]>
Commit | Line | Data |
---|---|---|
13437d4b | 1 | /* Handle shared libraries for GDB, the GNU Debugger. |
14a5e767 | 2 | |
e2882c85 | 3 | Copyright (C) 1990-2018 Free Software Foundation, Inc. |
c906108c | 4 | |
c5aa993b | 5 | This file is part of GDB. |
c906108c | 6 | |
c5aa993b JM |
7 | This program is free software; you can redistribute it and/or modify |
8 | it under the terms of the GNU General Public License as published by | |
a9762ec7 | 9 | the Free Software Foundation; either version 3 of the License, or |
c5aa993b | 10 | (at your option) any later version. |
c906108c | 11 | |
c5aa993b JM |
12 | This program is distributed in the hope that it will be useful, |
13 | but WITHOUT ANY WARRANTY; without even the implied warranty of | |
14 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
15 | GNU General Public License for more details. | |
16 | ||
17 | You should have received a copy of the GNU General Public License | |
a9762ec7 | 18 | along with this program. If not, see <http://www.gnu.org/licenses/>. */ |
c906108c | 19 | |
c906108c SS |
20 | #include "defs.h" |
21 | ||
c906108c | 22 | #include <sys/types.h> |
c906108c | 23 | #include <fcntl.h> |
c906108c SS |
24 | #include "symtab.h" |
25 | #include "bfd.h" | |
26 | #include "symfile.h" | |
27 | #include "objfiles.h" | |
28 | #include "gdbcore.h" | |
29 | #include "command.h" | |
30 | #include "target.h" | |
31 | #include "frame.h" | |
88987551 | 32 | #include "gdb_regex.h" |
c906108c SS |
33 | #include "inferior.h" |
34 | #include "environ.h" | |
35 | #include "language.h" | |
36 | #include "gdbcmd.h" | |
fa58ee11 | 37 | #include "completer.h" |
fe4e3eb8 | 38 | #include "filenames.h" /* for DOSish file names */ |
4646aa9d | 39 | #include "exec.h" |
13437d4b | 40 | #include "solist.h" |
76727919 | 41 | #include "observable.h" |
dbda9972 | 42 | #include "readline/readline.h" |
f1838a98 | 43 | #include "remote.h" |
2c0b251b | 44 | #include "solib.h" |
55333a84 | 45 | #include "interps.h" |
ab38a727 | 46 | #include "filesystem.h" |
cbb099e8 | 47 | #include "gdb_bfd.h" |
614c279d | 48 | #include "filestuff.h" |
b46a8d7c | 49 | #include "source.h" |
c906108c | 50 | |
66aba65d MK |
51 | /* Architecture-specific operations. */ |
52 | ||
53 | /* Per-architecture data key. */ | |
54 | static struct gdbarch_data *solib_data; | |
55 | ||
56 | static void * | |
57 | solib_init (struct obstack *obstack) | |
58 | { | |
59 | struct target_so_ops **ops; | |
60 | ||
61 | ops = OBSTACK_ZALLOC (obstack, struct target_so_ops *); | |
62 | *ops = current_target_so_ops; | |
63 | return ops; | |
64 | } | |
65 | ||
3641da11 | 66 | static const struct target_so_ops * |
66aba65d MK |
67 | solib_ops (struct gdbarch *gdbarch) |
68 | { | |
19ba03f4 SM |
69 | const struct target_so_ops **ops |
70 | = (const struct target_so_ops **) gdbarch_data (gdbarch, solib_data); | |
433759f7 | 71 | |
66aba65d MK |
72 | return *ops; |
73 | } | |
7d522c90 DJ |
74 | |
75 | /* Set the solib operations for GDBARCH to NEW_OPS. */ | |
76 | ||
77 | void | |
3641da11 | 78 | set_solib_ops (struct gdbarch *gdbarch, const struct target_so_ops *new_ops) |
7d522c90 | 79 | { |
19ba03f4 SM |
80 | const struct target_so_ops **ops |
81 | = (const struct target_so_ops **) gdbarch_data (gdbarch, solib_data); | |
433759f7 | 82 | |
7d522c90 DJ |
83 | *ops = new_ops; |
84 | } | |
66aba65d MK |
85 | \f |
86 | ||
13437d4b | 87 | /* external data declarations */ |
c906108c | 88 | |
7d522c90 DJ |
89 | /* FIXME: gdbarch needs to control this variable, or else every |
90 | configuration needs to call set_solib_ops. */ | |
13437d4b | 91 | struct target_so_ops *current_target_so_ops; |
23e04971 | 92 | |
c906108c SS |
93 | /* Local function prototypes */ |
94 | ||
c906108c SS |
95 | /* If non-empty, this is a search path for loading non-absolute shared library |
96 | symbol files. This takes precedence over the environment variables PATH | |
97 | and LD_LIBRARY_PATH. */ | |
98 | static char *solib_search_path = NULL; | |
920d2a44 AC |
99 | static void |
100 | show_solib_search_path (struct ui_file *file, int from_tty, | |
101 | struct cmd_list_element *c, const char *value) | |
102 | { | |
3e43a32a MS |
103 | fprintf_filtered (file, _("The search path for loading non-absolute " |
104 | "shared library symbol files is %s.\n"), | |
920d2a44 AC |
105 | value); |
106 | } | |
c906108c | 107 | |
ab38a727 PA |
108 | /* Same as HAVE_DOS_BASED_FILE_SYSTEM, but useable as an rvalue. */ |
109 | #if (HAVE_DOS_BASED_FILE_SYSTEM) | |
110 | # define DOS_BASED_FILE_SYSTEM 1 | |
111 | #else | |
112 | # define DOS_BASED_FILE_SYSTEM 0 | |
113 | #endif | |
114 | ||
797bc1cb TT |
115 | /* Return the full pathname of a binary file (the main executable or a |
116 | shared library file), or NULL if not found. If FD is non-NULL, *FD | |
117 | is set to either -1 or an open file handle for the binary file. | |
e4f7b8c8 | 118 | |
f822c95b | 119 | Global variable GDB_SYSROOT is used as a prefix directory |
af1900b0 | 120 | to search for binary files if they have an absolute path. |
b57fbfba GB |
121 | If GDB_SYSROOT starts with "target:" and target filesystem |
122 | is the local filesystem then the "target:" prefix will be | |
123 | stripped before the search starts. This ensures that the | |
124 | same search algorithm is used for local files regardless of | |
125 | whether a "target:" prefix was used. | |
e4f7b8c8 MS |
126 | |
127 | Global variable SOLIB_SEARCH_PATH is used as a prefix directory | |
128 | (or set of directories, as in LD_LIBRARY_PATH) to search for all | |
b57fbfba | 129 | shared libraries if not found in either the sysroot (if set) or |
af1900b0 GB |
130 | the local filesystem. SOLIB_SEARCH_PATH is not used when searching |
131 | for the main executable. | |
e4f7b8c8 | 132 | |
c8c18e65 | 133 | Search algorithm: |
b57fbfba GB |
134 | * If a sysroot is set and path is absolute: |
135 | * Search for sysroot/path. | |
c8c18e65 KW |
136 | * else |
137 | * Look for it literally (unmodified). | |
af1900b0 GB |
138 | * If IS_SOLIB is non-zero: |
139 | * Look in SOLIB_SEARCH_PATH. | |
140 | * If available, use target defined search function. | |
b57fbfba | 141 | * If NO sysroot is set, perform the following two searches: |
c8c18e65 | 142 | * Look in inferior's $PATH. |
af1900b0 GB |
143 | * If IS_SOLIB is non-zero: |
144 | * Look in inferior's $LD_LIBRARY_PATH. | |
ab38a727 | 145 | * |
c8c18e65 | 146 | * The last check avoids doing this search when targetting remote |
b57fbfba | 147 | * machines since a sysroot will almost always be set. |
7f86f058 | 148 | */ |
e4f7b8c8 | 149 | |
797bc1cb | 150 | static gdb::unique_xmalloc_ptr<char> |
992f1ddc | 151 | solib_find_1 (const char *in_pathname, int *fd, int is_solib) |
e4f7b8c8 | 152 | { |
3641da11 | 153 | const struct target_so_ops *ops = solib_ops (target_gdbarch ()); |
e4f7b8c8 | 154 | int found_file = -1; |
e0cc99a6 | 155 | gdb::unique_xmalloc_ptr<char> temp_pathname; |
ab38a727 | 156 | const char *fskind = effective_target_file_system_kind (); |
9a897d43 | 157 | const char *sysroot = gdb_sysroot; |
f8773be1 | 158 | int prefix_len, orig_prefix_len; |
08105857 | 159 | |
a3be80c3 GB |
160 | /* If the absolute prefix starts with "target:" but the filesystem |
161 | accessed by the target_fileio_* methods is the local filesystem | |
162 | then we strip the "target:" prefix now and work with the local | |
163 | filesystem. This ensures that the same search algorithm is used | |
164 | for all local files regardless of whether a "target:" prefix was | |
165 | used. */ | |
166 | if (is_target_filename (sysroot) && target_filesystem_is_local ()) | |
167 | sysroot += strlen (TARGET_SYSROOT_PREFIX); | |
168 | ||
f8773be1 GB |
169 | /* Strip any trailing slashes from the absolute prefix. */ |
170 | prefix_len = orig_prefix_len = strlen (sysroot); | |
f1d10cfb | 171 | |
f8773be1 GB |
172 | while (prefix_len > 0 && IS_DIR_SEPARATOR (sysroot[prefix_len - 1])) |
173 | prefix_len--; | |
f1d10cfb | 174 | |
9a897d43 | 175 | std::string sysroot_holder; |
f8773be1 GB |
176 | if (prefix_len == 0) |
177 | sysroot = NULL; | |
178 | else if (prefix_len != orig_prefix_len) | |
179 | { | |
9a897d43 TT |
180 | sysroot_holder = std::string (sysroot, prefix_len); |
181 | sysroot = sysroot_holder.c_str (); | |
ab38a727 PA |
182 | } |
183 | ||
184 | /* If we're on a non-DOS-based system, backslashes won't be | |
185 | understood as directory separator, so, convert them to forward | |
186 | slashes, iff we're supposed to handle DOS-based file system | |
187 | semantics for target paths. */ | |
188 | if (!DOS_BASED_FILE_SYSTEM && fskind == file_system_kind_dos_based) | |
189 | { | |
190 | char *p; | |
191 | ||
192 | /* Avoid clobbering our input. */ | |
224c3ddb | 193 | p = (char *) alloca (strlen (in_pathname) + 1); |
ab38a727 PA |
194 | strcpy (p, in_pathname); |
195 | in_pathname = p; | |
196 | ||
197 | for (; *p; p++) | |
198 | { | |
199 | if (*p == '\\') | |
200 | *p = '/'; | |
201 | } | |
202 | } | |
203 | ||
204 | /* Note, we're interested in IS_TARGET_ABSOLUTE_PATH, not | |
205 | IS_ABSOLUTE_PATH. The latter is for host paths only, while | |
206 | IN_PATHNAME is a target path. For example, if we're supposed to | |
207 | be handling DOS-like semantics we want to consider a | |
208 | 'c:/foo/bar.dll' path as an absolute path, even on a Unix box. | |
209 | With such a path, before giving up on the sysroot, we'll try: | |
210 | ||
211 | 1st attempt, c:/foo/bar.dll ==> /sysroot/c:/foo/bar.dll | |
212 | 2nd attempt, c:/foo/bar.dll ==> /sysroot/c/foo/bar.dll | |
213 | 3rd attempt, c:/foo/bar.dll ==> /sysroot/foo/bar.dll | |
214 | */ | |
215 | ||
b57fbfba | 216 | if (!IS_TARGET_ABSOLUTE_PATH (fskind, in_pathname) || sysroot == NULL) |
e0cc99a6 | 217 | temp_pathname.reset (xstrdup (in_pathname)); |
ab38a727 PA |
218 | else |
219 | { | |
220 | int need_dir_separator; | |
221 | ||
3736004f PA |
222 | /* Concatenate the sysroot and the target reported filename. We |
223 | may need to glue them with a directory separator. Cases to | |
224 | consider: | |
225 | ||
226 | | sysroot | separator | in_pathname | | |
227 | |-----------------+-----------+----------------| | |
228 | | /some/dir | / | c:/foo/bar.dll | | |
229 | | /some/dir | | /foo/bar.dll | | |
2938e6cf GB |
230 | | target: | | c:/foo/bar.dll | |
231 | | target: | | /foo/bar.dll | | |
232 | | target:some/dir | / | c:/foo/bar.dll | | |
233 | | target:some/dir | | /foo/bar.dll | | |
3736004f PA |
234 | |
235 | IOW, we don't need to add a separator if IN_PATHNAME already | |
2938e6cf | 236 | has one, or when the the sysroot is exactly "target:". |
3736004f PA |
237 | There's no need to check for drive spec explicitly, as we only |
238 | get here if IN_PATHNAME is considered an absolute path. */ | |
239 | need_dir_separator = !(IS_DIR_SEPARATOR (in_pathname[0]) | |
2938e6cf | 240 | || strcmp (TARGET_SYSROOT_PREFIX, sysroot) == 0); |
ab38a727 | 241 | |
f1d10cfb | 242 | /* Cat the prefixed pathname together. */ |
e0cc99a6 TT |
243 | temp_pathname.reset (concat (sysroot, |
244 | need_dir_separator ? SLASH_STRING : "", | |
245 | in_pathname, (char *) NULL)); | |
e4f7b8c8 MS |
246 | } |
247 | ||
2938e6cf | 248 | /* Handle files to be accessed via the target. */ |
e0cc99a6 | 249 | if (is_target_filename (temp_pathname.get ())) |
f1838a98 | 250 | { |
998d2a3e GB |
251 | if (fd != NULL) |
252 | *fd = -1; | |
e0cc99a6 | 253 | return temp_pathname; |
f1838a98 UW |
254 | } |
255 | ||
f1d10cfb | 256 | /* Now see if we can open it. */ |
e0cc99a6 | 257 | found_file = gdb_open_cloexec (temp_pathname.get (), O_RDONLY | O_BINARY, 0); |
ab38a727 PA |
258 | |
259 | /* If the search in gdb_sysroot failed, and the path name has a | |
260 | drive spec (e.g, c:/foo), try stripping ':' from the drive spec, | |
261 | and retrying in the sysroot: | |
262 | c:/foo/bar.dll ==> /sysroot/c/foo/bar.dll. */ | |
f1d10cfb | 263 | |
ab38a727 | 264 | if (found_file < 0 |
b57fbfba | 265 | && sysroot != NULL |
ab38a727 PA |
266 | && HAS_TARGET_DRIVE_SPEC (fskind, in_pathname)) |
267 | { | |
268 | int need_dir_separator = !IS_DIR_SEPARATOR (in_pathname[2]); | |
e0cc99a6 | 269 | char drive[2] = { in_pathname[0], '\0' }; |
ab38a727 | 270 | |
e0cc99a6 TT |
271 | temp_pathname.reset (concat (sysroot, |
272 | SLASH_STRING, | |
273 | drive, | |
274 | need_dir_separator ? SLASH_STRING : "", | |
275 | in_pathname + 2, (char *) NULL)); | |
ab38a727 | 276 | |
e0cc99a6 TT |
277 | found_file = gdb_open_cloexec (temp_pathname.get (), |
278 | O_RDONLY | O_BINARY, 0); | |
ab38a727 PA |
279 | if (found_file < 0) |
280 | { | |
ab38a727 PA |
281 | /* If the search in gdb_sysroot still failed, try fully |
282 | stripping the drive spec, and trying once more in the | |
283 | sysroot before giving up. | |
284 | ||
285 | c:/foo/bar.dll ==> /sysroot/foo/bar.dll. */ | |
286 | ||
e0cc99a6 TT |
287 | temp_pathname.reset (concat (sysroot, |
288 | need_dir_separator ? SLASH_STRING : "", | |
289 | in_pathname + 2, (char *) NULL)); | |
ab38a727 | 290 | |
e0cc99a6 TT |
291 | found_file = gdb_open_cloexec (temp_pathname.get (), |
292 | O_RDONLY | O_BINARY, 0); | |
ab38a727 PA |
293 | } |
294 | } | |
0997b535 | 295 | |
ab38a727 PA |
296 | /* We try to find the library in various ways. After each attempt, |
297 | either found_file >= 0 and temp_pathname is a malloc'd string, or | |
298 | found_file < 0 and temp_pathname does not point to storage that | |
299 | needs to be freed. */ | |
300 | ||
301 | if (found_file < 0) | |
e0cc99a6 | 302 | temp_pathname.reset (NULL); |
ab38a727 | 303 | |
f822c95b | 304 | /* If the search in gdb_sysroot failed, and the path name is |
ba5f0d88 OF |
305 | absolute at this point, make it relative. (openp will try and open the |
306 | file according to its absolute path otherwise, which is not what we want.) | |
307 | Affects subsequent searches for this solib. */ | |
ab38a727 | 308 | if (found_file < 0 && IS_TARGET_ABSOLUTE_PATH (fskind, in_pathname)) |
ba5f0d88 OF |
309 | { |
310 | /* First, get rid of any drive letters etc. */ | |
ab38a727 PA |
311 | while (!IS_TARGET_DIR_SEPARATOR (fskind, *in_pathname)) |
312 | in_pathname++; | |
ba5f0d88 OF |
313 | |
314 | /* Next, get rid of all leading dir separators. */ | |
ab38a727 PA |
315 | while (IS_TARGET_DIR_SEPARATOR (fskind, *in_pathname)) |
316 | in_pathname++; | |
ba5f0d88 | 317 | } |
ab38a727 | 318 | |
af1900b0 GB |
319 | /* If not found, and we're looking for a solib, search the |
320 | solib_search_path (if any). */ | |
321 | if (is_solib && found_file < 0 && solib_search_path != NULL) | |
492c0ab7 JK |
322 | found_file = openp (solib_search_path, |
323 | OPF_TRY_CWD_FIRST | OPF_RETURN_REALPATH, | |
fbdebf46 | 324 | in_pathname, O_RDONLY | O_BINARY, &temp_pathname); |
ab38a727 | 325 | |
af1900b0 GB |
326 | /* If not found, and we're looking for a solib, next search the |
327 | solib_search_path (if any) for the basename only (ignoring the | |
328 | path). This is to allow reading solibs from a path that differs | |
329 | from the opened path. */ | |
330 | if (is_solib && found_file < 0 && solib_search_path != NULL) | |
492c0ab7 JK |
331 | found_file = openp (solib_search_path, |
332 | OPF_TRY_CWD_FIRST | OPF_RETURN_REALPATH, | |
ab38a727 PA |
333 | target_lbasename (fskind, in_pathname), |
334 | O_RDONLY | O_BINARY, &temp_pathname); | |
e4f7b8c8 | 335 | |
af1900b0 GB |
336 | /* If not found, and we're looking for a solib, try to use target |
337 | supplied solib search method. */ | |
338 | if (is_solib && found_file < 0 && ops->find_and_open_solib) | |
637d6690 | 339 | found_file = ops->find_and_open_solib (in_pathname, O_RDONLY | O_BINARY, |
66aba65d | 340 | &temp_pathname); |
2610b0bf | 341 | |
c378eb4e | 342 | /* If not found, next search the inferior's $PATH environment variable. */ |
b57fbfba | 343 | if (found_file < 0 && sysroot == NULL) |
9a6c7d9c | 344 | found_file = openp (current_inferior ()->environment.get ("PATH"), |
492c0ab7 JK |
345 | OPF_TRY_CWD_FIRST | OPF_RETURN_REALPATH, in_pathname, |
346 | O_RDONLY | O_BINARY, &temp_pathname); | |
e4f7b8c8 | 347 | |
af1900b0 GB |
348 | /* If not found, and we're looking for a solib, next search the |
349 | inferior's $LD_LIBRARY_PATH environment variable. */ | |
350 | if (is_solib && found_file < 0 && sysroot == NULL) | |
9a6c7d9c SDJ |
351 | found_file = openp (current_inferior ()->environment.get |
352 | ("LD_LIBRARY_PATH"), | |
492c0ab7 JK |
353 | OPF_TRY_CWD_FIRST | OPF_RETURN_REALPATH, in_pathname, |
354 | O_RDONLY | O_BINARY, &temp_pathname); | |
e4f7b8c8 | 355 | |
998d2a3e GB |
356 | if (fd == NULL) |
357 | { | |
358 | if (found_file >= 0) | |
359 | close (found_file); | |
360 | } | |
361 | else | |
362 | *fd = found_file; | |
363 | ||
e0cc99a6 | 364 | return temp_pathname; |
572d275c UW |
365 | } |
366 | ||
af1900b0 | 367 | /* Return the full pathname of the main executable, or NULL if not |
797bc1cb TT |
368 | found. If FD is non-NULL, *FD is set to either -1 or an open file |
369 | handle for the main executable. */ | |
af1900b0 | 370 | |
797bc1cb | 371 | gdb::unique_xmalloc_ptr<char> |
992f1ddc | 372 | exec_file_find (const char *in_pathname, int *fd) |
af1900b0 | 373 | { |
797bc1cb | 374 | gdb::unique_xmalloc_ptr<char> result; |
ecf45d2c SL |
375 | const char *fskind = effective_target_file_system_kind (); |
376 | ||
377 | if (in_pathname == NULL) | |
378 | return NULL; | |
af1900b0 | 379 | |
ecf45d2c | 380 | if (*gdb_sysroot != '\0' && IS_TARGET_ABSOLUTE_PATH (fskind, in_pathname)) |
af1900b0 | 381 | { |
ecf45d2c | 382 | result = solib_find_1 (in_pathname, fd, 0); |
af1900b0 | 383 | |
ecf45d2c | 384 | if (result == NULL && fskind == file_system_kind_dos_based) |
af1900b0 GB |
385 | { |
386 | char *new_pathname; | |
387 | ||
224c3ddb | 388 | new_pathname = (char *) alloca (strlen (in_pathname) + 5); |
af1900b0 GB |
389 | strcpy (new_pathname, in_pathname); |
390 | strcat (new_pathname, ".exe"); | |
391 | ||
392 | result = solib_find_1 (new_pathname, fd, 0); | |
393 | } | |
394 | } | |
ecf45d2c SL |
395 | else |
396 | { | |
397 | /* It's possible we don't have a full path, but rather just a | |
398 | filename. Some targets, such as HP-UX, don't provide the | |
399 | full path, sigh. | |
400 | ||
401 | Attempt to qualify the filename against the source path. | |
402 | (If that fails, we'll just fall back on the original | |
403 | filename. Not much more we can do...) */ | |
404 | ||
e0cc99a6 | 405 | if (!source_full_path_of (in_pathname, &result)) |
797bc1cb | 406 | result.reset (xstrdup (in_pathname)); |
ecf45d2c SL |
407 | if (fd != NULL) |
408 | *fd = -1; | |
409 | } | |
af1900b0 GB |
410 | |
411 | return result; | |
412 | } | |
413 | ||
414 | /* Return the full pathname of a shared library file, or NULL if not | |
797bc1cb TT |
415 | found. If FD is non-NULL, *FD is set to either -1 or an open file |
416 | handle for the shared library. | |
af1900b0 GB |
417 | |
418 | The search algorithm used is described in solib_find_1's comment | |
419 | above. */ | |
420 | ||
797bc1cb | 421 | gdb::unique_xmalloc_ptr<char> |
992f1ddc | 422 | solib_find (const char *in_pathname, int *fd) |
af1900b0 GB |
423 | { |
424 | const char *solib_symbols_extension | |
425 | = gdbarch_solib_symbols_extension (target_gdbarch ()); | |
426 | ||
427 | /* If solib_symbols_extension is set, replace the file's | |
428 | extension. */ | |
429 | if (solib_symbols_extension != NULL) | |
430 | { | |
992f1ddc | 431 | const char *p = in_pathname + strlen (in_pathname); |
af1900b0 GB |
432 | |
433 | while (p > in_pathname && *p != '.') | |
434 | p--; | |
435 | ||
436 | if (*p == '.') | |
437 | { | |
438 | char *new_pathname; | |
439 | ||
224c3ddb SM |
440 | new_pathname |
441 | = (char *) alloca (p - in_pathname + 1 | |
442 | + strlen (solib_symbols_extension) + 1); | |
af1900b0 GB |
443 | memcpy (new_pathname, in_pathname, p - in_pathname + 1); |
444 | strcpy (new_pathname + (p - in_pathname) + 1, | |
445 | solib_symbols_extension); | |
446 | ||
447 | in_pathname = new_pathname; | |
448 | } | |
449 | } | |
450 | ||
451 | return solib_find_1 (in_pathname, fd, 1); | |
452 | } | |
453 | ||
572d275c UW |
454 | /* Open and return a BFD for the shared library PATHNAME. If FD is not -1, |
455 | it is used as file handle to open the file. Throws an error if the file | |
456 | could not be opened. Handles both local and remote file access. | |
457 | ||
797bc1cb | 458 | If unsuccessful, the FD will be closed (unless FD was -1). */ |
572d275c | 459 | |
192b62ce | 460 | gdb_bfd_ref_ptr |
797bc1cb | 461 | solib_bfd_fopen (const char *pathname, int fd) |
572d275c | 462 | { |
192b62ce | 463 | gdb_bfd_ref_ptr abfd (gdb_bfd_open (pathname, gnutarget, fd)); |
572d275c | 464 | |
192b62ce TT |
465 | if (abfd != NULL && !gdb_bfd_has_target_filename (abfd.get ())) |
466 | bfd_set_cacheable (abfd.get (), 1); | |
f1838a98 | 467 | |
192b62ce | 468 | if (abfd == NULL) |
f1838a98 | 469 | { |
9a897d43 | 470 | /* Arrange to free PATHNAME when the error is thrown. */ |
f1838a98 | 471 | error (_("Could not open `%s' as an executable file: %s"), |
572d275c | 472 | pathname, bfd_errmsg (bfd_get_error ())); |
f1838a98 UW |
473 | } |
474 | ||
520b0001 | 475 | return abfd; |
572d275c UW |
476 | } |
477 | ||
478 | /* Find shared library PATHNAME and open a BFD for it. */ | |
479 | ||
192b62ce | 480 | gdb_bfd_ref_ptr |
692d6f97 | 481 | solib_bfd_open (const char *pathname) |
572d275c | 482 | { |
572d275c | 483 | int found_file; |
378d2b72 | 484 | const struct bfd_arch_info *b; |
572d275c | 485 | |
572d275c | 486 | /* Search for shared library file. */ |
797bc1cb TT |
487 | gdb::unique_xmalloc_ptr<char> found_pathname |
488 | = solib_find (pathname, &found_file); | |
572d275c | 489 | if (found_pathname == NULL) |
048d532d PA |
490 | { |
491 | /* Return failure if the file could not be found, so that we can | |
492 | accumulate messages about missing libraries. */ | |
493 | if (errno == ENOENT) | |
494 | return NULL; | |
495 | ||
496 | perror_with_name (pathname); | |
497 | } | |
572d275c UW |
498 | |
499 | /* Open bfd for shared library. */ | |
797bc1cb | 500 | gdb_bfd_ref_ptr abfd (solib_bfd_fopen (found_pathname.get (), found_file)); |
572d275c UW |
501 | |
502 | /* Check bfd format. */ | |
192b62ce TT |
503 | if (!bfd_check_format (abfd.get (), bfd_object)) |
504 | error (_("`%s': not in executable format: %s"), | |
505 | bfd_get_filename (abfd), bfd_errmsg (bfd_get_error ())); | |
f1838a98 | 506 | |
378d2b72 | 507 | /* Check bfd arch. */ |
f5656ead | 508 | b = gdbarch_bfd_arch_info (target_gdbarch ()); |
192b62ce | 509 | if (!b->compatible (b, bfd_get_arch_info (abfd.get ()))) |
378d2b72 | 510 | warning (_("`%s': Shared library architecture %s is not compatible " |
a4453b7e | 511 | "with target architecture %s."), bfd_get_filename (abfd), |
192b62ce TT |
512 | bfd_get_arch_info (abfd.get ())->printable_name, |
513 | b->printable_name); | |
378d2b72 | 514 | |
f1838a98 | 515 | return abfd; |
e4f7b8c8 MS |
516 | } |
517 | ||
7f86f058 PA |
518 | /* Given a pointer to one of the shared objects in our list of mapped |
519 | objects, use the recorded name to open a bfd descriptor for the | |
520 | object, build a section table, relocate all the section addresses | |
521 | by the base address at which the shared object was mapped, and then | |
522 | add the sections to the target's section table. | |
e4f7b8c8 | 523 | |
7f86f058 PA |
524 | FIXME: In most (all?) cases the shared object file name recorded in |
525 | the dynamic linkage tables will be a fully qualified pathname. For | |
c5aa993b JM |
526 | cases where it isn't, do we really mimic the systems search |
527 | mechanism correctly in the below code (particularly the tilde | |
7f86f058 | 528 | expansion stuff?). */ |
c906108c SS |
529 | |
530 | static int | |
048d532d | 531 | solib_map_sections (struct so_list *so) |
c906108c | 532 | { |
3641da11 | 533 | const struct target_so_ops *ops = solib_ops (target_gdbarch ()); |
0542c86d | 534 | struct target_section *p; |
c5aa993b | 535 | |
ee0c3293 TT |
536 | gdb::unique_xmalloc_ptr<char> filename (tilde_expand (so->so_name)); |
537 | gdb_bfd_ref_ptr abfd (ops->bfd_open (filename.get ())); | |
e4f7b8c8 | 538 | |
048d532d PA |
539 | if (abfd == NULL) |
540 | return 0; | |
541 | ||
13437d4b | 542 | /* Leave bfd open, core_xfer_memory and "info files" need it. */ |
192b62ce | 543 | so->abfd = abfd.release (); |
23e04971 | 544 | |
b030cf11 JB |
545 | /* Copy the full path name into so_name, allowing symbol_file_add |
546 | to find it later. This also affects the =library-loaded GDB/MI | |
547 | event, and in particular the part of that notification providing | |
548 | the library's host-side path. If we let the target dictate | |
549 | that objfile's path, and the target is different from the host, | |
550 | GDB/MI will not provide the correct host-side path. */ | |
192b62ce | 551 | if (strlen (bfd_get_filename (so->abfd)) >= SO_NAME_MAX_PATH_SIZE) |
b030cf11 | 552 | error (_("Shared library file name is too long.")); |
192b62ce | 553 | strcpy (so->so_name, bfd_get_filename (so->abfd)); |
b030cf11 | 554 | |
192b62ce | 555 | if (build_section_table (so->abfd, &so->sections, &so->sections_end)) |
23e04971 | 556 | { |
8a3fe4f8 | 557 | error (_("Can't find the file sections in `%s': %s"), |
192b62ce | 558 | bfd_get_filename (so->abfd), bfd_errmsg (bfd_get_error ())); |
23e04971 | 559 | } |
104c1213 | 560 | |
13437d4b | 561 | for (p = so->sections; p < so->sections_end; p++) |
104c1213 | 562 | { |
13437d4b KB |
563 | /* Relocate the section binding addresses as recorded in the shared |
564 | object's file by the base address to which the object was actually | |
c378eb4e | 565 | mapped. */ |
66aba65d | 566 | ops->relocate_section_addresses (so, p); |
cfa9d6d9 DJ |
567 | |
568 | /* If the target didn't provide information about the address | |
569 | range of the shared object, assume we want the location of | |
570 | the .text section. */ | |
571 | if (so->addr_low == 0 && so->addr_high == 0 | |
572 | && strcmp (p->the_bfd_section->name, ".text") == 0) | |
13437d4b | 573 | { |
cfa9d6d9 DJ |
574 | so->addr_low = p->addr; |
575 | so->addr_high = p->endaddr; | |
13437d4b | 576 | } |
104c1213 JM |
577 | } |
578 | ||
048d532d PA |
579 | /* Add the shared object's sections to the current set of file |
580 | section tables. Do this immediately after mapping the object so | |
581 | that later nodes in the list can query this object, as is needed | |
582 | in solib-osf.c. */ | |
ed9eebaf | 583 | add_target_sections (so, so->sections, so->sections_end); |
048d532d PA |
584 | |
585 | return 1; | |
104c1213 | 586 | } |
c906108c | 587 | |
0892cb63 DE |
588 | /* Free symbol-file related contents of SO and reset for possible reloading |
589 | of SO. If we have opened a BFD for SO, close it. If we have placed SO's | |
590 | sections in some target's section table, the caller is responsible for | |
591 | removing them. | |
a86988f2 PA |
592 | |
593 | This function doesn't mess with objfiles at all. If there is an | |
594 | objfile associated with SO that needs to be removed, the caller is | |
595 | responsible for taking care of that. */ | |
596 | ||
597 | static void | |
0892cb63 | 598 | clear_so (struct so_list *so) |
a86988f2 | 599 | { |
3641da11 | 600 | const struct target_so_ops *ops = solib_ops (target_gdbarch ()); |
0892cb63 | 601 | |
a86988f2 PA |
602 | if (so->sections) |
603 | { | |
604 | xfree (so->sections); | |
605 | so->sections = so->sections_end = NULL; | |
606 | } | |
607 | ||
608 | gdb_bfd_unref (so->abfd); | |
609 | so->abfd = NULL; | |
610 | ||
611 | /* Our caller closed the objfile, possibly via objfile_purge_solibs. */ | |
612 | so->symbols_loaded = 0; | |
613 | so->objfile = NULL; | |
614 | ||
615 | so->addr_low = so->addr_high = 0; | |
616 | ||
617 | /* Restore the target-supplied file name. SO_NAME may be the path | |
618 | of the symbol file. */ | |
619 | strcpy (so->so_name, so->so_original_name); | |
0892cb63 DE |
620 | |
621 | /* Do the same for target-specific data. */ | |
622 | if (ops->clear_so != NULL) | |
623 | ops->clear_so (so); | |
a86988f2 PA |
624 | } |
625 | ||
7f86f058 | 626 | /* Free the storage associated with the `struct so_list' object SO. |
c378eb4e | 627 | If we have opened a BFD for SO, close it. |
c906108c | 628 | |
07cd4b97 JB |
629 | The caller is responsible for removing SO from whatever list it is |
630 | a member of. If we have placed SO's sections in some target's | |
631 | section table, the caller is responsible for removing them. | |
c906108c | 632 | |
07cd4b97 JB |
633 | This function doesn't mess with objfiles at all. If there is an |
634 | objfile associated with SO that needs to be removed, the caller is | |
635 | responsible for taking care of that. */ | |
636 | ||
13437d4b | 637 | void |
07cd4b97 | 638 | free_so (struct so_list *so) |
c906108c | 639 | { |
3641da11 | 640 | const struct target_so_ops *ops = solib_ops (target_gdbarch ()); |
c5aa993b | 641 | |
0892cb63 | 642 | clear_so (so); |
66aba65d | 643 | ops->free_so (so); |
07cd4b97 | 644 | |
b8c9b27d | 645 | xfree (so); |
c906108c SS |
646 | } |
647 | ||
07cd4b97 | 648 | |
f8766ec1 KB |
649 | /* Return address of first so_list entry in master shared object list. */ |
650 | struct so_list * | |
651 | master_so_list (void) | |
652 | { | |
653 | return so_list_head; | |
654 | } | |
655 | ||
7eedccfa PP |
656 | /* Read in symbols for shared object SO. If SYMFILE_VERBOSE is set in FLAGS, |
657 | be chatty about it. Return non-zero if any symbols were actually | |
42a6e6a0 MK |
658 | loaded. */ |
659 | ||
660 | int | |
b15cc25c | 661 | solib_read_symbols (struct so_list *so, symfile_add_flags flags) |
42a6e6a0 MK |
662 | { |
663 | if (so->symbols_loaded) | |
664 | { | |
a86988f2 | 665 | /* If needed, we've already warned in our caller. */ |
42a6e6a0 | 666 | } |
8bb75286 DJ |
667 | else if (so->abfd == NULL) |
668 | { | |
048d532d PA |
669 | /* We've already warned about this library, when trying to open |
670 | it. */ | |
8bb75286 | 671 | } |
42a6e6a0 MK |
672 | else |
673 | { | |
048d532d | 674 | |
7dcd53a0 TT |
675 | flags |= current_inferior ()->symfile_flags; |
676 | ||
492d29ea | 677 | TRY |
048d532d | 678 | { |
048d532d PA |
679 | /* Have we already loaded this shared object? */ |
680 | ALL_OBJFILES (so->objfile) | |
681 | { | |
4262abfb | 682 | if (filename_cmp (objfile_name (so->objfile), so->so_name) == 0 |
e4f6d2ec | 683 | && so->objfile->addr_low == so->addr_low) |
048d532d PA |
684 | break; |
685 | } | |
9c6595ab PA |
686 | if (so->objfile == NULL) |
687 | { | |
37e136b1 TT |
688 | section_addr_info sap |
689 | = build_section_addr_info_from_section_table (so->sections, | |
690 | so->sections_end); | |
9c6595ab | 691 | so->objfile = symbol_file_add_from_bfd (so->abfd, so->so_name, |
37e136b1 TT |
692 | flags, &sap, |
693 | OBJF_SHARED, NULL); | |
9c6595ab | 694 | so->objfile->addr_low = so->addr_low; |
9c6595ab | 695 | } |
492d29ea PA |
696 | |
697 | so->symbols_loaded = 1; | |
698 | } | |
699 | CATCH (e, RETURN_MASK_ERROR) | |
700 | { | |
701 | exception_fprintf (gdb_stderr, e, _("Error while reading shared" | |
702 | " library symbols for %s:\n"), | |
703 | so->so_name); | |
048d532d | 704 | } |
492d29ea | 705 | END_CATCH |
048d532d | 706 | |
7eedccfa | 707 | return 1; |
42a6e6a0 MK |
708 | } |
709 | ||
710 | return 0; | |
711 | } | |
c906108c | 712 | |
59145f8c AR |
713 | /* Return 1 if KNOWN->objfile is used by any other so_list object in the |
714 | SO_LIST_HEAD list. Return 0 otherwise. */ | |
715 | ||
716 | static int | |
717 | solib_used (const struct so_list *const known) | |
718 | { | |
719 | const struct so_list *pivot; | |
720 | ||
721 | for (pivot = so_list_head; pivot != NULL; pivot = pivot->next) | |
722 | if (pivot != known && pivot->objfile == known->objfile) | |
723 | return 1; | |
724 | return 0; | |
725 | } | |
726 | ||
51457a05 | 727 | /* See solib.h. */ |
c906108c | 728 | |
e696b3ad MAL |
729 | void |
730 | update_solib_list (int from_tty) | |
07cd4b97 | 731 | { |
3641da11 | 732 | const struct target_so_ops *ops = solib_ops (target_gdbarch ()); |
66aba65d | 733 | struct so_list *inferior = ops->current_sos(); |
07cd4b97 JB |
734 | struct so_list *gdb, **gdb_link; |
735 | ||
181e7f93 PA |
736 | /* We can reach here due to changing solib-search-path or the |
737 | sysroot, before having any inferior. */ | |
50c71eaf | 738 | if (target_has_execution && !ptid_equal (inferior_ptid, null_ptid)) |
181e7f93 PA |
739 | { |
740 | struct inferior *inf = current_inferior (); | |
741 | ||
742 | /* If we are attaching to a running process for which we | |
743 | have not opened a symbol file, we may be able to get its | |
744 | symbols now! */ | |
745 | if (inf->attach_flag && symfile_objfile == NULL) | |
bf469271 PA |
746 | { |
747 | TRY | |
748 | { | |
749 | ops->open_symbol_file_object (from_tty); | |
750 | } | |
751 | CATCH (ex, RETURN_MASK_ALL) | |
752 | { | |
753 | exception_fprintf (gdb_stderr, ex, | |
754 | "Error reading attached " | |
755 | "process's symbol file.\n"); | |
756 | } | |
757 | END_CATCH | |
758 | } | |
181e7f93 | 759 | } |
104c1213 | 760 | |
07cd4b97 JB |
761 | /* GDB and the inferior's dynamic linker each maintain their own |
762 | list of currently loaded shared objects; we want to bring the | |
763 | former in sync with the latter. Scan both lists, seeing which | |
764 | shared objects appear where. There are three cases: | |
765 | ||
766 | - A shared object appears on both lists. This means that GDB | |
105b175f JB |
767 | knows about it already, and it's still loaded in the inferior. |
768 | Nothing needs to happen. | |
07cd4b97 JB |
769 | |
770 | - A shared object appears only on GDB's list. This means that | |
105b175f JB |
771 | the inferior has unloaded it. We should remove the shared |
772 | object from GDB's tables. | |
07cd4b97 JB |
773 | |
774 | - A shared object appears only on the inferior's list. This | |
105b175f JB |
775 | means that it's just been loaded. We should add it to GDB's |
776 | tables. | |
07cd4b97 JB |
777 | |
778 | So we walk GDB's list, checking each entry to see if it appears | |
779 | in the inferior's list too. If it does, no action is needed, and | |
780 | we remove it from the inferior's list. If it doesn't, the | |
781 | inferior has unloaded it, and we remove it from GDB's list. By | |
782 | the time we're done walking GDB's list, the inferior's list | |
783 | contains only the new shared objects, which we then add. */ | |
784 | ||
785 | gdb = so_list_head; | |
786 | gdb_link = &so_list_head; | |
787 | while (gdb) | |
c906108c | 788 | { |
07cd4b97 JB |
789 | struct so_list *i = inferior; |
790 | struct so_list **i_link = &inferior; | |
791 | ||
792 | /* Check to see whether the shared object *gdb also appears in | |
793 | the inferior's current list. */ | |
794 | while (i) | |
c906108c | 795 | { |
a7c02bc8 VP |
796 | if (ops->same) |
797 | { | |
798 | if (ops->same (gdb, i)) | |
799 | break; | |
800 | } | |
801 | else | |
802 | { | |
0ba1096a | 803 | if (! filename_cmp (gdb->so_original_name, i->so_original_name)) |
a7c02bc8 VP |
804 | break; |
805 | } | |
07cd4b97 JB |
806 | |
807 | i_link = &i->next; | |
808 | i = *i_link; | |
c906108c | 809 | } |
c5aa993b | 810 | |
07cd4b97 JB |
811 | /* If the shared object appears on the inferior's list too, then |
812 | it's still loaded, so we don't need to do anything. Delete | |
813 | it from the inferior's list, and leave it on GDB's list. */ | |
814 | if (i) | |
c906108c | 815 | { |
07cd4b97 | 816 | *i_link = i->next; |
07cd4b97 JB |
817 | free_so (i); |
818 | gdb_link = &gdb->next; | |
819 | gdb = *gdb_link; | |
820 | } | |
821 | ||
822 | /* If it's not on the inferior's list, remove it from GDB's tables. */ | |
823 | else | |
824 | { | |
42a6e6a0 MK |
825 | /* Notify any observer that the shared object has been |
826 | unloaded before we remove it from GDB's tables. */ | |
76727919 | 827 | gdb::observers::solib_unloaded.notify (gdb); |
84acb35a | 828 | |
6fb16ce6 | 829 | current_program_space->deleted_solibs.push_back (gdb->so_name); |
edcc5120 | 830 | |
07cd4b97 | 831 | *gdb_link = gdb->next; |
07cd4b97 JB |
832 | |
833 | /* Unless the user loaded it explicitly, free SO's objfile. */ | |
59145f8c AR |
834 | if (gdb->objfile && ! (gdb->objfile->flags & OBJF_USERLOADED) |
835 | && !solib_used (gdb)) | |
9e86da07 | 836 | delete gdb->objfile; |
07cd4b97 JB |
837 | |
838 | /* Some targets' section tables might be referring to | |
839 | sections from so->abfd; remove them. */ | |
046ac79f | 840 | remove_target_sections (gdb); |
07cd4b97 JB |
841 | |
842 | free_so (gdb); | |
843 | gdb = *gdb_link; | |
c906108c SS |
844 | } |
845 | } | |
c5aa993b | 846 | |
07cd4b97 JB |
847 | /* Now the inferior's list contains only shared objects that don't |
848 | appear in GDB's list --- those that are newly loaded. Add them | |
e8930304 | 849 | to GDB's shared object list. */ |
07cd4b97 | 850 | if (inferior) |
c906108c | 851 | { |
048d532d PA |
852 | int not_found = 0; |
853 | const char *not_found_filename = NULL; | |
854 | ||
07cd4b97 JB |
855 | struct so_list *i; |
856 | ||
857 | /* Add the new shared objects to GDB's list. */ | |
858 | *gdb_link = inferior; | |
859 | ||
e8930304 | 860 | /* Fill in the rest of each of the `struct so_list' nodes. */ |
07cd4b97 | 861 | for (i = inferior; i; i = i->next) |
c906108c | 862 | { |
048d532d | 863 | |
6c95b8df | 864 | i->pspace = current_program_space; |
edcc5120 | 865 | VEC_safe_push (so_list_ptr, current_program_space->added_solibs, i); |
07cd4b97 | 866 | |
492d29ea | 867 | TRY |
048d532d PA |
868 | { |
869 | /* Fill in the rest of the `struct so_list' node. */ | |
870 | if (!solib_map_sections (i)) | |
871 | { | |
872 | not_found++; | |
873 | if (not_found_filename == NULL) | |
874 | not_found_filename = i->so_original_name; | |
875 | } | |
876 | } | |
07cd4b97 | 877 | |
492d29ea PA |
878 | CATCH (e, RETURN_MASK_ERROR) |
879 | { | |
880 | exception_fprintf (gdb_stderr, e, | |
881 | _("Error while mapping shared " | |
882 | "library sections:\n")); | |
883 | } | |
884 | END_CATCH | |
42a6e6a0 MK |
885 | |
886 | /* Notify any observer that the shared object has been | |
048d532d | 887 | loaded now that we've added it to GDB's tables. */ |
76727919 | 888 | gdb::observers::solib_loaded.notify (i); |
c906108c | 889 | } |
048d532d PA |
890 | |
891 | /* If a library was not found, issue an appropriate warning | |
892 | message. We have to use a single call to warning in case the | |
893 | front end does something special with warnings, e.g., pop up | |
894 | a dialog box. It Would Be Nice if we could get a "warning: " | |
895 | prefix on each line in the CLI front end, though - it doesn't | |
896 | stand out well. */ | |
897 | ||
898 | if (not_found == 1) | |
3e43a32a MS |
899 | warning (_("Could not load shared library symbols for %s.\n" |
900 | "Do you need \"set solib-search-path\" " | |
901 | "or \"set sysroot\"?"), | |
048d532d PA |
902 | not_found_filename); |
903 | else if (not_found > 1) | |
904 | warning (_("\ | |
905 | Could not load shared library symbols for %d libraries, e.g. %s.\n\ | |
906 | Use the \"info sharedlibrary\" command to see the complete listing.\n\ | |
907 | Do you need \"set solib-search-path\" or \"set sysroot\"?"), | |
908 | not_found, not_found_filename); | |
e8930304 | 909 | } |
105b175f JB |
910 | } |
911 | ||
17a37d48 PP |
912 | |
913 | /* Return non-zero if NAME is the libpthread shared library. | |
6612ad7f JB |
914 | |
915 | Uses a fairly simplistic heuristic approach where we check | |
916 | the file name against "/libpthread". This can lead to false | |
917 | positives, but this should be good enough in practice. */ | |
918 | ||
17a37d48 PP |
919 | int |
920 | libpthread_name_p (const char *name) | |
921 | { | |
922 | return (strstr (name, "/libpthread") != NULL); | |
923 | } | |
924 | ||
925 | /* Return non-zero if SO is the libpthread shared library. */ | |
926 | ||
6612ad7f JB |
927 | static int |
928 | libpthread_solib_p (struct so_list *so) | |
929 | { | |
17a37d48 | 930 | return libpthread_name_p (so->so_name); |
6612ad7f | 931 | } |
105b175f | 932 | |
7f86f058 | 933 | /* Read in symbolic information for any shared objects whose names |
105b175f JB |
934 | match PATTERN. (If we've already read a shared object's symbol |
935 | info, leave it alone.) If PATTERN is zero, read them all. | |
936 | ||
990f9fe3 FF |
937 | If READSYMS is 0, defer reading symbolic information until later |
938 | but still do any needed low level processing. | |
939 | ||
e696b3ad | 940 | FROM_TTY is described for update_solib_list, above. */ |
105b175f JB |
941 | |
942 | void | |
e696b3ad | 943 | solib_add (const char *pattern, int from_tty, int readsyms) |
105b175f JB |
944 | { |
945 | struct so_list *gdb; | |
946 | ||
770e7fc7 DE |
947 | if (print_symbol_loading_p (from_tty, 0, 0)) |
948 | { | |
949 | if (pattern != NULL) | |
950 | { | |
951 | printf_unfiltered (_("Loading symbols for shared libraries: %s\n"), | |
952 | pattern); | |
953 | } | |
954 | else | |
955 | printf_unfiltered (_("Loading symbols for shared libraries.\n")); | |
956 | } | |
957 | ||
2eff07b3 PP |
958 | current_program_space->solib_add_generation++; |
959 | ||
105b175f JB |
960 | if (pattern) |
961 | { | |
962 | char *re_err = re_comp (pattern); | |
963 | ||
964 | if (re_err) | |
8a3fe4f8 | 965 | error (_("Invalid regexp: %s"), re_err); |
105b175f JB |
966 | } |
967 | ||
e696b3ad | 968 | update_solib_list (from_tty); |
c906108c | 969 | |
105b175f JB |
970 | /* Walk the list of currently loaded shared libraries, and read |
971 | symbols for any that match the pattern --- or any whose symbols | |
972 | aren't already loaded, if no pattern was given. */ | |
e8930304 JB |
973 | { |
974 | int any_matches = 0; | |
975 | int loaded_any_symbols = 0; | |
b15cc25c PA |
976 | symfile_add_flags add_flags = SYMFILE_DEFER_BP_RESET; |
977 | ||
978 | if (from_tty) | |
979 | add_flags |= SYMFILE_VERBOSE; | |
c906108c | 980 | |
e8930304 JB |
981 | for (gdb = so_list_head; gdb; gdb = gdb->next) |
982 | if (! pattern || re_exec (gdb->so_name)) | |
983 | { | |
6612ad7f JB |
984 | /* Normally, we would read the symbols from that library |
985 | only if READSYMS is set. However, we're making a small | |
986 | exception for the pthread library, because we sometimes | |
987 | need the library symbols to be loaded in order to provide | |
988 | thread support (x86-linux for instance). */ | |
989 | const int add_this_solib = | |
990 | (readsyms || libpthread_solib_p (gdb)); | |
991 | ||
e8930304 | 992 | any_matches = 1; |
a86988f2 PA |
993 | if (add_this_solib) |
994 | { | |
995 | if (gdb->symbols_loaded) | |
996 | { | |
997 | /* If no pattern was given, be quiet for shared | |
998 | libraries we have already loaded. */ | |
999 | if (pattern && (from_tty || info_verbose)) | |
1000 | printf_unfiltered (_("Symbols already loaded for %s\n"), | |
1001 | gdb->so_name); | |
1002 | } | |
b15cc25c | 1003 | else if (solib_read_symbols (gdb, add_flags)) |
a86988f2 PA |
1004 | loaded_any_symbols = 1; |
1005 | } | |
e8930304 JB |
1006 | } |
1007 | ||
7eedccfa PP |
1008 | if (loaded_any_symbols) |
1009 | breakpoint_re_set (); | |
1010 | ||
e8930304 JB |
1011 | if (from_tty && pattern && ! any_matches) |
1012 | printf_unfiltered | |
1013 | ("No loaded shared libraries match the pattern `%s'.\n", pattern); | |
1014 | ||
1015 | if (loaded_any_symbols) | |
1016 | { | |
1017 | /* Getting new symbols may change our opinion about what is | |
1018 | frameless. */ | |
1019 | reinit_frame_cache (); | |
e8930304 JB |
1020 | } |
1021 | } | |
c906108c SS |
1022 | } |
1023 | ||
7f86f058 PA |
1024 | /* Implement the "info sharedlibrary" command. Walk through the |
1025 | shared library list and print information about each attached | |
1026 | library matching PATTERN. If PATTERN is elided, print them | |
1027 | all. */ | |
c906108c SS |
1028 | |
1029 | static void | |
1d12d88f | 1030 | info_sharedlibrary_command (const char *pattern, int from_tty) |
c906108c | 1031 | { |
52f0bd74 | 1032 | struct so_list *so = NULL; /* link map state variable */ |
55333a84 | 1033 | int so_missing_debug_info = 0; |
c906108c | 1034 | int addr_width; |
55333a84 | 1035 | int nr_libs; |
f5656ead | 1036 | struct gdbarch *gdbarch = target_gdbarch (); |
79a45e25 | 1037 | struct ui_out *uiout = current_uiout; |
55333a84 DE |
1038 | |
1039 | if (pattern) | |
1040 | { | |
1041 | char *re_err = re_comp (pattern); | |
1042 | ||
1043 | if (re_err) | |
1044 | error (_("Invalid regexp: %s"), re_err); | |
1045 | } | |
c906108c | 1046 | |
84eb3c4f | 1047 | /* "0x", a little whitespace, and two hex digits per byte of pointers. */ |
55333a84 | 1048 | addr_width = 4 + (gdbarch_ptr_bit (gdbarch) / 4); |
c906108c | 1049 | |
e696b3ad | 1050 | update_solib_list (from_tty); |
07cd4b97 | 1051 | |
4a2b031d TT |
1052 | /* ui_out_emit_table table_emitter needs to know the number of rows, |
1053 | so we need to make two passes over the libs. */ | |
55333a84 DE |
1054 | |
1055 | for (nr_libs = 0, so = so_list_head; so; so = so->next) | |
c906108c | 1056 | { |
c5aa993b | 1057 | if (so->so_name[0]) |
c906108c | 1058 | { |
55333a84 DE |
1059 | if (pattern && ! re_exec (so->so_name)) |
1060 | continue; | |
1061 | ++nr_libs; | |
1062 | } | |
1063 | } | |
1064 | ||
4a2b031d TT |
1065 | { |
1066 | ui_out_emit_table table_emitter (uiout, 4, nr_libs, "SharedLibraryTable"); | |
55333a84 | 1067 | |
4a2b031d TT |
1068 | /* The "- 1" is because ui_out adds one space between columns. */ |
1069 | uiout->table_header (addr_width - 1, ui_left, "from", "From"); | |
1070 | uiout->table_header (addr_width - 1, ui_left, "to", "To"); | |
1071 | uiout->table_header (12 - 1, ui_left, "syms-read", "Syms Read"); | |
1072 | uiout->table_header (0, ui_noalign, "name", "Shared Object Library"); | |
55333a84 | 1073 | |
4a2b031d | 1074 | uiout->table_body (); |
55333a84 | 1075 | |
4a2b031d TT |
1076 | ALL_SO_LIBS (so) |
1077 | { | |
1078 | if (! so->so_name[0]) | |
1079 | continue; | |
1080 | if (pattern && ! re_exec (so->so_name)) | |
1081 | continue; | |
1082 | ||
1083 | ui_out_emit_tuple tuple_emitter (uiout, "lib"); | |
1084 | ||
1085 | if (so->addr_high != 0) | |
1086 | { | |
1087 | uiout->field_core_addr ("from", gdbarch, so->addr_low); | |
1088 | uiout->field_core_addr ("to", gdbarch, so->addr_high); | |
1089 | } | |
1090 | else | |
1091 | { | |
1092 | uiout->field_skip ("from"); | |
1093 | uiout->field_skip ("to"); | |
1094 | } | |
1095 | ||
1096 | if (! interp_ui_out (top_level_interpreter ())->is_mi_like_p () | |
1097 | && so->symbols_loaded | |
1098 | && !objfile_has_symbols (so->objfile)) | |
1099 | { | |
1100 | so_missing_debug_info = 1; | |
1101 | uiout->field_string ("syms-read", "Yes (*)"); | |
1102 | } | |
1103 | else | |
1104 | uiout->field_string ("syms-read", so->symbols_loaded ? "Yes" : "No"); | |
1105 | ||
1106 | uiout->field_string ("name", so->so_name); | |
1107 | ||
1108 | uiout->text ("\n"); | |
1109 | } | |
1110 | } | |
55333a84 DE |
1111 | |
1112 | if (nr_libs == 0) | |
1113 | { | |
1114 | if (pattern) | |
112e8700 | 1115 | uiout->message (_("No shared libraries matched.\n")); |
55333a84 | 1116 | else |
112e8700 | 1117 | uiout->message (_("No shared libraries loaded at this time.\n")); |
55333a84 DE |
1118 | } |
1119 | else | |
c906108c | 1120 | { |
55333a84 | 1121 | if (so_missing_debug_info) |
112e8700 | 1122 | uiout->message (_("(*): Shared library is missing " |
3e43a32a | 1123 | "debugging information.\n")); |
c906108c SS |
1124 | } |
1125 | } | |
1126 | ||
5fd1a349 PP |
1127 | /* Return 1 if ADDRESS lies within SOLIB. */ |
1128 | ||
1129 | int | |
1130 | solib_contains_address_p (const struct so_list *const solib, | |
1131 | CORE_ADDR address) | |
1132 | { | |
0542c86d | 1133 | struct target_section *p; |
5fd1a349 PP |
1134 | |
1135 | for (p = solib->sections; p < solib->sections_end; p++) | |
1136 | if (p->addr <= address && address < p->endaddr) | |
1137 | return 1; | |
1138 | ||
1139 | return 0; | |
1140 | } | |
1141 | ||
7f86f058 PA |
1142 | /* If ADDRESS is in a shared lib in program space PSPACE, return its |
1143 | name. | |
c906108c | 1144 | |
7f86f058 PA |
1145 | Provides a hook for other gdb routines to discover whether or not a |
1146 | particular address is within the mapped address space of a shared | |
1147 | library. | |
c906108c | 1148 | |
c5aa993b JM |
1149 | For example, this routine is called at one point to disable |
1150 | breakpoints which are in shared libraries that are not currently | |
7f86f058 | 1151 | mapped in. */ |
c906108c SS |
1152 | |
1153 | char * | |
6c95b8df | 1154 | solib_name_from_address (struct program_space *pspace, CORE_ADDR address) |
c906108c | 1155 | { |
6c95b8df | 1156 | struct so_list *so = NULL; |
c5aa993b | 1157 | |
6c95b8df | 1158 | for (so = pspace->so_list; so; so = so->next) |
5fd1a349 PP |
1159 | if (solib_contains_address_p (so, address)) |
1160 | return (so->so_name); | |
07cd4b97 | 1161 | |
c906108c SS |
1162 | return (0); |
1163 | } | |
1164 | ||
de18c1d8 JM |
1165 | /* Return whether the data starting at VADDR, size SIZE, must be kept |
1166 | in a core file for shared libraries loaded before "gcore" is used | |
1167 | to be handled correctly when the core file is loaded. This only | |
1168 | applies when the section would otherwise not be kept in the core | |
1169 | file (in particular, for readonly sections). */ | |
1170 | ||
1171 | int | |
1172 | solib_keep_data_in_core (CORE_ADDR vaddr, unsigned long size) | |
1173 | { | |
3641da11 | 1174 | const struct target_so_ops *ops = solib_ops (target_gdbarch ()); |
de18c1d8 JM |
1175 | |
1176 | if (ops->keep_data_in_core) | |
1177 | return ops->keep_data_in_core (vaddr, size); | |
1178 | else | |
1179 | return 0; | |
1180 | } | |
1181 | ||
c906108c SS |
1182 | /* Called by free_all_symtabs */ |
1183 | ||
c5aa993b | 1184 | void |
fba45db2 | 1185 | clear_solib (void) |
c906108c | 1186 | { |
3641da11 | 1187 | const struct target_so_ops *ops = solib_ops (target_gdbarch ()); |
66aba65d | 1188 | |
1736a7bd | 1189 | disable_breakpoints_in_shlibs (); |
085dd6e6 | 1190 | |
c906108c SS |
1191 | while (so_list_head) |
1192 | { | |
07cd4b97 | 1193 | struct so_list *so = so_list_head; |
433759f7 | 1194 | |
07cd4b97 | 1195 | so_list_head = so->next; |
76727919 | 1196 | gdb::observers::solib_unloaded.notify (so); |
046ac79f | 1197 | remove_target_sections (so); |
07cd4b97 | 1198 | free_so (so); |
c906108c | 1199 | } |
07cd4b97 | 1200 | |
66aba65d | 1201 | ops->clear_solib (); |
c906108c SS |
1202 | } |
1203 | ||
7f86f058 PA |
1204 | /* Shared library startup support. When GDB starts up the inferior, |
1205 | it nurses it along (through the shell) until it is ready to execute | |
1206 | its first instruction. At this point, this function gets | |
1207 | called. */ | |
c5aa993b JM |
1208 | |
1209 | void | |
268a4a75 | 1210 | solib_create_inferior_hook (int from_tty) |
c906108c | 1211 | { |
3641da11 | 1212 | const struct target_so_ops *ops = solib_ops (target_gdbarch ()); |
433759f7 | 1213 | |
268a4a75 | 1214 | ops->solib_create_inferior_hook (from_tty); |
c906108c SS |
1215 | } |
1216 | ||
7f86f058 PA |
1217 | /* Check to see if an address is in the dynamic loader's dynamic |
1218 | symbol resolution code. Return 1 if so, 0 otherwise. */ | |
d7fa2ae2 KB |
1219 | |
1220 | int | |
1221 | in_solib_dynsym_resolve_code (CORE_ADDR pc) | |
1222 | { | |
3641da11 | 1223 | const struct target_so_ops *ops = solib_ops (target_gdbarch ()); |
433759f7 | 1224 | |
66aba65d | 1225 | return ops->in_dynsym_resolve_code (pc); |
d7fa2ae2 | 1226 | } |
c906108c | 1227 | |
7f86f058 | 1228 | /* Implements the "sharedlibrary" command. */ |
c906108c SS |
1229 | |
1230 | static void | |
0b39b52e | 1231 | sharedlibrary_command (const char *args, int from_tty) |
c906108c SS |
1232 | { |
1233 | dont_repeat (); | |
e696b3ad | 1234 | solib_add (args, from_tty, 1); |
c906108c SS |
1235 | } |
1236 | ||
7f86f058 | 1237 | /* Implements the command "nosharedlibrary", which discards symbols |
cb0ba49e MS |
1238 | that have been auto-loaded from shared libraries. Symbols from |
1239 | shared libraries that were added by explicit request of the user | |
1240 | are not discarded. Also called from remote.c. */ | |
1241 | ||
c60a7562 | 1242 | void |
0b39b52e | 1243 | no_shared_libraries (const char *ignored, int from_tty) |
c60a7562 | 1244 | { |
a3247a22 PP |
1245 | /* The order of the two routines below is important: clear_solib notifies |
1246 | the solib_unloaded observers, and some of these observers might need | |
1247 | access to their associated objfiles. Therefore, we can not purge the | |
1248 | solibs' objfiles before clear_solib has been called. */ | |
1249 | ||
615b9dba | 1250 | clear_solib (); |
a3247a22 | 1251 | objfile_purge_solibs (); |
c60a7562 | 1252 | } |
c906108c | 1253 | |
f9e14852 GB |
1254 | /* See solib.h. */ |
1255 | ||
1256 | void | |
1257 | update_solib_breakpoints (void) | |
1258 | { | |
1259 | const struct target_so_ops *ops = solib_ops (target_gdbarch ()); | |
1260 | ||
1261 | if (ops->update_breakpoints != NULL) | |
1262 | ops->update_breakpoints (); | |
1263 | } | |
1264 | ||
1265 | /* See solib.h. */ | |
1266 | ||
1267 | void | |
1268 | handle_solib_event (void) | |
1269 | { | |
1270 | const struct target_so_ops *ops = solib_ops (target_gdbarch ()); | |
1271 | ||
1272 | if (ops->handle_event != NULL) | |
1273 | ops->handle_event (); | |
1274 | ||
1275 | clear_program_space_solib_cache (current_inferior ()->pspace); | |
1276 | ||
1277 | /* Check for any newly added shared libraries if we're supposed to | |
1278 | be adding them automatically. Switch terminal for any messages | |
1279 | produced by breakpoint_re_set. */ | |
223ffa71 | 1280 | target_terminal::ours_for_output (); |
e696b3ad | 1281 | solib_add (NULL, 0, auto_solib_add); |
223ffa71 | 1282 | target_terminal::inferior (); |
f9e14852 GB |
1283 | } |
1284 | ||
a86988f2 PA |
1285 | /* Reload shared libraries, but avoid reloading the same symbol file |
1286 | we already have loaded. */ | |
1287 | ||
1288 | static void | |
1289 | reload_shared_libraries_1 (int from_tty) | |
1290 | { | |
1291 | struct so_list *so; | |
a86988f2 | 1292 | |
770e7fc7 DE |
1293 | if (print_symbol_loading_p (from_tty, 0, 0)) |
1294 | printf_unfiltered (_("Loading symbols for shared libraries.\n")); | |
1295 | ||
a86988f2 PA |
1296 | for (so = so_list_head; so != NULL; so = so->next) |
1297 | { | |
ee0c3293 | 1298 | char *found_pathname = NULL; |
a86988f2 | 1299 | int was_loaded = so->symbols_loaded; |
b15cc25c PA |
1300 | symfile_add_flags add_flags = SYMFILE_DEFER_BP_RESET; |
1301 | ||
1302 | if (from_tty) | |
1303 | add_flags |= SYMFILE_VERBOSE; | |
a86988f2 | 1304 | |
ee0c3293 TT |
1305 | gdb::unique_xmalloc_ptr<char> filename |
1306 | (tilde_expand (so->so_original_name)); | |
1307 | gdb_bfd_ref_ptr abfd (solib_bfd_open (filename.get ())); | |
a86988f2 | 1308 | if (abfd != NULL) |
ee0c3293 | 1309 | found_pathname = bfd_get_filename (abfd.get ()); |
a86988f2 PA |
1310 | |
1311 | /* If this shared library is no longer associated with its previous | |
1312 | symbol file, close that. */ | |
1313 | if ((found_pathname == NULL && was_loaded) | |
1314 | || (found_pathname != NULL | |
0ba1096a | 1315 | && filename_cmp (found_pathname, so->so_name) != 0)) |
a86988f2 | 1316 | { |
59145f8c AR |
1317 | if (so->objfile && ! (so->objfile->flags & OBJF_USERLOADED) |
1318 | && !solib_used (so)) | |
9e86da07 | 1319 | delete so->objfile; |
046ac79f | 1320 | remove_target_sections (so); |
0892cb63 | 1321 | clear_so (so); |
a86988f2 PA |
1322 | } |
1323 | ||
1324 | /* If this shared library is now associated with a new symbol | |
1325 | file, open it. */ | |
1326 | if (found_pathname != NULL | |
1327 | && (!was_loaded | |
0ba1096a | 1328 | || filename_cmp (found_pathname, so->so_name) != 0)) |
a86988f2 | 1329 | { |
492d29ea | 1330 | int got_error = 0; |
a86988f2 | 1331 | |
492d29ea PA |
1332 | TRY |
1333 | { | |
1334 | solib_map_sections (so); | |
1335 | } | |
1336 | ||
1337 | CATCH (e, RETURN_MASK_ERROR) | |
1338 | { | |
1339 | exception_fprintf (gdb_stderr, e, | |
1340 | _("Error while mapping " | |
1341 | "shared library sections:\n")); | |
1342 | got_error = 1; | |
1343 | } | |
1344 | END_CATCH | |
a86988f2 | 1345 | |
492d29ea PA |
1346 | if (!got_error |
1347 | && (auto_solib_add || was_loaded || libpthread_solib_p (so))) | |
b15cc25c | 1348 | solib_read_symbols (so, add_flags); |
a86988f2 PA |
1349 | } |
1350 | } | |
a86988f2 PA |
1351 | } |
1352 | ||
cf466558 | 1353 | static void |
eb4c3f4a | 1354 | reload_shared_libraries (const char *ignored, int from_tty, |
f397e303 | 1355 | struct cmd_list_element *e) |
cf466558 | 1356 | { |
3641da11 | 1357 | const struct target_so_ops *ops; |
a86988f2 PA |
1358 | |
1359 | reload_shared_libraries_1 (from_tty); | |
1360 | ||
f5656ead | 1361 | ops = solib_ops (target_gdbarch ()); |
a86988f2 | 1362 | |
c378eb4e | 1363 | /* Creating inferior hooks here has two purposes. First, if we reload |
c8fa6cdd VP |
1364 | shared libraries then the address of solib breakpoint we've computed |
1365 | previously might be no longer valid. For example, if we forgot to set | |
1366 | solib-absolute-prefix and are setting it right now, then the previous | |
1367 | breakpoint address is plain wrong. Second, installing solib hooks | |
1368 | also implicitly figures were ld.so is and loads symbols for it. | |
1369 | Absent this call, if we've just connected to a target and set | |
1370 | solib-absolute-prefix or solib-search-path, we'll lose all information | |
1371 | about ld.so. */ | |
1372 | if (target_has_execution) | |
1373 | { | |
a86988f2 PA |
1374 | /* Reset or free private data structures not associated with |
1375 | so_list entries. */ | |
1376 | ops->clear_solib (); | |
1377 | ||
1378 | /* Remove any previous solib event breakpoint. This is usually | |
1379 | done in common code, at breakpoint_init_inferior time, but | |
1380 | we're not really starting up the inferior here. */ | |
1381 | remove_solib_event_breakpoints (); | |
1382 | ||
268a4a75 | 1383 | solib_create_inferior_hook (from_tty); |
c8fa6cdd | 1384 | } |
268a4a75 JK |
1385 | |
1386 | /* Sometimes the platform-specific hook loads initial shared | |
1387 | libraries, and sometimes it doesn't. If it doesn't FROM_TTY will be | |
1388 | incorrectly 0 but such solib targets should be fixed anyway. If we | |
1389 | made all the inferior hook methods consistent, this call could be | |
1390 | removed. Call it only after the solib target has been initialized by | |
1391 | solib_create_inferior_hook. */ | |
1392 | ||
e696b3ad | 1393 | solib_add (NULL, 0, auto_solib_add); |
268a4a75 | 1394 | |
a86988f2 PA |
1395 | breakpoint_re_set (); |
1396 | ||
1397 | /* We may have loaded or unloaded debug info for some (or all) | |
1398 | shared libraries. However, frames may still reference them. For | |
1399 | example, a frame's unwinder might still point at DWARF FDE | |
1400 | structures that are now freed. Also, getting new symbols may | |
1401 | change our opinion about what is frameless. */ | |
c8fa6cdd | 1402 | reinit_frame_cache (); |
cf466558 KB |
1403 | } |
1404 | ||
2938e6cf GB |
1405 | /* Wrapper for reload_shared_libraries that replaces "remote:" |
1406 | at the start of gdb_sysroot with "target:". */ | |
1407 | ||
1408 | static void | |
eb4c3f4a | 1409 | gdb_sysroot_changed (const char *ignored, int from_tty, |
2938e6cf GB |
1410 | struct cmd_list_element *e) |
1411 | { | |
1412 | const char *old_prefix = "remote:"; | |
1413 | const char *new_prefix = TARGET_SYSROOT_PREFIX; | |
1414 | ||
1415 | if (startswith (gdb_sysroot, old_prefix)) | |
1416 | { | |
1417 | static int warning_issued = 0; | |
1418 | ||
1419 | gdb_assert (strlen (old_prefix) == strlen (new_prefix)); | |
1420 | memcpy (gdb_sysroot, new_prefix, strlen (new_prefix)); | |
1421 | ||
1422 | if (!warning_issued) | |
1423 | { | |
1424 | warning (_("\"%s\" is deprecated, use \"%s\" instead."), | |
1425 | old_prefix, new_prefix); | |
1426 | warning (_("sysroot set to \"%s\"."), gdb_sysroot); | |
1427 | ||
1428 | warning_issued = 1; | |
1429 | } | |
1430 | } | |
1431 | ||
1432 | reload_shared_libraries (ignored, from_tty, e); | |
1433 | } | |
1434 | ||
920d2a44 AC |
1435 | static void |
1436 | show_auto_solib_add (struct ui_file *file, int from_tty, | |
1437 | struct cmd_list_element *c, const char *value) | |
1438 | { | |
1439 | fprintf_filtered (file, _("Autoloading of shared library symbols is %s.\n"), | |
1440 | value); | |
1441 | } | |
1442 | ||
1443 | ||
3a40aaa0 UW |
1444 | /* Handler for library-specific lookup of global symbol NAME in OBJFILE. Call |
1445 | the library-specific handler if it is installed for the current target. */ | |
1446 | ||
d12307c1 | 1447 | struct block_symbol |
efad9b6a | 1448 | solib_global_lookup (struct objfile *objfile, |
3a40aaa0 | 1449 | const char *name, |
21b556f4 | 1450 | const domain_enum domain) |
3a40aaa0 | 1451 | { |
6f059256 | 1452 | const struct target_so_ops *ops = solib_ops (target_gdbarch ()); |
3a40aaa0 | 1453 | |
e8a92f7b | 1454 | if (ops->lookup_lib_global_symbol != NULL) |
94af9270 | 1455 | return ops->lookup_lib_global_symbol (objfile, name, domain); |
d12307c1 | 1456 | return (struct block_symbol) {NULL, NULL}; |
3a40aaa0 UW |
1457 | } |
1458 | ||
cb457ae2 YQ |
1459 | /* Lookup the value for a specific symbol from dynamic symbol table. Look |
1460 | up symbol from ABFD. MATCH_SYM is a callback function to determine | |
1461 | whether to pick up a symbol. DATA is the input of this callback | |
1462 | function. Return NULL if symbol is not found. */ | |
1463 | ||
1464 | CORE_ADDR | |
1465 | gdb_bfd_lookup_symbol_from_symtab (bfd *abfd, | |
3953f15c SM |
1466 | int (*match_sym) (const asymbol *, |
1467 | const void *), | |
1468 | const void *data) | |
cb457ae2 YQ |
1469 | { |
1470 | long storage_needed = bfd_get_symtab_upper_bound (abfd); | |
1471 | CORE_ADDR symaddr = 0; | |
1472 | ||
1473 | if (storage_needed > 0) | |
1474 | { | |
1475 | unsigned int i; | |
1476 | ||
1cb1f3da TT |
1477 | gdb::def_vector<asymbol *> storage (storage_needed / sizeof (asymbol *)); |
1478 | asymbol **symbol_table = storage.data (); | |
cb457ae2 YQ |
1479 | unsigned int number_of_symbols = |
1480 | bfd_canonicalize_symtab (abfd, symbol_table); | |
1481 | ||
1482 | for (i = 0; i < number_of_symbols; i++) | |
1483 | { | |
1484 | asymbol *sym = *symbol_table++; | |
1485 | ||
1486 | if (match_sym (sym, data)) | |
1487 | { | |
3e29f34a MR |
1488 | struct gdbarch *gdbarch = target_gdbarch (); |
1489 | symaddr = sym->value; | |
1490 | ||
1491 | /* Some ELF targets fiddle with addresses of symbols they | |
1492 | consider special. They use minimal symbols to do that | |
1493 | and this is needed for correct breakpoint placement, | |
1494 | but we do not have full data here to build a complete | |
1495 | minimal symbol, so just set the address and let the | |
1496 | targets cope with that. */ | |
1497 | if (bfd_get_flavour (abfd) == bfd_target_elf_flavour | |
1498 | && gdbarch_elf_make_msymbol_special_p (gdbarch)) | |
1499 | { | |
1500 | struct minimal_symbol msym; | |
1501 | ||
1502 | memset (&msym, 0, sizeof (msym)); | |
1503 | SET_MSYMBOL_VALUE_ADDRESS (&msym, symaddr); | |
1504 | gdbarch_elf_make_msymbol_special (gdbarch, sym, &msym); | |
1505 | symaddr = MSYMBOL_VALUE_RAW_ADDRESS (&msym); | |
1506 | } | |
1507 | ||
cb457ae2 | 1508 | /* BFD symbols are section relative. */ |
3e29f34a | 1509 | symaddr += sym->section->vma; |
cb457ae2 YQ |
1510 | break; |
1511 | } | |
1512 | } | |
cb457ae2 YQ |
1513 | } |
1514 | ||
1515 | return symaddr; | |
1516 | } | |
1517 | ||
1518 | /* Lookup the value for a specific symbol from symbol table. Look up symbol | |
1519 | from ABFD. MATCH_SYM is a callback function to determine whether to pick | |
1520 | up a symbol. DATA is the input of this callback function. Return NULL | |
1521 | if symbol is not found. */ | |
1522 | ||
1523 | static CORE_ADDR | |
1524 | bfd_lookup_symbol_from_dyn_symtab (bfd *abfd, | |
3953f15c SM |
1525 | int (*match_sym) (const asymbol *, |
1526 | const void *), | |
1527 | const void *data) | |
cb457ae2 YQ |
1528 | { |
1529 | long storage_needed = bfd_get_dynamic_symtab_upper_bound (abfd); | |
1530 | CORE_ADDR symaddr = 0; | |
1531 | ||
1532 | if (storage_needed > 0) | |
1533 | { | |
1534 | unsigned int i; | |
1cb1f3da TT |
1535 | gdb::def_vector<asymbol *> storage (storage_needed / sizeof (asymbol *)); |
1536 | asymbol **symbol_table = storage.data (); | |
cb457ae2 YQ |
1537 | unsigned int number_of_symbols = |
1538 | bfd_canonicalize_dynamic_symtab (abfd, symbol_table); | |
1539 | ||
1540 | for (i = 0; i < number_of_symbols; i++) | |
1541 | { | |
1542 | asymbol *sym = *symbol_table++; | |
1543 | ||
1544 | if (match_sym (sym, data)) | |
1545 | { | |
1546 | /* BFD symbols are section relative. */ | |
1547 | symaddr = sym->value + sym->section->vma; | |
1548 | break; | |
1549 | } | |
1550 | } | |
cb457ae2 YQ |
1551 | } |
1552 | return symaddr; | |
1553 | } | |
1554 | ||
1555 | /* Lookup the value for a specific symbol from symbol table and dynamic | |
1556 | symbol table. Look up symbol from ABFD. MATCH_SYM is a callback | |
1557 | function to determine whether to pick up a symbol. DATA is the | |
1558 | input of this callback function. Return NULL if symbol is not | |
1559 | found. */ | |
1560 | ||
1561 | CORE_ADDR | |
1562 | gdb_bfd_lookup_symbol (bfd *abfd, | |
3953f15c SM |
1563 | int (*match_sym) (const asymbol *, const void *), |
1564 | const void *data) | |
cb457ae2 YQ |
1565 | { |
1566 | CORE_ADDR symaddr = gdb_bfd_lookup_symbol_from_symtab (abfd, match_sym, data); | |
1567 | ||
1568 | /* On FreeBSD, the dynamic linker is stripped by default. So we'll | |
1569 | have to check the dynamic string table too. */ | |
1570 | if (symaddr == 0) | |
1571 | symaddr = bfd_lookup_symbol_from_dyn_symtab (abfd, match_sym, data); | |
1572 | ||
1573 | return symaddr; | |
1574 | } | |
3a40aaa0 | 1575 | |
63644780 NB |
1576 | /* SO_LIST_HEAD may contain user-loaded object files that can be removed |
1577 | out-of-band by the user. So upon notification of free_objfile remove | |
1578 | all references to any user-loaded file that is about to be freed. */ | |
1579 | ||
1580 | static void | |
1581 | remove_user_added_objfile (struct objfile *objfile) | |
1582 | { | |
1583 | struct so_list *so; | |
1584 | ||
1585 | if (objfile != 0 && objfile->flags & OBJF_USERLOADED) | |
1586 | { | |
1587 | for (so = so_list_head; so != NULL; so = so->next) | |
1588 | if (so->objfile == objfile) | |
1589 | so->objfile = NULL; | |
1590 | } | |
1591 | } | |
1592 | ||
c906108c | 1593 | void |
fba45db2 | 1594 | _initialize_solib (void) |
c906108c | 1595 | { |
66aba65d MK |
1596 | solib_data = gdbarch_data_register_pre_init (solib_init); |
1597 | ||
76727919 | 1598 | gdb::observers::free_objfile.attach (remove_user_added_objfile); |
63644780 | 1599 | |
c906108c | 1600 | add_com ("sharedlibrary", class_files, sharedlibrary_command, |
1bedd215 | 1601 | _("Load shared object library symbols for files matching REGEXP.")); |
c5aa993b | 1602 | add_info ("sharedlibrary", info_sharedlibrary_command, |
1bedd215 | 1603 | _("Status of loaded shared object libraries.")); |
b30a0bc3 | 1604 | add_info_alias ("dll", "sharedlibrary", 1); |
c60a7562 | 1605 | add_com ("nosharedlibrary", class_files, no_shared_libraries, |
1bedd215 | 1606 | _("Unload all shared object library symbols.")); |
c906108c | 1607 | |
5bf193a2 AC |
1608 | add_setshow_boolean_cmd ("auto-solib-add", class_support, |
1609 | &auto_solib_add, _("\ | |
1610 | Set autoloading of shared library symbols."), _("\ | |
1611 | Show autoloading of shared library symbols."), _("\ | |
b7209cb4 FF |
1612 | If \"on\", symbols from all shared object libraries will be loaded\n\ |
1613 | automatically when the inferior begins execution, when the dynamic linker\n\ | |
1614 | informs gdb that a new library has been loaded, or when attaching to the\n\ | |
3e43a32a MS |
1615 | inferior. Otherwise, symbols must be loaded manually, using \ |
1616 | `sharedlibrary'."), | |
5bf193a2 | 1617 | NULL, |
920d2a44 | 1618 | show_auto_solib_add, |
5bf193a2 | 1619 | &setlist, &showlist); |
c906108c | 1620 | |
811a659a GB |
1621 | add_setshow_optional_filename_cmd ("sysroot", class_support, |
1622 | &gdb_sysroot, _("\ | |
f822c95b DJ |
1623 | Set an alternate system root."), _("\ |
1624 | Show the current system root."), _("\ | |
1625 | The system root is used to load absolute shared library symbol files.\n\ | |
1626 | For other (relative) files, you can add directories using\n\ | |
1627 | `set solib-search-path'."), | |
2938e6cf | 1628 | gdb_sysroot_changed, |
811a659a GB |
1629 | NULL, |
1630 | &setlist, &showlist); | |
c906108c | 1631 | |
f822c95b DJ |
1632 | add_alias_cmd ("solib-absolute-prefix", "sysroot", class_support, 0, |
1633 | &setlist); | |
1634 | add_alias_cmd ("solib-absolute-prefix", "sysroot", class_support, 0, | |
1635 | &showlist); | |
030292b7 | 1636 | |
525226b5 AC |
1637 | add_setshow_optional_filename_cmd ("solib-search-path", class_support, |
1638 | &solib_search_path, _("\ | |
3e43a32a MS |
1639 | Set the search path for loading non-absolute shared library symbol files."), |
1640 | _("\ | |
1641 | Show the search path for loading non-absolute shared library symbol files."), | |
1642 | _("\ | |
1643 | This takes precedence over the environment variables \ | |
1644 | PATH and LD_LIBRARY_PATH."), | |
525226b5 | 1645 | reload_shared_libraries, |
920d2a44 | 1646 | show_solib_search_path, |
525226b5 | 1647 | &setlist, &showlist); |
c906108c | 1648 | } |