Tweak target_xfer_status_to_string
[deliverable/binutils-gdb.git] / gdb / exec.c
CommitLineData
c906108c 1/* Work with executable files, for GDB.
4646aa9d 2
ecd75fc8 3 Copyright (C) 1988-2014 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "frame.h"
22#include "inferior.h"
23#include "target.h"
24#include "gdbcmd.h"
25#include "language.h"
0ba1096a 26#include "filenames.h"
c906108c
SS
27#include "symfile.h"
28#include "objfiles.h"
c5f0f3d0 29#include "completer.h"
fd0407d6 30#include "value.h"
4646aa9d 31#include "exec.h"
ea53e89f 32#include "observer.h"
dacec2a8 33#include "arch-utils.h"
6c95b8df
PA
34#include "gdbthread.h"
35#include "progspace.h"
cbb099e8 36#include "gdb_bfd.h"
b427c1bc 37#include "gcore.h"
c906108c 38
c906108c 39#include <fcntl.h>
dbda9972 40#include "readline/readline.h"
0e9f083f 41#include <string.h>
c906108c
SS
42
43#include "gdbcore.h"
44
45#include <ctype.h>
53ce3c39 46#include <sys/stat.h>
c906108c 47
9a4105ab 48void (*deprecated_file_changed_hook) (char *);
c906108c
SS
49
50/* Prototypes for local functions */
51
a14ed312 52static void file_command (char *, int);
c906108c 53
a14ed312 54static void set_section_command (char *, int);
c906108c 55
a14ed312 56static void exec_files_info (struct target_ops *);
c906108c 57
a14ed312 58static void init_exec_ops (void);
c906108c 59
a14ed312 60void _initialize_exec (void);
c906108c 61
c906108c
SS
62/* The target vector for executable files. */
63
64struct target_ops exec_ops;
65
6c95b8df
PA
66/* True if the exec target is pushed on the stack. */
67static int using_exec_ops;
07b82ea5 68
c906108c
SS
69/* Whether to open exec and core files read-only or read-write. */
70
71int write_files = 0;
920d2a44
AC
72static void
73show_write_files (struct ui_file *file, int from_tty,
74 struct cmd_list_element *c, const char *value)
75{
76 fprintf_filtered (file, _("Writing into executable and core files is %s.\n"),
77 value);
78}
79
c906108c 80
4c42eaff 81static void
1adeb98a
FN
82exec_open (char *args, int from_tty)
83{
84 target_preopen (from_tty);
85 exec_file_attach (args, from_tty);
86}
87
07b82ea5
PA
88/* Close and clear exec_bfd. If we end up with no target sections to
89 read memory from, this unpushes the exec_ops target. */
90
6c95b8df
PA
91void
92exec_close (void)
07b82ea5
PA
93{
94 if (exec_bfd)
95 {
96 bfd *abfd = exec_bfd;
07b82ea5 97
cbb099e8 98 gdb_bfd_unref (abfd);
07b82ea5
PA
99
100 /* Removing target sections may close the exec_ops target.
101 Clear exec_bfd before doing so to prevent recursion. */
102 exec_bfd = NULL;
103 exec_bfd_mtime = 0;
104
046ac79f 105 remove_target_sections (&exec_bfd);
1f0c4988
JK
106
107 xfree (exec_filename);
108 exec_filename = NULL;
07b82ea5
PA
109 }
110}
111
6c95b8df
PA
112/* This is the target_close implementation. Clears all target
113 sections and closes all executable bfds from all program spaces. */
114
c906108c 115static void
de90e03d 116exec_close_1 (struct target_ops *self)
c906108c 117{
6c95b8df
PA
118 using_exec_ops = 0;
119
6c95b8df
PA
120 {
121 struct program_space *ss;
122 struct cleanup *old_chain;
c906108c 123
6c95b8df
PA
124 old_chain = save_current_program_space ();
125 ALL_PSPACES (ss)
126 {
127 set_current_program_space (ss);
128
129 /* Delete all target sections. */
130 resize_section_table
131 (current_target_sections,
132 -resize_section_table (current_target_sections, 0));
133
134 exec_close ();
135 }
136
137 do_cleanups (old_chain);
138 }
c906108c
SS
139}
140
1adeb98a
FN
141void
142exec_file_clear (int from_tty)
143{
144 /* Remove exec file. */
6c95b8df 145 exec_close ();
1adeb98a
FN
146
147 if (from_tty)
a3f17187 148 printf_unfiltered (_("No executable file now.\n"));
1adeb98a
FN
149}
150
907083d1 151/* Set FILENAME as the new exec file.
c906108c 152
c5aa993b
JM
153 This function is intended to be behave essentially the same
154 as exec_file_command, except that the latter will detect when
155 a target is being debugged, and will ask the user whether it
156 should be shut down first. (If the answer is "no", then the
157 new file is ignored.)
c906108c 158
c5aa993b
JM
159 This file is used by exec_file_command, to do the work of opening
160 and processing the exec file after any prompting has happened.
c906108c 161
c5aa993b
JM
162 And, it is used by child_attach, when the attach command was
163 given a pid but not a exec pathname, and the attach command could
164 figure out the pathname from the pid. (In this case, we shouldn't
165 ask the user whether the current target should be shut down --
907083d1 166 we're supplying the exec pathname late for good reason.) */
c906108c
SS
167
168void
1adeb98a 169exec_file_attach (char *filename, int from_tty)
c906108c 170{
c906108c 171 /* Remove any previous exec file. */
6c95b8df 172 exec_close ();
c906108c
SS
173
174 /* Now open and digest the file the user requested, if any. */
175
1adeb98a
FN
176 if (!filename)
177 {
178 if (from_tty)
a3f17187 179 printf_unfiltered (_("No executable file now.\n"));
7a107747
DJ
180
181 set_gdbarch_from_file (NULL);
1adeb98a
FN
182 }
183 else
c906108c 184 {
f7545552 185 struct cleanup *cleanups;
1f0c4988 186 char *scratch_pathname, *canonical_pathname;
c906108c 187 int scratch_chan;
07b82ea5 188 struct target_section *sections = NULL, *sections_end = NULL;
d18b8b7a 189 char **matching;
c5aa993b 190
492c0ab7 191 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST, filename,
fbdebf46 192 write_files ? O_RDWR | O_BINARY : O_RDONLY | O_BINARY,
c906108c 193 &scratch_pathname);
cfc3008e 194#if defined(__GO32__) || defined(_WIN32) || defined(__CYGWIN__)
c906108c 195 if (scratch_chan < 0)
c5aa993b
JM
196 {
197 char *exename = alloca (strlen (filename) + 5);
d7f9d729 198
c5aa993b 199 strcat (strcpy (exename, filename), ".exe");
492c0ab7 200 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST, exename,
fbdebf46 201 write_files ? O_RDWR | O_BINARY : O_RDONLY | O_BINARY,
014d698b 202 &scratch_pathname);
c5aa993b 203 }
c906108c 204#endif
17d6efc4
JB
205 if (scratch_chan < 0)
206 perror_with_name (filename);
a4453b7e
TT
207
208 cleanups = make_cleanup (xfree, scratch_pathname);
209
1f0c4988
JK
210 /* gdb_bfd_open (and its variants) prefers canonicalized pathname for
211 better BFD caching. */
212 canonical_pathname = gdb_realpath (scratch_pathname);
213 make_cleanup (xfree, canonical_pathname);
214
1c00ec6b 215 if (write_files)
1f0c4988 216 exec_bfd = gdb_bfd_fopen (canonical_pathname, gnutarget,
1c00ec6b
TT
217 FOPEN_RUB, scratch_chan);
218 else
1f0c4988 219 exec_bfd = gdb_bfd_open (canonical_pathname, gnutarget, scratch_chan);
c906108c
SS
220
221 if (!exec_bfd)
9fe4a216 222 {
9fe4a216
TT
223 error (_("\"%s\": could not open as an executable file: %s"),
224 scratch_pathname, bfd_errmsg (bfd_get_error ()));
225 }
c906108c 226
1f0c4988 227 gdb_assert (exec_filename == NULL);
4856b6bc 228 exec_filename = gdb_realpath_keepfile (scratch_pathname);
1f0c4988 229
d18b8b7a 230 if (!bfd_check_format_matches (exec_bfd, bfd_object, &matching))
c906108c
SS
231 {
232 /* Make sure to close exec_bfd, or else "run" might try to use
233 it. */
6c95b8df 234 exec_close ();
8a3fe4f8 235 error (_("\"%s\": not in executable format: %s"),
d18b8b7a
HZ
236 scratch_pathname,
237 gdb_bfd_errmsg (bfd_get_error (), matching));
c906108c
SS
238 }
239
07b82ea5 240 if (build_section_table (exec_bfd, &sections, &sections_end))
c906108c
SS
241 {
242 /* Make sure to close exec_bfd, or else "run" might try to use
243 it. */
6c95b8df 244 exec_close ();
8a3fe4f8 245 error (_("\"%s\": can't find the file sections: %s"),
c906108c
SS
246 scratch_pathname, bfd_errmsg (bfd_get_error ()));
247 }
248
c04ea773
DJ
249 exec_bfd_mtime = bfd_get_mtime (exec_bfd);
250
c906108c
SS
251 validate_files ();
252
253 set_gdbarch_from_file (exec_bfd);
254
07b82ea5 255 /* Add the executable's sections to the current address spaces'
6c95b8df
PA
256 list of sections. This possibly pushes the exec_ops
257 target. */
ed9eebaf 258 add_target_sections (&exec_bfd, sections, sections_end);
07b82ea5 259 xfree (sections);
c906108c
SS
260
261 /* Tell display code (if any) about the changed file name. */
9a4105ab
AC
262 if (deprecated_exec_file_display_hook)
263 (*deprecated_exec_file_display_hook) (filename);
f7545552
TT
264
265 do_cleanups (cleanups);
c906108c 266 }
ce7d4522 267 bfd_cache_close_all ();
781b42b0 268 observer_notify_executable_changed ();
c906108c
SS
269}
270
271/* Process the first arg in ARGS as the new exec file.
272
c5aa993b
JM
273 Note that we have to explicitly ignore additional args, since we can
274 be called from file_command(), which also calls symbol_file_command()
1adeb98a
FN
275 which can take multiple args.
276
0963b4bd 277 If ARGS is NULL, we just want to close the exec file. */
c906108c 278
1adeb98a 279static void
fba45db2 280exec_file_command (char *args, int from_tty)
c906108c 281{
1adeb98a
FN
282 char **argv;
283 char *filename;
4c42eaff
DJ
284
285 if (from_tty && target_has_execution
286 && !query (_("A program is being debugged already.\n"
287 "Are you sure you want to change the file? ")))
288 error (_("File not changed."));
1adeb98a
FN
289
290 if (args)
291 {
f7545552
TT
292 struct cleanup *cleanups;
293
1adeb98a
FN
294 /* Scan through the args and pick up the first non option arg
295 as the filename. */
296
d1a41061 297 argv = gdb_buildargv (args);
f7545552 298 cleanups = make_cleanup_freeargv (argv);
1adeb98a
FN
299
300 for (; (*argv != NULL) && (**argv == '-'); argv++)
301 {;
302 }
303 if (*argv == NULL)
8a3fe4f8 304 error (_("No executable file name was specified"));
1adeb98a
FN
305
306 filename = tilde_expand (*argv);
307 make_cleanup (xfree, filename);
308 exec_file_attach (filename, from_tty);
f7545552
TT
309
310 do_cleanups (cleanups);
1adeb98a
FN
311 }
312 else
313 exec_file_attach (NULL, from_tty);
c906108c
SS
314}
315
0963b4bd 316/* Set both the exec file and the symbol file, in one command.
c906108c
SS
317 What a novelty. Why did GDB go through four major releases before this
318 command was added? */
319
320static void
fba45db2 321file_command (char *arg, int from_tty)
c906108c
SS
322{
323 /* FIXME, if we lose on reading the symbol file, we should revert
324 the exec file, but that's rough. */
325 exec_file_command (arg, from_tty);
326 symbol_file_command (arg, from_tty);
9a4105ab
AC
327 if (deprecated_file_changed_hook)
328 deprecated_file_changed_hook (arg);
c906108c 329}
c906108c 330\f
c5aa993b 331
0963b4bd 332/* Locate all mappable sections of a BFD file.
c906108c
SS
333 table_pp_char is a char * to get it through bfd_map_over_sections;
334 we cast it back to its proper type. */
335
336static void
7be0c536
AC
337add_to_section_table (bfd *abfd, struct bfd_section *asect,
338 void *table_pp_char)
c906108c 339{
0542c86d 340 struct target_section **table_pp = (struct target_section **) table_pp_char;
c906108c
SS
341 flagword aflag;
342
2b2848e2
DE
343 gdb_assert (abfd == asect->owner);
344
0f5d55d8
JB
345 /* Check the section flags, but do not discard zero-length sections, since
346 some symbols may still be attached to this section. For instance, we
347 encountered on sparc-solaris 2.10 a shared library with an empty .bss
348 section to which a symbol named "_end" was attached. The address
349 of this symbol still needs to be relocated. */
c906108c
SS
350 aflag = bfd_get_section_flags (abfd, asect);
351 if (!(aflag & SEC_ALLOC))
352 return;
0f5d55d8 353
046ac79f 354 (*table_pp)->owner = NULL;
c906108c
SS
355 (*table_pp)->the_bfd_section = asect;
356 (*table_pp)->addr = bfd_section_vma (abfd, asect);
357 (*table_pp)->endaddr = (*table_pp)->addr + bfd_section_size (abfd, asect);
358 (*table_pp)++;
359}
360
07b82ea5
PA
361int
362resize_section_table (struct target_section_table *table, int num_added)
363{
07b82ea5
PA
364 int old_count;
365 int new_count;
366
07b82ea5
PA
367 old_count = table->sections_end - table->sections;
368
369 new_count = num_added + old_count;
370
371 if (new_count)
372 {
373 table->sections = xrealloc (table->sections,
374 sizeof (struct target_section) * new_count);
375 table->sections_end = table->sections + new_count;
376 }
377 else
378 {
379 xfree (table->sections);
380 table->sections = table->sections_end = NULL;
381 }
382
383 return old_count;
384}
385
c906108c
SS
386/* Builds a section table, given args BFD, SECTABLE_PTR, SECEND_PTR.
387 Returns 0 if OK, 1 on error. */
388
389int
0542c86d
PA
390build_section_table (struct bfd *some_bfd, struct target_section **start,
391 struct target_section **end)
c906108c
SS
392{
393 unsigned count;
394
395 count = bfd_count_sections (some_bfd);
396 if (*start)
b8c9b27d 397 xfree (* start);
0542c86d 398 *start = (struct target_section *) xmalloc (count * sizeof (**start));
c906108c 399 *end = *start;
c5aa993b 400 bfd_map_over_sections (some_bfd, add_to_section_table, (char *) end);
c906108c 401 if (*end > *start + count)
3e43a32a
MS
402 internal_error (__FILE__, __LINE__,
403 _("failed internal consistency check"));
c906108c
SS
404 /* We could realloc the table, but it probably loses for most files. */
405 return 0;
406}
07b82ea5
PA
407
408/* Add the sections array defined by [SECTIONS..SECTIONS_END[ to the
409 current set of target sections. */
410
411void
046ac79f 412add_target_sections (void *owner,
ed9eebaf 413 struct target_section *sections,
07b82ea5
PA
414 struct target_section *sections_end)
415{
416 int count;
417 struct target_section_table *table = current_target_sections;
418
419 count = sections_end - sections;
420
421 if (count > 0)
422 {
423 int space = resize_section_table (table, count);
ed9eebaf 424 int i;
d7f9d729 425
ed9eebaf
TT
426 for (i = 0; i < count; ++i)
427 {
428 table->sections[space + i] = sections[i];
046ac79f 429 table->sections[space + i].owner = owner;
ed9eebaf 430 }
07b82ea5
PA
431
432 /* If these are the first file sections we can provide memory
433 from, push the file_stratum target. */
6c95b8df
PA
434 if (!using_exec_ops)
435 {
436 using_exec_ops = 1;
437 push_target (&exec_ops);
438 }
07b82ea5
PA
439 }
440}
441
76ad5e1e
NB
442/* Add the sections of OBJFILE to the current set of target sections. */
443
444void
445add_target_sections_of_objfile (struct objfile *objfile)
446{
447 struct target_section_table *table = current_target_sections;
448 struct obj_section *osect;
449 int space;
450 unsigned count = 0;
451 struct target_section *ts;
452
453 if (objfile == NULL)
454 return;
455
456 /* Compute the number of sections to add. */
457 ALL_OBJFILE_OSECTIONS (objfile, osect)
458 {
459 if (bfd_get_section_size (osect->the_bfd_section) == 0)
460 continue;
461 count++;
462 }
463
464 if (count == 0)
465 return;
466
467 space = resize_section_table (table, count);
468
469 ts = table->sections + space;
470
471 ALL_OBJFILE_OSECTIONS (objfile, osect)
472 {
473 if (bfd_get_section_size (osect->the_bfd_section) == 0)
474 continue;
475
476 gdb_assert (ts < table->sections + space + count);
477
478 ts->addr = obj_section_addr (osect);
479 ts->endaddr = obj_section_endaddr (osect);
480 ts->the_bfd_section = osect->the_bfd_section;
481 ts->owner = (void *) objfile;
482
483 ts++;
484 }
485}
486
046ac79f
JK
487/* Remove all target sections owned by OWNER.
488 OWNER must be the same value passed to add_target_sections. */
07b82ea5
PA
489
490void
046ac79f 491remove_target_sections (void *owner)
07b82ea5
PA
492{
493 struct target_section *src, *dest;
07b82ea5
PA
494 struct target_section_table *table = current_target_sections;
495
046ac79f
JK
496 gdb_assert (owner != NULL);
497
07b82ea5
PA
498 dest = table->sections;
499 for (src = table->sections; src < table->sections_end; src++)
046ac79f 500 if (src->owner != owner)
07b82ea5
PA
501 {
502 /* Keep this section. */
503 if (dest < src)
504 *dest = *src;
505 dest++;
506 }
507
508 /* If we've dropped any sections, resize the section table. */
509 if (dest < src)
510 {
511 int old_count;
512
513 old_count = resize_section_table (table, dest - src);
514
515 /* If we don't have any more sections to read memory from,
516 remove the file_stratum target from the stack. */
517 if (old_count + (dest - src) == 0)
6c95b8df
PA
518 {
519 struct program_space *pspace;
520
521 ALL_PSPACES (pspace)
522 if (pspace->target_sections.sections
523 != pspace->target_sections.sections_end)
524 return;
525
526 unpush_target (&exec_ops);
527 }
07b82ea5
PA
528 }
529}
530
c906108c 531\f
348f8c02 532
1ca49d37
YQ
533enum target_xfer_status
534exec_read_partial_read_only (gdb_byte *readbuf, ULONGEST offset,
535 ULONGEST len, ULONGEST *xfered_len)
536{
537 /* It's unduly pedantic to refuse to look at the executable for
538 read-only pieces; so do the equivalent of readonly regions aka
539 QTro packet. */
540 if (exec_bfd != NULL)
541 {
542 asection *s;
543 bfd_size_type size;
544 bfd_vma vma;
545
546 for (s = exec_bfd->sections; s; s = s->next)
547 {
548 if ((s->flags & SEC_LOAD) == 0
549 || (s->flags & SEC_READONLY) == 0)
550 continue;
551
552 vma = s->vma;
553 size = bfd_get_section_size (s);
554 if (vma <= offset && offset < (vma + size))
555 {
556 ULONGEST amt;
557
558 amt = (vma + size) - offset;
559 if (amt > len)
560 amt = len;
561
562 amt = bfd_get_section_contents (exec_bfd, s,
563 readbuf, offset - vma, amt);
564
565 if (amt == 0)
566 return TARGET_XFER_EOF;
567 else
568 {
569 *xfered_len = amt;
570 return TARGET_XFER_OK;
571 }
572 }
573 }
574 }
575
576 /* Indicate failure to find the requested memory block. */
577 return TARGET_XFER_E_IO;
578}
579
5a2eb0ef
YQ
580/* Appends all read-only memory ranges found in the target section
581 table defined by SECTIONS and SECTIONS_END, starting at (and
582 intersected with) MEMADDR for LEN bytes. Returns the augmented
583 VEC. */
584
585static VEC(mem_range_s) *
e6ca34fc 586section_table_available_memory (VEC(mem_range_s) *memory,
424447ee 587 CORE_ADDR memaddr, ULONGEST len,
e6ca34fc
PA
588 struct target_section *sections,
589 struct target_section *sections_end)
590{
591 struct target_section *p;
e6ca34fc
PA
592
593 for (p = sections; p < sections_end; p++)
594 {
2b2848e2
DE
595 if ((bfd_get_section_flags (p->the_bfd_section->owner,
596 p->the_bfd_section)
e6ca34fc
PA
597 & SEC_READONLY) == 0)
598 continue;
599
600 /* Copy the meta-data, adjusted. */
601 if (mem_ranges_overlap (p->addr, p->endaddr - p->addr, memaddr, len))
602 {
603 ULONGEST lo1, hi1, lo2, hi2;
604 struct mem_range *r;
605
606 lo1 = memaddr;
607 hi1 = memaddr + len;
608
609 lo2 = p->addr;
610 hi2 = p->endaddr;
611
612 r = VEC_safe_push (mem_range_s, memory, NULL);
613
614 r->start = max (lo1, lo2);
615 r->length = min (hi1, hi2) - r->start;
616 }
617 }
618
619 return memory;
620}
621
1ee79381
YQ
622enum target_xfer_status
623section_table_read_available_memory (gdb_byte *readbuf, ULONGEST offset,
624 ULONGEST len, ULONGEST *xfered_len)
625{
626 VEC(mem_range_s) *available_memory = NULL;
627 struct target_section_table *table;
628 struct cleanup *old_chain;
629 mem_range_s *r;
630 int i;
631
632 table = target_get_section_table (&exec_ops);
633 available_memory = section_table_available_memory (available_memory,
634 offset, len,
635 table->sections,
636 table->sections_end);
637
638 old_chain = make_cleanup (VEC_cleanup(mem_range_s),
639 &available_memory);
640
641 normalize_mem_ranges (available_memory);
642
643 for (i = 0;
644 VEC_iterate (mem_range_s, available_memory, i, r);
645 i++)
646 {
647 if (mem_ranges_overlap (r->start, r->length, offset, len))
648 {
649 CORE_ADDR end;
650 enum target_xfer_status status;
651
652 /* Get the intersection window. */
653 end = min (offset + len, r->start + r->length);
654
655 gdb_assert (end - offset <= len);
656
657 if (offset >= r->start)
658 status = exec_read_partial_read_only (readbuf, offset,
659 end - offset,
660 xfered_len);
661 else
662 {
663 *xfered_len = r->start - offset;
664 status = TARGET_XFER_E_UNAVAILABLE;
665 }
666 do_cleanups (old_chain);
667 return status;
668 }
669 }
670 do_cleanups (old_chain);
671
672 *xfered_len = len;
673 return TARGET_XFER_E_UNAVAILABLE;
674}
675
9b409511 676enum target_xfer_status
07b82ea5 677section_table_xfer_memory_partial (gdb_byte *readbuf, const gdb_byte *writebuf,
b55e14c7 678 ULONGEST offset, ULONGEST len,
9b409511 679 ULONGEST *xfered_len,
07b82ea5
PA
680 struct target_section *sections,
681 struct target_section *sections_end,
682 const char *section_name)
c906108c 683{
020cc13c 684 int res;
0542c86d 685 struct target_section *p;
07b82ea5
PA
686 ULONGEST memaddr = offset;
687 ULONGEST memend = memaddr + len;
c906108c 688
b55e14c7 689 if (len == 0)
3e43a32a
MS
690 internal_error (__FILE__, __LINE__,
691 _("failed internal consistency check"));
c906108c 692
348f8c02 693 for (p = sections; p < sections_end; p++)
c906108c 694 {
2b2848e2
DE
695 struct bfd_section *asect = p->the_bfd_section;
696 bfd *abfd = asect->owner;
697
698 if (section_name && strcmp (section_name, asect->name) != 0)
0963b4bd 699 continue; /* not the section we need. */
c906108c 700 if (memaddr >= p->addr)
3db26b01
JB
701 {
702 if (memend <= p->endaddr)
703 {
704 /* Entire transfer is within this section. */
07b82ea5 705 if (writebuf)
2b2848e2 706 res = bfd_set_section_contents (abfd, asect,
07b82ea5 707 writebuf, memaddr - p->addr,
85302095
AC
708 len);
709 else
2b2848e2 710 res = bfd_get_section_contents (abfd, asect,
07b82ea5 711 readbuf, memaddr - p->addr,
85302095 712 len);
9b409511
YQ
713
714 if (res != 0)
715 {
716 *xfered_len = len;
717 return TARGET_XFER_OK;
718 }
719 else
720 return TARGET_XFER_EOF;
3db26b01
JB
721 }
722 else if (memaddr >= p->endaddr)
723 {
724 /* This section ends before the transfer starts. */
725 continue;
726 }
727 else
728 {
729 /* This section overlaps the transfer. Just do half. */
730 len = p->endaddr - memaddr;
07b82ea5 731 if (writebuf)
2b2848e2 732 res = bfd_set_section_contents (abfd, asect,
07b82ea5 733 writebuf, memaddr - p->addr,
85302095
AC
734 len);
735 else
2b2848e2 736 res = bfd_get_section_contents (abfd, asect,
07b82ea5 737 readbuf, memaddr - p->addr,
85302095 738 len);
9b409511
YQ
739 if (res != 0)
740 {
741 *xfered_len = len;
742 return TARGET_XFER_OK;
743 }
744 else
745 return TARGET_XFER_EOF;
3db26b01
JB
746 }
747 }
c906108c
SS
748 }
749
9b409511 750 return TARGET_XFER_EOF; /* We can't help. */
c906108c 751}
348f8c02 752
70221824 753static struct target_section_table *
07b82ea5 754exec_get_section_table (struct target_ops *ops)
348f8c02 755{
07b82ea5 756 return current_target_sections;
348f8c02
PA
757}
758
9b409511 759static enum target_xfer_status
07b82ea5
PA
760exec_xfer_partial (struct target_ops *ops, enum target_object object,
761 const char *annex, gdb_byte *readbuf,
762 const gdb_byte *writebuf,
9b409511 763 ULONGEST offset, ULONGEST len, ULONGEST *xfered_len)
348f8c02 764{
07b82ea5
PA
765 struct target_section_table *table = target_get_section_table (ops);
766
767 if (object == TARGET_OBJECT_MEMORY)
768 return section_table_xfer_memory_partial (readbuf, writebuf,
9b409511 769 offset, len, xfered_len,
07b82ea5
PA
770 table->sections,
771 table->sections_end,
772 NULL);
773 else
2ed4b548 774 return TARGET_XFER_E_IO;
348f8c02 775}
c906108c 776\f
c5aa993b 777
c906108c 778void
07b82ea5 779print_section_info (struct target_section_table *t, bfd *abfd)
c906108c 780{
5af949e3 781 struct gdbarch *gdbarch = gdbarch_from_bfd (abfd);
0542c86d 782 struct target_section *p;
17a912b6 783 /* FIXME: 16 is not wide enough when gdbarch_addr_bit > 64. */
5af949e3 784 int wid = gdbarch_addr_bit (gdbarch) <= 32 ? 8 : 16;
c906108c 785
c5aa993b 786 printf_filtered ("\t`%s', ", bfd_get_filename (abfd));
c906108c 787 wrap_here (" ");
a3f17187 788 printf_filtered (_("file type %s.\n"), bfd_get_target (abfd));
c906108c 789 if (abfd == exec_bfd)
51bee8e9 790 {
3e43a32a
MS
791 /* gcc-3.4 does not like the initialization in
792 <p == t->sections_end>. */
d904de5b 793 bfd_vma displacement = 0;
2f1bdd26 794 bfd_vma entry_point;
51bee8e9
JK
795
796 for (p = t->sections; p < t->sections_end; p++)
797 {
2b2848e2
DE
798 struct bfd_section *psect = p->the_bfd_section;
799 bfd *pbfd = psect->owner;
51bee8e9 800
2b2848e2 801 if ((bfd_get_section_flags (pbfd, psect) & (SEC_ALLOC | SEC_LOAD))
51bee8e9
JK
802 != (SEC_ALLOC | SEC_LOAD))
803 continue;
804
2b2848e2
DE
805 if (bfd_get_section_vma (pbfd, psect) <= abfd->start_address
806 && abfd->start_address < (bfd_get_section_vma (pbfd, psect)
807 + bfd_get_section_size (psect)))
51bee8e9 808 {
2b2848e2 809 displacement = p->addr - bfd_get_section_vma (pbfd, psect);
51bee8e9
JK
810 break;
811 }
812 }
813 if (p == t->sections_end)
b37520b6 814 warning (_("Cannot find section for the entry point of %s."),
d904de5b 815 bfd_get_filename (abfd));
51bee8e9 816
2f1bdd26
MGD
817 entry_point = gdbarch_addr_bits_remove (gdbarch,
818 bfd_get_start_address (abfd)
819 + displacement);
51bee8e9 820 printf_filtered (_("\tEntry point: %s\n"),
2f1bdd26 821 paddress (gdbarch, entry_point));
51bee8e9 822 }
07b82ea5 823 for (p = t->sections; p < t->sections_end; p++)
c906108c 824 {
2b2848e2
DE
825 struct bfd_section *psect = p->the_bfd_section;
826 bfd *pbfd = psect->owner;
827
bb599908
PH
828 printf_filtered ("\t%s", hex_string_custom (p->addr, wid));
829 printf_filtered (" - %s", hex_string_custom (p->endaddr, wid));
bcf16802
KB
830
831 /* FIXME: A format of "08l" is not wide enough for file offsets
832 larger than 4GB. OTOH, making it "016l" isn't desirable either
833 since most output will then be much wider than necessary. It
834 may make sense to test the size of the file and choose the
835 format string accordingly. */
a3f17187 836 /* FIXME: i18n: Need to rewrite this sentence. */
c906108c
SS
837 if (info_verbose)
838 printf_filtered (" @ %s",
2b2848e2
DE
839 hex_string_custom (psect->filepos, 8));
840 printf_filtered (" is %s", bfd_section_name (pbfd, psect));
841 if (pbfd != abfd)
842 printf_filtered (" in %s", bfd_get_filename (pbfd));
c906108c
SS
843 printf_filtered ("\n");
844 }
845}
846
847static void
fba45db2 848exec_files_info (struct target_ops *t)
c906108c 849{
57008375
JK
850 if (exec_bfd)
851 print_section_info (current_target_sections, exec_bfd);
852 else
853 puts_filtered (_("\t<no file loaded>\n"));
c906108c
SS
854}
855
856static void
fba45db2 857set_section_command (char *args, int from_tty)
c906108c 858{
0542c86d 859 struct target_section *p;
c906108c
SS
860 char *secname;
861 unsigned seclen;
862 unsigned long secaddr;
863 char secprint[100];
864 long offset;
07b82ea5 865 struct target_section_table *table;
c906108c
SS
866
867 if (args == 0)
8a3fe4f8 868 error (_("Must specify section name and its virtual address"));
c906108c 869
0963b4bd 870 /* Parse out section name. */
c5aa993b 871 for (secname = args; !isspace (*args); args++);
c906108c
SS
872 seclen = args - secname;
873
0963b4bd 874 /* Parse out new virtual address. */
c906108c
SS
875 secaddr = parse_and_eval_address (args);
876
07b82ea5
PA
877 table = current_target_sections;
878 for (p = table->sections; p < table->sections_end; p++)
c5aa993b 879 {
57008375 880 if (!strncmp (secname, bfd_section_name (p->bfd,
3e43a32a 881 p->the_bfd_section), seclen)
57008375 882 && bfd_section_name (p->bfd, p->the_bfd_section)[seclen] == '\0')
c5aa993b
JM
883 {
884 offset = secaddr - p->addr;
885 p->addr += offset;
886 p->endaddr += offset;
887 if (from_tty)
888 exec_files_info (&exec_ops);
889 return;
890 }
c906108c 891 }
c906108c
SS
892 if (seclen >= sizeof (secprint))
893 seclen = sizeof (secprint) - 1;
894 strncpy (secprint, secname, seclen);
895 secprint[seclen] = '\0';
8a3fe4f8 896 error (_("Section %s not found"), secprint);
c906108c
SS
897}
898
30510692
DJ
899/* If we can find a section in FILENAME with BFD index INDEX, adjust
900 it to ADDRESS. */
c1bd25fd
DJ
901
902void
903exec_set_section_address (const char *filename, int index, CORE_ADDR address)
904{
0542c86d 905 struct target_section *p;
07b82ea5 906 struct target_section_table *table;
c1bd25fd 907
07b82ea5
PA
908 table = current_target_sections;
909 for (p = table->sections; p < table->sections_end; p++)
c1bd25fd 910 {
2b2848e2 911 if (filename_cmp (filename, p->the_bfd_section->owner->filename) == 0
30510692 912 && index == p->the_bfd_section->index)
c1bd25fd 913 {
30510692 914 p->endaddr += address - p->addr;
c1bd25fd 915 p->addr = address;
c1bd25fd
DJ
916 }
917 }
918}
919
c906108c
SS
920/* If mourn is being called in all the right places, this could be say
921 `gdb internal error' (since generic_mourn calls
922 breakpoint_init_inferior). */
923
924static int
3db08215
MM
925ignore (struct target_ops *ops, struct gdbarch *gdbarch,
926 struct bp_target_info *bp_tgt)
c906108c
SS
927{
928 return 0;
929}
930
c35b1492
PA
931static int
932exec_has_memory (struct target_ops *ops)
933{
934 /* We can provide memory if we have any file/target sections to read
935 from. */
936 return (current_target_sections->sections
937 != current_target_sections->sections_end);
938}
939
fc6691b2 940static char *exec_make_note_section (struct target_ops *self, bfd *, int *);
be4d1333 941
c906108c
SS
942/* Fill in the exec file target vector. Very few entries need to be
943 defined. */
944
be4d1333 945static void
fba45db2 946init_exec_ops (void)
c906108c
SS
947{
948 exec_ops.to_shortname = "exec";
949 exec_ops.to_longname = "Local exec file";
950 exec_ops.to_doc = "Use an executable file as a target.\n\
951Specify the filename of the executable file.";
1adeb98a 952 exec_ops.to_open = exec_open;
6c95b8df 953 exec_ops.to_close = exec_close_1;
c906108c 954 exec_ops.to_attach = find_default_attach;
07b82ea5
PA
955 exec_ops.to_xfer_partial = exec_xfer_partial;
956 exec_ops.to_get_section_table = exec_get_section_table;
c906108c
SS
957 exec_ops.to_files_info = exec_files_info;
958 exec_ops.to_insert_breakpoint = ignore;
959 exec_ops.to_remove_breakpoint = ignore;
960 exec_ops.to_create_inferior = find_default_create_inferior;
c906108c 961 exec_ops.to_stratum = file_stratum;
c35b1492 962 exec_ops.to_has_memory = exec_has_memory;
be4d1333 963 exec_ops.to_make_corefile_notes = exec_make_note_section;
b427c1bc 964 exec_ops.to_find_memory_regions = objfile_find_memory_regions;
c5aa993b 965 exec_ops.to_magic = OPS_MAGIC;
c906108c
SS
966}
967
968void
fba45db2 969_initialize_exec (void)
c906108c
SS
970{
971 struct cmd_list_element *c;
972
973 init_exec_ops ();
974
975 if (!dbx_commands)
976 {
1a966eab
AC
977 c = add_cmd ("file", class_files, file_command, _("\
978Use FILE as program to be debugged.\n\
c906108c
SS
979It is read for its symbols, for getting the contents of pure memory,\n\
980and it is the program executed when you use the `run' command.\n\
981If FILE cannot be found as specified, your execution directory path\n\
982($PATH) is searched for a command of that name.\n\
1a966eab 983No arg means to have no executable file and no symbols."), &cmdlist);
5ba2abeb 984 set_cmd_completer (c, filename_completer);
c906108c
SS
985 }
986
1a966eab
AC
987 c = add_cmd ("exec-file", class_files, exec_file_command, _("\
988Use FILE as program for getting contents of pure memory.\n\
c906108c
SS
989If FILE cannot be found as specified, your execution directory path\n\
990is searched for a command of that name.\n\
1a966eab 991No arg means have no executable file."), &cmdlist);
5ba2abeb 992 set_cmd_completer (c, filename_completer);
c906108c 993
1bedd215
AC
994 add_com ("section", class_files, set_section_command, _("\
995Change the base address of section SECTION of the exec file to ADDR.\n\
c906108c
SS
996This can be used if the exec file does not contain section addresses,\n\
997(such as in the a.out format), or when the addresses specified in the\n\
998file itself are wrong. Each section must be changed separately. The\n\
1bedd215 999``info files'' command lists all the sections and their addresses."));
c906108c 1000
5bf193a2
AC
1001 add_setshow_boolean_cmd ("write", class_support, &write_files, _("\
1002Set writing into executable and core files."), _("\
1003Show writing into executable and core files."), NULL,
1004 NULL,
920d2a44 1005 show_write_files,
5bf193a2 1006 &setlist, &showlist);
c5aa993b 1007
9852c492 1008 add_target_with_completer (&exec_ops, filename_completer);
c906108c 1009}
be4d1333
MS
1010
1011static char *
fc6691b2 1012exec_make_note_section (struct target_ops *self, bfd *obfd, int *note_size)
be4d1333 1013{
8a3fe4f8 1014 error (_("Can't create a corefile"));
be4d1333 1015}
This page took 1.318885 seconds and 4 git commands to generate.