]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/solib.c
Make the stop_soon global be per-inferior instead.
[thirdparty/binutils-gdb.git] / gdb / solib.c
CommitLineData
13437d4b 1/* Handle shared libraries for GDB, the GNU Debugger.
14a5e767 2
6aba47ca 3 Copyright (C) 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999,
9b254dd1
DJ
4 2000, 2001, 2002, 2003, 2005, 2006, 2007, 2008
5 Free Software Foundation, Inc.
c906108c 6
c5aa993b 7 This file is part of GDB.
c906108c 8
c5aa993b
JM
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
a9762ec7 11 the Free Software Foundation; either version 3 of the License, or
c5aa993b 12 (at your option) any later version.
c906108c 13
c5aa993b
JM
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License
a9762ec7 20 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c 21
c906108c
SS
22#include "defs.h"
23
c906108c 24#include <sys/types.h>
c906108c 25#include <fcntl.h>
13437d4b 26#include "gdb_string.h"
c906108c
SS
27#include "symtab.h"
28#include "bfd.h"
29#include "symfile.h"
30#include "objfiles.h"
60250e8b 31#include "exceptions.h"
c906108c
SS
32#include "gdbcore.h"
33#include "command.h"
34#include "target.h"
35#include "frame.h"
88987551 36#include "gdb_regex.h"
c906108c
SS
37#include "inferior.h"
38#include "environ.h"
39#include "language.h"
40#include "gdbcmd.h"
fa58ee11 41#include "completer.h"
fe4e3eb8 42#include "filenames.h" /* for DOSish file names */
4646aa9d 43#include "exec.h"
13437d4b 44#include "solist.h"
84acb35a 45#include "observer.h"
dbda9972 46#include "readline/readline.h"
f1838a98 47#include "remote.h"
c906108c 48
66aba65d
MK
49/* Architecture-specific operations. */
50
51/* Per-architecture data key. */
52static struct gdbarch_data *solib_data;
53
54static void *
55solib_init (struct obstack *obstack)
56{
57 struct target_so_ops **ops;
58
59 ops = OBSTACK_ZALLOC (obstack, struct target_so_ops *);
60 *ops = current_target_so_ops;
61 return ops;
62}
63
64static struct target_so_ops *
65solib_ops (struct gdbarch *gdbarch)
66{
67 struct target_so_ops **ops = gdbarch_data (gdbarch, solib_data);
68 return *ops;
69}
7d522c90
DJ
70
71/* Set the solib operations for GDBARCH to NEW_OPS. */
72
73void
74set_solib_ops (struct gdbarch *gdbarch, struct target_so_ops *new_ops)
75{
76 struct target_so_ops **ops = gdbarch_data (gdbarch, solib_data);
77 *ops = new_ops;
78}
66aba65d
MK
79\f
80
13437d4b 81/* external data declarations */
c906108c 82
7d522c90
DJ
83/* FIXME: gdbarch needs to control this variable, or else every
84 configuration needs to call set_solib_ops. */
13437d4b 85struct target_so_ops *current_target_so_ops;
23e04971
MS
86
87/* local data declarations */
07cd4b97 88
c906108c 89static struct so_list *so_list_head; /* List of known shared objects */
23e04971 90
c906108c
SS
91/* Local function prototypes */
92
c906108c
SS
93/* If non-empty, this is a search path for loading non-absolute shared library
94 symbol files. This takes precedence over the environment variables PATH
95 and LD_LIBRARY_PATH. */
96static char *solib_search_path = NULL;
920d2a44
AC
97static void
98show_solib_search_path (struct ui_file *file, int from_tty,
99 struct cmd_list_element *c, const char *value)
100{
101 fprintf_filtered (file, _("\
102The search path for loading non-absolute shared library symbol files is %s.\n"),
103 value);
104}
c906108c 105
e4f7b8c8
MS
106/*
107
108 GLOBAL FUNCTION
109
f1838a98 110 solib_bfd_open -- Find a shared library file and open BFD for it.
e4f7b8c8
MS
111
112 SYNOPSIS
113
f1838a98 114 struct bfd *solib_open (char *in_pathname);
e4f7b8c8
MS
115
116 DESCRIPTION
117
f822c95b 118 Global variable GDB_SYSROOT is used as a prefix directory
e4f7b8c8
MS
119 to search for shared libraries if they have an absolute path.
120
121 Global variable SOLIB_SEARCH_PATH is used as a prefix directory
122 (or set of directories, as in LD_LIBRARY_PATH) to search for all
f822c95b 123 shared libraries if not found in GDB_SYSROOT.
e4f7b8c8 124
c8c18e65 125 Search algorithm:
f822c95b
DJ
126 * If there is a gdb_sysroot and path is absolute:
127 * Search for gdb_sysroot/path.
c8c18e65
KW
128 * else
129 * Look for it literally (unmodified).
e4f7b8c8 130 * Look in SOLIB_SEARCH_PATH.
f43caff8 131 * If available, use target defined search function.
f822c95b 132 * If gdb_sysroot is NOT set, perform the following two searches:
c8c18e65
KW
133 * Look in inferior's $PATH.
134 * Look in inferior's $LD_LIBRARY_PATH.
135 *
136 * The last check avoids doing this search when targetting remote
f822c95b 137 * machines since gdb_sysroot will almost always be set.
e4f7b8c8
MS
138
139 RETURNS
b21f0843 140
f1838a98 141 BFD file handle for opened solib; throws error on failure. */
e4f7b8c8 142
f1838a98
UW
143bfd *
144solib_bfd_open (char *in_pathname)
e4f7b8c8 145{
1cf3db46 146 struct target_so_ops *ops = solib_ops (target_gdbarch);
e4f7b8c8
MS
147 int found_file = -1;
148 char *temp_pathname = NULL;
fe4e3eb8 149 char *p = in_pathname;
f822c95b 150 int gdb_sysroot_is_empty;
f1838a98 151 bfd *abfd;
58dc52c3 152
f822c95b 153 gdb_sysroot_is_empty = (gdb_sysroot == NULL || *gdb_sysroot == 0);
e4f7b8c8 154
f822c95b 155 if (! IS_ABSOLUTE_PATH (in_pathname) || gdb_sysroot_is_empty)
f1d10cfb
AS
156 temp_pathname = in_pathname;
157 else
e4f7b8c8 158 {
f822c95b 159 int prefix_len = strlen (gdb_sysroot);
f1d10cfb
AS
160
161 /* Remove trailing slashes from absolute prefix. */
162 while (prefix_len > 0
f822c95b 163 && IS_DIR_SEPARATOR (gdb_sysroot[prefix_len - 1]))
f1d10cfb
AS
164 prefix_len--;
165
166 /* Cat the prefixed pathname together. */
167 temp_pathname = alloca (prefix_len + strlen (in_pathname) + 1);
f822c95b 168 strncpy (temp_pathname, gdb_sysroot, prefix_len);
f1d10cfb
AS
169 temp_pathname[prefix_len] = '\0';
170 strcat (temp_pathname, in_pathname);
e4f7b8c8
MS
171 }
172
f1838a98
UW
173 /* Handle remote files. */
174 if (remote_filename_p (temp_pathname))
175 {
176 temp_pathname = xstrdup (temp_pathname);
177 abfd = remote_bfd_open (temp_pathname, gnutarget);
178 if (!abfd)
179 {
180 make_cleanup (xfree, temp_pathname);
181 error (_("Could not open `%s' as an executable file: %s"),
182 temp_pathname, bfd_errmsg (bfd_get_error ()));
183 }
184
185 if (!bfd_check_format (abfd, bfd_object))
186 {
187 bfd_close (abfd);
188 make_cleanup (xfree, temp_pathname);
189 error (_("`%s': not in executable format: %s"),
190 temp_pathname, bfd_errmsg (bfd_get_error ()));
191 }
192
193 return abfd;
194 }
195
f1d10cfb
AS
196 /* Now see if we can open it. */
197 found_file = open (temp_pathname, O_RDONLY | O_BINARY, 0);
198
0997b535
MS
199 /* We try to find the library in various ways. After each attempt
200 (except for the one above), either found_file >= 0 and
201 temp_pathname is a malloc'd string, or found_file < 0 and
202 temp_pathname does not point to storage that needs to be
203 freed. */
204
205 if (found_file < 0)
206 temp_pathname = NULL;
207 else
208 temp_pathname = xstrdup (temp_pathname);
209
f822c95b 210 /* If the search in gdb_sysroot failed, and the path name is
ba5f0d88
OF
211 absolute at this point, make it relative. (openp will try and open the
212 file according to its absolute path otherwise, which is not what we want.)
213 Affects subsequent searches for this solib. */
214 if (found_file < 0 && IS_ABSOLUTE_PATH (in_pathname))
215 {
216 /* First, get rid of any drive letters etc. */
217 while (!IS_DIR_SEPARATOR (*in_pathname))
218 in_pathname++;
219
220 /* Next, get rid of all leading dir separators. */
221 while (IS_DIR_SEPARATOR (*in_pathname))
222 in_pathname++;
223 }
224
c8c18e65 225 /* If not found, search the solib_search_path (if any). */
e4f7b8c8 226 if (found_file < 0 && solib_search_path != NULL)
014d698b 227 found_file = openp (solib_search_path, OPF_TRY_CWD_FIRST,
637d6690 228 in_pathname, O_RDONLY | O_BINARY, 0, &temp_pathname);
ba5f0d88
OF
229
230 /* If not found, next search the solib_search_path (if any) for the basename
231 only (ignoring the path). This is to allow reading solibs from a path
232 that differs from the opened path. */
233 if (found_file < 0 && solib_search_path != NULL)
014d698b 234 found_file = openp (solib_search_path, OPF_TRY_CWD_FIRST,
637d6690 235 lbasename (in_pathname), O_RDONLY | O_BINARY, 0,
ba5f0d88 236 &temp_pathname);
e4f7b8c8 237
2610b0bf 238 /* If not found, try to use target supplied solib search method */
66aba65d 239 if (found_file < 0 && ops->find_and_open_solib)
637d6690 240 found_file = ops->find_and_open_solib (in_pathname, O_RDONLY | O_BINARY,
66aba65d 241 &temp_pathname);
2610b0bf 242
e4f7b8c8 243 /* If not found, next search the inferior's $PATH environment variable. */
f822c95b 244 if (found_file < 0 && gdb_sysroot_is_empty)
e4f7b8c8 245 found_file = openp (get_in_environ (inferior_environ, "PATH"),
637d6690 246 OPF_TRY_CWD_FIRST, in_pathname, O_RDONLY | O_BINARY, 0,
014d698b 247 &temp_pathname);
e4f7b8c8
MS
248
249 /* If not found, next search the inferior's $LD_LIBRARY_PATH
250 environment variable. */
f822c95b 251 if (found_file < 0 && gdb_sysroot_is_empty)
e4f7b8c8 252 found_file = openp (get_in_environ (inferior_environ, "LD_LIBRARY_PATH"),
637d6690 253 OPF_TRY_CWD_FIRST, in_pathname, O_RDONLY | O_BINARY, 0,
014d698b 254 &temp_pathname);
e4f7b8c8 255
f1838a98
UW
256 /* Done. If still not found, error. */
257 if (found_file < 0)
258 perror_with_name (in_pathname);
259
260 /* Leave temp_pathname allocated. abfd->name will point to it. */
261 abfd = bfd_fopen (temp_pathname, gnutarget, FOPEN_RB, found_file);
262 if (!abfd)
263 {
264 close (found_file);
265 make_cleanup (xfree, temp_pathname);
266 error (_("Could not open `%s' as an executable file: %s"),
267 temp_pathname, bfd_errmsg (bfd_get_error ()));
268 }
269
270 if (!bfd_check_format (abfd, bfd_object))
0997b535 271 {
f1838a98
UW
272 bfd_close (abfd);
273 make_cleanup (xfree, temp_pathname);
274 error (_("`%s': not in executable format: %s"),
275 temp_pathname, bfd_errmsg (bfd_get_error ()));
0997b535 276 }
f1838a98
UW
277
278 bfd_set_cacheable (abfd, 1);
279 return abfd;
e4f7b8c8
MS
280}
281
282
c906108c
SS
283/*
284
c5aa993b 285 LOCAL FUNCTION
c906108c 286
c5aa993b 287 solib_map_sections -- open bfd and build sections for shared lib
c906108c 288
c5aa993b 289 SYNOPSIS
c906108c 290
c5aa993b 291 static int solib_map_sections (struct so_list *so)
c906108c 292
c5aa993b 293 DESCRIPTION
c906108c 294
c5aa993b
JM
295 Given a pointer to one of the shared objects in our list
296 of mapped objects, use the recorded name to open a bfd
297 descriptor for the object, build a section table, and then
298 relocate all the section addresses by the base address at
299 which the shared object was mapped.
c906108c 300
c5aa993b 301 FIXMES
c906108c 302
c5aa993b
JM
303 In most (all?) cases the shared object file name recorded in the
304 dynamic linkage tables will be a fully qualified pathname. For
305 cases where it isn't, do we really mimic the systems search
306 mechanism correctly in the below code (particularly the tilde
307 expansion stuff?).
c906108c
SS
308 */
309
310static int
4efb68b1 311solib_map_sections (void *arg)
c906108c
SS
312{
313 struct so_list *so = (struct so_list *) arg; /* catch_errors bogon */
314 char *filename;
c906108c
SS
315 struct section_table *p;
316 struct cleanup *old_chain;
317 bfd *abfd;
c5aa993b
JM
318
319 filename = tilde_expand (so->so_name);
b8c9b27d 320 old_chain = make_cleanup (xfree, filename);
f1838a98
UW
321 abfd = solib_bfd_open (filename);
322 do_cleanups (old_chain);
e4f7b8c8 323
13437d4b
KB
324 /* Leave bfd open, core_xfer_memory and "info files" need it. */
325 so->abfd = abfd;
23e04971 326
e4f7b8c8
MS
327 /* copy full path name into so_name, so that later symbol_file_add
328 can find it */
f1838a98
UW
329 if (strlen (bfd_get_filename (abfd)) >= SO_NAME_MAX_PATH_SIZE)
330 error (_("Shared library file name is too long."));
331 strcpy (so->so_name, bfd_get_filename (abfd));
23e04971 332
13437d4b 333 if (build_section_table (abfd, &so->sections, &so->sections_end))
23e04971 334 {
8a3fe4f8 335 error (_("Can't find the file sections in `%s': %s"),
13437d4b 336 bfd_get_filename (abfd), bfd_errmsg (bfd_get_error ()));
23e04971 337 }
104c1213 338
13437d4b 339 for (p = so->sections; p < so->sections_end; p++)
104c1213 340 {
1cf3db46 341 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 342
13437d4b
KB
343 /* Relocate the section binding addresses as recorded in the shared
344 object's file by the base address to which the object was actually
345 mapped. */
66aba65d 346 ops->relocate_section_addresses (so, p);
cfa9d6d9
DJ
347
348 /* If the target didn't provide information about the address
349 range of the shared object, assume we want the location of
350 the .text section. */
351 if (so->addr_low == 0 && so->addr_high == 0
352 && strcmp (p->the_bfd_section->name, ".text") == 0)
13437d4b 353 {
cfa9d6d9
DJ
354 so->addr_low = p->addr;
355 so->addr_high = p->endaddr;
13437d4b 356 }
104c1213
JM
357 }
358
13437d4b 359 return (1);
104c1213 360}
c906108c 361
07cd4b97 362/* LOCAL FUNCTION
c906108c 363
07cd4b97 364 free_so --- free a `struct so_list' object
c906108c 365
c5aa993b 366 SYNOPSIS
c906108c 367
07cd4b97 368 void free_so (struct so_list *so)
c906108c 369
c5aa993b 370 DESCRIPTION
c906108c 371
07cd4b97
JB
372 Free the storage associated with the `struct so_list' object SO.
373 If we have opened a BFD for SO, close it.
c906108c 374
07cd4b97
JB
375 The caller is responsible for removing SO from whatever list it is
376 a member of. If we have placed SO's sections in some target's
377 section table, the caller is responsible for removing them.
c906108c 378
07cd4b97
JB
379 This function doesn't mess with objfiles at all. If there is an
380 objfile associated with SO that needs to be removed, the caller is
381 responsible for taking care of that. */
382
13437d4b 383void
07cd4b97 384free_so (struct so_list *so)
c906108c 385{
1cf3db46 386 struct target_so_ops *ops = solib_ops (target_gdbarch);
07cd4b97 387 char *bfd_filename = 0;
c5aa993b 388
07cd4b97 389 if (so->sections)
b8c9b27d 390 xfree (so->sections);
07cd4b97
JB
391
392 if (so->abfd)
c906108c 393 {
07cd4b97
JB
394 bfd_filename = bfd_get_filename (so->abfd);
395 if (! bfd_close (so->abfd))
8a3fe4f8 396 warning (_("cannot close \"%s\": %s"),
07cd4b97 397 bfd_filename, bfd_errmsg (bfd_get_error ()));
c906108c 398 }
07cd4b97
JB
399
400 if (bfd_filename)
b8c9b27d 401 xfree (bfd_filename);
07cd4b97 402
66aba65d 403 ops->free_so (so);
07cd4b97 404
b8c9b27d 405 xfree (so);
c906108c
SS
406}
407
07cd4b97 408
f8766ec1
KB
409/* Return address of first so_list entry in master shared object list. */
410struct so_list *
411master_so_list (void)
412{
413 return so_list_head;
414}
415
416
c906108c
SS
417/* A small stub to get us past the arg-passing pinhole of catch_errors. */
418
419static int
4efb68b1 420symbol_add_stub (void *arg)
c906108c 421{
52f0bd74 422 struct so_list *so = (struct so_list *) arg; /* catch_errs bogon */
62557bbc 423 struct section_addr_info *sap;
c906108c 424
07cd4b97
JB
425 /* Have we already loaded this shared object? */
426 ALL_OBJFILES (so->objfile)
427 {
428 if (strcmp (so->objfile->name, so->so_name) == 0)
429 return 1;
430 }
431
62557bbc
KB
432 sap = build_section_addr_info_from_section_table (so->sections,
433 so->sections_end);
e7cf9df1 434
62557bbc
KB
435 so->objfile = symbol_file_add (so->so_name, so->from_tty,
436 sap, 0, OBJF_SHARED);
437 free_section_addr_info (sap);
c906108c 438
07cd4b97 439 return (1);
c906108c
SS
440}
441
42a6e6a0
MK
442/* Read in symbols for shared object SO. If FROM_TTY is non-zero, be
443 chatty about it. Return non-zero if any symbols were actually
444 loaded. */
445
446int
447solib_read_symbols (struct so_list *so, int from_tty)
448{
449 if (so->symbols_loaded)
450 {
451 if (from_tty)
a3f17187 452 printf_unfiltered (_("Symbols already loaded for %s\n"), so->so_name);
42a6e6a0 453 }
8bb75286
DJ
454 else if (so->abfd == NULL)
455 {
456 if (from_tty)
457 printf_unfiltered (_("Symbol file not found for %s\n"), so->so_name);
458 }
42a6e6a0
MK
459 else
460 {
461 if (catch_errors (symbol_add_stub, so,
462 "Error while reading shared library symbols:\n",
463 RETURN_MASK_ALL))
464 {
bf250677 465 if (from_tty && print_symbol_loading)
a3f17187 466 printf_unfiltered (_("Loaded symbols for %s\n"), so->so_name);
42a6e6a0
MK
467 so->symbols_loaded = 1;
468 return 1;
469 }
470 }
471
472 return 0;
473}
c906108c 474
07cd4b97 475/* LOCAL FUNCTION
c906108c 476
105b175f 477 update_solib_list --- synchronize GDB's shared object list with inferior's
c906108c 478
c5aa993b 479 SYNOPSIS
c906108c 480
105b175f 481 void update_solib_list (int from_tty, struct target_ops *TARGET)
c906108c 482
07cd4b97 483 Extract the list of currently loaded shared objects from the
105b175f
JB
484 inferior, and compare it with the list of shared objects currently
485 in GDB's so_list_head list. Edit so_list_head to bring it in sync
486 with the inferior's new list.
c906108c 487
105b175f
JB
488 If we notice that the inferior has unloaded some shared objects,
489 free any symbolic info GDB had read about those shared objects.
490
491 Don't load symbolic info for any new shared objects; just add them
492 to the list, and leave their symbols_loaded flag clear.
07cd4b97
JB
493
494 If FROM_TTY is non-null, feel free to print messages about what
495 we're doing.
c906108c 496
07cd4b97
JB
497 If TARGET is non-null, add the sections of all new shared objects
498 to TARGET's section table. Note that this doesn't remove any
499 sections for shared objects that have been unloaded, and it
500 doesn't check to see if the new shared objects are already present in
501 the section table. But we only use this for core files and
502 processes we've just attached to, so that's okay. */
c906108c 503
a78f21af 504static void
105b175f 505update_solib_list (int from_tty, struct target_ops *target)
07cd4b97 506{
1cf3db46 507 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 508 struct so_list *inferior = ops->current_sos();
07cd4b97
JB
509 struct so_list *gdb, **gdb_link;
510
104c1213
JM
511 /* If we are attaching to a running process for which we
512 have not opened a symbol file, we may be able to get its
513 symbols now! */
514 if (attach_flag &&
515 symfile_objfile == NULL)
66aba65d 516 catch_errors (ops->open_symbol_file_object, &from_tty,
104c1213
JM
517 "Error reading attached process's symbol file.\n",
518 RETURN_MASK_ALL);
519
07cd4b97
JB
520 /* GDB and the inferior's dynamic linker each maintain their own
521 list of currently loaded shared objects; we want to bring the
522 former in sync with the latter. Scan both lists, seeing which
523 shared objects appear where. There are three cases:
524
525 - A shared object appears on both lists. This means that GDB
105b175f
JB
526 knows about it already, and it's still loaded in the inferior.
527 Nothing needs to happen.
07cd4b97
JB
528
529 - A shared object appears only on GDB's list. This means that
105b175f
JB
530 the inferior has unloaded it. We should remove the shared
531 object from GDB's tables.
07cd4b97
JB
532
533 - A shared object appears only on the inferior's list. This
105b175f
JB
534 means that it's just been loaded. We should add it to GDB's
535 tables.
07cd4b97
JB
536
537 So we walk GDB's list, checking each entry to see if it appears
538 in the inferior's list too. If it does, no action is needed, and
539 we remove it from the inferior's list. If it doesn't, the
540 inferior has unloaded it, and we remove it from GDB's list. By
541 the time we're done walking GDB's list, the inferior's list
542 contains only the new shared objects, which we then add. */
543
544 gdb = so_list_head;
545 gdb_link = &so_list_head;
546 while (gdb)
c906108c 547 {
07cd4b97
JB
548 struct so_list *i = inferior;
549 struct so_list **i_link = &inferior;
550
551 /* Check to see whether the shared object *gdb also appears in
552 the inferior's current list. */
553 while (i)
c906108c 554 {
a7c02bc8
VP
555 if (ops->same)
556 {
557 if (ops->same (gdb, i))
558 break;
559 }
560 else
561 {
562 if (! strcmp (gdb->so_original_name, i->so_original_name))
563 break;
564 }
07cd4b97
JB
565
566 i_link = &i->next;
567 i = *i_link;
c906108c 568 }
c5aa993b 569
07cd4b97
JB
570 /* If the shared object appears on the inferior's list too, then
571 it's still loaded, so we don't need to do anything. Delete
572 it from the inferior's list, and leave it on GDB's list. */
573 if (i)
c906108c 574 {
07cd4b97 575 *i_link = i->next;
07cd4b97
JB
576 free_so (i);
577 gdb_link = &gdb->next;
578 gdb = *gdb_link;
579 }
580
581 /* If it's not on the inferior's list, remove it from GDB's tables. */
582 else
583 {
42a6e6a0
MK
584 /* Notify any observer that the shared object has been
585 unloaded before we remove it from GDB's tables. */
84acb35a
JJ
586 observer_notify_solib_unloaded (gdb);
587
07cd4b97 588 *gdb_link = gdb->next;
07cd4b97
JB
589
590 /* Unless the user loaded it explicitly, free SO's objfile. */
e8930304 591 if (gdb->objfile && ! (gdb->objfile->flags & OBJF_USERLOADED))
07cd4b97
JB
592 free_objfile (gdb->objfile);
593
594 /* Some targets' section tables might be referring to
595 sections from so->abfd; remove them. */
596 remove_target_sections (gdb->abfd);
597
598 free_so (gdb);
599 gdb = *gdb_link;
c906108c
SS
600 }
601 }
c5aa993b 602
07cd4b97
JB
603 /* Now the inferior's list contains only shared objects that don't
604 appear in GDB's list --- those that are newly loaded. Add them
e8930304 605 to GDB's shared object list. */
07cd4b97 606 if (inferior)
c906108c 607 {
07cd4b97
JB
608 struct so_list *i;
609
610 /* Add the new shared objects to GDB's list. */
611 *gdb_link = inferior;
612
e8930304 613 /* Fill in the rest of each of the `struct so_list' nodes. */
07cd4b97 614 for (i = inferior; i; i = i->next)
c906108c 615 {
07cd4b97
JB
616 i->from_tty = from_tty;
617
618 /* Fill in the rest of the `struct so_list' node. */
619 catch_errors (solib_map_sections, i,
620 "Error while mapping shared library sections:\n",
621 RETURN_MASK_ALL);
07cd4b97 622
b41be06e
ND
623 /* If requested, add the shared object's sections to the TARGET's
624 section table. Do this immediately after mapping the object so
625 that later nodes in the list can query this object, as is needed
626 in solib-osf.c. */
627 if (target)
c906108c 628 {
b41be06e
ND
629 int count = (i->sections_end - i->sections);
630 if (count > 0)
07cd4b97 631 {
b41be06e 632 int space = target_resize_to_sections (target, count);
07cd4b97
JB
633 memcpy (target->to_sections + space,
634 i->sections,
635 count * sizeof (i->sections[0]));
07cd4b97 636 }
c906108c 637 }
42a6e6a0
MK
638
639 /* Notify any observer that the shared object has been
640 loaded now that we've added it to GDB's tables. */
641 observer_notify_solib_loaded (i);
c906108c 642 }
e8930304 643 }
105b175f
JB
644}
645
6612ad7f
JB
646/* Return non-zero if SO is the libpthread shared library.
647
648 Uses a fairly simplistic heuristic approach where we check
649 the file name against "/libpthread". This can lead to false
650 positives, but this should be good enough in practice. */
651
652static int
653libpthread_solib_p (struct so_list *so)
654{
655 return (strstr (so->so_name, "/libpthread") != NULL);
656}
105b175f
JB
657
658/* GLOBAL FUNCTION
659
660 solib_add -- read in symbol info for newly added shared libraries
661
662 SYNOPSIS
663
990f9fe3
FF
664 void solib_add (char *pattern, int from_tty, struct target_ops
665 *TARGET, int readsyms)
105b175f
JB
666
667 DESCRIPTION
668
669 Read in symbolic information for any shared objects whose names
670 match PATTERN. (If we've already read a shared object's symbol
671 info, leave it alone.) If PATTERN is zero, read them all.
672
990f9fe3
FF
673 If READSYMS is 0, defer reading symbolic information until later
674 but still do any needed low level processing.
675
105b175f
JB
676 FROM_TTY and TARGET are as described for update_solib_list, above. */
677
678void
990f9fe3 679solib_add (char *pattern, int from_tty, struct target_ops *target, int readsyms)
105b175f
JB
680{
681 struct so_list *gdb;
682
683 if (pattern)
684 {
685 char *re_err = re_comp (pattern);
686
687 if (re_err)
8a3fe4f8 688 error (_("Invalid regexp: %s"), re_err);
105b175f
JB
689 }
690
691 update_solib_list (from_tty, target);
c906108c 692
105b175f
JB
693 /* Walk the list of currently loaded shared libraries, and read
694 symbols for any that match the pattern --- or any whose symbols
695 aren't already loaded, if no pattern was given. */
e8930304
JB
696 {
697 int any_matches = 0;
698 int loaded_any_symbols = 0;
c906108c 699
e8930304
JB
700 for (gdb = so_list_head; gdb; gdb = gdb->next)
701 if (! pattern || re_exec (gdb->so_name))
702 {
6612ad7f
JB
703 /* Normally, we would read the symbols from that library
704 only if READSYMS is set. However, we're making a small
705 exception for the pthread library, because we sometimes
706 need the library symbols to be loaded in order to provide
707 thread support (x86-linux for instance). */
708 const int add_this_solib =
709 (readsyms || libpthread_solib_p (gdb));
710
e8930304 711 any_matches = 1;
6612ad7f 712 if (add_this_solib && solib_read_symbols (gdb, from_tty))
42a6e6a0 713 loaded_any_symbols = 1;
e8930304
JB
714 }
715
716 if (from_tty && pattern && ! any_matches)
717 printf_unfiltered
718 ("No loaded shared libraries match the pattern `%s'.\n", pattern);
719
720 if (loaded_any_symbols)
721 {
1cf3db46 722 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 723
e8930304
JB
724 /* Getting new symbols may change our opinion about what is
725 frameless. */
726 reinit_frame_cache ();
727
66aba65d 728 ops->special_symbol_handling ();
e8930304
JB
729 }
730 }
c906108c
SS
731}
732
07cd4b97 733
c906108c
SS
734/*
735
c5aa993b 736 LOCAL FUNCTION
c906108c 737
c5aa993b 738 info_sharedlibrary_command -- code for "info sharedlibrary"
c906108c 739
c5aa993b 740 SYNOPSIS
c906108c 741
c5aa993b 742 static void info_sharedlibrary_command ()
c906108c 743
c5aa993b 744 DESCRIPTION
c906108c 745
c5aa993b
JM
746 Walk through the shared library list and print information
747 about each attached library.
748 */
c906108c
SS
749
750static void
fba45db2 751info_sharedlibrary_command (char *ignore, int from_tty)
c906108c 752{
52f0bd74 753 struct so_list *so = NULL; /* link map state variable */
c906108c
SS
754 int header_done = 0;
755 int addr_width;
c906108c 756
84eb3c4f 757 /* "0x", a little whitespace, and two hex digits per byte of pointers. */
1cf3db46 758 addr_width = 4 + (gdbarch_ptr_bit (target_gdbarch) / 4);
c906108c 759
105b175f 760 update_solib_list (from_tty, 0);
07cd4b97
JB
761
762 for (so = so_list_head; so; so = so->next)
c906108c 763 {
c5aa993b 764 if (so->so_name[0])
c906108c
SS
765 {
766 if (!header_done)
767 {
c5aa993b
JM
768 printf_unfiltered ("%-*s%-*s%-12s%s\n", addr_width, "From",
769 addr_width, "To", "Syms Read",
770 "Shared Object Library");
c906108c
SS
771 header_done++;
772 }
773
774 printf_unfiltered ("%-*s", addr_width,
cfa9d6d9 775 so->addr_high != 0
bb599908 776 ? hex_string_custom (
cfa9d6d9 777 (LONGEST) so->addr_low,
bb599908 778 addr_width - 4)
749499cb 779 : "");
c906108c 780 printf_unfiltered ("%-*s", addr_width,
cfa9d6d9 781 so->addr_high != 0
bb599908 782 ? hex_string_custom (
cfa9d6d9 783 (LONGEST) so->addr_high,
bb599908 784 addr_width - 4)
749499cb 785 : "");
c5aa993b
JM
786 printf_unfiltered ("%-12s", so->symbols_loaded ? "Yes" : "No");
787 printf_unfiltered ("%s\n", so->so_name);
c906108c
SS
788 }
789 }
790 if (so_list_head == NULL)
791 {
a3f17187 792 printf_unfiltered (_("No shared libraries loaded at this time.\n"));
c906108c
SS
793 }
794}
795
796/*
797
c5aa993b 798 GLOBAL FUNCTION
c906108c 799
c5aa993b 800 solib_address -- check to see if an address is in a shared lib
c906108c 801
c5aa993b 802 SYNOPSIS
c906108c 803
c5aa993b 804 char * solib_address (CORE_ADDR address)
c906108c 805
c5aa993b 806 DESCRIPTION
c906108c 807
c5aa993b
JM
808 Provides a hook for other gdb routines to discover whether or
809 not a particular address is within the mapped address space of
749499cb 810 a shared library.
c906108c 811
c5aa993b
JM
812 For example, this routine is called at one point to disable
813 breakpoints which are in shared libraries that are not currently
814 mapped in.
c906108c
SS
815 */
816
817char *
fba45db2 818solib_address (CORE_ADDR address)
c906108c 819{
52f0bd74 820 struct so_list *so = 0; /* link map state variable */
c5aa993b 821
07cd4b97 822 for (so = so_list_head; so; so = so->next)
c906108c 823 {
749499cb
KB
824 struct section_table *p;
825
826 for (p = so->sections; p < so->sections_end; p++)
827 {
828 if (p->addr <= address && address < p->endaddr)
829 return (so->so_name);
830 }
c906108c 831 }
07cd4b97 832
c906108c
SS
833 return (0);
834}
835
836/* Called by free_all_symtabs */
837
c5aa993b 838void
fba45db2 839clear_solib (void)
c906108c 840{
1cf3db46 841 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 842
085dd6e6
JM
843 /* This function is expected to handle ELF shared libraries. It is
844 also used on Solaris, which can run either ELF or a.out binaries
845 (for compatibility with SunOS 4), both of which can use shared
846 libraries. So we don't know whether we have an ELF executable or
847 an a.out executable until the user chooses an executable file.
848
849 ELF shared libraries don't get mapped into the address space
850 until after the program starts, so we'd better not try to insert
851 breakpoints in them immediately. We have to wait until the
852 dynamic linker has loaded them; we'll hit a bp_shlib_event
853 breakpoint (look for calls to create_solib_event_breakpoint) when
854 it's ready.
855
856 SunOS shared libraries seem to be different --- they're present
857 as soon as the process begins execution, so there's no need to
858 put off inserting breakpoints. There's also nowhere to put a
859 bp_shlib_event breakpoint, so if we put it off, we'll never get
860 around to it.
861
862 So: disable breakpoints only if we're using ELF shared libs. */
863 if (exec_bfd != NULL
864 && bfd_get_flavour (exec_bfd) != bfd_target_aout_flavour)
cb851954 865 disable_breakpoints_in_shlibs ();
085dd6e6 866
c906108c
SS
867 while (so_list_head)
868 {
07cd4b97
JB
869 struct so_list *so = so_list_head;
870 so_list_head = so->next;
2069d78d
KB
871 if (so->abfd)
872 remove_target_sections (so->abfd);
07cd4b97 873 free_so (so);
c906108c 874 }
07cd4b97 875
66aba65d 876 ops->clear_solib ();
c906108c
SS
877}
878
13437d4b 879/* GLOBAL FUNCTION
c5aa993b
JM
880
881 solib_create_inferior_hook -- shared library startup support
882
883 SYNOPSIS
884
7095b863 885 void solib_create_inferior_hook ()
c5aa993b
JM
886
887 DESCRIPTION
888
889 When gdb starts up the inferior, it nurses it along (through the
890 shell) until it is ready to execute it's first instruction. At this
891 point, this function gets called via expansion of the macro
13437d4b 892 SOLIB_CREATE_INFERIOR_HOOK. */
c5aa993b
JM
893
894void
fba45db2 895solib_create_inferior_hook (void)
c906108c 896{
1cf3db46 897 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 898 ops->solib_create_inferior_hook();
c906108c
SS
899}
900
d7fa2ae2
KB
901/* GLOBAL FUNCTION
902
903 in_solib_dynsym_resolve_code -- check to see if an address is in
904 dynamic loader's dynamic symbol
905 resolution code
906
907 SYNOPSIS
908
909 int in_solib_dynsym_resolve_code (CORE_ADDR pc)
910
911 DESCRIPTION
912
913 Determine if PC is in the dynamic linker's symbol resolution
914 code. Return 1 if so, 0 otherwise.
915*/
916
917int
918in_solib_dynsym_resolve_code (CORE_ADDR pc)
919{
1cf3db46 920 struct target_so_ops *ops = solib_ops (target_gdbarch);
66aba65d 921 return ops->in_dynsym_resolve_code (pc);
d7fa2ae2 922}
c906108c
SS
923
924/*
925
c5aa993b 926 LOCAL FUNCTION
c906108c 927
c5aa993b 928 sharedlibrary_command -- handle command to explicitly add library
c906108c 929
c5aa993b 930 SYNOPSIS
c906108c 931
c5aa993b 932 static void sharedlibrary_command (char *args, int from_tty)
c906108c 933
c5aa993b 934 DESCRIPTION
c906108c 935
c5aa993b 936 */
c906108c
SS
937
938static void
fba45db2 939sharedlibrary_command (char *args, int from_tty)
c906108c
SS
940{
941 dont_repeat ();
990f9fe3 942 solib_add (args, from_tty, (struct target_ops *) 0, 1);
c906108c
SS
943}
944
cb0ba49e
MS
945/* LOCAL FUNCTION
946
947 no_shared_libraries -- handle command to explicitly discard symbols
948 from shared libraries.
949
950 DESCRIPTION
951
952 Implements the command "nosharedlibrary", which discards symbols
953 that have been auto-loaded from shared libraries. Symbols from
954 shared libraries that were added by explicit request of the user
955 are not discarded. Also called from remote.c. */
956
c60a7562
MS
957void
958no_shared_libraries (char *ignored, int from_tty)
959{
960 objfile_purge_solibs ();
615b9dba 961 clear_solib ();
c60a7562 962}
c906108c 963
cf466558 964static void
f397e303
AC
965reload_shared_libraries (char *ignored, int from_tty,
966 struct cmd_list_element *e)
cf466558
KB
967{
968 no_shared_libraries (NULL, from_tty);
969 solib_add (NULL, from_tty, NULL, auto_solib_add);
970}
971
920d2a44
AC
972static void
973show_auto_solib_add (struct ui_file *file, int from_tty,
974 struct cmd_list_element *c, const char *value)
975{
976 fprintf_filtered (file, _("Autoloading of shared library symbols is %s.\n"),
977 value);
978}
979
980
3a40aaa0
UW
981/* Handler for library-specific lookup of global symbol NAME in OBJFILE. Call
982 the library-specific handler if it is installed for the current target. */
983
984struct symbol *
985solib_global_lookup (const struct objfile *objfile,
986 const char *name,
987 const char *linkage_name,
21b556f4 988 const domain_enum domain)
3a40aaa0 989{
1cf3db46 990 struct target_so_ops *ops = solib_ops (target_gdbarch);
3a40aaa0 991
e8a92f7b 992 if (ops->lookup_lib_global_symbol != NULL)
21b556f4 993 return ops->lookup_lib_global_symbol (objfile, name, linkage_name, domain);
3a40aaa0
UW
994 return NULL;
995}
996
997
a78f21af
AC
998extern initialize_file_ftype _initialize_solib; /* -Wmissing-prototypes */
999
c906108c 1000void
fba45db2 1001_initialize_solib (void)
c906108c 1002{
fa58ee11
EZ
1003 struct cmd_list_element *c;
1004
66aba65d
MK
1005 solib_data = gdbarch_data_register_pre_init (solib_init);
1006
c906108c 1007 add_com ("sharedlibrary", class_files, sharedlibrary_command,
1bedd215 1008 _("Load shared object library symbols for files matching REGEXP."));
c5aa993b 1009 add_info ("sharedlibrary", info_sharedlibrary_command,
1bedd215 1010 _("Status of loaded shared object libraries."));
c60a7562 1011 add_com ("nosharedlibrary", class_files, no_shared_libraries,
1bedd215 1012 _("Unload all shared object library symbols."));
c906108c 1013
5bf193a2
AC
1014 add_setshow_boolean_cmd ("auto-solib-add", class_support,
1015 &auto_solib_add, _("\
1016Set autoloading of shared library symbols."), _("\
1017Show autoloading of shared library symbols."), _("\
b7209cb4
FF
1018If \"on\", symbols from all shared object libraries will be loaded\n\
1019automatically when the inferior begins execution, when the dynamic linker\n\
1020informs gdb that a new library has been loaded, or when attaching to the\n\
5bf193a2
AC
1021inferior. Otherwise, symbols must be loaded manually, using `sharedlibrary'."),
1022 NULL,
920d2a44 1023 show_auto_solib_add,
5bf193a2 1024 &setlist, &showlist);
c906108c 1025
f822c95b
DJ
1026 add_setshow_filename_cmd ("sysroot", class_support,
1027 &gdb_sysroot, _("\
1028Set an alternate system root."), _("\
1029Show the current system root."), _("\
1030The system root is used to load absolute shared library symbol files.\n\
1031For other (relative) files, you can add directories using\n\
1032`set solib-search-path'."),
f397e303
AC
1033 reload_shared_libraries,
1034 NULL,
1035 &setlist, &showlist);
c906108c 1036
f822c95b
DJ
1037 add_alias_cmd ("solib-absolute-prefix", "sysroot", class_support, 0,
1038 &setlist);
1039 add_alias_cmd ("solib-absolute-prefix", "sysroot", class_support, 0,
1040 &showlist);
030292b7 1041
525226b5
AC
1042 add_setshow_optional_filename_cmd ("solib-search-path", class_support,
1043 &solib_search_path, _("\
1044Set the search path for loading non-absolute shared library symbol files."), _("\
1045Show the search path for loading non-absolute shared library symbol files."), _("\
1046This takes precedence over the environment variables PATH and LD_LIBRARY_PATH."),
1047 reload_shared_libraries,
920d2a44 1048 show_solib_search_path,
525226b5 1049 &setlist, &showlist);
c906108c 1050}