* server.c (handle_general_set): Make static.
[deliverable/binutils-gdb.git] / gdb / solib.c
CommitLineData
13437d4b 1/* Handle shared libraries for GDB, the GNU Debugger.
14a5e767 2
6aba47ca 3 Copyright (C) 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999,
4c38e0a4 4 2000, 2001, 2002, 2003, 2005, 2006, 2007, 2008, 2009, 2010
9b254dd1 5 Free Software Foundation, Inc.
c906108c 6
c5aa993b 7 This file is part of GDB.
c906108c 8
c5aa993b
JM
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
a9762ec7 11 the Free Software Foundation; either version 3 of the License, or
c5aa993b 12 (at your option) any later version.
c906108c 13
c5aa993b
JM
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License
a9762ec7 20 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c 21
c906108c
SS
22#include "defs.h"
23
c906108c 24#include <sys/types.h>
c906108c 25#include <fcntl.h>
13437d4b 26#include "gdb_string.h"
c906108c
SS
27#include "symtab.h"
28#include "bfd.h"
29#include "symfile.h"
30#include "objfiles.h"
60250e8b 31#include "exceptions.h"
c906108c
SS
32#include "gdbcore.h"
33#include "command.h"
34#include "target.h"
35#include "frame.h"
88987551 36#include "gdb_regex.h"
c906108c
SS
37#include "inferior.h"
38#include "environ.h"
39#include "language.h"
40#include "gdbcmd.h"
fa58ee11 41#include "completer.h"
fe4e3eb8 42#include "filenames.h" /* for DOSish file names */
4646aa9d 43#include "exec.h"
13437d4b 44#include "solist.h"
84acb35a 45#include "observer.h"
dbda9972 46#include "readline/readline.h"
f1838a98 47#include "remote.h"
2c0b251b 48#include "solib.h"
55333a84 49#include "interps.h"
ab38a727 50#include "filesystem.h"
c906108c 51
66aba65d
MK
52/* Architecture-specific operations. */
53
54/* Per-architecture data key. */
55static struct gdbarch_data *solib_data;
56
57static void *
58solib_init (struct obstack *obstack)
59{
60 struct target_so_ops **ops;
61
62 ops = OBSTACK_ZALLOC (obstack, struct target_so_ops *);
63 *ops = current_target_so_ops;
64 return ops;
65}
66
67static struct target_so_ops *
68solib_ops (struct gdbarch *gdbarch)
69{
70 struct target_so_ops **ops = gdbarch_data (gdbarch, solib_data);
71 return *ops;
72}
7d522c90
DJ
73
74/* Set the solib operations for GDBARCH to NEW_OPS. */
75
76void
77set_solib_ops (struct gdbarch *gdbarch, struct target_so_ops *new_ops)
78{
79 struct target_so_ops **ops = gdbarch_data (gdbarch, solib_data);
80 *ops = new_ops;
81}
66aba65d
MK
82\f
83
13437d4b 84/* external data declarations */
c906108c 85
7d522c90
DJ
86/* FIXME: gdbarch needs to control this variable, or else every
87 configuration needs to call set_solib_ops. */
13437d4b 88struct target_so_ops *current_target_so_ops;
23e04971 89
6c95b8df
PA
90/* List of known shared objects */
91#define so_list_head current_program_space->so_list
23e04971 92
c906108c
SS
93/* Local function prototypes */
94
c906108c
SS
95/* If non-empty, this is a search path for loading non-absolute shared library
96 symbol files. This takes precedence over the environment variables PATH
97 and LD_LIBRARY_PATH. */
98static char *solib_search_path = NULL;
920d2a44
AC
99static void
100show_solib_search_path (struct ui_file *file, int from_tty,
101 struct cmd_list_element *c, const char *value)
102{
103 fprintf_filtered (file, _("\
104The search path for loading non-absolute shared library symbol files is %s.\n"),
105 value);
106}
c906108c 107
ab38a727
PA
108/* Same as HAVE_DOS_BASED_FILE_SYSTEM, but useable as an rvalue. */
109#if (HAVE_DOS_BASED_FILE_SYSTEM)
110# define DOS_BASED_FILE_SYSTEM 1
111#else
112# define DOS_BASED_FILE_SYSTEM 0
113#endif
114
e4f7b8c8
MS
115/*
116
117 GLOBAL FUNCTION
118
572d275c 119 solib_find -- Find a shared library file.
e4f7b8c8
MS
120
121 SYNOPSIS
122
572d275c 123 char *solib_find (char *in_pathname, int *fd);
e4f7b8c8
MS
124
125 DESCRIPTION
126
f822c95b 127 Global variable GDB_SYSROOT is used as a prefix directory
e4f7b8c8
MS
128 to search for shared libraries if they have an absolute path.
129
130 Global variable SOLIB_SEARCH_PATH is used as a prefix directory
131 (or set of directories, as in LD_LIBRARY_PATH) to search for all
f822c95b 132 shared libraries if not found in GDB_SYSROOT.
e4f7b8c8 133
c8c18e65 134 Search algorithm:
f822c95b
DJ
135 * If there is a gdb_sysroot and path is absolute:
136 * Search for gdb_sysroot/path.
c8c18e65
KW
137 * else
138 * Look for it literally (unmodified).
e4f7b8c8 139 * Look in SOLIB_SEARCH_PATH.
f43caff8 140 * If available, use target defined search function.
f822c95b 141 * If gdb_sysroot is NOT set, perform the following two searches:
c8c18e65
KW
142 * Look in inferior's $PATH.
143 * Look in inferior's $LD_LIBRARY_PATH.
ab38a727 144 *
c8c18e65 145 * The last check avoids doing this search when targetting remote
f822c95b 146 * machines since gdb_sysroot will almost always be set.
e4f7b8c8
MS
147
148 RETURNS
b21f0843 149
572d275c
UW
150 Full pathname of the shared library file, or NULL if not found.
151 (The pathname is malloc'ed; it needs to be freed by the caller.)
152 *FD is set to either -1 or an open file handle for the library. */
e4f7b8c8 153
572d275c
UW
154char *
155solib_find (char *in_pathname, int *fd)
e4f7b8c8 156{
1cf3db46 157 struct target_so_ops *ops = solib_ops (target_gdbarch);
e4f7b8c8
MS
158 int found_file = -1;
159 char *temp_pathname = NULL;
f822c95b 160 int gdb_sysroot_is_empty;
08105857
PA
161 const char *solib_symbols_extension
162 = gdbarch_solib_symbols_extension (target_gdbarch);
ab38a727
PA
163 const char *fskind = effective_target_file_system_kind ();
164 struct cleanup *old_chain = make_cleanup (null_cleanup, NULL);
165 char *sysroot = NULL;
08105857
PA
166
167 /* If solib_symbols_extension is set, replace the file's
168 extension. */
169 if (solib_symbols_extension)
170 {
171 char *p = in_pathname + strlen (in_pathname);
172 while (p > in_pathname && *p != '.')
173 p--;
174
175 if (*p == '.')
176 {
177 char *new_pathname;
178
179 new_pathname = alloca (p - in_pathname + 1
180 + strlen (solib_symbols_extension) + 1);
181 memcpy (new_pathname, in_pathname, p - in_pathname + 1);
182 strcpy (new_pathname + (p - in_pathname) + 1,
183 solib_symbols_extension);
184
185 in_pathname = new_pathname;
186 }
187 }
58dc52c3 188
f822c95b 189 gdb_sysroot_is_empty = (gdb_sysroot == NULL || *gdb_sysroot == 0);
e4f7b8c8 190
ab38a727 191 if (!gdb_sysroot_is_empty)
e4f7b8c8 192 {
f822c95b 193 int prefix_len = strlen (gdb_sysroot);
f1d10cfb
AS
194
195 /* Remove trailing slashes from absolute prefix. */
196 while (prefix_len > 0
f822c95b 197 && IS_DIR_SEPARATOR (gdb_sysroot[prefix_len - 1]))
f1d10cfb
AS
198 prefix_len--;
199
ab38a727
PA
200 sysroot = savestring (gdb_sysroot, prefix_len);
201 make_cleanup (xfree, sysroot);
202 }
203
204 /* If we're on a non-DOS-based system, backslashes won't be
205 understood as directory separator, so, convert them to forward
206 slashes, iff we're supposed to handle DOS-based file system
207 semantics for target paths. */
208 if (!DOS_BASED_FILE_SYSTEM && fskind == file_system_kind_dos_based)
209 {
210 char *p;
211
212 /* Avoid clobbering our input. */
213 p = alloca (strlen (in_pathname) + 1);
214 strcpy (p, in_pathname);
215 in_pathname = p;
216
217 for (; *p; p++)
218 {
219 if (*p == '\\')
220 *p = '/';
221 }
222 }
223
224 /* Note, we're interested in IS_TARGET_ABSOLUTE_PATH, not
225 IS_ABSOLUTE_PATH. The latter is for host paths only, while
226 IN_PATHNAME is a target path. For example, if we're supposed to
227 be handling DOS-like semantics we want to consider a
228 'c:/foo/bar.dll' path as an absolute path, even on a Unix box.
229 With such a path, before giving up on the sysroot, we'll try:
230
231 1st attempt, c:/foo/bar.dll ==> /sysroot/c:/foo/bar.dll
232 2nd attempt, c:/foo/bar.dll ==> /sysroot/c/foo/bar.dll
233 3rd attempt, c:/foo/bar.dll ==> /sysroot/foo/bar.dll
234 */
235
236 if (!IS_TARGET_ABSOLUTE_PATH (fskind, in_pathname) || gdb_sysroot_is_empty)
237 temp_pathname = xstrdup (in_pathname);
238 else
239 {
240 int need_dir_separator;
241
242 need_dir_separator = !IS_DIR_SEPARATOR (in_pathname[0]);
243
f1d10cfb 244 /* Cat the prefixed pathname together. */
ab38a727
PA
245 temp_pathname = concat (sysroot,
246 need_dir_separator ? SLASH_STRING : "",
247 in_pathname, (char *) NULL);
e4f7b8c8
MS
248 }
249
f1838a98
UW
250 /* Handle remote files. */
251 if (remote_filename_p (temp_pathname))
252 {
572d275c 253 *fd = -1;
ab38a727 254 return temp_pathname;
f1838a98
UW
255 }
256
f1d10cfb
AS
257 /* Now see if we can open it. */
258 found_file = open (temp_pathname, O_RDONLY | O_BINARY, 0);
ab38a727
PA
259 if (found_file < 0)
260 xfree (temp_pathname);
261
262 /* If the search in gdb_sysroot failed, and the path name has a
263 drive spec (e.g, c:/foo), try stripping ':' from the drive spec,
264 and retrying in the sysroot:
265 c:/foo/bar.dll ==> /sysroot/c/foo/bar.dll. */
f1d10cfb 266
ab38a727
PA
267 if (found_file < 0
268 && !gdb_sysroot_is_empty
269 && HAS_TARGET_DRIVE_SPEC (fskind, in_pathname))
270 {
271 int need_dir_separator = !IS_DIR_SEPARATOR (in_pathname[2]);
272 char *drive = savestring (in_pathname, 1);
273
274 temp_pathname = concat (sysroot,
275 SLASH_STRING,
276 drive,
277 need_dir_separator ? SLASH_STRING : "",
278 in_pathname + 2, (char *) NULL);
279 xfree (drive);
280
281 found_file = open (temp_pathname, O_RDONLY | O_BINARY, 0);
282 if (found_file < 0)
283 {
284 char *p;
285
286 xfree (temp_pathname);
287
288 /* If the search in gdb_sysroot still failed, try fully
289 stripping the drive spec, and trying once more in the
290 sysroot before giving up.
291
292 c:/foo/bar.dll ==> /sysroot/foo/bar.dll. */
293
294 temp_pathname = concat (sysroot,
295 need_dir_separator ? SLASH_STRING : "",
296 in_pathname + 2, (char *) NULL);
297
298 found_file = open (temp_pathname, O_RDONLY | O_BINARY, 0);
299 if (found_file < 0)
300 xfree (temp_pathname);
301 }
302 }
0997b535 303
ab38a727
PA
304 do_cleanups (old_chain);
305
306 /* We try to find the library in various ways. After each attempt,
307 either found_file >= 0 and temp_pathname is a malloc'd string, or
308 found_file < 0 and temp_pathname does not point to storage that
309 needs to be freed. */
310
311 if (found_file < 0)
312 temp_pathname = NULL;
313
314 /* If not found, search the solib_search_path (if any). */
315 if (found_file < 0 && solib_search_path != NULL)
316 found_file = openp (solib_search_path, OPF_TRY_CWD_FIRST,
317 in_pathname, O_RDONLY | O_BINARY, &temp_pathname);
0997b535 318
f822c95b 319 /* If the search in gdb_sysroot failed, and the path name is
ba5f0d88
OF
320 absolute at this point, make it relative. (openp will try and open the
321 file according to its absolute path otherwise, which is not what we want.)
322 Affects subsequent searches for this solib. */
ab38a727 323 if (found_file < 0 && IS_TARGET_ABSOLUTE_PATH (fskind, in_pathname))
ba5f0d88
OF
324 {
325 /* First, get rid of any drive letters etc. */
ab38a727
PA
326 while (!IS_TARGET_DIR_SEPARATOR (fskind, *in_pathname))
327 in_pathname++;
ba5f0d88
OF
328
329 /* Next, get rid of all leading dir separators. */
ab38a727
PA
330 while (IS_TARGET_DIR_SEPARATOR (fskind, *in_pathname))
331 in_pathname++;
ba5f0d88 332 }
ab38a727 333
c8c18e65 334 /* If not found, search the solib_search_path (if any). */
e4f7b8c8 335 if (found_file < 0 && solib_search_path != NULL)
014d698b 336 found_file = openp (solib_search_path, OPF_TRY_CWD_FIRST,
fbdebf46 337 in_pathname, O_RDONLY | O_BINARY, &temp_pathname);
ab38a727 338
ba5f0d88
OF
339 /* If not found, next search the solib_search_path (if any) for the basename
340 only (ignoring the path). This is to allow reading solibs from a path
341 that differs from the opened path. */
342 if (found_file < 0 && solib_search_path != NULL)
014d698b 343 found_file = openp (solib_search_path, OPF_TRY_CWD_FIRST,
ab38a727
PA
344 target_lbasename (fskind, in_pathname),
345 O_RDONLY | O_BINARY, &temp_pathname);
e4f7b8c8 346
2610b0bf 347 /* If not found, try to use target supplied solib search method */
66aba65d 348 if (found_file < 0 && ops->find_and_open_solib)
637d6690 349 found_file = ops->find_and_open_solib (in_pathname, O_RDONLY | O_BINARY,
66aba65d 350 &temp_pathname);
2610b0bf 351
e4f7b8c8 352 /* If not found, next search the inferior's $PATH environment variable. */
f822c95b 353 if (found_file < 0 && gdb_sysroot_is_empty)
3f81c18a
VP
354 found_file = openp (get_in_environ (current_inferior ()->environment,
355 "PATH"),
fbdebf46 356 OPF_TRY_CWD_FIRST, in_pathname, O_RDONLY | O_BINARY,
014d698b 357 &temp_pathname);
e4f7b8c8 358
ab38a727 359 /* If not found, next search the inferior's $LD_LIBRARY_PATH
e4f7b8c8 360 environment variable. */
f822c95b 361 if (found_file < 0 && gdb_sysroot_is_empty)
3f81c18a
VP
362 found_file = openp (get_in_environ (current_inferior ()->environment,
363 "LD_LIBRARY_PATH"),
fbdebf46 364 OPF_TRY_CWD_FIRST, in_pathname, O_RDONLY | O_BINARY,
014d698b 365 &temp_pathname);
e4f7b8c8 366
572d275c
UW
367 *fd = found_file;
368 return temp_pathname;
369}
370
371/* Open and return a BFD for the shared library PATHNAME. If FD is not -1,
372 it is used as file handle to open the file. Throws an error if the file
373 could not be opened. Handles both local and remote file access.
374
375 PATHNAME must be malloc'ed by the caller. If successful, the new BFD's
376 name will point to it. If unsuccessful, PATHNAME will be freed and the
377 FD will be closed (unless FD was -1). */
378
379bfd *
380solib_bfd_fopen (char *pathname, int fd)
381{
382 bfd *abfd;
383
384 if (remote_filename_p (pathname))
385 {
386 gdb_assert (fd == -1);
387 abfd = remote_bfd_open (pathname, gnutarget);
388 }
389 else
390 {
391 abfd = bfd_fopen (pathname, gnutarget, FOPEN_RB, fd);
392
393 if (abfd)
394 bfd_set_cacheable (abfd, 1);
395 else if (fd != -1)
396 close (fd);
397 }
f1838a98 398
f1838a98
UW
399 if (!abfd)
400 {
572d275c 401 make_cleanup (xfree, pathname);
f1838a98 402 error (_("Could not open `%s' as an executable file: %s"),
572d275c 403 pathname, bfd_errmsg (bfd_get_error ()));
f1838a98
UW
404 }
405
572d275c
UW
406 return abfd;
407}
408
409/* Find shared library PATHNAME and open a BFD for it. */
410
411bfd *
412solib_bfd_open (char *pathname)
413{
572d275c
UW
414 char *found_pathname;
415 int found_file;
416 bfd *abfd;
378d2b72 417 const struct bfd_arch_info *b;
572d275c 418
572d275c
UW
419 /* Search for shared library file. */
420 found_pathname = solib_find (pathname, &found_file);
421 if (found_pathname == NULL)
048d532d
PA
422 {
423 /* Return failure if the file could not be found, so that we can
424 accumulate messages about missing libraries. */
425 if (errno == ENOENT)
426 return NULL;
427
428 perror_with_name (pathname);
429 }
572d275c
UW
430
431 /* Open bfd for shared library. */
432 abfd = solib_bfd_fopen (found_pathname, found_file);
433
434 /* Check bfd format. */
f1838a98 435 if (!bfd_check_format (abfd, bfd_object))
0997b535 436 {
f1838a98 437 bfd_close (abfd);
572d275c 438 make_cleanup (xfree, found_pathname);
f1838a98 439 error (_("`%s': not in executable format: %s"),
572d275c 440 found_pathname, bfd_errmsg (bfd_get_error ()));
0997b535 441 }
f1838a98 442
378d2b72
HZ
443 /* Check bfd arch. */
444 b = gdbarch_bfd_arch_info (target_gdbarch);
69e2bf17 445 if (!b->compatible (b, bfd_get_arch_info (abfd)))
378d2b72
HZ
446 warning (_("`%s': Shared library architecture %s is not compatible "
447 "with target architecture %s."), found_pathname,
448 bfd_get_arch_info (abfd)->printable_name, b->printable_name);
449
f1838a98 450 return abfd;
e4f7b8c8
MS
451}
452
453
c906108c
SS
454/*
455
c5aa993b 456 LOCAL FUNCTION
c906108c 457
c5aa993b 458 solib_map_sections -- open bfd and build sections for shared lib
c906108c 459
c5aa993b 460 SYNOPSIS
c906108c 461
c5aa993b 462 static int solib_map_sections (struct so_list *so)
c906108c 463
c5aa993b 464 DESCRIPTION
c906108c 465
c5aa993b
JM
466 Given a pointer to one of the shared objects in our list
467 of mapped objects, use the recorded name to open a bfd
468 descriptor for the object, build a section table, and then
469 relocate all the section addresses by the base address at
470 which the shared object was mapped.
c906108c 471
c5aa993b 472 FIXMES
c906108c 473
c5aa993b
JM
474 In most (all?) cases the shared object file name recorded in the
475 dynamic linkage tables will be a fully qualified pathname. For
476 cases where it isn't, do we really mimic the systems search
477 mechanism correctly in the below code (particularly the tilde
478 expansion stuff?).
c906108c
SS
479 */
480
481static int
048d532d 482solib_map_sections (struct so_list *so)
c906108c 483{
831a0c44 484 struct target_so_ops *ops = solib_ops (target_gdbarch);
c906108c 485 char *filename;
0542c86d 486 struct target_section *p;
c906108c
SS
487 struct cleanup *old_chain;
488 bfd *abfd;
c5aa993b
JM
489
490 filename = tilde_expand (so->so_name);
b8c9b27d 491 old_chain = make_cleanup (xfree, filename);
831a0c44 492 abfd = ops->bfd_open (filename);
f1838a98 493 do_cleanups (old_chain);
e4f7b8c8 494
048d532d
PA
495 if (abfd == NULL)
496 return 0;
497
13437d4b 498 /* Leave bfd open, core_xfer_memory and "info files" need it. */
3db741ef 499 so->abfd = gdb_bfd_ref (abfd);
23e04971 500
e4f7b8c8
MS
501 /* copy full path name into so_name, so that later symbol_file_add
502 can find it */
f1838a98
UW
503 if (strlen (bfd_get_filename (abfd)) >= SO_NAME_MAX_PATH_SIZE)
504 error (_("Shared library file name is too long."));
505 strcpy (so->so_name, bfd_get_filename (abfd));
23e04971 506
13437d4b 507 if (build_section_table (abfd, &so->sections, &so->sections_end))
23e04971 508 {
8a3fe4f8 509 error (_("Can't find the file sections in `%s': %s"),
13437d4b 510 bfd_get_filename (abfd), bfd_errmsg (bfd_get_error ()));
23e04971 511 }
104c1213 512
13437d4b 513 for (p = so->sections; p < so->sections_end; p++)
104c1213 514 {
13437d4b
KB
515 /* Relocate the section binding addresses as recorded in the shared
516 object's file by the base address to which the object was actually
517 mapped. */
66aba65d 518 ops->relocate_section_addresses (so, p);
cfa9d6d9
DJ
519
520 /* If the target didn't provide information about the address
521 range of the shared object, assume we want the location of
522 the .text section. */
523 if (so->addr_low == 0 && so->addr_high == 0
524 && strcmp (p->the_bfd_section->name, ".text") == 0)
13437d4b 525 {
cfa9d6d9
DJ
526 so->addr_low = p->addr;
527 so->addr_high = p->endaddr;
13437d4b 528 }
104c1213
JM
529 }
530
048d532d
PA
531 /* Add the shared object's sections to the current set of file
532 section tables. Do this immediately after mapping the object so
533 that later nodes in the list can query this object, as is needed
534 in solib-osf.c. */
535 add_target_sections (so->sections, so->sections_end);
536
537 return 1;
104c1213 538}
c906108c 539
a86988f2
PA
540/* Free symbol-file related contents of SO. If we have opened a BFD
541 for SO, close it. If we have placed SO's sections in some target's
542 section table, the caller is responsible for removing them.
543
544 This function doesn't mess with objfiles at all. If there is an
545 objfile associated with SO that needs to be removed, the caller is
546 responsible for taking care of that. */
547
548static void
549free_so_symbols (struct so_list *so)
550{
551 char *bfd_filename = 0;
552
553 if (so->sections)
554 {
555 xfree (so->sections);
556 so->sections = so->sections_end = NULL;
557 }
558
559 gdb_bfd_unref (so->abfd);
560 so->abfd = NULL;
561
562 /* Our caller closed the objfile, possibly via objfile_purge_solibs. */
563 so->symbols_loaded = 0;
564 so->objfile = NULL;
565
566 so->addr_low = so->addr_high = 0;
567
568 /* Restore the target-supplied file name. SO_NAME may be the path
569 of the symbol file. */
570 strcpy (so->so_name, so->so_original_name);
571}
572
07cd4b97 573/* LOCAL FUNCTION
c906108c 574
07cd4b97 575 free_so --- free a `struct so_list' object
c906108c 576
c5aa993b 577 SYNOPSIS
c906108c 578
07cd4b97 579 void free_so (struct so_list *so)
c906108c 580
c5aa993b 581 DESCRIPTION
c906108c 582
07cd4b97
JB
583 Free the storage associated with the `struct so_list' object SO.
584 If we have opened a BFD for SO, close it.
c906108c 585
07cd4b97
JB
586 The caller is responsible for removing SO from whatever list it is
587 a member of. If we have placed SO's sections in some target's
588 section table, the caller is responsible for removing them.
c906108c 589
07cd4b97
JB
590 This function doesn't mess with objfiles at all. If there is an
591 objfile associated with SO that needs to be removed, the caller is
592 responsible for taking care of that. */
593
13437d4b 594void
07cd4b97 595free_so (struct so_list *so)
c906108c 596{
1cf3db46 597 struct target_so_ops *ops = solib_ops (target_gdbarch);
c5aa993b 598
a86988f2 599 free_so_symbols (so);
66aba65d 600 ops->free_so (so);
07cd4b97 601
b8c9b27d 602 xfree (so);
c906108c
SS
603}
604
07cd4b97 605
f8766ec1
KB
606/* Return address of first so_list entry in master shared object list. */
607struct so_list *
608master_so_list (void)
609{
610 return so_list_head;
611}
612
7eedccfa
PP
613/* Read in symbols for shared object SO. If SYMFILE_VERBOSE is set in FLAGS,
614 be chatty about it. Return non-zero if any symbols were actually
42a6e6a0
MK
615 loaded. */
616
617int
7eedccfa 618solib_read_symbols (struct so_list *so, int flags)
42a6e6a0 619{
7eedccfa
PP
620 const int from_tty = flags & SYMFILE_VERBOSE;
621
42a6e6a0
MK
622 if (so->symbols_loaded)
623 {
a86988f2 624 /* If needed, we've already warned in our caller. */
42a6e6a0 625 }
8bb75286
DJ
626 else if (so->abfd == NULL)
627 {
048d532d
PA
628 /* We've already warned about this library, when trying to open
629 it. */
8bb75286 630 }
42a6e6a0
MK
631 else
632 {
048d532d
PA
633 volatile struct gdb_exception e;
634
635 TRY_CATCH (e, RETURN_MASK_ERROR)
636 {
637 struct section_addr_info *sap;
638
639 /* Have we already loaded this shared object? */
640 ALL_OBJFILES (so->objfile)
641 {
642 if (strcmp (so->objfile->name, so->so_name) == 0)
643 break;
644 }
645 if (so->objfile != NULL)
646 break;
647
648 sap = build_section_addr_info_from_section_table (so->sections,
649 so->sections_end);
650 so->objfile = symbol_file_add_from_bfd (so->abfd,
651 flags, sap, OBJF_SHARED);
652 free_section_addr_info (sap);
653 }
654
655 if (e.reason < 0)
656 {
657 if (from_tty)
658 exception_fprintf
659 (gdb_stderr, e,
660 _("Error while reading shared library symbols:\n"));
661 }
662 else
663 {
664 if (from_tty || info_verbose)
665 printf_unfiltered (_("Loaded symbols for %s\n"), so->so_name);
666 so->symbols_loaded = 1;
667 }
7eedccfa 668 return 1;
42a6e6a0
MK
669 }
670
671 return 0;
672}
c906108c 673
07cd4b97 674/* LOCAL FUNCTION
c906108c 675
105b175f 676 update_solib_list --- synchronize GDB's shared object list with inferior's
c906108c 677
c5aa993b 678 SYNOPSIS
c906108c 679
105b175f 680 void update_solib_list (int from_tty, struct target_ops *TARGET)
c906108c 681
07cd4b97 682 Extract the list of currently loaded shared objects from the
105b175f
JB
683 inferior, and compare it with the list of shared objects currently
684 in GDB's so_list_head list. Edit so_list_head to bring it in sync
685 with the inferior's new list.
c906108c 686
105b175f
JB
687 If we notice that the inferior has unloaded some shared objects,
688 free any symbolic info GDB had read about those shared objects.
689
690 Don't load symbolic info for any new shared objects; just add them
691 to the list, and leave their symbols_loaded flag clear.
07cd4b97
JB
692
693 If FROM_TTY is non-null, feel free to print messages about what
694 we're doing.
c906108c 695
07cd4b97
JB
696 If TARGET is non-null, add the sections of all new shared objects
697 to TARGET's section table. Note that this doesn't remove any
698 sections for shared objects that have been unloaded, and it
699 doesn't check to see if the new shared objects are already present in
700 the section table. But we only use this for core files and
701 processes we've just attached to, so that's okay. */
c906108c 702
a78f21af 703static void
105b175f 704update_solib_list (int from_tty, struct target_ops *target)
07cd4b97 705{
1cf3db46 706 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 707 struct so_list *inferior = ops->current_sos();
07cd4b97
JB
708 struct so_list *gdb, **gdb_link;
709
181e7f93
PA
710 /* We can reach here due to changing solib-search-path or the
711 sysroot, before having any inferior. */
50c71eaf 712 if (target_has_execution && !ptid_equal (inferior_ptid, null_ptid))
181e7f93
PA
713 {
714 struct inferior *inf = current_inferior ();
715
716 /* If we are attaching to a running process for which we
717 have not opened a symbol file, we may be able to get its
718 symbols now! */
719 if (inf->attach_flag && symfile_objfile == NULL)
720 catch_errors (ops->open_symbol_file_object, &from_tty,
721 "Error reading attached process's symbol file.\n",
722 RETURN_MASK_ALL);
723 }
104c1213 724
07cd4b97
JB
725 /* GDB and the inferior's dynamic linker each maintain their own
726 list of currently loaded shared objects; we want to bring the
727 former in sync with the latter. Scan both lists, seeing which
728 shared objects appear where. There are three cases:
729
730 - A shared object appears on both lists. This means that GDB
105b175f
JB
731 knows about it already, and it's still loaded in the inferior.
732 Nothing needs to happen.
07cd4b97
JB
733
734 - A shared object appears only on GDB's list. This means that
105b175f
JB
735 the inferior has unloaded it. We should remove the shared
736 object from GDB's tables.
07cd4b97
JB
737
738 - A shared object appears only on the inferior's list. This
105b175f
JB
739 means that it's just been loaded. We should add it to GDB's
740 tables.
07cd4b97
JB
741
742 So we walk GDB's list, checking each entry to see if it appears
743 in the inferior's list too. If it does, no action is needed, and
744 we remove it from the inferior's list. If it doesn't, the
745 inferior has unloaded it, and we remove it from GDB's list. By
746 the time we're done walking GDB's list, the inferior's list
747 contains only the new shared objects, which we then add. */
748
749 gdb = so_list_head;
750 gdb_link = &so_list_head;
751 while (gdb)
c906108c 752 {
07cd4b97
JB
753 struct so_list *i = inferior;
754 struct so_list **i_link = &inferior;
755
756 /* Check to see whether the shared object *gdb also appears in
757 the inferior's current list. */
758 while (i)
c906108c 759 {
a7c02bc8
VP
760 if (ops->same)
761 {
762 if (ops->same (gdb, i))
763 break;
764 }
765 else
766 {
767 if (! strcmp (gdb->so_original_name, i->so_original_name))
768 break;
769 }
07cd4b97
JB
770
771 i_link = &i->next;
772 i = *i_link;
c906108c 773 }
c5aa993b 774
07cd4b97
JB
775 /* If the shared object appears on the inferior's list too, then
776 it's still loaded, so we don't need to do anything. Delete
777 it from the inferior's list, and leave it on GDB's list. */
778 if (i)
c906108c 779 {
07cd4b97 780 *i_link = i->next;
07cd4b97
JB
781 free_so (i);
782 gdb_link = &gdb->next;
783 gdb = *gdb_link;
784 }
785
786 /* If it's not on the inferior's list, remove it from GDB's tables. */
787 else
788 {
42a6e6a0
MK
789 /* Notify any observer that the shared object has been
790 unloaded before we remove it from GDB's tables. */
84acb35a
JJ
791 observer_notify_solib_unloaded (gdb);
792
07cd4b97 793 *gdb_link = gdb->next;
07cd4b97
JB
794
795 /* Unless the user loaded it explicitly, free SO's objfile. */
e8930304 796 if (gdb->objfile && ! (gdb->objfile->flags & OBJF_USERLOADED))
07cd4b97
JB
797 free_objfile (gdb->objfile);
798
799 /* Some targets' section tables might be referring to
800 sections from so->abfd; remove them. */
801 remove_target_sections (gdb->abfd);
802
803 free_so (gdb);
804 gdb = *gdb_link;
c906108c
SS
805 }
806 }
c5aa993b 807
07cd4b97
JB
808 /* Now the inferior's list contains only shared objects that don't
809 appear in GDB's list --- those that are newly loaded. Add them
e8930304 810 to GDB's shared object list. */
07cd4b97 811 if (inferior)
c906108c 812 {
048d532d
PA
813 int not_found = 0;
814 const char *not_found_filename = NULL;
815
07cd4b97
JB
816 struct so_list *i;
817
818 /* Add the new shared objects to GDB's list. */
819 *gdb_link = inferior;
820
e8930304 821 /* Fill in the rest of each of the `struct so_list' nodes. */
07cd4b97 822 for (i = inferior; i; i = i->next)
c906108c 823 {
048d532d
PA
824 volatile struct gdb_exception e;
825
6c95b8df 826 i->pspace = current_program_space;
07cd4b97 827
048d532d
PA
828 TRY_CATCH (e, RETURN_MASK_ERROR)
829 {
830 /* Fill in the rest of the `struct so_list' node. */
831 if (!solib_map_sections (i))
832 {
833 not_found++;
834 if (not_found_filename == NULL)
835 not_found_filename = i->so_original_name;
836 }
837 }
07cd4b97 838
048d532d
PA
839 if (e.reason < 0)
840 exception_fprintf (gdb_stderr, e, _("\
841Error while mapping shared library sections:\n"));
42a6e6a0
MK
842
843 /* Notify any observer that the shared object has been
048d532d 844 loaded now that we've added it to GDB's tables. */
42a6e6a0 845 observer_notify_solib_loaded (i);
c906108c 846 }
048d532d
PA
847
848 /* If a library was not found, issue an appropriate warning
849 message. We have to use a single call to warning in case the
850 front end does something special with warnings, e.g., pop up
851 a dialog box. It Would Be Nice if we could get a "warning: "
852 prefix on each line in the CLI front end, though - it doesn't
853 stand out well. */
854
855 if (not_found == 1)
856 warning (_("\
857Could not load shared library symbols for %s.\n\
858Do you need \"set solib-search-path\" or \"set sysroot\"?"),
859 not_found_filename);
860 else if (not_found > 1)
861 warning (_("\
862Could not load shared library symbols for %d libraries, e.g. %s.\n\
863Use the \"info sharedlibrary\" command to see the complete listing.\n\
864Do you need \"set solib-search-path\" or \"set sysroot\"?"),
865 not_found, not_found_filename);
e8930304 866 }
105b175f
JB
867}
868
17a37d48
PP
869
870/* Return non-zero if NAME is the libpthread shared library.
6612ad7f
JB
871
872 Uses a fairly simplistic heuristic approach where we check
873 the file name against "/libpthread". This can lead to false
874 positives, but this should be good enough in practice. */
875
17a37d48
PP
876int
877libpthread_name_p (const char *name)
878{
879 return (strstr (name, "/libpthread") != NULL);
880}
881
882/* Return non-zero if SO is the libpthread shared library. */
883
6612ad7f
JB
884static int
885libpthread_solib_p (struct so_list *so)
886{
17a37d48 887 return libpthread_name_p (so->so_name);
6612ad7f 888}
105b175f
JB
889
890/* GLOBAL FUNCTION
891
892 solib_add -- read in symbol info for newly added shared libraries
893
894 SYNOPSIS
895
990f9fe3
FF
896 void solib_add (char *pattern, int from_tty, struct target_ops
897 *TARGET, int readsyms)
105b175f
JB
898
899 DESCRIPTION
900
901 Read in symbolic information for any shared objects whose names
902 match PATTERN. (If we've already read a shared object's symbol
903 info, leave it alone.) If PATTERN is zero, read them all.
904
990f9fe3
FF
905 If READSYMS is 0, defer reading symbolic information until later
906 but still do any needed low level processing.
907
105b175f
JB
908 FROM_TTY and TARGET are as described for update_solib_list, above. */
909
910void
990f9fe3 911solib_add (char *pattern, int from_tty, struct target_ops *target, int readsyms)
105b175f
JB
912{
913 struct so_list *gdb;
914
915 if (pattern)
916 {
917 char *re_err = re_comp (pattern);
918
919 if (re_err)
8a3fe4f8 920 error (_("Invalid regexp: %s"), re_err);
105b175f
JB
921 }
922
923 update_solib_list (from_tty, target);
c906108c 924
105b175f
JB
925 /* Walk the list of currently loaded shared libraries, and read
926 symbols for any that match the pattern --- or any whose symbols
927 aren't already loaded, if no pattern was given. */
e8930304
JB
928 {
929 int any_matches = 0;
930 int loaded_any_symbols = 0;
7eedccfa
PP
931 const int flags =
932 SYMFILE_DEFER_BP_RESET | (from_tty ? SYMFILE_VERBOSE : 0);
c906108c 933
e8930304
JB
934 for (gdb = so_list_head; gdb; gdb = gdb->next)
935 if (! pattern || re_exec (gdb->so_name))
936 {
6612ad7f
JB
937 /* Normally, we would read the symbols from that library
938 only if READSYMS is set. However, we're making a small
939 exception for the pthread library, because we sometimes
940 need the library symbols to be loaded in order to provide
941 thread support (x86-linux for instance). */
942 const int add_this_solib =
943 (readsyms || libpthread_solib_p (gdb));
944
e8930304 945 any_matches = 1;
a86988f2
PA
946 if (add_this_solib)
947 {
948 if (gdb->symbols_loaded)
949 {
950 /* If no pattern was given, be quiet for shared
951 libraries we have already loaded. */
952 if (pattern && (from_tty || info_verbose))
953 printf_unfiltered (_("Symbols already loaded for %s\n"),
954 gdb->so_name);
955 }
956 else if (solib_read_symbols (gdb, flags))
957 loaded_any_symbols = 1;
958 }
e8930304
JB
959 }
960
7eedccfa
PP
961 if (loaded_any_symbols)
962 breakpoint_re_set ();
963
e8930304
JB
964 if (from_tty && pattern && ! any_matches)
965 printf_unfiltered
966 ("No loaded shared libraries match the pattern `%s'.\n", pattern);
967
968 if (loaded_any_symbols)
969 {
1cf3db46 970 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 971
e8930304
JB
972 /* Getting new symbols may change our opinion about what is
973 frameless. */
974 reinit_frame_cache ();
975
66aba65d 976 ops->special_symbol_handling ();
e8930304
JB
977 }
978 }
c906108c
SS
979}
980
07cd4b97 981
c906108c
SS
982/*
983
c5aa993b 984 LOCAL FUNCTION
c906108c 985
c5aa993b 986 info_sharedlibrary_command -- code for "info sharedlibrary"
c906108c 987
c5aa993b 988 SYNOPSIS
c906108c 989
c5aa993b 990 static void info_sharedlibrary_command ()
c906108c 991
c5aa993b 992 DESCRIPTION
c906108c 993
c5aa993b 994 Walk through the shared library list and print information
55333a84
DE
995 about each attached library matching PATTERN. If PATTERN is elided,
996 print them all.
c5aa993b 997 */
c906108c
SS
998
999static void
55333a84 1000info_sharedlibrary_command (char *pattern, int from_tty)
c906108c 1001{
52f0bd74 1002 struct so_list *so = NULL; /* link map state variable */
c906108c 1003 int header_done = 0;
55333a84 1004 int so_missing_debug_info = 0;
c906108c 1005 int addr_width;
55333a84
DE
1006 int nr_libs;
1007 struct cleanup *table_cleanup;
1008 struct gdbarch *gdbarch = target_gdbarch;
1009
1010 if (pattern)
1011 {
1012 char *re_err = re_comp (pattern);
1013
1014 if (re_err)
1015 error (_("Invalid regexp: %s"), re_err);
1016 }
c906108c 1017
84eb3c4f 1018 /* "0x", a little whitespace, and two hex digits per byte of pointers. */
55333a84 1019 addr_width = 4 + (gdbarch_ptr_bit (gdbarch) / 4);
c906108c 1020
105b175f 1021 update_solib_list (from_tty, 0);
07cd4b97 1022
55333a84
DE
1023 /* make_cleanup_ui_out_table_begin_end needs to know the number of
1024 rows, so we need to make two passes over the libs. */
1025
1026 for (nr_libs = 0, so = so_list_head; so; so = so->next)
c906108c 1027 {
c5aa993b 1028 if (so->so_name[0])
c906108c 1029 {
55333a84
DE
1030 if (pattern && ! re_exec (so->so_name))
1031 continue;
1032 ++nr_libs;
1033 }
1034 }
1035
1036 table_cleanup =
1037 make_cleanup_ui_out_table_begin_end (uiout, 4, nr_libs,
1038 "SharedLibraryTable");
1039
1040 /* The "- 1" is because ui_out adds one space between columns. */
1041 ui_out_table_header (uiout, addr_width - 1, ui_left, "from", "From");
1042 ui_out_table_header (uiout, addr_width - 1, ui_left, "to", "To");
1043 ui_out_table_header (uiout, 12 - 1, ui_left, "syms-read", "Syms Read");
1044 ui_out_table_header (uiout, 0, ui_noalign,
1045 "name", "Shared Object Library");
1046
1047 ui_out_table_body (uiout);
1048
1049 for (so = so_list_head; so; so = so->next)
1050 {
1051 struct cleanup *lib_cleanup;
c906108c 1052
55333a84
DE
1053 if (! so->so_name[0])
1054 continue;
1055 if (pattern && ! re_exec (so->so_name))
1056 continue;
1057
1058 lib_cleanup = make_cleanup_ui_out_tuple_begin_end (uiout, "lib");
1059
1060 if (so->addr_high != 0)
1061 {
1062 ui_out_field_core_addr (uiout, "from", gdbarch, so->addr_low);
1063 ui_out_field_core_addr (uiout, "to", gdbarch, so->addr_high);
1064 }
1065 else
1066 {
1067 ui_out_field_skip (uiout, "from");
1068 ui_out_field_skip (uiout, "to");
c906108c 1069 }
55333a84
DE
1070
1071 if (! ui_out_is_mi_like_p (interp_ui_out (top_level_interpreter ()))
1072 && so->symbols_loaded
e0ae4240 1073 && !objfile_has_symbols (so->objfile))
55333a84
DE
1074 {
1075 so_missing_debug_info = 1;
1076 ui_out_field_string (uiout, "syms-read", "Yes (*)");
1077 }
1078 else
1079 ui_out_field_string (uiout, "syms-read",
1080 so->symbols_loaded ? "Yes" : "No");
1081
1082 ui_out_field_string (uiout, "name", so->so_name);
1083
1084 ui_out_text (uiout, "\n");
1085
1086 do_cleanups (lib_cleanup);
c906108c 1087 }
55333a84
DE
1088
1089 do_cleanups (table_cleanup);
1090
1091 if (nr_libs == 0)
1092 {
1093 if (pattern)
1094 ui_out_message (uiout, 0,
1095 _("No shared libraries matched.\n"));
1096 else
1097 ui_out_message (uiout, 0,
1098 _("No shared libraries loaded at this time.\n"));
1099 }
1100 else
c906108c 1101 {
55333a84
DE
1102 if (so_missing_debug_info)
1103 ui_out_message (uiout, 0,
1104 _("(*): Shared library is missing debugging information.\n"));
c906108c
SS
1105 }
1106}
1107
5fd1a349
PP
1108/* Return 1 if ADDRESS lies within SOLIB. */
1109
1110int
1111solib_contains_address_p (const struct so_list *const solib,
1112 CORE_ADDR address)
1113{
0542c86d 1114 struct target_section *p;
5fd1a349
PP
1115
1116 for (p = solib->sections; p < solib->sections_end; p++)
1117 if (p->addr <= address && address < p->endaddr)
1118 return 1;
1119
1120 return 0;
1121}
1122
c906108c
SS
1123/*
1124
c5aa993b 1125 GLOBAL FUNCTION
c906108c 1126
f5c9a895
PP
1127 solib_name_from_address -- if an address is in a shared lib, return
1128 its name.
c906108c 1129
c5aa993b 1130 SYNOPSIS
c906108c 1131
f5c9a895 1132 char * solib_name_from_address (CORE_ADDR address)
c906108c 1133
c5aa993b 1134 DESCRIPTION
c906108c 1135
c5aa993b
JM
1136 Provides a hook for other gdb routines to discover whether or
1137 not a particular address is within the mapped address space of
749499cb 1138 a shared library.
c906108c 1139
c5aa993b
JM
1140 For example, this routine is called at one point to disable
1141 breakpoints which are in shared libraries that are not currently
1142 mapped in.
c906108c
SS
1143 */
1144
1145char *
6c95b8df 1146solib_name_from_address (struct program_space *pspace, CORE_ADDR address)
c906108c 1147{
6c95b8df 1148 struct so_list *so = NULL;
c5aa993b 1149
6c95b8df 1150 for (so = pspace->so_list; so; so = so->next)
5fd1a349
PP
1151 if (solib_contains_address_p (so, address))
1152 return (so->so_name);
07cd4b97 1153
c906108c
SS
1154 return (0);
1155}
1156
de18c1d8
JM
1157/* Return whether the data starting at VADDR, size SIZE, must be kept
1158 in a core file for shared libraries loaded before "gcore" is used
1159 to be handled correctly when the core file is loaded. This only
1160 applies when the section would otherwise not be kept in the core
1161 file (in particular, for readonly sections). */
1162
1163int
1164solib_keep_data_in_core (CORE_ADDR vaddr, unsigned long size)
1165{
1166 struct target_so_ops *ops = solib_ops (target_gdbarch);
1167
1168 if (ops->keep_data_in_core)
1169 return ops->keep_data_in_core (vaddr, size);
1170 else
1171 return 0;
1172}
1173
c906108c
SS
1174/* Called by free_all_symtabs */
1175
c5aa993b 1176void
fba45db2 1177clear_solib (void)
c906108c 1178{
1cf3db46 1179 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 1180
085dd6e6
JM
1181 /* This function is expected to handle ELF shared libraries. It is
1182 also used on Solaris, which can run either ELF or a.out binaries
1183 (for compatibility with SunOS 4), both of which can use shared
1184 libraries. So we don't know whether we have an ELF executable or
1185 an a.out executable until the user chooses an executable file.
1186
1187 ELF shared libraries don't get mapped into the address space
1188 until after the program starts, so we'd better not try to insert
1189 breakpoints in them immediately. We have to wait until the
1190 dynamic linker has loaded them; we'll hit a bp_shlib_event
1191 breakpoint (look for calls to create_solib_event_breakpoint) when
1192 it's ready.
1193
1194 SunOS shared libraries seem to be different --- they're present
1195 as soon as the process begins execution, so there's no need to
1196 put off inserting breakpoints. There's also nowhere to put a
1197 bp_shlib_event breakpoint, so if we put it off, we'll never get
1198 around to it.
1199
1200 So: disable breakpoints only if we're using ELF shared libs. */
1201 if (exec_bfd != NULL
1202 && bfd_get_flavour (exec_bfd) != bfd_target_aout_flavour)
cb851954 1203 disable_breakpoints_in_shlibs ();
085dd6e6 1204
c906108c
SS
1205 while (so_list_head)
1206 {
07cd4b97
JB
1207 struct so_list *so = so_list_head;
1208 so_list_head = so->next;
c86cf029 1209 observer_notify_solib_unloaded (so);
2069d78d
KB
1210 if (so->abfd)
1211 remove_target_sections (so->abfd);
07cd4b97 1212 free_so (so);
c906108c 1213 }
07cd4b97 1214
66aba65d 1215 ops->clear_solib ();
c906108c
SS
1216}
1217
13437d4b 1218/* GLOBAL FUNCTION
c5aa993b
JM
1219
1220 solib_create_inferior_hook -- shared library startup support
1221
1222 SYNOPSIS
1223
268a4a75 1224 void solib_create_inferior_hook (int from_tty)
c5aa993b
JM
1225
1226 DESCRIPTION
1227
1228 When gdb starts up the inferior, it nurses it along (through the
1229 shell) until it is ready to execute it's first instruction. At this
1230 point, this function gets called via expansion of the macro
13437d4b 1231 SOLIB_CREATE_INFERIOR_HOOK. */
c5aa993b
JM
1232
1233void
268a4a75 1234solib_create_inferior_hook (int from_tty)
c906108c 1235{
1cf3db46 1236 struct target_so_ops *ops = solib_ops (target_gdbarch);
268a4a75 1237 ops->solib_create_inferior_hook (from_tty);
c906108c
SS
1238}
1239
d7fa2ae2
KB
1240/* GLOBAL FUNCTION
1241
1242 in_solib_dynsym_resolve_code -- check to see if an address is in
1243 dynamic loader's dynamic symbol
1244 resolution code
1245
1246 SYNOPSIS
1247
1248 int in_solib_dynsym_resolve_code (CORE_ADDR pc)
1249
1250 DESCRIPTION
1251
1252 Determine if PC is in the dynamic linker's symbol resolution
1253 code. Return 1 if so, 0 otherwise.
1254*/
1255
1256int
1257in_solib_dynsym_resolve_code (CORE_ADDR pc)
1258{
1cf3db46 1259 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 1260 return ops->in_dynsym_resolve_code (pc);
d7fa2ae2 1261}
c906108c
SS
1262
1263/*
1264
c5aa993b 1265 LOCAL FUNCTION
c906108c 1266
c5aa993b 1267 sharedlibrary_command -- handle command to explicitly add library
c906108c 1268
c5aa993b 1269 SYNOPSIS
c906108c 1270
c5aa993b 1271 static void sharedlibrary_command (char *args, int from_tty)
c906108c 1272
c5aa993b 1273 DESCRIPTION
c906108c 1274
c5aa993b 1275 */
c906108c
SS
1276
1277static void
fba45db2 1278sharedlibrary_command (char *args, int from_tty)
c906108c
SS
1279{
1280 dont_repeat ();
990f9fe3 1281 solib_add (args, from_tty, (struct target_ops *) 0, 1);
c906108c
SS
1282}
1283
cb0ba49e
MS
1284/* LOCAL FUNCTION
1285
1286 no_shared_libraries -- handle command to explicitly discard symbols
1287 from shared libraries.
1288
1289 DESCRIPTION
1290
1291 Implements the command "nosharedlibrary", which discards symbols
1292 that have been auto-loaded from shared libraries. Symbols from
1293 shared libraries that were added by explicit request of the user
1294 are not discarded. Also called from remote.c. */
1295
c60a7562
MS
1296void
1297no_shared_libraries (char *ignored, int from_tty)
1298{
a3247a22
PP
1299 /* The order of the two routines below is important: clear_solib notifies
1300 the solib_unloaded observers, and some of these observers might need
1301 access to their associated objfiles. Therefore, we can not purge the
1302 solibs' objfiles before clear_solib has been called. */
1303
615b9dba 1304 clear_solib ();
a3247a22 1305 objfile_purge_solibs ();
c60a7562 1306}
c906108c 1307
a86988f2
PA
1308/* Reload shared libraries, but avoid reloading the same symbol file
1309 we already have loaded. */
1310
1311static void
1312reload_shared_libraries_1 (int from_tty)
1313{
1314 struct so_list *so;
1315 struct cleanup *old_chain = make_cleanup (null_cleanup, NULL);
1316
1317 for (so = so_list_head; so != NULL; so = so->next)
1318 {
1319 char *filename, *found_pathname = NULL;
1320 bfd *abfd;
1321 int scratch_chan;
1322 int was_loaded = so->symbols_loaded;
1323 const int flags =
1324 SYMFILE_DEFER_BP_RESET | (from_tty ? SYMFILE_VERBOSE : 0);
1325
1326 filename = tilde_expand (so->so_original_name);
1327 abfd = solib_bfd_open (filename);
1328 if (abfd != NULL)
1329 {
1330 found_pathname = xstrdup (bfd_get_filename (abfd));
1331 make_cleanup (xfree, found_pathname);
1332 gdb_bfd_close_or_warn (abfd);
1333 }
1334
1335 /* If this shared library is no longer associated with its previous
1336 symbol file, close that. */
1337 if ((found_pathname == NULL && was_loaded)
1338 || (found_pathname != NULL
1339 && strcmp (found_pathname, so->so_name) != 0))
1340 {
1341 if (so->objfile && ! (so->objfile->flags & OBJF_USERLOADED))
1342 free_objfile (so->objfile);
1343 remove_target_sections (so->abfd);
1344 free_so_symbols (so);
1345 }
1346
1347 /* If this shared library is now associated with a new symbol
1348 file, open it. */
1349 if (found_pathname != NULL
1350 && (!was_loaded
1351 || strcmp (found_pathname, so->so_name) != 0))
1352 {
1353 volatile struct gdb_exception e;
1354
1355 TRY_CATCH (e, RETURN_MASK_ERROR)
1356 solib_map_sections (so);
1357
1358 if (e.reason < 0)
1359 exception_fprintf (gdb_stderr, e, _("\
1360Error while mapping shared library sections:\n"));
1361 else if (auto_solib_add || was_loaded || libpthread_solib_p (so))
1362 solib_read_symbols (so, flags);
1363 }
1364 }
1365
1366 do_cleanups (old_chain);
1367}
1368
cf466558 1369static void
f397e303
AC
1370reload_shared_libraries (char *ignored, int from_tty,
1371 struct cmd_list_element *e)
cf466558 1372{
a86988f2
PA
1373 struct target_so_ops *ops;
1374
1375 reload_shared_libraries_1 (from_tty);
1376
1377 ops = solib_ops (target_gdbarch);
1378
c8fa6cdd
VP
1379 /* Creating inferior hooks here has two purposes. First, if we reload
1380 shared libraries then the address of solib breakpoint we've computed
1381 previously might be no longer valid. For example, if we forgot to set
1382 solib-absolute-prefix and are setting it right now, then the previous
1383 breakpoint address is plain wrong. Second, installing solib hooks
1384 also implicitly figures were ld.so is and loads symbols for it.
1385 Absent this call, if we've just connected to a target and set
1386 solib-absolute-prefix or solib-search-path, we'll lose all information
1387 about ld.so. */
1388 if (target_has_execution)
1389 {
a86988f2
PA
1390 /* Reset or free private data structures not associated with
1391 so_list entries. */
1392 ops->clear_solib ();
1393
1394 /* Remove any previous solib event breakpoint. This is usually
1395 done in common code, at breakpoint_init_inferior time, but
1396 we're not really starting up the inferior here. */
1397 remove_solib_event_breakpoints ();
1398
c8fa6cdd
VP
1399#ifdef SOLIB_CREATE_INFERIOR_HOOK
1400 SOLIB_CREATE_INFERIOR_HOOK (PIDGET (inferior_ptid));
1401#else
268a4a75 1402 solib_create_inferior_hook (from_tty);
c8fa6cdd
VP
1403#endif
1404 }
268a4a75
JK
1405
1406 /* Sometimes the platform-specific hook loads initial shared
1407 libraries, and sometimes it doesn't. If it doesn't FROM_TTY will be
1408 incorrectly 0 but such solib targets should be fixed anyway. If we
1409 made all the inferior hook methods consistent, this call could be
1410 removed. Call it only after the solib target has been initialized by
1411 solib_create_inferior_hook. */
1412
1413 solib_add (NULL, 0, NULL, auto_solib_add);
1414
a86988f2
PA
1415 breakpoint_re_set ();
1416
1417 /* We may have loaded or unloaded debug info for some (or all)
1418 shared libraries. However, frames may still reference them. For
1419 example, a frame's unwinder might still point at DWARF FDE
1420 structures that are now freed. Also, getting new symbols may
1421 change our opinion about what is frameless. */
c8fa6cdd 1422 reinit_frame_cache ();
a86988f2
PA
1423
1424 ops->special_symbol_handling ();
cf466558
KB
1425}
1426
920d2a44
AC
1427static void
1428show_auto_solib_add (struct ui_file *file, int from_tty,
1429 struct cmd_list_element *c, const char *value)
1430{
1431 fprintf_filtered (file, _("Autoloading of shared library symbols is %s.\n"),
1432 value);
1433}
1434
1435
3a40aaa0
UW
1436/* Handler for library-specific lookup of global symbol NAME in OBJFILE. Call
1437 the library-specific handler if it is installed for the current target. */
1438
1439struct symbol *
1440solib_global_lookup (const struct objfile *objfile,
1441 const char *name,
21b556f4 1442 const domain_enum domain)
3a40aaa0 1443{
1cf3db46 1444 struct target_so_ops *ops = solib_ops (target_gdbarch);
3a40aaa0 1445
e8a92f7b 1446 if (ops->lookup_lib_global_symbol != NULL)
94af9270 1447 return ops->lookup_lib_global_symbol (objfile, name, domain);
3a40aaa0
UW
1448 return NULL;
1449}
1450
1451
a78f21af
AC
1452extern initialize_file_ftype _initialize_solib; /* -Wmissing-prototypes */
1453
c906108c 1454void
fba45db2 1455_initialize_solib (void)
c906108c 1456{
fa58ee11
EZ
1457 struct cmd_list_element *c;
1458
66aba65d
MK
1459 solib_data = gdbarch_data_register_pre_init (solib_init);
1460
c906108c 1461 add_com ("sharedlibrary", class_files, sharedlibrary_command,
1bedd215 1462 _("Load shared object library symbols for files matching REGEXP."));
c5aa993b 1463 add_info ("sharedlibrary", info_sharedlibrary_command,
1bedd215 1464 _("Status of loaded shared object libraries."));
c60a7562 1465 add_com ("nosharedlibrary", class_files, no_shared_libraries,
1bedd215 1466 _("Unload all shared object library symbols."));
c906108c 1467
5bf193a2
AC
1468 add_setshow_boolean_cmd ("auto-solib-add", class_support,
1469 &auto_solib_add, _("\
1470Set autoloading of shared library symbols."), _("\
1471Show autoloading of shared library symbols."), _("\
b7209cb4
FF
1472If \"on\", symbols from all shared object libraries will be loaded\n\
1473automatically when the inferior begins execution, when the dynamic linker\n\
1474informs gdb that a new library has been loaded, or when attaching to the\n\
5bf193a2
AC
1475inferior. Otherwise, symbols must be loaded manually, using `sharedlibrary'."),
1476 NULL,
920d2a44 1477 show_auto_solib_add,
5bf193a2 1478 &setlist, &showlist);
c906108c 1479
f822c95b
DJ
1480 add_setshow_filename_cmd ("sysroot", class_support,
1481 &gdb_sysroot, _("\
1482Set an alternate system root."), _("\
1483Show the current system root."), _("\
1484The system root is used to load absolute shared library symbol files.\n\
1485For other (relative) files, you can add directories using\n\
1486`set solib-search-path'."),
f397e303
AC
1487 reload_shared_libraries,
1488 NULL,
1489 &setlist, &showlist);
c906108c 1490
f822c95b
DJ
1491 add_alias_cmd ("solib-absolute-prefix", "sysroot", class_support, 0,
1492 &setlist);
1493 add_alias_cmd ("solib-absolute-prefix", "sysroot", class_support, 0,
1494 &showlist);
030292b7 1495
525226b5
AC
1496 add_setshow_optional_filename_cmd ("solib-search-path", class_support,
1497 &solib_search_path, _("\
1498Set the search path for loading non-absolute shared library symbol files."), _("\
1499Show the search path for loading non-absolute shared library symbol files."), _("\
1500This takes precedence over the environment variables PATH and LD_LIBRARY_PATH."),
1501 reload_shared_libraries,
920d2a44 1502 show_solib_search_path,
525226b5 1503 &setlist, &showlist);
c906108c 1504}
This page took 1.042475 seconds and 4 git commands to generate.