Remove ALL_SO_LIBS and so_list_head
[deliverable/binutils-gdb.git] / gdb / exec.c
CommitLineData
c906108c 1/* Work with executable files, for GDB.
4646aa9d 2
b811d2c2 3 Copyright (C) 1988-2020 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "frame.h"
d55e5aa6 22#include "inferior.h"
4de283e4
TT
23#include "target.h"
24#include "gdbcmd.h"
c906108c 25#include "language.h"
4de283e4
TT
26#include "filenames.h"
27#include "symfile.h"
c906108c 28#include "objfiles.h"
4de283e4
TT
29#include "completer.h"
30#include "value.h"
31#include "exec.h"
76727919 32#include "observable.h"
4de283e4
TT
33#include "arch-utils.h"
34#include "gdbthread.h"
6c95b8df 35#include "progspace.h"
53af73bf 36#include "progspace-and-thread.h"
4de283e4
TT
37#include "gdb_bfd.h"
38#include "gcore.h"
39#include "source.h"
40
41#include <fcntl.h>
e0eac551 42#include "readline/tilde.h"
4de283e4
TT
43#include "gdbcore.h"
44
45#include <ctype.h>
46#include <sys/stat.h>
a9a5a3d1 47#include "solist.h"
4de283e4 48#include <algorithm>
268a13a5 49#include "gdbsupport/pathstuff.h"
a2fedca9 50#include "cli/cli-style.h"
c906108c 51
1d8b34a7 52void (*deprecated_file_changed_hook) (const char *);
c906108c 53
d9f719f1
PA
54static const target_info exec_target_info = {
55 "exec",
56 N_("Local exec file"),
57 N_("Use an executable file as a target.\n\
58Specify the filename of the executable file.")
59};
60
c906108c
SS
61/* The target vector for executable files. */
62
f6ac5f3d
PA
63struct exec_target final : public target_ops
64{
d9f719f1
PA
65 const target_info &info () const override
66 { return exec_target_info; }
f6ac5f3d 67
66b4deae
PA
68 strata stratum () const override { return file_stratum; }
69
f6ac5f3d
PA
70 void close () override;
71 enum target_xfer_status xfer_partial (enum target_object object,
72 const char *annex,
73 gdb_byte *readbuf,
74 const gdb_byte *writebuf,
75 ULONGEST offset, ULONGEST len,
76 ULONGEST *xfered_len) override;
77 struct target_section_table *get_section_table () override;
78 void files_info () override;
79
57810aa7 80 bool has_memory () override;
f6ac5f3d
PA
81 char *make_corefile_notes (bfd *, int *) override;
82 int find_memory_regions (find_memory_region_ftype func, void *data) override;
83};
84
85static exec_target exec_ops;
c906108c 86
a2fedca9
PW
87/* How to handle a mismatch between the current exec file and the exec
88 file determined from target. */
89
90static const char *const exec_file_mismatch_names[]
91 = {"ask", "warn", "off", NULL };
92enum exec_file_mismatch_mode
93 {
94 exec_file_mismatch_ask, exec_file_mismatch_warn, exec_file_mismatch_off
95 };
96static const char *exec_file_mismatch = exec_file_mismatch_names[0];
97static enum exec_file_mismatch_mode exec_file_mismatch_mode
98 = exec_file_mismatch_ask;
99
100/* Show command. */
101static void
102show_exec_file_mismatch_command (struct ui_file *file, int from_tty,
103 struct cmd_list_element *c, const char *value)
104{
105 fprintf_filtered (gdb_stdout,
106 _("exec-file-mismatch handling is currently \"%s\".\n"),
107 exec_file_mismatch_names[exec_file_mismatch_mode]);
108}
109
110/* Set command. Change the setting for range checking. */
111static void
112set_exec_file_mismatch_command (const char *ignore,
113 int from_tty, struct cmd_list_element *c)
114{
115 for (enum exec_file_mismatch_mode mode = exec_file_mismatch_ask;
116 ;
117 mode = static_cast<enum exec_file_mismatch_mode>(1 + (int) mode))
118 {
119 if (strcmp (exec_file_mismatch, exec_file_mismatch_names[mode]) == 0)
120 {
121 exec_file_mismatch_mode = mode;
122 return;
123 }
124 if (mode == exec_file_mismatch_off)
125 internal_error (__FILE__, __LINE__,
126 _("Unrecognized exec-file-mismatch setting: \"%s\""),
127 exec_file_mismatch);
128 }
129}
130
c906108c
SS
131/* Whether to open exec and core files read-only or read-write. */
132
491144b5 133bool write_files = false;
920d2a44
AC
134static void
135show_write_files (struct ui_file *file, int from_tty,
136 struct cmd_list_element *c, const char *value)
137{
138 fprintf_filtered (file, _("Writing into executable and core files is %s.\n"),
139 value);
140}
141
c906108c 142
d9f719f1
PA
143static void
144exec_target_open (const char *args, int from_tty)
1adeb98a
FN
145{
146 target_preopen (from_tty);
147 exec_file_attach (args, from_tty);
148}
149
07b82ea5
PA
150/* Close and clear exec_bfd. If we end up with no target sections to
151 read memory from, this unpushes the exec_ops target. */
152
6c95b8df
PA
153void
154exec_close (void)
07b82ea5
PA
155{
156 if (exec_bfd)
157 {
158 bfd *abfd = exec_bfd;
07b82ea5 159
cbb099e8 160 gdb_bfd_unref (abfd);
07b82ea5
PA
161
162 /* Removing target sections may close the exec_ops target.
163 Clear exec_bfd before doing so to prevent recursion. */
164 exec_bfd = NULL;
165 exec_bfd_mtime = 0;
166
046ac79f 167 remove_target_sections (&exec_bfd);
1f0c4988
JK
168
169 xfree (exec_filename);
170 exec_filename = NULL;
07b82ea5
PA
171 }
172}
173
6c95b8df
PA
174/* This is the target_close implementation. Clears all target
175 sections and closes all executable bfds from all program spaces. */
176
f6ac5f3d
PA
177void
178exec_target::close ()
c906108c 179{
ab16fce8 180 struct program_space *ss;
5ed8105e 181 scoped_restore_current_program_space restore_pspace;
6c95b8df 182
ab16fce8 183 ALL_PSPACES (ss)
5ed8105e
PA
184 {
185 set_current_program_space (ss);
186 clear_section_table (current_target_sections);
187 exec_close ();
188 }
c906108c
SS
189}
190
f6ac5f3d 191/* See gdbcore.h. */
a10de604
GB
192
193void
ecf45d2c
SL
194try_open_exec_file (const char *exec_file_host, struct inferior *inf,
195 symfile_add_flags add_flags)
a10de604 196{
cc06b668 197 struct gdb_exception prev_err;
a10de604 198
57d1de9c
LM
199 /* exec_file_attach and symbol_file_add_main may throw an error if the file
200 cannot be opened either locally or remotely.
201
202 This happens for example, when the file is first found in the local
203 sysroot (above), and then disappears (a TOCTOU race), or when it doesn't
204 exist in the target filesystem, or when the file does exist, but
205 is not readable.
88178e82 206
57d1de9c
LM
207 Even without a symbol file, the remote-based debugging session should
208 continue normally instead of ending abruptly. Hence we catch thrown
209 errors/exceptions in the following code. */
a70b8144 210 try
57d1de9c 211 {
ecf45d2c
SL
212 /* We must do this step even if exec_file_host is NULL, so that
213 exec_file_attach will clear state. */
214 exec_file_attach (exec_file_host, add_flags & SYMFILE_VERBOSE);
57d1de9c 215 }
94aeb44b 216 catch (gdb_exception_error &err)
57d1de9c
LM
217 {
218 if (err.message != NULL)
3d6e9d23 219 warning ("%s", err.what ());
57d1de9c 220
94aeb44b 221 prev_err = std::move (err);
57d1de9c 222 }
57d1de9c 223
ecf45d2c 224 if (exec_file_host != NULL)
57d1de9c 225 {
a70b8144 226 try
ecf45d2c
SL
227 {
228 symbol_file_add_main (exec_file_host, add_flags);
229 }
230d2906 230 catch (const gdb_exception_error &err)
ecf45d2c
SL
231 {
232 if (!exception_print_same (prev_err, err))
3d6e9d23 233 warning ("%s", err.what ());
ecf45d2c 234 }
57d1de9c 235 }
ecf45d2c
SL
236}
237
238/* See gdbcore.h. */
239
a2fedca9
PW
240void
241validate_exec_file (int from_tty)
242{
243 /* If user asked to ignore the mismatch, do nothing. */
244 if (exec_file_mismatch_mode == exec_file_mismatch_off)
245 return;
246
247 const char *current_exec_file = get_exec_file (0);
248 struct inferior *inf = current_inferior ();
249 /* Try to determine a filename from the process itself. */
250 const char *pid_exec_file = target_pid_to_exec_file (inf->pid);
251
252 /* If wee cannot validate the exec file, return. */
253 if (current_exec_file == NULL || pid_exec_file == NULL)
254 return;
255
256 std::string exec_file_target (pid_exec_file);
257
258 /* In case the exec file is not local, exec_file_target has to point at
259 the target file system. */
260 if (is_target_filename (current_exec_file) && !target_filesystem_is_local ())
261 exec_file_target = TARGET_SYSROOT_PREFIX + exec_file_target;
262
263 if (exec_file_target != current_exec_file)
264 {
265 warning
266 (_("Mismatch between current exec-file %ps\n"
267 "and automatically determined exec-file %ps\n"
268 "exec-file-mismatch handling is currently \"%s\""),
269 styled_string (file_name_style.style (), current_exec_file),
270 styled_string (file_name_style.style (), exec_file_target.c_str ()),
271 exec_file_mismatch_names[exec_file_mismatch_mode]);
272 if (exec_file_mismatch_mode == exec_file_mismatch_ask)
273 {
274 symfile_add_flags add_flags = SYMFILE_MAINLINE;
275 if (from_tty)
276 add_flags |= SYMFILE_VERBOSE;
277 try
278 {
279 symbol_file_add_main (exec_file_target.c_str (), add_flags);
280 exec_file_attach (exec_file_target.c_str (), from_tty);
281 }
282 catch (gdb_exception_error &err)
283 {
284 warning (_("loading %ps %s"),
285 styled_string (file_name_style.style (),
286 exec_file_target.c_str ()),
287 err.message != NULL ? err.what () : "error");
288 }
289 }
290 }
291}
292
293/* See gdbcore.h. */
294
ecf45d2c
SL
295void
296exec_file_locate_attach (int pid, int defer_bp_reset, int from_tty)
297{
797bc1cb 298 char *exec_file_target;
ecf45d2c
SL
299 symfile_add_flags add_flags = 0;
300
301 /* Do nothing if we already have an executable filename. */
302 if (get_exec_file (0) != NULL)
303 return;
304
305 /* Try to determine a filename from the process itself. */
306 exec_file_target = target_pid_to_exec_file (pid);
307 if (exec_file_target == NULL)
57d1de9c 308 {
ecf45d2c
SL
309 warning (_("No executable has been specified and target does not "
310 "support\n"
311 "determining executable automatically. "
312 "Try using the \"file\" command."));
313 return;
57d1de9c 314 }
88178e82 315
797bc1cb
TT
316 gdb::unique_xmalloc_ptr<char> exec_file_host
317 = exec_file_find (exec_file_target, NULL);
ecf45d2c
SL
318
319 if (defer_bp_reset)
320 add_flags |= SYMFILE_DEFER_BP_RESET;
321
322 if (from_tty)
323 add_flags |= SYMFILE_VERBOSE;
324
325 /* Attempt to open the exec file. */
797bc1cb 326 try_open_exec_file (exec_file_host.get (), current_inferior (), add_flags);
a10de604
GB
327}
328
907083d1 329/* Set FILENAME as the new exec file.
c906108c 330
c5aa993b
JM
331 This function is intended to be behave essentially the same
332 as exec_file_command, except that the latter will detect when
333 a target is being debugged, and will ask the user whether it
334 should be shut down first. (If the answer is "no", then the
335 new file is ignored.)
c906108c 336
c5aa993b
JM
337 This file is used by exec_file_command, to do the work of opening
338 and processing the exec file after any prompting has happened.
c906108c 339
c5aa993b
JM
340 And, it is used by child_attach, when the attach command was
341 given a pid but not a exec pathname, and the attach command could
342 figure out the pathname from the pid. (In this case, we shouldn't
343 ask the user whether the current target should be shut down --
907083d1 344 we're supplying the exec pathname late for good reason.) */
c906108c
SS
345
346void
5f08566b 347exec_file_attach (const char *filename, int from_tty)
c906108c 348{
9b333ba3
TT
349 /* First, acquire a reference to the current exec_bfd. We release
350 this at the end of the function; but acquiring it now lets the
351 BFD cache return it if this call refers to the same file. */
1831a9f9 352 gdb_bfd_ref_ptr exec_bfd_holder = gdb_bfd_ref_ptr::new_reference (exec_bfd);
192b62ce 353
c906108c 354 /* Remove any previous exec file. */
6c95b8df 355 exec_close ();
c906108c
SS
356
357 /* Now open and digest the file the user requested, if any. */
358
1adeb98a
FN
359 if (!filename)
360 {
361 if (from_tty)
a3f17187 362 printf_unfiltered (_("No executable file now.\n"));
7a107747
DJ
363
364 set_gdbarch_from_file (NULL);
1adeb98a
FN
365 }
366 else
c906108c 367 {
64c0b5de 368 int load_via_target = 0;
14278e1f 369 const char *scratch_pathname, *canonical_pathname;
c906108c 370 int scratch_chan;
07b82ea5 371 struct target_section *sections = NULL, *sections_end = NULL;
d18b8b7a 372 char **matching;
c5aa993b 373
64c0b5de
GB
374 if (is_target_filename (filename))
375 {
376 if (target_filesystem_is_local ())
377 filename += strlen (TARGET_SYSROOT_PREFIX);
378 else
379 load_via_target = 1;
380 }
381
14278e1f 382 gdb::unique_xmalloc_ptr<char> canonical_storage, scratch_storage;
64c0b5de 383 if (load_via_target)
c5aa993b 384 {
64c0b5de
GB
385 /* gdb_bfd_fopen does not support "target:" filenames. */
386 if (write_files)
387 warning (_("writing into executable files is "
388 "not supported for %s sysroots"),
389 TARGET_SYSROOT_PREFIX);
390
14278e1f 391 scratch_pathname = filename;
64c0b5de 392 scratch_chan = -1;
64c0b5de 393 canonical_pathname = scratch_pathname;
c5aa993b 394 }
64c0b5de
GB
395 else
396 {
397 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
398 filename, write_files ?
399 O_RDWR | O_BINARY : O_RDONLY | O_BINARY,
e0cc99a6 400 &scratch_storage);
64c0b5de
GB
401#if defined(__GO32__) || defined(_WIN32) || defined(__CYGWIN__)
402 if (scratch_chan < 0)
403 {
0ae1c716 404 char *exename = (char *) alloca (strlen (filename) + 5);
64c0b5de
GB
405
406 strcat (strcpy (exename, filename), ".exe");
407 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
408 exename, write_files ?
409 O_RDWR | O_BINARY
410 : O_RDONLY | O_BINARY,
e0cc99a6 411 &scratch_storage);
64c0b5de 412 }
c906108c 413#endif
64c0b5de
GB
414 if (scratch_chan < 0)
415 perror_with_name (filename);
a4453b7e 416
e0cc99a6 417 scratch_pathname = scratch_storage.get ();
a4453b7e 418
64c0b5de
GB
419 /* gdb_bfd_open (and its variants) prefers canonicalized
420 pathname for better BFD caching. */
14278e1f
TT
421 canonical_storage = gdb_realpath (scratch_pathname);
422 canonical_pathname = canonical_storage.get ();
64c0b5de 423 }
1f0c4988 424
192b62ce 425 gdb_bfd_ref_ptr temp;
64c0b5de 426 if (write_files && !load_via_target)
192b62ce
TT
427 temp = gdb_bfd_fopen (canonical_pathname, gnutarget,
428 FOPEN_RUB, scratch_chan);
1c00ec6b 429 else
192b62ce
TT
430 temp = gdb_bfd_open (canonical_pathname, gnutarget, scratch_chan);
431 exec_bfd = temp.release ();
c906108c
SS
432
433 if (!exec_bfd)
9fe4a216 434 {
a2fedca9
PW
435 error (_("\"%ps\": could not open as an executable file: %s."),
436 styled_string (file_name_style.style (), scratch_pathname),
437 bfd_errmsg (bfd_get_error ()));
9fe4a216 438 }
c906108c 439
64c0b5de
GB
440 /* gdb_realpath_keepfile resolves symlinks on the local
441 filesystem and so cannot be used for "target:" files. */
1f0c4988 442 gdb_assert (exec_filename == NULL);
64c0b5de
GB
443 if (load_via_target)
444 exec_filename = xstrdup (bfd_get_filename (exec_bfd));
445 else
4971c9a7 446 exec_filename = gdb_realpath_keepfile (scratch_pathname).release ();
1f0c4988 447
d18b8b7a 448 if (!bfd_check_format_matches (exec_bfd, bfd_object, &matching))
c906108c
SS
449 {
450 /* Make sure to close exec_bfd, or else "run" might try to use
451 it. */
6c95b8df 452 exec_close ();
a2fedca9
PW
453 error (_("\"%ps\": not in executable format: %s"),
454 styled_string (file_name_style.style (), scratch_pathname),
803c08d0 455 gdb_bfd_errmsg (bfd_get_error (), matching).c_str ());
c906108c
SS
456 }
457
07b82ea5 458 if (build_section_table (exec_bfd, &sections, &sections_end))
c906108c
SS
459 {
460 /* Make sure to close exec_bfd, or else "run" might try to use
461 it. */
6c95b8df 462 exec_close ();
a2fedca9
PW
463 error (_("\"%ps\": can't find the file sections: %s"),
464 styled_string (file_name_style.style (), scratch_pathname),
465 bfd_errmsg (bfd_get_error ()));
c906108c
SS
466 }
467
c04ea773
DJ
468 exec_bfd_mtime = bfd_get_mtime (exec_bfd);
469
c906108c
SS
470 validate_files ();
471
472 set_gdbarch_from_file (exec_bfd);
473
07b82ea5 474 /* Add the executable's sections to the current address spaces'
6c95b8df
PA
475 list of sections. This possibly pushes the exec_ops
476 target. */
ed9eebaf 477 add_target_sections (&exec_bfd, sections, sections_end);
07b82ea5 478 xfree (sections);
c906108c
SS
479
480 /* Tell display code (if any) about the changed file name. */
9a4105ab
AC
481 if (deprecated_exec_file_display_hook)
482 (*deprecated_exec_file_display_hook) (filename);
c906108c 483 }
9b333ba3 484
ce7d4522 485 bfd_cache_close_all ();
76727919 486 gdb::observers::executable_changed.notify ();
c906108c
SS
487}
488
489/* Process the first arg in ARGS as the new exec file.
490
c5aa993b
JM
491 Note that we have to explicitly ignore additional args, since we can
492 be called from file_command(), which also calls symbol_file_command()
1adeb98a
FN
493 which can take multiple args.
494
0963b4bd 495 If ARGS is NULL, we just want to close the exec file. */
c906108c 496
1adeb98a 497static void
1d8b34a7 498exec_file_command (const char *args, int from_tty)
c906108c 499{
4c42eaff
DJ
500 if (from_tty && target_has_execution
501 && !query (_("A program is being debugged already.\n"
502 "Are you sure you want to change the file? ")))
503 error (_("File not changed."));
1adeb98a
FN
504
505 if (args)
506 {
507 /* Scan through the args and pick up the first non option arg
508 as the filename. */
509
773a1edc
TT
510 gdb_argv built_argv (args);
511 char **argv = built_argv.get ();
1adeb98a
FN
512
513 for (; (*argv != NULL) && (**argv == '-'); argv++)
514 {;
515 }
516 if (*argv == NULL)
8a3fe4f8 517 error (_("No executable file name was specified"));
1adeb98a 518
773a1edc
TT
519 gdb::unique_xmalloc_ptr<char> filename (tilde_expand (*argv));
520 exec_file_attach (filename.get (), from_tty);
1adeb98a
FN
521 }
522 else
523 exec_file_attach (NULL, from_tty);
c906108c
SS
524}
525
0963b4bd 526/* Set both the exec file and the symbol file, in one command.
c906108c
SS
527 What a novelty. Why did GDB go through four major releases before this
528 command was added? */
529
530static void
1d8b34a7 531file_command (const char *arg, int from_tty)
c906108c
SS
532{
533 /* FIXME, if we lose on reading the symbol file, we should revert
534 the exec file, but that's rough. */
535 exec_file_command (arg, from_tty);
536 symbol_file_command (arg, from_tty);
9a4105ab
AC
537 if (deprecated_file_changed_hook)
538 deprecated_file_changed_hook (arg);
c906108c 539}
c906108c 540\f
c5aa993b 541
0963b4bd 542/* Locate all mappable sections of a BFD file.
c906108c
SS
543 table_pp_char is a char * to get it through bfd_map_over_sections;
544 we cast it back to its proper type. */
545
546static void
7be0c536
AC
547add_to_section_table (bfd *abfd, struct bfd_section *asect,
548 void *table_pp_char)
c906108c 549{
0542c86d 550 struct target_section **table_pp = (struct target_section **) table_pp_char;
c906108c
SS
551 flagword aflag;
552
2b2848e2
DE
553 gdb_assert (abfd == asect->owner);
554
0f5d55d8
JB
555 /* Check the section flags, but do not discard zero-length sections, since
556 some symbols may still be attached to this section. For instance, we
557 encountered on sparc-solaris 2.10 a shared library with an empty .bss
558 section to which a symbol named "_end" was attached. The address
559 of this symbol still needs to be relocated. */
fd361982 560 aflag = bfd_section_flags (asect);
c906108c
SS
561 if (!(aflag & SEC_ALLOC))
562 return;
0f5d55d8 563
046ac79f 564 (*table_pp)->owner = NULL;
c906108c 565 (*table_pp)->the_bfd_section = asect;
fd361982
AM
566 (*table_pp)->addr = bfd_section_vma (asect);
567 (*table_pp)->endaddr = (*table_pp)->addr + bfd_section_size (asect);
c906108c
SS
568 (*table_pp)++;
569}
570
a5b1fd27
DE
571/* See exec.h. */
572
573void
574clear_section_table (struct target_section_table *table)
575{
576 xfree (table->sections);
577 table->sections = table->sections_end = NULL;
578}
579
580/* Resize section table TABLE by ADJUSTMENT.
581 ADJUSTMENT may be negative, in which case the caller must have already
582 removed the sections being deleted.
583 Returns the old size. */
584
585static int
586resize_section_table (struct target_section_table *table, int adjustment)
07b82ea5 587{
07b82ea5
PA
588 int old_count;
589 int new_count;
590
07b82ea5
PA
591 old_count = table->sections_end - table->sections;
592
a5b1fd27 593 new_count = adjustment + old_count;
07b82ea5
PA
594
595 if (new_count)
596 {
224c3ddb
SM
597 table->sections = XRESIZEVEC (struct target_section, table->sections,
598 new_count);
07b82ea5
PA
599 table->sections_end = table->sections + new_count;
600 }
601 else
a5b1fd27 602 clear_section_table (table);
07b82ea5
PA
603
604 return old_count;
605}
606
c906108c
SS
607/* Builds a section table, given args BFD, SECTABLE_PTR, SECEND_PTR.
608 Returns 0 if OK, 1 on error. */
609
610int
0542c86d
PA
611build_section_table (struct bfd *some_bfd, struct target_section **start,
612 struct target_section **end)
c906108c
SS
613{
614 unsigned count;
615
616 count = bfd_count_sections (some_bfd);
617 if (*start)
b8c9b27d 618 xfree (* start);
8d749320 619 *start = XNEWVEC (struct target_section, count);
c906108c 620 *end = *start;
c5aa993b 621 bfd_map_over_sections (some_bfd, add_to_section_table, (char *) end);
e2ff18a0
SM
622
623 gdb_assert (*end <= *start + count);
624
c906108c
SS
625 /* We could realloc the table, but it probably loses for most files. */
626 return 0;
627}
07b82ea5
PA
628
629/* Add the sections array defined by [SECTIONS..SECTIONS_END[ to the
630 current set of target sections. */
631
632void
046ac79f 633add_target_sections (void *owner,
ed9eebaf 634 struct target_section *sections,
07b82ea5
PA
635 struct target_section *sections_end)
636{
637 int count;
638 struct target_section_table *table = current_target_sections;
639
640 count = sections_end - sections;
641
642 if (count > 0)
643 {
644 int space = resize_section_table (table, count);
ed9eebaf 645 int i;
d7f9d729 646
ed9eebaf
TT
647 for (i = 0; i < count; ++i)
648 {
649 table->sections[space + i] = sections[i];
046ac79f 650 table->sections[space + i].owner = owner;
ed9eebaf 651 }
07b82ea5 652
53af73bf 653 scoped_restore_current_pspace_and_thread restore_pspace_thread;
5b6d1e4f
PA
654 program_space *curr_pspace = current_program_space;
655
07b82ea5 656 /* If these are the first file sections we can provide memory
5b6d1e4f
PA
657 from, push the file_stratum target. Must do this in all
658 inferiors sharing the program space. */
659 for (inferior *inf : all_inferiors ())
660 {
661 if (inf->pspace != curr_pspace)
662 continue;
663
664 if (inf->target_is_pushed (&exec_ops))
665 continue;
666
667 switch_to_inferior_no_thread (inf);
668 push_target (&exec_ops);
669 }
07b82ea5
PA
670 }
671}
672
76ad5e1e
NB
673/* Add the sections of OBJFILE to the current set of target sections. */
674
675void
676add_target_sections_of_objfile (struct objfile *objfile)
677{
678 struct target_section_table *table = current_target_sections;
679 struct obj_section *osect;
680 int space;
681 unsigned count = 0;
682 struct target_section *ts;
683
684 if (objfile == NULL)
685 return;
686
687 /* Compute the number of sections to add. */
688 ALL_OBJFILE_OSECTIONS (objfile, osect)
689 {
fd361982 690 if (bfd_section_size (osect->the_bfd_section) == 0)
76ad5e1e
NB
691 continue;
692 count++;
693 }
694
695 if (count == 0)
696 return;
697
698 space = resize_section_table (table, count);
699
700 ts = table->sections + space;
701
702 ALL_OBJFILE_OSECTIONS (objfile, osect)
703 {
fd361982 704 if (bfd_section_size (osect->the_bfd_section) == 0)
76ad5e1e
NB
705 continue;
706
707 gdb_assert (ts < table->sections + space + count);
708
709 ts->addr = obj_section_addr (osect);
710 ts->endaddr = obj_section_endaddr (osect);
711 ts->the_bfd_section = osect->the_bfd_section;
712 ts->owner = (void *) objfile;
713
714 ts++;
715 }
716}
717
046ac79f
JK
718/* Remove all target sections owned by OWNER.
719 OWNER must be the same value passed to add_target_sections. */
07b82ea5
PA
720
721void
046ac79f 722remove_target_sections (void *owner)
07b82ea5
PA
723{
724 struct target_section *src, *dest;
07b82ea5
PA
725 struct target_section_table *table = current_target_sections;
726
046ac79f
JK
727 gdb_assert (owner != NULL);
728
07b82ea5
PA
729 dest = table->sections;
730 for (src = table->sections; src < table->sections_end; src++)
046ac79f 731 if (src->owner != owner)
07b82ea5
PA
732 {
733 /* Keep this section. */
734 if (dest < src)
735 *dest = *src;
736 dest++;
737 }
738
739 /* If we've dropped any sections, resize the section table. */
740 if (dest < src)
741 {
742 int old_count;
743
744 old_count = resize_section_table (table, dest - src);
745
746 /* If we don't have any more sections to read memory from,
5b6d1e4f
PA
747 remove the file_stratum target from the stack of each
748 inferior sharing the program space. */
07b82ea5 749 if (old_count + (dest - src) == 0)
6c95b8df 750 {
53af73bf 751 scoped_restore_current_pspace_and_thread restore_pspace_thread;
5b6d1e4f
PA
752 program_space *curr_pspace = current_program_space;
753
754 for (inferior *inf : all_inferiors ())
755 {
756 if (inf->pspace != curr_pspace)
757 continue;
6c95b8df 758
5b6d1e4f
PA
759 if (inf->pspace->target_sections.sections
760 != inf->pspace->target_sections.sections_end)
761 continue;
6c95b8df 762
5b6d1e4f
PA
763 switch_to_inferior_no_thread (inf);
764 unpush_target (&exec_ops);
765 }
6c95b8df 766 }
07b82ea5
PA
767 }
768}
769
5b6d1e4f
PA
770/* See exec.h. */
771
772void
773exec_on_vfork ()
774{
775 if (current_program_space->target_sections.sections
776 != current_program_space->target_sections.sections_end)
777 push_target (&exec_ops);
778}
779
c906108c 780\f
348f8c02 781
1ca49d37
YQ
782enum target_xfer_status
783exec_read_partial_read_only (gdb_byte *readbuf, ULONGEST offset,
784 ULONGEST len, ULONGEST *xfered_len)
785{
786 /* It's unduly pedantic to refuse to look at the executable for
787 read-only pieces; so do the equivalent of readonly regions aka
788 QTro packet. */
789 if (exec_bfd != NULL)
790 {
791 asection *s;
792 bfd_size_type size;
793 bfd_vma vma;
794
795 for (s = exec_bfd->sections; s; s = s->next)
796 {
797 if ((s->flags & SEC_LOAD) == 0
798 || (s->flags & SEC_READONLY) == 0)
799 continue;
800
801 vma = s->vma;
fd361982 802 size = bfd_section_size (s);
1ca49d37
YQ
803 if (vma <= offset && offset < (vma + size))
804 {
805 ULONGEST amt;
806
807 amt = (vma + size) - offset;
808 if (amt > len)
809 amt = len;
810
811 amt = bfd_get_section_contents (exec_bfd, s,
812 readbuf, offset - vma, amt);
813
814 if (amt == 0)
815 return TARGET_XFER_EOF;
816 else
817 {
818 *xfered_len = amt;
819 return TARGET_XFER_OK;
820 }
821 }
822 }
823 }
824
825 /* Indicate failure to find the requested memory block. */
826 return TARGET_XFER_E_IO;
827}
828
a79b1bc6 829/* Return all read-only memory ranges found in the target section
5a2eb0ef 830 table defined by SECTIONS and SECTIONS_END, starting at (and
a79b1bc6 831 intersected with) MEMADDR for LEN bytes. */
5a2eb0ef 832
a79b1bc6
SM
833static std::vector<mem_range>
834section_table_available_memory (CORE_ADDR memaddr, ULONGEST len,
e6ca34fc
PA
835 struct target_section *sections,
836 struct target_section *sections_end)
837{
a79b1bc6 838 std::vector<mem_range> memory;
e6ca34fc 839
a79b1bc6 840 for (target_section *p = sections; p < sections_end; p++)
e6ca34fc 841 {
fd361982 842 if ((bfd_section_flags (p->the_bfd_section) & SEC_READONLY) == 0)
e6ca34fc
PA
843 continue;
844
845 /* Copy the meta-data, adjusted. */
846 if (mem_ranges_overlap (p->addr, p->endaddr - p->addr, memaddr, len))
847 {
848 ULONGEST lo1, hi1, lo2, hi2;
e6ca34fc
PA
849
850 lo1 = memaddr;
851 hi1 = memaddr + len;
852
853 lo2 = p->addr;
854 hi2 = p->endaddr;
855
a79b1bc6
SM
856 CORE_ADDR start = std::max (lo1, lo2);
857 int length = std::min (hi1, hi2) - start;
e6ca34fc 858
a79b1bc6 859 memory.emplace_back (start, length);
e6ca34fc
PA
860 }
861 }
862
863 return memory;
864}
865
1ee79381
YQ
866enum target_xfer_status
867section_table_read_available_memory (gdb_byte *readbuf, ULONGEST offset,
868 ULONGEST len, ULONGEST *xfered_len)
869{
a79b1bc6
SM
870 target_section_table *table = target_get_section_table (&exec_ops);
871 std::vector<mem_range> available_memory
872 = section_table_available_memory (offset, len,
873 table->sections, table->sections_end);
1ee79381 874
a79b1bc6 875 normalize_mem_ranges (&available_memory);
1ee79381 876
a79b1bc6 877 for (const mem_range &r : available_memory)
1ee79381 878 {
a79b1bc6 879 if (mem_ranges_overlap (r.start, r.length, offset, len))
1ee79381
YQ
880 {
881 CORE_ADDR end;
882 enum target_xfer_status status;
883
884 /* Get the intersection window. */
a79b1bc6 885 end = std::min<CORE_ADDR> (offset + len, r.start + r.length);
1ee79381
YQ
886
887 gdb_assert (end - offset <= len);
888
a79b1bc6 889 if (offset >= r.start)
1ee79381
YQ
890 status = exec_read_partial_read_only (readbuf, offset,
891 end - offset,
892 xfered_len);
893 else
894 {
a79b1bc6 895 *xfered_len = r.start - offset;
bc113b4e 896 status = TARGET_XFER_UNAVAILABLE;
1ee79381 897 }
1ee79381
YQ
898 return status;
899 }
900 }
1ee79381
YQ
901
902 *xfered_len = len;
bc113b4e 903 return TARGET_XFER_UNAVAILABLE;
1ee79381
YQ
904}
905
9b409511 906enum target_xfer_status
07b82ea5 907section_table_xfer_memory_partial (gdb_byte *readbuf, const gdb_byte *writebuf,
b55e14c7 908 ULONGEST offset, ULONGEST len,
9b409511 909 ULONGEST *xfered_len,
07b82ea5
PA
910 struct target_section *sections,
911 struct target_section *sections_end,
912 const char *section_name)
c906108c 913{
020cc13c 914 int res;
0542c86d 915 struct target_section *p;
07b82ea5
PA
916 ULONGEST memaddr = offset;
917 ULONGEST memend = memaddr + len;
c906108c 918
e2ff18a0 919 gdb_assert (len != 0);
c906108c 920
348f8c02 921 for (p = sections; p < sections_end; p++)
c906108c 922 {
2b2848e2
DE
923 struct bfd_section *asect = p->the_bfd_section;
924 bfd *abfd = asect->owner;
925
926 if (section_name && strcmp (section_name, asect->name) != 0)
0963b4bd 927 continue; /* not the section we need. */
c906108c 928 if (memaddr >= p->addr)
3db26b01
JB
929 {
930 if (memend <= p->endaddr)
931 {
932 /* Entire transfer is within this section. */
07b82ea5 933 if (writebuf)
2b2848e2 934 res = bfd_set_section_contents (abfd, asect,
07b82ea5 935 writebuf, memaddr - p->addr,
85302095
AC
936 len);
937 else
2b2848e2 938 res = bfd_get_section_contents (abfd, asect,
07b82ea5 939 readbuf, memaddr - p->addr,
85302095 940 len);
9b409511
YQ
941
942 if (res != 0)
943 {
944 *xfered_len = len;
945 return TARGET_XFER_OK;
946 }
947 else
948 return TARGET_XFER_EOF;
3db26b01
JB
949 }
950 else if (memaddr >= p->endaddr)
951 {
952 /* This section ends before the transfer starts. */
953 continue;
954 }
955 else
956 {
957 /* This section overlaps the transfer. Just do half. */
958 len = p->endaddr - memaddr;
07b82ea5 959 if (writebuf)
2b2848e2 960 res = bfd_set_section_contents (abfd, asect,
07b82ea5 961 writebuf, memaddr - p->addr,
85302095
AC
962 len);
963 else
2b2848e2 964 res = bfd_get_section_contents (abfd, asect,
07b82ea5 965 readbuf, memaddr - p->addr,
85302095 966 len);
9b409511
YQ
967 if (res != 0)
968 {
969 *xfered_len = len;
970 return TARGET_XFER_OK;
971 }
972 else
973 return TARGET_XFER_EOF;
3db26b01
JB
974 }
975 }
c906108c
SS
976 }
977
9b409511 978 return TARGET_XFER_EOF; /* We can't help. */
c906108c 979}
348f8c02 980
f6ac5f3d
PA
981struct target_section_table *
982exec_target::get_section_table ()
348f8c02 983{
07b82ea5 984 return current_target_sections;
348f8c02
PA
985}
986
f6ac5f3d
PA
987enum target_xfer_status
988exec_target::xfer_partial (enum target_object object,
989 const char *annex, gdb_byte *readbuf,
990 const gdb_byte *writebuf,
991 ULONGEST offset, ULONGEST len, ULONGEST *xfered_len)
348f8c02 992{
f6ac5f3d 993 struct target_section_table *table = get_section_table ();
07b82ea5
PA
994
995 if (object == TARGET_OBJECT_MEMORY)
996 return section_table_xfer_memory_partial (readbuf, writebuf,
9b409511 997 offset, len, xfered_len,
07b82ea5
PA
998 table->sections,
999 table->sections_end,
1000 NULL);
1001 else
2ed4b548 1002 return TARGET_XFER_E_IO;
348f8c02 1003}
c906108c 1004\f
c5aa993b 1005
c906108c 1006void
07b82ea5 1007print_section_info (struct target_section_table *t, bfd *abfd)
c906108c 1008{
5af949e3 1009 struct gdbarch *gdbarch = gdbarch_from_bfd (abfd);
0542c86d 1010 struct target_section *p;
17a912b6 1011 /* FIXME: 16 is not wide enough when gdbarch_addr_bit > 64. */
5af949e3 1012 int wid = gdbarch_addr_bit (gdbarch) <= 32 ? 8 : 16;
c906108c 1013
a2fedca9
PW
1014 printf_filtered ("\t`%ps', ",
1015 styled_string (file_name_style.style (),
1016 bfd_get_filename (abfd)));
c906108c 1017 wrap_here (" ");
a3f17187 1018 printf_filtered (_("file type %s.\n"), bfd_get_target (abfd));
c906108c 1019 if (abfd == exec_bfd)
51bee8e9 1020 {
3e43a32a
MS
1021 /* gcc-3.4 does not like the initialization in
1022 <p == t->sections_end>. */
d904de5b 1023 bfd_vma displacement = 0;
2f1bdd26 1024 bfd_vma entry_point;
51bee8e9
JK
1025
1026 for (p = t->sections; p < t->sections_end; p++)
1027 {
2b2848e2 1028 struct bfd_section *psect = p->the_bfd_section;
51bee8e9 1029
fd361982 1030 if ((bfd_section_flags (psect) & (SEC_ALLOC | SEC_LOAD))
51bee8e9
JK
1031 != (SEC_ALLOC | SEC_LOAD))
1032 continue;
1033
fd361982
AM
1034 if (bfd_section_vma (psect) <= abfd->start_address
1035 && abfd->start_address < (bfd_section_vma (psect)
1036 + bfd_section_size (psect)))
51bee8e9 1037 {
fd361982 1038 displacement = p->addr - bfd_section_vma (psect);
51bee8e9
JK
1039 break;
1040 }
1041 }
1042 if (p == t->sections_end)
a2fedca9
PW
1043 warning (_("Cannot find section for the entry point of %ps."),
1044 styled_string (file_name_style.style (),
1045 bfd_get_filename (abfd)));
51bee8e9 1046
2f1bdd26
MGD
1047 entry_point = gdbarch_addr_bits_remove (gdbarch,
1048 bfd_get_start_address (abfd)
1049 + displacement);
51bee8e9 1050 printf_filtered (_("\tEntry point: %s\n"),
2f1bdd26 1051 paddress (gdbarch, entry_point));
51bee8e9 1052 }
07b82ea5 1053 for (p = t->sections; p < t->sections_end; p++)
c906108c 1054 {
2b2848e2
DE
1055 struct bfd_section *psect = p->the_bfd_section;
1056 bfd *pbfd = psect->owner;
1057
bb599908
PH
1058 printf_filtered ("\t%s", hex_string_custom (p->addr, wid));
1059 printf_filtered (" - %s", hex_string_custom (p->endaddr, wid));
bcf16802
KB
1060
1061 /* FIXME: A format of "08l" is not wide enough for file offsets
1062 larger than 4GB. OTOH, making it "016l" isn't desirable either
1063 since most output will then be much wider than necessary. It
1064 may make sense to test the size of the file and choose the
1065 format string accordingly. */
a3f17187 1066 /* FIXME: i18n: Need to rewrite this sentence. */
c906108c
SS
1067 if (info_verbose)
1068 printf_filtered (" @ %s",
2b2848e2 1069 hex_string_custom (psect->filepos, 8));
fd361982 1070 printf_filtered (" is %s", bfd_section_name (psect));
2b2848e2 1071 if (pbfd != abfd)
a2fedca9
PW
1072 printf_filtered (" in %ps",
1073 styled_string (file_name_style.style (),
1074 bfd_get_filename (pbfd)));
c906108c
SS
1075 printf_filtered ("\n");
1076 }
1077}
1078
f6ac5f3d
PA
1079void
1080exec_target::files_info ()
c906108c 1081{
57008375
JK
1082 if (exec_bfd)
1083 print_section_info (current_target_sections, exec_bfd);
1084 else
1085 puts_filtered (_("\t<no file loaded>\n"));
c906108c
SS
1086}
1087
1088static void
0b39b52e 1089set_section_command (const char *args, int from_tty)
c906108c 1090{
0542c86d 1091 struct target_section *p;
0b39b52e 1092 const char *secname;
c906108c
SS
1093 unsigned seclen;
1094 unsigned long secaddr;
1095 char secprint[100];
1096 long offset;
07b82ea5 1097 struct target_section_table *table;
c906108c
SS
1098
1099 if (args == 0)
8a3fe4f8 1100 error (_("Must specify section name and its virtual address"));
c906108c 1101
0963b4bd 1102 /* Parse out section name. */
c5aa993b 1103 for (secname = args; !isspace (*args); args++);
c906108c
SS
1104 seclen = args - secname;
1105
0963b4bd 1106 /* Parse out new virtual address. */
c906108c
SS
1107 secaddr = parse_and_eval_address (args);
1108
07b82ea5
PA
1109 table = current_target_sections;
1110 for (p = table->sections; p < table->sections_end; p++)
c5aa993b 1111 {
fd361982
AM
1112 if (!strncmp (secname, bfd_section_name (p->the_bfd_section), seclen)
1113 && bfd_section_name (p->the_bfd_section)[seclen] == '\0')
c5aa993b
JM
1114 {
1115 offset = secaddr - p->addr;
1116 p->addr += offset;
1117 p->endaddr += offset;
1118 if (from_tty)
f6ac5f3d 1119 exec_ops.files_info ();
c5aa993b
JM
1120 return;
1121 }
c906108c 1122 }
c906108c
SS
1123 if (seclen >= sizeof (secprint))
1124 seclen = sizeof (secprint) - 1;
1125 strncpy (secprint, secname, seclen);
1126 secprint[seclen] = '\0';
8a3fe4f8 1127 error (_("Section %s not found"), secprint);
c906108c
SS
1128}
1129
30510692
DJ
1130/* If we can find a section in FILENAME with BFD index INDEX, adjust
1131 it to ADDRESS. */
c1bd25fd
DJ
1132
1133void
1134exec_set_section_address (const char *filename, int index, CORE_ADDR address)
1135{
0542c86d 1136 struct target_section *p;
07b82ea5 1137 struct target_section_table *table;
c1bd25fd 1138
07b82ea5
PA
1139 table = current_target_sections;
1140 for (p = table->sections; p < table->sections_end; p++)
c1bd25fd 1141 {
2b2848e2 1142 if (filename_cmp (filename, p->the_bfd_section->owner->filename) == 0
30510692 1143 && index == p->the_bfd_section->index)
c1bd25fd 1144 {
30510692 1145 p->endaddr += address - p->addr;
c1bd25fd 1146 p->addr = address;
c1bd25fd
DJ
1147 }
1148 }
1149}
1150
57810aa7 1151bool
f6ac5f3d 1152exec_target::has_memory ()
c35b1492
PA
1153{
1154 /* We can provide memory if we have any file/target sections to read
1155 from. */
1156 return (current_target_sections->sections
1157 != current_target_sections->sections_end);
1158}
1159
f6ac5f3d
PA
1160char *
1161exec_target::make_corefile_notes (bfd *obfd, int *note_size)
83814951
TT
1162{
1163 error (_("Can't create a corefile"));
1164}
be4d1333 1165
f6ac5f3d
PA
1166int
1167exec_target::find_memory_regions (find_memory_region_ftype func, void *data)
c906108c 1168{
f6ac5f3d 1169 return objfile_find_memory_regions (this, func, data);
c906108c
SS
1170}
1171
6c265988 1172void _initialize_exec ();
c906108c 1173void
6c265988 1174_initialize_exec ()
c906108c
SS
1175{
1176 struct cmd_list_element *c;
1177
c906108c
SS
1178 if (!dbx_commands)
1179 {
1a966eab
AC
1180 c = add_cmd ("file", class_files, file_command, _("\
1181Use FILE as program to be debugged.\n\
c906108c
SS
1182It is read for its symbols, for getting the contents of pure memory,\n\
1183and it is the program executed when you use the `run' command.\n\
1184If FILE cannot be found as specified, your execution directory path\n\
1185($PATH) is searched for a command of that name.\n\
1a966eab 1186No arg means to have no executable file and no symbols."), &cmdlist);
5ba2abeb 1187 set_cmd_completer (c, filename_completer);
c906108c
SS
1188 }
1189
1a966eab
AC
1190 c = add_cmd ("exec-file", class_files, exec_file_command, _("\
1191Use FILE as program for getting contents of pure memory.\n\
c906108c
SS
1192If FILE cannot be found as specified, your execution directory path\n\
1193is searched for a command of that name.\n\
1a966eab 1194No arg means have no executable file."), &cmdlist);
5ba2abeb 1195 set_cmd_completer (c, filename_completer);
c906108c 1196
1bedd215
AC
1197 add_com ("section", class_files, set_section_command, _("\
1198Change the base address of section SECTION of the exec file to ADDR.\n\
c906108c
SS
1199This can be used if the exec file does not contain section addresses,\n\
1200(such as in the a.out format), or when the addresses specified in the\n\
1201file itself are wrong. Each section must be changed separately. The\n\
1bedd215 1202``info files'' command lists all the sections and their addresses."));
c906108c 1203
5bf193a2
AC
1204 add_setshow_boolean_cmd ("write", class_support, &write_files, _("\
1205Set writing into executable and core files."), _("\
1206Show writing into executable and core files."), NULL,
1207 NULL,
920d2a44 1208 show_write_files,
5bf193a2 1209 &setlist, &showlist);
c5aa993b 1210
a2fedca9
PW
1211 add_setshow_enum_cmd ("exec-file-mismatch", class_support,
1212 exec_file_mismatch_names,
1213 &exec_file_mismatch,
1214 _("\
1215Set exec-file-mismatch handling (ask|warn|off)."),
1216 _("\
1217Show exec-file-mismatch handling (ask|warn|off)."),
1218 _("\
1219Specifies how to handle a mismatch between the current exec-file name\n\
1220loaded by GDB and the exec-file name automatically determined when attaching\n\
1221to a process:\n\n\
1222 ask - warn the user and ask whether to load the determined exec-file.\n\
1223 warn - warn the user, but do not change the exec-file.\n\
1224 off - do not check for mismatch."),
1225 set_exec_file_mismatch_command,
1226 show_exec_file_mismatch_command,
1227 &setlist, &showlist);
1228
d9f719f1 1229 add_target (exec_target_info, exec_target_open, filename_completer);
c906108c 1230}
This page took 1.911725 seconds and 4 git commands to generate.