Remove exec_filename macro
[deliverable/binutils-gdb.git] / gdb / exec.c
1 /* Work with executable files, for GDB.
2
3 Copyright (C) 1988-2020 Free Software Foundation, Inc.
4
5 This file is part of GDB.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
19
20 #include "defs.h"
21 #include "frame.h"
22 #include "inferior.h"
23 #include "target.h"
24 #include "gdbcmd.h"
25 #include "language.h"
26 #include "filenames.h"
27 #include "symfile.h"
28 #include "objfiles.h"
29 #include "completer.h"
30 #include "value.h"
31 #include "exec.h"
32 #include "observable.h"
33 #include "arch-utils.h"
34 #include "gdbthread.h"
35 #include "progspace.h"
36 #include "progspace-and-thread.h"
37 #include "gdb_bfd.h"
38 #include "gcore.h"
39 #include "source.h"
40 #include "build-id.h"
41
42 #include <fcntl.h>
43 #include "readline/tilde.h"
44 #include "gdbcore.h"
45
46 #include <ctype.h>
47 #include <sys/stat.h>
48 #include "solist.h"
49 #include <algorithm>
50 #include "gdbsupport/pathstuff.h"
51 #include "cli/cli-style.h"
52
53 void (*deprecated_file_changed_hook) (const char *);
54
55 static const target_info exec_target_info = {
56 "exec",
57 N_("Local exec file"),
58 N_("Use an executable file as a target.\n\
59 Specify the filename of the executable file.")
60 };
61
62 /* The target vector for executable files. */
63
64 struct exec_target final : public target_ops
65 {
66 const target_info &info () const override
67 { return exec_target_info; }
68
69 strata stratum () const override { return file_stratum; }
70
71 void close () override;
72 enum target_xfer_status xfer_partial (enum target_object object,
73 const char *annex,
74 gdb_byte *readbuf,
75 const gdb_byte *writebuf,
76 ULONGEST offset, ULONGEST len,
77 ULONGEST *xfered_len) override;
78 target_section_table *get_section_table () override;
79 void files_info () override;
80
81 bool has_memory () override;
82 gdb::unique_xmalloc_ptr<char> make_corefile_notes (bfd *, int *) override;
83 int find_memory_regions (find_memory_region_ftype func, void *data) override;
84 };
85
86 static exec_target exec_ops;
87
88 /* How to handle a mismatch between the current exec file and the exec
89 file determined from target. */
90
91 static const char *const exec_file_mismatch_names[]
92 = {"ask", "warn", "off", NULL };
93 enum exec_file_mismatch_mode
94 {
95 exec_file_mismatch_ask, exec_file_mismatch_warn, exec_file_mismatch_off
96 };
97 static const char *exec_file_mismatch = exec_file_mismatch_names[0];
98 static enum exec_file_mismatch_mode exec_file_mismatch_mode
99 = exec_file_mismatch_ask;
100
101 /* Show command. */
102 static void
103 show_exec_file_mismatch_command (struct ui_file *file, int from_tty,
104 struct cmd_list_element *c, const char *value)
105 {
106 fprintf_filtered (gdb_stdout,
107 _("exec-file-mismatch handling is currently \"%s\".\n"),
108 exec_file_mismatch_names[exec_file_mismatch_mode]);
109 }
110
111 /* Set command. Change the setting for range checking. */
112 static void
113 set_exec_file_mismatch_command (const char *ignore,
114 int from_tty, struct cmd_list_element *c)
115 {
116 for (enum exec_file_mismatch_mode mode = exec_file_mismatch_ask;
117 ;
118 mode = static_cast<enum exec_file_mismatch_mode>(1 + (int) mode))
119 {
120 if (strcmp (exec_file_mismatch, exec_file_mismatch_names[mode]) == 0)
121 {
122 exec_file_mismatch_mode = mode;
123 return;
124 }
125 if (mode == exec_file_mismatch_off)
126 internal_error (__FILE__, __LINE__,
127 _("Unrecognized exec-file-mismatch setting: \"%s\""),
128 exec_file_mismatch);
129 }
130 }
131
132 /* Whether to open exec and core files read-only or read-write. */
133
134 bool write_files = false;
135 static void
136 show_write_files (struct ui_file *file, int from_tty,
137 struct cmd_list_element *c, const char *value)
138 {
139 fprintf_filtered (file, _("Writing into executable and core files is %s.\n"),
140 value);
141 }
142
143
144 static void
145 exec_target_open (const char *args, int from_tty)
146 {
147 target_preopen (from_tty);
148 exec_file_attach (args, from_tty);
149 }
150
151 /* Close and clear exec_bfd. If we end up with no target sections to
152 read memory from, this unpushes the exec_ops target. */
153
154 void
155 exec_close (void)
156 {
157 if (exec_bfd)
158 {
159 bfd *abfd = exec_bfd;
160
161 gdb_bfd_unref (abfd);
162
163 /* Removing target sections may close the exec_ops target.
164 Clear exec_bfd before doing so to prevent recursion. */
165 exec_bfd = NULL;
166 exec_bfd_mtime = 0;
167
168 remove_target_sections (&exec_bfd);
169
170 current_program_space->exec_filename.reset (nullptr);
171 }
172 }
173
174 /* This is the target_close implementation. Clears all target
175 sections and closes all executable bfds from all program spaces. */
176
177 void
178 exec_target::close ()
179 {
180 scoped_restore_current_program_space restore_pspace;
181
182 for (struct program_space *ss : program_spaces)
183 {
184 set_current_program_space (ss);
185 current_target_sections->clear ();
186 exec_close ();
187 }
188 }
189
190 /* See gdbcore.h. */
191
192 void
193 try_open_exec_file (const char *exec_file_host, struct inferior *inf,
194 symfile_add_flags add_flags)
195 {
196 struct gdb_exception prev_err;
197
198 /* exec_file_attach and symbol_file_add_main may throw an error if the file
199 cannot be opened either locally or remotely.
200
201 This happens for example, when the file is first found in the local
202 sysroot (above), and then disappears (a TOCTOU race), or when it doesn't
203 exist in the target filesystem, or when the file does exist, but
204 is not readable.
205
206 Even without a symbol file, the remote-based debugging session should
207 continue normally instead of ending abruptly. Hence we catch thrown
208 errors/exceptions in the following code. */
209 try
210 {
211 /* We must do this step even if exec_file_host is NULL, so that
212 exec_file_attach will clear state. */
213 exec_file_attach (exec_file_host, add_flags & SYMFILE_VERBOSE);
214 }
215 catch (gdb_exception_error &err)
216 {
217 if (err.message != NULL)
218 warning ("%s", err.what ());
219
220 prev_err = std::move (err);
221 }
222
223 if (exec_file_host != NULL)
224 {
225 try
226 {
227 symbol_file_add_main (exec_file_host, add_flags);
228 }
229 catch (const gdb_exception_error &err)
230 {
231 if (!exception_print_same (prev_err, err))
232 warning ("%s", err.what ());
233 }
234 }
235 }
236
237 /* See gdbcore.h. */
238
239 void
240 validate_exec_file (int from_tty)
241 {
242 /* If user asked to ignore the mismatch, do nothing. */
243 if (exec_file_mismatch_mode == exec_file_mismatch_off)
244 return;
245
246 const char *current_exec_file = get_exec_file (0);
247 struct inferior *inf = current_inferior ();
248 /* Try to determine a filename from the process itself. */
249 const char *pid_exec_file = target_pid_to_exec_file (inf->pid);
250 bool build_id_mismatch = false;
251
252 /* If we cannot validate the exec file, return. */
253 if (current_exec_file == NULL || pid_exec_file == NULL)
254 return;
255
256 /* Try validating via build-id, if available. This is the most
257 reliable check. */
258
259 /* In case current_exec_file was changed, reopen_exec_file ensures
260 an up to date build_id (will do nothing if the file timestamp
261 did not change). If exec file changed, reopen_exec_file has
262 allocated another file name, so get_exec_file again. */
263 reopen_exec_file ();
264 current_exec_file = get_exec_file (0);
265
266 const bfd_build_id *exec_file_build_id = build_id_bfd_get (exec_bfd);
267 if (exec_file_build_id != nullptr)
268 {
269 /* Prepend the target prefix, to force gdb_bfd_open to open the
270 file on the remote file system (if indeed remote). */
271 std::string target_pid_exec_file
272 = std::string (TARGET_SYSROOT_PREFIX) + pid_exec_file;
273
274 gdb_bfd_ref_ptr abfd (gdb_bfd_open (target_pid_exec_file.c_str (),
275 gnutarget, -1, false));
276 if (abfd != nullptr)
277 {
278 const bfd_build_id *target_exec_file_build_id
279 = build_id_bfd_get (abfd.get ());
280
281 if (target_exec_file_build_id != nullptr)
282 {
283 if (exec_file_build_id->size == target_exec_file_build_id->size
284 && memcmp (exec_file_build_id->data,
285 target_exec_file_build_id->data,
286 exec_file_build_id->size) == 0)
287 {
288 /* Match. */
289 return;
290 }
291 else
292 build_id_mismatch = true;
293 }
294 }
295 }
296
297 if (build_id_mismatch)
298 {
299 std::string exec_file_target (pid_exec_file);
300
301 /* In case the exec file is not local, exec_file_target has to point at
302 the target file system. */
303 if (is_target_filename (current_exec_file) && !target_filesystem_is_local ())
304 exec_file_target = TARGET_SYSROOT_PREFIX + exec_file_target;
305
306 warning
307 (_("Build ID mismatch between current exec-file %ps\n"
308 "and automatically determined exec-file %ps\n"
309 "exec-file-mismatch handling is currently \"%s\""),
310 styled_string (file_name_style.style (), current_exec_file),
311 styled_string (file_name_style.style (), exec_file_target.c_str ()),
312 exec_file_mismatch_names[exec_file_mismatch_mode]);
313 if (exec_file_mismatch_mode == exec_file_mismatch_ask)
314 {
315 symfile_add_flags add_flags = SYMFILE_MAINLINE;
316 if (from_tty)
317 {
318 add_flags |= SYMFILE_VERBOSE;
319 add_flags |= SYMFILE_ALWAYS_CONFIRM;
320 }
321 try
322 {
323 symbol_file_add_main (exec_file_target.c_str (), add_flags);
324 exec_file_attach (exec_file_target.c_str (), from_tty);
325 }
326 catch (gdb_exception_error &err)
327 {
328 warning (_("loading %ps %s"),
329 styled_string (file_name_style.style (),
330 exec_file_target.c_str ()),
331 err.message != NULL ? err.what () : "error");
332 }
333 }
334 }
335 }
336
337 /* See gdbcore.h. */
338
339 void
340 exec_file_locate_attach (int pid, int defer_bp_reset, int from_tty)
341 {
342 char *exec_file_target;
343 symfile_add_flags add_flags = 0;
344
345 /* Do nothing if we already have an executable filename. */
346 if (get_exec_file (0) != NULL)
347 return;
348
349 /* Try to determine a filename from the process itself. */
350 exec_file_target = target_pid_to_exec_file (pid);
351 if (exec_file_target == NULL)
352 {
353 warning (_("No executable has been specified and target does not "
354 "support\n"
355 "determining executable automatically. "
356 "Try using the \"file\" command."));
357 return;
358 }
359
360 gdb::unique_xmalloc_ptr<char> exec_file_host
361 = exec_file_find (exec_file_target, NULL);
362
363 if (defer_bp_reset)
364 add_flags |= SYMFILE_DEFER_BP_RESET;
365
366 if (from_tty)
367 add_flags |= SYMFILE_VERBOSE;
368
369 /* Attempt to open the exec file. */
370 try_open_exec_file (exec_file_host.get (), current_inferior (), add_flags);
371 }
372
373 /* Set FILENAME as the new exec file.
374
375 This function is intended to be behave essentially the same
376 as exec_file_command, except that the latter will detect when
377 a target is being debugged, and will ask the user whether it
378 should be shut down first. (If the answer is "no", then the
379 new file is ignored.)
380
381 This file is used by exec_file_command, to do the work of opening
382 and processing the exec file after any prompting has happened.
383
384 And, it is used by child_attach, when the attach command was
385 given a pid but not a exec pathname, and the attach command could
386 figure out the pathname from the pid. (In this case, we shouldn't
387 ask the user whether the current target should be shut down --
388 we're supplying the exec pathname late for good reason.) */
389
390 void
391 exec_file_attach (const char *filename, int from_tty)
392 {
393 /* First, acquire a reference to the current exec_bfd. We release
394 this at the end of the function; but acquiring it now lets the
395 BFD cache return it if this call refers to the same file. */
396 gdb_bfd_ref_ptr exec_bfd_holder = gdb_bfd_ref_ptr::new_reference (exec_bfd);
397
398 /* Remove any previous exec file. */
399 exec_close ();
400
401 /* Now open and digest the file the user requested, if any. */
402
403 if (!filename)
404 {
405 if (from_tty)
406 printf_unfiltered (_("No executable file now.\n"));
407
408 set_gdbarch_from_file (NULL);
409 }
410 else
411 {
412 int load_via_target = 0;
413 const char *scratch_pathname, *canonical_pathname;
414 int scratch_chan;
415 char **matching;
416
417 if (is_target_filename (filename))
418 {
419 if (target_filesystem_is_local ())
420 filename += strlen (TARGET_SYSROOT_PREFIX);
421 else
422 load_via_target = 1;
423 }
424
425 gdb::unique_xmalloc_ptr<char> canonical_storage, scratch_storage;
426 if (load_via_target)
427 {
428 /* gdb_bfd_fopen does not support "target:" filenames. */
429 if (write_files)
430 warning (_("writing into executable files is "
431 "not supported for %s sysroots"),
432 TARGET_SYSROOT_PREFIX);
433
434 scratch_pathname = filename;
435 scratch_chan = -1;
436 canonical_pathname = scratch_pathname;
437 }
438 else
439 {
440 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
441 filename, write_files ?
442 O_RDWR | O_BINARY : O_RDONLY | O_BINARY,
443 &scratch_storage);
444 #if defined(__GO32__) || defined(_WIN32) || defined(__CYGWIN__)
445 if (scratch_chan < 0)
446 {
447 int first_errno = errno;
448 char *exename = (char *) alloca (strlen (filename) + 5);
449
450 strcat (strcpy (exename, filename), ".exe");
451 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
452 exename, write_files ?
453 O_RDWR | O_BINARY
454 : O_RDONLY | O_BINARY,
455 &scratch_storage);
456 if (scratch_chan < 0)
457 errno = first_errno;
458 }
459 #endif
460 if (scratch_chan < 0)
461 perror_with_name (filename);
462
463 scratch_pathname = scratch_storage.get ();
464
465 /* gdb_bfd_open (and its variants) prefers canonicalized
466 pathname for better BFD caching. */
467 canonical_storage = gdb_realpath (scratch_pathname);
468 canonical_pathname = canonical_storage.get ();
469 }
470
471 gdb_bfd_ref_ptr temp;
472 if (write_files && !load_via_target)
473 temp = gdb_bfd_fopen (canonical_pathname, gnutarget,
474 FOPEN_RUB, scratch_chan);
475 else
476 temp = gdb_bfd_open (canonical_pathname, gnutarget, scratch_chan);
477 exec_bfd = temp.release ();
478
479 if (!exec_bfd)
480 {
481 error (_("\"%ps\": could not open as an executable file: %s."),
482 styled_string (file_name_style.style (), scratch_pathname),
483 bfd_errmsg (bfd_get_error ()));
484 }
485
486 /* gdb_realpath_keepfile resolves symlinks on the local
487 filesystem and so cannot be used for "target:" files. */
488 gdb_assert (current_program_space->exec_filename == nullptr);
489 if (load_via_target)
490 current_program_space->exec_filename
491 = make_unique_xstrdup (bfd_get_filename (exec_bfd));
492 else
493 current_program_space->exec_filename
494 = gdb_realpath_keepfile (scratch_pathname);
495
496 if (!bfd_check_format_matches (exec_bfd, bfd_object, &matching))
497 {
498 /* Make sure to close exec_bfd, or else "run" might try to use
499 it. */
500 exec_close ();
501 error (_("\"%ps\": not in executable format: %s"),
502 styled_string (file_name_style.style (), scratch_pathname),
503 gdb_bfd_errmsg (bfd_get_error (), matching).c_str ());
504 }
505
506 target_section_table sections = build_section_table (exec_bfd);
507
508 exec_bfd_mtime = bfd_get_mtime (exec_bfd);
509
510 validate_files ();
511
512 set_gdbarch_from_file (exec_bfd);
513
514 /* Add the executable's sections to the current address spaces'
515 list of sections. This possibly pushes the exec_ops
516 target. */
517 add_target_sections (&exec_bfd, sections);
518
519 /* Tell display code (if any) about the changed file name. */
520 if (deprecated_exec_file_display_hook)
521 (*deprecated_exec_file_display_hook) (filename);
522 }
523
524 bfd_cache_close_all ();
525 gdb::observers::executable_changed.notify ();
526 }
527
528 /* Process the first arg in ARGS as the new exec file.
529
530 Note that we have to explicitly ignore additional args, since we can
531 be called from file_command(), which also calls symbol_file_command()
532 which can take multiple args.
533
534 If ARGS is NULL, we just want to close the exec file. */
535
536 static void
537 exec_file_command (const char *args, int from_tty)
538 {
539 if (from_tty && target_has_execution ()
540 && !query (_("A program is being debugged already.\n"
541 "Are you sure you want to change the file? ")))
542 error (_("File not changed."));
543
544 if (args)
545 {
546 /* Scan through the args and pick up the first non option arg
547 as the filename. */
548
549 gdb_argv built_argv (args);
550 char **argv = built_argv.get ();
551
552 for (; (*argv != NULL) && (**argv == '-'); argv++)
553 {;
554 }
555 if (*argv == NULL)
556 error (_("No executable file name was specified"));
557
558 gdb::unique_xmalloc_ptr<char> filename (tilde_expand (*argv));
559 exec_file_attach (filename.get (), from_tty);
560 }
561 else
562 exec_file_attach (NULL, from_tty);
563 }
564
565 /* Set both the exec file and the symbol file, in one command.
566 What a novelty. Why did GDB go through four major releases before this
567 command was added? */
568
569 static void
570 file_command (const char *arg, int from_tty)
571 {
572 /* FIXME, if we lose on reading the symbol file, we should revert
573 the exec file, but that's rough. */
574 exec_file_command (arg, from_tty);
575 symbol_file_command (arg, from_tty);
576 if (deprecated_file_changed_hook)
577 deprecated_file_changed_hook (arg);
578 }
579 \f
580
581 /* Builds a section table, given args BFD, TABLE. */
582
583 target_section_table
584 build_section_table (struct bfd *some_bfd)
585 {
586 target_section_table table;
587
588 for (asection *asect : gdb_bfd_sections (some_bfd))
589 {
590 flagword aflag;
591
592 /* Check the section flags, but do not discard zero-length
593 sections, since some symbols may still be attached to this
594 section. For instance, we encountered on sparc-solaris 2.10
595 a shared library with an empty .bss section to which a symbol
596 named "_end" was attached. The address of this symbol still
597 needs to be relocated. */
598 aflag = bfd_section_flags (asect);
599 if (!(aflag & SEC_ALLOC))
600 continue;
601
602 table.emplace_back (bfd_section_vma (asect),
603 bfd_section_vma (asect) + bfd_section_size (asect),
604 asect);
605 }
606
607 return table;
608 }
609
610 /* Add the sections array defined by [SECTIONS..SECTIONS_END[ to the
611 current set of target sections. */
612
613 void
614 add_target_sections (void *owner,
615 const target_section_table &sections)
616 {
617 target_section_table *table = current_target_sections;
618
619 if (!sections.empty ())
620 {
621 for (const target_section &s : sections)
622 {
623 table->push_back (s);
624 table->back ().owner = owner;
625 }
626
627 scoped_restore_current_pspace_and_thread restore_pspace_thread;
628 program_space *curr_pspace = current_program_space;
629
630 /* If these are the first file sections we can provide memory
631 from, push the file_stratum target. Must do this in all
632 inferiors sharing the program space. */
633 for (inferior *inf : all_inferiors ())
634 {
635 if (inf->pspace != curr_pspace)
636 continue;
637
638 if (inf->target_is_pushed (&exec_ops))
639 continue;
640
641 switch_to_inferior_no_thread (inf);
642 push_target (&exec_ops);
643 }
644 }
645 }
646
647 /* Add the sections of OBJFILE to the current set of target sections. */
648
649 void
650 add_target_sections_of_objfile (struct objfile *objfile)
651 {
652 target_section_table *table = current_target_sections;
653 struct obj_section *osect;
654
655 gdb_assert (objfile != nullptr);
656
657 /* Compute the number of sections to add. */
658 ALL_OBJFILE_OSECTIONS (objfile, osect)
659 {
660 if (bfd_section_size (osect->the_bfd_section) == 0)
661 continue;
662
663 table->emplace_back (obj_section_addr (osect),
664 obj_section_endaddr (osect),
665 osect->the_bfd_section, (void *) objfile);
666 }
667 }
668
669 /* Remove all target sections owned by OWNER.
670 OWNER must be the same value passed to add_target_sections. */
671
672 void
673 remove_target_sections (void *owner)
674 {
675 target_section_table *table = current_target_sections;
676
677 gdb_assert (owner != NULL);
678
679 auto it = std::remove_if (table->begin (),
680 table->end (),
681 [&] (target_section &sect)
682 {
683 return sect.owner == owner;
684 });
685 table->erase (it, table->end ());
686
687 /* If we don't have any more sections to read memory from,
688 remove the file_stratum target from the stack of each
689 inferior sharing the program space. */
690 if (table->empty ())
691 {
692 scoped_restore_current_pspace_and_thread restore_pspace_thread;
693 program_space *curr_pspace = current_program_space;
694
695 for (inferior *inf : all_inferiors ())
696 {
697 if (inf->pspace != curr_pspace)
698 continue;
699
700 if (!inf->pspace->target_sections.empty ())
701 continue;
702
703 switch_to_inferior_no_thread (inf);
704 unpush_target (&exec_ops);
705 }
706 }
707 }
708
709 /* See exec.h. */
710
711 void
712 exec_on_vfork ()
713 {
714 if (!current_program_space->target_sections.empty ())
715 push_target (&exec_ops);
716 }
717
718 \f
719
720 enum target_xfer_status
721 exec_read_partial_read_only (gdb_byte *readbuf, ULONGEST offset,
722 ULONGEST len, ULONGEST *xfered_len)
723 {
724 /* It's unduly pedantic to refuse to look at the executable for
725 read-only pieces; so do the equivalent of readonly regions aka
726 QTro packet. */
727 if (exec_bfd != NULL)
728 {
729 asection *s;
730 bfd_size_type size;
731 bfd_vma vma;
732
733 for (s = exec_bfd->sections; s; s = s->next)
734 {
735 if ((s->flags & SEC_LOAD) == 0
736 || (s->flags & SEC_READONLY) == 0)
737 continue;
738
739 vma = s->vma;
740 size = bfd_section_size (s);
741 if (vma <= offset && offset < (vma + size))
742 {
743 ULONGEST amt;
744
745 amt = (vma + size) - offset;
746 if (amt > len)
747 amt = len;
748
749 amt = bfd_get_section_contents (exec_bfd, s,
750 readbuf, offset - vma, amt);
751
752 if (amt == 0)
753 return TARGET_XFER_EOF;
754 else
755 {
756 *xfered_len = amt;
757 return TARGET_XFER_OK;
758 }
759 }
760 }
761 }
762
763 /* Indicate failure to find the requested memory block. */
764 return TARGET_XFER_E_IO;
765 }
766
767 /* Return all read-only memory ranges found in the target section
768 table defined by SECTIONS and SECTIONS_END, starting at (and
769 intersected with) MEMADDR for LEN bytes. */
770
771 static std::vector<mem_range>
772 section_table_available_memory (CORE_ADDR memaddr, ULONGEST len,
773 const target_section_table &sections)
774 {
775 std::vector<mem_range> memory;
776
777 for (const target_section &p : sections)
778 {
779 if ((bfd_section_flags (p.the_bfd_section) & SEC_READONLY) == 0)
780 continue;
781
782 /* Copy the meta-data, adjusted. */
783 if (mem_ranges_overlap (p.addr, p.endaddr - p.addr, memaddr, len))
784 {
785 ULONGEST lo1, hi1, lo2, hi2;
786
787 lo1 = memaddr;
788 hi1 = memaddr + len;
789
790 lo2 = p.addr;
791 hi2 = p.endaddr;
792
793 CORE_ADDR start = std::max (lo1, lo2);
794 int length = std::min (hi1, hi2) - start;
795
796 memory.emplace_back (start, length);
797 }
798 }
799
800 return memory;
801 }
802
803 enum target_xfer_status
804 section_table_read_available_memory (gdb_byte *readbuf, ULONGEST offset,
805 ULONGEST len, ULONGEST *xfered_len)
806 {
807 target_section_table *table = target_get_section_table (&exec_ops);
808 std::vector<mem_range> available_memory
809 = section_table_available_memory (offset, len, *table);
810
811 normalize_mem_ranges (&available_memory);
812
813 for (const mem_range &r : available_memory)
814 {
815 if (mem_ranges_overlap (r.start, r.length, offset, len))
816 {
817 CORE_ADDR end;
818 enum target_xfer_status status;
819
820 /* Get the intersection window. */
821 end = std::min<CORE_ADDR> (offset + len, r.start + r.length);
822
823 gdb_assert (end - offset <= len);
824
825 if (offset >= r.start)
826 status = exec_read_partial_read_only (readbuf, offset,
827 end - offset,
828 xfered_len);
829 else
830 {
831 *xfered_len = r.start - offset;
832 status = TARGET_XFER_UNAVAILABLE;
833 }
834 return status;
835 }
836 }
837
838 *xfered_len = len;
839 return TARGET_XFER_UNAVAILABLE;
840 }
841
842 enum target_xfer_status
843 section_table_xfer_memory_partial (gdb_byte *readbuf, const gdb_byte *writebuf,
844 ULONGEST offset, ULONGEST len,
845 ULONGEST *xfered_len,
846 const target_section_table &sections,
847 gdb::function_view<bool
848 (const struct target_section *)> match_cb)
849 {
850 int res;
851 ULONGEST memaddr = offset;
852 ULONGEST memend = memaddr + len;
853
854 gdb_assert (len != 0);
855
856 for (const target_section &p : sections)
857 {
858 struct bfd_section *asect = p.the_bfd_section;
859 bfd *abfd = asect->owner;
860
861 if (match_cb != nullptr && !match_cb (&p))
862 continue; /* not the section we need. */
863 if (memaddr >= p.addr)
864 {
865 if (memend <= p.endaddr)
866 {
867 /* Entire transfer is within this section. */
868 if (writebuf)
869 res = bfd_set_section_contents (abfd, asect,
870 writebuf, memaddr - p.addr,
871 len);
872 else
873 res = bfd_get_section_contents (abfd, asect,
874 readbuf, memaddr - p.addr,
875 len);
876
877 if (res != 0)
878 {
879 *xfered_len = len;
880 return TARGET_XFER_OK;
881 }
882 else
883 return TARGET_XFER_EOF;
884 }
885 else if (memaddr >= p.endaddr)
886 {
887 /* This section ends before the transfer starts. */
888 continue;
889 }
890 else
891 {
892 /* This section overlaps the transfer. Just do half. */
893 len = p.endaddr - memaddr;
894 if (writebuf)
895 res = bfd_set_section_contents (abfd, asect,
896 writebuf, memaddr - p.addr,
897 len);
898 else
899 res = bfd_get_section_contents (abfd, asect,
900 readbuf, memaddr - p.addr,
901 len);
902 if (res != 0)
903 {
904 *xfered_len = len;
905 return TARGET_XFER_OK;
906 }
907 else
908 return TARGET_XFER_EOF;
909 }
910 }
911 }
912
913 return TARGET_XFER_EOF; /* We can't help. */
914 }
915
916 target_section_table *
917 exec_target::get_section_table ()
918 {
919 return current_target_sections;
920 }
921
922 enum target_xfer_status
923 exec_target::xfer_partial (enum target_object object,
924 const char *annex, gdb_byte *readbuf,
925 const gdb_byte *writebuf,
926 ULONGEST offset, ULONGEST len, ULONGEST *xfered_len)
927 {
928 target_section_table *table = get_section_table ();
929
930 if (object == TARGET_OBJECT_MEMORY)
931 return section_table_xfer_memory_partial (readbuf, writebuf,
932 offset, len, xfered_len,
933 *table);
934 else
935 return TARGET_XFER_E_IO;
936 }
937 \f
938
939 void
940 print_section_info (target_section_table *t, bfd *abfd)
941 {
942 struct gdbarch *gdbarch = gdbarch_from_bfd (abfd);
943 /* FIXME: 16 is not wide enough when gdbarch_addr_bit > 64. */
944 int wid = gdbarch_addr_bit (gdbarch) <= 32 ? 8 : 16;
945
946 printf_filtered ("\t`%ps', ",
947 styled_string (file_name_style.style (),
948 bfd_get_filename (abfd)));
949 wrap_here (" ");
950 printf_filtered (_("file type %s.\n"), bfd_get_target (abfd));
951 if (abfd == exec_bfd)
952 {
953 /* gcc-3.4 does not like the initialization in
954 <p == t->sections_end>. */
955 bfd_vma displacement = 0;
956 bfd_vma entry_point;
957 bool found = false;
958
959 for (const target_section &p : *t)
960 {
961 struct bfd_section *psect = p.the_bfd_section;
962
963 if ((bfd_section_flags (psect) & (SEC_ALLOC | SEC_LOAD))
964 != (SEC_ALLOC | SEC_LOAD))
965 continue;
966
967 if (bfd_section_vma (psect) <= abfd->start_address
968 && abfd->start_address < (bfd_section_vma (psect)
969 + bfd_section_size (psect)))
970 {
971 displacement = p.addr - bfd_section_vma (psect);
972 found = true;
973 break;
974 }
975 }
976 if (!found)
977 warning (_("Cannot find section for the entry point of %ps."),
978 styled_string (file_name_style.style (),
979 bfd_get_filename (abfd)));
980
981 entry_point = gdbarch_addr_bits_remove (gdbarch,
982 bfd_get_start_address (abfd)
983 + displacement);
984 printf_filtered (_("\tEntry point: %s\n"),
985 paddress (gdbarch, entry_point));
986 }
987 for (const target_section &p : *t)
988 {
989 struct bfd_section *psect = p.the_bfd_section;
990 bfd *pbfd = psect->owner;
991
992 printf_filtered ("\t%s", hex_string_custom (p.addr, wid));
993 printf_filtered (" - %s", hex_string_custom (p.endaddr, wid));
994
995 /* FIXME: A format of "08l" is not wide enough for file offsets
996 larger than 4GB. OTOH, making it "016l" isn't desirable either
997 since most output will then be much wider than necessary. It
998 may make sense to test the size of the file and choose the
999 format string accordingly. */
1000 /* FIXME: i18n: Need to rewrite this sentence. */
1001 if (info_verbose)
1002 printf_filtered (" @ %s",
1003 hex_string_custom (psect->filepos, 8));
1004 printf_filtered (" is %s", bfd_section_name (psect));
1005 if (pbfd != abfd)
1006 printf_filtered (" in %ps",
1007 styled_string (file_name_style.style (),
1008 bfd_get_filename (pbfd)));
1009 printf_filtered ("\n");
1010 }
1011 }
1012
1013 void
1014 exec_target::files_info ()
1015 {
1016 if (exec_bfd)
1017 print_section_info (current_target_sections, exec_bfd);
1018 else
1019 puts_filtered (_("\t<no file loaded>\n"));
1020 }
1021
1022 static void
1023 set_section_command (const char *args, int from_tty)
1024 {
1025 const char *secname;
1026 unsigned seclen;
1027 unsigned long secaddr;
1028 char secprint[100];
1029 long offset;
1030
1031 if (args == 0)
1032 error (_("Must specify section name and its virtual address"));
1033
1034 /* Parse out section name. */
1035 for (secname = args; !isspace (*args); args++);
1036 seclen = args - secname;
1037
1038 /* Parse out new virtual address. */
1039 secaddr = parse_and_eval_address (args);
1040
1041 for (target_section &p : *current_target_sections)
1042 {
1043 if (!strncmp (secname, bfd_section_name (p.the_bfd_section), seclen)
1044 && bfd_section_name (p.the_bfd_section)[seclen] == '\0')
1045 {
1046 offset = secaddr - p.addr;
1047 p.addr += offset;
1048 p.endaddr += offset;
1049 if (from_tty)
1050 exec_ops.files_info ();
1051 return;
1052 }
1053 }
1054 if (seclen >= sizeof (secprint))
1055 seclen = sizeof (secprint) - 1;
1056 strncpy (secprint, secname, seclen);
1057 secprint[seclen] = '\0';
1058 error (_("Section %s not found"), secprint);
1059 }
1060
1061 /* If we can find a section in FILENAME with BFD index INDEX, adjust
1062 it to ADDRESS. */
1063
1064 void
1065 exec_set_section_address (const char *filename, int index, CORE_ADDR address)
1066 {
1067 for (target_section &p : *current_target_sections)
1068 {
1069 if (filename_cmp (filename,
1070 bfd_get_filename (p.the_bfd_section->owner)) == 0
1071 && index == p.the_bfd_section->index)
1072 {
1073 p.endaddr += address - p.addr;
1074 p.addr = address;
1075 }
1076 }
1077 }
1078
1079 bool
1080 exec_target::has_memory ()
1081 {
1082 /* We can provide memory if we have any file/target sections to read
1083 from. */
1084 return !current_target_sections->empty ();
1085 }
1086
1087 gdb::unique_xmalloc_ptr<char>
1088 exec_target::make_corefile_notes (bfd *obfd, int *note_size)
1089 {
1090 error (_("Can't create a corefile"));
1091 }
1092
1093 int
1094 exec_target::find_memory_regions (find_memory_region_ftype func, void *data)
1095 {
1096 return objfile_find_memory_regions (this, func, data);
1097 }
1098
1099 void _initialize_exec ();
1100 void
1101 _initialize_exec ()
1102 {
1103 struct cmd_list_element *c;
1104
1105 if (!dbx_commands)
1106 {
1107 c = add_cmd ("file", class_files, file_command, _("\
1108 Use FILE as program to be debugged.\n\
1109 It is read for its symbols, for getting the contents of pure memory,\n\
1110 and it is the program executed when you use the `run' command.\n\
1111 If FILE cannot be found as specified, your execution directory path\n\
1112 ($PATH) is searched for a command of that name.\n\
1113 No arg means to have no executable file and no symbols."), &cmdlist);
1114 set_cmd_completer (c, filename_completer);
1115 }
1116
1117 c = add_cmd ("exec-file", class_files, exec_file_command, _("\
1118 Use FILE as program for getting contents of pure memory.\n\
1119 If FILE cannot be found as specified, your execution directory path\n\
1120 is searched for a command of that name.\n\
1121 No arg means have no executable file."), &cmdlist);
1122 set_cmd_completer (c, filename_completer);
1123
1124 add_com ("section", class_files, set_section_command, _("\
1125 Change the base address of section SECTION of the exec file to ADDR.\n\
1126 This can be used if the exec file does not contain section addresses,\n\
1127 (such as in the a.out format), or when the addresses specified in the\n\
1128 file itself are wrong. Each section must be changed separately. The\n\
1129 ``info files'' command lists all the sections and their addresses."));
1130
1131 add_setshow_boolean_cmd ("write", class_support, &write_files, _("\
1132 Set writing into executable and core files."), _("\
1133 Show writing into executable and core files."), NULL,
1134 NULL,
1135 show_write_files,
1136 &setlist, &showlist);
1137
1138 add_setshow_enum_cmd ("exec-file-mismatch", class_support,
1139 exec_file_mismatch_names,
1140 &exec_file_mismatch,
1141 _("\
1142 Set exec-file-mismatch handling (ask|warn|off)."),
1143 _("\
1144 Show exec-file-mismatch handling (ask|warn|off)."),
1145 _("\
1146 Specifies how to handle a mismatch between the current exec-file\n\
1147 loaded by GDB and the exec-file automatically determined when attaching\n\
1148 to a process:\n\n\
1149 ask - warn the user and ask whether to load the determined exec-file.\n\
1150 warn - warn the user, but do not change the exec-file.\n\
1151 off - do not check for mismatch.\n\
1152 \n\
1153 GDB detects a mismatch by comparing the build IDs of the files.\n\
1154 If the user confirms loading the determined exec-file, then its symbols\n\
1155 will be loaded as well."),
1156 set_exec_file_mismatch_command,
1157 show_exec_file_mismatch_command,
1158 &setlist, &showlist);
1159
1160 add_target (exec_target_info, exec_target_open, filename_completer);
1161 }
This page took 0.054607 seconds and 5 git commands to generate.