* gdb.texinfo (GDB/MI Variable Objects): Document child definition
[deliverable/binutils-gdb.git] / gdb / solib.c
CommitLineData
13437d4b 1/* Handle shared libraries for GDB, the GNU Debugger.
14a5e767 2
6aba47ca 3 Copyright (C) 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999,
0fb0cc75 4 2000, 2001, 2002, 2003, 2005, 2006, 2007, 2008, 2009
9b254dd1 5 Free Software Foundation, Inc.
c906108c 6
c5aa993b 7 This file is part of GDB.
c906108c 8
c5aa993b
JM
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
a9762ec7 11 the Free Software Foundation; either version 3 of the License, or
c5aa993b 12 (at your option) any later version.
c906108c 13
c5aa993b
JM
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License
a9762ec7 20 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c 21
c906108c
SS
22#include "defs.h"
23
c906108c 24#include <sys/types.h>
c906108c 25#include <fcntl.h>
13437d4b 26#include "gdb_string.h"
c906108c
SS
27#include "symtab.h"
28#include "bfd.h"
29#include "symfile.h"
30#include "objfiles.h"
60250e8b 31#include "exceptions.h"
c906108c
SS
32#include "gdbcore.h"
33#include "command.h"
34#include "target.h"
35#include "frame.h"
88987551 36#include "gdb_regex.h"
c906108c
SS
37#include "inferior.h"
38#include "environ.h"
39#include "language.h"
40#include "gdbcmd.h"
fa58ee11 41#include "completer.h"
fe4e3eb8 42#include "filenames.h" /* for DOSish file names */
4646aa9d 43#include "exec.h"
13437d4b 44#include "solist.h"
84acb35a 45#include "observer.h"
dbda9972 46#include "readline/readline.h"
f1838a98 47#include "remote.h"
2c0b251b 48#include "solib.h"
c906108c 49
66aba65d
MK
50/* Architecture-specific operations. */
51
52/* Per-architecture data key. */
53static struct gdbarch_data *solib_data;
54
55static void *
56solib_init (struct obstack *obstack)
57{
58 struct target_so_ops **ops;
59
60 ops = OBSTACK_ZALLOC (obstack, struct target_so_ops *);
61 *ops = current_target_so_ops;
62 return ops;
63}
64
65static struct target_so_ops *
66solib_ops (struct gdbarch *gdbarch)
67{
68 struct target_so_ops **ops = gdbarch_data (gdbarch, solib_data);
69 return *ops;
70}
7d522c90
DJ
71
72/* Set the solib operations for GDBARCH to NEW_OPS. */
73
74void
75set_solib_ops (struct gdbarch *gdbarch, struct target_so_ops *new_ops)
76{
77 struct target_so_ops **ops = gdbarch_data (gdbarch, solib_data);
78 *ops = new_ops;
79}
66aba65d
MK
80\f
81
13437d4b 82/* external data declarations */
c906108c 83
7d522c90
DJ
84/* FIXME: gdbarch needs to control this variable, or else every
85 configuration needs to call set_solib_ops. */
13437d4b 86struct target_so_ops *current_target_so_ops;
23e04971
MS
87
88/* local data declarations */
07cd4b97 89
c906108c 90static struct so_list *so_list_head; /* List of known shared objects */
23e04971 91
c906108c
SS
92/* Local function prototypes */
93
c906108c
SS
94/* If non-empty, this is a search path for loading non-absolute shared library
95 symbol files. This takes precedence over the environment variables PATH
96 and LD_LIBRARY_PATH. */
97static char *solib_search_path = NULL;
920d2a44
AC
98static void
99show_solib_search_path (struct ui_file *file, int from_tty,
100 struct cmd_list_element *c, const char *value)
101{
102 fprintf_filtered (file, _("\
103The search path for loading non-absolute shared library symbol files is %s.\n"),
104 value);
105}
c906108c 106
e4f7b8c8
MS
107/*
108
109 GLOBAL FUNCTION
110
572d275c 111 solib_find -- Find a shared library file.
e4f7b8c8
MS
112
113 SYNOPSIS
114
572d275c 115 char *solib_find (char *in_pathname, int *fd);
e4f7b8c8
MS
116
117 DESCRIPTION
118
f822c95b 119 Global variable GDB_SYSROOT is used as a prefix directory
e4f7b8c8
MS
120 to search for shared libraries if they have an absolute path.
121
122 Global variable SOLIB_SEARCH_PATH is used as a prefix directory
123 (or set of directories, as in LD_LIBRARY_PATH) to search for all
f822c95b 124 shared libraries if not found in GDB_SYSROOT.
e4f7b8c8 125
c8c18e65 126 Search algorithm:
f822c95b
DJ
127 * If there is a gdb_sysroot and path is absolute:
128 * Search for gdb_sysroot/path.
c8c18e65
KW
129 * else
130 * Look for it literally (unmodified).
e4f7b8c8 131 * Look in SOLIB_SEARCH_PATH.
f43caff8 132 * If available, use target defined search function.
f822c95b 133 * If gdb_sysroot is NOT set, perform the following two searches:
c8c18e65
KW
134 * Look in inferior's $PATH.
135 * Look in inferior's $LD_LIBRARY_PATH.
136 *
137 * The last check avoids doing this search when targetting remote
f822c95b 138 * machines since gdb_sysroot will almost always be set.
e4f7b8c8
MS
139
140 RETURNS
b21f0843 141
572d275c
UW
142 Full pathname of the shared library file, or NULL if not found.
143 (The pathname is malloc'ed; it needs to be freed by the caller.)
144 *FD is set to either -1 or an open file handle for the library. */
e4f7b8c8 145
572d275c
UW
146char *
147solib_find (char *in_pathname, int *fd)
e4f7b8c8 148{
1cf3db46 149 struct target_so_ops *ops = solib_ops (target_gdbarch);
e4f7b8c8
MS
150 int found_file = -1;
151 char *temp_pathname = NULL;
f822c95b 152 int gdb_sysroot_is_empty;
58dc52c3 153
f822c95b 154 gdb_sysroot_is_empty = (gdb_sysroot == NULL || *gdb_sysroot == 0);
e4f7b8c8 155
f822c95b 156 if (! IS_ABSOLUTE_PATH (in_pathname) || gdb_sysroot_is_empty)
f1d10cfb
AS
157 temp_pathname = in_pathname;
158 else
e4f7b8c8 159 {
f822c95b 160 int prefix_len = strlen (gdb_sysroot);
f1d10cfb
AS
161
162 /* Remove trailing slashes from absolute prefix. */
163 while (prefix_len > 0
f822c95b 164 && IS_DIR_SEPARATOR (gdb_sysroot[prefix_len - 1]))
f1d10cfb
AS
165 prefix_len--;
166
167 /* Cat the prefixed pathname together. */
168 temp_pathname = alloca (prefix_len + strlen (in_pathname) + 1);
f822c95b 169 strncpy (temp_pathname, gdb_sysroot, prefix_len);
f1d10cfb
AS
170 temp_pathname[prefix_len] = '\0';
171 strcat (temp_pathname, in_pathname);
e4f7b8c8
MS
172 }
173
f1838a98
UW
174 /* Handle remote files. */
175 if (remote_filename_p (temp_pathname))
176 {
572d275c
UW
177 *fd = -1;
178 return xstrdup (temp_pathname);
f1838a98
UW
179 }
180
f1d10cfb
AS
181 /* Now see if we can open it. */
182 found_file = open (temp_pathname, O_RDONLY | O_BINARY, 0);
183
0997b535
MS
184 /* We try to find the library in various ways. After each attempt
185 (except for the one above), either found_file >= 0 and
186 temp_pathname is a malloc'd string, or found_file < 0 and
187 temp_pathname does not point to storage that needs to be
188 freed. */
189
190 if (found_file < 0)
191 temp_pathname = NULL;
192 else
193 temp_pathname = xstrdup (temp_pathname);
194
f822c95b 195 /* If the search in gdb_sysroot failed, and the path name is
ba5f0d88
OF
196 absolute at this point, make it relative. (openp will try and open the
197 file according to its absolute path otherwise, which is not what we want.)
198 Affects subsequent searches for this solib. */
199 if (found_file < 0 && IS_ABSOLUTE_PATH (in_pathname))
200 {
201 /* First, get rid of any drive letters etc. */
202 while (!IS_DIR_SEPARATOR (*in_pathname))
203 in_pathname++;
204
205 /* Next, get rid of all leading dir separators. */
206 while (IS_DIR_SEPARATOR (*in_pathname))
207 in_pathname++;
208 }
209
c8c18e65 210 /* If not found, search the solib_search_path (if any). */
e4f7b8c8 211 if (found_file < 0 && solib_search_path != NULL)
014d698b 212 found_file = openp (solib_search_path, OPF_TRY_CWD_FIRST,
fbdebf46 213 in_pathname, O_RDONLY | O_BINARY, &temp_pathname);
ba5f0d88
OF
214
215 /* If not found, next search the solib_search_path (if any) for the basename
216 only (ignoring the path). This is to allow reading solibs from a path
217 that differs from the opened path. */
218 if (found_file < 0 && solib_search_path != NULL)
014d698b 219 found_file = openp (solib_search_path, OPF_TRY_CWD_FIRST,
fbdebf46 220 lbasename (in_pathname), O_RDONLY | O_BINARY,
ba5f0d88 221 &temp_pathname);
e4f7b8c8 222
2610b0bf 223 /* If not found, try to use target supplied solib search method */
66aba65d 224 if (found_file < 0 && ops->find_and_open_solib)
637d6690 225 found_file = ops->find_and_open_solib (in_pathname, O_RDONLY | O_BINARY,
66aba65d 226 &temp_pathname);
2610b0bf 227
e4f7b8c8 228 /* If not found, next search the inferior's $PATH environment variable. */
f822c95b 229 if (found_file < 0 && gdb_sysroot_is_empty)
e4f7b8c8 230 found_file = openp (get_in_environ (inferior_environ, "PATH"),
fbdebf46 231 OPF_TRY_CWD_FIRST, in_pathname, O_RDONLY | O_BINARY,
014d698b 232 &temp_pathname);
e4f7b8c8
MS
233
234 /* If not found, next search the inferior's $LD_LIBRARY_PATH
235 environment variable. */
f822c95b 236 if (found_file < 0 && gdb_sysroot_is_empty)
e4f7b8c8 237 found_file = openp (get_in_environ (inferior_environ, "LD_LIBRARY_PATH"),
fbdebf46 238 OPF_TRY_CWD_FIRST, in_pathname, O_RDONLY | O_BINARY,
014d698b 239 &temp_pathname);
e4f7b8c8 240
572d275c
UW
241 *fd = found_file;
242 return temp_pathname;
243}
244
245/* Open and return a BFD for the shared library PATHNAME. If FD is not -1,
246 it is used as file handle to open the file. Throws an error if the file
247 could not be opened. Handles both local and remote file access.
248
249 PATHNAME must be malloc'ed by the caller. If successful, the new BFD's
250 name will point to it. If unsuccessful, PATHNAME will be freed and the
251 FD will be closed (unless FD was -1). */
252
253bfd *
254solib_bfd_fopen (char *pathname, int fd)
255{
256 bfd *abfd;
257
258 if (remote_filename_p (pathname))
259 {
260 gdb_assert (fd == -1);
261 abfd = remote_bfd_open (pathname, gnutarget);
262 }
263 else
264 {
265 abfd = bfd_fopen (pathname, gnutarget, FOPEN_RB, fd);
266
267 if (abfd)
268 bfd_set_cacheable (abfd, 1);
269 else if (fd != -1)
270 close (fd);
271 }
f1838a98 272
f1838a98
UW
273 if (!abfd)
274 {
572d275c 275 make_cleanup (xfree, pathname);
f1838a98 276 error (_("Could not open `%s' as an executable file: %s"),
572d275c 277 pathname, bfd_errmsg (bfd_get_error ()));
f1838a98
UW
278 }
279
572d275c
UW
280 return abfd;
281}
282
283/* Find shared library PATHNAME and open a BFD for it. */
284
285bfd *
286solib_bfd_open (char *pathname)
287{
288 struct target_so_ops *ops = solib_ops (target_gdbarch);
289 char *found_pathname;
290 int found_file;
291 bfd *abfd;
292
293 /* Use target-specific override if present. */
294 if (ops->bfd_open)
295 return ops->bfd_open (pathname);
296
297 /* Search for shared library file. */
298 found_pathname = solib_find (pathname, &found_file);
299 if (found_pathname == NULL)
300 perror_with_name (pathname);
301
302 /* Open bfd for shared library. */
303 abfd = solib_bfd_fopen (found_pathname, found_file);
304
305 /* Check bfd format. */
f1838a98 306 if (!bfd_check_format (abfd, bfd_object))
0997b535 307 {
f1838a98 308 bfd_close (abfd);
572d275c 309 make_cleanup (xfree, found_pathname);
f1838a98 310 error (_("`%s': not in executable format: %s"),
572d275c 311 found_pathname, bfd_errmsg (bfd_get_error ()));
0997b535 312 }
f1838a98 313
f1838a98 314 return abfd;
e4f7b8c8
MS
315}
316
317
c906108c
SS
318/*
319
c5aa993b 320 LOCAL FUNCTION
c906108c 321
c5aa993b 322 solib_map_sections -- open bfd and build sections for shared lib
c906108c 323
c5aa993b 324 SYNOPSIS
c906108c 325
c5aa993b 326 static int solib_map_sections (struct so_list *so)
c906108c 327
c5aa993b 328 DESCRIPTION
c906108c 329
c5aa993b
JM
330 Given a pointer to one of the shared objects in our list
331 of mapped objects, use the recorded name to open a bfd
332 descriptor for the object, build a section table, and then
333 relocate all the section addresses by the base address at
334 which the shared object was mapped.
c906108c 335
c5aa993b 336 FIXMES
c906108c 337
c5aa993b
JM
338 In most (all?) cases the shared object file name recorded in the
339 dynamic linkage tables will be a fully qualified pathname. For
340 cases where it isn't, do we really mimic the systems search
341 mechanism correctly in the below code (particularly the tilde
342 expansion stuff?).
c906108c
SS
343 */
344
345static int
4efb68b1 346solib_map_sections (void *arg)
c906108c
SS
347{
348 struct so_list *so = (struct so_list *) arg; /* catch_errors bogon */
349 char *filename;
0542c86d 350 struct target_section *p;
c906108c
SS
351 struct cleanup *old_chain;
352 bfd *abfd;
c5aa993b
JM
353
354 filename = tilde_expand (so->so_name);
b8c9b27d 355 old_chain = make_cleanup (xfree, filename);
f1838a98
UW
356 abfd = solib_bfd_open (filename);
357 do_cleanups (old_chain);
e4f7b8c8 358
13437d4b
KB
359 /* Leave bfd open, core_xfer_memory and "info files" need it. */
360 so->abfd = abfd;
23e04971 361
e4f7b8c8
MS
362 /* copy full path name into so_name, so that later symbol_file_add
363 can find it */
f1838a98
UW
364 if (strlen (bfd_get_filename (abfd)) >= SO_NAME_MAX_PATH_SIZE)
365 error (_("Shared library file name is too long."));
366 strcpy (so->so_name, bfd_get_filename (abfd));
23e04971 367
13437d4b 368 if (build_section_table (abfd, &so->sections, &so->sections_end))
23e04971 369 {
8a3fe4f8 370 error (_("Can't find the file sections in `%s': %s"),
13437d4b 371 bfd_get_filename (abfd), bfd_errmsg (bfd_get_error ()));
23e04971 372 }
104c1213 373
13437d4b 374 for (p = so->sections; p < so->sections_end; p++)
104c1213 375 {
1cf3db46 376 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 377
13437d4b
KB
378 /* Relocate the section binding addresses as recorded in the shared
379 object's file by the base address to which the object was actually
380 mapped. */
66aba65d 381 ops->relocate_section_addresses (so, p);
cfa9d6d9
DJ
382
383 /* If the target didn't provide information about the address
384 range of the shared object, assume we want the location of
385 the .text section. */
386 if (so->addr_low == 0 && so->addr_high == 0
387 && strcmp (p->the_bfd_section->name, ".text") == 0)
13437d4b 388 {
cfa9d6d9
DJ
389 so->addr_low = p->addr;
390 so->addr_high = p->endaddr;
13437d4b 391 }
104c1213
JM
392 }
393
13437d4b 394 return (1);
104c1213 395}
c906108c 396
07cd4b97 397/* LOCAL FUNCTION
c906108c 398
07cd4b97 399 free_so --- free a `struct so_list' object
c906108c 400
c5aa993b 401 SYNOPSIS
c906108c 402
07cd4b97 403 void free_so (struct so_list *so)
c906108c 404
c5aa993b 405 DESCRIPTION
c906108c 406
07cd4b97
JB
407 Free the storage associated with the `struct so_list' object SO.
408 If we have opened a BFD for SO, close it.
c906108c 409
07cd4b97
JB
410 The caller is responsible for removing SO from whatever list it is
411 a member of. If we have placed SO's sections in some target's
412 section table, the caller is responsible for removing them.
c906108c 413
07cd4b97
JB
414 This function doesn't mess with objfiles at all. If there is an
415 objfile associated with SO that needs to be removed, the caller is
416 responsible for taking care of that. */
417
13437d4b 418void
07cd4b97 419free_so (struct so_list *so)
c906108c 420{
1cf3db46 421 struct target_so_ops *ops = solib_ops (target_gdbarch);
07cd4b97 422 char *bfd_filename = 0;
c5aa993b 423
07cd4b97 424 if (so->sections)
b8c9b27d 425 xfree (so->sections);
07cd4b97
JB
426
427 if (so->abfd)
c906108c 428 {
07cd4b97
JB
429 bfd_filename = bfd_get_filename (so->abfd);
430 if (! bfd_close (so->abfd))
8a3fe4f8 431 warning (_("cannot close \"%s\": %s"),
07cd4b97 432 bfd_filename, bfd_errmsg (bfd_get_error ()));
c906108c 433 }
07cd4b97
JB
434
435 if (bfd_filename)
b8c9b27d 436 xfree (bfd_filename);
07cd4b97 437
66aba65d 438 ops->free_so (so);
07cd4b97 439
b8c9b27d 440 xfree (so);
c906108c
SS
441}
442
07cd4b97 443
f8766ec1
KB
444/* Return address of first so_list entry in master shared object list. */
445struct so_list *
446master_so_list (void)
447{
448 return so_list_head;
449}
450
7eedccfa
PP
451static void
452symbol_add_stub (struct so_list *so, int flags)
c906108c 453{
62557bbc 454 struct section_addr_info *sap;
c906108c 455
07cd4b97
JB
456 /* Have we already loaded this shared object? */
457 ALL_OBJFILES (so->objfile)
458 {
459 if (strcmp (so->objfile->name, so->so_name) == 0)
7eedccfa 460 return;
07cd4b97
JB
461 }
462
62557bbc
KB
463 sap = build_section_addr_info_from_section_table (so->sections,
464 so->sections_end);
e7cf9df1 465
7eedccfa
PP
466 so->objfile = symbol_file_add_from_bfd (so->abfd, flags,
467 sap, OBJF_SHARED | OBJF_KEEPBFD);
62557bbc 468 free_section_addr_info (sap);
c906108c 469
7eedccfa 470 return;
c906108c
SS
471}
472
7eedccfa
PP
473/* Read in symbols for shared object SO. If SYMFILE_VERBOSE is set in FLAGS,
474 be chatty about it. Return non-zero if any symbols were actually
42a6e6a0
MK
475 loaded. */
476
477int
7eedccfa 478solib_read_symbols (struct so_list *so, int flags)
42a6e6a0 479{
7eedccfa
PP
480 const int from_tty = flags & SYMFILE_VERBOSE;
481
42a6e6a0
MK
482 if (so->symbols_loaded)
483 {
484 if (from_tty)
a3f17187 485 printf_unfiltered (_("Symbols already loaded for %s\n"), so->so_name);
42a6e6a0 486 }
8bb75286
DJ
487 else if (so->abfd == NULL)
488 {
489 if (from_tty)
490 printf_unfiltered (_("Symbol file not found for %s\n"), so->so_name);
491 }
42a6e6a0
MK
492 else
493 {
7eedccfa
PP
494 volatile struct gdb_exception exception;
495 TRY_CATCH (exception, RETURN_MASK_ALL)
496 {
497 symbol_add_stub (so, flags);
498 }
499 if (exception.reason != 0)
500 {
501 exception_fprintf (gdb_stderr, exception,
502 "Error while reading shared library symbols:\n");
503 return 0;
504 }
505 if (from_tty && print_symbol_loading)
506 printf_unfiltered (_("Loaded symbols for %s\n"), so->so_name);
507 so->symbols_loaded = 1;
508 return 1;
42a6e6a0
MK
509 }
510
511 return 0;
512}
c906108c 513
07cd4b97 514/* LOCAL FUNCTION
c906108c 515
105b175f 516 update_solib_list --- synchronize GDB's shared object list with inferior's
c906108c 517
c5aa993b 518 SYNOPSIS
c906108c 519
105b175f 520 void update_solib_list (int from_tty, struct target_ops *TARGET)
c906108c 521
07cd4b97 522 Extract the list of currently loaded shared objects from the
105b175f
JB
523 inferior, and compare it with the list of shared objects currently
524 in GDB's so_list_head list. Edit so_list_head to bring it in sync
525 with the inferior's new list.
c906108c 526
105b175f
JB
527 If we notice that the inferior has unloaded some shared objects,
528 free any symbolic info GDB had read about those shared objects.
529
530 Don't load symbolic info for any new shared objects; just add them
531 to the list, and leave their symbols_loaded flag clear.
07cd4b97
JB
532
533 If FROM_TTY is non-null, feel free to print messages about what
534 we're doing.
c906108c 535
07cd4b97
JB
536 If TARGET is non-null, add the sections of all new shared objects
537 to TARGET's section table. Note that this doesn't remove any
538 sections for shared objects that have been unloaded, and it
539 doesn't check to see if the new shared objects are already present in
540 the section table. But we only use this for core files and
541 processes we've just attached to, so that's okay. */
c906108c 542
a78f21af 543static void
105b175f 544update_solib_list (int from_tty, struct target_ops *target)
07cd4b97 545{
1cf3db46 546 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 547 struct so_list *inferior = ops->current_sos();
07cd4b97
JB
548 struct so_list *gdb, **gdb_link;
549
181e7f93
PA
550 /* We can reach here due to changing solib-search-path or the
551 sysroot, before having any inferior. */
50c71eaf 552 if (target_has_execution && !ptid_equal (inferior_ptid, null_ptid))
181e7f93
PA
553 {
554 struct inferior *inf = current_inferior ();
555
556 /* If we are attaching to a running process for which we
557 have not opened a symbol file, we may be able to get its
558 symbols now! */
559 if (inf->attach_flag && symfile_objfile == NULL)
560 catch_errors (ops->open_symbol_file_object, &from_tty,
561 "Error reading attached process's symbol file.\n",
562 RETURN_MASK_ALL);
563 }
104c1213 564
07cd4b97
JB
565 /* GDB and the inferior's dynamic linker each maintain their own
566 list of currently loaded shared objects; we want to bring the
567 former in sync with the latter. Scan both lists, seeing which
568 shared objects appear where. There are three cases:
569
570 - A shared object appears on both lists. This means that GDB
105b175f
JB
571 knows about it already, and it's still loaded in the inferior.
572 Nothing needs to happen.
07cd4b97
JB
573
574 - A shared object appears only on GDB's list. This means that
105b175f
JB
575 the inferior has unloaded it. We should remove the shared
576 object from GDB's tables.
07cd4b97
JB
577
578 - A shared object appears only on the inferior's list. This
105b175f
JB
579 means that it's just been loaded. We should add it to GDB's
580 tables.
07cd4b97
JB
581
582 So we walk GDB's list, checking each entry to see if it appears
583 in the inferior's list too. If it does, no action is needed, and
584 we remove it from the inferior's list. If it doesn't, the
585 inferior has unloaded it, and we remove it from GDB's list. By
586 the time we're done walking GDB's list, the inferior's list
587 contains only the new shared objects, which we then add. */
588
589 gdb = so_list_head;
590 gdb_link = &so_list_head;
591 while (gdb)
c906108c 592 {
07cd4b97
JB
593 struct so_list *i = inferior;
594 struct so_list **i_link = &inferior;
595
596 /* Check to see whether the shared object *gdb also appears in
597 the inferior's current list. */
598 while (i)
c906108c 599 {
a7c02bc8
VP
600 if (ops->same)
601 {
602 if (ops->same (gdb, i))
603 break;
604 }
605 else
606 {
607 if (! strcmp (gdb->so_original_name, i->so_original_name))
608 break;
609 }
07cd4b97
JB
610
611 i_link = &i->next;
612 i = *i_link;
c906108c 613 }
c5aa993b 614
07cd4b97
JB
615 /* If the shared object appears on the inferior's list too, then
616 it's still loaded, so we don't need to do anything. Delete
617 it from the inferior's list, and leave it on GDB's list. */
618 if (i)
c906108c 619 {
07cd4b97 620 *i_link = i->next;
07cd4b97
JB
621 free_so (i);
622 gdb_link = &gdb->next;
623 gdb = *gdb_link;
624 }
625
626 /* If it's not on the inferior's list, remove it from GDB's tables. */
627 else
628 {
42a6e6a0
MK
629 /* Notify any observer that the shared object has been
630 unloaded before we remove it from GDB's tables. */
84acb35a
JJ
631 observer_notify_solib_unloaded (gdb);
632
07cd4b97 633 *gdb_link = gdb->next;
07cd4b97
JB
634
635 /* Unless the user loaded it explicitly, free SO's objfile. */
e8930304 636 if (gdb->objfile && ! (gdb->objfile->flags & OBJF_USERLOADED))
07cd4b97
JB
637 free_objfile (gdb->objfile);
638
639 /* Some targets' section tables might be referring to
640 sections from so->abfd; remove them. */
641 remove_target_sections (gdb->abfd);
642
643 free_so (gdb);
644 gdb = *gdb_link;
c906108c
SS
645 }
646 }
c5aa993b 647
07cd4b97
JB
648 /* Now the inferior's list contains only shared objects that don't
649 appear in GDB's list --- those that are newly loaded. Add them
e8930304 650 to GDB's shared object list. */
07cd4b97 651 if (inferior)
c906108c 652 {
07cd4b97
JB
653 struct so_list *i;
654
655 /* Add the new shared objects to GDB's list. */
656 *gdb_link = inferior;
657
e8930304 658 /* Fill in the rest of each of the `struct so_list' nodes. */
07cd4b97 659 for (i = inferior; i; i = i->next)
c906108c 660 {
07cd4b97
JB
661 i->from_tty = from_tty;
662
663 /* Fill in the rest of the `struct so_list' node. */
664 catch_errors (solib_map_sections, i,
665 "Error while mapping shared library sections:\n",
666 RETURN_MASK_ALL);
07cd4b97 667
07b82ea5
PA
668 /* Add the shared object's sections to the current set of
669 file section tables. Do this immediately after mapping
670 the object so that later nodes in the list can query this
671 object, as is needed in solib-osf.c. */
672 add_target_sections (i->sections, i->sections_end);
42a6e6a0
MK
673
674 /* Notify any observer that the shared object has been
675 loaded now that we've added it to GDB's tables. */
676 observer_notify_solib_loaded (i);
c906108c 677 }
e8930304 678 }
105b175f
JB
679}
680
17a37d48
PP
681
682/* Return non-zero if NAME is the libpthread shared library.
6612ad7f
JB
683
684 Uses a fairly simplistic heuristic approach where we check
685 the file name against "/libpthread". This can lead to false
686 positives, but this should be good enough in practice. */
687
17a37d48
PP
688int
689libpthread_name_p (const char *name)
690{
691 return (strstr (name, "/libpthread") != NULL);
692}
693
694/* Return non-zero if SO is the libpthread shared library. */
695
6612ad7f
JB
696static int
697libpthread_solib_p (struct so_list *so)
698{
17a37d48 699 return libpthread_name_p (so->so_name);
6612ad7f 700}
105b175f
JB
701
702/* GLOBAL FUNCTION
703
704 solib_add -- read in symbol info for newly added shared libraries
705
706 SYNOPSIS
707
990f9fe3
FF
708 void solib_add (char *pattern, int from_tty, struct target_ops
709 *TARGET, int readsyms)
105b175f
JB
710
711 DESCRIPTION
712
713 Read in symbolic information for any shared objects whose names
714 match PATTERN. (If we've already read a shared object's symbol
715 info, leave it alone.) If PATTERN is zero, read them all.
716
990f9fe3
FF
717 If READSYMS is 0, defer reading symbolic information until later
718 but still do any needed low level processing.
719
105b175f
JB
720 FROM_TTY and TARGET are as described for update_solib_list, above. */
721
722void
990f9fe3 723solib_add (char *pattern, int from_tty, struct target_ops *target, int readsyms)
105b175f
JB
724{
725 struct so_list *gdb;
726
727 if (pattern)
728 {
729 char *re_err = re_comp (pattern);
730
731 if (re_err)
8a3fe4f8 732 error (_("Invalid regexp: %s"), re_err);
105b175f
JB
733 }
734
735 update_solib_list (from_tty, target);
c906108c 736
105b175f
JB
737 /* Walk the list of currently loaded shared libraries, and read
738 symbols for any that match the pattern --- or any whose symbols
739 aren't already loaded, if no pattern was given. */
e8930304
JB
740 {
741 int any_matches = 0;
742 int loaded_any_symbols = 0;
7eedccfa
PP
743 const int flags =
744 SYMFILE_DEFER_BP_RESET | (from_tty ? SYMFILE_VERBOSE : 0);
c906108c 745
e8930304
JB
746 for (gdb = so_list_head; gdb; gdb = gdb->next)
747 if (! pattern || re_exec (gdb->so_name))
748 {
6612ad7f
JB
749 /* Normally, we would read the symbols from that library
750 only if READSYMS is set. However, we're making a small
751 exception for the pthread library, because we sometimes
752 need the library symbols to be loaded in order to provide
753 thread support (x86-linux for instance). */
754 const int add_this_solib =
755 (readsyms || libpthread_solib_p (gdb));
756
e8930304 757 any_matches = 1;
7eedccfa 758 if (add_this_solib && solib_read_symbols (gdb, flags))
42a6e6a0 759 loaded_any_symbols = 1;
e8930304
JB
760 }
761
7eedccfa
PP
762 if (loaded_any_symbols)
763 breakpoint_re_set ();
764
e8930304
JB
765 if (from_tty && pattern && ! any_matches)
766 printf_unfiltered
767 ("No loaded shared libraries match the pattern `%s'.\n", pattern);
768
769 if (loaded_any_symbols)
770 {
1cf3db46 771 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 772
e8930304
JB
773 /* Getting new symbols may change our opinion about what is
774 frameless. */
775 reinit_frame_cache ();
776
66aba65d 777 ops->special_symbol_handling ();
e8930304
JB
778 }
779 }
c906108c
SS
780}
781
07cd4b97 782
c906108c
SS
783/*
784
c5aa993b 785 LOCAL FUNCTION
c906108c 786
c5aa993b 787 info_sharedlibrary_command -- code for "info sharedlibrary"
c906108c 788
c5aa993b 789 SYNOPSIS
c906108c 790
c5aa993b 791 static void info_sharedlibrary_command ()
c906108c 792
c5aa993b 793 DESCRIPTION
c906108c 794
c5aa993b
JM
795 Walk through the shared library list and print information
796 about each attached library.
797 */
c906108c
SS
798
799static void
fba45db2 800info_sharedlibrary_command (char *ignore, int from_tty)
c906108c 801{
52f0bd74 802 struct so_list *so = NULL; /* link map state variable */
c906108c
SS
803 int header_done = 0;
804 int addr_width;
c906108c 805
84eb3c4f 806 /* "0x", a little whitespace, and two hex digits per byte of pointers. */
1cf3db46 807 addr_width = 4 + (gdbarch_ptr_bit (target_gdbarch) / 4);
c906108c 808
105b175f 809 update_solib_list (from_tty, 0);
07cd4b97
JB
810
811 for (so = so_list_head; so; so = so->next)
c906108c 812 {
c5aa993b 813 if (so->so_name[0])
c906108c
SS
814 {
815 if (!header_done)
816 {
c5aa993b
JM
817 printf_unfiltered ("%-*s%-*s%-12s%s\n", addr_width, "From",
818 addr_width, "To", "Syms Read",
819 "Shared Object Library");
c906108c
SS
820 header_done++;
821 }
822
823 printf_unfiltered ("%-*s", addr_width,
cfa9d6d9 824 so->addr_high != 0
bb599908 825 ? hex_string_custom (
cfa9d6d9 826 (LONGEST) so->addr_low,
bb599908 827 addr_width - 4)
749499cb 828 : "");
c906108c 829 printf_unfiltered ("%-*s", addr_width,
cfa9d6d9 830 so->addr_high != 0
bb599908 831 ? hex_string_custom (
cfa9d6d9 832 (LONGEST) so->addr_high,
bb599908 833 addr_width - 4)
749499cb 834 : "");
c5aa993b
JM
835 printf_unfiltered ("%-12s", so->symbols_loaded ? "Yes" : "No");
836 printf_unfiltered ("%s\n", so->so_name);
c906108c
SS
837 }
838 }
839 if (so_list_head == NULL)
840 {
a3f17187 841 printf_unfiltered (_("No shared libraries loaded at this time.\n"));
c906108c
SS
842 }
843}
844
5fd1a349
PP
845/* Return 1 if ADDRESS lies within SOLIB. */
846
847int
848solib_contains_address_p (const struct so_list *const solib,
849 CORE_ADDR address)
850{
0542c86d 851 struct target_section *p;
5fd1a349
PP
852
853 for (p = solib->sections; p < solib->sections_end; p++)
854 if (p->addr <= address && address < p->endaddr)
855 return 1;
856
857 return 0;
858}
859
c906108c
SS
860/*
861
c5aa993b 862 GLOBAL FUNCTION
c906108c 863
f5c9a895
PP
864 solib_name_from_address -- if an address is in a shared lib, return
865 its name.
c906108c 866
c5aa993b 867 SYNOPSIS
c906108c 868
f5c9a895 869 char * solib_name_from_address (CORE_ADDR address)
c906108c 870
c5aa993b 871 DESCRIPTION
c906108c 872
c5aa993b
JM
873 Provides a hook for other gdb routines to discover whether or
874 not a particular address is within the mapped address space of
749499cb 875 a shared library.
c906108c 876
c5aa993b
JM
877 For example, this routine is called at one point to disable
878 breakpoints which are in shared libraries that are not currently
879 mapped in.
c906108c
SS
880 */
881
882char *
f5c9a895 883solib_name_from_address (CORE_ADDR address)
c906108c 884{
52f0bd74 885 struct so_list *so = 0; /* link map state variable */
c5aa993b 886
07cd4b97 887 for (so = so_list_head; so; so = so->next)
5fd1a349
PP
888 if (solib_contains_address_p (so, address))
889 return (so->so_name);
07cd4b97 890
c906108c
SS
891 return (0);
892}
893
894/* Called by free_all_symtabs */
895
c5aa993b 896void
fba45db2 897clear_solib (void)
c906108c 898{
1cf3db46 899 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 900
085dd6e6
JM
901 /* This function is expected to handle ELF shared libraries. It is
902 also used on Solaris, which can run either ELF or a.out binaries
903 (for compatibility with SunOS 4), both of which can use shared
904 libraries. So we don't know whether we have an ELF executable or
905 an a.out executable until the user chooses an executable file.
906
907 ELF shared libraries don't get mapped into the address space
908 until after the program starts, so we'd better not try to insert
909 breakpoints in them immediately. We have to wait until the
910 dynamic linker has loaded them; we'll hit a bp_shlib_event
911 breakpoint (look for calls to create_solib_event_breakpoint) when
912 it's ready.
913
914 SunOS shared libraries seem to be different --- they're present
915 as soon as the process begins execution, so there's no need to
916 put off inserting breakpoints. There's also nowhere to put a
917 bp_shlib_event breakpoint, so if we put it off, we'll never get
918 around to it.
919
920 So: disable breakpoints only if we're using ELF shared libs. */
921 if (exec_bfd != NULL
922 && bfd_get_flavour (exec_bfd) != bfd_target_aout_flavour)
cb851954 923 disable_breakpoints_in_shlibs ();
085dd6e6 924
c906108c
SS
925 while (so_list_head)
926 {
07cd4b97
JB
927 struct so_list *so = so_list_head;
928 so_list_head = so->next;
c86cf029 929 observer_notify_solib_unloaded (so);
2069d78d
KB
930 if (so->abfd)
931 remove_target_sections (so->abfd);
07cd4b97 932 free_so (so);
c906108c 933 }
07cd4b97 934
66aba65d 935 ops->clear_solib ();
c906108c
SS
936}
937
13437d4b 938/* GLOBAL FUNCTION
c5aa993b
JM
939
940 solib_create_inferior_hook -- shared library startup support
941
942 SYNOPSIS
943
7095b863 944 void solib_create_inferior_hook ()
c5aa993b
JM
945
946 DESCRIPTION
947
948 When gdb starts up the inferior, it nurses it along (through the
949 shell) until it is ready to execute it's first instruction. At this
950 point, this function gets called via expansion of the macro
13437d4b 951 SOLIB_CREATE_INFERIOR_HOOK. */
c5aa993b
JM
952
953void
fba45db2 954solib_create_inferior_hook (void)
c906108c 955{
1cf3db46 956 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 957 ops->solib_create_inferior_hook();
c906108c
SS
958}
959
d7fa2ae2
KB
960/* GLOBAL FUNCTION
961
962 in_solib_dynsym_resolve_code -- check to see if an address is in
963 dynamic loader's dynamic symbol
964 resolution code
965
966 SYNOPSIS
967
968 int in_solib_dynsym_resolve_code (CORE_ADDR pc)
969
970 DESCRIPTION
971
972 Determine if PC is in the dynamic linker's symbol resolution
973 code. Return 1 if so, 0 otherwise.
974*/
975
976int
977in_solib_dynsym_resolve_code (CORE_ADDR pc)
978{
1cf3db46 979 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 980 return ops->in_dynsym_resolve_code (pc);
d7fa2ae2 981}
c906108c
SS
982
983/*
984
c5aa993b 985 LOCAL FUNCTION
c906108c 986
c5aa993b 987 sharedlibrary_command -- handle command to explicitly add library
c906108c 988
c5aa993b 989 SYNOPSIS
c906108c 990
c5aa993b 991 static void sharedlibrary_command (char *args, int from_tty)
c906108c 992
c5aa993b 993 DESCRIPTION
c906108c 994
c5aa993b 995 */
c906108c
SS
996
997static void
fba45db2 998sharedlibrary_command (char *args, int from_tty)
c906108c
SS
999{
1000 dont_repeat ();
990f9fe3 1001 solib_add (args, from_tty, (struct target_ops *) 0, 1);
c906108c
SS
1002}
1003
cb0ba49e
MS
1004/* LOCAL FUNCTION
1005
1006 no_shared_libraries -- handle command to explicitly discard symbols
1007 from shared libraries.
1008
1009 DESCRIPTION
1010
1011 Implements the command "nosharedlibrary", which discards symbols
1012 that have been auto-loaded from shared libraries. Symbols from
1013 shared libraries that were added by explicit request of the user
1014 are not discarded. Also called from remote.c. */
1015
c60a7562
MS
1016void
1017no_shared_libraries (char *ignored, int from_tty)
1018{
a3247a22
PP
1019 /* The order of the two routines below is important: clear_solib notifies
1020 the solib_unloaded observers, and some of these observers might need
1021 access to their associated objfiles. Therefore, we can not purge the
1022 solibs' objfiles before clear_solib has been called. */
1023
615b9dba 1024 clear_solib ();
a3247a22 1025 objfile_purge_solibs ();
c60a7562 1026}
c906108c 1027
cf466558 1028static void
f397e303
AC
1029reload_shared_libraries (char *ignored, int from_tty,
1030 struct cmd_list_element *e)
cf466558
KB
1031{
1032 no_shared_libraries (NULL, from_tty);
1033 solib_add (NULL, from_tty, NULL, auto_solib_add);
c8fa6cdd
VP
1034 /* Creating inferior hooks here has two purposes. First, if we reload
1035 shared libraries then the address of solib breakpoint we've computed
1036 previously might be no longer valid. For example, if we forgot to set
1037 solib-absolute-prefix and are setting it right now, then the previous
1038 breakpoint address is plain wrong. Second, installing solib hooks
1039 also implicitly figures were ld.so is and loads symbols for it.
1040 Absent this call, if we've just connected to a target and set
1041 solib-absolute-prefix or solib-search-path, we'll lose all information
1042 about ld.so. */
1043 if (target_has_execution)
1044 {
1045#ifdef SOLIB_CREATE_INFERIOR_HOOK
1046 SOLIB_CREATE_INFERIOR_HOOK (PIDGET (inferior_ptid));
1047#else
1048 solib_create_inferior_hook ();
1049#endif
1050 }
1051 /* We have unloaded and then reloaded debug info for all shared libraries.
1052 However, frames may still reference them, for example a frame's
1053 unwinder might still point of DWARF FDE structures that are now freed.
1054 Reinit frame cache to avoid crashing. */
1055 reinit_frame_cache ();
cf466558
KB
1056}
1057
920d2a44
AC
1058static void
1059show_auto_solib_add (struct ui_file *file, int from_tty,
1060 struct cmd_list_element *c, const char *value)
1061{
1062 fprintf_filtered (file, _("Autoloading of shared library symbols is %s.\n"),
1063 value);
1064}
1065
1066
3a40aaa0
UW
1067/* Handler for library-specific lookup of global symbol NAME in OBJFILE. Call
1068 the library-specific handler if it is installed for the current target. */
1069
1070struct symbol *
1071solib_global_lookup (const struct objfile *objfile,
1072 const char *name,
1073 const char *linkage_name,
21b556f4 1074 const domain_enum domain)
3a40aaa0 1075{
1cf3db46 1076 struct target_so_ops *ops = solib_ops (target_gdbarch);
3a40aaa0 1077
e8a92f7b 1078 if (ops->lookup_lib_global_symbol != NULL)
21b556f4 1079 return ops->lookup_lib_global_symbol (objfile, name, linkage_name, domain);
3a40aaa0
UW
1080 return NULL;
1081}
1082
1083
a78f21af
AC
1084extern initialize_file_ftype _initialize_solib; /* -Wmissing-prototypes */
1085
c906108c 1086void
fba45db2 1087_initialize_solib (void)
c906108c 1088{
fa58ee11
EZ
1089 struct cmd_list_element *c;
1090
66aba65d
MK
1091 solib_data = gdbarch_data_register_pre_init (solib_init);
1092
c906108c 1093 add_com ("sharedlibrary", class_files, sharedlibrary_command,
1bedd215 1094 _("Load shared object library symbols for files matching REGEXP."));
c5aa993b 1095 add_info ("sharedlibrary", info_sharedlibrary_command,
1bedd215 1096 _("Status of loaded shared object libraries."));
c60a7562 1097 add_com ("nosharedlibrary", class_files, no_shared_libraries,
1bedd215 1098 _("Unload all shared object library symbols."));
c906108c 1099
5bf193a2
AC
1100 add_setshow_boolean_cmd ("auto-solib-add", class_support,
1101 &auto_solib_add, _("\
1102Set autoloading of shared library symbols."), _("\
1103Show autoloading of shared library symbols."), _("\
b7209cb4
FF
1104If \"on\", symbols from all shared object libraries will be loaded\n\
1105automatically when the inferior begins execution, when the dynamic linker\n\
1106informs gdb that a new library has been loaded, or when attaching to the\n\
5bf193a2
AC
1107inferior. Otherwise, symbols must be loaded manually, using `sharedlibrary'."),
1108 NULL,
920d2a44 1109 show_auto_solib_add,
5bf193a2 1110 &setlist, &showlist);
c906108c 1111
f822c95b
DJ
1112 add_setshow_filename_cmd ("sysroot", class_support,
1113 &gdb_sysroot, _("\
1114Set an alternate system root."), _("\
1115Show the current system root."), _("\
1116The system root is used to load absolute shared library symbol files.\n\
1117For other (relative) files, you can add directories using\n\
1118`set solib-search-path'."),
f397e303
AC
1119 reload_shared_libraries,
1120 NULL,
1121 &setlist, &showlist);
c906108c 1122
f822c95b
DJ
1123 add_alias_cmd ("solib-absolute-prefix", "sysroot", class_support, 0,
1124 &setlist);
1125 add_alias_cmd ("solib-absolute-prefix", "sysroot", class_support, 0,
1126 &showlist);
030292b7 1127
525226b5
AC
1128 add_setshow_optional_filename_cmd ("solib-search-path", class_support,
1129 &solib_search_path, _("\
1130Set the search path for loading non-absolute shared library symbol files."), _("\
1131Show the search path for loading non-absolute shared library symbol files."), _("\
1132This takes precedence over the environment variables PATH and LD_LIBRARY_PATH."),
1133 reload_shared_libraries,
920d2a44 1134 show_solib_search_path,
525226b5 1135 &setlist, &showlist);
c906108c 1136}
This page took 0.875128 seconds and 4 git commands to generate.