1 /* Handle OSF/1 shared libraries for GDB, the GNU Debugger.
2 Copyright 1993 Free Software Foundation, Inc.
4 This file is part of GDB.
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 2 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
18 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */
20 /* FIXME: Most of this code could be merged with solib.c by using
21 next_link_map_member and xfer_link_map_member in solib.c. */
25 #include <sys/types.h>
42 #define MAX_PATH_SIZE 256 /* FIXME: Should be dynamic */
44 /* FIXME: This is a terrible hack for shared library support under OSF/1.
45 The main problem is that the needed definitions are not contained in
46 the system header files.
47 The ldr_* routines described in loader(3) would be the way to go here.
48 But they do not work for arbitrary target processes (as documented). */
50 #ifndef USE_LDR_ROUTINES
51 #define RLD_CONTEXT_ADDRESS 0x3ffc0000000
59 CORE_ADDR modinfo_addr;
70 static ldr_context_t ldr_context;
75 /* Define our own link_map structure.
76 This will help to share code with solib.c. */
79 CORE_ADDR l_addr; /* address at which object mapped */
80 char *l_name; /* full name of loaded object */
81 ldr_module_info_t module_info; /* corresponding module info */
84 #define LM_ADDR(so) ((so) -> lm.l_addr)
85 #define LM_NAME(so) ((so) -> lm.l_name)
88 struct so_list *next; /* next structure in linked list */
89 struct link_map lm; /* copy of link map from inferior */
90 struct link_map *lmaddr; /* addr in inferior lm was read from */
91 CORE_ADDR lmend; /* upper addr bound of mapped object */
92 char so_name[MAX_PATH_SIZE]; /* shared object lib name (FIXME) */
93 char symbols_loaded; /* flag: symbols read in yet? */
94 char from_tty; /* flag: print msgs? */
95 struct objfile *objfile; /* objfile for loaded lib */
96 struct section_table *sections;
97 struct section_table *sections_end;
98 struct section_table *textsection;
102 static struct so_list *so_list_head; /* List of known shared objects */
105 fdmatch PARAMS ((int, int)); /* In libiberty */
107 /* Local function prototypes */
110 sharedlibrary_command PARAMS ((char *, int));
113 info_sharedlibrary_command PARAMS ((char *, int));
116 symbol_add_stub PARAMS ((char *));
118 static struct so_list *
119 find_solib PARAMS ((struct so_list *));
121 static struct link_map *
122 first_link_map_member PARAMS ((void));
124 static struct link_map *
125 next_link_map_member PARAMS ((struct so_list *));
128 xfer_link_map_member PARAMS ((struct so_list *, struct link_map *));
131 solib_map_sections PARAMS ((struct so_list *));
134 _initialize_solib PARAMS ((void));
140 solib_map_sections -- open bfd and build sections for shared lib
144 static void solib_map_sections (struct so_list *so)
148 Given a pointer to one of the shared objects in our list
149 of mapped objects, use the recorded name to open a bfd
150 descriptor for the object, build a section table, and then
151 relocate all the section addresses by the base address at
152 which the shared object was mapped.
156 In most (all?) cases the shared object file name recorded in the
157 dynamic linkage tables will be a fully qualified pathname. For
158 cases where it isn't, do we really mimic the systems search
159 mechanism correctly in the below code (particularly the tilde
164 solib_map_sections (so)
168 char *scratch_pathname;
170 struct section_table *p;
171 struct cleanup *old_chain;
174 filename = tilde_expand (so -> so_name);
175 old_chain = make_cleanup (free, filename);
177 scratch_chan = openp (getenv ("PATH"), 1, filename, O_RDONLY, 0,
179 if (scratch_chan < 0)
181 scratch_chan = openp (getenv ("LD_LIBRARY_PATH"), 1, filename,
182 O_RDONLY, 0, &scratch_pathname);
184 if (scratch_chan < 0)
186 perror_with_name (filename);
188 /* Leave scratch_pathname allocated. bfd->name will point to it. */
190 abfd = bfd_fdopenr (scratch_pathname, gnutarget, scratch_chan);
193 close (scratch_chan);
194 error ("Could not open `%s' as an executable file: %s",
195 scratch_pathname, bfd_errmsg (bfd_error));
197 /* Leave bfd open, core_xfer_memory and "info files" need it. */
199 abfd -> cacheable = true;
201 if (!bfd_check_format (abfd, bfd_object))
203 error ("\"%s\": not in executable format: %s.",
204 scratch_pathname, bfd_errmsg (bfd_error));
206 if (build_section_table (abfd, &so -> sections, &so -> sections_end))
208 error ("Can't find the file sections in `%s': %s",
209 bfd_get_filename (exec_bfd), bfd_errmsg (bfd_error));
212 for (p = so -> sections; p < so -> sections_end; p++)
214 /* Relocate the section binding addresses as recorded in the shared
215 object's file by the base address to which the object was actually
217 p -> addr += (CORE_ADDR) LM_ADDR (so);
218 p -> endaddr += (CORE_ADDR) LM_ADDR (so);
219 so -> lmend = (CORE_ADDR) max (p -> endaddr, so -> lmend);
220 if (STREQ (p -> sec_ptr -> name, ".text"))
222 so -> textsection = p;
226 /* Free the file names, close the file now. */
227 do_cleanups (old_chain);
234 first_link_map_member -- locate first member in dynamic linker's map
238 static struct link_map *first_link_map_member (void)
242 Read in a copy of the first member in the inferior's dynamic
243 link map from the inferior's dynamic linker structures, and return
244 a pointer to the copy in our address space.
247 static struct link_map *
248 first_link_map_member ()
250 struct link_map *lm = NULL;
251 static struct link_map first_lm;
253 #ifdef USE_LDR_ROUTINES
254 ldr_module_t mod_id = LDR_NULL_MODULE;
257 if (ldr_next_module(inferior_pid, &mod_id) != 0
258 || mod_id == LDR_NULL_MODULE
259 || ldr_inq_module(inferior_pid, mod_id,
260 &first_lm.module_info, sizeof(ldr_module_info_t),
264 CORE_ADDR ldr_context_addr;
266 if (target_read_memory ((CORE_ADDR) RLD_CONTEXT_ADDRESS,
267 (char *) &ldr_context_addr,
268 sizeof (CORE_ADDR)) != 0
269 || target_read_memory (ldr_context_addr,
270 (char *) &ldr_context,
271 sizeof (ldr_context_t)) != 0
272 || target_read_memory ((CORE_ADDR) ldr_context.head,
273 (char *) &first_lm.module_info,
274 sizeof (ldr_module_info_t)) != 0)
280 /* The first entry is for the main program and should be skipped. */
286 static struct link_map *
287 next_link_map_member (so_list_ptr)
288 struct so_list *so_list_ptr;
290 struct link_map *lm = NULL;
291 static struct link_map next_lm;
292 #ifdef USE_LDR_ROUTINES
293 ldr_module_t mod_id = lm->module_info.lmi_modid;
296 if (ldr_next_module(inferior_pid, &mod_id) != 0
297 || mod_id == LDR_NULL_MODULE
298 || ldr_inq_module(inferior_pid, mod_id,
299 &next_lm.module_info, sizeof(ldr_module_info_t),
304 lm->l_name = lm->module_info.lmi_name;
306 CORE_ADDR ldr_context_addr;
308 /* Reread context in case ldr_context.tail was updated. */
310 if (target_read_memory ((CORE_ADDR) RLD_CONTEXT_ADDRESS,
311 (char *) &ldr_context_addr,
312 sizeof (CORE_ADDR)) != 0
313 || target_read_memory (ldr_context_addr,
314 (char *) &ldr_context,
315 sizeof (ldr_context_t)) != 0
316 || so_list_ptr->lm.module_info.modinfo_addr == ldr_context.tail
317 || target_read_memory (so_list_ptr->lm.module_info.next,
318 (char *) &next_lm.module_info,
319 sizeof (ldr_module_info_t)) != 0)
323 lm->l_name = lm->module_info.module_name;
329 xfer_link_map_member (so_list_ptr, lm)
330 struct so_list *so_list_ptr;
333 so_list_ptr->lm = *lm;
335 /* OSF/1 has absolute addresses in shared libraries. */
336 LM_ADDR (so_list_ptr) = 0;
338 /* There is one entry that has no name (for the inferior executable)
339 since it is not a shared object. */
340 if (LM_NAME (so_list_ptr) != 0)
343 #ifdef USE_LDR_ROUTINES
344 int len = strlen (LM_NAME (so_list_ptr) + 1);
346 if (len > MAX_PATH_SIZE)
348 strncpy (so_list_ptr->so_name, LM_NAME (so_list_ptr), MAX_PATH_SIZE);
350 if (!target_read_string((CORE_ADDR) LM_NAME (so_list_ptr),
351 so_list_ptr->so_name, MAX_PATH_SIZE - 1))
352 error ("xfer_link_map_member: Can't read pathname for load map\n");
354 so_list_ptr->so_name[MAX_PATH_SIZE - 1] = 0;
356 solib_map_sections (so_list_ptr);
364 find_solib -- step through list of shared objects
368 struct so_list *find_solib (struct so_list *so_list_ptr)
372 This module contains the routine which finds the names of any
373 loaded "images" in the current process. The argument in must be
374 NULL on the first call, and then the returned value must be passed
375 in on subsequent calls. This provides the capability to "step" down
376 the list of loaded objects. On the last object, a NULL value is
379 The arg and return value are "struct link_map" pointers, as defined
383 static struct so_list *
384 find_solib (so_list_ptr)
385 struct so_list *so_list_ptr; /* Last lm or NULL for first one */
387 struct so_list *so_list_next = NULL;
388 struct link_map *lm = NULL;
391 if (so_list_ptr == NULL)
393 /* We are setting up for a new scan through the loaded images. */
394 if ((so_list_next = so_list_head) == NULL)
396 /* Find the first link map list member. */
397 lm = first_link_map_member ();
402 /* We have been called before, and are in the process of walking
403 the shared library list. Advance to the next shared object. */
404 lm = next_link_map_member (so_list_ptr);
405 so_list_next = so_list_ptr -> next;
407 if ((so_list_next == NULL) && (lm != NULL))
409 /* Get next link map structure from inferior image and build a local
410 abbreviated load_map structure */
411 new = (struct so_list *) xmalloc (sizeof (struct so_list));
412 memset ((char *) new, 0, sizeof (struct so_list));
414 /* Add the new node as the next node in the list, or as the root
415 node if this is the first one. */
416 if (so_list_ptr != NULL)
418 so_list_ptr -> next = new;
425 xfer_link_map_member (new, lm);
427 return (so_list_next);
430 /* A small stub to get us past the arg-passing pinhole of catch_errors. */
433 symbol_add_stub (arg)
436 register struct so_list *so = (struct so_list *) arg; /* catch_errs bogon */
438 so -> objfile = symbol_file_add (so -> so_name, so -> from_tty,
439 so -> textsection -> addr,
448 solib_add -- add a shared library file to the symtab and section list
452 void solib_add (char *arg_string, int from_tty,
453 struct target_ops *target)
460 solib_add (arg_string, from_tty, target)
463 struct target_ops *target;
465 register struct so_list *so = NULL; /* link map state variable */
467 /* Last shared library that we read. */
468 struct so_list *so_last = NULL;
474 if ((re_err = re_comp (arg_string ? arg_string : ".")) != NULL)
476 error ("Invalid regexp: %s", re_err);
480 /* Add the shared library sections to the section table of the
481 specified target, if any. We have to do this before reading the
482 symbol files as symbol_file_add calls reinit_frame_cache and
483 creating a new frame might access memory in the shared library. */
486 /* Count how many new section_table entries there are. */
489 while ((so = find_solib (so)) != NULL)
491 if (so -> so_name[0])
493 count += so -> sections_end - so -> sections;
499 /* Reallocate the target's section table including the new size. */
500 if (target -> to_sections)
502 old = target -> to_sections_end - target -> to_sections;
503 target -> to_sections = (struct section_table *)
504 xrealloc ((char *)target -> to_sections,
505 (sizeof (struct section_table)) * (count + old));
510 target -> to_sections = (struct section_table *)
511 xmalloc ((sizeof (struct section_table)) * count);
513 target -> to_sections_end = target -> to_sections + (count + old);
515 /* Add these section table entries to the target's table. */
516 while ((so = find_solib (so)) != NULL)
518 if (so -> so_name[0])
520 count = so -> sections_end - so -> sections;
521 memcpy ((char *) (target -> to_sections + old),
523 (sizeof (struct section_table)) * count);
530 /* Now add the symbol files. */
532 while ((so = find_solib (so)) != NULL)
534 if (so -> so_name[0] && re_exec (so -> so_name))
536 so -> from_tty = from_tty;
537 if (so -> symbols_loaded)
541 printf ("Symbols already loaded for %s\n", so -> so_name);
544 else if (catch_errors
545 (symbol_add_stub, (char *) so,
546 "Error while reading shared library symbols:\n",
550 so -> symbols_loaded = 1;
560 info_sharedlibrary_command -- code for "info sharedlibrary"
564 static void info_sharedlibrary_command ()
568 Walk through the shared library list and print information
569 about each attached library.
573 info_sharedlibrary_command (ignore, from_tty)
577 register struct so_list *so = NULL; /* link map state variable */
580 if (exec_bfd == NULL)
582 printf ("No exec file.\n");
585 while ((so = find_solib (so)) != NULL)
587 if (so -> so_name[0])
589 unsigned long txt_start = 0;
590 unsigned long txt_end = 0;
594 printf("%-20s%-20s%-12s%s\n", "From", "To", "Syms Read",
595 "Shared Object Library");
598 if (so -> textsection)
600 txt_start = (unsigned long) so -> textsection -> addr;
601 txt_end = (unsigned long) so -> textsection -> endaddr;
603 printf ("%-20s", local_hex_string_custom (txt_start, "08l"));
604 printf ("%-20s", local_hex_string_custom (txt_end, "08l"));
605 printf ("%-12s", so -> symbols_loaded ? "Yes" : "No");
606 printf ("%s\n", so -> so_name);
609 if (so_list_head == NULL)
611 printf ("No shared libraries loaded at this time.\n");
619 solib_address -- check to see if an address is in a shared lib
623 int solib_address (CORE_ADDR address)
627 Provides a hook for other gdb routines to discover whether or
628 not a particular address is within the mapped address space of
629 a shared library. Any address between the base mapping address
630 and the first address beyond the end of the last mapping, is
631 considered to be within the shared library address space, for
634 For example, this routine is called at one point to disable
635 breakpoints which are in shared libraries that are not currently
640 solib_address (address)
643 register struct so_list *so = 0; /* link map state variable */
645 while ((so = find_solib (so)) != NULL)
647 if (so -> so_name[0] && so -> textsection)
649 if ((address >= (CORE_ADDR) so -> textsection -> addr) &&
650 (address < (CORE_ADDR) so -> textsection -> endaddr))
659 /* Called by free_all_symtabs */
664 struct so_list *next;
669 if (so_list_head -> sections)
671 free ((PTR)so_list_head -> sections);
673 if (so_list_head -> abfd)
675 bfd_filename = bfd_get_filename (so_list_head -> abfd);
676 bfd_close (so_list_head -> abfd);
679 /* This happens for the executable on SVR4. */
682 next = so_list_head -> next;
684 free ((PTR)bfd_filename);
685 free ((PTR)so_list_head);
694 solib_create_inferior_hook -- shared library startup support
698 void solib_create_inferior_hook()
702 When gdb starts up the inferior, it nurses it along (through the
703 shell) until it is ready to execute it's first instruction. At this
704 point, this function gets called via expansion of the macro
705 SOLIB_CREATE_INFERIOR_HOOK.
706 For a statically bound executable, this first instruction is the
707 one at "_start", or a similar text label. No further processing is
709 For a dynamically bound executable, this first instruction is somewhere
710 in the rld, and the actual user executable is not yet mapped in.
711 We continue the inferior again, rld then maps in the actual user
712 executable and any needed shared libraries and then sends
714 At that point we discover the names of all shared libraries and
715 read their symbols in.
719 This code does not properly handle hitting breakpoints which the
720 user might have set in the rld itself. Proper handling would have
721 to check if the SIGTRAP happened due to a kill call.
723 Also, what if child has exit()ed? Must exit loop somehow.
727 solib_create_inferior_hook()
730 /* Nothing to do for statically bound executables. */
732 if (symfile_objfile == 0 || symfile_objfile->ei.entry_file_lowpc == stop_pc)
735 /* Now run the target. It will eventually get a SIGTRAP, at
736 which point all of the libraries will have been mapped in and we
737 can go groveling around in the rld structures to find
738 out what we need to know about them. */
740 clear_proceed_status ();
741 stop_soon_quietly = 1;
745 target_resume (inferior_pid, 0, stop_signal);
746 wait_for_inferior ();
748 while (stop_signal != SIGTRAP);
750 /* solib_add will call reinit_frame_cache via symbol_file_add.
751 But we are stopped in the runtime loader and we do not have symbols
752 for the runtime loader. So heuristic_proc_start will be called
753 and will put out an annoying warning.
754 Resetting stop_soon_quietly after symbol loading suppresses
756 solib_add ((char *) 0, 0, (struct target_ops *) 0);
757 stop_soon_quietly = 0;
765 sharedlibrary_command -- handle command to explicitly add library
769 static void sharedlibrary_command (char *args, int from_tty)
776 sharedlibrary_command (args, from_tty)
781 solib_add (args, from_tty, (struct target_ops *) 0);
788 add_com ("sharedlibrary", class_files, sharedlibrary_command,
789 "Load shared object library symbols for files matching REGEXP.");
790 add_info ("sharedlibrary", info_sharedlibrary_command,
791 "Status of loaded shared object libraries.");