]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/solib.c
* win32-low.c (win32_add_one_solib): If the dll name is
[thirdparty/binutils-gdb.git] / gdb / solib.c
CommitLineData
13437d4b 1/* Handle shared libraries for GDB, the GNU Debugger.
14a5e767 2
6aba47ca 3 Copyright (C) 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999,
0fb0cc75 4 2000, 2001, 2002, 2003, 2005, 2006, 2007, 2008, 2009
9b254dd1 5 Free Software Foundation, Inc.
c906108c 6
c5aa993b 7 This file is part of GDB.
c906108c 8
c5aa993b
JM
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
a9762ec7 11 the Free Software Foundation; either version 3 of the License, or
c5aa993b 12 (at your option) any later version.
c906108c 13
c5aa993b
JM
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License
a9762ec7 20 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c 21
c906108c
SS
22#include "defs.h"
23
c906108c 24#include <sys/types.h>
c906108c 25#include <fcntl.h>
13437d4b 26#include "gdb_string.h"
c906108c
SS
27#include "symtab.h"
28#include "bfd.h"
29#include "symfile.h"
30#include "objfiles.h"
60250e8b 31#include "exceptions.h"
c906108c
SS
32#include "gdbcore.h"
33#include "command.h"
34#include "target.h"
35#include "frame.h"
88987551 36#include "gdb_regex.h"
c906108c
SS
37#include "inferior.h"
38#include "environ.h"
39#include "language.h"
40#include "gdbcmd.h"
fa58ee11 41#include "completer.h"
fe4e3eb8 42#include "filenames.h" /* for DOSish file names */
4646aa9d 43#include "exec.h"
13437d4b 44#include "solist.h"
84acb35a 45#include "observer.h"
dbda9972 46#include "readline/readline.h"
f1838a98 47#include "remote.h"
2c0b251b 48#include "solib.h"
55333a84 49#include "interps.h"
c906108c 50
66aba65d
MK
51/* Architecture-specific operations. */
52
53/* Per-architecture data key. */
54static struct gdbarch_data *solib_data;
55
56static void *
57solib_init (struct obstack *obstack)
58{
59 struct target_so_ops **ops;
60
61 ops = OBSTACK_ZALLOC (obstack, struct target_so_ops *);
62 *ops = current_target_so_ops;
63 return ops;
64}
65
66static struct target_so_ops *
67solib_ops (struct gdbarch *gdbarch)
68{
69 struct target_so_ops **ops = gdbarch_data (gdbarch, solib_data);
70 return *ops;
71}
7d522c90
DJ
72
73/* Set the solib operations for GDBARCH to NEW_OPS. */
74
75void
76set_solib_ops (struct gdbarch *gdbarch, struct target_so_ops *new_ops)
77{
78 struct target_so_ops **ops = gdbarch_data (gdbarch, solib_data);
79 *ops = new_ops;
80}
66aba65d
MK
81\f
82
13437d4b 83/* external data declarations */
c906108c 84
7d522c90
DJ
85/* FIXME: gdbarch needs to control this variable, or else every
86 configuration needs to call set_solib_ops. */
13437d4b 87struct target_so_ops *current_target_so_ops;
23e04971 88
6c95b8df
PA
89/* List of known shared objects */
90#define so_list_head current_program_space->so_list
23e04971 91
c906108c
SS
92/* Local function prototypes */
93
c906108c
SS
94/* If non-empty, this is a search path for loading non-absolute shared library
95 symbol files. This takes precedence over the environment variables PATH
96 and LD_LIBRARY_PATH. */
97static char *solib_search_path = NULL;
920d2a44
AC
98static void
99show_solib_search_path (struct ui_file *file, int from_tty,
100 struct cmd_list_element *c, const char *value)
101{
102 fprintf_filtered (file, _("\
103The search path for loading non-absolute shared library symbol files is %s.\n"),
104 value);
105}
c906108c 106
e4f7b8c8
MS
107/*
108
109 GLOBAL FUNCTION
110
572d275c 111 solib_find -- Find a shared library file.
e4f7b8c8
MS
112
113 SYNOPSIS
114
572d275c 115 char *solib_find (char *in_pathname, int *fd);
e4f7b8c8
MS
116
117 DESCRIPTION
118
f822c95b 119 Global variable GDB_SYSROOT is used as a prefix directory
e4f7b8c8
MS
120 to search for shared libraries if they have an absolute path.
121
122 Global variable SOLIB_SEARCH_PATH is used as a prefix directory
123 (or set of directories, as in LD_LIBRARY_PATH) to search for all
f822c95b 124 shared libraries if not found in GDB_SYSROOT.
e4f7b8c8 125
c8c18e65 126 Search algorithm:
f822c95b
DJ
127 * If there is a gdb_sysroot and path is absolute:
128 * Search for gdb_sysroot/path.
c8c18e65
KW
129 * else
130 * Look for it literally (unmodified).
e4f7b8c8 131 * Look in SOLIB_SEARCH_PATH.
f43caff8 132 * If available, use target defined search function.
f822c95b 133 * If gdb_sysroot is NOT set, perform the following two searches:
c8c18e65
KW
134 * Look in inferior's $PATH.
135 * Look in inferior's $LD_LIBRARY_PATH.
136 *
137 * The last check avoids doing this search when targetting remote
f822c95b 138 * machines since gdb_sysroot will almost always be set.
e4f7b8c8
MS
139
140 RETURNS
b21f0843 141
572d275c
UW
142 Full pathname of the shared library file, or NULL if not found.
143 (The pathname is malloc'ed; it needs to be freed by the caller.)
144 *FD is set to either -1 or an open file handle for the library. */
e4f7b8c8 145
572d275c
UW
146char *
147solib_find (char *in_pathname, int *fd)
e4f7b8c8 148{
1cf3db46 149 struct target_so_ops *ops = solib_ops (target_gdbarch);
e4f7b8c8
MS
150 int found_file = -1;
151 char *temp_pathname = NULL;
f822c95b 152 int gdb_sysroot_is_empty;
58dc52c3 153
f822c95b 154 gdb_sysroot_is_empty = (gdb_sysroot == NULL || *gdb_sysroot == 0);
e4f7b8c8 155
f822c95b 156 if (! IS_ABSOLUTE_PATH (in_pathname) || gdb_sysroot_is_empty)
f1d10cfb
AS
157 temp_pathname = in_pathname;
158 else
e4f7b8c8 159 {
f822c95b 160 int prefix_len = strlen (gdb_sysroot);
f1d10cfb
AS
161
162 /* Remove trailing slashes from absolute prefix. */
163 while (prefix_len > 0
f822c95b 164 && IS_DIR_SEPARATOR (gdb_sysroot[prefix_len - 1]))
f1d10cfb
AS
165 prefix_len--;
166
167 /* Cat the prefixed pathname together. */
168 temp_pathname = alloca (prefix_len + strlen (in_pathname) + 1);
f822c95b 169 strncpy (temp_pathname, gdb_sysroot, prefix_len);
f1d10cfb
AS
170 temp_pathname[prefix_len] = '\0';
171 strcat (temp_pathname, in_pathname);
e4f7b8c8
MS
172 }
173
f1838a98
UW
174 /* Handle remote files. */
175 if (remote_filename_p (temp_pathname))
176 {
572d275c
UW
177 *fd = -1;
178 return xstrdup (temp_pathname);
f1838a98
UW
179 }
180
f1d10cfb
AS
181 /* Now see if we can open it. */
182 found_file = open (temp_pathname, O_RDONLY | O_BINARY, 0);
183
0997b535
MS
184 /* We try to find the library in various ways. After each attempt
185 (except for the one above), either found_file >= 0 and
186 temp_pathname is a malloc'd string, or found_file < 0 and
187 temp_pathname does not point to storage that needs to be
188 freed. */
189
190 if (found_file < 0)
191 temp_pathname = NULL;
192 else
193 temp_pathname = xstrdup (temp_pathname);
194
f822c95b 195 /* If the search in gdb_sysroot failed, and the path name is
ba5f0d88
OF
196 absolute at this point, make it relative. (openp will try and open the
197 file according to its absolute path otherwise, which is not what we want.)
198 Affects subsequent searches for this solib. */
199 if (found_file < 0 && IS_ABSOLUTE_PATH (in_pathname))
200 {
201 /* First, get rid of any drive letters etc. */
202 while (!IS_DIR_SEPARATOR (*in_pathname))
203 in_pathname++;
204
205 /* Next, get rid of all leading dir separators. */
206 while (IS_DIR_SEPARATOR (*in_pathname))
207 in_pathname++;
208 }
209
c8c18e65 210 /* If not found, search the solib_search_path (if any). */
e4f7b8c8 211 if (found_file < 0 && solib_search_path != NULL)
014d698b 212 found_file = openp (solib_search_path, OPF_TRY_CWD_FIRST,
fbdebf46 213 in_pathname, O_RDONLY | O_BINARY, &temp_pathname);
ba5f0d88
OF
214
215 /* If not found, next search the solib_search_path (if any) for the basename
216 only (ignoring the path). This is to allow reading solibs from a path
217 that differs from the opened path. */
218 if (found_file < 0 && solib_search_path != NULL)
014d698b 219 found_file = openp (solib_search_path, OPF_TRY_CWD_FIRST,
fbdebf46 220 lbasename (in_pathname), O_RDONLY | O_BINARY,
ba5f0d88 221 &temp_pathname);
e4f7b8c8 222
2610b0bf 223 /* If not found, try to use target supplied solib search method */
66aba65d 224 if (found_file < 0 && ops->find_and_open_solib)
637d6690 225 found_file = ops->find_and_open_solib (in_pathname, O_RDONLY | O_BINARY,
66aba65d 226 &temp_pathname);
2610b0bf 227
e4f7b8c8 228 /* If not found, next search the inferior's $PATH environment variable. */
f822c95b 229 if (found_file < 0 && gdb_sysroot_is_empty)
e4f7b8c8 230 found_file = openp (get_in_environ (inferior_environ, "PATH"),
fbdebf46 231 OPF_TRY_CWD_FIRST, in_pathname, O_RDONLY | O_BINARY,
014d698b 232 &temp_pathname);
e4f7b8c8
MS
233
234 /* If not found, next search the inferior's $LD_LIBRARY_PATH
235 environment variable. */
f822c95b 236 if (found_file < 0 && gdb_sysroot_is_empty)
e4f7b8c8 237 found_file = openp (get_in_environ (inferior_environ, "LD_LIBRARY_PATH"),
fbdebf46 238 OPF_TRY_CWD_FIRST, in_pathname, O_RDONLY | O_BINARY,
014d698b 239 &temp_pathname);
e4f7b8c8 240
572d275c
UW
241 *fd = found_file;
242 return temp_pathname;
243}
244
245/* Open and return a BFD for the shared library PATHNAME. If FD is not -1,
246 it is used as file handle to open the file. Throws an error if the file
247 could not be opened. Handles both local and remote file access.
248
249 PATHNAME must be malloc'ed by the caller. If successful, the new BFD's
250 name will point to it. If unsuccessful, PATHNAME will be freed and the
251 FD will be closed (unless FD was -1). */
252
253bfd *
254solib_bfd_fopen (char *pathname, int fd)
255{
256 bfd *abfd;
257
258 if (remote_filename_p (pathname))
259 {
260 gdb_assert (fd == -1);
261 abfd = remote_bfd_open (pathname, gnutarget);
262 }
263 else
264 {
265 abfd = bfd_fopen (pathname, gnutarget, FOPEN_RB, fd);
266
267 if (abfd)
268 bfd_set_cacheable (abfd, 1);
269 else if (fd != -1)
270 close (fd);
271 }
f1838a98 272
f1838a98
UW
273 if (!abfd)
274 {
572d275c 275 make_cleanup (xfree, pathname);
f1838a98 276 error (_("Could not open `%s' as an executable file: %s"),
572d275c 277 pathname, bfd_errmsg (bfd_get_error ()));
f1838a98
UW
278 }
279
572d275c
UW
280 return abfd;
281}
282
283/* Find shared library PATHNAME and open a BFD for it. */
284
285bfd *
286solib_bfd_open (char *pathname)
287{
572d275c
UW
288 char *found_pathname;
289 int found_file;
290 bfd *abfd;
378d2b72 291 const struct bfd_arch_info *b;
572d275c 292
572d275c
UW
293 /* Search for shared library file. */
294 found_pathname = solib_find (pathname, &found_file);
295 if (found_pathname == NULL)
296 perror_with_name (pathname);
297
298 /* Open bfd for shared library. */
299 abfd = solib_bfd_fopen (found_pathname, found_file);
300
301 /* Check bfd format. */
f1838a98 302 if (!bfd_check_format (abfd, bfd_object))
0997b535 303 {
f1838a98 304 bfd_close (abfd);
572d275c 305 make_cleanup (xfree, found_pathname);
f1838a98 306 error (_("`%s': not in executable format: %s"),
572d275c 307 found_pathname, bfd_errmsg (bfd_get_error ()));
0997b535 308 }
f1838a98 309
378d2b72
HZ
310 /* Check bfd arch. */
311 b = gdbarch_bfd_arch_info (target_gdbarch);
69e2bf17 312 if (!b->compatible (b, bfd_get_arch_info (abfd)))
378d2b72
HZ
313 warning (_("`%s': Shared library architecture %s is not compatible "
314 "with target architecture %s."), found_pathname,
315 bfd_get_arch_info (abfd)->printable_name, b->printable_name);
316
f1838a98 317 return abfd;
e4f7b8c8
MS
318}
319
320
c906108c
SS
321/*
322
c5aa993b 323 LOCAL FUNCTION
c906108c 324
c5aa993b 325 solib_map_sections -- open bfd and build sections for shared lib
c906108c 326
c5aa993b 327 SYNOPSIS
c906108c 328
c5aa993b 329 static int solib_map_sections (struct so_list *so)
c906108c 330
c5aa993b 331 DESCRIPTION
c906108c 332
c5aa993b
JM
333 Given a pointer to one of the shared objects in our list
334 of mapped objects, use the recorded name to open a bfd
335 descriptor for the object, build a section table, and then
336 relocate all the section addresses by the base address at
337 which the shared object was mapped.
c906108c 338
c5aa993b 339 FIXMES
c906108c 340
c5aa993b
JM
341 In most (all?) cases the shared object file name recorded in the
342 dynamic linkage tables will be a fully qualified pathname. For
343 cases where it isn't, do we really mimic the systems search
344 mechanism correctly in the below code (particularly the tilde
345 expansion stuff?).
c906108c
SS
346 */
347
348static int
4efb68b1 349solib_map_sections (void *arg)
c906108c
SS
350{
351 struct so_list *so = (struct so_list *) arg; /* catch_errors bogon */
831a0c44 352 struct target_so_ops *ops = solib_ops (target_gdbarch);
c906108c 353 char *filename;
0542c86d 354 struct target_section *p;
c906108c
SS
355 struct cleanup *old_chain;
356 bfd *abfd;
c5aa993b
JM
357
358 filename = tilde_expand (so->so_name);
b8c9b27d 359 old_chain = make_cleanup (xfree, filename);
831a0c44 360 abfd = ops->bfd_open (filename);
f1838a98 361 do_cleanups (old_chain);
e4f7b8c8 362
13437d4b 363 /* Leave bfd open, core_xfer_memory and "info files" need it. */
3db741ef 364 so->abfd = gdb_bfd_ref (abfd);
23e04971 365
e4f7b8c8
MS
366 /* copy full path name into so_name, so that later symbol_file_add
367 can find it */
f1838a98
UW
368 if (strlen (bfd_get_filename (abfd)) >= SO_NAME_MAX_PATH_SIZE)
369 error (_("Shared library file name is too long."));
370 strcpy (so->so_name, bfd_get_filename (abfd));
23e04971 371
13437d4b 372 if (build_section_table (abfd, &so->sections, &so->sections_end))
23e04971 373 {
8a3fe4f8 374 error (_("Can't find the file sections in `%s': %s"),
13437d4b 375 bfd_get_filename (abfd), bfd_errmsg (bfd_get_error ()));
23e04971 376 }
104c1213 377
13437d4b 378 for (p = so->sections; p < so->sections_end; p++)
104c1213 379 {
13437d4b
KB
380 /* Relocate the section binding addresses as recorded in the shared
381 object's file by the base address to which the object was actually
382 mapped. */
66aba65d 383 ops->relocate_section_addresses (so, p);
cfa9d6d9
DJ
384
385 /* If the target didn't provide information about the address
386 range of the shared object, assume we want the location of
387 the .text section. */
388 if (so->addr_low == 0 && so->addr_high == 0
389 && strcmp (p->the_bfd_section->name, ".text") == 0)
13437d4b 390 {
cfa9d6d9
DJ
391 so->addr_low = p->addr;
392 so->addr_high = p->endaddr;
13437d4b 393 }
104c1213
JM
394 }
395
13437d4b 396 return (1);
104c1213 397}
c906108c 398
07cd4b97 399/* LOCAL FUNCTION
c906108c 400
07cd4b97 401 free_so --- free a `struct so_list' object
c906108c 402
c5aa993b 403 SYNOPSIS
c906108c 404
07cd4b97 405 void free_so (struct so_list *so)
c906108c 406
c5aa993b 407 DESCRIPTION
c906108c 408
07cd4b97
JB
409 Free the storage associated with the `struct so_list' object SO.
410 If we have opened a BFD for SO, close it.
c906108c 411
07cd4b97
JB
412 The caller is responsible for removing SO from whatever list it is
413 a member of. If we have placed SO's sections in some target's
414 section table, the caller is responsible for removing them.
c906108c 415
07cd4b97
JB
416 This function doesn't mess with objfiles at all. If there is an
417 objfile associated with SO that needs to be removed, the caller is
418 responsible for taking care of that. */
419
13437d4b 420void
07cd4b97 421free_so (struct so_list *so)
c906108c 422{
1cf3db46 423 struct target_so_ops *ops = solib_ops (target_gdbarch);
c5aa993b 424
07cd4b97 425 if (so->sections)
b8c9b27d 426 xfree (so->sections);
07cd4b97 427
e3c69974 428 gdb_bfd_unref (so->abfd);
07cd4b97 429
66aba65d 430 ops->free_so (so);
07cd4b97 431
b8c9b27d 432 xfree (so);
c906108c
SS
433}
434
07cd4b97 435
f8766ec1
KB
436/* Return address of first so_list entry in master shared object list. */
437struct so_list *
438master_so_list (void)
439{
440 return so_list_head;
441}
442
7eedccfa
PP
443static void
444symbol_add_stub (struct so_list *so, int flags)
c906108c 445{
62557bbc 446 struct section_addr_info *sap;
c906108c 447
07cd4b97
JB
448 /* Have we already loaded this shared object? */
449 ALL_OBJFILES (so->objfile)
450 {
451 if (strcmp (so->objfile->name, so->so_name) == 0)
7eedccfa 452 return;
07cd4b97
JB
453 }
454
62557bbc
KB
455 sap = build_section_addr_info_from_section_table (so->sections,
456 so->sections_end);
e7cf9df1 457
e3c69974 458 so->objfile = symbol_file_add_from_bfd (so->abfd, flags, sap, OBJF_SHARED);
62557bbc 459 free_section_addr_info (sap);
c906108c 460
7eedccfa 461 return;
c906108c
SS
462}
463
7eedccfa
PP
464/* Read in symbols for shared object SO. If SYMFILE_VERBOSE is set in FLAGS,
465 be chatty about it. Return non-zero if any symbols were actually
42a6e6a0
MK
466 loaded. */
467
468int
7eedccfa 469solib_read_symbols (struct so_list *so, int flags)
42a6e6a0 470{
7eedccfa
PP
471 const int from_tty = flags & SYMFILE_VERBOSE;
472
42a6e6a0
MK
473 if (so->symbols_loaded)
474 {
55333a84 475 if (from_tty || info_verbose)
a3f17187 476 printf_unfiltered (_("Symbols already loaded for %s\n"), so->so_name);
42a6e6a0 477 }
8bb75286
DJ
478 else if (so->abfd == NULL)
479 {
55333a84 480 if (from_tty || info_verbose)
8bb75286
DJ
481 printf_unfiltered (_("Symbol file not found for %s\n"), so->so_name);
482 }
42a6e6a0
MK
483 else
484 {
7eedccfa
PP
485 volatile struct gdb_exception exception;
486 TRY_CATCH (exception, RETURN_MASK_ALL)
487 {
488 symbol_add_stub (so, flags);
489 }
490 if (exception.reason != 0)
491 {
492 exception_fprintf (gdb_stderr, exception,
493 "Error while reading shared library symbols:\n");
494 return 0;
495 }
55333a84 496 if (from_tty || info_verbose)
7eedccfa
PP
497 printf_unfiltered (_("Loaded symbols for %s\n"), so->so_name);
498 so->symbols_loaded = 1;
499 return 1;
42a6e6a0
MK
500 }
501
502 return 0;
503}
c906108c 504
07cd4b97 505/* LOCAL FUNCTION
c906108c 506
105b175f 507 update_solib_list --- synchronize GDB's shared object list with inferior's
c906108c 508
c5aa993b 509 SYNOPSIS
c906108c 510
105b175f 511 void update_solib_list (int from_tty, struct target_ops *TARGET)
c906108c 512
07cd4b97 513 Extract the list of currently loaded shared objects from the
105b175f
JB
514 inferior, and compare it with the list of shared objects currently
515 in GDB's so_list_head list. Edit so_list_head to bring it in sync
516 with the inferior's new list.
c906108c 517
105b175f
JB
518 If we notice that the inferior has unloaded some shared objects,
519 free any symbolic info GDB had read about those shared objects.
520
521 Don't load symbolic info for any new shared objects; just add them
522 to the list, and leave their symbols_loaded flag clear.
07cd4b97
JB
523
524 If FROM_TTY is non-null, feel free to print messages about what
525 we're doing.
c906108c 526
07cd4b97
JB
527 If TARGET is non-null, add the sections of all new shared objects
528 to TARGET's section table. Note that this doesn't remove any
529 sections for shared objects that have been unloaded, and it
530 doesn't check to see if the new shared objects are already present in
531 the section table. But we only use this for core files and
532 processes we've just attached to, so that's okay. */
c906108c 533
a78f21af 534static void
105b175f 535update_solib_list (int from_tty, struct target_ops *target)
07cd4b97 536{
1cf3db46 537 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 538 struct so_list *inferior = ops->current_sos();
07cd4b97
JB
539 struct so_list *gdb, **gdb_link;
540
181e7f93
PA
541 /* We can reach here due to changing solib-search-path or the
542 sysroot, before having any inferior. */
50c71eaf 543 if (target_has_execution && !ptid_equal (inferior_ptid, null_ptid))
181e7f93
PA
544 {
545 struct inferior *inf = current_inferior ();
546
547 /* If we are attaching to a running process for which we
548 have not opened a symbol file, we may be able to get its
549 symbols now! */
550 if (inf->attach_flag && symfile_objfile == NULL)
551 catch_errors (ops->open_symbol_file_object, &from_tty,
552 "Error reading attached process's symbol file.\n",
553 RETURN_MASK_ALL);
554 }
104c1213 555
07cd4b97
JB
556 /* GDB and the inferior's dynamic linker each maintain their own
557 list of currently loaded shared objects; we want to bring the
558 former in sync with the latter. Scan both lists, seeing which
559 shared objects appear where. There are three cases:
560
561 - A shared object appears on both lists. This means that GDB
105b175f
JB
562 knows about it already, and it's still loaded in the inferior.
563 Nothing needs to happen.
07cd4b97
JB
564
565 - A shared object appears only on GDB's list. This means that
105b175f
JB
566 the inferior has unloaded it. We should remove the shared
567 object from GDB's tables.
07cd4b97
JB
568
569 - A shared object appears only on the inferior's list. This
105b175f
JB
570 means that it's just been loaded. We should add it to GDB's
571 tables.
07cd4b97
JB
572
573 So we walk GDB's list, checking each entry to see if it appears
574 in the inferior's list too. If it does, no action is needed, and
575 we remove it from the inferior's list. If it doesn't, the
576 inferior has unloaded it, and we remove it from GDB's list. By
577 the time we're done walking GDB's list, the inferior's list
578 contains only the new shared objects, which we then add. */
579
580 gdb = so_list_head;
581 gdb_link = &so_list_head;
582 while (gdb)
c906108c 583 {
07cd4b97
JB
584 struct so_list *i = inferior;
585 struct so_list **i_link = &inferior;
586
587 /* Check to see whether the shared object *gdb also appears in
588 the inferior's current list. */
589 while (i)
c906108c 590 {
a7c02bc8
VP
591 if (ops->same)
592 {
593 if (ops->same (gdb, i))
594 break;
595 }
596 else
597 {
598 if (! strcmp (gdb->so_original_name, i->so_original_name))
599 break;
600 }
07cd4b97
JB
601
602 i_link = &i->next;
603 i = *i_link;
c906108c 604 }
c5aa993b 605
07cd4b97
JB
606 /* If the shared object appears on the inferior's list too, then
607 it's still loaded, so we don't need to do anything. Delete
608 it from the inferior's list, and leave it on GDB's list. */
609 if (i)
c906108c 610 {
07cd4b97 611 *i_link = i->next;
07cd4b97
JB
612 free_so (i);
613 gdb_link = &gdb->next;
614 gdb = *gdb_link;
615 }
616
617 /* If it's not on the inferior's list, remove it from GDB's tables. */
618 else
619 {
42a6e6a0
MK
620 /* Notify any observer that the shared object has been
621 unloaded before we remove it from GDB's tables. */
84acb35a
JJ
622 observer_notify_solib_unloaded (gdb);
623
07cd4b97 624 *gdb_link = gdb->next;
07cd4b97
JB
625
626 /* Unless the user loaded it explicitly, free SO's objfile. */
e8930304 627 if (gdb->objfile && ! (gdb->objfile->flags & OBJF_USERLOADED))
07cd4b97
JB
628 free_objfile (gdb->objfile);
629
630 /* Some targets' section tables might be referring to
631 sections from so->abfd; remove them. */
632 remove_target_sections (gdb->abfd);
633
634 free_so (gdb);
635 gdb = *gdb_link;
c906108c
SS
636 }
637 }
c5aa993b 638
07cd4b97
JB
639 /* Now the inferior's list contains only shared objects that don't
640 appear in GDB's list --- those that are newly loaded. Add them
e8930304 641 to GDB's shared object list. */
07cd4b97 642 if (inferior)
c906108c 643 {
07cd4b97
JB
644 struct so_list *i;
645
646 /* Add the new shared objects to GDB's list. */
647 *gdb_link = inferior;
648
e8930304 649 /* Fill in the rest of each of the `struct so_list' nodes. */
07cd4b97 650 for (i = inferior; i; i = i->next)
c906108c 651 {
07cd4b97 652 i->from_tty = from_tty;
6c95b8df 653 i->pspace = current_program_space;
07cd4b97
JB
654
655 /* Fill in the rest of the `struct so_list' node. */
656 catch_errors (solib_map_sections, i,
657 "Error while mapping shared library sections:\n",
658 RETURN_MASK_ALL);
07cd4b97 659
07b82ea5
PA
660 /* Add the shared object's sections to the current set of
661 file section tables. Do this immediately after mapping
662 the object so that later nodes in the list can query this
663 object, as is needed in solib-osf.c. */
664 add_target_sections (i->sections, i->sections_end);
42a6e6a0
MK
665
666 /* Notify any observer that the shared object has been
667 loaded now that we've added it to GDB's tables. */
668 observer_notify_solib_loaded (i);
c906108c 669 }
e8930304 670 }
105b175f
JB
671}
672
17a37d48
PP
673
674/* Return non-zero if NAME is the libpthread shared library.
6612ad7f
JB
675
676 Uses a fairly simplistic heuristic approach where we check
677 the file name against "/libpthread". This can lead to false
678 positives, but this should be good enough in practice. */
679
17a37d48
PP
680int
681libpthread_name_p (const char *name)
682{
683 return (strstr (name, "/libpthread") != NULL);
684}
685
686/* Return non-zero if SO is the libpthread shared library. */
687
6612ad7f
JB
688static int
689libpthread_solib_p (struct so_list *so)
690{
17a37d48 691 return libpthread_name_p (so->so_name);
6612ad7f 692}
105b175f
JB
693
694/* GLOBAL FUNCTION
695
696 solib_add -- read in symbol info for newly added shared libraries
697
698 SYNOPSIS
699
990f9fe3
FF
700 void solib_add (char *pattern, int from_tty, struct target_ops
701 *TARGET, int readsyms)
105b175f
JB
702
703 DESCRIPTION
704
705 Read in symbolic information for any shared objects whose names
706 match PATTERN. (If we've already read a shared object's symbol
707 info, leave it alone.) If PATTERN is zero, read them all.
708
990f9fe3
FF
709 If READSYMS is 0, defer reading symbolic information until later
710 but still do any needed low level processing.
711
105b175f
JB
712 FROM_TTY and TARGET are as described for update_solib_list, above. */
713
714void
990f9fe3 715solib_add (char *pattern, int from_tty, struct target_ops *target, int readsyms)
105b175f
JB
716{
717 struct so_list *gdb;
718
719 if (pattern)
720 {
721 char *re_err = re_comp (pattern);
722
723 if (re_err)
8a3fe4f8 724 error (_("Invalid regexp: %s"), re_err);
105b175f
JB
725 }
726
727 update_solib_list (from_tty, target);
c906108c 728
105b175f
JB
729 /* Walk the list of currently loaded shared libraries, and read
730 symbols for any that match the pattern --- or any whose symbols
731 aren't already loaded, if no pattern was given. */
e8930304
JB
732 {
733 int any_matches = 0;
734 int loaded_any_symbols = 0;
7eedccfa
PP
735 const int flags =
736 SYMFILE_DEFER_BP_RESET | (from_tty ? SYMFILE_VERBOSE : 0);
c906108c 737
e8930304
JB
738 for (gdb = so_list_head; gdb; gdb = gdb->next)
739 if (! pattern || re_exec (gdb->so_name))
740 {
6612ad7f
JB
741 /* Normally, we would read the symbols from that library
742 only if READSYMS is set. However, we're making a small
743 exception for the pthread library, because we sometimes
744 need the library symbols to be loaded in order to provide
745 thread support (x86-linux for instance). */
746 const int add_this_solib =
747 (readsyms || libpthread_solib_p (gdb));
748
e8930304 749 any_matches = 1;
7eedccfa 750 if (add_this_solib && solib_read_symbols (gdb, flags))
42a6e6a0 751 loaded_any_symbols = 1;
e8930304
JB
752 }
753
7eedccfa
PP
754 if (loaded_any_symbols)
755 breakpoint_re_set ();
756
e8930304
JB
757 if (from_tty && pattern && ! any_matches)
758 printf_unfiltered
759 ("No loaded shared libraries match the pattern `%s'.\n", pattern);
760
761 if (loaded_any_symbols)
762 {
1cf3db46 763 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 764
e8930304
JB
765 /* Getting new symbols may change our opinion about what is
766 frameless. */
767 reinit_frame_cache ();
768
66aba65d 769 ops->special_symbol_handling ();
e8930304
JB
770 }
771 }
c906108c
SS
772}
773
07cd4b97 774
c906108c
SS
775/*
776
c5aa993b 777 LOCAL FUNCTION
c906108c 778
c5aa993b 779 info_sharedlibrary_command -- code for "info sharedlibrary"
c906108c 780
c5aa993b 781 SYNOPSIS
c906108c 782
c5aa993b 783 static void info_sharedlibrary_command ()
c906108c 784
c5aa993b 785 DESCRIPTION
c906108c 786
c5aa993b 787 Walk through the shared library list and print information
55333a84
DE
788 about each attached library matching PATTERN. If PATTERN is elided,
789 print them all.
c5aa993b 790 */
c906108c
SS
791
792static void
55333a84 793info_sharedlibrary_command (char *pattern, int from_tty)
c906108c 794{
52f0bd74 795 struct so_list *so = NULL; /* link map state variable */
c906108c 796 int header_done = 0;
55333a84 797 int so_missing_debug_info = 0;
c906108c 798 int addr_width;
55333a84
DE
799 int nr_libs;
800 struct cleanup *table_cleanup;
801 struct gdbarch *gdbarch = target_gdbarch;
802
803 if (pattern)
804 {
805 char *re_err = re_comp (pattern);
806
807 if (re_err)
808 error (_("Invalid regexp: %s"), re_err);
809 }
c906108c 810
84eb3c4f 811 /* "0x", a little whitespace, and two hex digits per byte of pointers. */
55333a84 812 addr_width = 4 + (gdbarch_ptr_bit (gdbarch) / 4);
c906108c 813
105b175f 814 update_solib_list (from_tty, 0);
07cd4b97 815
55333a84
DE
816 /* make_cleanup_ui_out_table_begin_end needs to know the number of
817 rows, so we need to make two passes over the libs. */
818
819 for (nr_libs = 0, so = so_list_head; so; so = so->next)
c906108c 820 {
c5aa993b 821 if (so->so_name[0])
c906108c 822 {
55333a84
DE
823 if (pattern && ! re_exec (so->so_name))
824 continue;
825 ++nr_libs;
826 }
827 }
828
829 table_cleanup =
830 make_cleanup_ui_out_table_begin_end (uiout, 4, nr_libs,
831 "SharedLibraryTable");
832
833 /* The "- 1" is because ui_out adds one space between columns. */
834 ui_out_table_header (uiout, addr_width - 1, ui_left, "from", "From");
835 ui_out_table_header (uiout, addr_width - 1, ui_left, "to", "To");
836 ui_out_table_header (uiout, 12 - 1, ui_left, "syms-read", "Syms Read");
837 ui_out_table_header (uiout, 0, ui_noalign,
838 "name", "Shared Object Library");
839
840 ui_out_table_body (uiout);
841
842 for (so = so_list_head; so; so = so->next)
843 {
844 struct cleanup *lib_cleanup;
c906108c 845
55333a84
DE
846 if (! so->so_name[0])
847 continue;
848 if (pattern && ! re_exec (so->so_name))
849 continue;
850
851 lib_cleanup = make_cleanup_ui_out_tuple_begin_end (uiout, "lib");
852
853 if (so->addr_high != 0)
854 {
855 ui_out_field_core_addr (uiout, "from", gdbarch, so->addr_low);
856 ui_out_field_core_addr (uiout, "to", gdbarch, so->addr_high);
857 }
858 else
859 {
860 ui_out_field_skip (uiout, "from");
861 ui_out_field_skip (uiout, "to");
c906108c 862 }
55333a84
DE
863
864 if (! ui_out_is_mi_like_p (interp_ui_out (top_level_interpreter ()))
865 && so->symbols_loaded
866 && !objfile_has_partial_symbols (so->objfile)
867 && !objfile_has_full_symbols (so->objfile))
868 {
869 so_missing_debug_info = 1;
870 ui_out_field_string (uiout, "syms-read", "Yes (*)");
871 }
872 else
873 ui_out_field_string (uiout, "syms-read",
874 so->symbols_loaded ? "Yes" : "No");
875
876 ui_out_field_string (uiout, "name", so->so_name);
877
878 ui_out_text (uiout, "\n");
879
880 do_cleanups (lib_cleanup);
c906108c 881 }
55333a84
DE
882
883 do_cleanups (table_cleanup);
884
885 if (nr_libs == 0)
886 {
887 if (pattern)
888 ui_out_message (uiout, 0,
889 _("No shared libraries matched.\n"));
890 else
891 ui_out_message (uiout, 0,
892 _("No shared libraries loaded at this time.\n"));
893 }
894 else
c906108c 895 {
55333a84
DE
896 if (so_missing_debug_info)
897 ui_out_message (uiout, 0,
898 _("(*): Shared library is missing debugging information.\n"));
c906108c
SS
899 }
900}
901
5fd1a349
PP
902/* Return 1 if ADDRESS lies within SOLIB. */
903
904int
905solib_contains_address_p (const struct so_list *const solib,
906 CORE_ADDR address)
907{
0542c86d 908 struct target_section *p;
5fd1a349
PP
909
910 for (p = solib->sections; p < solib->sections_end; p++)
911 if (p->addr <= address && address < p->endaddr)
912 return 1;
913
914 return 0;
915}
916
c906108c
SS
917/*
918
c5aa993b 919 GLOBAL FUNCTION
c906108c 920
f5c9a895
PP
921 solib_name_from_address -- if an address is in a shared lib, return
922 its name.
c906108c 923
c5aa993b 924 SYNOPSIS
c906108c 925
f5c9a895 926 char * solib_name_from_address (CORE_ADDR address)
c906108c 927
c5aa993b 928 DESCRIPTION
c906108c 929
c5aa993b
JM
930 Provides a hook for other gdb routines to discover whether or
931 not a particular address is within the mapped address space of
749499cb 932 a shared library.
c906108c 933
c5aa993b
JM
934 For example, this routine is called at one point to disable
935 breakpoints which are in shared libraries that are not currently
936 mapped in.
c906108c
SS
937 */
938
939char *
6c95b8df 940solib_name_from_address (struct program_space *pspace, CORE_ADDR address)
c906108c 941{
6c95b8df 942 struct so_list *so = NULL;
c5aa993b 943
6c95b8df 944 for (so = pspace->so_list; so; so = so->next)
5fd1a349
PP
945 if (solib_contains_address_p (so, address))
946 return (so->so_name);
07cd4b97 947
c906108c
SS
948 return (0);
949}
950
951/* Called by free_all_symtabs */
952
c5aa993b 953void
fba45db2 954clear_solib (void)
c906108c 955{
1cf3db46 956 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 957
085dd6e6
JM
958 /* This function is expected to handle ELF shared libraries. It is
959 also used on Solaris, which can run either ELF or a.out binaries
960 (for compatibility with SunOS 4), both of which can use shared
961 libraries. So we don't know whether we have an ELF executable or
962 an a.out executable until the user chooses an executable file.
963
964 ELF shared libraries don't get mapped into the address space
965 until after the program starts, so we'd better not try to insert
966 breakpoints in them immediately. We have to wait until the
967 dynamic linker has loaded them; we'll hit a bp_shlib_event
968 breakpoint (look for calls to create_solib_event_breakpoint) when
969 it's ready.
970
971 SunOS shared libraries seem to be different --- they're present
972 as soon as the process begins execution, so there's no need to
973 put off inserting breakpoints. There's also nowhere to put a
974 bp_shlib_event breakpoint, so if we put it off, we'll never get
975 around to it.
976
977 So: disable breakpoints only if we're using ELF shared libs. */
978 if (exec_bfd != NULL
979 && bfd_get_flavour (exec_bfd) != bfd_target_aout_flavour)
cb851954 980 disable_breakpoints_in_shlibs ();
085dd6e6 981
c906108c
SS
982 while (so_list_head)
983 {
07cd4b97
JB
984 struct so_list *so = so_list_head;
985 so_list_head = so->next;
c86cf029 986 observer_notify_solib_unloaded (so);
2069d78d
KB
987 if (so->abfd)
988 remove_target_sections (so->abfd);
07cd4b97 989 free_so (so);
c906108c 990 }
07cd4b97 991
66aba65d 992 ops->clear_solib ();
c906108c
SS
993}
994
13437d4b 995/* GLOBAL FUNCTION
c5aa993b
JM
996
997 solib_create_inferior_hook -- shared library startup support
998
999 SYNOPSIS
1000
7095b863 1001 void solib_create_inferior_hook ()
c5aa993b
JM
1002
1003 DESCRIPTION
1004
1005 When gdb starts up the inferior, it nurses it along (through the
1006 shell) until it is ready to execute it's first instruction. At this
1007 point, this function gets called via expansion of the macro
13437d4b 1008 SOLIB_CREATE_INFERIOR_HOOK. */
c5aa993b
JM
1009
1010void
fba45db2 1011solib_create_inferior_hook (void)
c906108c 1012{
1cf3db46 1013 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 1014 ops->solib_create_inferior_hook();
c906108c
SS
1015}
1016
d7fa2ae2
KB
1017/* GLOBAL FUNCTION
1018
1019 in_solib_dynsym_resolve_code -- check to see if an address is in
1020 dynamic loader's dynamic symbol
1021 resolution code
1022
1023 SYNOPSIS
1024
1025 int in_solib_dynsym_resolve_code (CORE_ADDR pc)
1026
1027 DESCRIPTION
1028
1029 Determine if PC is in the dynamic linker's symbol resolution
1030 code. Return 1 if so, 0 otherwise.
1031*/
1032
1033int
1034in_solib_dynsym_resolve_code (CORE_ADDR pc)
1035{
1cf3db46 1036 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 1037 return ops->in_dynsym_resolve_code (pc);
d7fa2ae2 1038}
c906108c
SS
1039
1040/*
1041
c5aa993b 1042 LOCAL FUNCTION
c906108c 1043
c5aa993b 1044 sharedlibrary_command -- handle command to explicitly add library
c906108c 1045
c5aa993b 1046 SYNOPSIS
c906108c 1047
c5aa993b 1048 static void sharedlibrary_command (char *args, int from_tty)
c906108c 1049
c5aa993b 1050 DESCRIPTION
c906108c 1051
c5aa993b 1052 */
c906108c
SS
1053
1054static void
fba45db2 1055sharedlibrary_command (char *args, int from_tty)
c906108c
SS
1056{
1057 dont_repeat ();
990f9fe3 1058 solib_add (args, from_tty, (struct target_ops *) 0, 1);
c906108c
SS
1059}
1060
cb0ba49e
MS
1061/* LOCAL FUNCTION
1062
1063 no_shared_libraries -- handle command to explicitly discard symbols
1064 from shared libraries.
1065
1066 DESCRIPTION
1067
1068 Implements the command "nosharedlibrary", which discards symbols
1069 that have been auto-loaded from shared libraries. Symbols from
1070 shared libraries that were added by explicit request of the user
1071 are not discarded. Also called from remote.c. */
1072
c60a7562
MS
1073void
1074no_shared_libraries (char *ignored, int from_tty)
1075{
a3247a22
PP
1076 /* The order of the two routines below is important: clear_solib notifies
1077 the solib_unloaded observers, and some of these observers might need
1078 access to their associated objfiles. Therefore, we can not purge the
1079 solibs' objfiles before clear_solib has been called. */
1080
615b9dba 1081 clear_solib ();
a3247a22 1082 objfile_purge_solibs ();
c60a7562 1083}
c906108c 1084
cf466558 1085static void
f397e303
AC
1086reload_shared_libraries (char *ignored, int from_tty,
1087 struct cmd_list_element *e)
cf466558
KB
1088{
1089 no_shared_libraries (NULL, from_tty);
1090 solib_add (NULL, from_tty, NULL, auto_solib_add);
c8fa6cdd
VP
1091 /* Creating inferior hooks here has two purposes. First, if we reload
1092 shared libraries then the address of solib breakpoint we've computed
1093 previously might be no longer valid. For example, if we forgot to set
1094 solib-absolute-prefix and are setting it right now, then the previous
1095 breakpoint address is plain wrong. Second, installing solib hooks
1096 also implicitly figures were ld.so is and loads symbols for it.
1097 Absent this call, if we've just connected to a target and set
1098 solib-absolute-prefix or solib-search-path, we'll lose all information
1099 about ld.so. */
1100 if (target_has_execution)
1101 {
1102#ifdef SOLIB_CREATE_INFERIOR_HOOK
1103 SOLIB_CREATE_INFERIOR_HOOK (PIDGET (inferior_ptid));
1104#else
1105 solib_create_inferior_hook ();
1106#endif
1107 }
1108 /* We have unloaded and then reloaded debug info for all shared libraries.
1109 However, frames may still reference them, for example a frame's
1110 unwinder might still point of DWARF FDE structures that are now freed.
1111 Reinit frame cache to avoid crashing. */
1112 reinit_frame_cache ();
cf466558
KB
1113}
1114
920d2a44
AC
1115static void
1116show_auto_solib_add (struct ui_file *file, int from_tty,
1117 struct cmd_list_element *c, const char *value)
1118{
1119 fprintf_filtered (file, _("Autoloading of shared library symbols is %s.\n"),
1120 value);
1121}
1122
1123
3a40aaa0
UW
1124/* Handler for library-specific lookup of global symbol NAME in OBJFILE. Call
1125 the library-specific handler if it is installed for the current target. */
1126
1127struct symbol *
1128solib_global_lookup (const struct objfile *objfile,
1129 const char *name,
1130 const char *linkage_name,
21b556f4 1131 const domain_enum domain)
3a40aaa0 1132{
1cf3db46 1133 struct target_so_ops *ops = solib_ops (target_gdbarch);
3a40aaa0 1134
e8a92f7b 1135 if (ops->lookup_lib_global_symbol != NULL)
21b556f4 1136 return ops->lookup_lib_global_symbol (objfile, name, linkage_name, domain);
3a40aaa0
UW
1137 return NULL;
1138}
1139
1140
a78f21af
AC
1141extern initialize_file_ftype _initialize_solib; /* -Wmissing-prototypes */
1142
c906108c 1143void
fba45db2 1144_initialize_solib (void)
c906108c 1145{
fa58ee11
EZ
1146 struct cmd_list_element *c;
1147
66aba65d
MK
1148 solib_data = gdbarch_data_register_pre_init (solib_init);
1149
c906108c 1150 add_com ("sharedlibrary", class_files, sharedlibrary_command,
1bedd215 1151 _("Load shared object library symbols for files matching REGEXP."));
c5aa993b 1152 add_info ("sharedlibrary", info_sharedlibrary_command,
1bedd215 1153 _("Status of loaded shared object libraries."));
c60a7562 1154 add_com ("nosharedlibrary", class_files, no_shared_libraries,
1bedd215 1155 _("Unload all shared object library symbols."));
c906108c 1156
5bf193a2
AC
1157 add_setshow_boolean_cmd ("auto-solib-add", class_support,
1158 &auto_solib_add, _("\
1159Set autoloading of shared library symbols."), _("\
1160Show autoloading of shared library symbols."), _("\
b7209cb4
FF
1161If \"on\", symbols from all shared object libraries will be loaded\n\
1162automatically when the inferior begins execution, when the dynamic linker\n\
1163informs gdb that a new library has been loaded, or when attaching to the\n\
5bf193a2
AC
1164inferior. Otherwise, symbols must be loaded manually, using `sharedlibrary'."),
1165 NULL,
920d2a44 1166 show_auto_solib_add,
5bf193a2 1167 &setlist, &showlist);
c906108c 1168
f822c95b
DJ
1169 add_setshow_filename_cmd ("sysroot", class_support,
1170 &gdb_sysroot, _("\
1171Set an alternate system root."), _("\
1172Show the current system root."), _("\
1173The system root is used to load absolute shared library symbol files.\n\
1174For other (relative) files, you can add directories using\n\
1175`set solib-search-path'."),
f397e303
AC
1176 reload_shared_libraries,
1177 NULL,
1178 &setlist, &showlist);
c906108c 1179
f822c95b
DJ
1180 add_alias_cmd ("solib-absolute-prefix", "sysroot", class_support, 0,
1181 &setlist);
1182 add_alias_cmd ("solib-absolute-prefix", "sysroot", class_support, 0,
1183 &showlist);
030292b7 1184
525226b5
AC
1185 add_setshow_optional_filename_cmd ("solib-search-path", class_support,
1186 &solib_search_path, _("\
1187Set the search path for loading non-absolute shared library symbol files."), _("\
1188Show the search path for loading non-absolute shared library symbol files."), _("\
1189This takes precedence over the environment variables PATH and LD_LIBRARY_PATH."),
1190 reload_shared_libraries,
920d2a44 1191 show_solib_search_path,
525226b5 1192 &setlist, &showlist);
c906108c 1193}