]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/solib.c
* arch-utils.h (legacy_register_to_value): Declare.
[thirdparty/binutils-gdb.git] / gdb / solib.c
CommitLineData
13437d4b 1/* Handle shared libraries for GDB, the GNU Debugger.
b6ba6518
KB
2 Copyright 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999,
3 2000, 2001
c906108c 4 Free Software Foundation, Inc.
c906108c 5
c5aa993b 6 This file is part of GDB.
c906108c 7
c5aa993b
JM
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
c906108c 12
c5aa993b
JM
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 59 Temple Place - Suite 330,
21 Boston, MA 02111-1307, USA. */
c906108c 22
c906108c
SS
23#include "defs.h"
24
c906108c 25#include <sys/types.h>
c906108c 26#include <fcntl.h>
13437d4b 27#include "gdb_string.h"
c906108c
SS
28#include "symtab.h"
29#include "bfd.h"
30#include "symfile.h"
31#include "objfiles.h"
32#include "gdbcore.h"
33#include "command.h"
34#include "target.h"
35#include "frame.h"
88987551 36#include "gdb_regex.h"
c906108c
SS
37#include "inferior.h"
38#include "environ.h"
39#include "language.h"
40#include "gdbcmd.h"
fa58ee11 41#include "completer.h"
fe4e3eb8 42#include "filenames.h" /* for DOSish file names */
c906108c 43
13437d4b 44#include "solist.h"
c906108c 45
13437d4b 46/* external data declarations */
c906108c 47
13437d4b
KB
48/* FIXME: gdbarch needs to control this variable */
49struct target_so_ops *current_target_so_ops;
23e04971
MS
50
51/* local data declarations */
07cd4b97 52
c906108c 53static struct so_list *so_list_head; /* List of known shared objects */
23e04971 54
c5aa993b 55static int solib_cleanup_queued = 0; /* make_run_cleanup called */
c906108c 56
c906108c
SS
57/* Local function prototypes */
58
a14ed312 59static void do_clear_solib (PTR);
c906108c 60
c906108c
SS
61/* If non-zero, this is a prefix that will be added to the front of the name
62 shared libraries with an absolute filename for loading. */
63static char *solib_absolute_prefix = NULL;
64
65/* If non-empty, this is a search path for loading non-absolute shared library
66 symbol files. This takes precedence over the environment variables PATH
67 and LD_LIBRARY_PATH. */
68static char *solib_search_path = NULL;
69
e4f7b8c8
MS
70/*
71
72 GLOBAL FUNCTION
73
74 solib_open -- Find a shared library file and open it.
75
76 SYNOPSIS
77
78 int solib_open (char *in_patname, char **found_pathname);
79
80 DESCRIPTION
81
82 Global variable SOLIB_ABSOLUTE_PREFIX is used as a prefix directory
83 to search for shared libraries if they have an absolute path.
84
85 Global variable SOLIB_SEARCH_PATH is used as a prefix directory
86 (or set of directories, as in LD_LIBRARY_PATH) to search for all
87 shared libraries if not found in SOLIB_ABSOLUTE_PREFIX.
88
89 Search order:
90 * If path is absolute, look in SOLIB_ABSOLUTE_PREFIX.
b21f0843 91 * If path is absolute or relative, look for it literally (unmodified).
e4f7b8c8
MS
92 * Look in SOLIB_SEARCH_PATH.
93 * Look in inferior's $PATH.
94 * Look in inferior's $LD_LIBRARY_PATH.
95
96 RETURNS
b21f0843 97
e4f7b8c8
MS
98 file handle for opened solib, or -1 for failure. */
99
100int
101solib_open (char *in_pathname, char **found_pathname)
102{
103 int found_file = -1;
104 char *temp_pathname = NULL;
fe4e3eb8 105 char *p = in_pathname;
e4f7b8c8 106
fe4e3eb8
EZ
107 while (*p && !IS_DIR_SEPARATOR (*p))
108 p++;
109
110 if (*p)
e4f7b8c8 111 {
fe4e3eb8 112 if (! IS_ABSOLUTE_PATH (in_pathname) || solib_absolute_prefix == NULL)
a7ec76fe
KB
113 temp_pathname = in_pathname;
114 else
115 {
b21f0843 116 int prefix_len = strlen (solib_absolute_prefix);
a7ec76fe
KB
117
118 /* Remove trailing slashes from absolute prefix. */
b21f0843 119 while (prefix_len > 0
fe4e3eb8 120 && IS_DIR_SEPARATOR (solib_absolute_prefix[prefix_len - 1]))
a7ec76fe
KB
121 prefix_len--;
122
123 /* Cat the prefixed pathname together. */
124 temp_pathname = alloca (prefix_len + strlen (in_pathname) + 1);
125 strncpy (temp_pathname, solib_absolute_prefix, prefix_len);
126 temp_pathname[prefix_len] = '\0';
127 strcat (temp_pathname, in_pathname);
a7ec76fe 128 }
b21f0843 129
e4f7b8c8
MS
130 /* Now see if we can open it. */
131 found_file = open (temp_pathname, O_RDONLY, 0);
132 }
133
ba5f0d88
OF
134 /* If the search in solib_absolute_prefix failed, and the path name is
135 absolute at this point, make it relative. (openp will try and open the
136 file according to its absolute path otherwise, which is not what we want.)
137 Affects subsequent searches for this solib. */
138 if (found_file < 0 && IS_ABSOLUTE_PATH (in_pathname))
139 {
140 /* First, get rid of any drive letters etc. */
141 while (!IS_DIR_SEPARATOR (*in_pathname))
142 in_pathname++;
143
144 /* Next, get rid of all leading dir separators. */
145 while (IS_DIR_SEPARATOR (*in_pathname))
146 in_pathname++;
147 }
148
e4f7b8c8
MS
149 /* If not found, next search the solib_search_path (if any). */
150 if (found_file < 0 && solib_search_path != NULL)
151 found_file = openp (solib_search_path,
152 1, in_pathname, O_RDONLY, 0, &temp_pathname);
ba5f0d88
OF
153
154 /* If not found, next search the solib_search_path (if any) for the basename
155 only (ignoring the path). This is to allow reading solibs from a path
156 that differs from the opened path. */
157 if (found_file < 0 && solib_search_path != NULL)
158 found_file = openp (solib_search_path,
159 1, lbasename (in_pathname), O_RDONLY, 0,
160 &temp_pathname);
e4f7b8c8
MS
161
162 /* If not found, next search the inferior's $PATH environment variable. */
163 if (found_file < 0 && solib_search_path != NULL)
164 found_file = openp (get_in_environ (inferior_environ, "PATH"),
165 1, in_pathname, O_RDONLY, 0, &temp_pathname);
166
167 /* If not found, next search the inferior's $LD_LIBRARY_PATH
168 environment variable. */
169 if (found_file < 0 && solib_search_path != NULL)
170 found_file = openp (get_in_environ (inferior_environ, "LD_LIBRARY_PATH"),
171 1, in_pathname, O_RDONLY, 0, &temp_pathname);
172
173 /* Done. If not found, tough luck. Return found_file and
174 (optionally) found_pathname. */
a7ec76fe 175 if (found_pathname != NULL && temp_pathname != NULL)
4fcf66da 176 *found_pathname = xstrdup (temp_pathname);
e4f7b8c8
MS
177 return found_file;
178}
179
180
c906108c
SS
181/*
182
c5aa993b 183 LOCAL FUNCTION
c906108c 184
c5aa993b 185 solib_map_sections -- open bfd and build sections for shared lib
c906108c 186
c5aa993b 187 SYNOPSIS
c906108c 188
c5aa993b 189 static int solib_map_sections (struct so_list *so)
c906108c 190
c5aa993b 191 DESCRIPTION
c906108c 192
c5aa993b
JM
193 Given a pointer to one of the shared objects in our list
194 of mapped objects, use the recorded name to open a bfd
195 descriptor for the object, build a section table, and then
196 relocate all the section addresses by the base address at
197 which the shared object was mapped.
c906108c 198
c5aa993b 199 FIXMES
c906108c 200
c5aa993b
JM
201 In most (all?) cases the shared object file name recorded in the
202 dynamic linkage tables will be a fully qualified pathname. For
203 cases where it isn't, do we really mimic the systems search
204 mechanism correctly in the below code (particularly the tilde
205 expansion stuff?).
c906108c
SS
206 */
207
208static int
fba45db2 209solib_map_sections (PTR arg)
c906108c
SS
210{
211 struct so_list *so = (struct so_list *) arg; /* catch_errors bogon */
212 char *filename;
213 char *scratch_pathname;
214 int scratch_chan;
215 struct section_table *p;
216 struct cleanup *old_chain;
217 bfd *abfd;
c5aa993b
JM
218
219 filename = tilde_expand (so->so_name);
220
b8c9b27d 221 old_chain = make_cleanup (xfree, filename);
e4f7b8c8 222 scratch_chan = solib_open (filename, &scratch_pathname);
c906108c 223
c906108c
SS
224 if (scratch_chan < 0)
225 {
13437d4b
KB
226 perror_with_name (filename);
227 }
104c1213 228
e4f7b8c8 229 /* Leave scratch_pathname allocated. abfd->name will point to it. */
13437d4b
KB
230 abfd = bfd_fdopenr (scratch_pathname, gnutarget, scratch_chan);
231 if (!abfd)
23e04971 232 {
13437d4b
KB
233 close (scratch_chan);
234 error ("Could not open `%s' as an executable file: %s",
235 scratch_pathname, bfd_errmsg (bfd_get_error ()));
236 }
e4f7b8c8 237
13437d4b
KB
238 /* Leave bfd open, core_xfer_memory and "info files" need it. */
239 so->abfd = abfd;
81a9a963 240 abfd->cacheable = 1;
23e04971 241
e4f7b8c8
MS
242 /* copy full path name into so_name, so that later symbol_file_add
243 can find it */
13437d4b
KB
244 if (strlen (scratch_pathname) >= SO_NAME_MAX_PATH_SIZE)
245 error ("Full path name length of shared library exceeds SO_NAME_MAX_PATH_SIZE in so_list structure.");
246 strcpy (so->so_name, scratch_pathname);
23e04971 247
13437d4b
KB
248 if (!bfd_check_format (abfd, bfd_object))
249 {
250 error ("\"%s\": not in executable format: %s.",
251 scratch_pathname, bfd_errmsg (bfd_get_error ()));
23e04971 252 }
13437d4b 253 if (build_section_table (abfd, &so->sections, &so->sections_end))
23e04971 254 {
13437d4b
KB
255 error ("Can't find the file sections in `%s': %s",
256 bfd_get_filename (abfd), bfd_errmsg (bfd_get_error ()));
23e04971 257 }
104c1213 258
13437d4b 259 for (p = so->sections; p < so->sections_end; p++)
104c1213 260 {
13437d4b
KB
261 /* Relocate the section binding addresses as recorded in the shared
262 object's file by the base address to which the object was actually
263 mapped. */
749499cb 264 TARGET_SO_RELOCATE_SECTION_ADDRESSES (so, p);
13437d4b
KB
265 if (STREQ (p->the_bfd_section->name, ".text"))
266 {
267 so->textsection = p;
268 }
104c1213
JM
269 }
270
13437d4b
KB
271 /* Free the file names, close the file now. */
272 do_cleanups (old_chain);
104c1213 273
13437d4b 274 return (1);
104c1213 275}
c906108c 276
07cd4b97 277/* LOCAL FUNCTION
c906108c 278
07cd4b97 279 free_so --- free a `struct so_list' object
c906108c 280
c5aa993b 281 SYNOPSIS
c906108c 282
07cd4b97 283 void free_so (struct so_list *so)
c906108c 284
c5aa993b 285 DESCRIPTION
c906108c 286
07cd4b97
JB
287 Free the storage associated with the `struct so_list' object SO.
288 If we have opened a BFD for SO, close it.
c906108c 289
07cd4b97
JB
290 The caller is responsible for removing SO from whatever list it is
291 a member of. If we have placed SO's sections in some target's
292 section table, the caller is responsible for removing them.
c906108c 293
07cd4b97
JB
294 This function doesn't mess with objfiles at all. If there is an
295 objfile associated with SO that needs to be removed, the caller is
296 responsible for taking care of that. */
297
13437d4b 298void
07cd4b97 299free_so (struct so_list *so)
c906108c 300{
07cd4b97 301 char *bfd_filename = 0;
c5aa993b 302
07cd4b97 303 if (so->sections)
b8c9b27d 304 xfree (so->sections);
07cd4b97
JB
305
306 if (so->abfd)
c906108c 307 {
07cd4b97
JB
308 bfd_filename = bfd_get_filename (so->abfd);
309 if (! bfd_close (so->abfd))
310 warning ("cannot close \"%s\": %s",
311 bfd_filename, bfd_errmsg (bfd_get_error ()));
c906108c 312 }
07cd4b97
JB
313
314 if (bfd_filename)
b8c9b27d 315 xfree (bfd_filename);
07cd4b97 316
13437d4b 317 TARGET_SO_FREE_SO (so);
07cd4b97 318
b8c9b27d 319 xfree (so);
c906108c
SS
320}
321
07cd4b97 322
c906108c
SS
323/* A small stub to get us past the arg-passing pinhole of catch_errors. */
324
325static int
fba45db2 326symbol_add_stub (PTR arg)
c906108c 327{
07cd4b97 328 register struct so_list *so = (struct so_list *) arg; /* catch_errs bogon */
62557bbc 329 struct section_addr_info *sap;
c906108c 330
07cd4b97
JB
331 /* Have we already loaded this shared object? */
332 ALL_OBJFILES (so->objfile)
333 {
334 if (strcmp (so->objfile->name, so->so_name) == 0)
335 return 1;
336 }
337
62557bbc
KB
338 sap = build_section_addr_info_from_section_table (so->sections,
339 so->sections_end);
e7cf9df1 340
62557bbc
KB
341 so->objfile = symbol_file_add (so->so_name, so->from_tty,
342 sap, 0, OBJF_SHARED);
343 free_section_addr_info (sap);
c906108c 344
07cd4b97 345 return (1);
c906108c
SS
346}
347
c906108c 348
07cd4b97 349/* LOCAL FUNCTION
c906108c 350
105b175f 351 update_solib_list --- synchronize GDB's shared object list with inferior's
c906108c 352
c5aa993b 353 SYNOPSIS
c906108c 354
105b175f 355 void update_solib_list (int from_tty, struct target_ops *TARGET)
c906108c 356
07cd4b97 357 Extract the list of currently loaded shared objects from the
105b175f
JB
358 inferior, and compare it with the list of shared objects currently
359 in GDB's so_list_head list. Edit so_list_head to bring it in sync
360 with the inferior's new list.
c906108c 361
105b175f
JB
362 If we notice that the inferior has unloaded some shared objects,
363 free any symbolic info GDB had read about those shared objects.
364
365 Don't load symbolic info for any new shared objects; just add them
366 to the list, and leave their symbols_loaded flag clear.
07cd4b97
JB
367
368 If FROM_TTY is non-null, feel free to print messages about what
369 we're doing.
c906108c 370
07cd4b97
JB
371 If TARGET is non-null, add the sections of all new shared objects
372 to TARGET's section table. Note that this doesn't remove any
373 sections for shared objects that have been unloaded, and it
374 doesn't check to see if the new shared objects are already present in
375 the section table. But we only use this for core files and
376 processes we've just attached to, so that's okay. */
c906108c 377
07cd4b97 378void
105b175f 379update_solib_list (int from_tty, struct target_ops *target)
07cd4b97 380{
13437d4b 381 struct so_list *inferior = TARGET_SO_CURRENT_SOS ();
07cd4b97
JB
382 struct so_list *gdb, **gdb_link;
383
104c1213
JM
384 /* If we are attaching to a running process for which we
385 have not opened a symbol file, we may be able to get its
386 symbols now! */
387 if (attach_flag &&
388 symfile_objfile == NULL)
13437d4b 389 catch_errors (TARGET_SO_OPEN_SYMBOL_FILE_OBJECT, (PTR) &from_tty,
104c1213
JM
390 "Error reading attached process's symbol file.\n",
391 RETURN_MASK_ALL);
392
07cd4b97
JB
393 /* Since this function might actually add some elements to the
394 so_list_head list, arrange for it to be cleaned up when
395 appropriate. */
396 if (!solib_cleanup_queued)
397 {
398 make_run_cleanup (do_clear_solib, NULL);
399 solib_cleanup_queued = 1;
c906108c 400 }
c5aa993b 401
07cd4b97
JB
402 /* GDB and the inferior's dynamic linker each maintain their own
403 list of currently loaded shared objects; we want to bring the
404 former in sync with the latter. Scan both lists, seeing which
405 shared objects appear where. There are three cases:
406
407 - A shared object appears on both lists. This means that GDB
105b175f
JB
408 knows about it already, and it's still loaded in the inferior.
409 Nothing needs to happen.
07cd4b97
JB
410
411 - A shared object appears only on GDB's list. This means that
105b175f
JB
412 the inferior has unloaded it. We should remove the shared
413 object from GDB's tables.
07cd4b97
JB
414
415 - A shared object appears only on the inferior's list. This
105b175f
JB
416 means that it's just been loaded. We should add it to GDB's
417 tables.
07cd4b97
JB
418
419 So we walk GDB's list, checking each entry to see if it appears
420 in the inferior's list too. If it does, no action is needed, and
421 we remove it from the inferior's list. If it doesn't, the
422 inferior has unloaded it, and we remove it from GDB's list. By
423 the time we're done walking GDB's list, the inferior's list
424 contains only the new shared objects, which we then add. */
425
426 gdb = so_list_head;
427 gdb_link = &so_list_head;
428 while (gdb)
c906108c 429 {
07cd4b97
JB
430 struct so_list *i = inferior;
431 struct so_list **i_link = &inferior;
432
433 /* Check to see whether the shared object *gdb also appears in
434 the inferior's current list. */
435 while (i)
c906108c 436 {
07cd4b97
JB
437 if (! strcmp (gdb->so_original_name, i->so_original_name))
438 break;
439
440 i_link = &i->next;
441 i = *i_link;
c906108c 442 }
c5aa993b 443
07cd4b97
JB
444 /* If the shared object appears on the inferior's list too, then
445 it's still loaded, so we don't need to do anything. Delete
446 it from the inferior's list, and leave it on GDB's list. */
447 if (i)
c906108c 448 {
07cd4b97 449 *i_link = i->next;
07cd4b97
JB
450 free_so (i);
451 gdb_link = &gdb->next;
452 gdb = *gdb_link;
453 }
454
455 /* If it's not on the inferior's list, remove it from GDB's tables. */
456 else
457 {
458 *gdb_link = gdb->next;
07cd4b97
JB
459
460 /* Unless the user loaded it explicitly, free SO's objfile. */
e8930304 461 if (gdb->objfile && ! (gdb->objfile->flags & OBJF_USERLOADED))
07cd4b97
JB
462 free_objfile (gdb->objfile);
463
464 /* Some targets' section tables might be referring to
465 sections from so->abfd; remove them. */
466 remove_target_sections (gdb->abfd);
467
468 free_so (gdb);
469 gdb = *gdb_link;
c906108c
SS
470 }
471 }
c5aa993b 472
07cd4b97
JB
473 /* Now the inferior's list contains only shared objects that don't
474 appear in GDB's list --- those that are newly loaded. Add them
e8930304 475 to GDB's shared object list. */
07cd4b97 476 if (inferior)
c906108c 477 {
07cd4b97
JB
478 struct so_list *i;
479
480 /* Add the new shared objects to GDB's list. */
481 *gdb_link = inferior;
482
e8930304 483 /* Fill in the rest of each of the `struct so_list' nodes. */
07cd4b97 484 for (i = inferior; i; i = i->next)
c906108c 485 {
07cd4b97
JB
486 i->from_tty = from_tty;
487
488 /* Fill in the rest of the `struct so_list' node. */
489 catch_errors (solib_map_sections, i,
490 "Error while mapping shared library sections:\n",
491 RETURN_MASK_ALL);
07cd4b97 492
b41be06e
ND
493 /* If requested, add the shared object's sections to the TARGET's
494 section table. Do this immediately after mapping the object so
495 that later nodes in the list can query this object, as is needed
496 in solib-osf.c. */
497 if (target)
c906108c 498 {
b41be06e
ND
499 int count = (i->sections_end - i->sections);
500 if (count > 0)
07cd4b97 501 {
b41be06e 502 int space = target_resize_to_sections (target, count);
07cd4b97
JB
503 memcpy (target->to_sections + space,
504 i->sections,
505 count * sizeof (i->sections[0]));
07cd4b97 506 }
c906108c
SS
507 }
508 }
e8930304 509 }
105b175f
JB
510}
511
512
513/* GLOBAL FUNCTION
514
515 solib_add -- read in symbol info for newly added shared libraries
516
517 SYNOPSIS
518
990f9fe3
FF
519 void solib_add (char *pattern, int from_tty, struct target_ops
520 *TARGET, int readsyms)
105b175f
JB
521
522 DESCRIPTION
523
524 Read in symbolic information for any shared objects whose names
525 match PATTERN. (If we've already read a shared object's symbol
526 info, leave it alone.) If PATTERN is zero, read them all.
527
990f9fe3
FF
528 If READSYMS is 0, defer reading symbolic information until later
529 but still do any needed low level processing.
530
105b175f
JB
531 FROM_TTY and TARGET are as described for update_solib_list, above. */
532
533void
990f9fe3 534solib_add (char *pattern, int from_tty, struct target_ops *target, int readsyms)
105b175f
JB
535{
536 struct so_list *gdb;
537
538 if (pattern)
539 {
540 char *re_err = re_comp (pattern);
541
542 if (re_err)
543 error ("Invalid regexp: %s", re_err);
544 }
545
546 update_solib_list (from_tty, target);
c906108c 547
105b175f
JB
548 /* Walk the list of currently loaded shared libraries, and read
549 symbols for any that match the pattern --- or any whose symbols
550 aren't already loaded, if no pattern was given. */
e8930304
JB
551 {
552 int any_matches = 0;
553 int loaded_any_symbols = 0;
c906108c 554
e8930304
JB
555 for (gdb = so_list_head; gdb; gdb = gdb->next)
556 if (! pattern || re_exec (gdb->so_name))
557 {
558 any_matches = 1;
559
560 if (gdb->symbols_loaded)
561 {
562 if (from_tty)
563 printf_unfiltered ("Symbols already loaded for %s\n",
564 gdb->so_name);
565 }
990f9fe3 566 else if (readsyms)
e8930304
JB
567 {
568 if (catch_errors
569 (symbol_add_stub, gdb,
570 "Error while reading shared library symbols:\n",
571 RETURN_MASK_ALL))
572 {
573 if (from_tty)
574 printf_unfiltered ("Loaded symbols for %s\n",
575 gdb->so_name);
576 gdb->symbols_loaded = 1;
577 loaded_any_symbols = 1;
578 }
579 }
580 }
581
582 if (from_tty && pattern && ! any_matches)
583 printf_unfiltered
584 ("No loaded shared libraries match the pattern `%s'.\n", pattern);
585
586 if (loaded_any_symbols)
587 {
588 /* Getting new symbols may change our opinion about what is
589 frameless. */
590 reinit_frame_cache ();
591
13437d4b 592 TARGET_SO_SPECIAL_SYMBOL_HANDLING ();
e8930304
JB
593 }
594 }
c906108c
SS
595}
596
07cd4b97 597
c906108c
SS
598/*
599
c5aa993b 600 LOCAL FUNCTION
c906108c 601
c5aa993b 602 info_sharedlibrary_command -- code for "info sharedlibrary"
c906108c 603
c5aa993b 604 SYNOPSIS
c906108c 605
c5aa993b 606 static void info_sharedlibrary_command ()
c906108c 607
c5aa993b 608 DESCRIPTION
c906108c 609
c5aa993b
JM
610 Walk through the shared library list and print information
611 about each attached library.
612 */
c906108c
SS
613
614static void
fba45db2 615info_sharedlibrary_command (char *ignore, int from_tty)
c906108c 616{
c5aa993b 617 register struct so_list *so = NULL; /* link map state variable */
c906108c
SS
618 int header_done = 0;
619 int addr_width;
620 char *addr_fmt;
621
c7cccb76 622 if (TARGET_PTR_BIT == 32)
f5b8946c
MS
623 {
624 addr_width = 8 + 4;
625 addr_fmt = "08l";
626 }
c7cccb76 627 else if (TARGET_PTR_BIT == 64)
f5b8946c
MS
628 {
629 addr_width = 16 + 4;
630 addr_fmt = "016l";
631 }
7f7e9482
AC
632 else
633 {
8e65ff28 634 internal_error (__FILE__, __LINE__,
c7cccb76
MS
635 "TARGET_PTR_BIT returned unknown size %d",
636 TARGET_PTR_BIT);
7f7e9482 637 }
c906108c 638
105b175f 639 update_solib_list (from_tty, 0);
07cd4b97
JB
640
641 for (so = so_list_head; so; so = so->next)
c906108c 642 {
c5aa993b 643 if (so->so_name[0])
c906108c
SS
644 {
645 if (!header_done)
646 {
c5aa993b
JM
647 printf_unfiltered ("%-*s%-*s%-12s%s\n", addr_width, "From",
648 addr_width, "To", "Syms Read",
649 "Shared Object Library");
c906108c
SS
650 header_done++;
651 }
652
653 printf_unfiltered ("%-*s", addr_width,
749499cb 654 so->textsection != NULL
a43ad351
MH
655 ? longest_local_hex_string_custom (
656 (LONGEST) so->textsection->addr,
749499cb
KB
657 addr_fmt)
658 : "");
c906108c 659 printf_unfiltered ("%-*s", addr_width,
749499cb 660 so->textsection != NULL
a43ad351
MH
661 ? longest_local_hex_string_custom (
662 (LONGEST) so->textsection->endaddr,
749499cb
KB
663 addr_fmt)
664 : "");
c5aa993b
JM
665 printf_unfiltered ("%-12s", so->symbols_loaded ? "Yes" : "No");
666 printf_unfiltered ("%s\n", so->so_name);
c906108c
SS
667 }
668 }
669 if (so_list_head == NULL)
670 {
c5aa993b 671 printf_unfiltered ("No shared libraries loaded at this time.\n");
c906108c
SS
672 }
673}
674
675/*
676
c5aa993b 677 GLOBAL FUNCTION
c906108c 678
c5aa993b 679 solib_address -- check to see if an address is in a shared lib
c906108c 680
c5aa993b 681 SYNOPSIS
c906108c 682
c5aa993b 683 char * solib_address (CORE_ADDR address)
c906108c 684
c5aa993b 685 DESCRIPTION
c906108c 686
c5aa993b
JM
687 Provides a hook for other gdb routines to discover whether or
688 not a particular address is within the mapped address space of
749499cb 689 a shared library.
c906108c 690
c5aa993b
JM
691 For example, this routine is called at one point to disable
692 breakpoints which are in shared libraries that are not currently
693 mapped in.
c906108c
SS
694 */
695
696char *
fba45db2 697solib_address (CORE_ADDR address)
c906108c 698{
c5aa993b
JM
699 register struct so_list *so = 0; /* link map state variable */
700
07cd4b97 701 for (so = so_list_head; so; so = so->next)
c906108c 702 {
749499cb
KB
703 struct section_table *p;
704
705 for (p = so->sections; p < so->sections_end; p++)
706 {
707 if (p->addr <= address && address < p->endaddr)
708 return (so->so_name);
709 }
c906108c 710 }
07cd4b97 711
c906108c
SS
712 return (0);
713}
714
715/* Called by free_all_symtabs */
716
c5aa993b 717void
fba45db2 718clear_solib (void)
c906108c 719{
085dd6e6
JM
720 /* This function is expected to handle ELF shared libraries. It is
721 also used on Solaris, which can run either ELF or a.out binaries
722 (for compatibility with SunOS 4), both of which can use shared
723 libraries. So we don't know whether we have an ELF executable or
724 an a.out executable until the user chooses an executable file.
725
726 ELF shared libraries don't get mapped into the address space
727 until after the program starts, so we'd better not try to insert
728 breakpoints in them immediately. We have to wait until the
729 dynamic linker has loaded them; we'll hit a bp_shlib_event
730 breakpoint (look for calls to create_solib_event_breakpoint) when
731 it's ready.
732
733 SunOS shared libraries seem to be different --- they're present
734 as soon as the process begins execution, so there's no need to
735 put off inserting breakpoints. There's also nowhere to put a
736 bp_shlib_event breakpoint, so if we put it off, we'll never get
737 around to it.
738
739 So: disable breakpoints only if we're using ELF shared libs. */
740 if (exec_bfd != NULL
741 && bfd_get_flavour (exec_bfd) != bfd_target_aout_flavour)
742 disable_breakpoints_in_shlibs (1);
743
c906108c
SS
744 while (so_list_head)
745 {
07cd4b97
JB
746 struct so_list *so = so_list_head;
747 so_list_head = so->next;
2069d78d
KB
748 if (so->abfd)
749 remove_target_sections (so->abfd);
07cd4b97 750 free_so (so);
c906108c 751 }
07cd4b97 752
13437d4b 753 TARGET_SO_CLEAR_SOLIB ();
c906108c
SS
754}
755
756static void
fba45db2 757do_clear_solib (PTR dummy)
c906108c
SS
758{
759 solib_cleanup_queued = 0;
760 clear_solib ();
761}
762
13437d4b 763/* GLOBAL FUNCTION
c5aa993b
JM
764
765 solib_create_inferior_hook -- shared library startup support
766
767 SYNOPSIS
768
769 void solib_create_inferior_hook()
770
771 DESCRIPTION
772
773 When gdb starts up the inferior, it nurses it along (through the
774 shell) until it is ready to execute it's first instruction. At this
775 point, this function gets called via expansion of the macro
13437d4b 776 SOLIB_CREATE_INFERIOR_HOOK. */
c5aa993b
JM
777
778void
fba45db2 779solib_create_inferior_hook (void)
c906108c 780{
13437d4b 781 TARGET_SO_SOLIB_CREATE_INFERIOR_HOOK ();
c906108c
SS
782}
783
d7fa2ae2
KB
784/* GLOBAL FUNCTION
785
786 in_solib_dynsym_resolve_code -- check to see if an address is in
787 dynamic loader's dynamic symbol
788 resolution code
789
790 SYNOPSIS
791
792 int in_solib_dynsym_resolve_code (CORE_ADDR pc)
793
794 DESCRIPTION
795
796 Determine if PC is in the dynamic linker's symbol resolution
797 code. Return 1 if so, 0 otherwise.
798*/
799
800int
801in_solib_dynsym_resolve_code (CORE_ADDR pc)
802{
803 return TARGET_SO_IN_DYNSYM_RESOLVE_CODE (pc);
804}
c906108c
SS
805
806/*
807
c5aa993b 808 LOCAL FUNCTION
c906108c 809
c5aa993b 810 sharedlibrary_command -- handle command to explicitly add library
c906108c 811
c5aa993b 812 SYNOPSIS
c906108c 813
c5aa993b 814 static void sharedlibrary_command (char *args, int from_tty)
c906108c 815
c5aa993b 816 DESCRIPTION
c906108c 817
c5aa993b 818 */
c906108c
SS
819
820static void
fba45db2 821sharedlibrary_command (char *args, int from_tty)
c906108c
SS
822{
823 dont_repeat ();
990f9fe3 824 solib_add (args, from_tty, (struct target_ops *) 0, 1);
c906108c
SS
825}
826
cb0ba49e
MS
827/* LOCAL FUNCTION
828
829 no_shared_libraries -- handle command to explicitly discard symbols
830 from shared libraries.
831
832 DESCRIPTION
833
834 Implements the command "nosharedlibrary", which discards symbols
835 that have been auto-loaded from shared libraries. Symbols from
836 shared libraries that were added by explicit request of the user
837 are not discarded. Also called from remote.c. */
838
c60a7562
MS
839void
840no_shared_libraries (char *ignored, int from_tty)
841{
842 objfile_purge_solibs ();
843 do_clear_solib (NULL);
844}
c906108c
SS
845
846void
fba45db2 847_initialize_solib (void)
c906108c 848{
fa58ee11
EZ
849 struct cmd_list_element *c;
850
c906108c
SS
851 add_com ("sharedlibrary", class_files, sharedlibrary_command,
852 "Load shared object library symbols for files matching REGEXP.");
c5aa993b 853 add_info ("sharedlibrary", info_sharedlibrary_command,
c906108c 854 "Status of loaded shared object libraries.");
c60a7562 855 add_com ("nosharedlibrary", class_files, no_shared_libraries,
e89a4777 856 "Unload all shared object library symbols.");
c906108c
SS
857
858 add_show_from_set
b7209cb4 859 (add_set_cmd ("auto-solib-add", class_support, var_boolean,
c906108c
SS
860 (char *) &auto_solib_add,
861 "Set autoloading of shared library symbols.\n\
b7209cb4
FF
862If \"on\", symbols from all shared object libraries will be loaded\n\
863automatically when the inferior begins execution, when the dynamic linker\n\
864informs gdb that a new library has been loaded, or when attaching to the\n\
865inferior. Otherwise, symbols must be loaded manually, using `sharedlibrary'.",
c906108c
SS
866 &setlist),
867 &showlist);
868
fa58ee11
EZ
869 c = add_set_cmd ("solib-absolute-prefix", class_support, var_filename,
870 (char *) &solib_absolute_prefix,
871 "Set prefix for loading absolute shared library symbol files.\n\
c906108c 872For other (relative) files, you can add values using `set solib-search-path'.",
fa58ee11
EZ
873 &setlist);
874 add_show_from_set (c, &showlist);
5ba2abeb 875 set_cmd_completer (c, filename_completer);
c906108c 876
fa58ee11
EZ
877 c = add_set_cmd ("solib-search-path", class_support, var_string,
878 (char *) &solib_search_path,
879 "Set the search path for loading non-absolute shared library symbol files.\n\
880This takes precedence over the environment variables PATH and LD_LIBRARY_PATH.",
881 &setlist);
882 add_show_from_set (c, &showlist);
5ba2abeb 883 set_cmd_completer (c, filename_completer);
c906108c 884}