2
PA
1369 else if (auto_solib_add || was_loaded || libpthread_solib_p (so))
1370 solib_read_symbols (so, flags);
1371 }
1372 }
1373
1374 do_cleanups (old_chain);
1375}
1376
cf466558 1377static void
f397e303
AC
1378reload_shared_libraries (char *ignored, int from_tty,
1379 struct cmd_list_element *e)
cf466558 1380{
a86988f2
PA
1381 struct target_so_ops *ops;
1382
1383 reload_shared_libraries_1 (from_tty);
1384
1385 ops = solib_ops (target_gdbarch);
1386
c378eb4e 1387 /* Creating inferior hooks here has two purposes. First, if we reload
c8fa6cdd
VP
1388 shared libraries then the address of solib breakpoint we've computed
1389 previously might be no longer valid. For example, if we forgot to set
1390 solib-absolute-prefix and are setting it right now, then the previous
1391 breakpoint address is plain wrong. Second, installing solib hooks
1392 also implicitly figures were ld.so is and loads symbols for it.
1393 Absent this call, if we've just connected to a target and set
1394 solib-absolute-prefix or solib-search-path, we'll lose all information
1395 about ld.so. */
1396 if (target_has_execution)
1397 {
a86988f2
PA
1398 /* Reset or free private data structures not associated with
1399 so_list entries. */
1400 ops->clear_solib ();
1401
1402 /* Remove any previous solib event breakpoint. This is usually
1403 done in common code, at breakpoint_init_inferior time, but
1404 we're not really starting up the inferior here. */
1405 remove_solib_event_breakpoints ();
1406
c8fa6cdd
VP
1407#ifdef SOLIB_CREATE_INFERIOR_HOOK
1408 SOLIB_CREATE_INFERIOR_HOOK (PIDGET (inferior_ptid));
1409#else
268a4a75 1410 solib_create_inferior_hook (from_tty);
c8fa6cdd
VP
1411#endif
1412 }
268a4a75
JK
1413
1414 /* Sometimes the platform-specific hook loads initial shared
1415 libraries, and sometimes it doesn't. If it doesn't FROM_TTY will be
1416 incorrectly 0 but such solib targets should be fixed anyway. If we
1417 made all the inferior hook methods consistent, this call could be
1418 removed. Call it only after the solib target has been initialized by
1419 solib_create_inferior_hook. */
1420
1421 solib_add (NULL, 0, NULL, auto_solib_add);
1422
a86988f2
PA
1423 breakpoint_re_set ();
1424
1425 /* We may have loaded or unloaded debug info for some (or all)
1426 shared libraries. However, frames may still reference them. For
1427 example, a frame's unwinder might still point at DWARF FDE
1428 structures that are now freed. Also, getting new symbols may
1429 change our opinion about what is frameless. */
c8fa6cdd 1430 reinit_frame_cache ();
a86988f2
PA
1431
1432 ops->special_symbol_handling ();
cf466558
KB
1433}
1434
920d2a44
AC
1435static void
1436show_auto_solib_add (struct ui_file *file, int from_tty,
1437 struct cmd_list_element *c, const char *value)
1438{
1439 fprintf_filtered (file, _("Autoloading of shared library symbols is %s.\n"),
1440 value);
1441}
1442
1443
3a40aaa0
UW
1444/* Handler for library-specific lookup of global symbol NAME in OBJFILE. Call
1445 the library-specific handler if it is installed for the current target. */
1446
1447struct symbol *
1448solib_global_lookup (const struct objfile *objfile,
1449 const char *name,
21b556f4 1450 const domain_enum domain)
3a40aaa0 1451{
1cf3db46 1452 struct target_so_ops *ops = solib_ops (target_gdbarch);
3a40aaa0 1453
e8a92f7b 1454 if (ops->lookup_lib_global_symbol != NULL)
94af9270 1455 return ops->lookup_lib_global_symbol (objfile, name, domain);
3a40aaa0
UW
1456 return NULL;
1457}
1458
1459
a78f21af
AC
1460extern initialize_file_ftype _initialize_solib; /* -Wmissing-prototypes */
1461
c906108c 1462void
fba45db2 1463_initialize_solib (void)
c906108c 1464{
66aba65d
MK
1465 solib_data = gdbarch_data_register_pre_init (solib_init);
1466
c906108c 1467 add_com ("sharedlibrary", class_files, sharedlibrary_command,
1bedd215 1468 _("Load shared object library symbols for files matching REGEXP."));
c5aa993b 1469 add_info ("sharedlibrary", info_sharedlibrary_command,
1bedd215 1470 _("Status of loaded shared object libraries."));
c60a7562 1471 add_com ("nosharedlibrary", class_files, no_shared_libraries,
1bedd215 1472 _("Unload all shared object library symbols."));
c906108c 1473
5bf193a2
AC
1474 add_setshow_boolean_cmd ("auto-solib-add", class_support,
1475 &auto_solib_add, _("\
1476Set autoloading of shared library symbols."), _("\
1477Show autoloading of shared library symbols."), _("\
b7209cb4
FF
1478If \"on\", symbols from all shared object libraries will be loaded\n\
1479automatically when the inferior begins execution, when the dynamic linker\n\
1480informs gdb that a new library has been loaded, or when attaching to the\n\
3e43a32a
MS
1481inferior. Otherwise, symbols must be loaded manually, using \
1482`sharedlibrary'."),
5bf193a2 1483 NULL,
920d2a44 1484 show_auto_solib_add,
5bf193a2 1485 &setlist, &showlist);
c906108c 1486
f822c95b
DJ
1487 add_setshow_filename_cmd ("sysroot", class_support,
1488 &gdb_sysroot, _("\
1489Set an alternate system root."), _("\
1490Show the current system root."), _("\
1491The system root is used to load absolute shared library symbol files.\n\
1492For other (relative) files, you can add directories using\n\
1493`set solib-search-path'."),
f397e303
AC
1494 reload_shared_libraries,
1495 NULL,
1496 &setlist, &showlist);
c906108c 1497
f822c95b
DJ
1498 add_alias_cmd ("solib-absolute-prefix", "sysroot", class_support, 0,
1499 &setlist);
1500 add_alias_cmd ("solib-absolute-prefix", "sysroot", class_support, 0,
1501 &showlist);
030292b7 1502
525226b5
AC
1503 add_setshow_optional_filename_cmd ("solib-search-path", class_support,
1504 &solib_search_path, _("\
3e43a32a
MS
1505Set the search path for loading non-absolute shared library symbol files."),
1506 _("\
1507Show the search path for loading non-absolute shared library symbol files."),
1508 _("\
1509This takes precedence over the environment variables \
1510PATH and LD_LIBRARY_PATH."),
525226b5 1511 reload_shared_libraries,
920d2a44 1512 show_solib_search_path,
525226b5 1513 &setlist, &showlist);
c906108c 1514}
This page took 1.177942 seconds and 4 git commands to generate.