(generic_readchar): Tweak previous checkin, close error_fd if EOF.
[deliverable/binutils-gdb.git] / gdb / solib.c
CommitLineData
13437d4b 1/* Handle shared libraries for GDB, the GNU Debugger.
14a5e767 2
6aba47ca 3 Copyright (C) 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999,
4c38e0a4 4 2000, 2001, 2002, 2003, 2005, 2006, 2007, 2008, 2009, 2010
9b254dd1 5 Free Software Foundation, Inc.
c906108c 6
c5aa993b 7 This file is part of GDB.
c906108c 8
c5aa993b
JM
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
a9762ec7 11 the Free Software Foundation; either version 3 of the License, or
c5aa993b 12 (at your option) any later version.
c906108c 13
c5aa993b
JM
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License
a9762ec7 20 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c 21
c906108c
SS
22#include "defs.h"
23
c906108c 24#include <sys/types.h>
c906108c 25#include <fcntl.h>
13437d4b 26#include "gdb_string.h"
c906108c
SS
27#include "symtab.h"
28#include "bfd.h"
29#include "symfile.h"
30#include "objfiles.h"
60250e8b 31#include "exceptions.h"
c906108c
SS
32#include "gdbcore.h"
33#include "command.h"
34#include "target.h"
35#include "frame.h"
88987551 36#include "gdb_regex.h"
c906108c
SS
37#include "inferior.h"
38#include "environ.h"
39#include "language.h"
40#include "gdbcmd.h"
fa58ee11 41#include "completer.h"
fe4e3eb8 42#include "filenames.h" /* for DOSish file names */
4646aa9d 43#include "exec.h"
13437d4b 44#include "solist.h"
84acb35a 45#include "observer.h"
dbda9972 46#include "readline/readline.h"
f1838a98 47#include "remote.h"
2c0b251b 48#include "solib.h"
55333a84 49#include "interps.h"
c906108c 50
66aba65d
MK
51/* Architecture-specific operations. */
52
53/* Per-architecture data key. */
54static struct gdbarch_data *solib_data;
55
56static void *
57solib_init (struct obstack *obstack)
58{
59 struct target_so_ops **ops;
60
61 ops = OBSTACK_ZALLOC (obstack, struct target_so_ops *);
62 *ops = current_target_so_ops;
63 return ops;
64}
65
66static struct target_so_ops *
67solib_ops (struct gdbarch *gdbarch)
68{
69 struct target_so_ops **ops = gdbarch_data (gdbarch, solib_data);
70 return *ops;
71}
7d522c90
DJ
72
73/* Set the solib operations for GDBARCH to NEW_OPS. */
74
75void
76set_solib_ops (struct gdbarch *gdbarch, struct target_so_ops *new_ops)
77{
78 struct target_so_ops **ops = gdbarch_data (gdbarch, solib_data);
79 *ops = new_ops;
80}
66aba65d
MK
81\f
82
13437d4b 83/* external data declarations */
c906108c 84
7d522c90
DJ
85/* FIXME: gdbarch needs to control this variable, or else every
86 configuration needs to call set_solib_ops. */
13437d4b 87struct target_so_ops *current_target_so_ops;
23e04971 88
6c95b8df
PA
89/* List of known shared objects */
90#define so_list_head current_program_space->so_list
23e04971 91
c906108c
SS
92/* Local function prototypes */
93
c906108c
SS
94/* If non-empty, this is a search path for loading non-absolute shared library
95 symbol files. This takes precedence over the environment variables PATH
96 and LD_LIBRARY_PATH. */
97static char *solib_search_path = NULL;
920d2a44
AC
98static void
99show_solib_search_path (struct ui_file *file, int from_tty,
100 struct cmd_list_element *c, const char *value)
101{
102 fprintf_filtered (file, _("\
103The search path for loading non-absolute shared library symbol files is %s.\n"),
104 value);
105}
c906108c 106
e4f7b8c8
MS
107/*
108
109 GLOBAL FUNCTION
110
572d275c 111 solib_find -- Find a shared library file.
e4f7b8c8
MS
112
113 SYNOPSIS
114
572d275c 115 char *solib_find (char *in_pathname, int *fd);
e4f7b8c8
MS
116
117 DESCRIPTION
118
f822c95b 119 Global variable GDB_SYSROOT is used as a prefix directory
e4f7b8c8
MS
120 to search for shared libraries if they have an absolute path.
121
122 Global variable SOLIB_SEARCH_PATH is used as a prefix directory
123 (or set of directories, as in LD_LIBRARY_PATH) to search for all
f822c95b 124 shared libraries if not found in GDB_SYSROOT.
e4f7b8c8 125
c8c18e65 126 Search algorithm:
f822c95b
DJ
127 * If there is a gdb_sysroot and path is absolute:
128 * Search for gdb_sysroot/path.
c8c18e65
KW
129 * else
130 * Look for it literally (unmodified).
e4f7b8c8 131 * Look in SOLIB_SEARCH_PATH.
f43caff8 132 * If available, use target defined search function.
f822c95b 133 * If gdb_sysroot is NOT set, perform the following two searches:
c8c18e65
KW
134 * Look in inferior's $PATH.
135 * Look in inferior's $LD_LIBRARY_PATH.
136 *
137 * The last check avoids doing this search when targetting remote
f822c95b 138 * machines since gdb_sysroot will almost always be set.
e4f7b8c8
MS
139
140 RETURNS
b21f0843 141
572d275c
UW
142 Full pathname of the shared library file, or NULL if not found.
143 (The pathname is malloc'ed; it needs to be freed by the caller.)
144 *FD is set to either -1 or an open file handle for the library. */
e4f7b8c8 145
572d275c
UW
146char *
147solib_find (char *in_pathname, int *fd)
e4f7b8c8 148{
1cf3db46 149 struct target_so_ops *ops = solib_ops (target_gdbarch);
e4f7b8c8
MS
150 int found_file = -1;
151 char *temp_pathname = NULL;
f822c95b 152 int gdb_sysroot_is_empty;
08105857
PA
153 const char *solib_symbols_extension
154 = gdbarch_solib_symbols_extension (target_gdbarch);
155
156 /* If solib_symbols_extension is set, replace the file's
157 extension. */
158 if (solib_symbols_extension)
159 {
160 char *p = in_pathname + strlen (in_pathname);
161 while (p > in_pathname && *p != '.')
162 p--;
163
164 if (*p == '.')
165 {
166 char *new_pathname;
167
168 new_pathname = alloca (p - in_pathname + 1
169 + strlen (solib_symbols_extension) + 1);
170 memcpy (new_pathname, in_pathname, p - in_pathname + 1);
171 strcpy (new_pathname + (p - in_pathname) + 1,
172 solib_symbols_extension);
173
174 in_pathname = new_pathname;
175 }
176 }
58dc52c3 177
f822c95b 178 gdb_sysroot_is_empty = (gdb_sysroot == NULL || *gdb_sysroot == 0);
e4f7b8c8 179
f822c95b 180 if (! IS_ABSOLUTE_PATH (in_pathname) || gdb_sysroot_is_empty)
f1d10cfb
AS
181 temp_pathname = in_pathname;
182 else
e4f7b8c8 183 {
f822c95b 184 int prefix_len = strlen (gdb_sysroot);
f1d10cfb
AS
185
186 /* Remove trailing slashes from absolute prefix. */
187 while (prefix_len > 0
f822c95b 188 && IS_DIR_SEPARATOR (gdb_sysroot[prefix_len - 1]))
f1d10cfb
AS
189 prefix_len--;
190
191 /* Cat the prefixed pathname together. */
192 temp_pathname = alloca (prefix_len + strlen (in_pathname) + 1);
f822c95b 193 strncpy (temp_pathname, gdb_sysroot, prefix_len);
f1d10cfb
AS
194 temp_pathname[prefix_len] = '\0';
195 strcat (temp_pathname, in_pathname);
e4f7b8c8
MS
196 }
197
f1838a98
UW
198 /* Handle remote files. */
199 if (remote_filename_p (temp_pathname))
200 {
572d275c
UW
201 *fd = -1;
202 return xstrdup (temp_pathname);
f1838a98
UW
203 }
204
f1d10cfb
AS
205 /* Now see if we can open it. */
206 found_file = open (temp_pathname, O_RDONLY | O_BINARY, 0);
207
0997b535
MS
208 /* We try to find the library in various ways. After each attempt
209 (except for the one above), either found_file >= 0 and
210 temp_pathname is a malloc'd string, or found_file < 0 and
211 temp_pathname does not point to storage that needs to be
212 freed. */
213
214 if (found_file < 0)
215 temp_pathname = NULL;
216 else
217 temp_pathname = xstrdup (temp_pathname);
218
f822c95b 219 /* If the search in gdb_sysroot failed, and the path name is
ba5f0d88
OF
220 absolute at this point, make it relative. (openp will try and open the
221 file according to its absolute path otherwise, which is not what we want.)
222 Affects subsequent searches for this solib. */
223 if (found_file < 0 && IS_ABSOLUTE_PATH (in_pathname))
224 {
225 /* First, get rid of any drive letters etc. */
226 while (!IS_DIR_SEPARATOR (*in_pathname))
227 in_pathname++;
228
229 /* Next, get rid of all leading dir separators. */
230 while (IS_DIR_SEPARATOR (*in_pathname))
231 in_pathname++;
232 }
233
c8c18e65 234 /* If not found, search the solib_search_path (if any). */
e4f7b8c8 235 if (found_file < 0 && solib_search_path != NULL)
014d698b 236 found_file = openp (solib_search_path, OPF_TRY_CWD_FIRST,
fbdebf46 237 in_pathname, O_RDONLY | O_BINARY, &temp_pathname);
ba5f0d88
OF
238
239 /* If not found, next search the solib_search_path (if any) for the basename
240 only (ignoring the path). This is to allow reading solibs from a path
241 that differs from the opened path. */
242 if (found_file < 0 && solib_search_path != NULL)
014d698b 243 found_file = openp (solib_search_path, OPF_TRY_CWD_FIRST,
fbdebf46 244 lbasename (in_pathname), O_RDONLY | O_BINARY,
ba5f0d88 245 &temp_pathname);
e4f7b8c8 246
2610b0bf 247 /* If not found, try to use target supplied solib search method */
66aba65d 248 if (found_file < 0 && ops->find_and_open_solib)
637d6690 249 found_file = ops->find_and_open_solib (in_pathname, O_RDONLY | O_BINARY,
66aba65d 250 &temp_pathname);
2610b0bf 251
e4f7b8c8 252 /* If not found, next search the inferior's $PATH environment variable. */
f822c95b 253 if (found_file < 0 && gdb_sysroot_is_empty)
3f81c18a
VP
254 found_file = openp (get_in_environ (current_inferior ()->environment,
255 "PATH"),
fbdebf46 256 OPF_TRY_CWD_FIRST, in_pathname, O_RDONLY | O_BINARY,
014d698b 257 &temp_pathname);
e4f7b8c8
MS
258
259 /* If not found, next search the inferior's $LD_LIBRARY_PATH
260 environment variable. */
f822c95b 261 if (found_file < 0 && gdb_sysroot_is_empty)
3f81c18a
VP
262 found_file = openp (get_in_environ (current_inferior ()->environment,
263 "LD_LIBRARY_PATH"),
fbdebf46 264 OPF_TRY_CWD_FIRST, in_pathname, O_RDONLY | O_BINARY,
014d698b 265 &temp_pathname);
e4f7b8c8 266
572d275c
UW
267 *fd = found_file;
268 return temp_pathname;
269}
270
271/* Open and return a BFD for the shared library PATHNAME. If FD is not -1,
272 it is used as file handle to open the file. Throws an error if the file
273 could not be opened. Handles both local and remote file access.
274
275 PATHNAME must be malloc'ed by the caller. If successful, the new BFD's
276 name will point to it. If unsuccessful, PATHNAME will be freed and the
277 FD will be closed (unless FD was -1). */
278
279bfd *
280solib_bfd_fopen (char *pathname, int fd)
281{
282 bfd *abfd;
283
284 if (remote_filename_p (pathname))
285 {
286 gdb_assert (fd == -1);
287 abfd = remote_bfd_open (pathname, gnutarget);
288 }
289 else
290 {
291 abfd = bfd_fopen (pathname, gnutarget, FOPEN_RB, fd);
292
293 if (abfd)
294 bfd_set_cacheable (abfd, 1);
295 else if (fd != -1)
296 close (fd);
297 }
f1838a98 298
f1838a98
UW
299 if (!abfd)
300 {
572d275c 301 make_cleanup (xfree, pathname);
f1838a98 302 error (_("Could not open `%s' as an executable file: %s"),
572d275c 303 pathname, bfd_errmsg (bfd_get_error ()));
f1838a98
UW
304 }
305
572d275c
UW
306 return abfd;
307}
308
309/* Find shared library PATHNAME and open a BFD for it. */
310
311bfd *
312solib_bfd_open (char *pathname)
313{
572d275c
UW
314 char *found_pathname;
315 int found_file;
316 bfd *abfd;
378d2b72 317 const struct bfd_arch_info *b;
572d275c 318
572d275c
UW
319 /* Search for shared library file. */
320 found_pathname = solib_find (pathname, &found_file);
321 if (found_pathname == NULL)
048d532d
PA
322 {
323 /* Return failure if the file could not be found, so that we can
324 accumulate messages about missing libraries. */
325 if (errno == ENOENT)
326 return NULL;
327
328 perror_with_name (pathname);
329 }
572d275c
UW
330
331 /* Open bfd for shared library. */
332 abfd = solib_bfd_fopen (found_pathname, found_file);
333
334 /* Check bfd format. */
f1838a98 335 if (!bfd_check_format (abfd, bfd_object))
0997b535 336 {
f1838a98 337 bfd_close (abfd);
572d275c 338 make_cleanup (xfree, found_pathname);
f1838a98 339 error (_("`%s': not in executable format: %s"),
572d275c 340 found_pathname, bfd_errmsg (bfd_get_error ()));
0997b535 341 }
f1838a98 342
378d2b72
HZ
343 /* Check bfd arch. */
344 b = gdbarch_bfd_arch_info (target_gdbarch);
69e2bf17 345 if (!b->compatible (b, bfd_get_arch_info (abfd)))
378d2b72
HZ
346 warning (_("`%s': Shared library architecture %s is not compatible "
347 "with target architecture %s."), found_pathname,
348 bfd_get_arch_info (abfd)->printable_name, b->printable_name);
349
f1838a98 350 return abfd;
e4f7b8c8
MS
351}
352
353
c906108c
SS
354/*
355
c5aa993b 356 LOCAL FUNCTION
c906108c 357
c5aa993b 358 solib_map_sections -- open bfd and build sections for shared lib
c906108c 359
c5aa993b 360 SYNOPSIS
c906108c 361
c5aa993b 362 static int solib_map_sections (struct so_list *so)
c906108c 363
c5aa993b 364 DESCRIPTION
c906108c 365
c5aa993b
JM
366 Given a pointer to one of the shared objects in our list
367 of mapped objects, use the recorded name to open a bfd
368 descriptor for the object, build a section table, and then
369 relocate all the section addresses by the base address at
370 which the shared object was mapped.
c906108c 371
c5aa993b 372 FIXMES
c906108c 373
c5aa993b
JM
374 In most (all?) cases the shared object file name recorded in the
375 dynamic linkage tables will be a fully qualified pathname. For
376 cases where it isn't, do we really mimic the systems search
377 mechanism correctly in the below code (particularly the tilde
378 expansion stuff?).
c906108c
SS
379 */
380
381static int
048d532d 382solib_map_sections (struct so_list *so)
c906108c 383{
831a0c44 384 struct target_so_ops *ops = solib_ops (target_gdbarch);
c906108c 385 char *filename;
0542c86d 386 struct target_section *p;
c906108c
SS
387 struct cleanup *old_chain;
388 bfd *abfd;
c5aa993b
JM
389
390 filename = tilde_expand (so->so_name);
b8c9b27d 391 old_chain = make_cleanup (xfree, filename);
831a0c44 392 abfd = ops->bfd_open (filename);
f1838a98 393 do_cleanups (old_chain);
e4f7b8c8 394
048d532d
PA
395 if (abfd == NULL)
396 return 0;
397
13437d4b 398 /* Leave bfd open, core_xfer_memory and "info files" need it. */
3db741ef 399 so->abfd = gdb_bfd_ref (abfd);
23e04971 400
e4f7b8c8
MS
401 /* copy full path name into so_name, so that later symbol_file_add
402 can find it */
f1838a98
UW
403 if (strlen (bfd_get_filename (abfd)) >= SO_NAME_MAX_PATH_SIZE)
404 error (_("Shared library file name is too long."));
405 strcpy (so->so_name, bfd_get_filename (abfd));
23e04971 406
13437d4b 407 if (build_section_table (abfd, &so->sections, &so->sections_end))
23e04971 408 {
8a3fe4f8 409 error (_("Can't find the file sections in `%s': %s"),
13437d4b 410 bfd_get_filename (abfd), bfd_errmsg (bfd_get_error ()));
23e04971 411 }
104c1213 412
13437d4b 413 for (p = so->sections; p < so->sections_end; p++)
104c1213 414 {
13437d4b
KB
415 /* Relocate the section binding addresses as recorded in the shared
416 object's file by the base address to which the object was actually
417 mapped. */
66aba65d 418 ops->relocate_section_addresses (so, p);
cfa9d6d9
DJ
419
420 /* If the target didn't provide information about the address
421 range of the shared object, assume we want the location of
422 the .text section. */
423 if (so->addr_low == 0 && so->addr_high == 0
424 && strcmp (p->the_bfd_section->name, ".text") == 0)
13437d4b 425 {
cfa9d6d9
DJ
426 so->addr_low = p->addr;
427 so->addr_high = p->endaddr;
13437d4b 428 }
104c1213
JM
429 }
430
048d532d
PA
431 /* Add the shared object's sections to the current set of file
432 section tables. Do this immediately after mapping the object so
433 that later nodes in the list can query this object, as is needed
434 in solib-osf.c. */
435 add_target_sections (so->sections, so->sections_end);
436
437 return 1;
104c1213 438}
c906108c 439
a86988f2
PA
440/* Free symbol-file related contents of SO. If we have opened a BFD
441 for SO, close it. If we have placed SO's sections in some target's
442 section table, the caller is responsible for removing them.
443
444 This function doesn't mess with objfiles at all. If there is an
445 objfile associated with SO that needs to be removed, the caller is
446 responsible for taking care of that. */
447
448static void
449free_so_symbols (struct so_list *so)
450{
451 char *bfd_filename = 0;
452
453 if (so->sections)
454 {
455 xfree (so->sections);
456 so->sections = so->sections_end = NULL;
457 }
458
459 gdb_bfd_unref (so->abfd);
460 so->abfd = NULL;
461
462 /* Our caller closed the objfile, possibly via objfile_purge_solibs. */
463 so->symbols_loaded = 0;
464 so->objfile = NULL;
465
466 so->addr_low = so->addr_high = 0;
467
468 /* Restore the target-supplied file name. SO_NAME may be the path
469 of the symbol file. */
470 strcpy (so->so_name, so->so_original_name);
471}
472
07cd4b97 473/* LOCAL FUNCTION
c906108c 474
07cd4b97 475 free_so --- free a `struct so_list' object
c906108c 476
c5aa993b 477 SYNOPSIS
c906108c 478
07cd4b97 479 void free_so (struct so_list *so)
c906108c 480
c5aa993b 481 DESCRIPTION
c906108c 482
07cd4b97
JB
483 Free the storage associated with the `struct so_list' object SO.
484 If we have opened a BFD for SO, close it.
c906108c 485
07cd4b97
JB
486 The caller is responsible for removing SO from whatever list it is
487 a member of. If we have placed SO's sections in some target's
488 section table, the caller is responsible for removing them.
c906108c 489
07cd4b97
JB
490 This function doesn't mess with objfiles at all. If there is an
491 objfile associated with SO that needs to be removed, the caller is
492 responsible for taking care of that. */
493
13437d4b 494void
07cd4b97 495free_so (struct so_list *so)
c906108c 496{
1cf3db46 497 struct target_so_ops *ops = solib_ops (target_gdbarch);
c5aa993b 498
a86988f2 499 free_so_symbols (so);
66aba65d 500 ops->free_so (so);
07cd4b97 501
b8c9b27d 502 xfree (so);
c906108c
SS
503}
504
07cd4b97 505
f8766ec1
KB
506/* Return address of first so_list entry in master shared object list. */
507struct so_list *
508master_so_list (void)
509{
510 return so_list_head;
511}
512
7eedccfa
PP
513/* Read in symbols for shared object SO. If SYMFILE_VERBOSE is set in FLAGS,
514 be chatty about it. Return non-zero if any symbols were actually
42a6e6a0
MK
515 loaded. */
516
517int
7eedccfa 518solib_read_symbols (struct so_list *so, int flags)
42a6e6a0 519{
7eedccfa
PP
520 const int from_tty = flags & SYMFILE_VERBOSE;
521
42a6e6a0
MK
522 if (so->symbols_loaded)
523 {
a86988f2 524 /* If needed, we've already warned in our caller. */
42a6e6a0 525 }
8bb75286
DJ
526 else if (so->abfd == NULL)
527 {
048d532d
PA
528 /* We've already warned about this library, when trying to open
529 it. */
8bb75286 530 }
42a6e6a0
MK
531 else
532 {
048d532d
PA
533 volatile struct gdb_exception e;
534
535 TRY_CATCH (e, RETURN_MASK_ERROR)
536 {
537 struct section_addr_info *sap;
538
539 /* Have we already loaded this shared object? */
540 ALL_OBJFILES (so->objfile)
541 {
542 if (strcmp (so->objfile->name, so->so_name) == 0)
543 break;
544 }
545 if (so->objfile != NULL)
546 break;
547
548 sap = build_section_addr_info_from_section_table (so->sections,
549 so->sections_end);
550 so->objfile = symbol_file_add_from_bfd (so->abfd,
551 flags, sap, OBJF_SHARED);
552 free_section_addr_info (sap);
553 }
554
555 if (e.reason < 0)
556 {
557 if (from_tty)
558 exception_fprintf
559 (gdb_stderr, e,
560 _("Error while reading shared library symbols:\n"));
561 }
562 else
563 {
564 if (from_tty || info_verbose)
565 printf_unfiltered (_("Loaded symbols for %s\n"), so->so_name);
566 so->symbols_loaded = 1;
567 }
7eedccfa 568 return 1;
42a6e6a0
MK
569 }
570
571 return 0;
572}
c906108c 573
07cd4b97 574/* LOCAL FUNCTION
c906108c 575
105b175f 576 update_solib_list --- synchronize GDB's shared object list with inferior's
c906108c 577
c5aa993b 578 SYNOPSIS
c906108c 579
105b175f 580 void update_solib_list (int from_tty, struct target_ops *TARGET)
c906108c 581
07cd4b97 582 Extract the list of currently loaded shared objects from the
105b175f
JB
583 inferior, and compare it with the list of shared objects currently
584 in GDB's so_list_head list. Edit so_list_head to bring it in sync
585 with the inferior's new list.
c906108c 586
105b175f
JB
587 If we notice that the inferior has unloaded some shared objects,
588 free any symbolic info GDB had read about those shared objects.
589
590 Don't load symbolic info for any new shared objects; just add them
591 to the list, and leave their symbols_loaded flag clear.
07cd4b97
JB
592
593 If FROM_TTY is non-null, feel free to print messages about what
594 we're doing.
c906108c 595
07cd4b97
JB
596 If TARGET is non-null, add the sections of all new shared objects
597 to TARGET's section table. Note that this doesn't remove any
598 sections for shared objects that have been unloaded, and it
599 doesn't check to see if the new shared objects are already present in
600 the section table. But we only use this for core files and
601 processes we've just attached to, so that's okay. */
c906108c 602
a78f21af 603static void
105b175f 604update_solib_list (int from_tty, struct target_ops *target)
07cd4b97 605{
1cf3db46 606 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 607 struct so_list *inferior = ops->current_sos();
07cd4b97
JB
608 struct so_list *gdb, **gdb_link;
609
181e7f93
PA
610 /* We can reach here due to changing solib-search-path or the
611 sysroot, before having any inferior. */
50c71eaf 612 if (target_has_execution && !ptid_equal (inferior_ptid, null_ptid))
181e7f93
PA
613 {
614 struct inferior *inf = current_inferior ();
615
616 /* If we are attaching to a running process for which we
617 have not opened a symbol file, we may be able to get its
618 symbols now! */
619 if (inf->attach_flag && symfile_objfile == NULL)
620 catch_errors (ops->open_symbol_file_object, &from_tty,
621 "Error reading attached process's symbol file.\n",
622 RETURN_MASK_ALL);
623 }
104c1213 624
07cd4b97
JB
625 /* GDB and the inferior's dynamic linker each maintain their own
626 list of currently loaded shared objects; we want to bring the
627 former in sync with the latter. Scan both lists, seeing which
628 shared objects appear where. There are three cases:
629
630 - A shared object appears on both lists. This means that GDB
105b175f
JB
631 knows about it already, and it's still loaded in the inferior.
632 Nothing needs to happen.
07cd4b97
JB
633
634 - A shared object appears only on GDB's list. This means that
105b175f
JB
635 the inferior has unloaded it. We should remove the shared
636 object from GDB's tables.
07cd4b97
JB
637
638 - A shared object appears only on the inferior's list. This
105b175f
JB
639 means that it's just been loaded. We should add it to GDB's
640 tables.
07cd4b97
JB
641
642 So we walk GDB's list, checking each entry to see if it appears
643 in the inferior's list too. If it does, no action is needed, and
644 we remove it from the inferior's list. If it doesn't, the
645 inferior has unloaded it, and we remove it from GDB's list. By
646 the time we're done walking GDB's list, the inferior's list
647 contains only the new shared objects, which we then add. */
648
649 gdb = so_list_head;
650 gdb_link = &so_list_head;
651 while (gdb)
c906108c 652 {
07cd4b97
JB
653 struct so_list *i = inferior;
654 struct so_list **i_link = &inferior;
655
656 /* Check to see whether the shared object *gdb also appears in
657 the inferior's current list. */
658 while (i)
c906108c 659 {
a7c02bc8
VP
660 if (ops->same)
661 {
662 if (ops->same (gdb, i))
663 break;
664 }
665 else
666 {
667 if (! strcmp (gdb->so_original_name, i->so_original_name))
668 break;
669 }
07cd4b97
JB
670
671 i_link = &i->next;
672 i = *i_link;
c906108c 673 }
c5aa993b 674
07cd4b97
JB
675 /* If the shared object appears on the inferior's list too, then
676 it's still loaded, so we don't need to do anything. Delete
677 it from the inferior's list, and leave it on GDB's list. */
678 if (i)
c906108c 679 {
07cd4b97 680 *i_link = i->next;
07cd4b97
JB
681 free_so (i);
682 gdb_link = &gdb->next;
683 gdb = *gdb_link;
684 }
685
686 /* If it's not on the inferior's list, remove it from GDB's tables. */
687 else
688 {
42a6e6a0
MK
689 /* Notify any observer that the shared object has been
690 unloaded before we remove it from GDB's tables. */
84acb35a
JJ
691 observer_notify_solib_unloaded (gdb);
692
07cd4b97 693 *gdb_link = gdb->next;
07cd4b97
JB
694
695 /* Unless the user loaded it explicitly, free SO's objfile. */
e8930304 696 if (gdb->objfile && ! (gdb->objfile->flags & OBJF_USERLOADED))
07cd4b97
JB
697 free_objfile (gdb->objfile);
698
699 /* Some targets' section tables might be referring to
700 sections from so->abfd; remove them. */
701 remove_target_sections (gdb->abfd);
702
703 free_so (gdb);
704 gdb = *gdb_link;
c906108c
SS
705 }
706 }
c5aa993b 707
07cd4b97
JB
708 /* Now the inferior's list contains only shared objects that don't
709 appear in GDB's list --- those that are newly loaded. Add them
e8930304 710 to GDB's shared object list. */
07cd4b97 711 if (inferior)
c906108c 712 {
048d532d
PA
713 int not_found = 0;
714 const char *not_found_filename = NULL;
715
07cd4b97
JB
716 struct so_list *i;
717
718 /* Add the new shared objects to GDB's list. */
719 *gdb_link = inferior;
720
e8930304 721 /* Fill in the rest of each of the `struct so_list' nodes. */
07cd4b97 722 for (i = inferior; i; i = i->next)
c906108c 723 {
048d532d
PA
724 volatile struct gdb_exception e;
725
6c95b8df 726 i->pspace = current_program_space;
07cd4b97 727
048d532d
PA
728 TRY_CATCH (e, RETURN_MASK_ERROR)
729 {
730 /* Fill in the rest of the `struct so_list' node. */
731 if (!solib_map_sections (i))
732 {
733 not_found++;
734 if (not_found_filename == NULL)
735 not_found_filename = i->so_original_name;
736 }
737 }
07cd4b97 738
048d532d
PA
739 if (e.reason < 0)
740 exception_fprintf (gdb_stderr, e, _("\
741Error while mapping shared library sections:\n"));
42a6e6a0
MK
742
743 /* Notify any observer that the shared object has been
048d532d 744 loaded now that we've added it to GDB's tables. */
42a6e6a0 745 observer_notify_solib_loaded (i);
c906108c 746 }
048d532d
PA
747
748 /* If a library was not found, issue an appropriate warning
749 message. We have to use a single call to warning in case the
750 front end does something special with warnings, e.g., pop up
751 a dialog box. It Would Be Nice if we could get a "warning: "
752 prefix on each line in the CLI front end, though - it doesn't
753 stand out well. */
754
755 if (not_found == 1)
756 warning (_("\
757Could not load shared library symbols for %s.\n\
758Do you need \"set solib-search-path\" or \"set sysroot\"?"),
759 not_found_filename);
760 else if (not_found > 1)
761 warning (_("\
762Could not load shared library symbols for %d libraries, e.g. %s.\n\
763Use the \"info sharedlibrary\" command to see the complete listing.\n\
764Do you need \"set solib-search-path\" or \"set sysroot\"?"),
765 not_found, not_found_filename);
e8930304 766 }
105b175f
JB
767}
768
17a37d48
PP
769
770/* Return non-zero if NAME is the libpthread shared library.
6612ad7f
JB
771
772 Uses a fairly simplistic heuristic approach where we check
773 the file name against "/libpthread". This can lead to false
774 positives, but this should be good enough in practice. */
775
17a37d48
PP
776int
777libpthread_name_p (const char *name)
778{
779 return (strstr (name, "/libpthread") != NULL);
780}
781
782/* Return non-zero if SO is the libpthread shared library. */
783
6612ad7f
JB
784static int
785libpthread_solib_p (struct so_list *so)
786{
17a37d48 787 return libpthread_name_p (so->so_name);
6612ad7f 788}
105b175f
JB
789
790/* GLOBAL FUNCTION
791
792 solib_add -- read in symbol info for newly added shared libraries
793
794 SYNOPSIS
795
990f9fe3
FF
796 void solib_add (char *pattern, int from_tty, struct target_ops
797 *TARGET, int readsyms)
105b175f
JB
798
799 DESCRIPTION
800
801 Read in symbolic information for any shared objects whose names
802 match PATTERN. (If we've already read a shared object's symbol
803 info, leave it alone.) If PATTERN is zero, read them all.
804
990f9fe3
FF
805 If READSYMS is 0, defer reading symbolic information until later
806 but still do any needed low level processing.
807
105b175f
JB
808 FROM_TTY and TARGET are as described for update_solib_list, above. */
809
810void
990f9fe3 811solib_add (char *pattern, int from_tty, struct target_ops *target, int readsyms)
105b175f
JB
812{
813 struct so_list *gdb;
814
815 if (pattern)
816 {
817 char *re_err = re_comp (pattern);
818
819 if (re_err)
8a3fe4f8 820 error (_("Invalid regexp: %s"), re_err);
105b175f
JB
821 }
822
823 update_solib_list (from_tty, target);
c906108c 824
105b175f
JB
825 /* Walk the list of currently loaded shared libraries, and read
826 symbols for any that match the pattern --- or any whose symbols
827 aren't already loaded, if no pattern was given. */
e8930304
JB
828 {
829 int any_matches = 0;
830 int loaded_any_symbols = 0;
7eedccfa
PP
831 const int flags =
832 SYMFILE_DEFER_BP_RESET | (from_tty ? SYMFILE_VERBOSE : 0);
c906108c 833
e8930304
JB
834 for (gdb = so_list_head; gdb; gdb = gdb->next)
835 if (! pattern || re_exec (gdb->so_name))
836 {
6612ad7f
JB
837 /* Normally, we would read the symbols from that library
838 only if READSYMS is set. However, we're making a small
839 exception for the pthread library, because we sometimes
840 need the library symbols to be loaded in order to provide
841 thread support (x86-linux for instance). */
842 const int add_this_solib =
843 (readsyms || libpthread_solib_p (gdb));
844
e8930304 845 any_matches = 1;
a86988f2
PA
846 if (add_this_solib)
847 {
848 if (gdb->symbols_loaded)
849 {
850 /* If no pattern was given, be quiet for shared
851 libraries we have already loaded. */
852 if (pattern && (from_tty || info_verbose))
853 printf_unfiltered (_("Symbols already loaded for %s\n"),
854 gdb->so_name);
855 }
856 else if (solib_read_symbols (gdb, flags))
857 loaded_any_symbols = 1;
858 }
e8930304
JB
859 }
860
7eedccfa
PP
861 if (loaded_any_symbols)
862 breakpoint_re_set ();
863
e8930304
JB
864 if (from_tty && pattern && ! any_matches)
865 printf_unfiltered
866 ("No loaded shared libraries match the pattern `%s'.\n", pattern);
867
868 if (loaded_any_symbols)
869 {
1cf3db46 870 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 871
e8930304
JB
872 /* Getting new symbols may change our opinion about what is
873 frameless. */
874 reinit_frame_cache ();
875
66aba65d 876 ops->special_symbol_handling ();
e8930304
JB
877 }
878 }
c906108c
SS
879}
880
07cd4b97 881
c906108c
SS
882/*
883
c5aa993b 884 LOCAL FUNCTION
c906108c 885
c5aa993b 886 info_sharedlibrary_command -- code for "info sharedlibrary"
c906108c 887
c5aa993b 888 SYNOPSIS
c906108c 889
c5aa993b 890 static void info_sharedlibrary_command ()
c906108c 891
c5aa993b 892 DESCRIPTION
c906108c 893
c5aa993b 894 Walk through the shared library list and print information
55333a84
DE
895 about each attached library matching PATTERN. If PATTERN is elided,
896 print them all.
c5aa993b 897 */
c906108c
SS
898
899static void
55333a84 900info_sharedlibrary_command (char *pattern, int from_tty)
c906108c 901{
52f0bd74 902 struct so_list *so = NULL; /* link map state variable */
c906108c 903 int header_done = 0;
55333a84 904 int so_missing_debug_info = 0;
c906108c 905 int addr_width;
55333a84
DE
906 int nr_libs;
907 struct cleanup *table_cleanup;
908 struct gdbarch *gdbarch = target_gdbarch;
909
910 if (pattern)
911 {
912 char *re_err = re_comp (pattern);
913
914 if (re_err)
915 error (_("Invalid regexp: %s"), re_err);
916 }
c906108c 917
84eb3c4f 918 /* "0x", a little whitespace, and two hex digits per byte of pointers. */
55333a84 919 addr_width = 4 + (gdbarch_ptr_bit (gdbarch) / 4);
c906108c 920
105b175f 921 update_solib_list (from_tty, 0);
07cd4b97 922
55333a84
DE
923 /* make_cleanup_ui_out_table_begin_end needs to know the number of
924 rows, so we need to make two passes over the libs. */
925
926 for (nr_libs = 0, so = so_list_head; so; so = so->next)
c906108c 927 {
c5aa993b 928 if (so->so_name[0])
c906108c 929 {
55333a84
DE
930 if (pattern && ! re_exec (so->so_name))
931 continue;
932 ++nr_libs;
933 }
934 }
935
936 table_cleanup =
937 make_cleanup_ui_out_table_begin_end (uiout, 4, nr_libs,
938 "SharedLibraryTable");
939
940 /* The "- 1" is because ui_out adds one space between columns. */
941 ui_out_table_header (uiout, addr_width - 1, ui_left, "from", "From");
942 ui_out_table_header (uiout, addr_width - 1, ui_left, "to", "To");
943 ui_out_table_header (uiout, 12 - 1, ui_left, "syms-read", "Syms Read");
944 ui_out_table_header (uiout, 0, ui_noalign,
945 "name", "Shared Object Library");
946
947 ui_out_table_body (uiout);
948
949 for (so = so_list_head; so; so = so->next)
950 {
951 struct cleanup *lib_cleanup;
c906108c 952
55333a84
DE
953 if (! so->so_name[0])
954 continue;
955 if (pattern && ! re_exec (so->so_name))
956 continue;
957
958 lib_cleanup = make_cleanup_ui_out_tuple_begin_end (uiout, "lib");
959
960 if (so->addr_high != 0)
961 {
962 ui_out_field_core_addr (uiout, "from", gdbarch, so->addr_low);
963 ui_out_field_core_addr (uiout, "to", gdbarch, so->addr_high);
964 }
965 else
966 {
967 ui_out_field_skip (uiout, "from");
968 ui_out_field_skip (uiout, "to");
c906108c 969 }
55333a84
DE
970
971 if (! ui_out_is_mi_like_p (interp_ui_out (top_level_interpreter ()))
972 && so->symbols_loaded
e0ae4240 973 && !objfile_has_symbols (so->objfile))
55333a84
DE
974 {
975 so_missing_debug_info = 1;
976 ui_out_field_string (uiout, "syms-read", "Yes (*)");
977 }
978 else
979 ui_out_field_string (uiout, "syms-read",
980 so->symbols_loaded ? "Yes" : "No");
981
982 ui_out_field_string (uiout, "name", so->so_name);
983
984 ui_out_text (uiout, "\n");
985
986 do_cleanups (lib_cleanup);
c906108c 987 }
55333a84
DE
988
989 do_cleanups (table_cleanup);
990
991 if (nr_libs == 0)
992 {
993 if (pattern)
994 ui_out_message (uiout, 0,
995 _("No shared libraries matched.\n"));
996 else
997 ui_out_message (uiout, 0,
998 _("No shared libraries loaded at this time.\n"));
999 }
1000 else
c906108c 1001 {
55333a84
DE
1002 if (so_missing_debug_info)
1003 ui_out_message (uiout, 0,
1004 _("(*): Shared library is missing debugging information.\n"));
c906108c
SS
1005 }
1006}
1007
5fd1a349
PP
1008/* Return 1 if ADDRESS lies within SOLIB. */
1009
1010int
1011solib_contains_address_p (const struct so_list *const solib,
1012 CORE_ADDR address)
1013{
0542c86d 1014 struct target_section *p;
5fd1a349
PP
1015
1016 for (p = solib->sections; p < solib->sections_end; p++)
1017 if (p->addr <= address && address < p->endaddr)
1018 return 1;
1019
1020 return 0;
1021}
1022
c906108c
SS
1023/*
1024
c5aa993b 1025 GLOBAL FUNCTION
c906108c 1026
f5c9a895
PP
1027 solib_name_from_address -- if an address is in a shared lib, return
1028 its name.
c906108c 1029
c5aa993b 1030 SYNOPSIS
c906108c 1031
f5c9a895 1032 char * solib_name_from_address (CORE_ADDR address)
c906108c 1033
c5aa993b 1034 DESCRIPTION
c906108c 1035
c5aa993b
JM
1036 Provides a hook for other gdb routines to discover whether or
1037 not a particular address is within the mapped address space of
749499cb 1038 a shared library.
c906108c 1039
c5aa993b
JM
1040 For example, this routine is called at one point to disable
1041 breakpoints which are in shared libraries that are not currently
1042 mapped in.
c906108c
SS
1043 */
1044
1045char *
6c95b8df 1046solib_name_from_address (struct program_space *pspace, CORE_ADDR address)
c906108c 1047{
6c95b8df 1048 struct so_list *so = NULL;
c5aa993b 1049
6c95b8df 1050 for (so = pspace->so_list; so; so = so->next)
5fd1a349
PP
1051 if (solib_contains_address_p (so, address))
1052 return (so->so_name);
07cd4b97 1053
c906108c
SS
1054 return (0);
1055}
1056
de18c1d8
JM
1057/* Return whether the data starting at VADDR, size SIZE, must be kept
1058 in a core file for shared libraries loaded before "gcore" is used
1059 to be handled correctly when the core file is loaded. This only
1060 applies when the section would otherwise not be kept in the core
1061 file (in particular, for readonly sections). */
1062
1063int
1064solib_keep_data_in_core (CORE_ADDR vaddr, unsigned long size)
1065{
1066 struct target_so_ops *ops = solib_ops (target_gdbarch);
1067
1068 if (ops->keep_data_in_core)
1069 return ops->keep_data_in_core (vaddr, size);
1070 else
1071 return 0;
1072}
1073
c906108c
SS
1074/* Called by free_all_symtabs */
1075
c5aa993b 1076void
fba45db2 1077clear_solib (void)
c906108c 1078{
1cf3db46 1079 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 1080
085dd6e6
JM
1081 /* This function is expected to handle ELF shared libraries. It is
1082 also used on Solaris, which can run either ELF or a.out binaries
1083 (for compatibility with SunOS 4), both of which can use shared
1084 libraries. So we don't know whether we have an ELF executable or
1085 an a.out executable until the user chooses an executable file.
1086
1087 ELF shared libraries don't get mapped into the address space
1088 until after the program starts, so we'd better not try to insert
1089 breakpoints in them immediately. We have to wait until the
1090 dynamic linker has loaded them; we'll hit a bp_shlib_event
1091 breakpoint (look for calls to create_solib_event_breakpoint) when
1092 it's ready.
1093
1094 SunOS shared libraries seem to be different --- they're present
1095 as soon as the process begins execution, so there's no need to
1096 put off inserting breakpoints. There's also nowhere to put a
1097 bp_shlib_event breakpoint, so if we put it off, we'll never get
1098 around to it.
1099
1100 So: disable breakpoints only if we're using ELF shared libs. */
1101 if (exec_bfd != NULL
1102 && bfd_get_flavour (exec_bfd) != bfd_target_aout_flavour)
cb851954 1103 disable_breakpoints_in_shlibs ();
085dd6e6 1104
c906108c
SS
1105 while (so_list_head)
1106 {
07cd4b97
JB
1107 struct so_list *so = so_list_head;
1108 so_list_head = so->next;
c86cf029 1109 observer_notify_solib_unloaded (so);
2069d78d
KB
1110 if (so->abfd)
1111 remove_target_sections (so->abfd);
07cd4b97 1112 free_so (so);
c906108c 1113 }
07cd4b97 1114
66aba65d 1115 ops->clear_solib ();
c906108c
SS
1116}
1117
13437d4b 1118/* GLOBAL FUNCTION
c5aa993b
JM
1119
1120 solib_create_inferior_hook -- shared library startup support
1121
1122 SYNOPSIS
1123
268a4a75 1124 void solib_create_inferior_hook (int from_tty)
c5aa993b
JM
1125
1126 DESCRIPTION
1127
1128 When gdb starts up the inferior, it nurses it along (through the
1129 shell) until it is ready to execute it's first instruction. At this
1130 point, this function gets called via expansion of the macro
13437d4b 1131 SOLIB_CREATE_INFERIOR_HOOK. */
c5aa993b
JM
1132
1133void
268a4a75 1134solib_create_inferior_hook (int from_tty)
c906108c 1135{
1cf3db46 1136 struct target_so_ops *ops = solib_ops (target_gdbarch);
268a4a75 1137 ops->solib_create_inferior_hook (from_tty);
c906108c
SS
1138}
1139
d7fa2ae2
KB
1140/* GLOBAL FUNCTION
1141
1142 in_solib_dynsym_resolve_code -- check to see if an address is in
1143 dynamic loader's dynamic symbol
1144 resolution code
1145
1146 SYNOPSIS
1147
1148 int in_solib_dynsym_resolve_code (CORE_ADDR pc)
1149
1150 DESCRIPTION
1151
1152 Determine if PC is in the dynamic linker's symbol resolution
1153 code. Return 1 if so, 0 otherwise.
1154*/
1155
1156int
1157in_solib_dynsym_resolve_code (CORE_ADDR pc)
1158{
1cf3db46 1159 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 1160 return ops->in_dynsym_resolve_code (pc);
d7fa2ae2 1161}
c906108c
SS
1162
1163/*
1164
c5aa993b 1165 LOCAL FUNCTION
c906108c 1166
c5aa993b 1167 sharedlibrary_command -- handle command to explicitly add library
c906108c 1168
c5aa993b 1169 SYNOPSIS
c906108c 1170
c5aa993b 1171 static void sharedlibrary_command (char *args, int from_tty)
c906108c 1172
c5aa993b 1173 DESCRIPTION
c906108c 1174
c5aa993b 1175 */
c906108c
SS
1176
1177static void
fba45db2 1178sharedlibrary_command (char *args, int from_tty)
c906108c
SS
1179{
1180 dont_repeat ();
990f9fe3 1181 solib_add (args, from_tty, (struct target_ops *) 0, 1);
c906108c
SS
1182}
1183
cb0ba49e
MS
1184/* LOCAL FUNCTION
1185
1186 no_shared_libraries -- handle command to explicitly discard symbols
1187 from shared libraries.
1188
1189 DESCRIPTION
1190
1191 Implements the command "nosharedlibrary", which discards symbols
1192 that have been auto-loaded from shared libraries. Symbols from
1193 shared libraries that were added by explicit request of the user
1194 are not discarded. Also called from remote.c. */
1195
c60a7562
MS
1196void
1197no_shared_libraries (char *ignored, int from_tty)
1198{
a3247a22
PP
1199 /* The order of the two routines below is important: clear_solib notifies
1200 the solib_unloaded observers, and some of these observers might need
1201 access to their associated objfiles. Therefore, we can not purge the
1202 solibs' objfiles before clear_solib has been called. */
1203
615b9dba 1204 clear_solib ();
a3247a22 1205 objfile_purge_solibs ();
c60a7562 1206}
c906108c 1207
a86988f2
PA
1208/* Reload shared libraries, but avoid reloading the same symbol file
1209 we already have loaded. */
1210
1211static void
1212reload_shared_libraries_1 (int from_tty)
1213{
1214 struct so_list *so;
1215 struct cleanup *old_chain = make_cleanup (null_cleanup, NULL);
1216
1217 for (so = so_list_head; so != NULL; so = so->next)
1218 {
1219 char *filename, *found_pathname = NULL;
1220 bfd *abfd;
1221 int scratch_chan;
1222 int was_loaded = so->symbols_loaded;
1223 const int flags =
1224 SYMFILE_DEFER_BP_RESET | (from_tty ? SYMFILE_VERBOSE : 0);
1225
1226 filename = tilde_expand (so->so_original_name);
1227 abfd = solib_bfd_open (filename);
1228 if (abfd != NULL)
1229 {
1230 found_pathname = xstrdup (bfd_get_filename (abfd));
1231 make_cleanup (xfree, found_pathname);
1232 gdb_bfd_close_or_warn (abfd);
1233 }
1234
1235 /* If this shared library is no longer associated with its previous
1236 symbol file, close that. */
1237 if ((found_pathname == NULL && was_loaded)
1238 || (found_pathname != NULL
1239 && strcmp (found_pathname, so->so_name) != 0))
1240 {
1241 if (so->objfile && ! (so->objfile->flags & OBJF_USERLOADED))
1242 free_objfile (so->objfile);
1243 remove_target_sections (so->abfd);
1244 free_so_symbols (so);
1245 }
1246
1247 /* If this shared library is now associated with a new symbol
1248 file, open it. */
1249 if (found_pathname != NULL
1250 && (!was_loaded
1251 || strcmp (found_pathname, so->so_name) != 0))
1252 {
1253 volatile struct gdb_exception e;
1254
1255 TRY_CATCH (e, RETURN_MASK_ERROR)
1256 solib_map_sections (so);
1257
1258 if (e.reason < 0)
1259 exception_fprintf (gdb_stderr, e, _("\
1260Error while mapping shared library sections:\n"));
1261 else if (auto_solib_add || was_loaded || libpthread_solib_p (so))
1262 solib_read_symbols (so, flags);
1263 }
1264 }
1265
1266 do_cleanups (old_chain);
1267}
1268
cf466558 1269static void
f397e303
AC
1270reload_shared_libraries (char *ignored, int from_tty,
1271 struct cmd_list_element *e)
cf466558 1272{
a86988f2
PA
1273 struct target_so_ops *ops;
1274
1275 reload_shared_libraries_1 (from_tty);
1276
1277 ops = solib_ops (target_gdbarch);
1278
c8fa6cdd
VP
1279 /* Creating inferior hooks here has two purposes. First, if we reload
1280 shared libraries then the address of solib breakpoint we've computed
1281 previously might be no longer valid. For example, if we forgot to set
1282 solib-absolute-prefix and are setting it right now, then the previous
1283 breakpoint address is plain wrong. Second, installing solib hooks
1284 also implicitly figures were ld.so is and loads symbols for it.
1285 Absent this call, if we've just connected to a target and set
1286 solib-absolute-prefix or solib-search-path, we'll lose all information
1287 about ld.so. */
1288 if (target_has_execution)
1289 {
a86988f2
PA
1290 /* Reset or free private data structures not associated with
1291 so_list entries. */
1292 ops->clear_solib ();
1293
1294 /* Remove any previous solib event breakpoint. This is usually
1295 done in common code, at breakpoint_init_inferior time, but
1296 we're not really starting up the inferior here. */
1297 remove_solib_event_breakpoints ();
1298
c8fa6cdd
VP
1299#ifdef SOLIB_CREATE_INFERIOR_HOOK
1300 SOLIB_CREATE_INFERIOR_HOOK (PIDGET (inferior_ptid));
1301#else
268a4a75 1302 solib_create_inferior_hook (from_tty);
c8fa6cdd
VP
1303#endif
1304 }
268a4a75
JK
1305
1306 /* Sometimes the platform-specific hook loads initial shared
1307 libraries, and sometimes it doesn't. If it doesn't FROM_TTY will be
1308 incorrectly 0 but such solib targets should be fixed anyway. If we
1309 made all the inferior hook methods consistent, this call could be
1310 removed. Call it only after the solib target has been initialized by
1311 solib_create_inferior_hook. */
1312
1313 solib_add (NULL, 0, NULL, auto_solib_add);
1314
a86988f2
PA
1315 breakpoint_re_set ();
1316
1317 /* We may have loaded or unloaded debug info for some (or all)
1318 shared libraries. However, frames may still reference them. For
1319 example, a frame's unwinder might still point at DWARF FDE
1320 structures that are now freed. Also, getting new symbols may
1321 change our opinion about what is frameless. */
c8fa6cdd 1322 reinit_frame_cache ();
a86988f2
PA
1323
1324 ops->special_symbol_handling ();
cf466558
KB
1325}
1326
920d2a44
AC
1327static void
1328show_auto_solib_add (struct ui_file *file, int from_tty,
1329 struct cmd_list_element *c, const char *value)
1330{
1331 fprintf_filtered (file, _("Autoloading of shared library symbols is %s.\n"),
1332 value);
1333}
1334
1335
3a40aaa0
UW
1336/* Handler for library-specific lookup of global symbol NAME in OBJFILE. Call
1337 the library-specific handler if it is installed for the current target. */
1338
1339struct symbol *
1340solib_global_lookup (const struct objfile *objfile,
1341 const char *name,
21b556f4 1342 const domain_enum domain)
3a40aaa0 1343{
1cf3db46 1344 struct target_so_ops *ops = solib_ops (target_gdbarch);
3a40aaa0 1345
e8a92f7b 1346 if (ops->lookup_lib_global_symbol != NULL)
94af9270 1347 return ops->lookup_lib_global_symbol (objfile, name, domain);
3a40aaa0
UW
1348 return NULL;
1349}
1350
1351
a78f21af
AC
1352extern initialize_file_ftype _initialize_solib; /* -Wmissing-prototypes */
1353
c906108c 1354void
fba45db2 1355_initialize_solib (void)
c906108c 1356{
fa58ee11
EZ
1357 struct cmd_list_element *c;
1358
66aba65d
MK
1359 solib_data = gdbarch_data_register_pre_init (solib_init);
1360
c906108c 1361 add_com ("sharedlibrary", class_files, sharedlibrary_command,
1bedd215 1362 _("Load shared object library symbols for files matching REGEXP."));
c5aa993b 1363 add_info ("sharedlibrary", info_sharedlibrary_command,
1bedd215 1364 _("Status of loaded shared object libraries."));
c60a7562 1365 add_com ("nosharedlibrary", class_files, no_shared_libraries,
1bedd215 1366 _("Unload all shared object library symbols."));
c906108c 1367
5bf193a2
AC
1368 add_setshow_boolean_cmd ("auto-solib-add", class_support,
1369 &auto_solib_add, _("\
1370Set autoloading of shared library symbols."), _("\
1371Show autoloading of shared library symbols."), _("\
b7209cb4
FF
1372If \"on\", symbols from all shared object libraries will be loaded\n\
1373automatically when the inferior begins execution, when the dynamic linker\n\
1374informs gdb that a new library has been loaded, or when attaching to the\n\
5bf193a2
AC
1375inferior. Otherwise, symbols must be loaded manually, using `sharedlibrary'."),
1376 NULL,
920d2a44 1377 show_auto_solib_add,
5bf193a2 1378 &setlist, &showlist);
c906108c 1379
f822c95b
DJ
1380 add_setshow_filename_cmd ("sysroot", class_support,
1381 &gdb_sysroot, _("\
1382Set an alternate system root."), _("\
1383Show the current system root."), _("\
1384The system root is used to load absolute shared library symbol files.\n\
1385For other (relative) files, you can add directories using\n\
1386`set solib-search-path'."),
f397e303
AC
1387 reload_shared_libraries,
1388 NULL,
1389 &setlist, &showlist);
c906108c 1390
f822c95b
DJ
1391 add_alias_cmd ("solib-absolute-prefix", "sysroot", class_support, 0,
1392 &setlist);
1393 add_alias_cmd ("solib-absolute-prefix", "sysroot", class_support, 0,
1394 &showlist);
030292b7 1395
525226b5
AC
1396 add_setshow_optional_filename_cmd ("solib-search-path", class_support,
1397 &solib_search_path, _("\
1398Set the search path for loading non-absolute shared library symbol files."), _("\
1399Show the search path for loading non-absolute shared library symbol files."), _("\
1400This takes precedence over the environment variables PATH and LD_LIBRARY_PATH."),
1401 reload_shared_libraries,
920d2a44 1402 show_solib_search_path,
525226b5 1403 &setlist, &showlist);
c906108c 1404}
This page took 1.073772 seconds and 4 git commands to generate.