1 /* Handle shared libraries for GDB, the GNU Debugger.
3 Copyright (C) 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999,
4 2000, 2001, 2002, 2003, 2005, 2006, 2007, 2008, 2009, 2010
5 Free Software Foundation, Inc.
7 This file is part of GDB.
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>. */
24 #include <sys/types.h>
26 #include "gdb_string.h"
31 #include "exceptions.h"
36 #include "gdb_regex.h"
41 #include "completer.h"
42 #include "filenames.h" /* for DOSish file names */
46 #include "readline/readline.h"
51 /* Architecture-specific operations. */
53 /* Per-architecture data key. */
54 static struct gdbarch_data
*solib_data
;
57 solib_init (struct obstack
*obstack
)
59 struct target_so_ops
**ops
;
61 ops
= OBSTACK_ZALLOC (obstack
, struct target_so_ops
*);
62 *ops
= current_target_so_ops
;
66 static struct target_so_ops
*
67 solib_ops (struct gdbarch
*gdbarch
)
69 struct target_so_ops
**ops
= gdbarch_data (gdbarch
, solib_data
);
73 /* Set the solib operations for GDBARCH to NEW_OPS. */
76 set_solib_ops (struct gdbarch
*gdbarch
, struct target_so_ops
*new_ops
)
78 struct target_so_ops
**ops
= gdbarch_data (gdbarch
, solib_data
);
83 /* external data declarations */
85 /* FIXME: gdbarch needs to control this variable, or else every
86 configuration needs to call set_solib_ops. */
87 struct target_so_ops
*current_target_so_ops
;
89 /* List of known shared objects */
90 #define so_list_head current_program_space->so_list
92 /* Local function prototypes */
94 /* If non-empty, this is a search path for loading non-absolute shared library
95 symbol files. This takes precedence over the environment variables PATH
96 and LD_LIBRARY_PATH. */
97 static char *solib_search_path
= NULL
;
99 show_solib_search_path (struct ui_file
*file
, int from_tty
,
100 struct cmd_list_element
*c
, const char *value
)
102 fprintf_filtered (file
, _("\
103 The search path for loading non-absolute shared library symbol files is %s.\n"),
111 solib_find -- Find a shared library file.
115 char *solib_find (char *in_pathname, int *fd);
119 Global variable GDB_SYSROOT is used as a prefix directory
120 to search for shared libraries if they have an absolute path.
122 Global variable SOLIB_SEARCH_PATH is used as a prefix directory
123 (or set of directories, as in LD_LIBRARY_PATH) to search for all
124 shared libraries if not found in GDB_SYSROOT.
127 * If there is a gdb_sysroot and path is absolute:
128 * Search for gdb_sysroot/path.
130 * Look for it literally (unmodified).
131 * Look in SOLIB_SEARCH_PATH.
132 * If available, use target defined search function.
133 * If gdb_sysroot is NOT set, perform the following two searches:
134 * Look in inferior's $PATH.
135 * Look in inferior's $LD_LIBRARY_PATH.
137 * The last check avoids doing this search when targetting remote
138 * machines since gdb_sysroot will almost always be set.
142 Full pathname of the shared library file, or NULL if not found.
143 (The pathname is malloc'ed; it needs to be freed by the caller.)
144 *FD is set to either -1 or an open file handle for the library. */
147 solib_find (char *in_pathname
, int *fd
)
149 struct target_so_ops
*ops
= solib_ops (target_gdbarch
);
151 char *temp_pathname
= NULL
;
152 int gdb_sysroot_is_empty
;
153 const char *solib_symbols_extension
154 = gdbarch_solib_symbols_extension (target_gdbarch
);
156 /* If solib_symbols_extension is set, replace the file's
158 if (solib_symbols_extension
)
160 char *p
= in_pathname
+ strlen (in_pathname
);
161 while (p
> in_pathname
&& *p
!= '.')
168 new_pathname
= alloca (p
- in_pathname
+ 1
169 + strlen (solib_symbols_extension
) + 1);
170 memcpy (new_pathname
, in_pathname
, p
- in_pathname
+ 1);
171 strcpy (new_pathname
+ (p
- in_pathname
) + 1,
172 solib_symbols_extension
);
174 in_pathname
= new_pathname
;
178 gdb_sysroot_is_empty
= (gdb_sysroot
== NULL
|| *gdb_sysroot
== 0);
180 if (! IS_ABSOLUTE_PATH (in_pathname
) || gdb_sysroot_is_empty
)
181 temp_pathname
= in_pathname
;
184 int prefix_len
= strlen (gdb_sysroot
);
186 /* Remove trailing slashes from absolute prefix. */
187 while (prefix_len
> 0
188 && IS_DIR_SEPARATOR (gdb_sysroot
[prefix_len
- 1]))
191 /* Cat the prefixed pathname together. */
192 temp_pathname
= alloca (prefix_len
+ strlen (in_pathname
) + 1);
193 strncpy (temp_pathname
, gdb_sysroot
, prefix_len
);
194 temp_pathname
[prefix_len
] = '\0';
195 strcat (temp_pathname
, in_pathname
);
198 /* Handle remote files. */
199 if (remote_filename_p (temp_pathname
))
202 return xstrdup (temp_pathname
);
205 /* Now see if we can open it. */
206 found_file
= open (temp_pathname
, O_RDONLY
| O_BINARY
, 0);
208 /* We try to find the library in various ways. After each attempt
209 (except for the one above), either found_file >= 0 and
210 temp_pathname is a malloc'd string, or found_file < 0 and
211 temp_pathname does not point to storage that needs to be
215 temp_pathname
= NULL
;
217 temp_pathname
= xstrdup (temp_pathname
);
219 /* If the search in gdb_sysroot failed, and the path name is
220 absolute at this point, make it relative. (openp will try and open the
221 file according to its absolute path otherwise, which is not what we want.)
222 Affects subsequent searches for this solib. */
223 if (found_file
< 0 && IS_ABSOLUTE_PATH (in_pathname
))
225 /* First, get rid of any drive letters etc. */
226 while (!IS_DIR_SEPARATOR (*in_pathname
))
229 /* Next, get rid of all leading dir separators. */
230 while (IS_DIR_SEPARATOR (*in_pathname
))
234 /* If not found, search the solib_search_path (if any). */
235 if (found_file
< 0 && solib_search_path
!= NULL
)
236 found_file
= openp (solib_search_path
, OPF_TRY_CWD_FIRST
,
237 in_pathname
, O_RDONLY
| O_BINARY
, &temp_pathname
);
239 /* If not found, next search the solib_search_path (if any) for the basename
240 only (ignoring the path). This is to allow reading solibs from a path
241 that differs from the opened path. */
242 if (found_file
< 0 && solib_search_path
!= NULL
)
243 found_file
= openp (solib_search_path
, OPF_TRY_CWD_FIRST
,
244 lbasename (in_pathname
), O_RDONLY
| O_BINARY
,
247 /* If not found, try to use target supplied solib search method */
248 if (found_file
< 0 && ops
->find_and_open_solib
)
249 found_file
= ops
->find_and_open_solib (in_pathname
, O_RDONLY
| O_BINARY
,
252 /* If not found, next search the inferior's $PATH environment variable. */
253 if (found_file
< 0 && gdb_sysroot_is_empty
)
254 found_file
= openp (get_in_environ (current_inferior ()->environment
,
256 OPF_TRY_CWD_FIRST
, in_pathname
, O_RDONLY
| O_BINARY
,
259 /* If not found, next search the inferior's $LD_LIBRARY_PATH
260 environment variable. */
261 if (found_file
< 0 && gdb_sysroot_is_empty
)
262 found_file
= openp (get_in_environ (current_inferior ()->environment
,
264 OPF_TRY_CWD_FIRST
, in_pathname
, O_RDONLY
| O_BINARY
,
268 return temp_pathname
;
271 /* Open and return a BFD for the shared library PATHNAME. If FD is not -1,
272 it is used as file handle to open the file. Throws an error if the file
273 could not be opened. Handles both local and remote file access.
275 PATHNAME must be malloc'ed by the caller. If successful, the new BFD's
276 name will point to it. If unsuccessful, PATHNAME will be freed and the
277 FD will be closed (unless FD was -1). */
280 solib_bfd_fopen (char *pathname
, int fd
)
284 if (remote_filename_p (pathname
))
286 gdb_assert (fd
== -1);
287 abfd
= remote_bfd_open (pathname
, gnutarget
);
291 abfd
= bfd_fopen (pathname
, gnutarget
, FOPEN_RB
, fd
);
294 bfd_set_cacheable (abfd
, 1);
301 make_cleanup (xfree
, pathname
);
302 error (_("Could not open `%s' as an executable file: %s"),
303 pathname
, bfd_errmsg (bfd_get_error ()));
309 /* Find shared library PATHNAME and open a BFD for it. */
312 solib_bfd_open (char *pathname
)
314 char *found_pathname
;
317 const struct bfd_arch_info
*b
;
319 /* Search for shared library file. */
320 found_pathname
= solib_find (pathname
, &found_file
);
321 if (found_pathname
== NULL
)
323 /* Return failure if the file could not be found, so that we can
324 accumulate messages about missing libraries. */
328 perror_with_name (pathname
);
331 /* Open bfd for shared library. */
332 abfd
= solib_bfd_fopen (found_pathname
, found_file
);
334 /* Check bfd format. */
335 if (!bfd_check_format (abfd
, bfd_object
))
338 make_cleanup (xfree
, found_pathname
);
339 error (_("`%s': not in executable format: %s"),
340 found_pathname
, bfd_errmsg (bfd_get_error ()));
343 /* Check bfd arch. */
344 b
= gdbarch_bfd_arch_info (target_gdbarch
);
345 if (!b
->compatible (b
, bfd_get_arch_info (abfd
)))
346 warning (_("`%s': Shared library architecture %s is not compatible "
347 "with target architecture %s."), found_pathname
,
348 bfd_get_arch_info (abfd
)->printable_name
, b
->printable_name
);
358 solib_map_sections -- open bfd and build sections for shared lib
362 static int solib_map_sections (struct so_list *so)
366 Given a pointer to one of the shared objects in our list
367 of mapped objects, use the recorded name to open a bfd
368 descriptor for the object, build a section table, and then
369 relocate all the section addresses by the base address at
370 which the shared object was mapped.
374 In most (all?) cases the shared object file name recorded in the
375 dynamic linkage tables will be a fully qualified pathname. For
376 cases where it isn't, do we really mimic the systems search
377 mechanism correctly in the below code (particularly the tilde
382 solib_map_sections (struct so_list
*so
)
384 struct target_so_ops
*ops
= solib_ops (target_gdbarch
);
386 struct target_section
*p
;
387 struct cleanup
*old_chain
;
390 filename
= tilde_expand (so
->so_name
);
391 old_chain
= make_cleanup (xfree
, filename
);
392 abfd
= ops
->bfd_open (filename
);
393 do_cleanups (old_chain
);
398 /* Leave bfd open, core_xfer_memory and "info files" need it. */
399 so
->abfd
= gdb_bfd_ref (abfd
);
401 /* copy full path name into so_name, so that later symbol_file_add
403 if (strlen (bfd_get_filename (abfd
)) >= SO_NAME_MAX_PATH_SIZE
)
404 error (_("Shared library file name is too long."));
405 strcpy (so
->so_name
, bfd_get_filename (abfd
));
407 if (build_section_table (abfd
, &so
->sections
, &so
->sections_end
))
409 error (_("Can't find the file sections in `%s': %s"),
410 bfd_get_filename (abfd
), bfd_errmsg (bfd_get_error ()));
413 for (p
= so
->sections
; p
< so
->sections_end
; p
++)
415 /* Relocate the section binding addresses as recorded in the shared
416 object's file by the base address to which the object was actually
418 ops
->relocate_section_addresses (so
, p
);
420 /* If the target didn't provide information about the address
421 range of the shared object, assume we want the location of
422 the .text section. */
423 if (so
->addr_low
== 0 && so
->addr_high
== 0
424 && strcmp (p
->the_bfd_section
->name
, ".text") == 0)
426 so
->addr_low
= p
->addr
;
427 so
->addr_high
= p
->endaddr
;
431 /* Add the shared object's sections to the current set of file
432 section tables. Do this immediately after mapping the object so
433 that later nodes in the list can query this object, as is needed
435 add_target_sections (so
->sections
, so
->sections_end
);
440 /* Free symbol-file related contents of SO. If we have opened a BFD
441 for SO, close it. If we have placed SO's sections in some target's
442 section table, the caller is responsible for removing them.
444 This function doesn't mess with objfiles at all. If there is an
445 objfile associated with SO that needs to be removed, the caller is
446 responsible for taking care of that. */
449 free_so_symbols (struct so_list
*so
)
451 char *bfd_filename
= 0;
455 xfree (so
->sections
);
456 so
->sections
= so
->sections_end
= NULL
;
459 gdb_bfd_unref (so
->abfd
);
462 /* Our caller closed the objfile, possibly via objfile_purge_solibs. */
463 so
->symbols_loaded
= 0;
466 so
->addr_low
= so
->addr_high
= 0;
468 /* Restore the target-supplied file name. SO_NAME may be the path
469 of the symbol file. */
470 strcpy (so
->so_name
, so
->so_original_name
);
475 free_so --- free a `struct so_list' object
479 void free_so (struct so_list *so)
483 Free the storage associated with the `struct so_list' object SO.
484 If we have opened a BFD for SO, close it.
486 The caller is responsible for removing SO from whatever list it is
487 a member of. If we have placed SO's sections in some target's
488 section table, the caller is responsible for removing them.
490 This function doesn't mess with objfiles at all. If there is an
491 objfile associated with SO that needs to be removed, the caller is
492 responsible for taking care of that. */
495 free_so (struct so_list
*so
)
497 struct target_so_ops
*ops
= solib_ops (target_gdbarch
);
499 free_so_symbols (so
);
506 /* Return address of first so_list entry in master shared object list. */
508 master_so_list (void)
513 /* Read in symbols for shared object SO. If SYMFILE_VERBOSE is set in FLAGS,
514 be chatty about it. Return non-zero if any symbols were actually
518 solib_read_symbols (struct so_list
*so
, int flags
)
520 const int from_tty
= flags
& SYMFILE_VERBOSE
;
522 if (so
->symbols_loaded
)
524 /* If needed, we've already warned in our caller. */
526 else if (so
->abfd
== NULL
)
528 /* We've already warned about this library, when trying to open
533 volatile struct gdb_exception e
;
535 TRY_CATCH (e
, RETURN_MASK_ERROR
)
537 struct section_addr_info
*sap
;
539 /* Have we already loaded this shared object? */
540 ALL_OBJFILES (so
->objfile
)
542 if (strcmp (so
->objfile
->name
, so
->so_name
) == 0)
545 if (so
->objfile
!= NULL
)
548 sap
= build_section_addr_info_from_section_table (so
->sections
,
550 so
->objfile
= symbol_file_add_from_bfd (so
->abfd
,
551 flags
, sap
, OBJF_SHARED
);
552 free_section_addr_info (sap
);
560 _("Error while reading shared library symbols:\n"));
564 if (from_tty
|| info_verbose
)
565 printf_unfiltered (_("Loaded symbols for %s\n"), so
->so_name
);
566 so
->symbols_loaded
= 1;
576 update_solib_list --- synchronize GDB's shared object list with inferior's
580 void update_solib_list (int from_tty, struct target_ops *TARGET)
582 Extract the list of currently loaded shared objects from the
583 inferior, and compare it with the list of shared objects currently
584 in GDB's so_list_head list. Edit so_list_head to bring it in sync
585 with the inferior's new list.
587 If we notice that the inferior has unloaded some shared objects,
588 free any symbolic info GDB had read about those shared objects.
590 Don't load symbolic info for any new shared objects; just add them
591 to the list, and leave their symbols_loaded flag clear.
593 If FROM_TTY is non-null, feel free to print messages about what
596 If TARGET is non-null, add the sections of all new shared objects
597 to TARGET's section table. Note that this doesn't remove any
598 sections for shared objects that have been unloaded, and it
599 doesn't check to see if the new shared objects are already present in
600 the section table. But we only use this for core files and
601 processes we've just attached to, so that's okay. */
604 update_solib_list (int from_tty
, struct target_ops
*target
)
606 struct target_so_ops
*ops
= solib_ops (target_gdbarch
);
607 struct so_list
*inferior
= ops
->current_sos();
608 struct so_list
*gdb
, **gdb_link
;
610 /* We can reach here due to changing solib-search-path or the
611 sysroot, before having any inferior. */
612 if (target_has_execution
&& !ptid_equal (inferior_ptid
, null_ptid
))
614 struct inferior
*inf
= current_inferior ();
616 /* If we are attaching to a running process for which we
617 have not opened a symbol file, we may be able to get its
619 if (inf
->attach_flag
&& symfile_objfile
== NULL
)
620 catch_errors (ops
->open_symbol_file_object
, &from_tty
,
621 "Error reading attached process's symbol file.\n",
625 /* GDB and the inferior's dynamic linker each maintain their own
626 list of currently loaded shared objects; we want to bring the
627 former in sync with the latter. Scan both lists, seeing which
628 shared objects appear where. There are three cases:
630 - A shared object appears on both lists. This means that GDB
631 knows about it already, and it's still loaded in the inferior.
632 Nothing needs to happen.
634 - A shared object appears only on GDB's list. This means that
635 the inferior has unloaded it. We should remove the shared
636 object from GDB's tables.
638 - A shared object appears only on the inferior's list. This
639 means that it's just been loaded. We should add it to GDB's
642 So we walk GDB's list, checking each entry to see if it appears
643 in the inferior's list too. If it does, no action is needed, and
644 we remove it from the inferior's list. If it doesn't, the
645 inferior has unloaded it, and we remove it from GDB's list. By
646 the time we're done walking GDB's list, the inferior's list
647 contains only the new shared objects, which we then add. */
650 gdb_link
= &so_list_head
;
653 struct so_list
*i
= inferior
;
654 struct so_list
**i_link
= &inferior
;
656 /* Check to see whether the shared object *gdb also appears in
657 the inferior's current list. */
662 if (ops
->same (gdb
, i
))
667 if (! strcmp (gdb
->so_original_name
, i
->so_original_name
))
675 /* If the shared object appears on the inferior's list too, then
676 it's still loaded, so we don't need to do anything. Delete
677 it from the inferior's list, and leave it on GDB's list. */
682 gdb_link
= &gdb
->next
;
686 /* If it's not on the inferior's list, remove it from GDB's tables. */
689 /* Notify any observer that the shared object has been
690 unloaded before we remove it from GDB's tables. */
691 observer_notify_solib_unloaded (gdb
);
693 *gdb_link
= gdb
->next
;
695 /* Unless the user loaded it explicitly, free SO's objfile. */
696 if (gdb
->objfile
&& ! (gdb
->objfile
->flags
& OBJF_USERLOADED
))
697 free_objfile (gdb
->objfile
);
699 /* Some targets' section tables might be referring to
700 sections from so->abfd; remove them. */
701 remove_target_sections (gdb
->abfd
);
708 /* Now the inferior's list contains only shared objects that don't
709 appear in GDB's list --- those that are newly loaded. Add them
710 to GDB's shared object list. */
714 const char *not_found_filename
= NULL
;
718 /* Add the new shared objects to GDB's list. */
719 *gdb_link
= inferior
;
721 /* Fill in the rest of each of the `struct so_list' nodes. */
722 for (i
= inferior
; i
; i
= i
->next
)
724 volatile struct gdb_exception e
;
726 i
->pspace
= current_program_space
;
728 TRY_CATCH (e
, RETURN_MASK_ERROR
)
730 /* Fill in the rest of the `struct so_list' node. */
731 if (!solib_map_sections (i
))
734 if (not_found_filename
== NULL
)
735 not_found_filename
= i
->so_original_name
;
740 exception_fprintf (gdb_stderr
, e
, _("\
741 Error while mapping shared library sections:\n"));
743 /* Notify any observer that the shared object has been
744 loaded now that we've added it to GDB's tables. */
745 observer_notify_solib_loaded (i
);
748 /* If a library was not found, issue an appropriate warning
749 message. We have to use a single call to warning in case the
750 front end does something special with warnings, e.g., pop up
751 a dialog box. It Would Be Nice if we could get a "warning: "
752 prefix on each line in the CLI front end, though - it doesn't
757 Could not load shared library symbols for %s.\n\
758 Do you need \"set solib-search-path\" or \"set sysroot\"?"),
760 else if (not_found
> 1)
762 Could not load shared library symbols for %d libraries, e.g. %s.\n\
763 Use the \"info sharedlibrary\" command to see the complete listing.\n\
764 Do you need \"set solib-search-path\" or \"set sysroot\"?"),
765 not_found
, not_found_filename
);
770 /* Return non-zero if NAME is the libpthread shared library.
772 Uses a fairly simplistic heuristic approach where we check
773 the file name against "/libpthread". This can lead to false
774 positives, but this should be good enough in practice. */
777 libpthread_name_p (const char *name
)
779 return (strstr (name
, "/libpthread") != NULL
);
782 /* Return non-zero if SO is the libpthread shared library. */
785 libpthread_solib_p (struct so_list
*so
)
787 return libpthread_name_p (so
->so_name
);
792 solib_add -- read in symbol info for newly added shared libraries
796 void solib_add (char *pattern, int from_tty, struct target_ops
797 *TARGET, int readsyms)
801 Read in symbolic information for any shared objects whose names
802 match PATTERN. (If we've already read a shared object's symbol
803 info, leave it alone.) If PATTERN is zero, read them all.
805 If READSYMS is 0, defer reading symbolic information until later
806 but still do any needed low level processing.
808 FROM_TTY and TARGET are as described for update_solib_list, above. */
811 solib_add (char *pattern
, int from_tty
, struct target_ops
*target
, int readsyms
)
817 char *re_err
= re_comp (pattern
);
820 error (_("Invalid regexp: %s"), re_err
);
823 update_solib_list (from_tty
, target
);
825 /* Walk the list of currently loaded shared libraries, and read
826 symbols for any that match the pattern --- or any whose symbols
827 aren't already loaded, if no pattern was given. */
830 int loaded_any_symbols
= 0;
832 SYMFILE_DEFER_BP_RESET
| (from_tty
? SYMFILE_VERBOSE
: 0);
834 for (gdb
= so_list_head
; gdb
; gdb
= gdb
->next
)
835 if (! pattern
|| re_exec (gdb
->so_name
))
837 /* Normally, we would read the symbols from that library
838 only if READSYMS is set. However, we're making a small
839 exception for the pthread library, because we sometimes
840 need the library symbols to be loaded in order to provide
841 thread support (x86-linux for instance). */
842 const int add_this_solib
=
843 (readsyms
|| libpthread_solib_p (gdb
));
848 if (gdb
->symbols_loaded
)
850 /* If no pattern was given, be quiet for shared
851 libraries we have already loaded. */
852 if (pattern
&& (from_tty
|| info_verbose
))
853 printf_unfiltered (_("Symbols already loaded for %s\n"),
856 else if (solib_read_symbols (gdb
, flags
))
857 loaded_any_symbols
= 1;
861 if (loaded_any_symbols
)
862 breakpoint_re_set ();
864 if (from_tty
&& pattern
&& ! any_matches
)
866 ("No loaded shared libraries match the pattern `%s'.\n", pattern
);
868 if (loaded_any_symbols
)
870 struct target_so_ops
*ops
= solib_ops (target_gdbarch
);
872 /* Getting new symbols may change our opinion about what is
874 reinit_frame_cache ();
876 ops
->special_symbol_handling ();
886 info_sharedlibrary_command -- code for "info sharedlibrary"
890 static void info_sharedlibrary_command ()
894 Walk through the shared library list and print information
895 about each attached library matching PATTERN. If PATTERN is elided,
900 info_sharedlibrary_command (char *pattern
, int from_tty
)
902 struct so_list
*so
= NULL
; /* link map state variable */
904 int so_missing_debug_info
= 0;
907 struct cleanup
*table_cleanup
;
908 struct gdbarch
*gdbarch
= target_gdbarch
;
912 char *re_err
= re_comp (pattern
);
915 error (_("Invalid regexp: %s"), re_err
);
918 /* "0x", a little whitespace, and two hex digits per byte of pointers. */
919 addr_width
= 4 + (gdbarch_ptr_bit (gdbarch
) / 4);
921 update_solib_list (from_tty
, 0);
923 /* make_cleanup_ui_out_table_begin_end needs to know the number of
924 rows, so we need to make two passes over the libs. */
926 for (nr_libs
= 0, so
= so_list_head
; so
; so
= so
->next
)
930 if (pattern
&& ! re_exec (so
->so_name
))
937 make_cleanup_ui_out_table_begin_end (uiout
, 4, nr_libs
,
938 "SharedLibraryTable");
940 /* The "- 1" is because ui_out adds one space between columns. */
941 ui_out_table_header (uiout
, addr_width
- 1, ui_left
, "from", "From");
942 ui_out_table_header (uiout
, addr_width
- 1, ui_left
, "to", "To");
943 ui_out_table_header (uiout
, 12 - 1, ui_left
, "syms-read", "Syms Read");
944 ui_out_table_header (uiout
, 0, ui_noalign
,
945 "name", "Shared Object Library");
947 ui_out_table_body (uiout
);
949 for (so
= so_list_head
; so
; so
= so
->next
)
951 struct cleanup
*lib_cleanup
;
953 if (! so
->so_name
[0])
955 if (pattern
&& ! re_exec (so
->so_name
))
958 lib_cleanup
= make_cleanup_ui_out_tuple_begin_end (uiout
, "lib");
960 if (so
->addr_high
!= 0)
962 ui_out_field_core_addr (uiout
, "from", gdbarch
, so
->addr_low
);
963 ui_out_field_core_addr (uiout
, "to", gdbarch
, so
->addr_high
);
967 ui_out_field_skip (uiout
, "from");
968 ui_out_field_skip (uiout
, "to");
971 if (! ui_out_is_mi_like_p (interp_ui_out (top_level_interpreter ()))
972 && so
->symbols_loaded
973 && !objfile_has_symbols (so
->objfile
))
975 so_missing_debug_info
= 1;
976 ui_out_field_string (uiout
, "syms-read", "Yes (*)");
979 ui_out_field_string (uiout
, "syms-read",
980 so
->symbols_loaded
? "Yes" : "No");
982 ui_out_field_string (uiout
, "name", so
->so_name
);
984 ui_out_text (uiout
, "\n");
986 do_cleanups (lib_cleanup
);
989 do_cleanups (table_cleanup
);
994 ui_out_message (uiout
, 0,
995 _("No shared libraries matched.\n"));
997 ui_out_message (uiout
, 0,
998 _("No shared libraries loaded at this time.\n"));
1002 if (so_missing_debug_info
)
1003 ui_out_message (uiout
, 0,
1004 _("(*): Shared library is missing debugging information.\n"));
1008 /* Return 1 if ADDRESS lies within SOLIB. */
1011 solib_contains_address_p (const struct so_list
*const solib
,
1014 struct target_section
*p
;
1016 for (p
= solib
->sections
; p
< solib
->sections_end
; p
++)
1017 if (p
->addr
<= address
&& address
< p
->endaddr
)
1027 solib_name_from_address -- if an address is in a shared lib, return
1032 char * solib_name_from_address (CORE_ADDR address)
1036 Provides a hook for other gdb routines to discover whether or
1037 not a particular address is within the mapped address space of
1040 For example, this routine is called at one point to disable
1041 breakpoints which are in shared libraries that are not currently
1046 solib_name_from_address (struct program_space
*pspace
, CORE_ADDR address
)
1048 struct so_list
*so
= NULL
;
1050 for (so
= pspace
->so_list
; so
; so
= so
->next
)
1051 if (solib_contains_address_p (so
, address
))
1052 return (so
->so_name
);
1057 /* Return whether the data starting at VADDR, size SIZE, must be kept
1058 in a core file for shared libraries loaded before "gcore" is used
1059 to be handled correctly when the core file is loaded. This only
1060 applies when the section would otherwise not be kept in the core
1061 file (in particular, for readonly sections). */
1064 solib_keep_data_in_core (CORE_ADDR vaddr
, unsigned long size
)
1066 struct target_so_ops
*ops
= solib_ops (target_gdbarch
);
1068 if (ops
->keep_data_in_core
)
1069 return ops
->keep_data_in_core (vaddr
, size
);
1074 /* Called by free_all_symtabs */
1079 struct target_so_ops
*ops
= solib_ops (target_gdbarch
);
1081 /* This function is expected to handle ELF shared libraries. It is
1082 also used on Solaris, which can run either ELF or a.out binaries
1083 (for compatibility with SunOS 4), both of which can use shared
1084 libraries. So we don't know whether we have an ELF executable or
1085 an a.out executable until the user chooses an executable file.
1087 ELF shared libraries don't get mapped into the address space
1088 until after the program starts, so we'd better not try to insert
1089 breakpoints in them immediately. We have to wait until the
1090 dynamic linker has loaded them; we'll hit a bp_shlib_event
1091 breakpoint (look for calls to create_solib_event_breakpoint) when
1094 SunOS shared libraries seem to be different --- they're present
1095 as soon as the process begins execution, so there's no need to
1096 put off inserting breakpoints. There's also nowhere to put a
1097 bp_shlib_event breakpoint, so if we put it off, we'll never get
1100 So: disable breakpoints only if we're using ELF shared libs. */
1101 if (exec_bfd
!= NULL
1102 && bfd_get_flavour (exec_bfd
) != bfd_target_aout_flavour
)
1103 disable_breakpoints_in_shlibs ();
1105 while (so_list_head
)
1107 struct so_list
*so
= so_list_head
;
1108 so_list_head
= so
->next
;
1109 observer_notify_solib_unloaded (so
);
1111 remove_target_sections (so
->abfd
);
1115 ops
->clear_solib ();
1120 solib_create_inferior_hook -- shared library startup support
1124 void solib_create_inferior_hook (int from_tty)
1128 When gdb starts up the inferior, it nurses it along (through the
1129 shell) until it is ready to execute it's first instruction. At this
1130 point, this function gets called via expansion of the macro
1131 SOLIB_CREATE_INFERIOR_HOOK. */
1134 solib_create_inferior_hook (int from_tty
)
1136 struct target_so_ops
*ops
= solib_ops (target_gdbarch
);
1137 ops
->solib_create_inferior_hook (from_tty
);
1142 in_solib_dynsym_resolve_code -- check to see if an address is in
1143 dynamic loader's dynamic symbol
1148 int in_solib_dynsym_resolve_code (CORE_ADDR pc)
1152 Determine if PC is in the dynamic linker's symbol resolution
1153 code. Return 1 if so, 0 otherwise.
1157 in_solib_dynsym_resolve_code (CORE_ADDR pc
)
1159 struct target_so_ops
*ops
= solib_ops (target_gdbarch
);
1160 return ops
->in_dynsym_resolve_code (pc
);
1167 sharedlibrary_command -- handle command to explicitly add library
1171 static void sharedlibrary_command (char *args, int from_tty)
1178 sharedlibrary_command (char *args
, int from_tty
)
1181 solib_add (args
, from_tty
, (struct target_ops
*) 0, 1);
1186 no_shared_libraries -- handle command to explicitly discard symbols
1187 from shared libraries.
1191 Implements the command "nosharedlibrary", which discards symbols
1192 that have been auto-loaded from shared libraries. Symbols from
1193 shared libraries that were added by explicit request of the user
1194 are not discarded. Also called from remote.c. */
1197 no_shared_libraries (char *ignored
, int from_tty
)
1199 /* The order of the two routines below is important: clear_solib notifies
1200 the solib_unloaded observers, and some of these observers might need
1201 access to their associated objfiles. Therefore, we can not purge the
1202 solibs' objfiles before clear_solib has been called. */
1205 objfile_purge_solibs ();
1208 /* Reload shared libraries, but avoid reloading the same symbol file
1209 we already have loaded. */
1212 reload_shared_libraries_1 (int from_tty
)
1215 struct cleanup
*old_chain
= make_cleanup (null_cleanup
, NULL
);
1217 for (so
= so_list_head
; so
!= NULL
; so
= so
->next
)
1219 char *filename
, *found_pathname
= NULL
;
1222 int was_loaded
= so
->symbols_loaded
;
1224 SYMFILE_DEFER_BP_RESET
| (from_tty
? SYMFILE_VERBOSE
: 0);
1226 filename
= tilde_expand (so
->so_original_name
);
1227 abfd
= solib_bfd_open (filename
);
1230 found_pathname
= xstrdup (bfd_get_filename (abfd
));
1231 make_cleanup (xfree
, found_pathname
);
1232 gdb_bfd_close_or_warn (abfd
);
1235 /* If this shared library is no longer associated with its previous
1236 symbol file, close that. */
1237 if ((found_pathname
== NULL
&& was_loaded
)
1238 || (found_pathname
!= NULL
1239 && strcmp (found_pathname
, so
->so_name
) != 0))
1241 if (so
->objfile
&& ! (so
->objfile
->flags
& OBJF_USERLOADED
))
1242 free_objfile (so
->objfile
);
1243 remove_target_sections (so
->abfd
);
1244 free_so_symbols (so
);
1247 /* If this shared library is now associated with a new symbol
1249 if (found_pathname
!= NULL
1251 || strcmp (found_pathname
, so
->so_name
) != 0))
1253 volatile struct gdb_exception e
;
1255 TRY_CATCH (e
, RETURN_MASK_ERROR
)
1256 solib_map_sections (so
);
1259 exception_fprintf (gdb_stderr
, e
, _("\
1260 Error while mapping shared library sections:\n"));
1261 else if (auto_solib_add
|| was_loaded
|| libpthread_solib_p (so
))
1262 solib_read_symbols (so
, flags
);
1266 do_cleanups (old_chain
);
1270 reload_shared_libraries (char *ignored
, int from_tty
,
1271 struct cmd_list_element
*e
)
1273 struct target_so_ops
*ops
;
1275 reload_shared_libraries_1 (from_tty
);
1277 ops
= solib_ops (target_gdbarch
);
1279 /* Creating inferior hooks here has two purposes. First, if we reload
1280 shared libraries then the address of solib breakpoint we've computed
1281 previously might be no longer valid. For example, if we forgot to set
1282 solib-absolute-prefix and are setting it right now, then the previous
1283 breakpoint address is plain wrong. Second, installing solib hooks
1284 also implicitly figures were ld.so is and loads symbols for it.
1285 Absent this call, if we've just connected to a target and set
1286 solib-absolute-prefix or solib-search-path, we'll lose all information
1288 if (target_has_execution
)
1290 /* Reset or free private data structures not associated with
1292 ops
->clear_solib ();
1294 /* Remove any previous solib event breakpoint. This is usually
1295 done in common code, at breakpoint_init_inferior time, but
1296 we're not really starting up the inferior here. */
1297 remove_solib_event_breakpoints ();
1299 #ifdef SOLIB_CREATE_INFERIOR_HOOK
1300 SOLIB_CREATE_INFERIOR_HOOK (PIDGET (inferior_ptid
));
1302 solib_create_inferior_hook (from_tty
);
1306 /* Sometimes the platform-specific hook loads initial shared
1307 libraries, and sometimes it doesn't. If it doesn't FROM_TTY will be
1308 incorrectly 0 but such solib targets should be fixed anyway. If we
1309 made all the inferior hook methods consistent, this call could be
1310 removed. Call it only after the solib target has been initialized by
1311 solib_create_inferior_hook. */
1313 solib_add (NULL
, 0, NULL
, auto_solib_add
);
1315 breakpoint_re_set ();
1317 /* We may have loaded or unloaded debug info for some (or all)
1318 shared libraries. However, frames may still reference them. For
1319 example, a frame's unwinder might still point at DWARF FDE
1320 structures that are now freed. Also, getting new symbols may
1321 change our opinion about what is frameless. */
1322 reinit_frame_cache ();
1324 ops
->special_symbol_handling ();
1328 show_auto_solib_add (struct ui_file
*file
, int from_tty
,
1329 struct cmd_list_element
*c
, const char *value
)
1331 fprintf_filtered (file
, _("Autoloading of shared library symbols is %s.\n"),
1336 /* Handler for library-specific lookup of global symbol NAME in OBJFILE. Call
1337 the library-specific handler if it is installed for the current target. */
1340 solib_global_lookup (const struct objfile
*objfile
,
1342 const domain_enum domain
)
1344 struct target_so_ops
*ops
= solib_ops (target_gdbarch
);
1346 if (ops
->lookup_lib_global_symbol
!= NULL
)
1347 return ops
->lookup_lib_global_symbol (objfile
, name
, domain
);
1352 extern initialize_file_ftype _initialize_solib
; /* -Wmissing-prototypes */
1355 _initialize_solib (void)
1357 struct cmd_list_element
*c
;
1359 solib_data
= gdbarch_data_register_pre_init (solib_init
);
1361 add_com ("sharedlibrary", class_files
, sharedlibrary_command
,
1362 _("Load shared object library symbols for files matching REGEXP."));
1363 add_info ("sharedlibrary", info_sharedlibrary_command
,
1364 _("Status of loaded shared object libraries."));
1365 add_com ("nosharedlibrary", class_files
, no_shared_libraries
,
1366 _("Unload all shared object library symbols."));
1368 add_setshow_boolean_cmd ("auto-solib-add", class_support
,
1369 &auto_solib_add
, _("\
1370 Set autoloading of shared library symbols."), _("\
1371 Show autoloading of shared library symbols."), _("\
1372 If \"on\", symbols from all shared object libraries will be loaded\n\
1373 automatically when the inferior begins execution, when the dynamic linker\n\
1374 informs gdb that a new library has been loaded, or when attaching to the\n\
1375 inferior. Otherwise, symbols must be loaded manually, using `sharedlibrary'."),
1377 show_auto_solib_add
,
1378 &setlist
, &showlist
);
1380 add_setshow_filename_cmd ("sysroot", class_support
,
1382 Set an alternate system root."), _("\
1383 Show the current system root."), _("\
1384 The system root is used to load absolute shared library symbol files.\n\
1385 For other (relative) files, you can add directories using\n\
1386 `set solib-search-path'."),
1387 reload_shared_libraries
,
1389 &setlist
, &showlist
);
1391 add_alias_cmd ("solib-absolute-prefix", "sysroot", class_support
, 0,
1393 add_alias_cmd ("solib-absolute-prefix", "sysroot", class_support
, 0,
1396 add_setshow_optional_filename_cmd ("solib-search-path", class_support
,
1397 &solib_search_path
, _("\
1398 Set the search path for loading non-absolute shared library symbol files."), _("\
1399 Show the search path for loading non-absolute shared library symbol files."), _("\
1400 This takes precedence over the environment variables PATH and LD_LIBRARY_PATH."),
1401 reload_shared_libraries
,
1402 show_solib_search_path
,
1403 &setlist
, &showlist
);