* configure.ac: Check for the GNU/Linux ptrace signature.
[deliverable/binutils-gdb.git] / gdb / solib.c
CommitLineData
13437d4b 1/* Handle shared libraries for GDB, the GNU Debugger.
14a5e767 2
6aba47ca 3 Copyright (C) 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999,
9b254dd1
DJ
4 2000, 2001, 2002, 2003, 2005, 2006, 2007, 2008
5 Free Software Foundation, Inc.
c906108c 6
c5aa993b 7 This file is part of GDB.
c906108c 8
c5aa993b
JM
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
a9762ec7 11 the Free Software Foundation; either version 3 of the License, or
c5aa993b 12 (at your option) any later version.
c906108c 13
c5aa993b
JM
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License
a9762ec7 20 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c 21
c906108c
SS
22#include "defs.h"
23
c906108c 24#include <sys/types.h>
c906108c 25#include <fcntl.h>
13437d4b 26#include "gdb_string.h"
c906108c
SS
27#include "symtab.h"
28#include "bfd.h"
29#include "symfile.h"
30#include "objfiles.h"
60250e8b 31#include "exceptions.h"
c906108c
SS
32#include "gdbcore.h"
33#include "command.h"
34#include "target.h"
35#include "frame.h"
88987551 36#include "gdb_regex.h"
c906108c
SS
37#include "inferior.h"
38#include "environ.h"
39#include "language.h"
40#include "gdbcmd.h"
fa58ee11 41#include "completer.h"
fe4e3eb8 42#include "filenames.h" /* for DOSish file names */
4646aa9d 43#include "exec.h"
13437d4b 44#include "solist.h"
84acb35a 45#include "observer.h"
dbda9972 46#include "readline/readline.h"
c906108c 47
66aba65d
MK
48/* Architecture-specific operations. */
49
50/* Per-architecture data key. */
51static struct gdbarch_data *solib_data;
52
53static void *
54solib_init (struct obstack *obstack)
55{
56 struct target_so_ops **ops;
57
58 ops = OBSTACK_ZALLOC (obstack, struct target_so_ops *);
59 *ops = current_target_so_ops;
60 return ops;
61}
62
63static struct target_so_ops *
64solib_ops (struct gdbarch *gdbarch)
65{
66 struct target_so_ops **ops = gdbarch_data (gdbarch, solib_data);
67 return *ops;
68}
7d522c90
DJ
69
70/* Set the solib operations for GDBARCH to NEW_OPS. */
71
72void
73set_solib_ops (struct gdbarch *gdbarch, struct target_so_ops *new_ops)
74{
75 struct target_so_ops **ops = gdbarch_data (gdbarch, solib_data);
76 *ops = new_ops;
77}
66aba65d
MK
78\f
79
13437d4b 80/* external data declarations */
c906108c 81
7d522c90
DJ
82/* FIXME: gdbarch needs to control this variable, or else every
83 configuration needs to call set_solib_ops. */
13437d4b 84struct target_so_ops *current_target_so_ops;
23e04971
MS
85
86/* local data declarations */
07cd4b97 87
c906108c 88static struct so_list *so_list_head; /* List of known shared objects */
23e04971 89
c906108c
SS
90/* Local function prototypes */
91
c906108c
SS
92/* If non-empty, this is a search path for loading non-absolute shared library
93 symbol files. This takes precedence over the environment variables PATH
94 and LD_LIBRARY_PATH. */
95static char *solib_search_path = NULL;
920d2a44
AC
96static void
97show_solib_search_path (struct ui_file *file, int from_tty,
98 struct cmd_list_element *c, const char *value)
99{
100 fprintf_filtered (file, _("\
101The search path for loading non-absolute shared library symbol files is %s.\n"),
102 value);
103}
c906108c 104
e4f7b8c8
MS
105/*
106
107 GLOBAL FUNCTION
108
109 solib_open -- Find a shared library file and open it.
110
111 SYNOPSIS
112
113 int solib_open (char *in_patname, char **found_pathname);
114
115 DESCRIPTION
116
f822c95b 117 Global variable GDB_SYSROOT is used as a prefix directory
e4f7b8c8
MS
118 to search for shared libraries if they have an absolute path.
119
120 Global variable SOLIB_SEARCH_PATH is used as a prefix directory
121 (or set of directories, as in LD_LIBRARY_PATH) to search for all
f822c95b 122 shared libraries if not found in GDB_SYSROOT.
e4f7b8c8 123
c8c18e65 124 Search algorithm:
f822c95b
DJ
125 * If there is a gdb_sysroot and path is absolute:
126 * Search for gdb_sysroot/path.
c8c18e65
KW
127 * else
128 * Look for it literally (unmodified).
e4f7b8c8 129 * Look in SOLIB_SEARCH_PATH.
f43caff8 130 * If available, use target defined search function.
f822c95b 131 * If gdb_sysroot is NOT set, perform the following two searches:
c8c18e65
KW
132 * Look in inferior's $PATH.
133 * Look in inferior's $LD_LIBRARY_PATH.
134 *
135 * The last check avoids doing this search when targetting remote
f822c95b 136 * machines since gdb_sysroot will almost always be set.
e4f7b8c8
MS
137
138 RETURNS
b21f0843 139
e4f7b8c8
MS
140 file handle for opened solib, or -1 for failure. */
141
142int
143solib_open (char *in_pathname, char **found_pathname)
144{
66aba65d 145 struct target_so_ops *ops = solib_ops (current_gdbarch);
e4f7b8c8
MS
146 int found_file = -1;
147 char *temp_pathname = NULL;
fe4e3eb8 148 char *p = in_pathname;
f822c95b 149 int gdb_sysroot_is_empty;
58dc52c3 150
f822c95b 151 gdb_sysroot_is_empty = (gdb_sysroot == NULL || *gdb_sysroot == 0);
e4f7b8c8 152
f822c95b 153 if (! IS_ABSOLUTE_PATH (in_pathname) || gdb_sysroot_is_empty)
f1d10cfb
AS
154 temp_pathname = in_pathname;
155 else
e4f7b8c8 156 {
f822c95b 157 int prefix_len = strlen (gdb_sysroot);
f1d10cfb
AS
158
159 /* Remove trailing slashes from absolute prefix. */
160 while (prefix_len > 0
f822c95b 161 && IS_DIR_SEPARATOR (gdb_sysroot[prefix_len - 1]))
f1d10cfb
AS
162 prefix_len--;
163
164 /* Cat the prefixed pathname together. */
165 temp_pathname = alloca (prefix_len + strlen (in_pathname) + 1);
f822c95b 166 strncpy (temp_pathname, gdb_sysroot, prefix_len);
f1d10cfb
AS
167 temp_pathname[prefix_len] = '\0';
168 strcat (temp_pathname, in_pathname);
e4f7b8c8
MS
169 }
170
f1d10cfb
AS
171 /* Now see if we can open it. */
172 found_file = open (temp_pathname, O_RDONLY | O_BINARY, 0);
173
0997b535
MS
174 /* We try to find the library in various ways. After each attempt
175 (except for the one above), either found_file >= 0 and
176 temp_pathname is a malloc'd string, or found_file < 0 and
177 temp_pathname does not point to storage that needs to be
178 freed. */
179
180 if (found_file < 0)
181 temp_pathname = NULL;
182 else
183 temp_pathname = xstrdup (temp_pathname);
184
f822c95b 185 /* If the search in gdb_sysroot failed, and the path name is
ba5f0d88
OF
186 absolute at this point, make it relative. (openp will try and open the
187 file according to its absolute path otherwise, which is not what we want.)
188 Affects subsequent searches for this solib. */
189 if (found_file < 0 && IS_ABSOLUTE_PATH (in_pathname))
190 {
191 /* First, get rid of any drive letters etc. */
192 while (!IS_DIR_SEPARATOR (*in_pathname))
193 in_pathname++;
194
195 /* Next, get rid of all leading dir separators. */
196 while (IS_DIR_SEPARATOR (*in_pathname))
197 in_pathname++;
198 }
199
c8c18e65 200 /* If not found, search the solib_search_path (if any). */
e4f7b8c8 201 if (found_file < 0 && solib_search_path != NULL)
014d698b 202 found_file = openp (solib_search_path, OPF_TRY_CWD_FIRST,
637d6690 203 in_pathname, O_RDONLY | O_BINARY, 0, &temp_pathname);
ba5f0d88
OF
204
205 /* If not found, next search the solib_search_path (if any) for the basename
206 only (ignoring the path). This is to allow reading solibs from a path
207 that differs from the opened path. */
208 if (found_file < 0 && solib_search_path != NULL)
014d698b 209 found_file = openp (solib_search_path, OPF_TRY_CWD_FIRST,
637d6690 210 lbasename (in_pathname), O_RDONLY | O_BINARY, 0,
ba5f0d88 211 &temp_pathname);
e4f7b8c8 212
2610b0bf 213 /* If not found, try to use target supplied solib search method */
66aba65d 214 if (found_file < 0 && ops->find_and_open_solib)
637d6690 215 found_file = ops->find_and_open_solib (in_pathname, O_RDONLY | O_BINARY,
66aba65d 216 &temp_pathname);
2610b0bf 217
e4f7b8c8 218 /* If not found, next search the inferior's $PATH environment variable. */
f822c95b 219 if (found_file < 0 && gdb_sysroot_is_empty)
e4f7b8c8 220 found_file = openp (get_in_environ (inferior_environ, "PATH"),
637d6690 221 OPF_TRY_CWD_FIRST, in_pathname, O_RDONLY | O_BINARY, 0,
014d698b 222 &temp_pathname);
e4f7b8c8
MS
223
224 /* If not found, next search the inferior's $LD_LIBRARY_PATH
225 environment variable. */
f822c95b 226 if (found_file < 0 && gdb_sysroot_is_empty)
e4f7b8c8 227 found_file = openp (get_in_environ (inferior_environ, "LD_LIBRARY_PATH"),
637d6690 228 OPF_TRY_CWD_FIRST, in_pathname, O_RDONLY | O_BINARY, 0,
014d698b 229 &temp_pathname);
e4f7b8c8
MS
230
231 /* Done. If not found, tough luck. Return found_file and
232 (optionally) found_pathname. */
0997b535
MS
233 if (temp_pathname)
234 {
235 if (found_pathname != NULL)
236 *found_pathname = temp_pathname;
237 else
238 xfree (temp_pathname);
239 }
e4f7b8c8
MS
240 return found_file;
241}
242
243
c906108c
SS
244/*
245
c5aa993b 246 LOCAL FUNCTION
c906108c 247
c5aa993b 248 solib_map_sections -- open bfd and build sections for shared lib
c906108c 249
c5aa993b 250 SYNOPSIS
c906108c 251
c5aa993b 252 static int solib_map_sections (struct so_list *so)
c906108c 253
c5aa993b 254 DESCRIPTION
c906108c 255
c5aa993b
JM
256 Given a pointer to one of the shared objects in our list
257 of mapped objects, use the recorded name to open a bfd
258 descriptor for the object, build a section table, and then
259 relocate all the section addresses by the base address at
260 which the shared object was mapped.
c906108c 261
c5aa993b 262 FIXMES
c906108c 263
c5aa993b
JM
264 In most (all?) cases the shared object file name recorded in the
265 dynamic linkage tables will be a fully qualified pathname. For
266 cases where it isn't, do we really mimic the systems search
267 mechanism correctly in the below code (particularly the tilde
268 expansion stuff?).
c906108c
SS
269 */
270
271static int
4efb68b1 272solib_map_sections (void *arg)
c906108c
SS
273{
274 struct so_list *so = (struct so_list *) arg; /* catch_errors bogon */
275 char *filename;
276 char *scratch_pathname;
277 int scratch_chan;
278 struct section_table *p;
279 struct cleanup *old_chain;
280 bfd *abfd;
c5aa993b
JM
281
282 filename = tilde_expand (so->so_name);
283
b8c9b27d 284 old_chain = make_cleanup (xfree, filename);
e4f7b8c8 285 scratch_chan = solib_open (filename, &scratch_pathname);
c906108c 286
c906108c
SS
287 if (scratch_chan < 0)
288 {
13437d4b
KB
289 perror_with_name (filename);
290 }
104c1213 291
e4f7b8c8 292 /* Leave scratch_pathname allocated. abfd->name will point to it. */
9f76c2cd 293 abfd = bfd_fopen (scratch_pathname, gnutarget, FOPEN_RB, scratch_chan);
13437d4b 294 if (!abfd)
23e04971 295 {
13437d4b 296 close (scratch_chan);
8a3fe4f8 297 error (_("Could not open `%s' as an executable file: %s"),
13437d4b
KB
298 scratch_pathname, bfd_errmsg (bfd_get_error ()));
299 }
e4f7b8c8 300
13437d4b
KB
301 /* Leave bfd open, core_xfer_memory and "info files" need it. */
302 so->abfd = abfd;
549c1eea 303 bfd_set_cacheable (abfd, 1);
23e04971 304
e4f7b8c8
MS
305 /* copy full path name into so_name, so that later symbol_file_add
306 can find it */
13437d4b 307 if (strlen (scratch_pathname) >= SO_NAME_MAX_PATH_SIZE)
8a3fe4f8 308 error (_("Full path name length of shared library exceeds SO_NAME_MAX_PATH_SIZE in so_list structure."));
13437d4b 309 strcpy (so->so_name, scratch_pathname);
23e04971 310
13437d4b
KB
311 if (!bfd_check_format (abfd, bfd_object))
312 {
8a3fe4f8 313 error (_("\"%s\": not in executable format: %s."),
13437d4b 314 scratch_pathname, bfd_errmsg (bfd_get_error ()));
23e04971 315 }
13437d4b 316 if (build_section_table (abfd, &so->sections, &so->sections_end))
23e04971 317 {
8a3fe4f8 318 error (_("Can't find the file sections in `%s': %s"),
13437d4b 319 bfd_get_filename (abfd), bfd_errmsg (bfd_get_error ()));
23e04971 320 }
104c1213 321
13437d4b 322 for (p = so->sections; p < so->sections_end; p++)
104c1213 323 {
66aba65d
MK
324 struct target_so_ops *ops = solib_ops (current_gdbarch);
325
13437d4b
KB
326 /* Relocate the section binding addresses as recorded in the shared
327 object's file by the base address to which the object was actually
328 mapped. */
66aba65d 329 ops->relocate_section_addresses (so, p);
cfa9d6d9
DJ
330
331 /* If the target didn't provide information about the address
332 range of the shared object, assume we want the location of
333 the .text section. */
334 if (so->addr_low == 0 && so->addr_high == 0
335 && strcmp (p->the_bfd_section->name, ".text") == 0)
13437d4b 336 {
cfa9d6d9
DJ
337 so->addr_low = p->addr;
338 so->addr_high = p->endaddr;
13437d4b 339 }
104c1213
JM
340 }
341
13437d4b
KB
342 /* Free the file names, close the file now. */
343 do_cleanups (old_chain);
104c1213 344
13437d4b 345 return (1);
104c1213 346}
c906108c 347
07cd4b97 348/* LOCAL FUNCTION
c906108c 349
07cd4b97 350 free_so --- free a `struct so_list' object
c906108c 351
c5aa993b 352 SYNOPSIS
c906108c 353
07cd4b97 354 void free_so (struct so_list *so)
c906108c 355
c5aa993b 356 DESCRIPTION
c906108c 357
07cd4b97
JB
358 Free the storage associated with the `struct so_list' object SO.
359 If we have opened a BFD for SO, close it.
c906108c 360
07cd4b97
JB
361 The caller is responsible for removing SO from whatever list it is
362 a member of. If we have placed SO's sections in some target's
363 section table, the caller is responsible for removing them.
c906108c 364
07cd4b97
JB
365 This function doesn't mess with objfiles at all. If there is an
366 objfile associated with SO that needs to be removed, the caller is
367 responsible for taking care of that. */
368
13437d4b 369void
07cd4b97 370free_so (struct so_list *so)
c906108c 371{
66aba65d 372 struct target_so_ops *ops = solib_ops (current_gdbarch);
07cd4b97 373 char *bfd_filename = 0;
c5aa993b 374
07cd4b97 375 if (so->sections)
b8c9b27d 376 xfree (so->sections);
07cd4b97
JB
377
378 if (so->abfd)
c906108c 379 {
07cd4b97
JB
380 bfd_filename = bfd_get_filename (so->abfd);
381 if (! bfd_close (so->abfd))
8a3fe4f8 382 warning (_("cannot close \"%s\": %s"),
07cd4b97 383 bfd_filename, bfd_errmsg (bfd_get_error ()));
c906108c 384 }
07cd4b97
JB
385
386 if (bfd_filename)
b8c9b27d 387 xfree (bfd_filename);
07cd4b97 388
66aba65d 389 ops->free_so (so);
07cd4b97 390
b8c9b27d 391 xfree (so);
c906108c
SS
392}
393
07cd4b97 394
f8766ec1
KB
395/* Return address of first so_list entry in master shared object list. */
396struct so_list *
397master_so_list (void)
398{
399 return so_list_head;
400}
401
402
c906108c
SS
403/* A small stub to get us past the arg-passing pinhole of catch_errors. */
404
405static int
4efb68b1 406symbol_add_stub (void *arg)
c906108c 407{
52f0bd74 408 struct so_list *so = (struct so_list *) arg; /* catch_errs bogon */
62557bbc 409 struct section_addr_info *sap;
c906108c 410
07cd4b97
JB
411 /* Have we already loaded this shared object? */
412 ALL_OBJFILES (so->objfile)
413 {
414 if (strcmp (so->objfile->name, so->so_name) == 0)
415 return 1;
416 }
417
62557bbc
KB
418 sap = build_section_addr_info_from_section_table (so->sections,
419 so->sections_end);
e7cf9df1 420
62557bbc
KB
421 so->objfile = symbol_file_add (so->so_name, so->from_tty,
422 sap, 0, OBJF_SHARED);
423 free_section_addr_info (sap);
c906108c 424
07cd4b97 425 return (1);
c906108c
SS
426}
427
42a6e6a0
MK
428/* Read in symbols for shared object SO. If FROM_TTY is non-zero, be
429 chatty about it. Return non-zero if any symbols were actually
430 loaded. */
431
432int
433solib_read_symbols (struct so_list *so, int from_tty)
434{
435 if (so->symbols_loaded)
436 {
437 if (from_tty)
a3f17187 438 printf_unfiltered (_("Symbols already loaded for %s\n"), so->so_name);
42a6e6a0 439 }
8bb75286
DJ
440 else if (so->abfd == NULL)
441 {
442 if (from_tty)
443 printf_unfiltered (_("Symbol file not found for %s\n"), so->so_name);
444 }
42a6e6a0
MK
445 else
446 {
447 if (catch_errors (symbol_add_stub, so,
448 "Error while reading shared library symbols:\n",
449 RETURN_MASK_ALL))
450 {
bf250677 451 if (from_tty && print_symbol_loading)
a3f17187 452 printf_unfiltered (_("Loaded symbols for %s\n"), so->so_name);
42a6e6a0
MK
453 so->symbols_loaded = 1;
454 return 1;
455 }
456 }
457
458 return 0;
459}
c906108c 460
07cd4b97 461/* LOCAL FUNCTION
c906108c 462
105b175f 463 update_solib_list --- synchronize GDB's shared object list with inferior's
c906108c 464
c5aa993b 465 SYNOPSIS
c906108c 466
105b175f 467 void update_solib_list (int from_tty, struct target_ops *TARGET)
c906108c 468
07cd4b97 469 Extract the list of currently loaded shared objects from the
105b175f
JB
470 inferior, and compare it with the list of shared objects currently
471 in GDB's so_list_head list. Edit so_list_head to bring it in sync
472 with the inferior's new list.
c906108c 473
105b175f
JB
474 If we notice that the inferior has unloaded some shared objects,
475 free any symbolic info GDB had read about those shared objects.
476
477 Don't load symbolic info for any new shared objects; just add them
478 to the list, and leave their symbols_loaded flag clear.
07cd4b97
JB
479
480 If FROM_TTY is non-null, feel free to print messages about what
481 we're doing.
c906108c 482
07cd4b97
JB
483 If TARGET is non-null, add the sections of all new shared objects
484 to TARGET's section table. Note that this doesn't remove any
485 sections for shared objects that have been unloaded, and it
486 doesn't check to see if the new shared objects are already present in
487 the section table. But we only use this for core files and
488 processes we've just attached to, so that's okay. */
c906108c 489
a78f21af 490static void
105b175f 491update_solib_list (int from_tty, struct target_ops *target)
07cd4b97 492{
66aba65d
MK
493 struct target_so_ops *ops = solib_ops (current_gdbarch);
494 struct so_list *inferior = ops->current_sos();
07cd4b97
JB
495 struct so_list *gdb, **gdb_link;
496
104c1213
JM
497 /* If we are attaching to a running process for which we
498 have not opened a symbol file, we may be able to get its
499 symbols now! */
500 if (attach_flag &&
501 symfile_objfile == NULL)
66aba65d 502 catch_errors (ops->open_symbol_file_object, &from_tty,
104c1213
JM
503 "Error reading attached process's symbol file.\n",
504 RETURN_MASK_ALL);
505
07cd4b97
JB
506 /* GDB and the inferior's dynamic linker each maintain their own
507 list of currently loaded shared objects; we want to bring the
508 former in sync with the latter. Scan both lists, seeing which
509 shared objects appear where. There are three cases:
510
511 - A shared object appears on both lists. This means that GDB
105b175f
JB
512 knows about it already, and it's still loaded in the inferior.
513 Nothing needs to happen.
07cd4b97
JB
514
515 - A shared object appears only on GDB's list. This means that
105b175f
JB
516 the inferior has unloaded it. We should remove the shared
517 object from GDB's tables.
07cd4b97
JB
518
519 - A shared object appears only on the inferior's list. This
105b175f
JB
520 means that it's just been loaded. We should add it to GDB's
521 tables.
07cd4b97
JB
522
523 So we walk GDB's list, checking each entry to see if it appears
524 in the inferior's list too. If it does, no action is needed, and
525 we remove it from the inferior's list. If it doesn't, the
526 inferior has unloaded it, and we remove it from GDB's list. By
527 the time we're done walking GDB's list, the inferior's list
528 contains only the new shared objects, which we then add. */
529
530 gdb = so_list_head;
531 gdb_link = &so_list_head;
532 while (gdb)
c906108c 533 {
07cd4b97
JB
534 struct so_list *i = inferior;
535 struct so_list **i_link = &inferior;
536
537 /* Check to see whether the shared object *gdb also appears in
538 the inferior's current list. */
539 while (i)
c906108c 540 {
a7c02bc8
VP
541 if (ops->same)
542 {
543 if (ops->same (gdb, i))
544 break;
545 }
546 else
547 {
548 if (! strcmp (gdb->so_original_name, i->so_original_name))
549 break;
550 }
07cd4b97
JB
551
552 i_link = &i->next;
553 i = *i_link;
c906108c 554 }
c5aa993b 555
07cd4b97
JB
556 /* If the shared object appears on the inferior's list too, then
557 it's still loaded, so we don't need to do anything. Delete
558 it from the inferior's list, and leave it on GDB's list. */
559 if (i)
c906108c 560 {
07cd4b97 561 *i_link = i->next;
07cd4b97
JB
562 free_so (i);
563 gdb_link = &gdb->next;
564 gdb = *gdb_link;
565 }
566
567 /* If it's not on the inferior's list, remove it from GDB's tables. */
568 else
569 {
42a6e6a0
MK
570 /* Notify any observer that the shared object has been
571 unloaded before we remove it from GDB's tables. */
84acb35a
JJ
572 observer_notify_solib_unloaded (gdb);
573
07cd4b97 574 *gdb_link = gdb->next;
07cd4b97
JB
575
576 /* Unless the user loaded it explicitly, free SO's objfile. */
e8930304 577 if (gdb->objfile && ! (gdb->objfile->flags & OBJF_USERLOADED))
07cd4b97
JB
578 free_objfile (gdb->objfile);
579
580 /* Some targets' section tables might be referring to
581 sections from so->abfd; remove them. */
582 remove_target_sections (gdb->abfd);
583
584 free_so (gdb);
585 gdb = *gdb_link;
c906108c
SS
586 }
587 }
c5aa993b 588
07cd4b97
JB
589 /* Now the inferior's list contains only shared objects that don't
590 appear in GDB's list --- those that are newly loaded. Add them
e8930304 591 to GDB's shared object list. */
07cd4b97 592 if (inferior)
c906108c 593 {
07cd4b97
JB
594 struct so_list *i;
595
596 /* Add the new shared objects to GDB's list. */
597 *gdb_link = inferior;
598
e8930304 599 /* Fill in the rest of each of the `struct so_list' nodes. */
07cd4b97 600 for (i = inferior; i; i = i->next)
c906108c 601 {
07cd4b97
JB
602 i->from_tty = from_tty;
603
604 /* Fill in the rest of the `struct so_list' node. */
605 catch_errors (solib_map_sections, i,
606 "Error while mapping shared library sections:\n",
607 RETURN_MASK_ALL);
07cd4b97 608
b41be06e
ND
609 /* If requested, add the shared object's sections to the TARGET's
610 section table. Do this immediately after mapping the object so
611 that later nodes in the list can query this object, as is needed
612 in solib-osf.c. */
613 if (target)
c906108c 614 {
b41be06e
ND
615 int count = (i->sections_end - i->sections);
616 if (count > 0)
07cd4b97 617 {
b41be06e 618 int space = target_resize_to_sections (target, count);
07cd4b97
JB
619 memcpy (target->to_sections + space,
620 i->sections,
621 count * sizeof (i->sections[0]));
07cd4b97 622 }
c906108c 623 }
42a6e6a0
MK
624
625 /* Notify any observer that the shared object has been
626 loaded now that we've added it to GDB's tables. */
627 observer_notify_solib_loaded (i);
c906108c 628 }
e8930304 629 }
105b175f
JB
630}
631
6612ad7f
JB
632/* Return non-zero if SO is the libpthread shared library.
633
634 Uses a fairly simplistic heuristic approach where we check
635 the file name against "/libpthread". This can lead to false
636 positives, but this should be good enough in practice. */
637
638static int
639libpthread_solib_p (struct so_list *so)
640{
641 return (strstr (so->so_name, "/libpthread") != NULL);
642}
105b175f
JB
643
644/* GLOBAL FUNCTION
645
646 solib_add -- read in symbol info for newly added shared libraries
647
648 SYNOPSIS
649
990f9fe3
FF
650 void solib_add (char *pattern, int from_tty, struct target_ops
651 *TARGET, int readsyms)
105b175f
JB
652
653 DESCRIPTION
654
655 Read in symbolic information for any shared objects whose names
656 match PATTERN. (If we've already read a shared object's symbol
657 info, leave it alone.) If PATTERN is zero, read them all.
658
990f9fe3
FF
659 If READSYMS is 0, defer reading symbolic information until later
660 but still do any needed low level processing.
661
105b175f
JB
662 FROM_TTY and TARGET are as described for update_solib_list, above. */
663
664void
990f9fe3 665solib_add (char *pattern, int from_tty, struct target_ops *target, int readsyms)
105b175f
JB
666{
667 struct so_list *gdb;
668
669 if (pattern)
670 {
671 char *re_err = re_comp (pattern);
672
673 if (re_err)
8a3fe4f8 674 error (_("Invalid regexp: %s"), re_err);
105b175f
JB
675 }
676
677 update_solib_list (from_tty, target);
c906108c 678
105b175f
JB
679 /* Walk the list of currently loaded shared libraries, and read
680 symbols for any that match the pattern --- or any whose symbols
681 aren't already loaded, if no pattern was given. */
e8930304
JB
682 {
683 int any_matches = 0;
684 int loaded_any_symbols = 0;
c906108c 685
e8930304
JB
686 for (gdb = so_list_head; gdb; gdb = gdb->next)
687 if (! pattern || re_exec (gdb->so_name))
688 {
6612ad7f
JB
689 /* Normally, we would read the symbols from that library
690 only if READSYMS is set. However, we're making a small
691 exception for the pthread library, because we sometimes
692 need the library symbols to be loaded in order to provide
693 thread support (x86-linux for instance). */
694 const int add_this_solib =
695 (readsyms || libpthread_solib_p (gdb));
696
e8930304 697 any_matches = 1;
6612ad7f 698 if (add_this_solib && solib_read_symbols (gdb, from_tty))
42a6e6a0 699 loaded_any_symbols = 1;
e8930304
JB
700 }
701
702 if (from_tty && pattern && ! any_matches)
703 printf_unfiltered
704 ("No loaded shared libraries match the pattern `%s'.\n", pattern);
705
706 if (loaded_any_symbols)
707 {
66aba65d
MK
708 struct target_so_ops *ops = solib_ops (current_gdbarch);
709
e8930304
JB
710 /* Getting new symbols may change our opinion about what is
711 frameless. */
712 reinit_frame_cache ();
713
66aba65d 714 ops->special_symbol_handling ();
e8930304
JB
715 }
716 }
c906108c
SS
717}
718
07cd4b97 719
c906108c
SS
720/*
721
c5aa993b 722 LOCAL FUNCTION
c906108c 723
c5aa993b 724 info_sharedlibrary_command -- code for "info sharedlibrary"
c906108c 725
c5aa993b 726 SYNOPSIS
c906108c 727
c5aa993b 728 static void info_sharedlibrary_command ()
c906108c 729
c5aa993b 730 DESCRIPTION
c906108c 731
c5aa993b
JM
732 Walk through the shared library list and print information
733 about each attached library.
734 */
c906108c
SS
735
736static void
fba45db2 737info_sharedlibrary_command (char *ignore, int from_tty)
c906108c 738{
52f0bd74 739 struct so_list *so = NULL; /* link map state variable */
c906108c
SS
740 int header_done = 0;
741 int addr_width;
c906108c 742
84eb3c4f 743 /* "0x", a little whitespace, and two hex digits per byte of pointers. */
819844ad 744 addr_width = 4 + (gdbarch_ptr_bit (current_gdbarch) / 4);
c906108c 745
105b175f 746 update_solib_list (from_tty, 0);
07cd4b97
JB
747
748 for (so = so_list_head; so; so = so->next)
c906108c 749 {
c5aa993b 750 if (so->so_name[0])
c906108c
SS
751 {
752 if (!header_done)
753 {
c5aa993b
JM
754 printf_unfiltered ("%-*s%-*s%-12s%s\n", addr_width, "From",
755 addr_width, "To", "Syms Read",
756 "Shared Object Library");
c906108c
SS
757 header_done++;
758 }
759
760 printf_unfiltered ("%-*s", addr_width,
cfa9d6d9 761 so->addr_high != 0
bb599908 762 ? hex_string_custom (
cfa9d6d9 763 (LONGEST) so->addr_low,
bb599908 764 addr_width - 4)
749499cb 765 : "");
c906108c 766 printf_unfiltered ("%-*s", addr_width,
cfa9d6d9 767 so->addr_high != 0
bb599908 768 ? hex_string_custom (
cfa9d6d9 769 (LONGEST) so->addr_high,
bb599908 770 addr_width - 4)
749499cb 771 : "");
c5aa993b
JM
772 printf_unfiltered ("%-12s", so->symbols_loaded ? "Yes" : "No");
773 printf_unfiltered ("%s\n", so->so_name);
c906108c
SS
774 }
775 }
776 if (so_list_head == NULL)
777 {
a3f17187 778 printf_unfiltered (_("No shared libraries loaded at this time.\n"));
c906108c
SS
779 }
780}
781
782/*
783
c5aa993b 784 GLOBAL FUNCTION
c906108c 785
c5aa993b 786 solib_address -- check to see if an address is in a shared lib
c906108c 787
c5aa993b 788 SYNOPSIS
c906108c 789
c5aa993b 790 char * solib_address (CORE_ADDR address)
c906108c 791
c5aa993b 792 DESCRIPTION
c906108c 793
c5aa993b
JM
794 Provides a hook for other gdb routines to discover whether or
795 not a particular address is within the mapped address space of
749499cb 796 a shared library.
c906108c 797
c5aa993b
JM
798 For example, this routine is called at one point to disable
799 breakpoints which are in shared libraries that are not currently
800 mapped in.
c906108c
SS
801 */
802
803char *
fba45db2 804solib_address (CORE_ADDR address)
c906108c 805{
52f0bd74 806 struct so_list *so = 0; /* link map state variable */
c5aa993b 807
07cd4b97 808 for (so = so_list_head; so; so = so->next)
c906108c 809 {
749499cb
KB
810 struct section_table *p;
811
812 for (p = so->sections; p < so->sections_end; p++)
813 {
814 if (p->addr <= address && address < p->endaddr)
815 return (so->so_name);
816 }
c906108c 817 }
07cd4b97 818
c906108c
SS
819 return (0);
820}
821
822/* Called by free_all_symtabs */
823
c5aa993b 824void
fba45db2 825clear_solib (void)
c906108c 826{
66aba65d
MK
827 struct target_so_ops *ops = solib_ops (current_gdbarch);
828
085dd6e6
JM
829 /* This function is expected to handle ELF shared libraries. It is
830 also used on Solaris, which can run either ELF or a.out binaries
831 (for compatibility with SunOS 4), both of which can use shared
832 libraries. So we don't know whether we have an ELF executable or
833 an a.out executable until the user chooses an executable file.
834
835 ELF shared libraries don't get mapped into the address space
836 until after the program starts, so we'd better not try to insert
837 breakpoints in them immediately. We have to wait until the
838 dynamic linker has loaded them; we'll hit a bp_shlib_event
839 breakpoint (look for calls to create_solib_event_breakpoint) when
840 it's ready.
841
842 SunOS shared libraries seem to be different --- they're present
843 as soon as the process begins execution, so there's no need to
844 put off inserting breakpoints. There's also nowhere to put a
845 bp_shlib_event breakpoint, so if we put it off, we'll never get
846 around to it.
847
848 So: disable breakpoints only if we're using ELF shared libs. */
849 if (exec_bfd != NULL
850 && bfd_get_flavour (exec_bfd) != bfd_target_aout_flavour)
cb851954 851 disable_breakpoints_in_shlibs ();
085dd6e6 852
c906108c
SS
853 while (so_list_head)
854 {
07cd4b97
JB
855 struct so_list *so = so_list_head;
856 so_list_head = so->next;
2069d78d
KB
857 if (so->abfd)
858 remove_target_sections (so->abfd);
07cd4b97 859 free_so (so);
c906108c 860 }
07cd4b97 861
66aba65d 862 ops->clear_solib ();
c906108c
SS
863}
864
13437d4b 865/* GLOBAL FUNCTION
c5aa993b
JM
866
867 solib_create_inferior_hook -- shared library startup support
868
869 SYNOPSIS
870
7095b863 871 void solib_create_inferior_hook ()
c5aa993b
JM
872
873 DESCRIPTION
874
875 When gdb starts up the inferior, it nurses it along (through the
876 shell) until it is ready to execute it's first instruction. At this
877 point, this function gets called via expansion of the macro
13437d4b 878 SOLIB_CREATE_INFERIOR_HOOK. */
c5aa993b
JM
879
880void
fba45db2 881solib_create_inferior_hook (void)
c906108c 882{
66aba65d
MK
883 struct target_so_ops *ops = solib_ops (current_gdbarch);
884 ops->solib_create_inferior_hook();
c906108c
SS
885}
886
d7fa2ae2
KB
887/* GLOBAL FUNCTION
888
889 in_solib_dynsym_resolve_code -- check to see if an address is in
890 dynamic loader's dynamic symbol
891 resolution code
892
893 SYNOPSIS
894
895 int in_solib_dynsym_resolve_code (CORE_ADDR pc)
896
897 DESCRIPTION
898
899 Determine if PC is in the dynamic linker's symbol resolution
900 code. Return 1 if so, 0 otherwise.
901*/
902
903int
904in_solib_dynsym_resolve_code (CORE_ADDR pc)
905{
66aba65d
MK
906 struct target_so_ops *ops = solib_ops (current_gdbarch);
907 return ops->in_dynsym_resolve_code (pc);
d7fa2ae2 908}
c906108c
SS
909
910/*
911
c5aa993b 912 LOCAL FUNCTION
c906108c 913
c5aa993b 914 sharedlibrary_command -- handle command to explicitly add library
c906108c 915
c5aa993b 916 SYNOPSIS
c906108c 917
c5aa993b 918 static void sharedlibrary_command (char *args, int from_tty)
c906108c 919
c5aa993b 920 DESCRIPTION
c906108c 921
c5aa993b 922 */
c906108c
SS
923
924static void
fba45db2 925sharedlibrary_command (char *args, int from_tty)
c906108c
SS
926{
927 dont_repeat ();
990f9fe3 928 solib_add (args, from_tty, (struct target_ops *) 0, 1);
c906108c
SS
929}
930
cb0ba49e
MS
931/* LOCAL FUNCTION
932
933 no_shared_libraries -- handle command to explicitly discard symbols
934 from shared libraries.
935
936 DESCRIPTION
937
938 Implements the command "nosharedlibrary", which discards symbols
939 that have been auto-loaded from shared libraries. Symbols from
940 shared libraries that were added by explicit request of the user
941 are not discarded. Also called from remote.c. */
942
c60a7562
MS
943void
944no_shared_libraries (char *ignored, int from_tty)
945{
946 objfile_purge_solibs ();
615b9dba 947 clear_solib ();
c60a7562 948}
c906108c 949
cf466558 950static void
f397e303
AC
951reload_shared_libraries (char *ignored, int from_tty,
952 struct cmd_list_element *e)
cf466558
KB
953{
954 no_shared_libraries (NULL, from_tty);
955 solib_add (NULL, from_tty, NULL, auto_solib_add);
956}
957
920d2a44
AC
958static void
959show_auto_solib_add (struct ui_file *file, int from_tty,
960 struct cmd_list_element *c, const char *value)
961{
962 fprintf_filtered (file, _("Autoloading of shared library symbols is %s.\n"),
963 value);
964}
965
966
3a40aaa0
UW
967/* Handler for library-specific lookup of global symbol NAME in OBJFILE. Call
968 the library-specific handler if it is installed for the current target. */
969
970struct symbol *
971solib_global_lookup (const struct objfile *objfile,
972 const char *name,
973 const char *linkage_name,
21b556f4 974 const domain_enum domain)
3a40aaa0 975{
e8a92f7b 976 struct target_so_ops *ops = solib_ops (current_gdbarch);
3a40aaa0 977
e8a92f7b 978 if (ops->lookup_lib_global_symbol != NULL)
21b556f4 979 return ops->lookup_lib_global_symbol (objfile, name, linkage_name, domain);
3a40aaa0
UW
980 return NULL;
981}
982
983
a78f21af
AC
984extern initialize_file_ftype _initialize_solib; /* -Wmissing-prototypes */
985
c906108c 986void
fba45db2 987_initialize_solib (void)
c906108c 988{
fa58ee11
EZ
989 struct cmd_list_element *c;
990
66aba65d
MK
991 solib_data = gdbarch_data_register_pre_init (solib_init);
992
c906108c 993 add_com ("sharedlibrary", class_files, sharedlibrary_command,
1bedd215 994 _("Load shared object library symbols for files matching REGEXP."));
c5aa993b 995 add_info ("sharedlibrary", info_sharedlibrary_command,
1bedd215 996 _("Status of loaded shared object libraries."));
c60a7562 997 add_com ("nosharedlibrary", class_files, no_shared_libraries,
1bedd215 998 _("Unload all shared object library symbols."));
c906108c 999
5bf193a2
AC
1000 add_setshow_boolean_cmd ("auto-solib-add", class_support,
1001 &auto_solib_add, _("\
1002Set autoloading of shared library symbols."), _("\
1003Show autoloading of shared library symbols."), _("\
b7209cb4
FF
1004If \"on\", symbols from all shared object libraries will be loaded\n\
1005automatically when the inferior begins execution, when the dynamic linker\n\
1006informs gdb that a new library has been loaded, or when attaching to the\n\
5bf193a2
AC
1007inferior. Otherwise, symbols must be loaded manually, using `sharedlibrary'."),
1008 NULL,
920d2a44 1009 show_auto_solib_add,
5bf193a2 1010 &setlist, &showlist);
c906108c 1011
f822c95b
DJ
1012 add_setshow_filename_cmd ("sysroot", class_support,
1013 &gdb_sysroot, _("\
1014Set an alternate system root."), _("\
1015Show the current system root."), _("\
1016The system root is used to load absolute shared library symbol files.\n\
1017For other (relative) files, you can add directories using\n\
1018`set solib-search-path'."),
f397e303
AC
1019 reload_shared_libraries,
1020 NULL,
1021 &setlist, &showlist);
c906108c 1022
f822c95b
DJ
1023 add_alias_cmd ("solib-absolute-prefix", "sysroot", class_support, 0,
1024 &setlist);
1025 add_alias_cmd ("solib-absolute-prefix", "sysroot", class_support, 0,
1026 &showlist);
030292b7 1027
525226b5
AC
1028 add_setshow_optional_filename_cmd ("solib-search-path", class_support,
1029 &solib_search_path, _("\
1030Set the search path for loading non-absolute shared library symbol files."), _("\
1031Show the search path for loading non-absolute shared library symbol files."), _("\
1032This takes precedence over the environment variables PATH and LD_LIBRARY_PATH."),
1033 reload_shared_libraries,
920d2a44 1034 show_solib_search_path,
525226b5 1035 &setlist, &showlist);
c906108c 1036}
This page took 0.806683 seconds and 4 git commands to generate.