Automatic date update in version.in
[deliverable/binutils-gdb.git] / gdb / exec.c
CommitLineData
c906108c 1/* Work with executable files, for GDB.
4646aa9d 2
42a4f53d 3 Copyright (C) 1988-2019 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "frame.h"
d55e5aa6 22#include "inferior.h"
4de283e4
TT
23#include "target.h"
24#include "gdbcmd.h"
c906108c 25#include "language.h"
4de283e4
TT
26#include "filenames.h"
27#include "symfile.h"
c906108c 28#include "objfiles.h"
4de283e4
TT
29#include "completer.h"
30#include "value.h"
31#include "exec.h"
76727919 32#include "observable.h"
4de283e4
TT
33#include "arch-utils.h"
34#include "gdbthread.h"
6c95b8df 35#include "progspace.h"
4de283e4
TT
36#include "gdb_bfd.h"
37#include "gcore.h"
38#include "source.h"
39
40#include <fcntl.h>
dbda9972 41#include "readline/readline.h"
4de283e4
TT
42#include "gdbcore.h"
43
44#include <ctype.h>
45#include <sys/stat.h>
a9a5a3d1 46#include "solist.h"
4de283e4 47#include <algorithm>
268a13a5 48#include "gdbsupport/pathstuff.h"
c906108c 49
1d8b34a7 50void (*deprecated_file_changed_hook) (const char *);
c906108c 51
d9f719f1
PA
52static const target_info exec_target_info = {
53 "exec",
54 N_("Local exec file"),
55 N_("Use an executable file as a target.\n\
56Specify the filename of the executable file.")
57};
58
c906108c
SS
59/* The target vector for executable files. */
60
f6ac5f3d
PA
61struct exec_target final : public target_ops
62{
d9f719f1
PA
63 const target_info &info () const override
64 { return exec_target_info; }
f6ac5f3d 65
66b4deae
PA
66 strata stratum () const override { return file_stratum; }
67
f6ac5f3d
PA
68 void close () override;
69 enum target_xfer_status xfer_partial (enum target_object object,
70 const char *annex,
71 gdb_byte *readbuf,
72 const gdb_byte *writebuf,
73 ULONGEST offset, ULONGEST len,
74 ULONGEST *xfered_len) override;
75 struct target_section_table *get_section_table () override;
76 void files_info () override;
77
57810aa7 78 bool has_memory () override;
f6ac5f3d
PA
79 char *make_corefile_notes (bfd *, int *) override;
80 int find_memory_regions (find_memory_region_ftype func, void *data) override;
81};
82
83static exec_target exec_ops;
c906108c 84
c906108c
SS
85/* Whether to open exec and core files read-only or read-write. */
86
87int write_files = 0;
920d2a44
AC
88static void
89show_write_files (struct ui_file *file, int from_tty,
90 struct cmd_list_element *c, const char *value)
91{
92 fprintf_filtered (file, _("Writing into executable and core files is %s.\n"),
93 value);
94}
95
c906108c 96
d9f719f1
PA
97static void
98exec_target_open (const char *args, int from_tty)
1adeb98a
FN
99{
100 target_preopen (from_tty);
101 exec_file_attach (args, from_tty);
102}
103
07b82ea5
PA
104/* Close and clear exec_bfd. If we end up with no target sections to
105 read memory from, this unpushes the exec_ops target. */
106
6c95b8df
PA
107void
108exec_close (void)
07b82ea5
PA
109{
110 if (exec_bfd)
111 {
112 bfd *abfd = exec_bfd;
07b82ea5 113
cbb099e8 114 gdb_bfd_unref (abfd);
07b82ea5
PA
115
116 /* Removing target sections may close the exec_ops target.
117 Clear exec_bfd before doing so to prevent recursion. */
118 exec_bfd = NULL;
119 exec_bfd_mtime = 0;
120
046ac79f 121 remove_target_sections (&exec_bfd);
1f0c4988
JK
122
123 xfree (exec_filename);
124 exec_filename = NULL;
07b82ea5
PA
125 }
126}
127
6c95b8df
PA
128/* This is the target_close implementation. Clears all target
129 sections and closes all executable bfds from all program spaces. */
130
f6ac5f3d
PA
131void
132exec_target::close ()
c906108c 133{
ab16fce8 134 struct program_space *ss;
5ed8105e 135 scoped_restore_current_program_space restore_pspace;
6c95b8df 136
ab16fce8 137 ALL_PSPACES (ss)
5ed8105e
PA
138 {
139 set_current_program_space (ss);
140 clear_section_table (current_target_sections);
141 exec_close ();
142 }
c906108c
SS
143}
144
f6ac5f3d 145/* See gdbcore.h. */
a10de604
GB
146
147void
ecf45d2c
SL
148try_open_exec_file (const char *exec_file_host, struct inferior *inf,
149 symfile_add_flags add_flags)
a10de604 150{
cc06b668 151 struct gdb_exception prev_err;
a10de604 152
57d1de9c
LM
153 /* exec_file_attach and symbol_file_add_main may throw an error if the file
154 cannot be opened either locally or remotely.
155
156 This happens for example, when the file is first found in the local
157 sysroot (above), and then disappears (a TOCTOU race), or when it doesn't
158 exist in the target filesystem, or when the file does exist, but
159 is not readable.
88178e82 160
57d1de9c
LM
161 Even without a symbol file, the remote-based debugging session should
162 continue normally instead of ending abruptly. Hence we catch thrown
163 errors/exceptions in the following code. */
a70b8144 164 try
57d1de9c 165 {
ecf45d2c
SL
166 /* We must do this step even if exec_file_host is NULL, so that
167 exec_file_attach will clear state. */
168 exec_file_attach (exec_file_host, add_flags & SYMFILE_VERBOSE);
57d1de9c 169 }
94aeb44b 170 catch (gdb_exception_error &err)
57d1de9c
LM
171 {
172 if (err.message != NULL)
3d6e9d23 173 warning ("%s", err.what ());
57d1de9c 174
94aeb44b 175 prev_err = std::move (err);
57d1de9c 176 }
57d1de9c 177
ecf45d2c 178 if (exec_file_host != NULL)
57d1de9c 179 {
a70b8144 180 try
ecf45d2c
SL
181 {
182 symbol_file_add_main (exec_file_host, add_flags);
183 }
230d2906 184 catch (const gdb_exception_error &err)
ecf45d2c
SL
185 {
186 if (!exception_print_same (prev_err, err))
3d6e9d23 187 warning ("%s", err.what ());
ecf45d2c 188 }
57d1de9c 189 }
ecf45d2c
SL
190}
191
192/* See gdbcore.h. */
193
194void
195exec_file_locate_attach (int pid, int defer_bp_reset, int from_tty)
196{
797bc1cb 197 char *exec_file_target;
ecf45d2c
SL
198 symfile_add_flags add_flags = 0;
199
200 /* Do nothing if we already have an executable filename. */
201 if (get_exec_file (0) != NULL)
202 return;
203
204 /* Try to determine a filename from the process itself. */
205 exec_file_target = target_pid_to_exec_file (pid);
206 if (exec_file_target == NULL)
57d1de9c 207 {
ecf45d2c
SL
208 warning (_("No executable has been specified and target does not "
209 "support\n"
210 "determining executable automatically. "
211 "Try using the \"file\" command."));
212 return;
57d1de9c 213 }
88178e82 214
797bc1cb
TT
215 gdb::unique_xmalloc_ptr<char> exec_file_host
216 = exec_file_find (exec_file_target, NULL);
ecf45d2c
SL
217
218 if (defer_bp_reset)
219 add_flags |= SYMFILE_DEFER_BP_RESET;
220
221 if (from_tty)
222 add_flags |= SYMFILE_VERBOSE;
223
224 /* Attempt to open the exec file. */
797bc1cb 225 try_open_exec_file (exec_file_host.get (), current_inferior (), add_flags);
a10de604
GB
226}
227
907083d1 228/* Set FILENAME as the new exec file.
c906108c 229
c5aa993b
JM
230 This function is intended to be behave essentially the same
231 as exec_file_command, except that the latter will detect when
232 a target is being debugged, and will ask the user whether it
233 should be shut down first. (If the answer is "no", then the
234 new file is ignored.)
c906108c 235
c5aa993b
JM
236 This file is used by exec_file_command, to do the work of opening
237 and processing the exec file after any prompting has happened.
c906108c 238
c5aa993b
JM
239 And, it is used by child_attach, when the attach command was
240 given a pid but not a exec pathname, and the attach command could
241 figure out the pathname from the pid. (In this case, we shouldn't
242 ask the user whether the current target should be shut down --
907083d1 243 we're supplying the exec pathname late for good reason.) */
c906108c
SS
244
245void
5f08566b 246exec_file_attach (const char *filename, int from_tty)
c906108c 247{
9b333ba3
TT
248 /* First, acquire a reference to the current exec_bfd. We release
249 this at the end of the function; but acquiring it now lets the
250 BFD cache return it if this call refers to the same file. */
1831a9f9 251 gdb_bfd_ref_ptr exec_bfd_holder = gdb_bfd_ref_ptr::new_reference (exec_bfd);
192b62ce 252
c906108c 253 /* Remove any previous exec file. */
6c95b8df 254 exec_close ();
c906108c
SS
255
256 /* Now open and digest the file the user requested, if any. */
257
1adeb98a
FN
258 if (!filename)
259 {
260 if (from_tty)
a3f17187 261 printf_unfiltered (_("No executable file now.\n"));
7a107747
DJ
262
263 set_gdbarch_from_file (NULL);
1adeb98a
FN
264 }
265 else
c906108c 266 {
64c0b5de 267 int load_via_target = 0;
14278e1f 268 const char *scratch_pathname, *canonical_pathname;
c906108c 269 int scratch_chan;
07b82ea5 270 struct target_section *sections = NULL, *sections_end = NULL;
d18b8b7a 271 char **matching;
c5aa993b 272
64c0b5de
GB
273 if (is_target_filename (filename))
274 {
275 if (target_filesystem_is_local ())
276 filename += strlen (TARGET_SYSROOT_PREFIX);
277 else
278 load_via_target = 1;
279 }
280
14278e1f 281 gdb::unique_xmalloc_ptr<char> canonical_storage, scratch_storage;
64c0b5de 282 if (load_via_target)
c5aa993b 283 {
64c0b5de
GB
284 /* gdb_bfd_fopen does not support "target:" filenames. */
285 if (write_files)
286 warning (_("writing into executable files is "
287 "not supported for %s sysroots"),
288 TARGET_SYSROOT_PREFIX);
289
14278e1f 290 scratch_pathname = filename;
64c0b5de 291 scratch_chan = -1;
64c0b5de 292 canonical_pathname = scratch_pathname;
c5aa993b 293 }
64c0b5de
GB
294 else
295 {
296 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
297 filename, write_files ?
298 O_RDWR | O_BINARY : O_RDONLY | O_BINARY,
e0cc99a6 299 &scratch_storage);
64c0b5de
GB
300#if defined(__GO32__) || defined(_WIN32) || defined(__CYGWIN__)
301 if (scratch_chan < 0)
302 {
0ae1c716 303 char *exename = (char *) alloca (strlen (filename) + 5);
64c0b5de
GB
304
305 strcat (strcpy (exename, filename), ".exe");
306 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
307 exename, write_files ?
308 O_RDWR | O_BINARY
309 : O_RDONLY | O_BINARY,
e0cc99a6 310 &scratch_storage);
64c0b5de 311 }
c906108c 312#endif
64c0b5de
GB
313 if (scratch_chan < 0)
314 perror_with_name (filename);
a4453b7e 315
e0cc99a6 316 scratch_pathname = scratch_storage.get ();
a4453b7e 317
64c0b5de
GB
318 /* gdb_bfd_open (and its variants) prefers canonicalized
319 pathname for better BFD caching. */
14278e1f
TT
320 canonical_storage = gdb_realpath (scratch_pathname);
321 canonical_pathname = canonical_storage.get ();
64c0b5de 322 }
1f0c4988 323
192b62ce 324 gdb_bfd_ref_ptr temp;
64c0b5de 325 if (write_files && !load_via_target)
192b62ce
TT
326 temp = gdb_bfd_fopen (canonical_pathname, gnutarget,
327 FOPEN_RUB, scratch_chan);
1c00ec6b 328 else
192b62ce
TT
329 temp = gdb_bfd_open (canonical_pathname, gnutarget, scratch_chan);
330 exec_bfd = temp.release ();
c906108c
SS
331
332 if (!exec_bfd)
9fe4a216 333 {
d5131498 334 error (_("\"%s\": could not open as an executable file: %s."),
9fe4a216
TT
335 scratch_pathname, bfd_errmsg (bfd_get_error ()));
336 }
c906108c 337
64c0b5de
GB
338 /* gdb_realpath_keepfile resolves symlinks on the local
339 filesystem and so cannot be used for "target:" files. */
1f0c4988 340 gdb_assert (exec_filename == NULL);
64c0b5de
GB
341 if (load_via_target)
342 exec_filename = xstrdup (bfd_get_filename (exec_bfd));
343 else
4971c9a7 344 exec_filename = gdb_realpath_keepfile (scratch_pathname).release ();
1f0c4988 345
d18b8b7a 346 if (!bfd_check_format_matches (exec_bfd, bfd_object, &matching))
c906108c
SS
347 {
348 /* Make sure to close exec_bfd, or else "run" might try to use
349 it. */
6c95b8df 350 exec_close ();
8a3fe4f8 351 error (_("\"%s\": not in executable format: %s"),
d18b8b7a 352 scratch_pathname,
803c08d0 353 gdb_bfd_errmsg (bfd_get_error (), matching).c_str ());
c906108c
SS
354 }
355
07b82ea5 356 if (build_section_table (exec_bfd, &sections, &sections_end))
c906108c
SS
357 {
358 /* Make sure to close exec_bfd, or else "run" might try to use
359 it. */
6c95b8df 360 exec_close ();
8a3fe4f8 361 error (_("\"%s\": can't find the file sections: %s"),
c906108c
SS
362 scratch_pathname, bfd_errmsg (bfd_get_error ()));
363 }
364
c04ea773
DJ
365 exec_bfd_mtime = bfd_get_mtime (exec_bfd);
366
c906108c
SS
367 validate_files ();
368
369 set_gdbarch_from_file (exec_bfd);
370
07b82ea5 371 /* Add the executable's sections to the current address spaces'
6c95b8df
PA
372 list of sections. This possibly pushes the exec_ops
373 target. */
ed9eebaf 374 add_target_sections (&exec_bfd, sections, sections_end);
07b82ea5 375 xfree (sections);
c906108c
SS
376
377 /* Tell display code (if any) about the changed file name. */
9a4105ab
AC
378 if (deprecated_exec_file_display_hook)
379 (*deprecated_exec_file_display_hook) (filename);
c906108c 380 }
9b333ba3 381
ce7d4522 382 bfd_cache_close_all ();
76727919 383 gdb::observers::executable_changed.notify ();
c906108c
SS
384}
385
386/* Process the first arg in ARGS as the new exec file.
387
c5aa993b
JM
388 Note that we have to explicitly ignore additional args, since we can
389 be called from file_command(), which also calls symbol_file_command()
1adeb98a
FN
390 which can take multiple args.
391
0963b4bd 392 If ARGS is NULL, we just want to close the exec file. */
c906108c 393
1adeb98a 394static void
1d8b34a7 395exec_file_command (const char *args, int from_tty)
c906108c 396{
4c42eaff
DJ
397 if (from_tty && target_has_execution
398 && !query (_("A program is being debugged already.\n"
399 "Are you sure you want to change the file? ")))
400 error (_("File not changed."));
1adeb98a
FN
401
402 if (args)
403 {
404 /* Scan through the args and pick up the first non option arg
405 as the filename. */
406
773a1edc
TT
407 gdb_argv built_argv (args);
408 char **argv = built_argv.get ();
1adeb98a
FN
409
410 for (; (*argv != NULL) && (**argv == '-'); argv++)
411 {;
412 }
413 if (*argv == NULL)
8a3fe4f8 414 error (_("No executable file name was specified"));
1adeb98a 415
773a1edc
TT
416 gdb::unique_xmalloc_ptr<char> filename (tilde_expand (*argv));
417 exec_file_attach (filename.get (), from_tty);
1adeb98a
FN
418 }
419 else
420 exec_file_attach (NULL, from_tty);
c906108c
SS
421}
422
0963b4bd 423/* Set both the exec file and the symbol file, in one command.
c906108c
SS
424 What a novelty. Why did GDB go through four major releases before this
425 command was added? */
426
427static void
1d8b34a7 428file_command (const char *arg, int from_tty)
c906108c
SS
429{
430 /* FIXME, if we lose on reading the symbol file, we should revert
431 the exec file, but that's rough. */
432 exec_file_command (arg, from_tty);
433 symbol_file_command (arg, from_tty);
9a4105ab
AC
434 if (deprecated_file_changed_hook)
435 deprecated_file_changed_hook (arg);
c906108c 436}
c906108c 437\f
c5aa993b 438
0963b4bd 439/* Locate all mappable sections of a BFD file.
c906108c
SS
440 table_pp_char is a char * to get it through bfd_map_over_sections;
441 we cast it back to its proper type. */
442
443static void
7be0c536
AC
444add_to_section_table (bfd *abfd, struct bfd_section *asect,
445 void *table_pp_char)
c906108c 446{
0542c86d 447 struct target_section **table_pp = (struct target_section **) table_pp_char;
c906108c
SS
448 flagword aflag;
449
2b2848e2
DE
450 gdb_assert (abfd == asect->owner);
451
0f5d55d8
JB
452 /* Check the section flags, but do not discard zero-length sections, since
453 some symbols may still be attached to this section. For instance, we
454 encountered on sparc-solaris 2.10 a shared library with an empty .bss
455 section to which a symbol named "_end" was attached. The address
456 of this symbol still needs to be relocated. */
c906108c
SS
457 aflag = bfd_get_section_flags (abfd, asect);
458 if (!(aflag & SEC_ALLOC))
459 return;
0f5d55d8 460
046ac79f 461 (*table_pp)->owner = NULL;
c906108c
SS
462 (*table_pp)->the_bfd_section = asect;
463 (*table_pp)->addr = bfd_section_vma (abfd, asect);
464 (*table_pp)->endaddr = (*table_pp)->addr + bfd_section_size (abfd, asect);
465 (*table_pp)++;
466}
467
a5b1fd27
DE
468/* See exec.h. */
469
470void
471clear_section_table (struct target_section_table *table)
472{
473 xfree (table->sections);
474 table->sections = table->sections_end = NULL;
475}
476
477/* Resize section table TABLE by ADJUSTMENT.
478 ADJUSTMENT may be negative, in which case the caller must have already
479 removed the sections being deleted.
480 Returns the old size. */
481
482static int
483resize_section_table (struct target_section_table *table, int adjustment)
07b82ea5 484{
07b82ea5
PA
485 int old_count;
486 int new_count;
487
07b82ea5
PA
488 old_count = table->sections_end - table->sections;
489
a5b1fd27 490 new_count = adjustment + old_count;
07b82ea5
PA
491
492 if (new_count)
493 {
224c3ddb
SM
494 table->sections = XRESIZEVEC (struct target_section, table->sections,
495 new_count);
07b82ea5
PA
496 table->sections_end = table->sections + new_count;
497 }
498 else
a5b1fd27 499 clear_section_table (table);
07b82ea5
PA
500
501 return old_count;
502}
503
c906108c
SS
504/* Builds a section table, given args BFD, SECTABLE_PTR, SECEND_PTR.
505 Returns 0 if OK, 1 on error. */
506
507int
0542c86d
PA
508build_section_table (struct bfd *some_bfd, struct target_section **start,
509 struct target_section **end)
c906108c
SS
510{
511 unsigned count;
512
513 count = bfd_count_sections (some_bfd);
514 if (*start)
b8c9b27d 515 xfree (* start);
8d749320 516 *start = XNEWVEC (struct target_section, count);
c906108c 517 *end = *start;
c5aa993b 518 bfd_map_over_sections (some_bfd, add_to_section_table, (char *) end);
c906108c 519 if (*end > *start + count)
3e43a32a
MS
520 internal_error (__FILE__, __LINE__,
521 _("failed internal consistency check"));
c906108c
SS
522 /* We could realloc the table, but it probably loses for most files. */
523 return 0;
524}
07b82ea5
PA
525
526/* Add the sections array defined by [SECTIONS..SECTIONS_END[ to the
527 current set of target sections. */
528
529void
046ac79f 530add_target_sections (void *owner,
ed9eebaf 531 struct target_section *sections,
07b82ea5
PA
532 struct target_section *sections_end)
533{
534 int count;
535 struct target_section_table *table = current_target_sections;
536
537 count = sections_end - sections;
538
539 if (count > 0)
540 {
541 int space = resize_section_table (table, count);
ed9eebaf 542 int i;
d7f9d729 543
ed9eebaf
TT
544 for (i = 0; i < count; ++i)
545 {
546 table->sections[space + i] = sections[i];
046ac79f 547 table->sections[space + i].owner = owner;
ed9eebaf 548 }
07b82ea5
PA
549
550 /* If these are the first file sections we can provide memory
551 from, push the file_stratum target. */
ab16fce8
TT
552 if (!target_is_pushed (&exec_ops))
553 push_target (&exec_ops);
07b82ea5
PA
554 }
555}
556
76ad5e1e
NB
557/* Add the sections of OBJFILE to the current set of target sections. */
558
559void
560add_target_sections_of_objfile (struct objfile *objfile)
561{
562 struct target_section_table *table = current_target_sections;
563 struct obj_section *osect;
564 int space;
565 unsigned count = 0;
566 struct target_section *ts;
567
568 if (objfile == NULL)
569 return;
570
571 /* Compute the number of sections to add. */
572 ALL_OBJFILE_OSECTIONS (objfile, osect)
573 {
574 if (bfd_get_section_size (osect->the_bfd_section) == 0)
575 continue;
576 count++;
577 }
578
579 if (count == 0)
580 return;
581
582 space = resize_section_table (table, count);
583
584 ts = table->sections + space;
585
586 ALL_OBJFILE_OSECTIONS (objfile, osect)
587 {
588 if (bfd_get_section_size (osect->the_bfd_section) == 0)
589 continue;
590
591 gdb_assert (ts < table->sections + space + count);
592
593 ts->addr = obj_section_addr (osect);
594 ts->endaddr = obj_section_endaddr (osect);
595 ts->the_bfd_section = osect->the_bfd_section;
596 ts->owner = (void *) objfile;
597
598 ts++;
599 }
600}
601
046ac79f
JK
602/* Remove all target sections owned by OWNER.
603 OWNER must be the same value passed to add_target_sections. */
07b82ea5
PA
604
605void
046ac79f 606remove_target_sections (void *owner)
07b82ea5
PA
607{
608 struct target_section *src, *dest;
07b82ea5
PA
609 struct target_section_table *table = current_target_sections;
610
046ac79f
JK
611 gdb_assert (owner != NULL);
612
07b82ea5
PA
613 dest = table->sections;
614 for (src = table->sections; src < table->sections_end; src++)
046ac79f 615 if (src->owner != owner)
07b82ea5
PA
616 {
617 /* Keep this section. */
618 if (dest < src)
619 *dest = *src;
620 dest++;
621 }
622
623 /* If we've dropped any sections, resize the section table. */
624 if (dest < src)
625 {
626 int old_count;
627
628 old_count = resize_section_table (table, dest - src);
629
630 /* If we don't have any more sections to read memory from,
631 remove the file_stratum target from the stack. */
632 if (old_count + (dest - src) == 0)
6c95b8df
PA
633 {
634 struct program_space *pspace;
635
636 ALL_PSPACES (pspace)
637 if (pspace->target_sections.sections
638 != pspace->target_sections.sections_end)
639 return;
640
641 unpush_target (&exec_ops);
642 }
07b82ea5
PA
643 }
644}
645
c906108c 646\f
348f8c02 647
1ca49d37
YQ
648enum target_xfer_status
649exec_read_partial_read_only (gdb_byte *readbuf, ULONGEST offset,
650 ULONGEST len, ULONGEST *xfered_len)
651{
652 /* It's unduly pedantic to refuse to look at the executable for
653 read-only pieces; so do the equivalent of readonly regions aka
654 QTro packet. */
655 if (exec_bfd != NULL)
656 {
657 asection *s;
658 bfd_size_type size;
659 bfd_vma vma;
660
661 for (s = exec_bfd->sections; s; s = s->next)
662 {
663 if ((s->flags & SEC_LOAD) == 0
664 || (s->flags & SEC_READONLY) == 0)
665 continue;
666
667 vma = s->vma;
668 size = bfd_get_section_size (s);
669 if (vma <= offset && offset < (vma + size))
670 {
671 ULONGEST amt;
672
673 amt = (vma + size) - offset;
674 if (amt > len)
675 amt = len;
676
677 amt = bfd_get_section_contents (exec_bfd, s,
678 readbuf, offset - vma, amt);
679
680 if (amt == 0)
681 return TARGET_XFER_EOF;
682 else
683 {
684 *xfered_len = amt;
685 return TARGET_XFER_OK;
686 }
687 }
688 }
689 }
690
691 /* Indicate failure to find the requested memory block. */
692 return TARGET_XFER_E_IO;
693}
694
a79b1bc6 695/* Return all read-only memory ranges found in the target section
5a2eb0ef 696 table defined by SECTIONS and SECTIONS_END, starting at (and
a79b1bc6 697 intersected with) MEMADDR for LEN bytes. */
5a2eb0ef 698
a79b1bc6
SM
699static std::vector<mem_range>
700section_table_available_memory (CORE_ADDR memaddr, ULONGEST len,
e6ca34fc
PA
701 struct target_section *sections,
702 struct target_section *sections_end)
703{
a79b1bc6 704 std::vector<mem_range> memory;
e6ca34fc 705
a79b1bc6 706 for (target_section *p = sections; p < sections_end; p++)
e6ca34fc 707 {
2b2848e2
DE
708 if ((bfd_get_section_flags (p->the_bfd_section->owner,
709 p->the_bfd_section)
e6ca34fc
PA
710 & SEC_READONLY) == 0)
711 continue;
712
713 /* Copy the meta-data, adjusted. */
714 if (mem_ranges_overlap (p->addr, p->endaddr - p->addr, memaddr, len))
715 {
716 ULONGEST lo1, hi1, lo2, hi2;
e6ca34fc
PA
717
718 lo1 = memaddr;
719 hi1 = memaddr + len;
720
721 lo2 = p->addr;
722 hi2 = p->endaddr;
723
a79b1bc6
SM
724 CORE_ADDR start = std::max (lo1, lo2);
725 int length = std::min (hi1, hi2) - start;
e6ca34fc 726
a79b1bc6 727 memory.emplace_back (start, length);
e6ca34fc
PA
728 }
729 }
730
731 return memory;
732}
733
1ee79381
YQ
734enum target_xfer_status
735section_table_read_available_memory (gdb_byte *readbuf, ULONGEST offset,
736 ULONGEST len, ULONGEST *xfered_len)
737{
a79b1bc6
SM
738 target_section_table *table = target_get_section_table (&exec_ops);
739 std::vector<mem_range> available_memory
740 = section_table_available_memory (offset, len,
741 table->sections, table->sections_end);
1ee79381 742
a79b1bc6 743 normalize_mem_ranges (&available_memory);
1ee79381 744
a79b1bc6 745 for (const mem_range &r : available_memory)
1ee79381 746 {
a79b1bc6 747 if (mem_ranges_overlap (r.start, r.length, offset, len))
1ee79381
YQ
748 {
749 CORE_ADDR end;
750 enum target_xfer_status status;
751
752 /* Get the intersection window. */
a79b1bc6 753 end = std::min<CORE_ADDR> (offset + len, r.start + r.length);
1ee79381
YQ
754
755 gdb_assert (end - offset <= len);
756
a79b1bc6 757 if (offset >= r.start)
1ee79381
YQ
758 status = exec_read_partial_read_only (readbuf, offset,
759 end - offset,
760 xfered_len);
761 else
762 {
a79b1bc6 763 *xfered_len = r.start - offset;
bc113b4e 764 status = TARGET_XFER_UNAVAILABLE;
1ee79381 765 }
1ee79381
YQ
766 return status;
767 }
768 }
1ee79381
YQ
769
770 *xfered_len = len;
bc113b4e 771 return TARGET_XFER_UNAVAILABLE;
1ee79381
YQ
772}
773
9b409511 774enum target_xfer_status
07b82ea5 775section_table_xfer_memory_partial (gdb_byte *readbuf, const gdb_byte *writebuf,
b55e14c7 776 ULONGEST offset, ULONGEST len,
9b409511 777 ULONGEST *xfered_len,
07b82ea5
PA
778 struct target_section *sections,
779 struct target_section *sections_end,
780 const char *section_name)
c906108c 781{
020cc13c 782 int res;
0542c86d 783 struct target_section *p;
07b82ea5
PA
784 ULONGEST memaddr = offset;
785 ULONGEST memend = memaddr + len;
c906108c 786
b55e14c7 787 if (len == 0)
3e43a32a
MS
788 internal_error (__FILE__, __LINE__,
789 _("failed internal consistency check"));
c906108c 790
348f8c02 791 for (p = sections; p < sections_end; p++)
c906108c 792 {
2b2848e2
DE
793 struct bfd_section *asect = p->the_bfd_section;
794 bfd *abfd = asect->owner;
795
796 if (section_name && strcmp (section_name, asect->name) != 0)
0963b4bd 797 continue; /* not the section we need. */
c906108c 798 if (memaddr >= p->addr)
3db26b01
JB
799 {
800 if (memend <= p->endaddr)
801 {
802 /* Entire transfer is within this section. */
07b82ea5 803 if (writebuf)
2b2848e2 804 res = bfd_set_section_contents (abfd, asect,
07b82ea5 805 writebuf, memaddr - p->addr,
85302095
AC
806 len);
807 else
2b2848e2 808 res = bfd_get_section_contents (abfd, asect,
07b82ea5 809 readbuf, memaddr - p->addr,
85302095 810 len);
9b409511
YQ
811
812 if (res != 0)
813 {
814 *xfered_len = len;
815 return TARGET_XFER_OK;
816 }
817 else
818 return TARGET_XFER_EOF;
3db26b01
JB
819 }
820 else if (memaddr >= p->endaddr)
821 {
822 /* This section ends before the transfer starts. */
823 continue;
824 }
825 else
826 {
827 /* This section overlaps the transfer. Just do half. */
828 len = p->endaddr - memaddr;
07b82ea5 829 if (writebuf)
2b2848e2 830 res = bfd_set_section_contents (abfd, asect,
07b82ea5 831 writebuf, memaddr - p->addr,
85302095
AC
832 len);
833 else
2b2848e2 834 res = bfd_get_section_contents (abfd, asect,
07b82ea5 835 readbuf, memaddr - p->addr,
85302095 836 len);
9b409511
YQ
837 if (res != 0)
838 {
839 *xfered_len = len;
840 return TARGET_XFER_OK;
841 }
842 else
843 return TARGET_XFER_EOF;
3db26b01
JB
844 }
845 }
c906108c
SS
846 }
847
9b409511 848 return TARGET_XFER_EOF; /* We can't help. */
c906108c 849}
348f8c02 850
f6ac5f3d
PA
851struct target_section_table *
852exec_target::get_section_table ()
348f8c02 853{
07b82ea5 854 return current_target_sections;
348f8c02
PA
855}
856
f6ac5f3d
PA
857enum target_xfer_status
858exec_target::xfer_partial (enum target_object object,
859 const char *annex, gdb_byte *readbuf,
860 const gdb_byte *writebuf,
861 ULONGEST offset, ULONGEST len, ULONGEST *xfered_len)
348f8c02 862{
f6ac5f3d 863 struct target_section_table *table = get_section_table ();
07b82ea5
PA
864
865 if (object == TARGET_OBJECT_MEMORY)
866 return section_table_xfer_memory_partial (readbuf, writebuf,
9b409511 867 offset, len, xfered_len,
07b82ea5
PA
868 table->sections,
869 table->sections_end,
870 NULL);
871 else
2ed4b548 872 return TARGET_XFER_E_IO;
348f8c02 873}
c906108c 874\f
c5aa993b 875
c906108c 876void
07b82ea5 877print_section_info (struct target_section_table *t, bfd *abfd)
c906108c 878{
5af949e3 879 struct gdbarch *gdbarch = gdbarch_from_bfd (abfd);
0542c86d 880 struct target_section *p;
17a912b6 881 /* FIXME: 16 is not wide enough when gdbarch_addr_bit > 64. */
5af949e3 882 int wid = gdbarch_addr_bit (gdbarch) <= 32 ? 8 : 16;
c906108c 883
c5aa993b 884 printf_filtered ("\t`%s', ", bfd_get_filename (abfd));
c906108c 885 wrap_here (" ");
a3f17187 886 printf_filtered (_("file type %s.\n"), bfd_get_target (abfd));
c906108c 887 if (abfd == exec_bfd)
51bee8e9 888 {
3e43a32a
MS
889 /* gcc-3.4 does not like the initialization in
890 <p == t->sections_end>. */
d904de5b 891 bfd_vma displacement = 0;
2f1bdd26 892 bfd_vma entry_point;
51bee8e9
JK
893
894 for (p = t->sections; p < t->sections_end; p++)
895 {
2b2848e2
DE
896 struct bfd_section *psect = p->the_bfd_section;
897 bfd *pbfd = psect->owner;
51bee8e9 898
2b2848e2 899 if ((bfd_get_section_flags (pbfd, psect) & (SEC_ALLOC | SEC_LOAD))
51bee8e9
JK
900 != (SEC_ALLOC | SEC_LOAD))
901 continue;
902
2b2848e2
DE
903 if (bfd_get_section_vma (pbfd, psect) <= abfd->start_address
904 && abfd->start_address < (bfd_get_section_vma (pbfd, psect)
905 + bfd_get_section_size (psect)))
51bee8e9 906 {
2b2848e2 907 displacement = p->addr - bfd_get_section_vma (pbfd, psect);
51bee8e9
JK
908 break;
909 }
910 }
911 if (p == t->sections_end)
b37520b6 912 warning (_("Cannot find section for the entry point of %s."),
d904de5b 913 bfd_get_filename (abfd));
51bee8e9 914
2f1bdd26
MGD
915 entry_point = gdbarch_addr_bits_remove (gdbarch,
916 bfd_get_start_address (abfd)
917 + displacement);
51bee8e9 918 printf_filtered (_("\tEntry point: %s\n"),
2f1bdd26 919 paddress (gdbarch, entry_point));
51bee8e9 920 }
07b82ea5 921 for (p = t->sections; p < t->sections_end; p++)
c906108c 922 {
2b2848e2
DE
923 struct bfd_section *psect = p->the_bfd_section;
924 bfd *pbfd = psect->owner;
925
bb599908
PH
926 printf_filtered ("\t%s", hex_string_custom (p->addr, wid));
927 printf_filtered (" - %s", hex_string_custom (p->endaddr, wid));
bcf16802
KB
928
929 /* FIXME: A format of "08l" is not wide enough for file offsets
930 larger than 4GB. OTOH, making it "016l" isn't desirable either
931 since most output will then be much wider than necessary. It
932 may make sense to test the size of the file and choose the
933 format string accordingly. */
a3f17187 934 /* FIXME: i18n: Need to rewrite this sentence. */
c906108c
SS
935 if (info_verbose)
936 printf_filtered (" @ %s",
2b2848e2
DE
937 hex_string_custom (psect->filepos, 8));
938 printf_filtered (" is %s", bfd_section_name (pbfd, psect));
939 if (pbfd != abfd)
940 printf_filtered (" in %s", bfd_get_filename (pbfd));
c906108c
SS
941 printf_filtered ("\n");
942 }
943}
944
f6ac5f3d
PA
945void
946exec_target::files_info ()
c906108c 947{
57008375
JK
948 if (exec_bfd)
949 print_section_info (current_target_sections, exec_bfd);
950 else
951 puts_filtered (_("\t<no file loaded>\n"));
c906108c
SS
952}
953
954static void
0b39b52e 955set_section_command (const char *args, int from_tty)
c906108c 956{
0542c86d 957 struct target_section *p;
0b39b52e 958 const char *secname;
c906108c
SS
959 unsigned seclen;
960 unsigned long secaddr;
961 char secprint[100];
962 long offset;
07b82ea5 963 struct target_section_table *table;
c906108c
SS
964
965 if (args == 0)
8a3fe4f8 966 error (_("Must specify section name and its virtual address"));
c906108c 967
0963b4bd 968 /* Parse out section name. */
c5aa993b 969 for (secname = args; !isspace (*args); args++);
c906108c
SS
970 seclen = args - secname;
971
0963b4bd 972 /* Parse out new virtual address. */
c906108c
SS
973 secaddr = parse_and_eval_address (args);
974
07b82ea5
PA
975 table = current_target_sections;
976 for (p = table->sections; p < table->sections_end; p++)
c5aa993b 977 {
57008375 978 if (!strncmp (secname, bfd_section_name (p->bfd,
3e43a32a 979 p->the_bfd_section), seclen)
57008375 980 && bfd_section_name (p->bfd, p->the_bfd_section)[seclen] == '\0')
c5aa993b
JM
981 {
982 offset = secaddr - p->addr;
983 p->addr += offset;
984 p->endaddr += offset;
985 if (from_tty)
f6ac5f3d 986 exec_ops.files_info ();
c5aa993b
JM
987 return;
988 }
c906108c 989 }
c906108c
SS
990 if (seclen >= sizeof (secprint))
991 seclen = sizeof (secprint) - 1;
992 strncpy (secprint, secname, seclen);
993 secprint[seclen] = '\0';
8a3fe4f8 994 error (_("Section %s not found"), secprint);
c906108c
SS
995}
996
30510692
DJ
997/* If we can find a section in FILENAME with BFD index INDEX, adjust
998 it to ADDRESS. */
c1bd25fd
DJ
999
1000void
1001exec_set_section_address (const char *filename, int index, CORE_ADDR address)
1002{
0542c86d 1003 struct target_section *p;
07b82ea5 1004 struct target_section_table *table;
c1bd25fd 1005
07b82ea5
PA
1006 table = current_target_sections;
1007 for (p = table->sections; p < table->sections_end; p++)
c1bd25fd 1008 {
2b2848e2 1009 if (filename_cmp (filename, p->the_bfd_section->owner->filename) == 0
30510692 1010 && index == p->the_bfd_section->index)
c1bd25fd 1011 {
30510692 1012 p->endaddr += address - p->addr;
c1bd25fd 1013 p->addr = address;
c1bd25fd
DJ
1014 }
1015 }
1016}
1017
57810aa7 1018bool
f6ac5f3d 1019exec_target::has_memory ()
c35b1492
PA
1020{
1021 /* We can provide memory if we have any file/target sections to read
1022 from. */
1023 return (current_target_sections->sections
1024 != current_target_sections->sections_end);
1025}
1026
f6ac5f3d
PA
1027char *
1028exec_target::make_corefile_notes (bfd *obfd, int *note_size)
83814951
TT
1029{
1030 error (_("Can't create a corefile"));
1031}
be4d1333 1032
f6ac5f3d
PA
1033int
1034exec_target::find_memory_regions (find_memory_region_ftype func, void *data)
c906108c 1035{
f6ac5f3d 1036 return objfile_find_memory_regions (this, func, data);
c906108c
SS
1037}
1038
1039void
fba45db2 1040_initialize_exec (void)
c906108c
SS
1041{
1042 struct cmd_list_element *c;
1043
c906108c
SS
1044 if (!dbx_commands)
1045 {
1a966eab
AC
1046 c = add_cmd ("file", class_files, file_command, _("\
1047Use FILE as program to be debugged.\n\
c906108c
SS
1048It is read for its symbols, for getting the contents of pure memory,\n\
1049and it is the program executed when you use the `run' command.\n\
1050If FILE cannot be found as specified, your execution directory path\n\
1051($PATH) is searched for a command of that name.\n\
1a966eab 1052No arg means to have no executable file and no symbols."), &cmdlist);
5ba2abeb 1053 set_cmd_completer (c, filename_completer);
c906108c
SS
1054 }
1055
1a966eab
AC
1056 c = add_cmd ("exec-file", class_files, exec_file_command, _("\
1057Use FILE as program for getting contents of pure memory.\n\
c906108c
SS
1058If FILE cannot be found as specified, your execution directory path\n\
1059is searched for a command of that name.\n\
1a966eab 1060No arg means have no executable file."), &cmdlist);
5ba2abeb 1061 set_cmd_completer (c, filename_completer);
c906108c 1062
1bedd215
AC
1063 add_com ("section", class_files, set_section_command, _("\
1064Change the base address of section SECTION of the exec file to ADDR.\n\
c906108c
SS
1065This can be used if the exec file does not contain section addresses,\n\
1066(such as in the a.out format), or when the addresses specified in the\n\
1067file itself are wrong. Each section must be changed separately. The\n\
1bedd215 1068``info files'' command lists all the sections and their addresses."));
c906108c 1069
5bf193a2
AC
1070 add_setshow_boolean_cmd ("write", class_support, &write_files, _("\
1071Set writing into executable and core files."), _("\
1072Show writing into executable and core files."), NULL,
1073 NULL,
920d2a44 1074 show_write_files,
5bf193a2 1075 &setlist, &showlist);
c5aa993b 1076
d9f719f1 1077 add_target (exec_target_info, exec_target_open, filename_completer);
c906108c 1078}
This page took 2.494771 seconds and 4 git commands to generate.