1 /* Native support for the SGI Iris running IRIX version 5, for GDB.
2 Copyright 1988, 1989, 1990, 1991, 1992, 1993, 1994
3 Free Software Foundation, Inc.
6 Implemented for Irix 4.x by Garrett A. Wollman.
7 Modified for Irix 5.x by Ian Lance Taylor.
9 This file is part of GDB.
11 This program is free software; you can redistribute it and/or modify
12 it under the terms of the GNU General Public License as published by
13 the Free Software Foundation; either version 2 of the License, or
14 (at your option) any later version.
16 This program is distributed in the hope that it will be useful,
17 but WITHOUT ANY WARRANTY; without even the implied warranty of
18 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 GNU General Public License for more details.
21 You should have received a copy of the GNU General Public License
22 along with this program; if not, write to the Free Software
23 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */
31 #include <sys/procfs.h>
32 #include <setjmp.h> /* For JB_XXX. */
34 /* Size of elements in jmpbuf */
36 #define JB_ELEMENT_SIZE 4
39 * See the comment in m68k-tdep.c regarding the utility of these functions.
41 * These definitions are from the MIPS SVR4 ABI, so they may work for
42 * any MIPS SVR4 target.
46 supply_gregset (gregsetp)
50 register greg_t *regp = &(*gregsetp)[0];
52 for(regi = 0; regi <= CTX_RA; regi++)
53 supply_register (regi, (char *)(regp + regi));
55 supply_register (PC_REGNUM, (char *)(regp + CTX_EPC));
56 supply_register (HI_REGNUM, (char *)(regp + CTX_MDHI));
57 supply_register (LO_REGNUM, (char *)(regp + CTX_MDLO));
58 supply_register (CAUSE_REGNUM, (char *)(regp + CTX_CAUSE));
62 fill_gregset (gregsetp, regno)
67 register greg_t *regp = &(*gregsetp)[0];
69 for (regi = 0; regi <= CTX_RA; regi++)
70 if ((regno == -1) || (regno == regi))
71 *(regp + regi) = *(greg_t *) ®isters[REGISTER_BYTE (regi)];
73 if ((regno == -1) || (regno == PC_REGNUM))
74 *(regp + CTX_EPC) = *(greg_t *) ®isters[REGISTER_BYTE (PC_REGNUM)];
76 if ((regno == -1) || (regno == CAUSE_REGNUM))
77 *(regp + CTX_CAUSE) = *(greg_t *) ®isters[REGISTER_BYTE (PS_REGNUM)];
79 if ((regno == -1) || (regno == HI_REGNUM))
80 *(regp + CTX_MDHI) = *(greg_t *) ®isters[REGISTER_BYTE (HI_REGNUM)];
82 if ((regno == -1) || (regno == LO_REGNUM))
83 *(regp + CTX_MDLO) = *(greg_t *) ®isters[REGISTER_BYTE (LO_REGNUM)];
87 * Now we do the same thing for floating-point registers.
88 * We don't bother to condition on FP0_REGNUM since any
89 * reasonable MIPS configuration has an R3010 in it.
91 * Again, see the comments in m68k-tdep.c.
95 supply_fpregset (fpregsetp)
96 fpregset_t *fpregsetp;
100 for (regi = 0; regi < 32; regi++)
101 supply_register (FP0_REGNUM + regi,
102 (char *)&fpregsetp->fp_r.fp_regs[regi]);
104 supply_register (FCRCS_REGNUM, (char *)&fpregsetp->fp_csr);
106 /* FIXME: how can we supply FCRIR_REGNUM? SGI doesn't tell us. */
110 fill_fpregset (fpregsetp, regno)
111 fpregset_t *fpregsetp;
117 for (regi = FP0_REGNUM; regi < FP0_REGNUM + 32; regi++)
119 if ((regno == -1) || (regno == regi))
121 from = (char *) ®isters[REGISTER_BYTE (regi)];
122 to = (char *) &(fpregsetp->fp_r.fp_regs[regi - FP0_REGNUM]);
123 memcpy(to, from, REGISTER_RAW_SIZE (regi));
127 if ((regno == -1) || (regno == FCRCS_REGNUM))
128 fpregsetp->fp_csr = *(unsigned *) ®isters[REGISTER_BYTE(FCRCS_REGNUM)];
132 /* Figure out where the longjmp will land.
133 We expect the first arg to be a pointer to the jmp_buf structure from which
134 we extract the pc (JB_PC) that we will land at. The pc is copied into PC.
135 This routine returns true on success. */
138 get_longjmp_target (pc)
141 char buf[TARGET_PTR_BIT / TARGET_CHAR_BIT];
144 jb_addr = read_register (A0_REGNUM);
146 if (target_read_memory (jb_addr + JB_PC * JB_ELEMENT_SIZE, buf,
147 TARGET_PTR_BIT / TARGET_CHAR_BIT))
150 *pc = extract_address (buf, TARGET_PTR_BIT / TARGET_CHAR_BIT);
156 fetch_core_registers (core_reg_sect, core_reg_size, which, reg_addr)
158 unsigned core_reg_size;
159 int which; /* Unused */
160 unsigned int reg_addr; /* Unused */
162 if (core_reg_size != REGISTER_BYTES)
164 warning ("wrong size gregset struct in core file");
168 memcpy ((char *)registers, core_reg_sect, core_reg_size);
171 /* Irix 5 uses what appears to be a unique form of shared library
172 support. This is a copy of solib.c modified for Irix 5. */
174 #include <sys/types.h>
177 #include <sys/param.h>
180 /* <obj.h> includes <sym.h> and <symconst.h>, which causes conflicts
181 with our versions of those files included by tm-mips.h. Prevent
182 <obj.h> from including them with some appropriate defines. */
184 #define __SYMCONST_H__
190 #include "objfiles.h"
194 #include "inferior.h"
195 #include "language.h"
197 /* We need to set a breakpoint at a point when we know that the
198 mapping of shared libraries is complete. dbx simply breaks at main
199 (or, for FORTRAN, MAIN__), so we do the same. We can not break at
200 the very beginning of main, because the startup code will jump into
201 main after the GP initialization instructions. SOLIB_BKPT_OFFSET
202 is used to skip those instructions. */
204 #define SOLIB_BKPT_OFFSET 12
206 static char *bkpt_names[] = {
212 /* The symbol which starts off the list of shared libraries. */
213 #define DEBUG_BASE "__rld_obj_head"
215 /* How to get the loaded address of a shared library. */
216 #define LM_ADDR(so) ((so)->lm.o_praw)
218 char shadow_contents[BREAKPOINT_MAX]; /* Stash old bkpt addr contents */
220 extern CORE_ADDR sigtramp_address, sigtramp_end;
223 struct so_list *next; /* next structure in linked list */
225 struct obj lm; /* copy of link map from inferior */
226 struct obj_list *lladdr; /* addr in inferior lm was read from */
227 CORE_ADDR lmend; /* upper addr bound of mapped object */
228 char symbols_loaded; /* flag: symbols read in yet? */
229 char from_tty; /* flag: print msgs? */
230 struct objfile *objfile; /* objfile for loaded lib */
231 struct section_table *sections;
232 struct section_table *sections_end;
233 struct section_table *textsection;
237 static struct so_list *so_list_head; /* List of known shared objects */
238 static CORE_ADDR debug_base; /* Base of dynamic linker structures */
239 static CORE_ADDR breakpoint_addr; /* Address where end bkpt is set */
241 /* Local function prototypes */
244 sharedlibrary_command PARAMS ((char *, int));
247 enable_break PARAMS ((void));
250 disable_break PARAMS ((void));
253 info_sharedlibrary_command PARAMS ((char *, int));
256 symbol_add_stub PARAMS ((char *));
258 static struct so_list *
259 find_solib PARAMS ((struct so_list *));
261 static struct obj_list *
262 first_link_map_member PARAMS ((void));
265 locate_base PARAMS ((void));
268 solib_map_sections PARAMS ((struct so_list *));
274 solib_map_sections -- open bfd and build sections for shared lib
278 static void solib_map_sections (struct so_list *so)
282 Given a pointer to one of the shared objects in our list
283 of mapped objects, use the recorded name to open a bfd
284 descriptor for the object, build a section table, and then
285 relocate all the section addresses by the base address at
286 which the shared object was mapped.
290 In most (all?) cases the shared object file name recorded in the
291 dynamic linkage tables will be a fully qualified pathname. For
292 cases where it isn't, do we really mimic the systems search
293 mechanism correctly in the below code (particularly the tilde
298 solib_map_sections (so)
302 char *scratch_pathname;
304 struct section_table *p;
305 struct cleanup *old_chain;
309 filename = tilde_expand (so -> lm.o_path);
310 old_chain = make_cleanup (free, filename);
312 scratch_chan = openp (getenv ("PATH"), 1, filename, O_RDONLY, 0,
314 if (scratch_chan < 0)
316 scratch_chan = openp (getenv ("LD_LIBRARY_PATH"), 1, filename,
317 O_RDONLY, 0, &scratch_pathname);
319 if (scratch_chan < 0)
321 perror_with_name (filename);
323 /* Leave scratch_pathname allocated. abfd->name will point to it. */
325 abfd = bfd_fdopenr (scratch_pathname, gnutarget, scratch_chan);
328 close (scratch_chan);
329 error ("Could not open `%s' as an executable file: %s",
330 scratch_pathname, bfd_errmsg (bfd_get_error ()));
332 /* Leave bfd open, core_xfer_memory and "info files" need it. */
334 abfd -> cacheable = true;
336 if (!bfd_check_format (abfd, bfd_object))
338 error ("\"%s\": not in executable format: %s.",
339 scratch_pathname, bfd_errmsg (bfd_get_error ()));
341 if (build_section_table (abfd, &so -> sections, &so -> sections_end))
343 error ("Can't find the file sections in `%s': %s",
344 bfd_get_filename (exec_bfd), bfd_errmsg (bfd_get_error ()));
347 /* Irix 5 shared objects are pre-linked to particular addresses
348 although the dynamic linker may have to relocate them if the
349 address ranges of the libraries used by the main program clash.
350 The offset is the difference between the address where the object
351 is mapped and the binding address of the shared library. */
352 offset = (CORE_ADDR) LM_ADDR (so) - so -> lm.o_base_address;
354 for (p = so -> sections; p < so -> sections_end; p++)
356 /* Relocate the section binding addresses as recorded in the shared
357 object's file by the offset to get the address to which the
358 object was actually mapped. */
360 p -> endaddr += offset;
361 so -> lmend = (CORE_ADDR) max (p -> endaddr, so -> lmend);
362 if (STREQ (p -> the_bfd_section -> name, ".text"))
364 so -> textsection = p;
368 /* Free the file names, close the file now. */
369 do_cleanups (old_chain);
376 locate_base -- locate the base address of dynamic linker structs
380 CORE_ADDR locate_base (void)
384 For both the SunOS and SVR4 shared library implementations, if the
385 inferior executable has been linked dynamically, there is a single
386 address somewhere in the inferior's data space which is the key to
387 locating all of the dynamic linker's runtime structures. This
388 address is the value of the symbol defined by the macro DEBUG_BASE.
389 The job of this function is to find and return that address, or to
390 return 0 if there is no such address (the executable is statically
393 For SunOS, the job is almost trivial, since the dynamic linker and
394 all of it's structures are statically linked to the executable at
395 link time. Thus the symbol for the address we are looking for has
396 already been added to the minimal symbol table for the executable's
397 objfile at the time the symbol file's symbols were read, and all we
398 have to do is look it up there. Note that we explicitly do NOT want
399 to find the copies in the shared library.
401 The SVR4 version is much more complicated because the dynamic linker
402 and it's structures are located in the shared C library, which gets
403 run as the executable's "interpreter" by the kernel. We have to go
404 to a lot more work to discover the address of DEBUG_BASE. Because
405 of this complexity, we cache the value we find and return that value
406 on subsequent invocations. Note there is no copy in the executable
409 Irix 5 is basically like SunOS.
411 Note that we can assume nothing about the process state at the time
412 we need to find this address. We may be stopped on the first instruc-
413 tion of the interpreter (C shared library), the first instruction of
414 the executable itself, or somewhere else entirely (if we attached
415 to the process for example).
422 struct minimal_symbol *msymbol;
423 CORE_ADDR address = 0;
425 msymbol = lookup_minimal_symbol (DEBUG_BASE, symfile_objfile);
426 if ((msymbol != NULL) && (SYMBOL_VALUE_ADDRESS (msymbol) != 0))
428 address = SYMBOL_VALUE_ADDRESS (msymbol);
437 first_link_map_member -- locate first member in dynamic linker's map
441 static struct link_map *first_link_map_member (void)
445 Read in a copy of the first member in the inferior's dynamic
446 link map from the inferior's dynamic linker structures, and return
447 a pointer to the copy in our address space.
450 static struct obj_list *
451 first_link_map_member ()
456 read_memory (debug_base, (char *) &lm, sizeof (struct obj_list *));
461 /* The first entry in the list is the object file we are debugging,
463 read_memory ((CORE_ADDR) lm, (char *) &s, sizeof (struct obj_list));
472 find_solib -- step through list of shared objects
476 struct so_list *find_solib (struct so_list *so_list_ptr)
480 This module contains the routine which finds the names of any
481 loaded "images" in the current process. The argument in must be
482 NULL on the first call, and then the returned value must be passed
483 in on subsequent calls. This provides the capability to "step" down
484 the list of loaded objects. On the last object, a NULL value is
488 static struct so_list *
489 find_solib (so_list_ptr)
490 struct so_list *so_list_ptr; /* Last lm or NULL for first one */
492 struct so_list *so_list_next = NULL;
493 struct obj_list *lm = NULL;
496 if (so_list_ptr == NULL)
498 /* We are setting up for a new scan through the loaded images. */
499 if ((so_list_next = so_list_head) == NULL)
501 /* We have not already read in the dynamic linking structures
502 from the inferior, lookup the address of the base structure. */
503 debug_base = locate_base ();
506 /* Read the base structure in and find the address of the first
507 link map list member. */
508 lm = first_link_map_member ();
514 /* We have been called before, and are in the process of walking
515 the shared library list. Advance to the next shared object. */
516 if ((lm = so_list_ptr->ll.next) == NULL)
518 /* We have hit the end of the list, so check to see if any were
519 added, but be quiet if we can't read from the target any more. */
520 int status = target_read_memory ((CORE_ADDR) so_list_ptr -> lladdr,
521 (char *) &(so_list_ptr -> ll),
522 sizeof (struct obj_list));
525 lm = so_list_ptr->ll.next;
532 so_list_next = so_list_ptr -> next;
534 if ((so_list_next == NULL) && (lm != NULL))
539 /* Get next link map structure from inferior image and build a local
540 abbreviated load_map structure */
541 new = (struct so_list *) xmalloc (sizeof (struct so_list));
542 memset ((char *) new, 0, sizeof (struct so_list));
544 /* Add the new node as the next node in the list, or as the root
545 node if this is the first one. */
546 if (so_list_ptr != NULL)
548 so_list_ptr -> next = new;
555 read_memory ((CORE_ADDR) lm, (char *) &(new -> ll),
556 sizeof (struct obj_list));
557 read_memory ((CORE_ADDR) new->ll.data, (char *) &(new -> lm),
558 sizeof (struct obj));
559 target_read_string ((CORE_ADDR)new->lm.o_path, &buffer,
562 memory_error (errcode, (CORE_ADDR)new->lm.o_path);
563 new->lm.o_path = buffer;
564 solib_map_sections (new);
566 return (so_list_next);
569 /* A small stub to get us past the arg-passing pinhole of catch_errors. */
572 symbol_add_stub (arg)
575 register struct so_list *so = (struct so_list *) arg; /* catch_errs bogon */
577 so -> objfile = symbol_file_add (so -> lm.o_path, so -> from_tty,
578 (unsigned int) so -> textsection -> addr,
587 solib_add -- add a shared library file to the symtab and section list
591 void solib_add (char *arg_string, int from_tty,
592 struct target_ops *target)
599 solib_add (arg_string, from_tty, target)
602 struct target_ops *target;
604 register struct so_list *so = NULL; /* link map state variable */
606 /* Last shared library that we read. */
607 struct so_list *so_last = NULL;
613 if ((re_err = re_comp (arg_string ? arg_string : ".")) != NULL)
615 error ("Invalid regexp: %s", re_err);
618 /* Getting new symbols may change our opinion about what is
620 reinit_frame_cache ();
621 /* Not to mention where _sigtramp is. */
622 sigtramp_address = 0;
624 while ((so = find_solib (so)) != NULL)
626 if (so -> lm.o_path[0] && re_exec (so -> lm.o_path))
628 so -> from_tty = from_tty;
629 if (so -> symbols_loaded)
633 printf_unfiltered ("Symbols already loaded for %s\n", so -> lm.o_path);
636 else if (catch_errors
637 (symbol_add_stub, (char *) so,
638 "Error while reading shared library symbols:\n",
642 so -> symbols_loaded = 1;
647 /* Now add the shared library sections to the section table of the
648 specified target, if any. */
651 /* Count how many new section_table entries there are. */
654 while ((so = find_solib (so)) != NULL)
656 if (so -> lm.o_path[0])
658 count += so -> sections_end - so -> sections;
664 /* Reallocate the target's section table including the new size. */
665 if (target -> to_sections)
667 old = target -> to_sections_end - target -> to_sections;
668 target -> to_sections = (struct section_table *)
669 xrealloc ((char *)target -> to_sections,
670 (sizeof (struct section_table)) * (count + old));
675 target -> to_sections = (struct section_table *)
676 xmalloc ((sizeof (struct section_table)) * count);
678 target -> to_sections_end = target -> to_sections + (count + old);
680 /* Add these section table entries to the target's table. */
681 while ((so = find_solib (so)) != NULL)
683 if (so -> lm.o_path[0])
685 count = so -> sections_end - so -> sections;
686 memcpy ((char *) (target -> to_sections + old),
688 (sizeof (struct section_table)) * count);
700 info_sharedlibrary_command -- code for "info sharedlibrary"
704 static void info_sharedlibrary_command ()
708 Walk through the shared library list and print information
709 about each attached library.
713 info_sharedlibrary_command (ignore, from_tty)
717 register struct so_list *so = NULL; /* link map state variable */
720 if (exec_bfd == NULL)
722 printf_unfiltered ("No exec file.\n");
725 while ((so = find_solib (so)) != NULL)
727 if (so -> lm.o_path[0])
731 printf_unfiltered("%-12s%-12s%-12s%s\n", "From", "To", "Syms Read",
732 "Shared Object Library");
735 printf_unfiltered ("%-12s",
736 local_hex_string_custom ((unsigned long) LM_ADDR (so),
738 printf_unfiltered ("%-12s",
739 local_hex_string_custom ((unsigned long) so -> lmend,
741 printf_unfiltered ("%-12s", so -> symbols_loaded ? "Yes" : "No");
742 printf_unfiltered ("%s\n", so -> lm.o_path);
745 if (so_list_head == NULL)
747 printf_unfiltered ("No shared libraries loaded at this time.\n");
755 solib_address -- check to see if an address is in a shared lib
759 int solib_address (CORE_ADDR address)
763 Provides a hook for other gdb routines to discover whether or
764 not a particular address is within the mapped address space of
765 a shared library. Any address between the base mapping address
766 and the first address beyond the end of the last mapping, is
767 considered to be within the shared library address space, for
770 For example, this routine is called at one point to disable
771 breakpoints which are in shared libraries that are not currently
776 solib_address (address)
779 register struct so_list *so = 0; /* link map state variable */
781 while ((so = find_solib (so)) != NULL)
783 if (so -> lm.o_path[0])
785 if ((address >= (CORE_ADDR) LM_ADDR (so)) &&
786 (address < (CORE_ADDR) so -> lmend))
795 /* Called by free_all_symtabs */
800 struct so_list *next;
805 if (so_list_head -> sections)
807 free ((PTR)so_list_head -> sections);
809 if (so_list_head -> abfd)
811 bfd_filename = bfd_get_filename (so_list_head -> abfd);
812 bfd_close (so_list_head -> abfd);
815 /* This happens for the executable on SVR4. */
818 next = so_list_head -> next;
820 free ((PTR)bfd_filename);
821 free (so_list_head->lm.o_path);
822 free ((PTR)so_list_head);
832 disable_break -- remove the "mapping changed" breakpoint
836 static int disable_break ()
840 Removes the breakpoint that gets hit when the dynamic linker
841 completes a mapping change.
851 /* Note that breakpoint address and original contents are in our address
852 space, so we just need to write the original contents back. */
854 if (memory_remove_breakpoint (breakpoint_addr, shadow_contents) != 0)
859 /* For the SVR4 version, we always know the breakpoint address. For the
860 SunOS version we don't know it until the above code is executed.
861 Grumble if we are stopped anywhere besides the breakpoint address. */
863 if (stop_pc != breakpoint_addr)
865 warning ("stopped at unknown breakpoint while handling shared libraries");
875 enable_break -- arrange for dynamic linker to hit breakpoint
879 int enable_break (void)
883 Both the SunOS and the SVR4 dynamic linkers have, as part of their
884 debugger interface, support for arranging for the inferior to hit
885 a breakpoint after mapping in the shared libraries. This function
886 enables that breakpoint.
888 For SunOS, there is a special flag location (in_debugger) which we
889 set to 1. When the dynamic linker sees this flag set, it will set
890 a breakpoint at a location known only to itself, after saving the
891 original contents of that place and the breakpoint address itself,
892 in it's own internal structures. When we resume the inferior, it
893 will eventually take a SIGTRAP when it runs into the breakpoint.
894 We handle this (in a different place) by restoring the contents of
895 the breakpointed location (which is only known after it stops),
896 chasing around to locate the shared libraries that have been
897 loaded, then resuming.
899 For SVR4, the debugger interface structure contains a member (r_brk)
900 which is statically initialized at the time the shared library is
901 built, to the offset of a function (_r_debug_state) which is guaran-
902 teed to be called once before mapping in a library, and again when
903 the mapping is complete. At the time we are examining this member,
904 it contains only the unrelocated offset of the function, so we have
905 to do our own relocation. Later, when the dynamic linker actually
906 runs, it relocates r_brk to be the actual address of _r_debug_state().
908 The debugger interface structure also contains an enumeration which
909 is set to either RT_ADD or RT_DELETE prior to changing the mapping,
910 depending upon whether or not the library is being mapped or unmapped,
911 and then set to RT_CONSISTENT after the library is mapped/unmapped.
913 Irix 5, on the other hand, has no such features. Instead, we
914 set a breakpoint at main.
921 struct minimal_symbol *msymbol;
925 /* Scan through the list of symbols, trying to look up the symbol and
926 set a breakpoint there. Terminate loop when we/if we succeed. */
929 for (bkpt_namep = bkpt_names; *bkpt_namep != NULL; bkpt_namep++)
931 msymbol = lookup_minimal_symbol (*bkpt_namep, symfile_objfile);
932 if ((msymbol != NULL) && (SYMBOL_VALUE_ADDRESS (msymbol) != 0))
934 bkpt_addr = SYMBOL_VALUE_ADDRESS (msymbol);
935 #ifdef SOLIB_BKPT_OFFSET
936 /* We only want to skip if bkpt_addr is currently pointing
937 at a GP setting instruction. */
941 if (target_read_memory (bkpt_addr, buf, 4) == 0)
945 insn = extract_unsigned_integer (buf, 4);
946 if ((insn & 0xffff0000) == 0x3c1c0000) /* lui $gp,n */
947 bkpt_addr += SOLIB_BKPT_OFFSET;
951 if (target_insert_breakpoint (bkpt_addr, shadow_contents) == 0)
953 breakpoint_addr = bkpt_addr;
967 solib_create_inferior_hook -- shared library startup support
971 void solib_create_inferior_hook()
975 When gdb starts up the inferior, it nurses it along (through the
976 shell) until it is ready to execute it's first instruction. At this
977 point, this function gets called via expansion of the macro
978 SOLIB_CREATE_INFERIOR_HOOK.
980 For SunOS executables, this first instruction is typically the
981 one at "_start", or a similar text label, regardless of whether
982 the executable is statically or dynamically linked. The runtime
983 startup code takes care of dynamically linking in any shared
984 libraries, once gdb allows the inferior to continue.
986 For SVR4 executables, this first instruction is either the first
987 instruction in the dynamic linker (for dynamically linked
988 executables) or the instruction at "start" for statically linked
989 executables. For dynamically linked executables, the system
990 first exec's /lib/libc.so.N, which contains the dynamic linker,
991 and starts it running. The dynamic linker maps in any needed
992 shared libraries, maps in the actual user executable, and then
993 jumps to "start" in the user executable.
995 For both SunOS shared libraries, and SVR4 shared libraries, we
996 can arrange to cooperate with the dynamic linker to discover the
997 names of shared libraries that are dynamically linked, and the
998 base addresses to which they are linked.
1000 This function is responsible for discovering those names and
1001 addresses, and saving sufficient information about them to allow
1002 their symbols to be read at a later time.
1006 Between enable_break() and disable_break(), this code does not
1007 properly handle hitting breakpoints which the user might have
1008 set in the startup code or in the dynamic linker itself. Proper
1009 handling will probably have to wait until the implementation is
1010 changed to use the "breakpoint handler function" method.
1012 Also, what if child has exit()ed? Must exit loop somehow.
1016 solib_create_inferior_hook()
1018 if (!enable_break ())
1020 warning ("shared library handler failed to enable breakpoint");
1024 /* Now run the target. It will eventually hit the breakpoint, at
1025 which point all of the libraries will have been mapped in and we
1026 can go groveling around in the dynamic linker structures to find
1027 out what we need to know about them. */
1029 clear_proceed_status ();
1030 stop_soon_quietly = 1;
1034 target_resume (-1, 0, stop_signal);
1035 wait_for_inferior ();
1037 while (stop_signal != SIGTRAP);
1038 stop_soon_quietly = 0;
1040 /* We are now either at the "mapping complete" breakpoint (or somewhere
1041 else, a condition we aren't prepared to deal with anyway), so adjust
1042 the PC as necessary after a breakpoint, disable the breakpoint, and
1043 add any shared libraries that were mapped in. */
1045 if (DECR_PC_AFTER_BREAK)
1047 stop_pc -= DECR_PC_AFTER_BREAK;
1048 write_register (PC_REGNUM, stop_pc);
1051 if (!disable_break ())
1053 warning ("shared library handler failed to disable breakpoint");
1056 solib_add ((char *) 0, 0, (struct target_ops *) 0);
1063 sharedlibrary_command -- handle command to explicitly add library
1067 static void sharedlibrary_command (char *args, int from_tty)
1074 sharedlibrary_command (args, from_tty)
1079 solib_add (args, from_tty, (struct target_ops *) 0);
1086 add_com ("sharedlibrary", class_files, sharedlibrary_command,
1087 "Load shared object library symbols for files matching REGEXP.");
1088 add_info ("sharedlibrary", info_sharedlibrary_command,
1089 "Status of loaded shared object libraries.");