]>
Commit | Line | Data |
---|---|---|
13437d4b | 1 | /* Handle shared libraries for GDB, the GNU Debugger. |
14a5e767 | 2 | |
4a94e368 | 3 | Copyright (C) 1990-2022 Free Software Foundation, Inc. |
c906108c | 4 | |
c5aa993b | 5 | This file is part of GDB. |
c906108c | 6 | |
c5aa993b JM |
7 | This program is free software; you can redistribute it and/or modify |
8 | it under the terms of the GNU General Public License as published by | |
a9762ec7 | 9 | the Free Software Foundation; either version 3 of the License, or |
c5aa993b | 10 | (at your option) any later version. |
c906108c | 11 | |
c5aa993b JM |
12 | This program is distributed in the hope that it will be useful, |
13 | but WITHOUT ANY WARRANTY; without even the implied warranty of | |
14 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
15 | GNU General Public License for more details. | |
16 | ||
17 | You should have received a copy of the GNU General Public License | |
a9762ec7 | 18 | along with this program. If not, see <http://www.gnu.org/licenses/>. */ |
c906108c | 19 | |
c906108c SS |
20 | #include "defs.h" |
21 | ||
c906108c | 22 | #include <sys/types.h> |
c906108c | 23 | #include <fcntl.h> |
c906108c SS |
24 | #include "symtab.h" |
25 | #include "bfd.h" | |
39f53acb | 26 | #include "build-id.h" |
c906108c SS |
27 | #include "symfile.h" |
28 | #include "objfiles.h" | |
29 | #include "gdbcore.h" | |
30 | #include "command.h" | |
31 | #include "target.h" | |
32 | #include "frame.h" | |
d322d6d6 | 33 | #include "gdbsupport/gdb_regex.h" |
c906108c | 34 | #include "inferior.h" |
268a13a5 | 35 | #include "gdbsupport/environ.h" |
c906108c SS |
36 | #include "language.h" |
37 | #include "gdbcmd.h" | |
fa58ee11 | 38 | #include "completer.h" |
8ddf4645 AM |
39 | #include "elf/external.h" |
40 | #include "elf/common.h" | |
fe4e3eb8 | 41 | #include "filenames.h" /* for DOSish file names */ |
4646aa9d | 42 | #include "exec.h" |
13437d4b | 43 | #include "solist.h" |
76727919 | 44 | #include "observable.h" |
e0eac551 | 45 | #include "readline/tilde.h" |
f1838a98 | 46 | #include "remote.h" |
2c0b251b | 47 | #include "solib.h" |
55333a84 | 48 | #include "interps.h" |
ab38a727 | 49 | #include "filesystem.h" |
cbb099e8 | 50 | #include "gdb_bfd.h" |
268a13a5 | 51 | #include "gdbsupport/filestuff.h" |
b91f93a0 AM |
52 | #include "gdbsupport/scoped_fd.h" |
53 | #include "debuginfod-support.h" | |
b46a8d7c | 54 | #include "source.h" |
e43b10e1 | 55 | #include "cli/cli-style.h" |
c906108c | 56 | |
66aba65d MK |
57 | /* Architecture-specific operations. */ |
58 | ||
59 | /* Per-architecture data key. */ | |
cb275538 TT |
60 | static const registry<gdbarch>::key<const struct target_so_ops, |
61 | gdb::noop_deleter<const struct target_so_ops>> | |
62 | solib_data; | |
66aba65d | 63 | |
3641da11 | 64 | static const struct target_so_ops * |
66aba65d MK |
65 | solib_ops (struct gdbarch *gdbarch) |
66 | { | |
cb275538 | 67 | return solib_data.get (gdbarch); |
66aba65d | 68 | } |
7d522c90 DJ |
69 | |
70 | /* Set the solib operations for GDBARCH to NEW_OPS. */ | |
71 | ||
72 | void | |
3641da11 | 73 | set_solib_ops (struct gdbarch *gdbarch, const struct target_so_ops *new_ops) |
7d522c90 | 74 | { |
cb275538 | 75 | solib_data.set (gdbarch, new_ops); |
7d522c90 | 76 | } |
66aba65d MK |
77 | \f |
78 | ||
13437d4b | 79 | /* external data declarations */ |
c906108c | 80 | |
7d522c90 DJ |
81 | /* FIXME: gdbarch needs to control this variable, or else every |
82 | configuration needs to call set_solib_ops. */ | |
13437d4b | 83 | struct target_so_ops *current_target_so_ops; |
23e04971 | 84 | |
c906108c SS |
85 | /* Local function prototypes */ |
86 | ||
c906108c SS |
87 | /* If non-empty, this is a search path for loading non-absolute shared library |
88 | symbol files. This takes precedence over the environment variables PATH | |
89 | and LD_LIBRARY_PATH. */ | |
e0700ba4 | 90 | static std::string solib_search_path; |
920d2a44 AC |
91 | static void |
92 | show_solib_search_path (struct ui_file *file, int from_tty, | |
93 | struct cmd_list_element *c, const char *value) | |
94 | { | |
6cb06a8c TT |
95 | gdb_printf (file, _("The search path for loading non-absolute " |
96 | "shared library symbol files is %s.\n"), | |
97 | value); | |
920d2a44 | 98 | } |
c906108c | 99 | |
ab38a727 PA |
100 | /* Same as HAVE_DOS_BASED_FILE_SYSTEM, but useable as an rvalue. */ |
101 | #if (HAVE_DOS_BASED_FILE_SYSTEM) | |
102 | # define DOS_BASED_FILE_SYSTEM 1 | |
103 | #else | |
104 | # define DOS_BASED_FILE_SYSTEM 0 | |
105 | #endif | |
106 | ||
797bc1cb TT |
107 | /* Return the full pathname of a binary file (the main executable or a |
108 | shared library file), or NULL if not found. If FD is non-NULL, *FD | |
109 | is set to either -1 or an open file handle for the binary file. | |
e4f7b8c8 | 110 | |
f822c95b | 111 | Global variable GDB_SYSROOT is used as a prefix directory |
af1900b0 | 112 | to search for binary files if they have an absolute path. |
b57fbfba GB |
113 | If GDB_SYSROOT starts with "target:" and target filesystem |
114 | is the local filesystem then the "target:" prefix will be | |
115 | stripped before the search starts. This ensures that the | |
116 | same search algorithm is used for local files regardless of | |
117 | whether a "target:" prefix was used. | |
e4f7b8c8 MS |
118 | |
119 | Global variable SOLIB_SEARCH_PATH is used as a prefix directory | |
120 | (or set of directories, as in LD_LIBRARY_PATH) to search for all | |
b57fbfba | 121 | shared libraries if not found in either the sysroot (if set) or |
af1900b0 GB |
122 | the local filesystem. SOLIB_SEARCH_PATH is not used when searching |
123 | for the main executable. | |
e4f7b8c8 | 124 | |
c8c18e65 | 125 | Search algorithm: |
b57fbfba GB |
126 | * If a sysroot is set and path is absolute: |
127 | * Search for sysroot/path. | |
c8c18e65 KW |
128 | * else |
129 | * Look for it literally (unmodified). | |
af1900b0 GB |
130 | * If IS_SOLIB is non-zero: |
131 | * Look in SOLIB_SEARCH_PATH. | |
132 | * If available, use target defined search function. | |
b57fbfba | 133 | * If NO sysroot is set, perform the following two searches: |
c8c18e65 | 134 | * Look in inferior's $PATH. |
af1900b0 GB |
135 | * If IS_SOLIB is non-zero: |
136 | * Look in inferior's $LD_LIBRARY_PATH. | |
ab38a727 | 137 | * |
85102364 | 138 | * The last check avoids doing this search when targeting remote |
b57fbfba | 139 | * machines since a sysroot will almost always be set. |
7f86f058 | 140 | */ |
e4f7b8c8 | 141 | |
797bc1cb | 142 | static gdb::unique_xmalloc_ptr<char> |
5b89c67a | 143 | solib_find_1 (const char *in_pathname, int *fd, bool is_solib) |
e4f7b8c8 | 144 | { |
3641da11 | 145 | const struct target_so_ops *ops = solib_ops (target_gdbarch ()); |
e4f7b8c8 | 146 | int found_file = -1; |
e0cc99a6 | 147 | gdb::unique_xmalloc_ptr<char> temp_pathname; |
ab38a727 | 148 | const char *fskind = effective_target_file_system_kind (); |
e0700ba4 | 149 | const char *sysroot = gdb_sysroot.c_str (); |
f8773be1 | 150 | int prefix_len, orig_prefix_len; |
08105857 | 151 | |
a3be80c3 GB |
152 | /* If the absolute prefix starts with "target:" but the filesystem |
153 | accessed by the target_fileio_* methods is the local filesystem | |
154 | then we strip the "target:" prefix now and work with the local | |
155 | filesystem. This ensures that the same search algorithm is used | |
156 | for all local files regardless of whether a "target:" prefix was | |
157 | used. */ | |
158 | if (is_target_filename (sysroot) && target_filesystem_is_local ()) | |
159 | sysroot += strlen (TARGET_SYSROOT_PREFIX); | |
160 | ||
f8773be1 GB |
161 | /* Strip any trailing slashes from the absolute prefix. */ |
162 | prefix_len = orig_prefix_len = strlen (sysroot); | |
f1d10cfb | 163 | |
f8773be1 GB |
164 | while (prefix_len > 0 && IS_DIR_SEPARATOR (sysroot[prefix_len - 1])) |
165 | prefix_len--; | |
f1d10cfb | 166 | |
9a897d43 | 167 | std::string sysroot_holder; |
f8773be1 GB |
168 | if (prefix_len == 0) |
169 | sysroot = NULL; | |
170 | else if (prefix_len != orig_prefix_len) | |
171 | { | |
9a897d43 TT |
172 | sysroot_holder = std::string (sysroot, prefix_len); |
173 | sysroot = sysroot_holder.c_str (); | |
ab38a727 PA |
174 | } |
175 | ||
176 | /* If we're on a non-DOS-based system, backslashes won't be | |
177 | understood as directory separator, so, convert them to forward | |
178 | slashes, iff we're supposed to handle DOS-based file system | |
179 | semantics for target paths. */ | |
180 | if (!DOS_BASED_FILE_SYSTEM && fskind == file_system_kind_dos_based) | |
181 | { | |
182 | char *p; | |
183 | ||
184 | /* Avoid clobbering our input. */ | |
224c3ddb | 185 | p = (char *) alloca (strlen (in_pathname) + 1); |
ab38a727 PA |
186 | strcpy (p, in_pathname); |
187 | in_pathname = p; | |
188 | ||
189 | for (; *p; p++) | |
190 | { | |
191 | if (*p == '\\') | |
192 | *p = '/'; | |
193 | } | |
194 | } | |
195 | ||
196 | /* Note, we're interested in IS_TARGET_ABSOLUTE_PATH, not | |
197 | IS_ABSOLUTE_PATH. The latter is for host paths only, while | |
198 | IN_PATHNAME is a target path. For example, if we're supposed to | |
199 | be handling DOS-like semantics we want to consider a | |
200 | 'c:/foo/bar.dll' path as an absolute path, even on a Unix box. | |
201 | With such a path, before giving up on the sysroot, we'll try: | |
202 | ||
203 | 1st attempt, c:/foo/bar.dll ==> /sysroot/c:/foo/bar.dll | |
204 | 2nd attempt, c:/foo/bar.dll ==> /sysroot/c/foo/bar.dll | |
205 | 3rd attempt, c:/foo/bar.dll ==> /sysroot/foo/bar.dll | |
206 | */ | |
207 | ||
b57fbfba | 208 | if (!IS_TARGET_ABSOLUTE_PATH (fskind, in_pathname) || sysroot == NULL) |
e0cc99a6 | 209 | temp_pathname.reset (xstrdup (in_pathname)); |
ab38a727 PA |
210 | else |
211 | { | |
5b89c67a | 212 | bool need_dir_separator; |
ab38a727 | 213 | |
3736004f PA |
214 | /* Concatenate the sysroot and the target reported filename. We |
215 | may need to glue them with a directory separator. Cases to | |
216 | consider: | |
217 | ||
dda83cd7 SM |
218 | | sysroot | separator | in_pathname | |
219 | |-----------------+-----------+----------------| | |
220 | | /some/dir | / | c:/foo/bar.dll | | |
221 | | /some/dir | | /foo/bar.dll | | |
222 | | target: | | c:/foo/bar.dll | | |
223 | | target: | | /foo/bar.dll | | |
224 | | target:some/dir | / | c:/foo/bar.dll | | |
225 | | target:some/dir | | /foo/bar.dll | | |
3736004f PA |
226 | |
227 | IOW, we don't need to add a separator if IN_PATHNAME already | |
6471e7d2 | 228 | has one, or when the sysroot is exactly "target:". |
3736004f PA |
229 | There's no need to check for drive spec explicitly, as we only |
230 | get here if IN_PATHNAME is considered an absolute path. */ | |
231 | need_dir_separator = !(IS_DIR_SEPARATOR (in_pathname[0]) | |
2938e6cf | 232 | || strcmp (TARGET_SYSROOT_PREFIX, sysroot) == 0); |
ab38a727 | 233 | |
f1d10cfb | 234 | /* Cat the prefixed pathname together. */ |
e0cc99a6 TT |
235 | temp_pathname.reset (concat (sysroot, |
236 | need_dir_separator ? SLASH_STRING : "", | |
237 | in_pathname, (char *) NULL)); | |
e4f7b8c8 MS |
238 | } |
239 | ||
2938e6cf | 240 | /* Handle files to be accessed via the target. */ |
e0cc99a6 | 241 | if (is_target_filename (temp_pathname.get ())) |
f1838a98 | 242 | { |
998d2a3e GB |
243 | if (fd != NULL) |
244 | *fd = -1; | |
e0cc99a6 | 245 | return temp_pathname; |
f1838a98 UW |
246 | } |
247 | ||
f1d10cfb | 248 | /* Now see if we can open it. */ |
13084383 SM |
249 | found_file = gdb_open_cloexec (temp_pathname.get (), |
250 | O_RDONLY | O_BINARY, 0).release (); | |
ab38a727 PA |
251 | |
252 | /* If the search in gdb_sysroot failed, and the path name has a | |
253 | drive spec (e.g, c:/foo), try stripping ':' from the drive spec, | |
254 | and retrying in the sysroot: | |
255 | c:/foo/bar.dll ==> /sysroot/c/foo/bar.dll. */ | |
f1d10cfb | 256 | |
ab38a727 | 257 | if (found_file < 0 |
b57fbfba | 258 | && sysroot != NULL |
ab38a727 PA |
259 | && HAS_TARGET_DRIVE_SPEC (fskind, in_pathname)) |
260 | { | |
5b89c67a | 261 | bool need_dir_separator = !IS_DIR_SEPARATOR (in_pathname[2]); |
e0cc99a6 | 262 | char drive[2] = { in_pathname[0], '\0' }; |
ab38a727 | 263 | |
e0cc99a6 TT |
264 | temp_pathname.reset (concat (sysroot, |
265 | SLASH_STRING, | |
266 | drive, | |
267 | need_dir_separator ? SLASH_STRING : "", | |
268 | in_pathname + 2, (char *) NULL)); | |
ab38a727 | 269 | |
e0cc99a6 | 270 | found_file = gdb_open_cloexec (temp_pathname.get (), |
13084383 | 271 | O_RDONLY | O_BINARY, 0).release (); |
ab38a727 PA |
272 | if (found_file < 0) |
273 | { | |
ab38a727 PA |
274 | /* If the search in gdb_sysroot still failed, try fully |
275 | stripping the drive spec, and trying once more in the | |
276 | sysroot before giving up. | |
277 | ||
278 | c:/foo/bar.dll ==> /sysroot/foo/bar.dll. */ | |
279 | ||
e0cc99a6 TT |
280 | temp_pathname.reset (concat (sysroot, |
281 | need_dir_separator ? SLASH_STRING : "", | |
282 | in_pathname + 2, (char *) NULL)); | |
ab38a727 | 283 | |
e0cc99a6 | 284 | found_file = gdb_open_cloexec (temp_pathname.get (), |
13084383 | 285 | O_RDONLY | O_BINARY, 0).release (); |
ab38a727 PA |
286 | } |
287 | } | |
0997b535 | 288 | |
ab38a727 PA |
289 | /* We try to find the library in various ways. After each attempt, |
290 | either found_file >= 0 and temp_pathname is a malloc'd string, or | |
291 | found_file < 0 and temp_pathname does not point to storage that | |
292 | needs to be freed. */ | |
293 | ||
294 | if (found_file < 0) | |
e0cc99a6 | 295 | temp_pathname.reset (NULL); |
ab38a727 | 296 | |
f822c95b | 297 | /* If the search in gdb_sysroot failed, and the path name is |
ba5f0d88 OF |
298 | absolute at this point, make it relative. (openp will try and open the |
299 | file according to its absolute path otherwise, which is not what we want.) | |
300 | Affects subsequent searches for this solib. */ | |
ab38a727 | 301 | if (found_file < 0 && IS_TARGET_ABSOLUTE_PATH (fskind, in_pathname)) |
ba5f0d88 OF |
302 | { |
303 | /* First, get rid of any drive letters etc. */ | |
ab38a727 PA |
304 | while (!IS_TARGET_DIR_SEPARATOR (fskind, *in_pathname)) |
305 | in_pathname++; | |
ba5f0d88 OF |
306 | |
307 | /* Next, get rid of all leading dir separators. */ | |
ab38a727 PA |
308 | while (IS_TARGET_DIR_SEPARATOR (fskind, *in_pathname)) |
309 | in_pathname++; | |
ba5f0d88 | 310 | } |
ab38a727 | 311 | |
af1900b0 GB |
312 | /* If not found, and we're looking for a solib, search the |
313 | solib_search_path (if any). */ | |
e0700ba4 SM |
314 | if (is_solib && found_file < 0 && !solib_search_path.empty ()) |
315 | found_file = openp (solib_search_path.c_str (), | |
492c0ab7 | 316 | OPF_TRY_CWD_FIRST | OPF_RETURN_REALPATH, |
fbdebf46 | 317 | in_pathname, O_RDONLY | O_BINARY, &temp_pathname); |
ab38a727 | 318 | |
af1900b0 GB |
319 | /* If not found, and we're looking for a solib, next search the |
320 | solib_search_path (if any) for the basename only (ignoring the | |
321 | path). This is to allow reading solibs from a path that differs | |
322 | from the opened path. */ | |
e0700ba4 SM |
323 | if (is_solib && found_file < 0 && !solib_search_path.empty ()) |
324 | found_file = openp (solib_search_path.c_str (), | |
492c0ab7 | 325 | OPF_TRY_CWD_FIRST | OPF_RETURN_REALPATH, |
ab38a727 PA |
326 | target_lbasename (fskind, in_pathname), |
327 | O_RDONLY | O_BINARY, &temp_pathname); | |
e4f7b8c8 | 328 | |
af1900b0 GB |
329 | /* If not found, and we're looking for a solib, try to use target |
330 | supplied solib search method. */ | |
331 | if (is_solib && found_file < 0 && ops->find_and_open_solib) | |
637d6690 | 332 | found_file = ops->find_and_open_solib (in_pathname, O_RDONLY | O_BINARY, |
66aba65d | 333 | &temp_pathname); |
2610b0bf | 334 | |
c378eb4e | 335 | /* If not found, next search the inferior's $PATH environment variable. */ |
b57fbfba | 336 | if (found_file < 0 && sysroot == NULL) |
9a6c7d9c | 337 | found_file = openp (current_inferior ()->environment.get ("PATH"), |
492c0ab7 JK |
338 | OPF_TRY_CWD_FIRST | OPF_RETURN_REALPATH, in_pathname, |
339 | O_RDONLY | O_BINARY, &temp_pathname); | |
e4f7b8c8 | 340 | |
af1900b0 GB |
341 | /* If not found, and we're looking for a solib, next search the |
342 | inferior's $LD_LIBRARY_PATH environment variable. */ | |
343 | if (is_solib && found_file < 0 && sysroot == NULL) | |
9a6c7d9c SDJ |
344 | found_file = openp (current_inferior ()->environment.get |
345 | ("LD_LIBRARY_PATH"), | |
492c0ab7 JK |
346 | OPF_TRY_CWD_FIRST | OPF_RETURN_REALPATH, in_pathname, |
347 | O_RDONLY | O_BINARY, &temp_pathname); | |
e4f7b8c8 | 348 | |
998d2a3e GB |
349 | if (fd == NULL) |
350 | { | |
351 | if (found_file >= 0) | |
352 | close (found_file); | |
353 | } | |
354 | else | |
355 | *fd = found_file; | |
356 | ||
e0cc99a6 | 357 | return temp_pathname; |
572d275c UW |
358 | } |
359 | ||
af1900b0 | 360 | /* Return the full pathname of the main executable, or NULL if not |
797bc1cb TT |
361 | found. If FD is non-NULL, *FD is set to either -1 or an open file |
362 | handle for the main executable. */ | |
af1900b0 | 363 | |
797bc1cb | 364 | gdb::unique_xmalloc_ptr<char> |
992f1ddc | 365 | exec_file_find (const char *in_pathname, int *fd) |
af1900b0 | 366 | { |
797bc1cb | 367 | gdb::unique_xmalloc_ptr<char> result; |
ecf45d2c SL |
368 | const char *fskind = effective_target_file_system_kind (); |
369 | ||
370 | if (in_pathname == NULL) | |
371 | return NULL; | |
af1900b0 | 372 | |
e0700ba4 | 373 | if (!gdb_sysroot.empty () && IS_TARGET_ABSOLUTE_PATH (fskind, in_pathname)) |
af1900b0 | 374 | { |
5b89c67a | 375 | result = solib_find_1 (in_pathname, fd, false); |
af1900b0 | 376 | |
ecf45d2c | 377 | if (result == NULL && fskind == file_system_kind_dos_based) |
af1900b0 GB |
378 | { |
379 | char *new_pathname; | |
380 | ||
224c3ddb | 381 | new_pathname = (char *) alloca (strlen (in_pathname) + 5); |
af1900b0 GB |
382 | strcpy (new_pathname, in_pathname); |
383 | strcat (new_pathname, ".exe"); | |
384 | ||
5b89c67a | 385 | result = solib_find_1 (new_pathname, fd, false); |
af1900b0 GB |
386 | } |
387 | } | |
ecf45d2c SL |
388 | else |
389 | { | |
390 | /* It's possible we don't have a full path, but rather just a | |
391 | filename. Some targets, such as HP-UX, don't provide the | |
392 | full path, sigh. | |
393 | ||
394 | Attempt to qualify the filename against the source path. | |
395 | (If that fails, we'll just fall back on the original | |
396 | filename. Not much more we can do...) */ | |
397 | ||
e0cc99a6 | 398 | if (!source_full_path_of (in_pathname, &result)) |
797bc1cb | 399 | result.reset (xstrdup (in_pathname)); |
ecf45d2c SL |
400 | if (fd != NULL) |
401 | *fd = -1; | |
402 | } | |
af1900b0 GB |
403 | |
404 | return result; | |
405 | } | |
406 | ||
407 | /* Return the full pathname of a shared library file, or NULL if not | |
797bc1cb TT |
408 | found. If FD is non-NULL, *FD is set to either -1 or an open file |
409 | handle for the shared library. | |
af1900b0 GB |
410 | |
411 | The search algorithm used is described in solib_find_1's comment | |
412 | above. */ | |
413 | ||
797bc1cb | 414 | gdb::unique_xmalloc_ptr<char> |
992f1ddc | 415 | solib_find (const char *in_pathname, int *fd) |
af1900b0 GB |
416 | { |
417 | const char *solib_symbols_extension | |
418 | = gdbarch_solib_symbols_extension (target_gdbarch ()); | |
419 | ||
420 | /* If solib_symbols_extension is set, replace the file's | |
421 | extension. */ | |
422 | if (solib_symbols_extension != NULL) | |
423 | { | |
992f1ddc | 424 | const char *p = in_pathname + strlen (in_pathname); |
af1900b0 GB |
425 | |
426 | while (p > in_pathname && *p != '.') | |
427 | p--; | |
428 | ||
429 | if (*p == '.') | |
430 | { | |
431 | char *new_pathname; | |
432 | ||
224c3ddb SM |
433 | new_pathname |
434 | = (char *) alloca (p - in_pathname + 1 | |
435 | + strlen (solib_symbols_extension) + 1); | |
af1900b0 GB |
436 | memcpy (new_pathname, in_pathname, p - in_pathname + 1); |
437 | strcpy (new_pathname + (p - in_pathname) + 1, | |
438 | solib_symbols_extension); | |
439 | ||
440 | in_pathname = new_pathname; | |
441 | } | |
442 | } | |
443 | ||
5b89c67a | 444 | return solib_find_1 (in_pathname, fd, true); |
af1900b0 GB |
445 | } |
446 | ||
572d275c UW |
447 | /* Open and return a BFD for the shared library PATHNAME. If FD is not -1, |
448 | it is used as file handle to open the file. Throws an error if the file | |
449 | could not be opened. Handles both local and remote file access. | |
450 | ||
797bc1cb | 451 | If unsuccessful, the FD will be closed (unless FD was -1). */ |
572d275c | 452 | |
192b62ce | 453 | gdb_bfd_ref_ptr |
797bc1cb | 454 | solib_bfd_fopen (const char *pathname, int fd) |
572d275c | 455 | { |
192b62ce | 456 | gdb_bfd_ref_ptr abfd (gdb_bfd_open (pathname, gnutarget, fd)); |
572d275c | 457 | |
192b62ce TT |
458 | if (abfd != NULL && !gdb_bfd_has_target_filename (abfd.get ())) |
459 | bfd_set_cacheable (abfd.get (), 1); | |
f1838a98 | 460 | |
192b62ce | 461 | if (abfd == NULL) |
f1838a98 | 462 | { |
9a897d43 | 463 | /* Arrange to free PATHNAME when the error is thrown. */ |
f1838a98 | 464 | error (_("Could not open `%s' as an executable file: %s"), |
572d275c | 465 | pathname, bfd_errmsg (bfd_get_error ())); |
f1838a98 UW |
466 | } |
467 | ||
520b0001 | 468 | return abfd; |
572d275c UW |
469 | } |
470 | ||
471 | /* Find shared library PATHNAME and open a BFD for it. */ | |
472 | ||
192b62ce | 473 | gdb_bfd_ref_ptr |
692d6f97 | 474 | solib_bfd_open (const char *pathname) |
572d275c | 475 | { |
572d275c | 476 | int found_file; |
378d2b72 | 477 | const struct bfd_arch_info *b; |
572d275c | 478 | |
572d275c | 479 | /* Search for shared library file. */ |
797bc1cb TT |
480 | gdb::unique_xmalloc_ptr<char> found_pathname |
481 | = solib_find (pathname, &found_file); | |
572d275c | 482 | if (found_pathname == NULL) |
048d532d PA |
483 | { |
484 | /* Return failure if the file could not be found, so that we can | |
485 | accumulate messages about missing libraries. */ | |
486 | if (errno == ENOENT) | |
487 | return NULL; | |
488 | ||
489 | perror_with_name (pathname); | |
490 | } | |
572d275c UW |
491 | |
492 | /* Open bfd for shared library. */ | |
797bc1cb | 493 | gdb_bfd_ref_ptr abfd (solib_bfd_fopen (found_pathname.get (), found_file)); |
572d275c UW |
494 | |
495 | /* Check bfd format. */ | |
192b62ce TT |
496 | if (!bfd_check_format (abfd.get (), bfd_object)) |
497 | error (_("`%s': not in executable format: %s"), | |
00f93c44 | 498 | bfd_get_filename (abfd.get ()), bfd_errmsg (bfd_get_error ())); |
f1838a98 | 499 | |
378d2b72 | 500 | /* Check bfd arch. */ |
f5656ead | 501 | b = gdbarch_bfd_arch_info (target_gdbarch ()); |
192b62ce | 502 | if (!b->compatible (b, bfd_get_arch_info (abfd.get ()))) |
c0e0d6bc TT |
503 | error (_("`%s': Shared library architecture %s is not compatible " |
504 | "with target architecture %s."), bfd_get_filename (abfd.get ()), | |
505 | bfd_get_arch_info (abfd.get ())->printable_name, | |
506 | b->printable_name); | |
378d2b72 | 507 | |
f1838a98 | 508 | return abfd; |
e4f7b8c8 MS |
509 | } |
510 | ||
39f53acb AM |
511 | /* Mapping of a core file's shared library sonames to their respective |
512 | build-ids. Added to the registries of core file bfds. */ | |
513 | ||
514 | typedef std::unordered_map<std::string, std::string> soname_build_id_map; | |
515 | ||
516 | /* Key used to associate a soname_build_id_map to a core file bfd. */ | |
517 | ||
08b8a139 TT |
518 | static const struct registry<bfd>::key<soname_build_id_map> |
519 | cbfd_soname_build_id_data_key; | |
39f53acb AM |
520 | |
521 | /* See solib.h. */ | |
522 | ||
523 | void | |
524 | set_cbfd_soname_build_id (gdb_bfd_ref_ptr abfd, | |
525 | const char *soname, | |
526 | const bfd_build_id *build_id) | |
527 | { | |
528 | gdb_assert (abfd.get () != nullptr); | |
529 | gdb_assert (soname != nullptr); | |
530 | gdb_assert (build_id != nullptr); | |
531 | ||
532 | soname_build_id_map *mapptr = cbfd_soname_build_id_data_key.get (abfd.get ()); | |
533 | ||
534 | if (mapptr == nullptr) | |
535 | mapptr = cbfd_soname_build_id_data_key.emplace (abfd.get ()); | |
536 | ||
537 | (*mapptr)[soname] = build_id_to_string (build_id); | |
538 | } | |
539 | ||
540 | /* See solib.h. */ | |
541 | ||
542 | gdb::unique_xmalloc_ptr<char> | |
543 | get_cbfd_soname_build_id (gdb_bfd_ref_ptr abfd, const char *soname) | |
544 | { | |
545 | if (abfd.get () == nullptr || soname == nullptr) | |
546 | return {}; | |
547 | ||
548 | soname_build_id_map *mapptr | |
549 | = cbfd_soname_build_id_data_key.get (abfd.get ()); | |
550 | ||
551 | if (mapptr == nullptr) | |
552 | return {}; | |
553 | ||
554 | auto it = mapptr->find (lbasename (soname)); | |
555 | if (it == mapptr->end ()) | |
556 | return {}; | |
557 | ||
558 | return make_unique_xstrdup (it->second.c_str ()); | |
559 | } | |
560 | ||
7f86f058 PA |
561 | /* Given a pointer to one of the shared objects in our list of mapped |
562 | objects, use the recorded name to open a bfd descriptor for the | |
563 | object, build a section table, relocate all the section addresses | |
564 | by the base address at which the shared object was mapped, and then | |
565 | add the sections to the target's section table. | |
e4f7b8c8 | 566 | |
7f86f058 PA |
567 | FIXME: In most (all?) cases the shared object file name recorded in |
568 | the dynamic linkage tables will be a fully qualified pathname. For | |
c5aa993b JM |
569 | cases where it isn't, do we really mimic the systems search |
570 | mechanism correctly in the below code (particularly the tilde | |
7f86f058 | 571 | expansion stuff?). */ |
c906108c SS |
572 | |
573 | static int | |
048d532d | 574 | solib_map_sections (struct so_list *so) |
c906108c | 575 | { |
3641da11 | 576 | const struct target_so_ops *ops = solib_ops (target_gdbarch ()); |
c5aa993b | 577 | |
ee0c3293 TT |
578 | gdb::unique_xmalloc_ptr<char> filename (tilde_expand (so->so_name)); |
579 | gdb_bfd_ref_ptr abfd (ops->bfd_open (filename.get ())); | |
b91f93a0 AM |
580 | gdb::unique_xmalloc_ptr<char> build_id_hexstr |
581 | = get_cbfd_soname_build_id (current_program_space->cbfd, so->so_name); | |
582 | ||
583 | /* If we already know the build-id of this solib from a core file, verify | |
584 | it matches ABFD's build-id. If there is a mismatch or the solib wasn't | |
585 | found, attempt to query debuginfod for the correct solib. */ | |
586 | if (build_id_hexstr.get () != nullptr) | |
587 | { | |
588 | bool mismatch = false; | |
589 | ||
590 | if (abfd != nullptr && abfd->build_id != nullptr) | |
591 | { | |
592 | std::string build_id = build_id_to_string (abfd->build_id); | |
593 | ||
594 | if (build_id != build_id_hexstr.get ()) | |
595 | mismatch = true; | |
596 | } | |
597 | if (abfd == nullptr || mismatch) | |
598 | { | |
599 | scoped_fd fd = debuginfod_exec_query ((const unsigned char*) | |
600 | build_id_hexstr.get (), | |
601 | 0, so->so_name, &filename); | |
602 | ||
603 | if (fd.get () >= 0) | |
604 | abfd = ops->bfd_open (filename.get ()); | |
605 | else if (mismatch) | |
606 | warning (_("Build-id of %ps does not match core file."), | |
607 | styled_string (file_name_style.style (), filename.get ())); | |
608 | } | |
609 | } | |
e4f7b8c8 | 610 | |
048d532d PA |
611 | if (abfd == NULL) |
612 | return 0; | |
613 | ||
13437d4b | 614 | /* Leave bfd open, core_xfer_memory and "info files" need it. */ |
192b62ce | 615 | so->abfd = abfd.release (); |
23e04971 | 616 | |
b030cf11 JB |
617 | /* Copy the full path name into so_name, allowing symbol_file_add |
618 | to find it later. This also affects the =library-loaded GDB/MI | |
619 | event, and in particular the part of that notification providing | |
620 | the library's host-side path. If we let the target dictate | |
621 | that objfile's path, and the target is different from the host, | |
622 | GDB/MI will not provide the correct host-side path. */ | |
192b62ce | 623 | if (strlen (bfd_get_filename (so->abfd)) >= SO_NAME_MAX_PATH_SIZE) |
b030cf11 | 624 | error (_("Shared library file name is too long.")); |
192b62ce | 625 | strcpy (so->so_name, bfd_get_filename (so->abfd)); |
b030cf11 | 626 | |
bb2a6777 TT |
627 | if (so->sections == nullptr) |
628 | so->sections = new target_section_table; | |
2d128614 | 629 | *so->sections = build_section_table (so->abfd); |
104c1213 | 630 | |
d7a78e5c | 631 | for (target_section &p : *so->sections) |
104c1213 | 632 | { |
13437d4b | 633 | /* Relocate the section binding addresses as recorded in the shared |
dda83cd7 SM |
634 | object's file by the base address to which the object was actually |
635 | mapped. */ | |
bb2a6777 | 636 | ops->relocate_section_addresses (so, &p); |
cfa9d6d9 DJ |
637 | |
638 | /* If the target didn't provide information about the address | |
639 | range of the shared object, assume we want the location of | |
640 | the .text section. */ | |
641 | if (so->addr_low == 0 && so->addr_high == 0 | |
bb2a6777 | 642 | && strcmp (p.the_bfd_section->name, ".text") == 0) |
13437d4b | 643 | { |
bb2a6777 TT |
644 | so->addr_low = p.addr; |
645 | so->addr_high = p.endaddr; | |
13437d4b | 646 | } |
104c1213 JM |
647 | } |
648 | ||
048d532d PA |
649 | /* Add the shared object's sections to the current set of file |
650 | section tables. Do this immediately after mapping the object so | |
651 | that later nodes in the list can query this object, as is needed | |
652 | in solib-osf.c. */ | |
3769e227 | 653 | current_program_space->add_target_sections (so, *so->sections); |
048d532d PA |
654 | |
655 | return 1; | |
104c1213 | 656 | } |
c906108c | 657 | |
0892cb63 DE |
658 | /* Free symbol-file related contents of SO and reset for possible reloading |
659 | of SO. If we have opened a BFD for SO, close it. If we have placed SO's | |
660 | sections in some target's section table, the caller is responsible for | |
661 | removing them. | |
a86988f2 PA |
662 | |
663 | This function doesn't mess with objfiles at all. If there is an | |
664 | objfile associated with SO that needs to be removed, the caller is | |
665 | responsible for taking care of that. */ | |
666 | ||
667 | static void | |
0892cb63 | 668 | clear_so (struct so_list *so) |
a86988f2 | 669 | { |
3641da11 | 670 | const struct target_so_ops *ops = solib_ops (target_gdbarch ()); |
0892cb63 | 671 | |
bb2a6777 TT |
672 | delete so->sections; |
673 | so->sections = NULL; | |
a86988f2 PA |
674 | |
675 | gdb_bfd_unref (so->abfd); | |
676 | so->abfd = NULL; | |
677 | ||
678 | /* Our caller closed the objfile, possibly via objfile_purge_solibs. */ | |
679 | so->symbols_loaded = 0; | |
680 | so->objfile = NULL; | |
681 | ||
682 | so->addr_low = so->addr_high = 0; | |
683 | ||
684 | /* Restore the target-supplied file name. SO_NAME may be the path | |
685 | of the symbol file. */ | |
686 | strcpy (so->so_name, so->so_original_name); | |
0892cb63 DE |
687 | |
688 | /* Do the same for target-specific data. */ | |
689 | if (ops->clear_so != NULL) | |
690 | ops->clear_so (so); | |
a86988f2 PA |
691 | } |
692 | ||
7f86f058 | 693 | /* Free the storage associated with the `struct so_list' object SO. |
c378eb4e | 694 | If we have opened a BFD for SO, close it. |
c906108c | 695 | |
07cd4b97 JB |
696 | The caller is responsible for removing SO from whatever list it is |
697 | a member of. If we have placed SO's sections in some target's | |
698 | section table, the caller is responsible for removing them. | |
c906108c | 699 | |
07cd4b97 JB |
700 | This function doesn't mess with objfiles at all. If there is an |
701 | objfile associated with SO that needs to be removed, the caller is | |
702 | responsible for taking care of that. */ | |
703 | ||
13437d4b | 704 | void |
07cd4b97 | 705 | free_so (struct so_list *so) |
c906108c | 706 | { |
3641da11 | 707 | const struct target_so_ops *ops = solib_ops (target_gdbarch ()); |
c5aa993b | 708 | |
0892cb63 | 709 | clear_so (so); |
66aba65d | 710 | ops->free_so (so); |
07cd4b97 | 711 | |
b8c9b27d | 712 | xfree (so); |
c906108c SS |
713 | } |
714 | ||
07cd4b97 | 715 | |
7eedccfa | 716 | /* Read in symbols for shared object SO. If SYMFILE_VERBOSE is set in FLAGS, |
5b89c67a | 717 | be chatty about it. Return true if any symbols were actually loaded. */ |
42a6e6a0 | 718 | |
5b89c67a | 719 | bool |
b15cc25c | 720 | solib_read_symbols (struct so_list *so, symfile_add_flags flags) |
42a6e6a0 MK |
721 | { |
722 | if (so->symbols_loaded) | |
723 | { | |
a86988f2 | 724 | /* If needed, we've already warned in our caller. */ |
42a6e6a0 | 725 | } |
8bb75286 DJ |
726 | else if (so->abfd == NULL) |
727 | { | |
048d532d PA |
728 | /* We've already warned about this library, when trying to open |
729 | it. */ | |
8bb75286 | 730 | } |
42a6e6a0 MK |
731 | else |
732 | { | |
048d532d | 733 | |
7dcd53a0 TT |
734 | flags |= current_inferior ()->symfile_flags; |
735 | ||
a70b8144 | 736 | try |
048d532d | 737 | { |
048d532d | 738 | /* Have we already loaded this shared object? */ |
aed57c53 | 739 | so->objfile = nullptr; |
2030c079 | 740 | for (objfile *objfile : current_program_space->objfiles ()) |
048d532d | 741 | { |
aed57c53 TT |
742 | if (filename_cmp (objfile_name (objfile), so->so_name) == 0 |
743 | && objfile->addr_low == so->addr_low) | |
744 | { | |
745 | so->objfile = objfile; | |
746 | break; | |
747 | } | |
048d532d | 748 | } |
9c6595ab PA |
749 | if (so->objfile == NULL) |
750 | { | |
37e136b1 | 751 | section_addr_info sap |
bb2a6777 | 752 | = build_section_addr_info_from_section_table (*so->sections); |
98badbfd TT |
753 | gdb_bfd_ref_ptr tmp_bfd |
754 | (gdb_bfd_ref_ptr::new_reference (so->abfd)); | |
755 | so->objfile = symbol_file_add_from_bfd (tmp_bfd, so->so_name, | |
37e136b1 TT |
756 | flags, &sap, |
757 | OBJF_SHARED, NULL); | |
9c6595ab | 758 | so->objfile->addr_low = so->addr_low; |
9c6595ab | 759 | } |
492d29ea PA |
760 | |
761 | so->symbols_loaded = 1; | |
762 | } | |
230d2906 | 763 | catch (const gdb_exception_error &e) |
492d29ea PA |
764 | { |
765 | exception_fprintf (gdb_stderr, e, _("Error while reading shared" | |
766 | " library symbols for %s:\n"), | |
767 | so->so_name); | |
048d532d PA |
768 | } |
769 | ||
5b89c67a | 770 | return true; |
42a6e6a0 MK |
771 | } |
772 | ||
5b89c67a | 773 | return false; |
42a6e6a0 | 774 | } |
c906108c | 775 | |
a1fd1ac9 TT |
776 | /* Return true if KNOWN->objfile is used by any other so_list object |
777 | in the list of shared libraries. Return false otherwise. */ | |
59145f8c | 778 | |
5b89c67a | 779 | static bool |
59145f8c AR |
780 | solib_used (const struct so_list *const known) |
781 | { | |
a1fd1ac9 | 782 | for (const struct so_list *pivot : current_program_space->solibs ()) |
59145f8c | 783 | if (pivot != known && pivot->objfile == known->objfile) |
5b89c67a CB |
784 | return true; |
785 | return false; | |
59145f8c AR |
786 | } |
787 | ||
51457a05 | 788 | /* See solib.h. */ |
c906108c | 789 | |
e696b3ad MAL |
790 | void |
791 | update_solib_list (int from_tty) | |
07cd4b97 | 792 | { |
3641da11 | 793 | const struct target_so_ops *ops = solib_ops (target_gdbarch ()); |
66aba65d | 794 | struct so_list *inferior = ops->current_sos(); |
07cd4b97 JB |
795 | struct so_list *gdb, **gdb_link; |
796 | ||
181e7f93 PA |
797 | /* We can reach here due to changing solib-search-path or the |
798 | sysroot, before having any inferior. */ | |
55f6301a | 799 | if (target_has_execution () && inferior_ptid != null_ptid) |
181e7f93 PA |
800 | { |
801 | struct inferior *inf = current_inferior (); | |
802 | ||
803 | /* If we are attaching to a running process for which we | |
804 | have not opened a symbol file, we may be able to get its | |
805 | symbols now! */ | |
a42d7dd8 TT |
806 | if (inf->attach_flag |
807 | && current_program_space->symfile_object_file == NULL) | |
bf469271 | 808 | { |
a70b8144 | 809 | try |
bf469271 PA |
810 | { |
811 | ops->open_symbol_file_object (from_tty); | |
812 | } | |
230d2906 | 813 | catch (const gdb_exception &ex) |
bf469271 PA |
814 | { |
815 | exception_fprintf (gdb_stderr, ex, | |
816 | "Error reading attached " | |
817 | "process's symbol file.\n"); | |
818 | } | |
bf469271 | 819 | } |
181e7f93 | 820 | } |
104c1213 | 821 | |
07cd4b97 JB |
822 | /* GDB and the inferior's dynamic linker each maintain their own |
823 | list of currently loaded shared objects; we want to bring the | |
824 | former in sync with the latter. Scan both lists, seeing which | |
825 | shared objects appear where. There are three cases: | |
826 | ||
827 | - A shared object appears on both lists. This means that GDB | |
105b175f JB |
828 | knows about it already, and it's still loaded in the inferior. |
829 | Nothing needs to happen. | |
07cd4b97 JB |
830 | |
831 | - A shared object appears only on GDB's list. This means that | |
105b175f JB |
832 | the inferior has unloaded it. We should remove the shared |
833 | object from GDB's tables. | |
07cd4b97 JB |
834 | |
835 | - A shared object appears only on the inferior's list. This | |
105b175f JB |
836 | means that it's just been loaded. We should add it to GDB's |
837 | tables. | |
07cd4b97 JB |
838 | |
839 | So we walk GDB's list, checking each entry to see if it appears | |
840 | in the inferior's list too. If it does, no action is needed, and | |
841 | we remove it from the inferior's list. If it doesn't, the | |
842 | inferior has unloaded it, and we remove it from GDB's list. By | |
843 | the time we're done walking GDB's list, the inferior's list | |
844 | contains only the new shared objects, which we then add. */ | |
845 | ||
a1fd1ac9 TT |
846 | gdb = current_program_space->so_list; |
847 | gdb_link = ¤t_program_space->so_list; | |
07cd4b97 | 848 | while (gdb) |
c906108c | 849 | { |
07cd4b97 JB |
850 | struct so_list *i = inferior; |
851 | struct so_list **i_link = &inferior; | |
852 | ||
853 | /* Check to see whether the shared object *gdb also appears in | |
854 | the inferior's current list. */ | |
855 | while (i) | |
c906108c | 856 | { |
a7c02bc8 VP |
857 | if (ops->same) |
858 | { | |
859 | if (ops->same (gdb, i)) | |
860 | break; | |
861 | } | |
862 | else | |
863 | { | |
0ba1096a | 864 | if (! filename_cmp (gdb->so_original_name, i->so_original_name)) |
a7c02bc8 VP |
865 | break; |
866 | } | |
07cd4b97 JB |
867 | |
868 | i_link = &i->next; | |
869 | i = *i_link; | |
c906108c | 870 | } |
c5aa993b | 871 | |
07cd4b97 | 872 | /* If the shared object appears on the inferior's list too, then |
dda83cd7 SM |
873 | it's still loaded, so we don't need to do anything. Delete |
874 | it from the inferior's list, and leave it on GDB's list. */ | |
07cd4b97 | 875 | if (i) |
c906108c | 876 | { |
07cd4b97 | 877 | *i_link = i->next; |
07cd4b97 JB |
878 | free_so (i); |
879 | gdb_link = &gdb->next; | |
880 | gdb = *gdb_link; | |
881 | } | |
882 | ||
883 | /* If it's not on the inferior's list, remove it from GDB's tables. */ | |
884 | else | |
885 | { | |
42a6e6a0 MK |
886 | /* Notify any observer that the shared object has been |
887 | unloaded before we remove it from GDB's tables. */ | |
76727919 | 888 | gdb::observers::solib_unloaded.notify (gdb); |
84acb35a | 889 | |
6fb16ce6 | 890 | current_program_space->deleted_solibs.push_back (gdb->so_name); |
edcc5120 | 891 | |
07cd4b97 | 892 | *gdb_link = gdb->next; |
07cd4b97 JB |
893 | |
894 | /* Unless the user loaded it explicitly, free SO's objfile. */ | |
59145f8c AR |
895 | if (gdb->objfile && ! (gdb->objfile->flags & OBJF_USERLOADED) |
896 | && !solib_used (gdb)) | |
268e4f09 | 897 | gdb->objfile->unlink (); |
07cd4b97 JB |
898 | |
899 | /* Some targets' section tables might be referring to | |
900 | sections from so->abfd; remove them. */ | |
2a3f84af | 901 | current_program_space->remove_target_sections (gdb); |
07cd4b97 JB |
902 | |
903 | free_so (gdb); | |
904 | gdb = *gdb_link; | |
c906108c SS |
905 | } |
906 | } | |
c5aa993b | 907 | |
07cd4b97 JB |
908 | /* Now the inferior's list contains only shared objects that don't |
909 | appear in GDB's list --- those that are newly loaded. Add them | |
e8930304 | 910 | to GDB's shared object list. */ |
07cd4b97 | 911 | if (inferior) |
c906108c | 912 | { |
048d532d PA |
913 | int not_found = 0; |
914 | const char *not_found_filename = NULL; | |
915 | ||
07cd4b97 JB |
916 | struct so_list *i; |
917 | ||
918 | /* Add the new shared objects to GDB's list. */ | |
919 | *gdb_link = inferior; | |
920 | ||
e8930304 | 921 | /* Fill in the rest of each of the `struct so_list' nodes. */ |
07cd4b97 | 922 | for (i = inferior; i; i = i->next) |
c906108c | 923 | { |
048d532d | 924 | |
6c95b8df | 925 | i->pspace = current_program_space; |
bcb430e4 | 926 | current_program_space->added_solibs.push_back (i); |
07cd4b97 | 927 | |
a70b8144 | 928 | try |
048d532d PA |
929 | { |
930 | /* Fill in the rest of the `struct so_list' node. */ | |
931 | if (!solib_map_sections (i)) | |
932 | { | |
933 | not_found++; | |
934 | if (not_found_filename == NULL) | |
935 | not_found_filename = i->so_original_name; | |
936 | } | |
937 | } | |
07cd4b97 | 938 | |
230d2906 | 939 | catch (const gdb_exception_error &e) |
492d29ea PA |
940 | { |
941 | exception_fprintf (gdb_stderr, e, | |
942 | _("Error while mapping shared " | |
943 | "library sections:\n")); | |
944 | } | |
42a6e6a0 MK |
945 | |
946 | /* Notify any observer that the shared object has been | |
048d532d | 947 | loaded now that we've added it to GDB's tables. */ |
76727919 | 948 | gdb::observers::solib_loaded.notify (i); |
c906108c | 949 | } |
048d532d PA |
950 | |
951 | /* If a library was not found, issue an appropriate warning | |
952 | message. We have to use a single call to warning in case the | |
953 | front end does something special with warnings, e.g., pop up | |
954 | a dialog box. It Would Be Nice if we could get a "warning: " | |
955 | prefix on each line in the CLI front end, though - it doesn't | |
956 | stand out well. */ | |
957 | ||
958 | if (not_found == 1) | |
3e43a32a MS |
959 | warning (_("Could not load shared library symbols for %s.\n" |
960 | "Do you need \"set solib-search-path\" " | |
961 | "or \"set sysroot\"?"), | |
048d532d PA |
962 | not_found_filename); |
963 | else if (not_found > 1) | |
964 | warning (_("\ | |
965 | Could not load shared library symbols for %d libraries, e.g. %s.\n\ | |
966 | Use the \"info sharedlibrary\" command to see the complete listing.\n\ | |
967 | Do you need \"set solib-search-path\" or \"set sysroot\"?"), | |
968 | not_found, not_found_filename); | |
e8930304 | 969 | } |
105b175f JB |
970 | } |
971 | ||
17a37d48 PP |
972 | |
973 | /* Return non-zero if NAME is the libpthread shared library. | |
6612ad7f JB |
974 | |
975 | Uses a fairly simplistic heuristic approach where we check | |
976 | the file name against "/libpthread". This can lead to false | |
e2b9ea4b KB |
977 | positives, but this should be good enough in practice. |
978 | ||
979 | As of glibc-2.34, functions formerly residing in libpthread have | |
980 | been moved to libc, so "/libc." needs to be checked too. (Matching | |
981 | the "." will avoid matching libraries such as libcrypt.) */ | |
6612ad7f | 982 | |
5b89c67a | 983 | bool |
17a37d48 PP |
984 | libpthread_name_p (const char *name) |
985 | { | |
e2b9ea4b KB |
986 | return (strstr (name, "/libpthread") != NULL |
987 | || strstr (name, "/libc.") != NULL ); | |
17a37d48 PP |
988 | } |
989 | ||
990 | /* Return non-zero if SO is the libpthread shared library. */ | |
991 | ||
5b89c67a | 992 | static bool |
6612ad7f JB |
993 | libpthread_solib_p (struct so_list *so) |
994 | { | |
17a37d48 | 995 | return libpthread_name_p (so->so_name); |
6612ad7f | 996 | } |
105b175f | 997 | |
7f86f058 | 998 | /* Read in symbolic information for any shared objects whose names |
105b175f JB |
999 | match PATTERN. (If we've already read a shared object's symbol |
1000 | info, leave it alone.) If PATTERN is zero, read them all. | |
1001 | ||
990f9fe3 FF |
1002 | If READSYMS is 0, defer reading symbolic information until later |
1003 | but still do any needed low level processing. | |
1004 | ||
e696b3ad | 1005 | FROM_TTY is described for update_solib_list, above. */ |
105b175f JB |
1006 | |
1007 | void | |
e696b3ad | 1008 | solib_add (const char *pattern, int from_tty, int readsyms) |
105b175f | 1009 | { |
770e7fc7 DE |
1010 | if (print_symbol_loading_p (from_tty, 0, 0)) |
1011 | { | |
1012 | if (pattern != NULL) | |
1013 | { | |
6cb06a8c TT |
1014 | gdb_printf (_("Loading symbols for shared libraries: %s\n"), |
1015 | pattern); | |
770e7fc7 DE |
1016 | } |
1017 | else | |
6cb06a8c | 1018 | gdb_printf (_("Loading symbols for shared libraries.\n")); |
770e7fc7 DE |
1019 | } |
1020 | ||
2eff07b3 PP |
1021 | current_program_space->solib_add_generation++; |
1022 | ||
105b175f JB |
1023 | if (pattern) |
1024 | { | |
1025 | char *re_err = re_comp (pattern); | |
1026 | ||
1027 | if (re_err) | |
8a3fe4f8 | 1028 | error (_("Invalid regexp: %s"), re_err); |
105b175f JB |
1029 | } |
1030 | ||
e696b3ad | 1031 | update_solib_list (from_tty); |
c906108c | 1032 | |
105b175f JB |
1033 | /* Walk the list of currently loaded shared libraries, and read |
1034 | symbols for any that match the pattern --- or any whose symbols | |
1035 | aren't already loaded, if no pattern was given. */ | |
e8930304 | 1036 | { |
5b89c67a CB |
1037 | bool any_matches = false; |
1038 | bool loaded_any_symbols = false; | |
b15cc25c PA |
1039 | symfile_add_flags add_flags = SYMFILE_DEFER_BP_RESET; |
1040 | ||
1041 | if (from_tty) | |
dda83cd7 | 1042 | add_flags |= SYMFILE_VERBOSE; |
c906108c | 1043 | |
a1fd1ac9 | 1044 | for (struct so_list *gdb : current_program_space->solibs ()) |
e8930304 JB |
1045 | if (! pattern || re_exec (gdb->so_name)) |
1046 | { | |
dda83cd7 SM |
1047 | /* Normally, we would read the symbols from that library |
1048 | only if READSYMS is set. However, we're making a small | |
1049 | exception for the pthread library, because we sometimes | |
1050 | need the library symbols to be loaded in order to provide | |
1051 | thread support (x86-linux for instance). */ | |
1052 | const int add_this_solib = | |
1053 | (readsyms || libpthread_solib_p (gdb)); | |
6612ad7f | 1054 | |
5b89c67a | 1055 | any_matches = true; |
a86988f2 PA |
1056 | if (add_this_solib) |
1057 | { | |
1058 | if (gdb->symbols_loaded) | |
1059 | { | |
1060 | /* If no pattern was given, be quiet for shared | |
1061 | libraries we have already loaded. */ | |
1062 | if (pattern && (from_tty || info_verbose)) | |
6cb06a8c TT |
1063 | gdb_printf (_("Symbols already loaded for %s\n"), |
1064 | gdb->so_name); | |
a86988f2 | 1065 | } |
b15cc25c | 1066 | else if (solib_read_symbols (gdb, add_flags)) |
5b89c67a | 1067 | loaded_any_symbols = true; |
a86988f2 | 1068 | } |
e8930304 JB |
1069 | } |
1070 | ||
7eedccfa PP |
1071 | if (loaded_any_symbols) |
1072 | breakpoint_re_set (); | |
1073 | ||
e8930304 | 1074 | if (from_tty && pattern && ! any_matches) |
6cb06a8c | 1075 | gdb_printf |
e8930304 JB |
1076 | ("No loaded shared libraries match the pattern `%s'.\n", pattern); |
1077 | ||
1078 | if (loaded_any_symbols) | |
1079 | { | |
1080 | /* Getting new symbols may change our opinion about what is | |
1081 | frameless. */ | |
1082 | reinit_frame_cache (); | |
e8930304 JB |
1083 | } |
1084 | } | |
c906108c SS |
1085 | } |
1086 | ||
7f86f058 PA |
1087 | /* Implement the "info sharedlibrary" command. Walk through the |
1088 | shared library list and print information about each attached | |
1089 | library matching PATTERN. If PATTERN is elided, print them | |
1090 | all. */ | |
c906108c SS |
1091 | |
1092 | static void | |
1d12d88f | 1093 | info_sharedlibrary_command (const char *pattern, int from_tty) |
c906108c | 1094 | { |
5b89c67a | 1095 | bool so_missing_debug_info = false; |
c906108c | 1096 | int addr_width; |
55333a84 | 1097 | int nr_libs; |
f5656ead | 1098 | struct gdbarch *gdbarch = target_gdbarch (); |
79a45e25 | 1099 | struct ui_out *uiout = current_uiout; |
55333a84 DE |
1100 | |
1101 | if (pattern) | |
1102 | { | |
1103 | char *re_err = re_comp (pattern); | |
1104 | ||
1105 | if (re_err) | |
1106 | error (_("Invalid regexp: %s"), re_err); | |
1107 | } | |
c906108c | 1108 | |
84eb3c4f | 1109 | /* "0x", a little whitespace, and two hex digits per byte of pointers. */ |
55333a84 | 1110 | addr_width = 4 + (gdbarch_ptr_bit (gdbarch) / 4); |
c906108c | 1111 | |
e696b3ad | 1112 | update_solib_list (from_tty); |
07cd4b97 | 1113 | |
4a2b031d TT |
1114 | /* ui_out_emit_table table_emitter needs to know the number of rows, |
1115 | so we need to make two passes over the libs. */ | |
55333a84 | 1116 | |
a1fd1ac9 TT |
1117 | nr_libs = 0; |
1118 | for (struct so_list *so : current_program_space->solibs ()) | |
c906108c | 1119 | { |
c5aa993b | 1120 | if (so->so_name[0]) |
c906108c | 1121 | { |
55333a84 DE |
1122 | if (pattern && ! re_exec (so->so_name)) |
1123 | continue; | |
1124 | ++nr_libs; | |
1125 | } | |
1126 | } | |
1127 | ||
4a2b031d TT |
1128 | { |
1129 | ui_out_emit_table table_emitter (uiout, 4, nr_libs, "SharedLibraryTable"); | |
55333a84 | 1130 | |
4a2b031d TT |
1131 | /* The "- 1" is because ui_out adds one space between columns. */ |
1132 | uiout->table_header (addr_width - 1, ui_left, "from", "From"); | |
1133 | uiout->table_header (addr_width - 1, ui_left, "to", "To"); | |
1134 | uiout->table_header (12 - 1, ui_left, "syms-read", "Syms Read"); | |
1135 | uiout->table_header (0, ui_noalign, "name", "Shared Object Library"); | |
55333a84 | 1136 | |
4a2b031d | 1137 | uiout->table_body (); |
55333a84 | 1138 | |
a1fd1ac9 | 1139 | for (struct so_list *so : current_program_space->solibs ()) |
4a2b031d TT |
1140 | { |
1141 | if (! so->so_name[0]) | |
1142 | continue; | |
1143 | if (pattern && ! re_exec (so->so_name)) | |
1144 | continue; | |
1145 | ||
1146 | ui_out_emit_tuple tuple_emitter (uiout, "lib"); | |
1147 | ||
1148 | if (so->addr_high != 0) | |
1149 | { | |
1150 | uiout->field_core_addr ("from", gdbarch, so->addr_low); | |
1151 | uiout->field_core_addr ("to", gdbarch, so->addr_high); | |
1152 | } | |
1153 | else | |
1154 | { | |
1155 | uiout->field_skip ("from"); | |
1156 | uiout->field_skip ("to"); | |
1157 | } | |
1158 | ||
29f94340 | 1159 | if (! top_level_interpreter ()->interp_ui_out ()->is_mi_like_p () |
4a2b031d TT |
1160 | && so->symbols_loaded |
1161 | && !objfile_has_symbols (so->objfile)) | |
1162 | { | |
5b89c67a | 1163 | so_missing_debug_info = true; |
4a2b031d TT |
1164 | uiout->field_string ("syms-read", "Yes (*)"); |
1165 | } | |
1166 | else | |
1167 | uiout->field_string ("syms-read", so->symbols_loaded ? "Yes" : "No"); | |
1168 | ||
e43b10e1 | 1169 | uiout->field_string ("name", so->so_name, file_name_style.style ()); |
4a2b031d TT |
1170 | |
1171 | uiout->text ("\n"); | |
1172 | } | |
1173 | } | |
55333a84 DE |
1174 | |
1175 | if (nr_libs == 0) | |
1176 | { | |
1177 | if (pattern) | |
112e8700 | 1178 | uiout->message (_("No shared libraries matched.\n")); |
55333a84 | 1179 | else |
112e8700 | 1180 | uiout->message (_("No shared libraries loaded at this time.\n")); |
55333a84 DE |
1181 | } |
1182 | else | |
c906108c | 1183 | { |
55333a84 | 1184 | if (so_missing_debug_info) |
112e8700 | 1185 | uiout->message (_("(*): Shared library is missing " |
3e43a32a | 1186 | "debugging information.\n")); |
c906108c SS |
1187 | } |
1188 | } | |
1189 | ||
5b89c67a | 1190 | /* See solib.h. */ |
5fd1a349 | 1191 | |
5b89c67a | 1192 | bool |
5fd1a349 PP |
1193 | solib_contains_address_p (const struct so_list *const solib, |
1194 | CORE_ADDR address) | |
1195 | { | |
76547ab3 TV |
1196 | if (solib->sections == nullptr) |
1197 | return false; | |
1198 | ||
d7a78e5c | 1199 | for (target_section &p : *solib->sections) |
bb2a6777 | 1200 | if (p.addr <= address && address < p.endaddr) |
5b89c67a | 1201 | return true; |
5fd1a349 | 1202 | |
5b89c67a | 1203 | return false; |
5fd1a349 PP |
1204 | } |
1205 | ||
7f86f058 PA |
1206 | /* If ADDRESS is in a shared lib in program space PSPACE, return its |
1207 | name. | |
c906108c | 1208 | |
7f86f058 PA |
1209 | Provides a hook for other gdb routines to discover whether or not a |
1210 | particular address is within the mapped address space of a shared | |
1211 | library. | |
c906108c | 1212 | |
c5aa993b JM |
1213 | For example, this routine is called at one point to disable |
1214 | breakpoints which are in shared libraries that are not currently | |
7f86f058 | 1215 | mapped in. */ |
c906108c | 1216 | |
6d08aed3 | 1217 | const char * |
6c95b8df | 1218 | solib_name_from_address (struct program_space *pspace, CORE_ADDR address) |
c906108c | 1219 | { |
6c95b8df | 1220 | struct so_list *so = NULL; |
c5aa993b | 1221 | |
6c95b8df | 1222 | for (so = pspace->so_list; so; so = so->next) |
5fd1a349 PP |
1223 | if (solib_contains_address_p (so, address)) |
1224 | return (so->so_name); | |
07cd4b97 | 1225 | |
c906108c SS |
1226 | return (0); |
1227 | } | |
1228 | ||
5b89c67a | 1229 | /* See solib.h. */ |
de18c1d8 | 1230 | |
5b89c67a | 1231 | bool |
de18c1d8 JM |
1232 | solib_keep_data_in_core (CORE_ADDR vaddr, unsigned long size) |
1233 | { | |
3641da11 | 1234 | const struct target_so_ops *ops = solib_ops (target_gdbarch ()); |
de18c1d8 JM |
1235 | |
1236 | if (ops->keep_data_in_core) | |
5b89c67a | 1237 | return ops->keep_data_in_core (vaddr, size) != 0; |
de18c1d8 | 1238 | else |
5b89c67a | 1239 | return false; |
de18c1d8 JM |
1240 | } |
1241 | ||
c906108c SS |
1242 | /* Called by free_all_symtabs */ |
1243 | ||
c5aa993b | 1244 | void |
fba45db2 | 1245 | clear_solib (void) |
c906108c | 1246 | { |
3641da11 | 1247 | const struct target_so_ops *ops = solib_ops (target_gdbarch ()); |
66aba65d | 1248 | |
1736a7bd | 1249 | disable_breakpoints_in_shlibs (); |
085dd6e6 | 1250 | |
a1fd1ac9 | 1251 | while (current_program_space->so_list) |
c906108c | 1252 | { |
a1fd1ac9 | 1253 | struct so_list *so = current_program_space->so_list; |
433759f7 | 1254 | |
a1fd1ac9 | 1255 | current_program_space->so_list = so->next; |
76727919 | 1256 | gdb::observers::solib_unloaded.notify (so); |
2a3f84af | 1257 | current_program_space->remove_target_sections (so); |
07cd4b97 | 1258 | free_so (so); |
c906108c | 1259 | } |
07cd4b97 | 1260 | |
66aba65d | 1261 | ops->clear_solib (); |
c906108c SS |
1262 | } |
1263 | ||
7f86f058 PA |
1264 | /* Shared library startup support. When GDB starts up the inferior, |
1265 | it nurses it along (through the shell) until it is ready to execute | |
1266 | its first instruction. At this point, this function gets | |
1267 | called. */ | |
c5aa993b JM |
1268 | |
1269 | void | |
268a4a75 | 1270 | solib_create_inferior_hook (int from_tty) |
c906108c | 1271 | { |
3641da11 | 1272 | const struct target_so_ops *ops = solib_ops (target_gdbarch ()); |
433759f7 | 1273 | |
268a4a75 | 1274 | ops->solib_create_inferior_hook (from_tty); |
c906108c SS |
1275 | } |
1276 | ||
5b89c67a | 1277 | /* See solib.h. */ |
d7fa2ae2 | 1278 | |
5b89c67a | 1279 | bool |
d7fa2ae2 KB |
1280 | in_solib_dynsym_resolve_code (CORE_ADDR pc) |
1281 | { | |
3641da11 | 1282 | const struct target_so_ops *ops = solib_ops (target_gdbarch ()); |
433759f7 | 1283 | |
5b89c67a | 1284 | return ops->in_dynsym_resolve_code (pc) != 0; |
d7fa2ae2 | 1285 | } |
c906108c | 1286 | |
7f86f058 | 1287 | /* Implements the "sharedlibrary" command. */ |
c906108c SS |
1288 | |
1289 | static void | |
0b39b52e | 1290 | sharedlibrary_command (const char *args, int from_tty) |
c906108c SS |
1291 | { |
1292 | dont_repeat (); | |
e696b3ad | 1293 | solib_add (args, from_tty, 1); |
c906108c SS |
1294 | } |
1295 | ||
7f86f058 | 1296 | /* Implements the command "nosharedlibrary", which discards symbols |
cb0ba49e MS |
1297 | that have been auto-loaded from shared libraries. Symbols from |
1298 | shared libraries that were added by explicit request of the user | |
1299 | are not discarded. Also called from remote.c. */ | |
1300 | ||
c60a7562 | 1301 | void |
0b39b52e | 1302 | no_shared_libraries (const char *ignored, int from_tty) |
c60a7562 | 1303 | { |
a3247a22 PP |
1304 | /* The order of the two routines below is important: clear_solib notifies |
1305 | the solib_unloaded observers, and some of these observers might need | |
1306 | access to their associated objfiles. Therefore, we can not purge the | |
1307 | solibs' objfiles before clear_solib has been called. */ | |
1308 | ||
615b9dba | 1309 | clear_solib (); |
a3247a22 | 1310 | objfile_purge_solibs (); |
c60a7562 | 1311 | } |
c906108c | 1312 | |
f9e14852 GB |
1313 | /* See solib.h. */ |
1314 | ||
1315 | void | |
1316 | update_solib_breakpoints (void) | |
1317 | { | |
1318 | const struct target_so_ops *ops = solib_ops (target_gdbarch ()); | |
1319 | ||
1320 | if (ops->update_breakpoints != NULL) | |
1321 | ops->update_breakpoints (); | |
1322 | } | |
1323 | ||
1324 | /* See solib.h. */ | |
1325 | ||
1326 | void | |
1327 | handle_solib_event (void) | |
1328 | { | |
1329 | const struct target_so_ops *ops = solib_ops (target_gdbarch ()); | |
1330 | ||
1331 | if (ops->handle_event != NULL) | |
1332 | ops->handle_event (); | |
1333 | ||
e39fb971 | 1334 | current_inferior ()->pspace->clear_solib_cache (); |
f9e14852 GB |
1335 | |
1336 | /* Check for any newly added shared libraries if we're supposed to | |
1337 | be adding them automatically. Switch terminal for any messages | |
1338 | produced by breakpoint_re_set. */ | |
223ffa71 | 1339 | target_terminal::ours_for_output (); |
e696b3ad | 1340 | solib_add (NULL, 0, auto_solib_add); |
223ffa71 | 1341 | target_terminal::inferior (); |
f9e14852 GB |
1342 | } |
1343 | ||
a86988f2 PA |
1344 | /* Reload shared libraries, but avoid reloading the same symbol file |
1345 | we already have loaded. */ | |
1346 | ||
1347 | static void | |
1348 | reload_shared_libraries_1 (int from_tty) | |
1349 | { | |
770e7fc7 | 1350 | if (print_symbol_loading_p (from_tty, 0, 0)) |
6cb06a8c | 1351 | gdb_printf (_("Loading symbols for shared libraries.\n")); |
770e7fc7 | 1352 | |
a1fd1ac9 | 1353 | for (struct so_list *so : current_program_space->solibs ()) |
a86988f2 | 1354 | { |
b16c44de | 1355 | const char *found_pathname = NULL; |
5b89c67a | 1356 | bool was_loaded = so->symbols_loaded != 0; |
b15cc25c PA |
1357 | symfile_add_flags add_flags = SYMFILE_DEFER_BP_RESET; |
1358 | ||
1359 | if (from_tty) | |
1360 | add_flags |= SYMFILE_VERBOSE; | |
a86988f2 | 1361 | |
ee0c3293 TT |
1362 | gdb::unique_xmalloc_ptr<char> filename |
1363 | (tilde_expand (so->so_original_name)); | |
1364 | gdb_bfd_ref_ptr abfd (solib_bfd_open (filename.get ())); | |
a86988f2 | 1365 | if (abfd != NULL) |
ee0c3293 | 1366 | found_pathname = bfd_get_filename (abfd.get ()); |
a86988f2 PA |
1367 | |
1368 | /* If this shared library is no longer associated with its previous | |
1369 | symbol file, close that. */ | |
1370 | if ((found_pathname == NULL && was_loaded) | |
1371 | || (found_pathname != NULL | |
0ba1096a | 1372 | && filename_cmp (found_pathname, so->so_name) != 0)) |
a86988f2 | 1373 | { |
59145f8c AR |
1374 | if (so->objfile && ! (so->objfile->flags & OBJF_USERLOADED) |
1375 | && !solib_used (so)) | |
268e4f09 | 1376 | so->objfile->unlink (); |
2a3f84af | 1377 | current_program_space->remove_target_sections (so); |
0892cb63 | 1378 | clear_so (so); |
a86988f2 PA |
1379 | } |
1380 | ||
1381 | /* If this shared library is now associated with a new symbol | |
1382 | file, open it. */ | |
1383 | if (found_pathname != NULL | |
1384 | && (!was_loaded | |
0ba1096a | 1385 | || filename_cmp (found_pathname, so->so_name) != 0)) |
a86988f2 | 1386 | { |
5b89c67a | 1387 | bool got_error = false; |
a86988f2 | 1388 | |
a70b8144 | 1389 | try |
492d29ea PA |
1390 | { |
1391 | solib_map_sections (so); | |
1392 | } | |
1393 | ||
230d2906 | 1394 | catch (const gdb_exception_error &e) |
492d29ea PA |
1395 | { |
1396 | exception_fprintf (gdb_stderr, e, | |
1397 | _("Error while mapping " | |
1398 | "shared library sections:\n")); | |
5b89c67a | 1399 | got_error = true; |
492d29ea | 1400 | } |
a86988f2 | 1401 | |
492d29ea PA |
1402 | if (!got_error |
1403 | && (auto_solib_add || was_loaded || libpthread_solib_p (so))) | |
b15cc25c | 1404 | solib_read_symbols (so, add_flags); |
a86988f2 PA |
1405 | } |
1406 | } | |
a86988f2 PA |
1407 | } |
1408 | ||
cf466558 | 1409 | static void |
eb4c3f4a | 1410 | reload_shared_libraries (const char *ignored, int from_tty, |
f397e303 | 1411 | struct cmd_list_element *e) |
cf466558 | 1412 | { |
3641da11 | 1413 | const struct target_so_ops *ops; |
a86988f2 PA |
1414 | |
1415 | reload_shared_libraries_1 (from_tty); | |
1416 | ||
f5656ead | 1417 | ops = solib_ops (target_gdbarch ()); |
a86988f2 | 1418 | |
c378eb4e | 1419 | /* Creating inferior hooks here has two purposes. First, if we reload |
c8fa6cdd VP |
1420 | shared libraries then the address of solib breakpoint we've computed |
1421 | previously might be no longer valid. For example, if we forgot to set | |
1422 | solib-absolute-prefix and are setting it right now, then the previous | |
1423 | breakpoint address is plain wrong. Second, installing solib hooks | |
1424 | also implicitly figures were ld.so is and loads symbols for it. | |
1425 | Absent this call, if we've just connected to a target and set | |
1426 | solib-absolute-prefix or solib-search-path, we'll lose all information | |
1427 | about ld.so. */ | |
55f6301a | 1428 | if (target_has_execution ()) |
c8fa6cdd | 1429 | { |
a86988f2 PA |
1430 | /* Reset or free private data structures not associated with |
1431 | so_list entries. */ | |
1432 | ops->clear_solib (); | |
1433 | ||
1434 | /* Remove any previous solib event breakpoint. This is usually | |
1435 | done in common code, at breakpoint_init_inferior time, but | |
1436 | we're not really starting up the inferior here. */ | |
1437 | remove_solib_event_breakpoints (); | |
1438 | ||
268a4a75 | 1439 | solib_create_inferior_hook (from_tty); |
c8fa6cdd | 1440 | } |
268a4a75 JK |
1441 | |
1442 | /* Sometimes the platform-specific hook loads initial shared | |
1443 | libraries, and sometimes it doesn't. If it doesn't FROM_TTY will be | |
1444 | incorrectly 0 but such solib targets should be fixed anyway. If we | |
1445 | made all the inferior hook methods consistent, this call could be | |
1446 | removed. Call it only after the solib target has been initialized by | |
1447 | solib_create_inferior_hook. */ | |
1448 | ||
e696b3ad | 1449 | solib_add (NULL, 0, auto_solib_add); |
268a4a75 | 1450 | |
a86988f2 PA |
1451 | breakpoint_re_set (); |
1452 | ||
1453 | /* We may have loaded or unloaded debug info for some (or all) | |
1454 | shared libraries. However, frames may still reference them. For | |
1455 | example, a frame's unwinder might still point at DWARF FDE | |
1456 | structures that are now freed. Also, getting new symbols may | |
1457 | change our opinion about what is frameless. */ | |
c8fa6cdd | 1458 | reinit_frame_cache (); |
cf466558 KB |
1459 | } |
1460 | ||
2938e6cf GB |
1461 | /* Wrapper for reload_shared_libraries that replaces "remote:" |
1462 | at the start of gdb_sysroot with "target:". */ | |
1463 | ||
1464 | static void | |
eb4c3f4a | 1465 | gdb_sysroot_changed (const char *ignored, int from_tty, |
2938e6cf GB |
1466 | struct cmd_list_element *e) |
1467 | { | |
1468 | const char *old_prefix = "remote:"; | |
1469 | const char *new_prefix = TARGET_SYSROOT_PREFIX; | |
1470 | ||
e0700ba4 | 1471 | if (startswith (gdb_sysroot.c_str (), old_prefix)) |
2938e6cf | 1472 | { |
5b89c67a | 1473 | static bool warning_issued = false; |
2938e6cf GB |
1474 | |
1475 | gdb_assert (strlen (old_prefix) == strlen (new_prefix)); | |
e0700ba4 | 1476 | gdb_sysroot = new_prefix + gdb_sysroot.substr (strlen (old_prefix)); |
2938e6cf GB |
1477 | |
1478 | if (!warning_issued) | |
1479 | { | |
1480 | warning (_("\"%s\" is deprecated, use \"%s\" instead."), | |
1481 | old_prefix, new_prefix); | |
e0700ba4 | 1482 | warning (_("sysroot set to \"%s\"."), gdb_sysroot.c_str ()); |
2938e6cf | 1483 | |
5b89c67a | 1484 | warning_issued = true; |
2938e6cf GB |
1485 | } |
1486 | } | |
1487 | ||
1488 | reload_shared_libraries (ignored, from_tty, e); | |
1489 | } | |
1490 | ||
920d2a44 AC |
1491 | static void |
1492 | show_auto_solib_add (struct ui_file *file, int from_tty, | |
1493 | struct cmd_list_element *c, const char *value) | |
1494 | { | |
6cb06a8c TT |
1495 | gdb_printf (file, _("Autoloading of shared library symbols is %s.\n"), |
1496 | value); | |
920d2a44 AC |
1497 | } |
1498 | ||
1499 | ||
cb457ae2 YQ |
1500 | /* Lookup the value for a specific symbol from dynamic symbol table. Look |
1501 | up symbol from ABFD. MATCH_SYM is a callback function to determine | |
1502 | whether to pick up a symbol. DATA is the input of this callback | |
1503 | function. Return NULL if symbol is not found. */ | |
1504 | ||
1505 | CORE_ADDR | |
1506 | gdb_bfd_lookup_symbol_from_symtab (bfd *abfd, | |
3953f15c SM |
1507 | int (*match_sym) (const asymbol *, |
1508 | const void *), | |
1509 | const void *data) | |
cb457ae2 YQ |
1510 | { |
1511 | long storage_needed = bfd_get_symtab_upper_bound (abfd); | |
1512 | CORE_ADDR symaddr = 0; | |
1513 | ||
1514 | if (storage_needed > 0) | |
1515 | { | |
1516 | unsigned int i; | |
1517 | ||
1cb1f3da TT |
1518 | gdb::def_vector<asymbol *> storage (storage_needed / sizeof (asymbol *)); |
1519 | asymbol **symbol_table = storage.data (); | |
cb457ae2 YQ |
1520 | unsigned int number_of_symbols = |
1521 | bfd_canonicalize_symtab (abfd, symbol_table); | |
1522 | ||
1523 | for (i = 0; i < number_of_symbols; i++) | |
1524 | { | |
1525 | asymbol *sym = *symbol_table++; | |
1526 | ||
1527 | if (match_sym (sym, data)) | |
1528 | { | |
3e29f34a MR |
1529 | struct gdbarch *gdbarch = target_gdbarch (); |
1530 | symaddr = sym->value; | |
1531 | ||
1532 | /* Some ELF targets fiddle with addresses of symbols they | |
dda83cd7 SM |
1533 | consider special. They use minimal symbols to do that |
1534 | and this is needed for correct breakpoint placement, | |
1535 | but we do not have full data here to build a complete | |
1536 | minimal symbol, so just set the address and let the | |
1537 | targets cope with that. */ | |
3e29f34a MR |
1538 | if (bfd_get_flavour (abfd) == bfd_target_elf_flavour |
1539 | && gdbarch_elf_make_msymbol_special_p (gdbarch)) | |
1540 | { | |
eefba3da | 1541 | struct minimal_symbol msym {}; |
3e29f34a | 1542 | |
4aeddc50 | 1543 | msym.set_value_address (symaddr); |
3e29f34a | 1544 | gdbarch_elf_make_msymbol_special (gdbarch, sym, &msym); |
4aeddc50 | 1545 | symaddr = msym.value_raw_address (); |
3e29f34a MR |
1546 | } |
1547 | ||
cb457ae2 | 1548 | /* BFD symbols are section relative. */ |
3e29f34a | 1549 | symaddr += sym->section->vma; |
cb457ae2 YQ |
1550 | break; |
1551 | } | |
1552 | } | |
cb457ae2 YQ |
1553 | } |
1554 | ||
1555 | return symaddr; | |
1556 | } | |
1557 | ||
8ddf4645 AM |
1558 | /* See solib.h. */ |
1559 | ||
1560 | int | |
1561 | gdb_bfd_scan_elf_dyntag (const int desired_dyntag, bfd *abfd, CORE_ADDR *ptr, | |
1562 | CORE_ADDR *ptr_addr) | |
1563 | { | |
1564 | int arch_size, step, sect_size; | |
1565 | long current_dyntag; | |
1566 | CORE_ADDR dyn_ptr, dyn_addr; | |
1567 | gdb_byte *bufend, *bufstart, *buf; | |
1568 | Elf32_External_Dyn *x_dynp_32; | |
1569 | Elf64_External_Dyn *x_dynp_64; | |
1570 | struct bfd_section *sect; | |
1571 | ||
1572 | if (abfd == NULL) | |
1573 | return 0; | |
1574 | ||
1575 | if (bfd_get_flavour (abfd) != bfd_target_elf_flavour) | |
1576 | return 0; | |
1577 | ||
1578 | arch_size = bfd_get_arch_size (abfd); | |
1579 | if (arch_size == -1) | |
1580 | return 0; | |
1581 | ||
1582 | /* Find the start address of the .dynamic section. */ | |
1583 | sect = bfd_get_section_by_name (abfd, ".dynamic"); | |
1584 | if (sect == NULL) | |
1585 | return 0; | |
1586 | ||
1587 | bool found = false; | |
1588 | for (const target_section &target_section | |
1589 | : current_program_space->target_sections ()) | |
1590 | if (sect == target_section.the_bfd_section) | |
1591 | { | |
1592 | dyn_addr = target_section.addr; | |
1593 | found = true; | |
1594 | break; | |
1595 | } | |
1596 | if (!found) | |
1597 | { | |
1598 | /* ABFD may come from OBJFILE acting only as a symbol file without being | |
1599 | loaded into the target (see add_symbol_file_command). This case is | |
1600 | such fallback to the file VMA address without the possibility of | |
1601 | having the section relocated to its actual in-memory address. */ | |
1602 | ||
1603 | dyn_addr = bfd_section_vma (sect); | |
1604 | } | |
1605 | ||
1606 | /* Read in .dynamic from the BFD. We will get the actual value | |
1607 | from memory later. */ | |
1608 | sect_size = bfd_section_size (sect); | |
1609 | buf = bufstart = (gdb_byte *) alloca (sect_size); | |
1610 | if (!bfd_get_section_contents (abfd, sect, | |
1611 | buf, 0, sect_size)) | |
1612 | return 0; | |
1613 | ||
1614 | /* Iterate over BUF and scan for DYNTAG. If found, set PTR and return. */ | |
1615 | step = (arch_size == 32) ? sizeof (Elf32_External_Dyn) | |
1616 | : sizeof (Elf64_External_Dyn); | |
1617 | for (bufend = buf + sect_size; | |
1618 | buf < bufend; | |
1619 | buf += step) | |
1620 | { | |
1621 | if (arch_size == 32) | |
1622 | { | |
1623 | x_dynp_32 = (Elf32_External_Dyn *) buf; | |
1624 | current_dyntag = bfd_h_get_32 (abfd, (bfd_byte *) x_dynp_32->d_tag); | |
1625 | dyn_ptr = bfd_h_get_32 (abfd, (bfd_byte *) x_dynp_32->d_un.d_ptr); | |
1626 | } | |
1627 | else | |
1628 | { | |
1629 | x_dynp_64 = (Elf64_External_Dyn *) buf; | |
1630 | current_dyntag = bfd_h_get_64 (abfd, (bfd_byte *) x_dynp_64->d_tag); | |
1631 | dyn_ptr = bfd_h_get_64 (abfd, (bfd_byte *) x_dynp_64->d_un.d_ptr); | |
1632 | } | |
1633 | if (current_dyntag == DT_NULL) | |
1634 | return 0; | |
1635 | if (current_dyntag == desired_dyntag) | |
1636 | { | |
1637 | /* If requested, try to read the runtime value of this .dynamic | |
1638 | entry. */ | |
1639 | if (ptr) | |
1640 | { | |
1641 | struct type *ptr_type; | |
1642 | gdb_byte ptr_buf[8]; | |
1643 | CORE_ADDR ptr_addr_1; | |
1644 | ||
1645 | ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr; | |
1646 | ptr_addr_1 = dyn_addr + (buf - bufstart) + arch_size / 8; | |
1647 | if (target_read_memory (ptr_addr_1, ptr_buf, arch_size / 8) == 0) | |
1648 | dyn_ptr = extract_typed_address (ptr_buf, ptr_type); | |
1649 | *ptr = dyn_ptr; | |
1650 | if (ptr_addr) | |
1651 | *ptr_addr = dyn_addr + (buf - bufstart); | |
1652 | } | |
1653 | return 1; | |
1654 | } | |
1655 | } | |
1656 | ||
1657 | return 0; | |
1658 | } | |
1659 | ||
39f53acb AM |
1660 | /* See solib.h. */ |
1661 | ||
1662 | gdb::unique_xmalloc_ptr<char> | |
1663 | gdb_bfd_read_elf_soname (const char *filename) | |
1664 | { | |
1665 | gdb_bfd_ref_ptr abfd = gdb_bfd_open (filename, gnutarget); | |
1666 | ||
1667 | if (abfd == nullptr) | |
1668 | return {}; | |
1669 | ||
1670 | /* Check that ABFD is an ET_DYN ELF file. */ | |
1671 | if (!bfd_check_format (abfd.get (), bfd_object) | |
1672 | || !(bfd_get_file_flags (abfd.get ()) & DYNAMIC)) | |
1673 | return {}; | |
1674 | ||
1675 | CORE_ADDR idx; | |
1676 | if (!gdb_bfd_scan_elf_dyntag (DT_SONAME, abfd.get (), &idx, nullptr)) | |
1677 | return {}; | |
1678 | ||
1679 | struct bfd_section *dynstr = bfd_get_section_by_name (abfd.get (), ".dynstr"); | |
1680 | int sect_size = bfd_section_size (dynstr); | |
1681 | if (dynstr == nullptr || sect_size <= idx) | |
1682 | return {}; | |
1683 | ||
1684 | /* Read soname from the string table. */ | |
1685 | gdb::byte_vector dynstr_buf; | |
1686 | if (!gdb_bfd_get_full_section_contents (abfd.get (), dynstr, &dynstr_buf)) | |
1687 | return {}; | |
1688 | ||
1689 | /* Ensure soname is null-terminated before returning a copy. */ | |
1690 | char *soname = (char *) dynstr_buf.data () + idx; | |
1691 | if (strnlen (soname, sect_size - idx) == sect_size - idx) | |
1692 | return {}; | |
1693 | ||
1694 | return make_unique_xstrdup (soname); | |
1695 | } | |
1696 | ||
cb457ae2 YQ |
1697 | /* Lookup the value for a specific symbol from symbol table. Look up symbol |
1698 | from ABFD. MATCH_SYM is a callback function to determine whether to pick | |
1699 | up a symbol. DATA is the input of this callback function. Return NULL | |
1700 | if symbol is not found. */ | |
1701 | ||
1702 | static CORE_ADDR | |
1703 | bfd_lookup_symbol_from_dyn_symtab (bfd *abfd, | |
3953f15c SM |
1704 | int (*match_sym) (const asymbol *, |
1705 | const void *), | |
1706 | const void *data) | |
cb457ae2 YQ |
1707 | { |
1708 | long storage_needed = bfd_get_dynamic_symtab_upper_bound (abfd); | |
1709 | CORE_ADDR symaddr = 0; | |
1710 | ||
1711 | if (storage_needed > 0) | |
1712 | { | |
1713 | unsigned int i; | |
1cb1f3da TT |
1714 | gdb::def_vector<asymbol *> storage (storage_needed / sizeof (asymbol *)); |
1715 | asymbol **symbol_table = storage.data (); | |
cb457ae2 YQ |
1716 | unsigned int number_of_symbols = |
1717 | bfd_canonicalize_dynamic_symtab (abfd, symbol_table); | |
1718 | ||
1719 | for (i = 0; i < number_of_symbols; i++) | |
1720 | { | |
1721 | asymbol *sym = *symbol_table++; | |
1722 | ||
1723 | if (match_sym (sym, data)) | |
1724 | { | |
1725 | /* BFD symbols are section relative. */ | |
1726 | symaddr = sym->value + sym->section->vma; | |
1727 | break; | |
1728 | } | |
1729 | } | |
cb457ae2 YQ |
1730 | } |
1731 | return symaddr; | |
1732 | } | |
1733 | ||
1734 | /* Lookup the value for a specific symbol from symbol table and dynamic | |
1735 | symbol table. Look up symbol from ABFD. MATCH_SYM is a callback | |
1736 | function to determine whether to pick up a symbol. DATA is the | |
1737 | input of this callback function. Return NULL if symbol is not | |
1738 | found. */ | |
1739 | ||
1740 | CORE_ADDR | |
1741 | gdb_bfd_lookup_symbol (bfd *abfd, | |
3953f15c SM |
1742 | int (*match_sym) (const asymbol *, const void *), |
1743 | const void *data) | |
cb457ae2 YQ |
1744 | { |
1745 | CORE_ADDR symaddr = gdb_bfd_lookup_symbol_from_symtab (abfd, match_sym, data); | |
1746 | ||
1747 | /* On FreeBSD, the dynamic linker is stripped by default. So we'll | |
1748 | have to check the dynamic string table too. */ | |
1749 | if (symaddr == 0) | |
1750 | symaddr = bfd_lookup_symbol_from_dyn_symtab (abfd, match_sym, data); | |
1751 | ||
1752 | return symaddr; | |
1753 | } | |
3a40aaa0 | 1754 | |
a1fd1ac9 TT |
1755 | /* The shared library list may contain user-loaded object files that |
1756 | can be removed out-of-band by the user. So upon notification of | |
1757 | free_objfile remove all references to any user-loaded file that is | |
1758 | about to be freed. */ | |
63644780 NB |
1759 | |
1760 | static void | |
1761 | remove_user_added_objfile (struct objfile *objfile) | |
1762 | { | |
63644780 NB |
1763 | if (objfile != 0 && objfile->flags & OBJF_USERLOADED) |
1764 | { | |
a1fd1ac9 | 1765 | for (struct so_list *so : current_program_space->solibs ()) |
63644780 NB |
1766 | if (so->objfile == objfile) |
1767 | so->objfile = NULL; | |
1768 | } | |
1769 | } | |
1770 | ||
6c265988 | 1771 | void _initialize_solib (); |
c906108c | 1772 | void |
6c265988 | 1773 | _initialize_solib () |
c906108c | 1774 | { |
c90e7d63 SM |
1775 | gdb::observers::free_objfile.attach (remove_user_added_objfile, |
1776 | "solib"); | |
42a4fec5 SM |
1777 | gdb::observers::inferior_execd.attach ([] (inferior *inf) |
1778 | { | |
1779 | solib_create_inferior_hook (0); | |
c90e7d63 | 1780 | }, "solib"); |
63644780 | 1781 | |
c906108c | 1782 | add_com ("sharedlibrary", class_files, sharedlibrary_command, |
1bedd215 | 1783 | _("Load shared object library symbols for files matching REGEXP.")); |
e0f25bd9 SM |
1784 | cmd_list_element *info_sharedlibrary_cmd |
1785 | = add_info ("sharedlibrary", info_sharedlibrary_command, | |
1786 | _("Status of loaded shared object libraries.")); | |
1787 | add_info_alias ("dll", info_sharedlibrary_cmd, 1); | |
c60a7562 | 1788 | add_com ("nosharedlibrary", class_files, no_shared_libraries, |
1bedd215 | 1789 | _("Unload all shared object library symbols.")); |
c906108c | 1790 | |
5bf193a2 AC |
1791 | add_setshow_boolean_cmd ("auto-solib-add", class_support, |
1792 | &auto_solib_add, _("\ | |
1793 | Set autoloading of shared library symbols."), _("\ | |
1794 | Show autoloading of shared library symbols."), _("\ | |
b7209cb4 FF |
1795 | If \"on\", symbols from all shared object libraries will be loaded\n\ |
1796 | automatically when the inferior begins execution, when the dynamic linker\n\ | |
1797 | informs gdb that a new library has been loaded, or when attaching to the\n\ | |
3e43a32a MS |
1798 | inferior. Otherwise, symbols must be loaded manually, using \ |
1799 | `sharedlibrary'."), | |
5bf193a2 | 1800 | NULL, |
920d2a44 | 1801 | show_auto_solib_add, |
5bf193a2 | 1802 | &setlist, &showlist); |
c906108c | 1803 | |
5e84b7ee SM |
1804 | set_show_commands sysroot_cmds |
1805 | = add_setshow_optional_filename_cmd ("sysroot", class_support, | |
1806 | &gdb_sysroot, _("\ | |
f822c95b DJ |
1807 | Set an alternate system root."), _("\ |
1808 | Show the current system root."), _("\ | |
1809 | The system root is used to load absolute shared library symbol files.\n\ | |
1810 | For other (relative) files, you can add directories using\n\ | |
1811 | `set solib-search-path'."), | |
5e84b7ee SM |
1812 | gdb_sysroot_changed, |
1813 | NULL, | |
1814 | &setlist, &showlist); | |
c906108c | 1815 | |
5e84b7ee | 1816 | add_alias_cmd ("solib-absolute-prefix", sysroot_cmds.set, class_support, 0, |
f822c95b | 1817 | &setlist); |
5e84b7ee | 1818 | add_alias_cmd ("solib-absolute-prefix", sysroot_cmds.show, class_support, 0, |
f822c95b | 1819 | &showlist); |
030292b7 | 1820 | |
525226b5 AC |
1821 | add_setshow_optional_filename_cmd ("solib-search-path", class_support, |
1822 | &solib_search_path, _("\ | |
3e43a32a MS |
1823 | Set the search path for loading non-absolute shared library symbol files."), |
1824 | _("\ | |
1825 | Show the search path for loading non-absolute shared library symbol files."), | |
1826 | _("\ | |
1827 | This takes precedence over the environment variables \ | |
1828 | PATH and LD_LIBRARY_PATH."), | |
525226b5 | 1829 | reload_shared_libraries, |
920d2a44 | 1830 | show_solib_search_path, |
525226b5 | 1831 | &setlist, &showlist); |
c906108c | 1832 | } |