3fed9dbe96e770670d46f7ffbc6535d7064bde9a
[deliverable/binutils-gdb.git] / gdb / solib.c
1 /* Handle shared libraries for GDB, the GNU Debugger.
2
3 Copyright (C) 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999,
4 2000, 2001, 2002, 2003, 2005, 2006, 2007, 2008, 2009, 2010
5 Free Software Foundation, Inc.
6
7 This file is part of GDB.
8
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
13
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>. */
21
22 #include "defs.h"
23
24 #include <sys/types.h>
25 #include <fcntl.h>
26 #include "gdb_string.h"
27 #include "symtab.h"
28 #include "bfd.h"
29 #include "symfile.h"
30 #include "objfiles.h"
31 #include "exceptions.h"
32 #include "gdbcore.h"
33 #include "command.h"
34 #include "target.h"
35 #include "frame.h"
36 #include "gdb_regex.h"
37 #include "inferior.h"
38 #include "environ.h"
39 #include "language.h"
40 #include "gdbcmd.h"
41 #include "completer.h"
42 #include "filenames.h" /* for DOSish file names */
43 #include "exec.h"
44 #include "solist.h"
45 #include "observer.h"
46 #include "readline/readline.h"
47 #include "remote.h"
48 #include "solib.h"
49 #include "interps.h"
50
51 /* Architecture-specific operations. */
52
53 /* Per-architecture data key. */
54 static struct gdbarch_data *solib_data;
55
56 static void *
57 solib_init (struct obstack *obstack)
58 {
59 struct target_so_ops **ops;
60
61 ops = OBSTACK_ZALLOC (obstack, struct target_so_ops *);
62 *ops = current_target_so_ops;
63 return ops;
64 }
65
66 static struct target_so_ops *
67 solib_ops (struct gdbarch *gdbarch)
68 {
69 struct target_so_ops **ops = gdbarch_data (gdbarch, solib_data);
70 return *ops;
71 }
72
73 /* Set the solib operations for GDBARCH to NEW_OPS. */
74
75 void
76 set_solib_ops (struct gdbarch *gdbarch, struct target_so_ops *new_ops)
77 {
78 struct target_so_ops **ops = gdbarch_data (gdbarch, solib_data);
79 *ops = new_ops;
80 }
81 \f
82
83 /* external data declarations */
84
85 /* FIXME: gdbarch needs to control this variable, or else every
86 configuration needs to call set_solib_ops. */
87 struct target_so_ops *current_target_so_ops;
88
89 /* List of known shared objects */
90 #define so_list_head current_program_space->so_list
91
92 /* Local function prototypes */
93
94 /* If non-empty, this is a search path for loading non-absolute shared library
95 symbol files. This takes precedence over the environment variables PATH
96 and LD_LIBRARY_PATH. */
97 static char *solib_search_path = NULL;
98 static void
99 show_solib_search_path (struct ui_file *file, int from_tty,
100 struct cmd_list_element *c, const char *value)
101 {
102 fprintf_filtered (file, _("\
103 The search path for loading non-absolute shared library symbol files is %s.\n"),
104 value);
105 }
106
107 /*
108
109 GLOBAL FUNCTION
110
111 solib_find -- Find a shared library file.
112
113 SYNOPSIS
114
115 char *solib_find (char *in_pathname, int *fd);
116
117 DESCRIPTION
118
119 Global variable GDB_SYSROOT is used as a prefix directory
120 to search for shared libraries if they have an absolute path.
121
122 Global variable SOLIB_SEARCH_PATH is used as a prefix directory
123 (or set of directories, as in LD_LIBRARY_PATH) to search for all
124 shared libraries if not found in GDB_SYSROOT.
125
126 Search algorithm:
127 * If there is a gdb_sysroot and path is absolute:
128 * Search for gdb_sysroot/path.
129 * else
130 * Look for it literally (unmodified).
131 * Look in SOLIB_SEARCH_PATH.
132 * If available, use target defined search function.
133 * If gdb_sysroot is NOT set, perform the following two searches:
134 * Look in inferior's $PATH.
135 * Look in inferior's $LD_LIBRARY_PATH.
136 *
137 * The last check avoids doing this search when targetting remote
138 * machines since gdb_sysroot will almost always be set.
139
140 RETURNS
141
142 Full pathname of the shared library file, or NULL if not found.
143 (The pathname is malloc'ed; it needs to be freed by the caller.)
144 *FD is set to either -1 or an open file handle for the library. */
145
146 char *
147 solib_find (char *in_pathname, int *fd)
148 {
149 struct target_so_ops *ops = solib_ops (target_gdbarch);
150 int found_file = -1;
151 char *temp_pathname = NULL;
152 int gdb_sysroot_is_empty;
153 const char *solib_symbols_extension
154 = gdbarch_solib_symbols_extension (target_gdbarch);
155
156 /* If solib_symbols_extension is set, replace the file's
157 extension. */
158 if (solib_symbols_extension)
159 {
160 char *p = in_pathname + strlen (in_pathname);
161 while (p > in_pathname && *p != '.')
162 p--;
163
164 if (*p == '.')
165 {
166 char *new_pathname;
167
168 new_pathname = alloca (p - in_pathname + 1
169 + strlen (solib_symbols_extension) + 1);
170 memcpy (new_pathname, in_pathname, p - in_pathname + 1);
171 strcpy (new_pathname + (p - in_pathname) + 1,
172 solib_symbols_extension);
173
174 in_pathname = new_pathname;
175 }
176 }
177
178 gdb_sysroot_is_empty = (gdb_sysroot == NULL || *gdb_sysroot == 0);
179
180 if (! IS_ABSOLUTE_PATH (in_pathname) || gdb_sysroot_is_empty)
181 temp_pathname = in_pathname;
182 else
183 {
184 int prefix_len = strlen (gdb_sysroot);
185
186 /* Remove trailing slashes from absolute prefix. */
187 while (prefix_len > 0
188 && IS_DIR_SEPARATOR (gdb_sysroot[prefix_len - 1]))
189 prefix_len--;
190
191 /* Cat the prefixed pathname together. */
192 temp_pathname = alloca (prefix_len + strlen (in_pathname) + 1);
193 strncpy (temp_pathname, gdb_sysroot, prefix_len);
194 temp_pathname[prefix_len] = '\0';
195 strcat (temp_pathname, in_pathname);
196 }
197
198 /* Handle remote files. */
199 if (remote_filename_p (temp_pathname))
200 {
201 *fd = -1;
202 return xstrdup (temp_pathname);
203 }
204
205 /* Now see if we can open it. */
206 found_file = open (temp_pathname, O_RDONLY | O_BINARY, 0);
207
208 /* We try to find the library in various ways. After each attempt
209 (except for the one above), either found_file >= 0 and
210 temp_pathname is a malloc'd string, or found_file < 0 and
211 temp_pathname does not point to storage that needs to be
212 freed. */
213
214 if (found_file < 0)
215 temp_pathname = NULL;
216 else
217 temp_pathname = xstrdup (temp_pathname);
218
219 /* If the search in gdb_sysroot failed, and the path name is
220 absolute at this point, make it relative. (openp will try and open the
221 file according to its absolute path otherwise, which is not what we want.)
222 Affects subsequent searches for this solib. */
223 if (found_file < 0 && IS_ABSOLUTE_PATH (in_pathname))
224 {
225 /* First, get rid of any drive letters etc. */
226 while (!IS_DIR_SEPARATOR (*in_pathname))
227 in_pathname++;
228
229 /* Next, get rid of all leading dir separators. */
230 while (IS_DIR_SEPARATOR (*in_pathname))
231 in_pathname++;
232 }
233
234 /* If not found, search the solib_search_path (if any). */
235 if (found_file < 0 && solib_search_path != NULL)
236 found_file = openp (solib_search_path, OPF_TRY_CWD_FIRST,
237 in_pathname, O_RDONLY | O_BINARY, &temp_pathname);
238
239 /* If not found, next search the solib_search_path (if any) for the basename
240 only (ignoring the path). This is to allow reading solibs from a path
241 that differs from the opened path. */
242 if (found_file < 0 && solib_search_path != NULL)
243 found_file = openp (solib_search_path, OPF_TRY_CWD_FIRST,
244 lbasename (in_pathname), O_RDONLY | O_BINARY,
245 &temp_pathname);
246
247 /* If not found, try to use target supplied solib search method */
248 if (found_file < 0 && ops->find_and_open_solib)
249 found_file = ops->find_and_open_solib (in_pathname, O_RDONLY | O_BINARY,
250 &temp_pathname);
251
252 /* If not found, next search the inferior's $PATH environment variable. */
253 if (found_file < 0 && gdb_sysroot_is_empty)
254 found_file = openp (get_in_environ (current_inferior ()->environment,
255 "PATH"),
256 OPF_TRY_CWD_FIRST, in_pathname, O_RDONLY | O_BINARY,
257 &temp_pathname);
258
259 /* If not found, next search the inferior's $LD_LIBRARY_PATH
260 environment variable. */
261 if (found_file < 0 && gdb_sysroot_is_empty)
262 found_file = openp (get_in_environ (current_inferior ()->environment,
263 "LD_LIBRARY_PATH"),
264 OPF_TRY_CWD_FIRST, in_pathname, O_RDONLY | O_BINARY,
265 &temp_pathname);
266
267 *fd = found_file;
268 return temp_pathname;
269 }
270
271 /* Open and return a BFD for the shared library PATHNAME. If FD is not -1,
272 it is used as file handle to open the file. Throws an error if the file
273 could not be opened. Handles both local and remote file access.
274
275 PATHNAME must be malloc'ed by the caller. If successful, the new BFD's
276 name will point to it. If unsuccessful, PATHNAME will be freed and the
277 FD will be closed (unless FD was -1). */
278
279 bfd *
280 solib_bfd_fopen (char *pathname, int fd)
281 {
282 bfd *abfd;
283
284 if (remote_filename_p (pathname))
285 {
286 gdb_assert (fd == -1);
287 abfd = remote_bfd_open (pathname, gnutarget);
288 }
289 else
290 {
291 abfd = bfd_fopen (pathname, gnutarget, FOPEN_RB, fd);
292
293 if (abfd)
294 bfd_set_cacheable (abfd, 1);
295 else if (fd != -1)
296 close (fd);
297 }
298
299 if (!abfd)
300 {
301 make_cleanup (xfree, pathname);
302 error (_("Could not open `%s' as an executable file: %s"),
303 pathname, bfd_errmsg (bfd_get_error ()));
304 }
305
306 return abfd;
307 }
308
309 /* Find shared library PATHNAME and open a BFD for it. */
310
311 bfd *
312 solib_bfd_open (char *pathname)
313 {
314 char *found_pathname;
315 int found_file;
316 bfd *abfd;
317 const struct bfd_arch_info *b;
318
319 /* Search for shared library file. */
320 found_pathname = solib_find (pathname, &found_file);
321 if (found_pathname == NULL)
322 {
323 /* Return failure if the file could not be found, so that we can
324 accumulate messages about missing libraries. */
325 if (errno == ENOENT)
326 return NULL;
327
328 perror_with_name (pathname);
329 }
330
331 /* Open bfd for shared library. */
332 abfd = solib_bfd_fopen (found_pathname, found_file);
333
334 /* Check bfd format. */
335 if (!bfd_check_format (abfd, bfd_object))
336 {
337 bfd_close (abfd);
338 make_cleanup (xfree, found_pathname);
339 error (_("`%s': not in executable format: %s"),
340 found_pathname, bfd_errmsg (bfd_get_error ()));
341 }
342
343 /* Check bfd arch. */
344 b = gdbarch_bfd_arch_info (target_gdbarch);
345 if (!b->compatible (b, bfd_get_arch_info (abfd)))
346 warning (_("`%s': Shared library architecture %s is not compatible "
347 "with target architecture %s."), found_pathname,
348 bfd_get_arch_info (abfd)->printable_name, b->printable_name);
349
350 return abfd;
351 }
352
353
354 /*
355
356 LOCAL FUNCTION
357
358 solib_map_sections -- open bfd and build sections for shared lib
359
360 SYNOPSIS
361
362 static int solib_map_sections (struct so_list *so)
363
364 DESCRIPTION
365
366 Given a pointer to one of the shared objects in our list
367 of mapped objects, use the recorded name to open a bfd
368 descriptor for the object, build a section table, and then
369 relocate all the section addresses by the base address at
370 which the shared object was mapped.
371
372 FIXMES
373
374 In most (all?) cases the shared object file name recorded in the
375 dynamic linkage tables will be a fully qualified pathname. For
376 cases where it isn't, do we really mimic the systems search
377 mechanism correctly in the below code (particularly the tilde
378 expansion stuff?).
379 */
380
381 static int
382 solib_map_sections (struct so_list *so)
383 {
384 struct target_so_ops *ops = solib_ops (target_gdbarch);
385 char *filename;
386 struct target_section *p;
387 struct cleanup *old_chain;
388 bfd *abfd;
389
390 filename = tilde_expand (so->so_name);
391 old_chain = make_cleanup (xfree, filename);
392 abfd = ops->bfd_open (filename);
393 do_cleanups (old_chain);
394
395 if (abfd == NULL)
396 return 0;
397
398 /* Leave bfd open, core_xfer_memory and "info files" need it. */
399 so->abfd = gdb_bfd_ref (abfd);
400
401 /* copy full path name into so_name, so that later symbol_file_add
402 can find it */
403 if (strlen (bfd_get_filename (abfd)) >= SO_NAME_MAX_PATH_SIZE)
404 error (_("Shared library file name is too long."));
405 strcpy (so->so_name, bfd_get_filename (abfd));
406
407 if (build_section_table (abfd, &so->sections, &so->sections_end))
408 {
409 error (_("Can't find the file sections in `%s': %s"),
410 bfd_get_filename (abfd), bfd_errmsg (bfd_get_error ()));
411 }
412
413 for (p = so->sections; p < so->sections_end; p++)
414 {
415 /* Relocate the section binding addresses as recorded in the shared
416 object's file by the base address to which the object was actually
417 mapped. */
418 ops->relocate_section_addresses (so, p);
419
420 /* If the target didn't provide information about the address
421 range of the shared object, assume we want the location of
422 the .text section. */
423 if (so->addr_low == 0 && so->addr_high == 0
424 && strcmp (p->the_bfd_section->name, ".text") == 0)
425 {
426 so->addr_low = p->addr;
427 so->addr_high = p->endaddr;
428 }
429 }
430
431 /* Add the shared object's sections to the current set of file
432 section tables. Do this immediately after mapping the object so
433 that later nodes in the list can query this object, as is needed
434 in solib-osf.c. */
435 add_target_sections (so->sections, so->sections_end);
436
437 return 1;
438 }
439
440 /* Free symbol-file related contents of SO. If we have opened a BFD
441 for SO, close it. If we have placed SO's sections in some target's
442 section table, the caller is responsible for removing them.
443
444 This function doesn't mess with objfiles at all. If there is an
445 objfile associated with SO that needs to be removed, the caller is
446 responsible for taking care of that. */
447
448 static void
449 free_so_symbols (struct so_list *so)
450 {
451 char *bfd_filename = 0;
452
453 if (so->sections)
454 {
455 xfree (so->sections);
456 so->sections = so->sections_end = NULL;
457 }
458
459 gdb_bfd_unref (so->abfd);
460 so->abfd = NULL;
461
462 /* Our caller closed the objfile, possibly via objfile_purge_solibs. */
463 so->symbols_loaded = 0;
464 so->objfile = NULL;
465
466 so->addr_low = so->addr_high = 0;
467
468 /* Restore the target-supplied file name. SO_NAME may be the path
469 of the symbol file. */
470 strcpy (so->so_name, so->so_original_name);
471 }
472
473 /* LOCAL FUNCTION
474
475 free_so --- free a `struct so_list' object
476
477 SYNOPSIS
478
479 void free_so (struct so_list *so)
480
481 DESCRIPTION
482
483 Free the storage associated with the `struct so_list' object SO.
484 If we have opened a BFD for SO, close it.
485
486 The caller is responsible for removing SO from whatever list it is
487 a member of. If we have placed SO's sections in some target's
488 section table, the caller is responsible for removing them.
489
490 This function doesn't mess with objfiles at all. If there is an
491 objfile associated with SO that needs to be removed, the caller is
492 responsible for taking care of that. */
493
494 void
495 free_so (struct so_list *so)
496 {
497 struct target_so_ops *ops = solib_ops (target_gdbarch);
498
499 free_so_symbols (so);
500 ops->free_so (so);
501
502 xfree (so);
503 }
504
505
506 /* Return address of first so_list entry in master shared object list. */
507 struct so_list *
508 master_so_list (void)
509 {
510 return so_list_head;
511 }
512
513 /* Read in symbols for shared object SO. If SYMFILE_VERBOSE is set in FLAGS,
514 be chatty about it. Return non-zero if any symbols were actually
515 loaded. */
516
517 int
518 solib_read_symbols (struct so_list *so, int flags)
519 {
520 const int from_tty = flags & SYMFILE_VERBOSE;
521
522 if (so->symbols_loaded)
523 {
524 /* If needed, we've already warned in our caller. */
525 }
526 else if (so->abfd == NULL)
527 {
528 /* We've already warned about this library, when trying to open
529 it. */
530 }
531 else
532 {
533 volatile struct gdb_exception e;
534
535 TRY_CATCH (e, RETURN_MASK_ERROR)
536 {
537 struct section_addr_info *sap;
538
539 /* Have we already loaded this shared object? */
540 ALL_OBJFILES (so->objfile)
541 {
542 if (strcmp (so->objfile->name, so->so_name) == 0)
543 break;
544 }
545 if (so->objfile != NULL)
546 break;
547
548 sap = build_section_addr_info_from_section_table (so->sections,
549 so->sections_end);
550 so->objfile = symbol_file_add_from_bfd (so->abfd,
551 flags, sap, OBJF_SHARED);
552 free_section_addr_info (sap);
553 }
554
555 if (e.reason < 0)
556 {
557 if (from_tty)
558 exception_fprintf
559 (gdb_stderr, e,
560 _("Error while reading shared library symbols:\n"));
561 }
562 else
563 {
564 if (from_tty || info_verbose)
565 printf_unfiltered (_("Loaded symbols for %s\n"), so->so_name);
566 so->symbols_loaded = 1;
567 }
568 return 1;
569 }
570
571 return 0;
572 }
573
574 /* LOCAL FUNCTION
575
576 update_solib_list --- synchronize GDB's shared object list with inferior's
577
578 SYNOPSIS
579
580 void update_solib_list (int from_tty, struct target_ops *TARGET)
581
582 Extract the list of currently loaded shared objects from the
583 inferior, and compare it with the list of shared objects currently
584 in GDB's so_list_head list. Edit so_list_head to bring it in sync
585 with the inferior's new list.
586
587 If we notice that the inferior has unloaded some shared objects,
588 free any symbolic info GDB had read about those shared objects.
589
590 Don't load symbolic info for any new shared objects; just add them
591 to the list, and leave their symbols_loaded flag clear.
592
593 If FROM_TTY is non-null, feel free to print messages about what
594 we're doing.
595
596 If TARGET is non-null, add the sections of all new shared objects
597 to TARGET's section table. Note that this doesn't remove any
598 sections for shared objects that have been unloaded, and it
599 doesn't check to see if the new shared objects are already present in
600 the section table. But we only use this for core files and
601 processes we've just attached to, so that's okay. */
602
603 static void
604 update_solib_list (int from_tty, struct target_ops *target)
605 {
606 struct target_so_ops *ops = solib_ops (target_gdbarch);
607 struct so_list *inferior = ops->current_sos();
608 struct so_list *gdb, **gdb_link;
609
610 /* We can reach here due to changing solib-search-path or the
611 sysroot, before having any inferior. */
612 if (target_has_execution && !ptid_equal (inferior_ptid, null_ptid))
613 {
614 struct inferior *inf = current_inferior ();
615
616 /* If we are attaching to a running process for which we
617 have not opened a symbol file, we may be able to get its
618 symbols now! */
619 if (inf->attach_flag && symfile_objfile == NULL)
620 catch_errors (ops->open_symbol_file_object, &from_tty,
621 "Error reading attached process's symbol file.\n",
622 RETURN_MASK_ALL);
623 }
624
625 /* GDB and the inferior's dynamic linker each maintain their own
626 list of currently loaded shared objects; we want to bring the
627 former in sync with the latter. Scan both lists, seeing which
628 shared objects appear where. There are three cases:
629
630 - A shared object appears on both lists. This means that GDB
631 knows about it already, and it's still loaded in the inferior.
632 Nothing needs to happen.
633
634 - A shared object appears only on GDB's list. This means that
635 the inferior has unloaded it. We should remove the shared
636 object from GDB's tables.
637
638 - A shared object appears only on the inferior's list. This
639 means that it's just been loaded. We should add it to GDB's
640 tables.
641
642 So we walk GDB's list, checking each entry to see if it appears
643 in the inferior's list too. If it does, no action is needed, and
644 we remove it from the inferior's list. If it doesn't, the
645 inferior has unloaded it, and we remove it from GDB's list. By
646 the time we're done walking GDB's list, the inferior's list
647 contains only the new shared objects, which we then add. */
648
649 gdb = so_list_head;
650 gdb_link = &so_list_head;
651 while (gdb)
652 {
653 struct so_list *i = inferior;
654 struct so_list **i_link = &inferior;
655
656 /* Check to see whether the shared object *gdb also appears in
657 the inferior's current list. */
658 while (i)
659 {
660 if (ops->same)
661 {
662 if (ops->same (gdb, i))
663 break;
664 }
665 else
666 {
667 if (! strcmp (gdb->so_original_name, i->so_original_name))
668 break;
669 }
670
671 i_link = &i->next;
672 i = *i_link;
673 }
674
675 /* If the shared object appears on the inferior's list too, then
676 it's still loaded, so we don't need to do anything. Delete
677 it from the inferior's list, and leave it on GDB's list. */
678 if (i)
679 {
680 *i_link = i->next;
681 free_so (i);
682 gdb_link = &gdb->next;
683 gdb = *gdb_link;
684 }
685
686 /* If it's not on the inferior's list, remove it from GDB's tables. */
687 else
688 {
689 /* Notify any observer that the shared object has been
690 unloaded before we remove it from GDB's tables. */
691 observer_notify_solib_unloaded (gdb);
692
693 *gdb_link = gdb->next;
694
695 /* Unless the user loaded it explicitly, free SO's objfile. */
696 if (gdb->objfile && ! (gdb->objfile->flags & OBJF_USERLOADED))
697 free_objfile (gdb->objfile);
698
699 /* Some targets' section tables might be referring to
700 sections from so->abfd; remove them. */
701 remove_target_sections (gdb->abfd);
702
703 free_so (gdb);
704 gdb = *gdb_link;
705 }
706 }
707
708 /* Now the inferior's list contains only shared objects that don't
709 appear in GDB's list --- those that are newly loaded. Add them
710 to GDB's shared object list. */
711 if (inferior)
712 {
713 int not_found = 0;
714 const char *not_found_filename = NULL;
715
716 struct so_list *i;
717
718 /* Add the new shared objects to GDB's list. */
719 *gdb_link = inferior;
720
721 /* Fill in the rest of each of the `struct so_list' nodes. */
722 for (i = inferior; i; i = i->next)
723 {
724 volatile struct gdb_exception e;
725
726 i->pspace = current_program_space;
727
728 TRY_CATCH (e, RETURN_MASK_ERROR)
729 {
730 /* Fill in the rest of the `struct so_list' node. */
731 if (!solib_map_sections (i))
732 {
733 not_found++;
734 if (not_found_filename == NULL)
735 not_found_filename = i->so_original_name;
736 }
737 }
738
739 if (e.reason < 0)
740 exception_fprintf (gdb_stderr, e, _("\
741 Error while mapping shared library sections:\n"));
742
743 /* Notify any observer that the shared object has been
744 loaded now that we've added it to GDB's tables. */
745 observer_notify_solib_loaded (i);
746 }
747
748 /* If a library was not found, issue an appropriate warning
749 message. We have to use a single call to warning in case the
750 front end does something special with warnings, e.g., pop up
751 a dialog box. It Would Be Nice if we could get a "warning: "
752 prefix on each line in the CLI front end, though - it doesn't
753 stand out well. */
754
755 if (not_found == 1)
756 warning (_("\
757 Could not load shared library symbols for %s.\n\
758 Do you need \"set solib-search-path\" or \"set sysroot\"?"),
759 not_found_filename);
760 else if (not_found > 1)
761 warning (_("\
762 Could not load shared library symbols for %d libraries, e.g. %s.\n\
763 Use the \"info sharedlibrary\" command to see the complete listing.\n\
764 Do you need \"set solib-search-path\" or \"set sysroot\"?"),
765 not_found, not_found_filename);
766 }
767 }
768
769
770 /* Return non-zero if NAME is the libpthread shared library.
771
772 Uses a fairly simplistic heuristic approach where we check
773 the file name against "/libpthread". This can lead to false
774 positives, but this should be good enough in practice. */
775
776 int
777 libpthread_name_p (const char *name)
778 {
779 return (strstr (name, "/libpthread") != NULL);
780 }
781
782 /* Return non-zero if SO is the libpthread shared library. */
783
784 static int
785 libpthread_solib_p (struct so_list *so)
786 {
787 return libpthread_name_p (so->so_name);
788 }
789
790 /* GLOBAL FUNCTION
791
792 solib_add -- read in symbol info for newly added shared libraries
793
794 SYNOPSIS
795
796 void solib_add (char *pattern, int from_tty, struct target_ops
797 *TARGET, int readsyms)
798
799 DESCRIPTION
800
801 Read in symbolic information for any shared objects whose names
802 match PATTERN. (If we've already read a shared object's symbol
803 info, leave it alone.) If PATTERN is zero, read them all.
804
805 If READSYMS is 0, defer reading symbolic information until later
806 but still do any needed low level processing.
807
808 FROM_TTY and TARGET are as described for update_solib_list, above. */
809
810 void
811 solib_add (char *pattern, int from_tty, struct target_ops *target, int readsyms)
812 {
813 struct so_list *gdb;
814
815 if (pattern)
816 {
817 char *re_err = re_comp (pattern);
818
819 if (re_err)
820 error (_("Invalid regexp: %s"), re_err);
821 }
822
823 update_solib_list (from_tty, target);
824
825 /* Walk the list of currently loaded shared libraries, and read
826 symbols for any that match the pattern --- or any whose symbols
827 aren't already loaded, if no pattern was given. */
828 {
829 int any_matches = 0;
830 int loaded_any_symbols = 0;
831 const int flags =
832 SYMFILE_DEFER_BP_RESET | (from_tty ? SYMFILE_VERBOSE : 0);
833
834 for (gdb = so_list_head; gdb; gdb = gdb->next)
835 if (! pattern || re_exec (gdb->so_name))
836 {
837 /* Normally, we would read the symbols from that library
838 only if READSYMS is set. However, we're making a small
839 exception for the pthread library, because we sometimes
840 need the library symbols to be loaded in order to provide
841 thread support (x86-linux for instance). */
842 const int add_this_solib =
843 (readsyms || libpthread_solib_p (gdb));
844
845 any_matches = 1;
846 if (add_this_solib)
847 {
848 if (gdb->symbols_loaded)
849 {
850 /* If no pattern was given, be quiet for shared
851 libraries we have already loaded. */
852 if (pattern && (from_tty || info_verbose))
853 printf_unfiltered (_("Symbols already loaded for %s\n"),
854 gdb->so_name);
855 }
856 else if (solib_read_symbols (gdb, flags))
857 loaded_any_symbols = 1;
858 }
859 }
860
861 if (loaded_any_symbols)
862 breakpoint_re_set ();
863
864 if (from_tty && pattern && ! any_matches)
865 printf_unfiltered
866 ("No loaded shared libraries match the pattern `%s'.\n", pattern);
867
868 if (loaded_any_symbols)
869 {
870 struct target_so_ops *ops = solib_ops (target_gdbarch);
871
872 /* Getting new symbols may change our opinion about what is
873 frameless. */
874 reinit_frame_cache ();
875
876 ops->special_symbol_handling ();
877 }
878 }
879 }
880
881
882 /*
883
884 LOCAL FUNCTION
885
886 info_sharedlibrary_command -- code for "info sharedlibrary"
887
888 SYNOPSIS
889
890 static void info_sharedlibrary_command ()
891
892 DESCRIPTION
893
894 Walk through the shared library list and print information
895 about each attached library matching PATTERN. If PATTERN is elided,
896 print them all.
897 */
898
899 static void
900 info_sharedlibrary_command (char *pattern, int from_tty)
901 {
902 struct so_list *so = NULL; /* link map state variable */
903 int header_done = 0;
904 int so_missing_debug_info = 0;
905 int addr_width;
906 int nr_libs;
907 struct cleanup *table_cleanup;
908 struct gdbarch *gdbarch = target_gdbarch;
909
910 if (pattern)
911 {
912 char *re_err = re_comp (pattern);
913
914 if (re_err)
915 error (_("Invalid regexp: %s"), re_err);
916 }
917
918 /* "0x", a little whitespace, and two hex digits per byte of pointers. */
919 addr_width = 4 + (gdbarch_ptr_bit (gdbarch) / 4);
920
921 update_solib_list (from_tty, 0);
922
923 /* make_cleanup_ui_out_table_begin_end needs to know the number of
924 rows, so we need to make two passes over the libs. */
925
926 for (nr_libs = 0, so = so_list_head; so; so = so->next)
927 {
928 if (so->so_name[0])
929 {
930 if (pattern && ! re_exec (so->so_name))
931 continue;
932 ++nr_libs;
933 }
934 }
935
936 table_cleanup =
937 make_cleanup_ui_out_table_begin_end (uiout, 4, nr_libs,
938 "SharedLibraryTable");
939
940 /* The "- 1" is because ui_out adds one space between columns. */
941 ui_out_table_header (uiout, addr_width - 1, ui_left, "from", "From");
942 ui_out_table_header (uiout, addr_width - 1, ui_left, "to", "To");
943 ui_out_table_header (uiout, 12 - 1, ui_left, "syms-read", "Syms Read");
944 ui_out_table_header (uiout, 0, ui_noalign,
945 "name", "Shared Object Library");
946
947 ui_out_table_body (uiout);
948
949 for (so = so_list_head; so; so = so->next)
950 {
951 struct cleanup *lib_cleanup;
952
953 if (! so->so_name[0])
954 continue;
955 if (pattern && ! re_exec (so->so_name))
956 continue;
957
958 lib_cleanup = make_cleanup_ui_out_tuple_begin_end (uiout, "lib");
959
960 if (so->addr_high != 0)
961 {
962 ui_out_field_core_addr (uiout, "from", gdbarch, so->addr_low);
963 ui_out_field_core_addr (uiout, "to", gdbarch, so->addr_high);
964 }
965 else
966 {
967 ui_out_field_skip (uiout, "from");
968 ui_out_field_skip (uiout, "to");
969 }
970
971 if (! ui_out_is_mi_like_p (interp_ui_out (top_level_interpreter ()))
972 && so->symbols_loaded
973 && !objfile_has_symbols (so->objfile))
974 {
975 so_missing_debug_info = 1;
976 ui_out_field_string (uiout, "syms-read", "Yes (*)");
977 }
978 else
979 ui_out_field_string (uiout, "syms-read",
980 so->symbols_loaded ? "Yes" : "No");
981
982 ui_out_field_string (uiout, "name", so->so_name);
983
984 ui_out_text (uiout, "\n");
985
986 do_cleanups (lib_cleanup);
987 }
988
989 do_cleanups (table_cleanup);
990
991 if (nr_libs == 0)
992 {
993 if (pattern)
994 ui_out_message (uiout, 0,
995 _("No shared libraries matched.\n"));
996 else
997 ui_out_message (uiout, 0,
998 _("No shared libraries loaded at this time.\n"));
999 }
1000 else
1001 {
1002 if (so_missing_debug_info)
1003 ui_out_message (uiout, 0,
1004 _("(*): Shared library is missing debugging information.\n"));
1005 }
1006 }
1007
1008 /* Return 1 if ADDRESS lies within SOLIB. */
1009
1010 int
1011 solib_contains_address_p (const struct so_list *const solib,
1012 CORE_ADDR address)
1013 {
1014 struct target_section *p;
1015
1016 for (p = solib->sections; p < solib->sections_end; p++)
1017 if (p->addr <= address && address < p->endaddr)
1018 return 1;
1019
1020 return 0;
1021 }
1022
1023 /*
1024
1025 GLOBAL FUNCTION
1026
1027 solib_name_from_address -- if an address is in a shared lib, return
1028 its name.
1029
1030 SYNOPSIS
1031
1032 char * solib_name_from_address (CORE_ADDR address)
1033
1034 DESCRIPTION
1035
1036 Provides a hook for other gdb routines to discover whether or
1037 not a particular address is within the mapped address space of
1038 a shared library.
1039
1040 For example, this routine is called at one point to disable
1041 breakpoints which are in shared libraries that are not currently
1042 mapped in.
1043 */
1044
1045 char *
1046 solib_name_from_address (struct program_space *pspace, CORE_ADDR address)
1047 {
1048 struct so_list *so = NULL;
1049
1050 for (so = pspace->so_list; so; so = so->next)
1051 if (solib_contains_address_p (so, address))
1052 return (so->so_name);
1053
1054 return (0);
1055 }
1056
1057 /* Return whether the data starting at VADDR, size SIZE, must be kept
1058 in a core file for shared libraries loaded before "gcore" is used
1059 to be handled correctly when the core file is loaded. This only
1060 applies when the section would otherwise not be kept in the core
1061 file (in particular, for readonly sections). */
1062
1063 int
1064 solib_keep_data_in_core (CORE_ADDR vaddr, unsigned long size)
1065 {
1066 struct target_so_ops *ops = solib_ops (target_gdbarch);
1067
1068 if (ops->keep_data_in_core)
1069 return ops->keep_data_in_core (vaddr, size);
1070 else
1071 return 0;
1072 }
1073
1074 /* Called by free_all_symtabs */
1075
1076 void
1077 clear_solib (void)
1078 {
1079 struct target_so_ops *ops = solib_ops (target_gdbarch);
1080
1081 /* This function is expected to handle ELF shared libraries. It is
1082 also used on Solaris, which can run either ELF or a.out binaries
1083 (for compatibility with SunOS 4), both of which can use shared
1084 libraries. So we don't know whether we have an ELF executable or
1085 an a.out executable until the user chooses an executable file.
1086
1087 ELF shared libraries don't get mapped into the address space
1088 until after the program starts, so we'd better not try to insert
1089 breakpoints in them immediately. We have to wait until the
1090 dynamic linker has loaded them; we'll hit a bp_shlib_event
1091 breakpoint (look for calls to create_solib_event_breakpoint) when
1092 it's ready.
1093
1094 SunOS shared libraries seem to be different --- they're present
1095 as soon as the process begins execution, so there's no need to
1096 put off inserting breakpoints. There's also nowhere to put a
1097 bp_shlib_event breakpoint, so if we put it off, we'll never get
1098 around to it.
1099
1100 So: disable breakpoints only if we're using ELF shared libs. */
1101 if (exec_bfd != NULL
1102 && bfd_get_flavour (exec_bfd) != bfd_target_aout_flavour)
1103 disable_breakpoints_in_shlibs ();
1104
1105 while (so_list_head)
1106 {
1107 struct so_list *so = so_list_head;
1108 so_list_head = so->next;
1109 observer_notify_solib_unloaded (so);
1110 if (so->abfd)
1111 remove_target_sections (so->abfd);
1112 free_so (so);
1113 }
1114
1115 ops->clear_solib ();
1116 }
1117
1118 /* GLOBAL FUNCTION
1119
1120 solib_create_inferior_hook -- shared library startup support
1121
1122 SYNOPSIS
1123
1124 void solib_create_inferior_hook (int from_tty)
1125
1126 DESCRIPTION
1127
1128 When gdb starts up the inferior, it nurses it along (through the
1129 shell) until it is ready to execute it's first instruction. At this
1130 point, this function gets called via expansion of the macro
1131 SOLIB_CREATE_INFERIOR_HOOK. */
1132
1133 void
1134 solib_create_inferior_hook (int from_tty)
1135 {
1136 struct target_so_ops *ops = solib_ops (target_gdbarch);
1137 ops->solib_create_inferior_hook (from_tty);
1138 }
1139
1140 /* GLOBAL FUNCTION
1141
1142 in_solib_dynsym_resolve_code -- check to see if an address is in
1143 dynamic loader's dynamic symbol
1144 resolution code
1145
1146 SYNOPSIS
1147
1148 int in_solib_dynsym_resolve_code (CORE_ADDR pc)
1149
1150 DESCRIPTION
1151
1152 Determine if PC is in the dynamic linker's symbol resolution
1153 code. Return 1 if so, 0 otherwise.
1154 */
1155
1156 int
1157 in_solib_dynsym_resolve_code (CORE_ADDR pc)
1158 {
1159 struct target_so_ops *ops = solib_ops (target_gdbarch);
1160 return ops->in_dynsym_resolve_code (pc);
1161 }
1162
1163 /*
1164
1165 LOCAL FUNCTION
1166
1167 sharedlibrary_command -- handle command to explicitly add library
1168
1169 SYNOPSIS
1170
1171 static void sharedlibrary_command (char *args, int from_tty)
1172
1173 DESCRIPTION
1174
1175 */
1176
1177 static void
1178 sharedlibrary_command (char *args, int from_tty)
1179 {
1180 dont_repeat ();
1181 solib_add (args, from_tty, (struct target_ops *) 0, 1);
1182 }
1183
1184 /* LOCAL FUNCTION
1185
1186 no_shared_libraries -- handle command to explicitly discard symbols
1187 from shared libraries.
1188
1189 DESCRIPTION
1190
1191 Implements the command "nosharedlibrary", which discards symbols
1192 that have been auto-loaded from shared libraries. Symbols from
1193 shared libraries that were added by explicit request of the user
1194 are not discarded. Also called from remote.c. */
1195
1196 void
1197 no_shared_libraries (char *ignored, int from_tty)
1198 {
1199 /* The order of the two routines below is important: clear_solib notifies
1200 the solib_unloaded observers, and some of these observers might need
1201 access to their associated objfiles. Therefore, we can not purge the
1202 solibs' objfiles before clear_solib has been called. */
1203
1204 clear_solib ();
1205 objfile_purge_solibs ();
1206 }
1207
1208 /* Reload shared libraries, but avoid reloading the same symbol file
1209 we already have loaded. */
1210
1211 static void
1212 reload_shared_libraries_1 (int from_tty)
1213 {
1214 struct so_list *so;
1215 struct cleanup *old_chain = make_cleanup (null_cleanup, NULL);
1216
1217 for (so = so_list_head; so != NULL; so = so->next)
1218 {
1219 char *filename, *found_pathname = NULL;
1220 bfd *abfd;
1221 int scratch_chan;
1222 int was_loaded = so->symbols_loaded;
1223 const int flags =
1224 SYMFILE_DEFER_BP_RESET | (from_tty ? SYMFILE_VERBOSE : 0);
1225
1226 filename = tilde_expand (so->so_original_name);
1227 abfd = solib_bfd_open (filename);
1228 if (abfd != NULL)
1229 {
1230 found_pathname = xstrdup (bfd_get_filename (abfd));
1231 make_cleanup (xfree, found_pathname);
1232 gdb_bfd_close_or_warn (abfd);
1233 }
1234
1235 /* If this shared library is no longer associated with its previous
1236 symbol file, close that. */
1237 if ((found_pathname == NULL && was_loaded)
1238 || (found_pathname != NULL
1239 && strcmp (found_pathname, so->so_name) != 0))
1240 {
1241 if (so->objfile && ! (so->objfile->flags & OBJF_USERLOADED))
1242 free_objfile (so->objfile);
1243 remove_target_sections (so->abfd);
1244 free_so_symbols (so);
1245 }
1246
1247 /* If this shared library is now associated with a new symbol
1248 file, open it. */
1249 if (found_pathname != NULL
1250 && (!was_loaded
1251 || strcmp (found_pathname, so->so_name) != 0))
1252 {
1253 volatile struct gdb_exception e;
1254
1255 TRY_CATCH (e, RETURN_MASK_ERROR)
1256 solib_map_sections (so);
1257
1258 if (e.reason < 0)
1259 exception_fprintf (gdb_stderr, e, _("\
1260 Error while mapping shared library sections:\n"));
1261 else if (auto_solib_add || was_loaded || libpthread_solib_p (so))
1262 solib_read_symbols (so, flags);
1263 }
1264 }
1265
1266 do_cleanups (old_chain);
1267 }
1268
1269 static void
1270 reload_shared_libraries (char *ignored, int from_tty,
1271 struct cmd_list_element *e)
1272 {
1273 struct target_so_ops *ops;
1274
1275 reload_shared_libraries_1 (from_tty);
1276
1277 ops = solib_ops (target_gdbarch);
1278
1279 /* Creating inferior hooks here has two purposes. First, if we reload
1280 shared libraries then the address of solib breakpoint we've computed
1281 previously might be no longer valid. For example, if we forgot to set
1282 solib-absolute-prefix and are setting it right now, then the previous
1283 breakpoint address is plain wrong. Second, installing solib hooks
1284 also implicitly figures were ld.so is and loads symbols for it.
1285 Absent this call, if we've just connected to a target and set
1286 solib-absolute-prefix or solib-search-path, we'll lose all information
1287 about ld.so. */
1288 if (target_has_execution)
1289 {
1290 /* Reset or free private data structures not associated with
1291 so_list entries. */
1292 ops->clear_solib ();
1293
1294 /* Remove any previous solib event breakpoint. This is usually
1295 done in common code, at breakpoint_init_inferior time, but
1296 we're not really starting up the inferior here. */
1297 remove_solib_event_breakpoints ();
1298
1299 #ifdef SOLIB_CREATE_INFERIOR_HOOK
1300 SOLIB_CREATE_INFERIOR_HOOK (PIDGET (inferior_ptid));
1301 #else
1302 solib_create_inferior_hook (from_tty);
1303 #endif
1304 }
1305
1306 /* Sometimes the platform-specific hook loads initial shared
1307 libraries, and sometimes it doesn't. If it doesn't FROM_TTY will be
1308 incorrectly 0 but such solib targets should be fixed anyway. If we
1309 made all the inferior hook methods consistent, this call could be
1310 removed. Call it only after the solib target has been initialized by
1311 solib_create_inferior_hook. */
1312
1313 solib_add (NULL, 0, NULL, auto_solib_add);
1314
1315 breakpoint_re_set ();
1316
1317 /* We may have loaded or unloaded debug info for some (or all)
1318 shared libraries. However, frames may still reference them. For
1319 example, a frame's unwinder might still point at DWARF FDE
1320 structures that are now freed. Also, getting new symbols may
1321 change our opinion about what is frameless. */
1322 reinit_frame_cache ();
1323
1324 ops->special_symbol_handling ();
1325 }
1326
1327 static void
1328 show_auto_solib_add (struct ui_file *file, int from_tty,
1329 struct cmd_list_element *c, const char *value)
1330 {
1331 fprintf_filtered (file, _("Autoloading of shared library symbols is %s.\n"),
1332 value);
1333 }
1334
1335
1336 /* Handler for library-specific lookup of global symbol NAME in OBJFILE. Call
1337 the library-specific handler if it is installed for the current target. */
1338
1339 struct symbol *
1340 solib_global_lookup (const struct objfile *objfile,
1341 const char *name,
1342 const domain_enum domain)
1343 {
1344 struct target_so_ops *ops = solib_ops (target_gdbarch);
1345
1346 if (ops->lookup_lib_global_symbol != NULL)
1347 return ops->lookup_lib_global_symbol (objfile, name, domain);
1348 return NULL;
1349 }
1350
1351
1352 extern initialize_file_ftype _initialize_solib; /* -Wmissing-prototypes */
1353
1354 void
1355 _initialize_solib (void)
1356 {
1357 struct cmd_list_element *c;
1358
1359 solib_data = gdbarch_data_register_pre_init (solib_init);
1360
1361 add_com ("sharedlibrary", class_files, sharedlibrary_command,
1362 _("Load shared object library symbols for files matching REGEXP."));
1363 add_info ("sharedlibrary", info_sharedlibrary_command,
1364 _("Status of loaded shared object libraries."));
1365 add_com ("nosharedlibrary", class_files, no_shared_libraries,
1366 _("Unload all shared object library symbols."));
1367
1368 add_setshow_boolean_cmd ("auto-solib-add", class_support,
1369 &auto_solib_add, _("\
1370 Set autoloading of shared library symbols."), _("\
1371 Show autoloading of shared library symbols."), _("\
1372 If \"on\", symbols from all shared object libraries will be loaded\n\
1373 automatically when the inferior begins execution, when the dynamic linker\n\
1374 informs gdb that a new library has been loaded, or when attaching to the\n\
1375 inferior. Otherwise, symbols must be loaded manually, using `sharedlibrary'."),
1376 NULL,
1377 show_auto_solib_add,
1378 &setlist, &showlist);
1379
1380 add_setshow_filename_cmd ("sysroot", class_support,
1381 &gdb_sysroot, _("\
1382 Set an alternate system root."), _("\
1383 Show the current system root."), _("\
1384 The system root is used to load absolute shared library symbol files.\n\
1385 For other (relative) files, you can add directories using\n\
1386 `set solib-search-path'."),
1387 reload_shared_libraries,
1388 NULL,
1389 &setlist, &showlist);
1390
1391 add_alias_cmd ("solib-absolute-prefix", "sysroot", class_support, 0,
1392 &setlist);
1393 add_alias_cmd ("solib-absolute-prefix", "sysroot", class_support, 0,
1394 &showlist);
1395
1396 add_setshow_optional_filename_cmd ("solib-search-path", class_support,
1397 &solib_search_path, _("\
1398 Set the search path for loading non-absolute shared library symbol files."), _("\
1399 Show the search path for loading non-absolute shared library symbol files."), _("\
1400 This takes precedence over the environment variables PATH and LD_LIBRARY_PATH."),
1401 reload_shared_libraries,
1402 show_solib_search_path,
1403 &setlist, &showlist);
1404 }
This page took 0.082393 seconds and 3 git commands to generate.