1 /* Handle shared libraries for GDB, the GNU Debugger.
3 Copyright (C) 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999,
4 2000, 2001, 2002, 2003, 2005, 2006, 2007, 2008, 2009
5 Free Software Foundation, Inc.
7 This file is part of GDB.
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>. */
24 #include <sys/types.h>
26 #include "gdb_string.h"
31 #include "exceptions.h"
36 #include "gdb_regex.h"
41 #include "completer.h"
42 #include "filenames.h" /* for DOSish file names */
46 #include "readline/readline.h"
49 /* Architecture-specific operations. */
51 /* Per-architecture data key. */
52 static struct gdbarch_data
*solib_data
;
55 solib_init (struct obstack
*obstack
)
57 struct target_so_ops
**ops
;
59 ops
= OBSTACK_ZALLOC (obstack
, struct target_so_ops
*);
60 *ops
= current_target_so_ops
;
64 static struct target_so_ops
*
65 solib_ops (struct gdbarch
*gdbarch
)
67 struct target_so_ops
**ops
= gdbarch_data (gdbarch
, solib_data
);
71 /* Set the solib operations for GDBARCH to NEW_OPS. */
74 set_solib_ops (struct gdbarch
*gdbarch
, struct target_so_ops
*new_ops
)
76 struct target_so_ops
**ops
= gdbarch_data (gdbarch
, solib_data
);
81 /* external data declarations */
83 /* FIXME: gdbarch needs to control this variable, or else every
84 configuration needs to call set_solib_ops. */
85 struct target_so_ops
*current_target_so_ops
;
87 /* local data declarations */
89 static struct so_list
*so_list_head
; /* List of known shared objects */
91 /* Local function prototypes */
93 /* If non-empty, this is a search path for loading non-absolute shared library
94 symbol files. This takes precedence over the environment variables PATH
95 and LD_LIBRARY_PATH. */
96 static char *solib_search_path
= NULL
;
98 show_solib_search_path (struct ui_file
*file
, int from_tty
,
99 struct cmd_list_element
*c
, const char *value
)
101 fprintf_filtered (file
, _("\
102 The search path for loading non-absolute shared library symbol files is %s.\n"),
110 solib_find -- Find a shared library file.
114 char *solib_find (char *in_pathname, int *fd);
118 Global variable GDB_SYSROOT is used as a prefix directory
119 to search for shared libraries if they have an absolute path.
121 Global variable SOLIB_SEARCH_PATH is used as a prefix directory
122 (or set of directories, as in LD_LIBRARY_PATH) to search for all
123 shared libraries if not found in GDB_SYSROOT.
126 * If there is a gdb_sysroot and path is absolute:
127 * Search for gdb_sysroot/path.
129 * Look for it literally (unmodified).
130 * Look in SOLIB_SEARCH_PATH.
131 * If available, use target defined search function.
132 * If gdb_sysroot is NOT set, perform the following two searches:
133 * Look in inferior's $PATH.
134 * Look in inferior's $LD_LIBRARY_PATH.
136 * The last check avoids doing this search when targetting remote
137 * machines since gdb_sysroot will almost always be set.
141 Full pathname of the shared library file, or NULL if not found.
142 (The pathname is malloc'ed; it needs to be freed by the caller.)
143 *FD is set to either -1 or an open file handle for the library. */
146 solib_find (char *in_pathname
, int *fd
)
148 struct target_so_ops
*ops
= solib_ops (target_gdbarch
);
150 char *temp_pathname
= NULL
;
151 int gdb_sysroot_is_empty
;
153 gdb_sysroot_is_empty
= (gdb_sysroot
== NULL
|| *gdb_sysroot
== 0);
155 if (! IS_ABSOLUTE_PATH (in_pathname
) || gdb_sysroot_is_empty
)
156 temp_pathname
= in_pathname
;
159 int prefix_len
= strlen (gdb_sysroot
);
161 /* Remove trailing slashes from absolute prefix. */
162 while (prefix_len
> 0
163 && IS_DIR_SEPARATOR (gdb_sysroot
[prefix_len
- 1]))
166 /* Cat the prefixed pathname together. */
167 temp_pathname
= alloca (prefix_len
+ strlen (in_pathname
) + 1);
168 strncpy (temp_pathname
, gdb_sysroot
, prefix_len
);
169 temp_pathname
[prefix_len
] = '\0';
170 strcat (temp_pathname
, in_pathname
);
173 /* Handle remote files. */
174 if (remote_filename_p (temp_pathname
))
177 return xstrdup (temp_pathname
);
180 /* Now see if we can open it. */
181 found_file
= open (temp_pathname
, O_RDONLY
| O_BINARY
, 0);
183 /* We try to find the library in various ways. After each attempt
184 (except for the one above), either found_file >= 0 and
185 temp_pathname is a malloc'd string, or found_file < 0 and
186 temp_pathname does not point to storage that needs to be
190 temp_pathname
= NULL
;
192 temp_pathname
= xstrdup (temp_pathname
);
194 /* If the search in gdb_sysroot failed, and the path name is
195 absolute at this point, make it relative. (openp will try and open the
196 file according to its absolute path otherwise, which is not what we want.)
197 Affects subsequent searches for this solib. */
198 if (found_file
< 0 && IS_ABSOLUTE_PATH (in_pathname
))
200 /* First, get rid of any drive letters etc. */
201 while (!IS_DIR_SEPARATOR (*in_pathname
))
204 /* Next, get rid of all leading dir separators. */
205 while (IS_DIR_SEPARATOR (*in_pathname
))
209 /* If not found, search the solib_search_path (if any). */
210 if (found_file
< 0 && solib_search_path
!= NULL
)
211 found_file
= openp (solib_search_path
, OPF_TRY_CWD_FIRST
,
212 in_pathname
, O_RDONLY
| O_BINARY
, 0, &temp_pathname
);
214 /* If not found, next search the solib_search_path (if any) for the basename
215 only (ignoring the path). This is to allow reading solibs from a path
216 that differs from the opened path. */
217 if (found_file
< 0 && solib_search_path
!= NULL
)
218 found_file
= openp (solib_search_path
, OPF_TRY_CWD_FIRST
,
219 lbasename (in_pathname
), O_RDONLY
| O_BINARY
, 0,
222 /* If not found, try to use target supplied solib search method */
223 if (found_file
< 0 && ops
->find_and_open_solib
)
224 found_file
= ops
->find_and_open_solib (in_pathname
, O_RDONLY
| O_BINARY
,
227 /* If not found, next search the inferior's $PATH environment variable. */
228 if (found_file
< 0 && gdb_sysroot_is_empty
)
229 found_file
= openp (get_in_environ (inferior_environ
, "PATH"),
230 OPF_TRY_CWD_FIRST
, in_pathname
, O_RDONLY
| O_BINARY
, 0,
233 /* If not found, next search the inferior's $LD_LIBRARY_PATH
234 environment variable. */
235 if (found_file
< 0 && gdb_sysroot_is_empty
)
236 found_file
= openp (get_in_environ (inferior_environ
, "LD_LIBRARY_PATH"),
237 OPF_TRY_CWD_FIRST
, in_pathname
, O_RDONLY
| O_BINARY
, 0,
241 return temp_pathname
;
244 /* Open and return a BFD for the shared library PATHNAME. If FD is not -1,
245 it is used as file handle to open the file. Throws an error if the file
246 could not be opened. Handles both local and remote file access.
248 PATHNAME must be malloc'ed by the caller. If successful, the new BFD's
249 name will point to it. If unsuccessful, PATHNAME will be freed and the
250 FD will be closed (unless FD was -1). */
253 solib_bfd_fopen (char *pathname
, int fd
)
257 if (remote_filename_p (pathname
))
259 gdb_assert (fd
== -1);
260 abfd
= remote_bfd_open (pathname
, gnutarget
);
264 abfd
= bfd_fopen (pathname
, gnutarget
, FOPEN_RB
, fd
);
267 bfd_set_cacheable (abfd
, 1);
274 make_cleanup (xfree
, pathname
);
275 error (_("Could not open `%s' as an executable file: %s"),
276 pathname
, bfd_errmsg (bfd_get_error ()));
282 /* Find shared library PATHNAME and open a BFD for it. */
285 solib_bfd_open (char *pathname
)
287 struct target_so_ops
*ops
= solib_ops (target_gdbarch
);
288 char *found_pathname
;
292 /* Use target-specific override if present. */
294 return ops
->bfd_open (pathname
);
296 /* Search for shared library file. */
297 found_pathname
= solib_find (pathname
, &found_file
);
298 if (found_pathname
== NULL
)
299 perror_with_name (pathname
);
301 /* Open bfd for shared library. */
302 abfd
= solib_bfd_fopen (found_pathname
, found_file
);
304 /* Check bfd format. */
305 if (!bfd_check_format (abfd
, bfd_object
))
308 make_cleanup (xfree
, found_pathname
);
309 error (_("`%s': not in executable format: %s"),
310 found_pathname
, bfd_errmsg (bfd_get_error ()));
321 solib_map_sections -- open bfd and build sections for shared lib
325 static int solib_map_sections (struct so_list *so)
329 Given a pointer to one of the shared objects in our list
330 of mapped objects, use the recorded name to open a bfd
331 descriptor for the object, build a section table, and then
332 relocate all the section addresses by the base address at
333 which the shared object was mapped.
337 In most (all?) cases the shared object file name recorded in the
338 dynamic linkage tables will be a fully qualified pathname. For
339 cases where it isn't, do we really mimic the systems search
340 mechanism correctly in the below code (particularly the tilde
345 solib_map_sections (void *arg
)
347 struct so_list
*so
= (struct so_list
*) arg
; /* catch_errors bogon */
349 struct section_table
*p
;
350 struct cleanup
*old_chain
;
353 filename
= tilde_expand (so
->so_name
);
354 old_chain
= make_cleanup (xfree
, filename
);
355 abfd
= solib_bfd_open (filename
);
356 do_cleanups (old_chain
);
358 /* Leave bfd open, core_xfer_memory and "info files" need it. */
361 /* copy full path name into so_name, so that later symbol_file_add
363 if (strlen (bfd_get_filename (abfd
)) >= SO_NAME_MAX_PATH_SIZE
)
364 error (_("Shared library file name is too long."));
365 strcpy (so
->so_name
, bfd_get_filename (abfd
));
367 if (build_section_table (abfd
, &so
->sections
, &so
->sections_end
))
369 error (_("Can't find the file sections in `%s': %s"),
370 bfd_get_filename (abfd
), bfd_errmsg (bfd_get_error ()));
373 for (p
= so
->sections
; p
< so
->sections_end
; p
++)
375 struct target_so_ops
*ops
= solib_ops (target_gdbarch
);
377 /* Relocate the section binding addresses as recorded in the shared
378 object's file by the base address to which the object was actually
380 ops
->relocate_section_addresses (so
, p
);
382 /* If the target didn't provide information about the address
383 range of the shared object, assume we want the location of
384 the .text section. */
385 if (so
->addr_low
== 0 && so
->addr_high
== 0
386 && strcmp (p
->the_bfd_section
->name
, ".text") == 0)
388 so
->addr_low
= p
->addr
;
389 so
->addr_high
= p
->endaddr
;
398 free_so --- free a `struct so_list' object
402 void free_so (struct so_list *so)
406 Free the storage associated with the `struct so_list' object SO.
407 If we have opened a BFD for SO, close it.
409 The caller is responsible for removing SO from whatever list it is
410 a member of. If we have placed SO's sections in some target's
411 section table, the caller is responsible for removing them.
413 This function doesn't mess with objfiles at all. If there is an
414 objfile associated with SO that needs to be removed, the caller is
415 responsible for taking care of that. */
418 free_so (struct so_list
*so
)
420 struct target_so_ops
*ops
= solib_ops (target_gdbarch
);
421 char *bfd_filename
= 0;
424 xfree (so
->sections
);
428 bfd_filename
= bfd_get_filename (so
->abfd
);
429 if (! bfd_close (so
->abfd
))
430 warning (_("cannot close \"%s\": %s"),
431 bfd_filename
, bfd_errmsg (bfd_get_error ()));
435 xfree (bfd_filename
);
443 /* Return address of first so_list entry in master shared object list. */
445 master_so_list (void)
451 /* A small stub to get us past the arg-passing pinhole of catch_errors. */
454 symbol_add_stub (void *arg
)
456 struct so_list
*so
= (struct so_list
*) arg
; /* catch_errs bogon */
457 struct section_addr_info
*sap
;
459 /* Have we already loaded this shared object? */
460 ALL_OBJFILES (so
->objfile
)
462 if (strcmp (so
->objfile
->name
, so
->so_name
) == 0)
466 sap
= build_section_addr_info_from_section_table (so
->sections
,
469 so
->objfile
= symbol_file_add_from_bfd (so
->abfd
, so
->from_tty
,
470 sap
, 0, OBJF_SHARED
| OBJF_KEEPBFD
);
471 free_section_addr_info (sap
);
476 /* Read in symbols for shared object SO. If FROM_TTY is non-zero, be
477 chatty about it. Return non-zero if any symbols were actually
481 solib_read_symbols (struct so_list
*so
, int from_tty
)
483 if (so
->symbols_loaded
)
486 printf_unfiltered (_("Symbols already loaded for %s\n"), so
->so_name
);
488 else if (so
->abfd
== NULL
)
491 printf_unfiltered (_("Symbol file not found for %s\n"), so
->so_name
);
495 if (catch_errors (symbol_add_stub
, so
,
496 "Error while reading shared library symbols:\n",
499 if (from_tty
&& print_symbol_loading
)
500 printf_unfiltered (_("Loaded symbols for %s\n"), so
->so_name
);
501 so
->symbols_loaded
= 1;
511 update_solib_list --- synchronize GDB's shared object list with inferior's
515 void update_solib_list (int from_tty, struct target_ops *TARGET)
517 Extract the list of currently loaded shared objects from the
518 inferior, and compare it with the list of shared objects currently
519 in GDB's so_list_head list. Edit so_list_head to bring it in sync
520 with the inferior's new list.
522 If we notice that the inferior has unloaded some shared objects,
523 free any symbolic info GDB had read about those shared objects.
525 Don't load symbolic info for any new shared objects; just add them
526 to the list, and leave their symbols_loaded flag clear.
528 If FROM_TTY is non-null, feel free to print messages about what
531 If TARGET is non-null, add the sections of all new shared objects
532 to TARGET's section table. Note that this doesn't remove any
533 sections for shared objects that have been unloaded, and it
534 doesn't check to see if the new shared objects are already present in
535 the section table. But we only use this for core files and
536 processes we've just attached to, so that's okay. */
539 update_solib_list (int from_tty
, struct target_ops
*target
)
541 struct target_so_ops
*ops
= solib_ops (target_gdbarch
);
542 struct so_list
*inferior
= ops
->current_sos();
543 struct so_list
*gdb
, **gdb_link
;
545 /* We can reach here due to changing solib-search-path or the
546 sysroot, before having any inferior. */
547 if (target_has_execution
&& !ptid_equal (inferior_ptid
, null_ptid
))
549 struct inferior
*inf
= current_inferior ();
551 /* If we are attaching to a running process for which we
552 have not opened a symbol file, we may be able to get its
554 if (inf
->attach_flag
&& symfile_objfile
== NULL
)
555 catch_errors (ops
->open_symbol_file_object
, &from_tty
,
556 "Error reading attached process's symbol file.\n",
560 /* GDB and the inferior's dynamic linker each maintain their own
561 list of currently loaded shared objects; we want to bring the
562 former in sync with the latter. Scan both lists, seeing which
563 shared objects appear where. There are three cases:
565 - A shared object appears on both lists. This means that GDB
566 knows about it already, and it's still loaded in the inferior.
567 Nothing needs to happen.
569 - A shared object appears only on GDB's list. This means that
570 the inferior has unloaded it. We should remove the shared
571 object from GDB's tables.
573 - A shared object appears only on the inferior's list. This
574 means that it's just been loaded. We should add it to GDB's
577 So we walk GDB's list, checking each entry to see if it appears
578 in the inferior's list too. If it does, no action is needed, and
579 we remove it from the inferior's list. If it doesn't, the
580 inferior has unloaded it, and we remove it from GDB's list. By
581 the time we're done walking GDB's list, the inferior's list
582 contains only the new shared objects, which we then add. */
585 gdb_link
= &so_list_head
;
588 struct so_list
*i
= inferior
;
589 struct so_list
**i_link
= &inferior
;
591 /* Check to see whether the shared object *gdb also appears in
592 the inferior's current list. */
597 if (ops
->same (gdb
, i
))
602 if (! strcmp (gdb
->so_original_name
, i
->so_original_name
))
610 /* If the shared object appears on the inferior's list too, then
611 it's still loaded, so we don't need to do anything. Delete
612 it from the inferior's list, and leave it on GDB's list. */
617 gdb_link
= &gdb
->next
;
621 /* If it's not on the inferior's list, remove it from GDB's tables. */
624 /* Notify any observer that the shared object has been
625 unloaded before we remove it from GDB's tables. */
626 observer_notify_solib_unloaded (gdb
);
628 *gdb_link
= gdb
->next
;
630 /* Unless the user loaded it explicitly, free SO's objfile. */
631 if (gdb
->objfile
&& ! (gdb
->objfile
->flags
& OBJF_USERLOADED
))
632 free_objfile (gdb
->objfile
);
634 /* Some targets' section tables might be referring to
635 sections from so->abfd; remove them. */
636 remove_target_sections (gdb
->abfd
);
643 /* Now the inferior's list contains only shared objects that don't
644 appear in GDB's list --- those that are newly loaded. Add them
645 to GDB's shared object list. */
650 /* Add the new shared objects to GDB's list. */
651 *gdb_link
= inferior
;
653 /* Fill in the rest of each of the `struct so_list' nodes. */
654 for (i
= inferior
; i
; i
= i
->next
)
656 i
->from_tty
= from_tty
;
658 /* Fill in the rest of the `struct so_list' node. */
659 catch_errors (solib_map_sections
, i
,
660 "Error while mapping shared library sections:\n",
663 /* If requested, add the shared object's sections to the TARGET's
664 section table. Do this immediately after mapping the object so
665 that later nodes in the list can query this object, as is needed
669 int count
= (i
->sections_end
- i
->sections
);
672 int space
= target_resize_to_sections (target
, count
);
673 memcpy (target
->to_sections
+ space
,
675 count
* sizeof (i
->sections
[0]));
679 /* Notify any observer that the shared object has been
680 loaded now that we've added it to GDB's tables. */
681 observer_notify_solib_loaded (i
);
686 /* Return non-zero if SO is the libpthread shared library.
688 Uses a fairly simplistic heuristic approach where we check
689 the file name against "/libpthread". This can lead to false
690 positives, but this should be good enough in practice. */
693 libpthread_solib_p (struct so_list
*so
)
695 return (strstr (so
->so_name
, "/libpthread") != NULL
);
700 solib_add -- read in symbol info for newly added shared libraries
704 void solib_add (char *pattern, int from_tty, struct target_ops
705 *TARGET, int readsyms)
709 Read in symbolic information for any shared objects whose names
710 match PATTERN. (If we've already read a shared object's symbol
711 info, leave it alone.) If PATTERN is zero, read them all.
713 If READSYMS is 0, defer reading symbolic information until later
714 but still do any needed low level processing.
716 FROM_TTY and TARGET are as described for update_solib_list, above. */
719 solib_add (char *pattern
, int from_tty
, struct target_ops
*target
, int readsyms
)
725 char *re_err
= re_comp (pattern
);
728 error (_("Invalid regexp: %s"), re_err
);
731 update_solib_list (from_tty
, target
);
733 /* Walk the list of currently loaded shared libraries, and read
734 symbols for any that match the pattern --- or any whose symbols
735 aren't already loaded, if no pattern was given. */
738 int loaded_any_symbols
= 0;
740 for (gdb
= so_list_head
; gdb
; gdb
= gdb
->next
)
741 if (! pattern
|| re_exec (gdb
->so_name
))
743 /* Normally, we would read the symbols from that library
744 only if READSYMS is set. However, we're making a small
745 exception for the pthread library, because we sometimes
746 need the library symbols to be loaded in order to provide
747 thread support (x86-linux for instance). */
748 const int add_this_solib
=
749 (readsyms
|| libpthread_solib_p (gdb
));
752 if (add_this_solib
&& solib_read_symbols (gdb
, from_tty
))
753 loaded_any_symbols
= 1;
756 if (from_tty
&& pattern
&& ! any_matches
)
758 ("No loaded shared libraries match the pattern `%s'.\n", pattern
);
760 if (loaded_any_symbols
)
762 struct target_so_ops
*ops
= solib_ops (target_gdbarch
);
764 /* Getting new symbols may change our opinion about what is
766 reinit_frame_cache ();
768 ops
->special_symbol_handling ();
778 info_sharedlibrary_command -- code for "info sharedlibrary"
782 static void info_sharedlibrary_command ()
786 Walk through the shared library list and print information
787 about each attached library.
791 info_sharedlibrary_command (char *ignore
, int from_tty
)
793 struct so_list
*so
= NULL
; /* link map state variable */
797 /* "0x", a little whitespace, and two hex digits per byte of pointers. */
798 addr_width
= 4 + (gdbarch_ptr_bit (target_gdbarch
) / 4);
800 update_solib_list (from_tty
, 0);
802 for (so
= so_list_head
; so
; so
= so
->next
)
808 printf_unfiltered ("%-*s%-*s%-12s%s\n", addr_width
, "From",
809 addr_width
, "To", "Syms Read",
810 "Shared Object Library");
814 printf_unfiltered ("%-*s", addr_width
,
816 ? hex_string_custom (
817 (LONGEST
) so
->addr_low
,
820 printf_unfiltered ("%-*s", addr_width
,
822 ? hex_string_custom (
823 (LONGEST
) so
->addr_high
,
826 printf_unfiltered ("%-12s", so
->symbols_loaded
? "Yes" : "No");
827 printf_unfiltered ("%s\n", so
->so_name
);
830 if (so_list_head
== NULL
)
832 printf_unfiltered (_("No shared libraries loaded at this time.\n"));
840 solib_address -- check to see if an address is in a shared lib
844 char * solib_address (CORE_ADDR address)
848 Provides a hook for other gdb routines to discover whether or
849 not a particular address is within the mapped address space of
852 For example, this routine is called at one point to disable
853 breakpoints which are in shared libraries that are not currently
858 solib_address (CORE_ADDR address
)
860 struct so_list
*so
= 0; /* link map state variable */
862 for (so
= so_list_head
; so
; so
= so
->next
)
864 struct section_table
*p
;
866 for (p
= so
->sections
; p
< so
->sections_end
; p
++)
868 if (p
->addr
<= address
&& address
< p
->endaddr
)
869 return (so
->so_name
);
876 /* Called by free_all_symtabs */
881 struct target_so_ops
*ops
= solib_ops (target_gdbarch
);
883 /* This function is expected to handle ELF shared libraries. It is
884 also used on Solaris, which can run either ELF or a.out binaries
885 (for compatibility with SunOS 4), both of which can use shared
886 libraries. So we don't know whether we have an ELF executable or
887 an a.out executable until the user chooses an executable file.
889 ELF shared libraries don't get mapped into the address space
890 until after the program starts, so we'd better not try to insert
891 breakpoints in them immediately. We have to wait until the
892 dynamic linker has loaded them; we'll hit a bp_shlib_event
893 breakpoint (look for calls to create_solib_event_breakpoint) when
896 SunOS shared libraries seem to be different --- they're present
897 as soon as the process begins execution, so there's no need to
898 put off inserting breakpoints. There's also nowhere to put a
899 bp_shlib_event breakpoint, so if we put it off, we'll never get
902 So: disable breakpoints only if we're using ELF shared libs. */
904 && bfd_get_flavour (exec_bfd
) != bfd_target_aout_flavour
)
905 disable_breakpoints_in_shlibs ();
909 struct so_list
*so
= so_list_head
;
910 so_list_head
= so
->next
;
911 observer_notify_solib_unloaded (so
);
913 remove_target_sections (so
->abfd
);
922 solib_create_inferior_hook -- shared library startup support
926 void solib_create_inferior_hook ()
930 When gdb starts up the inferior, it nurses it along (through the
931 shell) until it is ready to execute it's first instruction. At this
932 point, this function gets called via expansion of the macro
933 SOLIB_CREATE_INFERIOR_HOOK. */
936 solib_create_inferior_hook (void)
938 struct target_so_ops
*ops
= solib_ops (target_gdbarch
);
939 ops
->solib_create_inferior_hook();
944 in_solib_dynsym_resolve_code -- check to see if an address is in
945 dynamic loader's dynamic symbol
950 int in_solib_dynsym_resolve_code (CORE_ADDR pc)
954 Determine if PC is in the dynamic linker's symbol resolution
955 code. Return 1 if so, 0 otherwise.
959 in_solib_dynsym_resolve_code (CORE_ADDR pc
)
961 struct target_so_ops
*ops
= solib_ops (target_gdbarch
);
962 return ops
->in_dynsym_resolve_code (pc
);
969 sharedlibrary_command -- handle command to explicitly add library
973 static void sharedlibrary_command (char *args, int from_tty)
980 sharedlibrary_command (char *args
, int from_tty
)
983 solib_add (args
, from_tty
, (struct target_ops
*) 0, 1);
988 no_shared_libraries -- handle command to explicitly discard symbols
989 from shared libraries.
993 Implements the command "nosharedlibrary", which discards symbols
994 that have been auto-loaded from shared libraries. Symbols from
995 shared libraries that were added by explicit request of the user
996 are not discarded. Also called from remote.c. */
999 no_shared_libraries (char *ignored
, int from_tty
)
1001 objfile_purge_solibs ();
1006 reload_shared_libraries (char *ignored
, int from_tty
,
1007 struct cmd_list_element
*e
)
1009 no_shared_libraries (NULL
, from_tty
);
1010 solib_add (NULL
, from_tty
, NULL
, auto_solib_add
);
1014 show_auto_solib_add (struct ui_file
*file
, int from_tty
,
1015 struct cmd_list_element
*c
, const char *value
)
1017 fprintf_filtered (file
, _("Autoloading of shared library symbols is %s.\n"),
1022 /* Handler for library-specific lookup of global symbol NAME in OBJFILE. Call
1023 the library-specific handler if it is installed for the current target. */
1026 solib_global_lookup (const struct objfile
*objfile
,
1028 const char *linkage_name
,
1029 const domain_enum domain
)
1031 struct target_so_ops
*ops
= solib_ops (target_gdbarch
);
1033 if (ops
->lookup_lib_global_symbol
!= NULL
)
1034 return ops
->lookup_lib_global_symbol (objfile
, name
, linkage_name
, domain
);
1039 extern initialize_file_ftype _initialize_solib
; /* -Wmissing-prototypes */
1042 _initialize_solib (void)
1044 struct cmd_list_element
*c
;
1046 solib_data
= gdbarch_data_register_pre_init (solib_init
);
1048 add_com ("sharedlibrary", class_files
, sharedlibrary_command
,
1049 _("Load shared object library symbols for files matching REGEXP."));
1050 add_info ("sharedlibrary", info_sharedlibrary_command
,
1051 _("Status of loaded shared object libraries."));
1052 add_com ("nosharedlibrary", class_files
, no_shared_libraries
,
1053 _("Unload all shared object library symbols."));
1055 add_setshow_boolean_cmd ("auto-solib-add", class_support
,
1056 &auto_solib_add
, _("\
1057 Set autoloading of shared library symbols."), _("\
1058 Show autoloading of shared library symbols."), _("\
1059 If \"on\", symbols from all shared object libraries will be loaded\n\
1060 automatically when the inferior begins execution, when the dynamic linker\n\
1061 informs gdb that a new library has been loaded, or when attaching to the\n\
1062 inferior. Otherwise, symbols must be loaded manually, using `sharedlibrary'."),
1064 show_auto_solib_add
,
1065 &setlist
, &showlist
);
1067 add_setshow_filename_cmd ("sysroot", class_support
,
1069 Set an alternate system root."), _("\
1070 Show the current system root."), _("\
1071 The system root is used to load absolute shared library symbol files.\n\
1072 For other (relative) files, you can add directories using\n\
1073 `set solib-search-path'."),
1074 reload_shared_libraries
,
1076 &setlist
, &showlist
);
1078 add_alias_cmd ("solib-absolute-prefix", "sysroot", class_support
, 0,
1080 add_alias_cmd ("solib-absolute-prefix", "sysroot", class_support
, 0,
1083 add_setshow_optional_filename_cmd ("solib-search-path", class_support
,
1084 &solib_search_path
, _("\
1085 Set the search path for loading non-absolute shared library symbol files."), _("\
1086 Show the search path for loading non-absolute shared library symbol files."), _("\
1087 This takes precedence over the environment variables PATH and LD_LIBRARY_PATH."),
1088 reload_shared_libraries
,
1089 show_solib_search_path
,
1090 &setlist
, &showlist
);