gdb/testsuite/gdb.base/stap-probe: Minor clean-up
[deliverable/binutils-gdb.git] / gdb / exec.c
CommitLineData
c906108c 1/* Work with executable files, for GDB.
4646aa9d 2
b811d2c2 3 Copyright (C) 1988-2020 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "frame.h"
d55e5aa6 22#include "inferior.h"
4de283e4
TT
23#include "target.h"
24#include "gdbcmd.h"
c906108c 25#include "language.h"
4de283e4
TT
26#include "filenames.h"
27#include "symfile.h"
c906108c 28#include "objfiles.h"
4de283e4
TT
29#include "completer.h"
30#include "value.h"
31#include "exec.h"
76727919 32#include "observable.h"
4de283e4
TT
33#include "arch-utils.h"
34#include "gdbthread.h"
6c95b8df 35#include "progspace.h"
4de283e4
TT
36#include "gdb_bfd.h"
37#include "gcore.h"
38#include "source.h"
39
40#include <fcntl.h>
e0eac551 41#include "readline/tilde.h"
4de283e4
TT
42#include "gdbcore.h"
43
44#include <ctype.h>
45#include <sys/stat.h>
a9a5a3d1 46#include "solist.h"
4de283e4 47#include <algorithm>
268a13a5 48#include "gdbsupport/pathstuff.h"
c906108c 49
1d8b34a7 50void (*deprecated_file_changed_hook) (const char *);
c906108c 51
d9f719f1
PA
52static const target_info exec_target_info = {
53 "exec",
54 N_("Local exec file"),
55 N_("Use an executable file as a target.\n\
56Specify the filename of the executable file.")
57};
58
c906108c
SS
59/* The target vector for executable files. */
60
f6ac5f3d
PA
61struct exec_target final : public target_ops
62{
d9f719f1
PA
63 const target_info &info () const override
64 { return exec_target_info; }
f6ac5f3d 65
66b4deae
PA
66 strata stratum () const override { return file_stratum; }
67
f6ac5f3d
PA
68 void close () override;
69 enum target_xfer_status xfer_partial (enum target_object object,
70 const char *annex,
71 gdb_byte *readbuf,
72 const gdb_byte *writebuf,
73 ULONGEST offset, ULONGEST len,
74 ULONGEST *xfered_len) override;
75 struct target_section_table *get_section_table () override;
76 void files_info () override;
77
57810aa7 78 bool has_memory () override;
f6ac5f3d
PA
79 char *make_corefile_notes (bfd *, int *) override;
80 int find_memory_regions (find_memory_region_ftype func, void *data) override;
81};
82
83static exec_target exec_ops;
c906108c 84
c906108c
SS
85/* Whether to open exec and core files read-only or read-write. */
86
491144b5 87bool write_files = false;
920d2a44
AC
88static void
89show_write_files (struct ui_file *file, int from_tty,
90 struct cmd_list_element *c, const char *value)
91{
92 fprintf_filtered (file, _("Writing into executable and core files is %s.\n"),
93 value);
94}
95
c906108c 96
d9f719f1
PA
97static void
98exec_target_open (const char *args, int from_tty)
1adeb98a
FN
99{
100 target_preopen (from_tty);
101 exec_file_attach (args, from_tty);
102}
103
07b82ea5
PA
104/* Close and clear exec_bfd. If we end up with no target sections to
105 read memory from, this unpushes the exec_ops target. */
106
6c95b8df
PA
107void
108exec_close (void)
07b82ea5
PA
109{
110 if (exec_bfd)
111 {
112 bfd *abfd = exec_bfd;
07b82ea5 113
cbb099e8 114 gdb_bfd_unref (abfd);
07b82ea5
PA
115
116 /* Removing target sections may close the exec_ops target.
117 Clear exec_bfd before doing so to prevent recursion. */
118 exec_bfd = NULL;
119 exec_bfd_mtime = 0;
120
046ac79f 121 remove_target_sections (&exec_bfd);
1f0c4988
JK
122
123 xfree (exec_filename);
124 exec_filename = NULL;
07b82ea5
PA
125 }
126}
127
6c95b8df
PA
128/* This is the target_close implementation. Clears all target
129 sections and closes all executable bfds from all program spaces. */
130
f6ac5f3d
PA
131void
132exec_target::close ()
c906108c 133{
ab16fce8 134 struct program_space *ss;
5ed8105e 135 scoped_restore_current_program_space restore_pspace;
6c95b8df 136
ab16fce8 137 ALL_PSPACES (ss)
5ed8105e
PA
138 {
139 set_current_program_space (ss);
140 clear_section_table (current_target_sections);
141 exec_close ();
142 }
c906108c
SS
143}
144
f6ac5f3d 145/* See gdbcore.h. */
a10de604
GB
146
147void
ecf45d2c
SL
148try_open_exec_file (const char *exec_file_host, struct inferior *inf,
149 symfile_add_flags add_flags)
a10de604 150{
cc06b668 151 struct gdb_exception prev_err;
a10de604 152
57d1de9c
LM
153 /* exec_file_attach and symbol_file_add_main may throw an error if the file
154 cannot be opened either locally or remotely.
155
156 This happens for example, when the file is first found in the local
157 sysroot (above), and then disappears (a TOCTOU race), or when it doesn't
158 exist in the target filesystem, or when the file does exist, but
159 is not readable.
88178e82 160
57d1de9c
LM
161 Even without a symbol file, the remote-based debugging session should
162 continue normally instead of ending abruptly. Hence we catch thrown
163 errors/exceptions in the following code. */
a70b8144 164 try
57d1de9c 165 {
ecf45d2c
SL
166 /* We must do this step even if exec_file_host is NULL, so that
167 exec_file_attach will clear state. */
168 exec_file_attach (exec_file_host, add_flags & SYMFILE_VERBOSE);
57d1de9c 169 }
94aeb44b 170 catch (gdb_exception_error &err)
57d1de9c
LM
171 {
172 if (err.message != NULL)
3d6e9d23 173 warning ("%s", err.what ());
57d1de9c 174
94aeb44b 175 prev_err = std::move (err);
57d1de9c 176 }
57d1de9c 177
ecf45d2c 178 if (exec_file_host != NULL)
57d1de9c 179 {
a70b8144 180 try
ecf45d2c
SL
181 {
182 symbol_file_add_main (exec_file_host, add_flags);
183 }
230d2906 184 catch (const gdb_exception_error &err)
ecf45d2c
SL
185 {
186 if (!exception_print_same (prev_err, err))
3d6e9d23 187 warning ("%s", err.what ());
ecf45d2c 188 }
57d1de9c 189 }
ecf45d2c
SL
190}
191
192/* See gdbcore.h. */
193
194void
195exec_file_locate_attach (int pid, int defer_bp_reset, int from_tty)
196{
797bc1cb 197 char *exec_file_target;
ecf45d2c
SL
198 symfile_add_flags add_flags = 0;
199
200 /* Do nothing if we already have an executable filename. */
201 if (get_exec_file (0) != NULL)
202 return;
203
204 /* Try to determine a filename from the process itself. */
205 exec_file_target = target_pid_to_exec_file (pid);
206 if (exec_file_target == NULL)
57d1de9c 207 {
ecf45d2c
SL
208 warning (_("No executable has been specified and target does not "
209 "support\n"
210 "determining executable automatically. "
211 "Try using the \"file\" command."));
212 return;
57d1de9c 213 }
88178e82 214
797bc1cb
TT
215 gdb::unique_xmalloc_ptr<char> exec_file_host
216 = exec_file_find (exec_file_target, NULL);
ecf45d2c
SL
217
218 if (defer_bp_reset)
219 add_flags |= SYMFILE_DEFER_BP_RESET;
220
221 if (from_tty)
222 add_flags |= SYMFILE_VERBOSE;
223
224 /* Attempt to open the exec file. */
797bc1cb 225 try_open_exec_file (exec_file_host.get (), current_inferior (), add_flags);
a10de604
GB
226}
227
907083d1 228/* Set FILENAME as the new exec file.
c906108c 229
c5aa993b
JM
230 This function is intended to be behave essentially the same
231 as exec_file_command, except that the latter will detect when
232 a target is being debugged, and will ask the user whether it
233 should be shut down first. (If the answer is "no", then the
234 new file is ignored.)
c906108c 235
c5aa993b
JM
236 This file is used by exec_file_command, to do the work of opening
237 and processing the exec file after any prompting has happened.
c906108c 238
c5aa993b
JM
239 And, it is used by child_attach, when the attach command was
240 given a pid but not a exec pathname, and the attach command could
241 figure out the pathname from the pid. (In this case, we shouldn't
242 ask the user whether the current target should be shut down --
907083d1 243 we're supplying the exec pathname late for good reason.) */
c906108c
SS
244
245void
5f08566b 246exec_file_attach (const char *filename, int from_tty)
c906108c 247{
9b333ba3
TT
248 /* First, acquire a reference to the current exec_bfd. We release
249 this at the end of the function; but acquiring it now lets the
250 BFD cache return it if this call refers to the same file. */
1831a9f9 251 gdb_bfd_ref_ptr exec_bfd_holder = gdb_bfd_ref_ptr::new_reference (exec_bfd);
192b62ce 252
c906108c 253 /* Remove any previous exec file. */
6c95b8df 254 exec_close ();
c906108c
SS
255
256 /* Now open and digest the file the user requested, if any. */
257
1adeb98a
FN
258 if (!filename)
259 {
260 if (from_tty)
a3f17187 261 printf_unfiltered (_("No executable file now.\n"));
7a107747
DJ
262
263 set_gdbarch_from_file (NULL);
1adeb98a
FN
264 }
265 else
c906108c 266 {
64c0b5de 267 int load_via_target = 0;
14278e1f 268 const char *scratch_pathname, *canonical_pathname;
c906108c 269 int scratch_chan;
07b82ea5 270 struct target_section *sections = NULL, *sections_end = NULL;
d18b8b7a 271 char **matching;
c5aa993b 272
64c0b5de
GB
273 if (is_target_filename (filename))
274 {
275 if (target_filesystem_is_local ())
276 filename += strlen (TARGET_SYSROOT_PREFIX);
277 else
278 load_via_target = 1;
279 }
280
14278e1f 281 gdb::unique_xmalloc_ptr<char> canonical_storage, scratch_storage;
64c0b5de 282 if (load_via_target)
c5aa993b 283 {
64c0b5de
GB
284 /* gdb_bfd_fopen does not support "target:" filenames. */
285 if (write_files)
286 warning (_("writing into executable files is "
287 "not supported for %s sysroots"),
288 TARGET_SYSROOT_PREFIX);
289
14278e1f 290 scratch_pathname = filename;
64c0b5de 291 scratch_chan = -1;
64c0b5de 292 canonical_pathname = scratch_pathname;
c5aa993b 293 }
64c0b5de
GB
294 else
295 {
296 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
297 filename, write_files ?
298 O_RDWR | O_BINARY : O_RDONLY | O_BINARY,
e0cc99a6 299 &scratch_storage);
64c0b5de
GB
300#if defined(__GO32__) || defined(_WIN32) || defined(__CYGWIN__)
301 if (scratch_chan < 0)
302 {
0ae1c716 303 char *exename = (char *) alloca (strlen (filename) + 5);
64c0b5de
GB
304
305 strcat (strcpy (exename, filename), ".exe");
306 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
307 exename, write_files ?
308 O_RDWR | O_BINARY
309 : O_RDONLY | O_BINARY,
e0cc99a6 310 &scratch_storage);
64c0b5de 311 }
c906108c 312#endif
64c0b5de
GB
313 if (scratch_chan < 0)
314 perror_with_name (filename);
a4453b7e 315
e0cc99a6 316 scratch_pathname = scratch_storage.get ();
a4453b7e 317
64c0b5de
GB
318 /* gdb_bfd_open (and its variants) prefers canonicalized
319 pathname for better BFD caching. */
14278e1f
TT
320 canonical_storage = gdb_realpath (scratch_pathname);
321 canonical_pathname = canonical_storage.get ();
64c0b5de 322 }
1f0c4988 323
192b62ce 324 gdb_bfd_ref_ptr temp;
64c0b5de 325 if (write_files && !load_via_target)
192b62ce
TT
326 temp = gdb_bfd_fopen (canonical_pathname, gnutarget,
327 FOPEN_RUB, scratch_chan);
1c00ec6b 328 else
192b62ce
TT
329 temp = gdb_bfd_open (canonical_pathname, gnutarget, scratch_chan);
330 exec_bfd = temp.release ();
c906108c
SS
331
332 if (!exec_bfd)
9fe4a216 333 {
d5131498 334 error (_("\"%s\": could not open as an executable file: %s."),
9fe4a216
TT
335 scratch_pathname, bfd_errmsg (bfd_get_error ()));
336 }
c906108c 337
64c0b5de
GB
338 /* gdb_realpath_keepfile resolves symlinks on the local
339 filesystem and so cannot be used for "target:" files. */
1f0c4988 340 gdb_assert (exec_filename == NULL);
64c0b5de
GB
341 if (load_via_target)
342 exec_filename = xstrdup (bfd_get_filename (exec_bfd));
343 else
4971c9a7 344 exec_filename = gdb_realpath_keepfile (scratch_pathname).release ();
1f0c4988 345
d18b8b7a 346 if (!bfd_check_format_matches (exec_bfd, bfd_object, &matching))
c906108c
SS
347 {
348 /* Make sure to close exec_bfd, or else "run" might try to use
349 it. */
6c95b8df 350 exec_close ();
8a3fe4f8 351 error (_("\"%s\": not in executable format: %s"),
d18b8b7a 352 scratch_pathname,
803c08d0 353 gdb_bfd_errmsg (bfd_get_error (), matching).c_str ());
c906108c
SS
354 }
355
07b82ea5 356 if (build_section_table (exec_bfd, &sections, &sections_end))
c906108c
SS
357 {
358 /* Make sure to close exec_bfd, or else "run" might try to use
359 it. */
6c95b8df 360 exec_close ();
8a3fe4f8 361 error (_("\"%s\": can't find the file sections: %s"),
c906108c
SS
362 scratch_pathname, bfd_errmsg (bfd_get_error ()));
363 }
364
c04ea773
DJ
365 exec_bfd_mtime = bfd_get_mtime (exec_bfd);
366
c906108c
SS
367 validate_files ();
368
369 set_gdbarch_from_file (exec_bfd);
370
07b82ea5 371 /* Add the executable's sections to the current address spaces'
6c95b8df
PA
372 list of sections. This possibly pushes the exec_ops
373 target. */
ed9eebaf 374 add_target_sections (&exec_bfd, sections, sections_end);
07b82ea5 375 xfree (sections);
c906108c
SS
376
377 /* Tell display code (if any) about the changed file name. */
9a4105ab
AC
378 if (deprecated_exec_file_display_hook)
379 (*deprecated_exec_file_display_hook) (filename);
c906108c 380 }
9b333ba3 381
ce7d4522 382 bfd_cache_close_all ();
76727919 383 gdb::observers::executable_changed.notify ();
c906108c
SS
384}
385
386/* Process the first arg in ARGS as the new exec file.
387
c5aa993b
JM
388 Note that we have to explicitly ignore additional args, since we can
389 be called from file_command(), which also calls symbol_file_command()
1adeb98a
FN
390 which can take multiple args.
391
0963b4bd 392 If ARGS is NULL, we just want to close the exec file. */
c906108c 393
1adeb98a 394static void
1d8b34a7 395exec_file_command (const char *args, int from_tty)
c906108c 396{
4c42eaff
DJ
397 if (from_tty && target_has_execution
398 && !query (_("A program is being debugged already.\n"
399 "Are you sure you want to change the file? ")))
400 error (_("File not changed."));
1adeb98a
FN
401
402 if (args)
403 {
404 /* Scan through the args and pick up the first non option arg
405 as the filename. */
406
773a1edc
TT
407 gdb_argv built_argv (args);
408 char **argv = built_argv.get ();
1adeb98a
FN
409
410 for (; (*argv != NULL) && (**argv == '-'); argv++)
411 {;
412 }
413 if (*argv == NULL)
8a3fe4f8 414 error (_("No executable file name was specified"));
1adeb98a 415
773a1edc
TT
416 gdb::unique_xmalloc_ptr<char> filename (tilde_expand (*argv));
417 exec_file_attach (filename.get (), from_tty);
1adeb98a
FN
418 }
419 else
420 exec_file_attach (NULL, from_tty);
c906108c
SS
421}
422
0963b4bd 423/* Set both the exec file and the symbol file, in one command.
c906108c
SS
424 What a novelty. Why did GDB go through four major releases before this
425 command was added? */
426
427static void
1d8b34a7 428file_command (const char *arg, int from_tty)
c906108c
SS
429{
430 /* FIXME, if we lose on reading the symbol file, we should revert
431 the exec file, but that's rough. */
432 exec_file_command (arg, from_tty);
433 symbol_file_command (arg, from_tty);
9a4105ab
AC
434 if (deprecated_file_changed_hook)
435 deprecated_file_changed_hook (arg);
c906108c 436}
c906108c 437\f
c5aa993b 438
0963b4bd 439/* Locate all mappable sections of a BFD file.
c906108c
SS
440 table_pp_char is a char * to get it through bfd_map_over_sections;
441 we cast it back to its proper type. */
442
443static void
7be0c536
AC
444add_to_section_table (bfd *abfd, struct bfd_section *asect,
445 void *table_pp_char)
c906108c 446{
0542c86d 447 struct target_section **table_pp = (struct target_section **) table_pp_char;
c906108c
SS
448 flagword aflag;
449
2b2848e2
DE
450 gdb_assert (abfd == asect->owner);
451
0f5d55d8
JB
452 /* Check the section flags, but do not discard zero-length sections, since
453 some symbols may still be attached to this section. For instance, we
454 encountered on sparc-solaris 2.10 a shared library with an empty .bss
455 section to which a symbol named "_end" was attached. The address
456 of this symbol still needs to be relocated. */
fd361982 457 aflag = bfd_section_flags (asect);
c906108c
SS
458 if (!(aflag & SEC_ALLOC))
459 return;
0f5d55d8 460
046ac79f 461 (*table_pp)->owner = NULL;
c906108c 462 (*table_pp)->the_bfd_section = asect;
fd361982
AM
463 (*table_pp)->addr = bfd_section_vma (asect);
464 (*table_pp)->endaddr = (*table_pp)->addr + bfd_section_size (asect);
c906108c
SS
465 (*table_pp)++;
466}
467
a5b1fd27
DE
468/* See exec.h. */
469
470void
471clear_section_table (struct target_section_table *table)
472{
473 xfree (table->sections);
474 table->sections = table->sections_end = NULL;
475}
476
477/* Resize section table TABLE by ADJUSTMENT.
478 ADJUSTMENT may be negative, in which case the caller must have already
479 removed the sections being deleted.
480 Returns the old size. */
481
482static int
483resize_section_table (struct target_section_table *table, int adjustment)
07b82ea5 484{
07b82ea5
PA
485 int old_count;
486 int new_count;
487
07b82ea5
PA
488 old_count = table->sections_end - table->sections;
489
a5b1fd27 490 new_count = adjustment + old_count;
07b82ea5
PA
491
492 if (new_count)
493 {
224c3ddb
SM
494 table->sections = XRESIZEVEC (struct target_section, table->sections,
495 new_count);
07b82ea5
PA
496 table->sections_end = table->sections + new_count;
497 }
498 else
a5b1fd27 499 clear_section_table (table);
07b82ea5
PA
500
501 return old_count;
502}
503
c906108c
SS
504/* Builds a section table, given args BFD, SECTABLE_PTR, SECEND_PTR.
505 Returns 0 if OK, 1 on error. */
506
507int
0542c86d
PA
508build_section_table (struct bfd *some_bfd, struct target_section **start,
509 struct target_section **end)
c906108c
SS
510{
511 unsigned count;
512
513 count = bfd_count_sections (some_bfd);
514 if (*start)
b8c9b27d 515 xfree (* start);
8d749320 516 *start = XNEWVEC (struct target_section, count);
c906108c 517 *end = *start;
c5aa993b 518 bfd_map_over_sections (some_bfd, add_to_section_table, (char *) end);
c906108c 519 if (*end > *start + count)
3e43a32a
MS
520 internal_error (__FILE__, __LINE__,
521 _("failed internal consistency check"));
c906108c
SS
522 /* We could realloc the table, but it probably loses for most files. */
523 return 0;
524}
07b82ea5
PA
525
526/* Add the sections array defined by [SECTIONS..SECTIONS_END[ to the
527 current set of target sections. */
528
529void
046ac79f 530add_target_sections (void *owner,
ed9eebaf 531 struct target_section *sections,
07b82ea5
PA
532 struct target_section *sections_end)
533{
534 int count;
535 struct target_section_table *table = current_target_sections;
536
537 count = sections_end - sections;
538
539 if (count > 0)
540 {
541 int space = resize_section_table (table, count);
ed9eebaf 542 int i;
d7f9d729 543
ed9eebaf
TT
544 for (i = 0; i < count; ++i)
545 {
546 table->sections[space + i] = sections[i];
046ac79f 547 table->sections[space + i].owner = owner;
ed9eebaf 548 }
07b82ea5
PA
549
550 /* If these are the first file sections we can provide memory
551 from, push the file_stratum target. */
ab16fce8
TT
552 if (!target_is_pushed (&exec_ops))
553 push_target (&exec_ops);
07b82ea5
PA
554 }
555}
556
76ad5e1e
NB
557/* Add the sections of OBJFILE to the current set of target sections. */
558
559void
560add_target_sections_of_objfile (struct objfile *objfile)
561{
562 struct target_section_table *table = current_target_sections;
563 struct obj_section *osect;
564 int space;
565 unsigned count = 0;
566 struct target_section *ts;
567
568 if (objfile == NULL)
569 return;
570
571 /* Compute the number of sections to add. */
572 ALL_OBJFILE_OSECTIONS (objfile, osect)
573 {
fd361982 574 if (bfd_section_size (osect->the_bfd_section) == 0)
76ad5e1e
NB
575 continue;
576 count++;
577 }
578
579 if (count == 0)
580 return;
581
582 space = resize_section_table (table, count);
583
584 ts = table->sections + space;
585
586 ALL_OBJFILE_OSECTIONS (objfile, osect)
587 {
fd361982 588 if (bfd_section_size (osect->the_bfd_section) == 0)
76ad5e1e
NB
589 continue;
590
591 gdb_assert (ts < table->sections + space + count);
592
593 ts->addr = obj_section_addr (osect);
594 ts->endaddr = obj_section_endaddr (osect);
595 ts->the_bfd_section = osect->the_bfd_section;
596 ts->owner = (void *) objfile;
597
598 ts++;
599 }
600}
601
046ac79f
JK
602/* Remove all target sections owned by OWNER.
603 OWNER must be the same value passed to add_target_sections. */
07b82ea5
PA
604
605void
046ac79f 606remove_target_sections (void *owner)
07b82ea5
PA
607{
608 struct target_section *src, *dest;
07b82ea5
PA
609 struct target_section_table *table = current_target_sections;
610
046ac79f
JK
611 gdb_assert (owner != NULL);
612
07b82ea5
PA
613 dest = table->sections;
614 for (src = table->sections; src < table->sections_end; src++)
046ac79f 615 if (src->owner != owner)
07b82ea5
PA
616 {
617 /* Keep this section. */
618 if (dest < src)
619 *dest = *src;
620 dest++;
621 }
622
623 /* If we've dropped any sections, resize the section table. */
624 if (dest < src)
625 {
626 int old_count;
627
628 old_count = resize_section_table (table, dest - src);
629
630 /* If we don't have any more sections to read memory from,
631 remove the file_stratum target from the stack. */
632 if (old_count + (dest - src) == 0)
6c95b8df
PA
633 {
634 struct program_space *pspace;
635
636 ALL_PSPACES (pspace)
637 if (pspace->target_sections.sections
638 != pspace->target_sections.sections_end)
639 return;
640
641 unpush_target (&exec_ops);
642 }
07b82ea5
PA
643 }
644}
645
c906108c 646\f
348f8c02 647
1ca49d37
YQ
648enum target_xfer_status
649exec_read_partial_read_only (gdb_byte *readbuf, ULONGEST offset,
650 ULONGEST len, ULONGEST *xfered_len)
651{
652 /* It's unduly pedantic to refuse to look at the executable for
653 read-only pieces; so do the equivalent of readonly regions aka
654 QTro packet. */
655 if (exec_bfd != NULL)
656 {
657 asection *s;
658 bfd_size_type size;
659 bfd_vma vma;
660
661 for (s = exec_bfd->sections; s; s = s->next)
662 {
663 if ((s->flags & SEC_LOAD) == 0
664 || (s->flags & SEC_READONLY) == 0)
665 continue;
666
667 vma = s->vma;
fd361982 668 size = bfd_section_size (s);
1ca49d37
YQ
669 if (vma <= offset && offset < (vma + size))
670 {
671 ULONGEST amt;
672
673 amt = (vma + size) - offset;
674 if (amt > len)
675 amt = len;
676
677 amt = bfd_get_section_contents (exec_bfd, s,
678 readbuf, offset - vma, amt);
679
680 if (amt == 0)
681 return TARGET_XFER_EOF;
682 else
683 {
684 *xfered_len = amt;
685 return TARGET_XFER_OK;
686 }
687 }
688 }
689 }
690
691 /* Indicate failure to find the requested memory block. */
692 return TARGET_XFER_E_IO;
693}
694
a79b1bc6 695/* Return all read-only memory ranges found in the target section
5a2eb0ef 696 table defined by SECTIONS and SECTIONS_END, starting at (and
a79b1bc6 697 intersected with) MEMADDR for LEN bytes. */
5a2eb0ef 698
a79b1bc6
SM
699static std::vector<mem_range>
700section_table_available_memory (CORE_ADDR memaddr, ULONGEST len,
e6ca34fc
PA
701 struct target_section *sections,
702 struct target_section *sections_end)
703{
a79b1bc6 704 std::vector<mem_range> memory;
e6ca34fc 705
a79b1bc6 706 for (target_section *p = sections; p < sections_end; p++)
e6ca34fc 707 {
fd361982 708 if ((bfd_section_flags (p->the_bfd_section) & SEC_READONLY) == 0)
e6ca34fc
PA
709 continue;
710
711 /* Copy the meta-data, adjusted. */
712 if (mem_ranges_overlap (p->addr, p->endaddr - p->addr, memaddr, len))
713 {
714 ULONGEST lo1, hi1, lo2, hi2;
e6ca34fc
PA
715
716 lo1 = memaddr;
717 hi1 = memaddr + len;
718
719 lo2 = p->addr;
720 hi2 = p->endaddr;
721
a79b1bc6
SM
722 CORE_ADDR start = std::max (lo1, lo2);
723 int length = std::min (hi1, hi2) - start;
e6ca34fc 724
a79b1bc6 725 memory.emplace_back (start, length);
e6ca34fc
PA
726 }
727 }
728
729 return memory;
730}
731
1ee79381
YQ
732enum target_xfer_status
733section_table_read_available_memory (gdb_byte *readbuf, ULONGEST offset,
734 ULONGEST len, ULONGEST *xfered_len)
735{
a79b1bc6
SM
736 target_section_table *table = target_get_section_table (&exec_ops);
737 std::vector<mem_range> available_memory
738 = section_table_available_memory (offset, len,
739 table->sections, table->sections_end);
1ee79381 740
a79b1bc6 741 normalize_mem_ranges (&available_memory);
1ee79381 742
a79b1bc6 743 for (const mem_range &r : available_memory)
1ee79381 744 {
a79b1bc6 745 if (mem_ranges_overlap (r.start, r.length, offset, len))
1ee79381
YQ
746 {
747 CORE_ADDR end;
748 enum target_xfer_status status;
749
750 /* Get the intersection window. */
a79b1bc6 751 end = std::min<CORE_ADDR> (offset + len, r.start + r.length);
1ee79381
YQ
752
753 gdb_assert (end - offset <= len);
754
a79b1bc6 755 if (offset >= r.start)
1ee79381
YQ
756 status = exec_read_partial_read_only (readbuf, offset,
757 end - offset,
758 xfered_len);
759 else
760 {
a79b1bc6 761 *xfered_len = r.start - offset;
bc113b4e 762 status = TARGET_XFER_UNAVAILABLE;
1ee79381 763 }
1ee79381
YQ
764 return status;
765 }
766 }
1ee79381
YQ
767
768 *xfered_len = len;
bc113b4e 769 return TARGET_XFER_UNAVAILABLE;
1ee79381
YQ
770}
771
9b409511 772enum target_xfer_status
07b82ea5 773section_table_xfer_memory_partial (gdb_byte *readbuf, const gdb_byte *writebuf,
b55e14c7 774 ULONGEST offset, ULONGEST len,
9b409511 775 ULONGEST *xfered_len,
07b82ea5
PA
776 struct target_section *sections,
777 struct target_section *sections_end,
778 const char *section_name)
c906108c 779{
020cc13c 780 int res;
0542c86d 781 struct target_section *p;
07b82ea5
PA
782 ULONGEST memaddr = offset;
783 ULONGEST memend = memaddr + len;
c906108c 784
b55e14c7 785 if (len == 0)
3e43a32a
MS
786 internal_error (__FILE__, __LINE__,
787 _("failed internal consistency check"));
c906108c 788
348f8c02 789 for (p = sections; p < sections_end; p++)
c906108c 790 {
2b2848e2
DE
791 struct bfd_section *asect = p->the_bfd_section;
792 bfd *abfd = asect->owner;
793
794 if (section_name && strcmp (section_name, asect->name) != 0)
0963b4bd 795 continue; /* not the section we need. */
c906108c 796 if (memaddr >= p->addr)
3db26b01
JB
797 {
798 if (memend <= p->endaddr)
799 {
800 /* Entire transfer is within this section. */
07b82ea5 801 if (writebuf)
2b2848e2 802 res = bfd_set_section_contents (abfd, asect,
07b82ea5 803 writebuf, memaddr - p->addr,
85302095
AC
804 len);
805 else
2b2848e2 806 res = bfd_get_section_contents (abfd, asect,
07b82ea5 807 readbuf, memaddr - p->addr,
85302095 808 len);
9b409511
YQ
809
810 if (res != 0)
811 {
812 *xfered_len = len;
813 return TARGET_XFER_OK;
814 }
815 else
816 return TARGET_XFER_EOF;
3db26b01
JB
817 }
818 else if (memaddr >= p->endaddr)
819 {
820 /* This section ends before the transfer starts. */
821 continue;
822 }
823 else
824 {
825 /* This section overlaps the transfer. Just do half. */
826 len = p->endaddr - memaddr;
07b82ea5 827 if (writebuf)
2b2848e2 828 res = bfd_set_section_contents (abfd, asect,
07b82ea5 829 writebuf, memaddr - p->addr,
85302095
AC
830 len);
831 else
2b2848e2 832 res = bfd_get_section_contents (abfd, asect,
07b82ea5 833 readbuf, memaddr - p->addr,
85302095 834 len);
9b409511
YQ
835 if (res != 0)
836 {
837 *xfered_len = len;
838 return TARGET_XFER_OK;
839 }
840 else
841 return TARGET_XFER_EOF;
3db26b01
JB
842 }
843 }
c906108c
SS
844 }
845
9b409511 846 return TARGET_XFER_EOF; /* We can't help. */
c906108c 847}
348f8c02 848
f6ac5f3d
PA
849struct target_section_table *
850exec_target::get_section_table ()
348f8c02 851{
07b82ea5 852 return current_target_sections;
348f8c02
PA
853}
854
f6ac5f3d
PA
855enum target_xfer_status
856exec_target::xfer_partial (enum target_object object,
857 const char *annex, gdb_byte *readbuf,
858 const gdb_byte *writebuf,
859 ULONGEST offset, ULONGEST len, ULONGEST *xfered_len)
348f8c02 860{
f6ac5f3d 861 struct target_section_table *table = get_section_table ();
07b82ea5
PA
862
863 if (object == TARGET_OBJECT_MEMORY)
864 return section_table_xfer_memory_partial (readbuf, writebuf,
9b409511 865 offset, len, xfered_len,
07b82ea5
PA
866 table->sections,
867 table->sections_end,
868 NULL);
869 else
2ed4b548 870 return TARGET_XFER_E_IO;
348f8c02 871}
c906108c 872\f
c5aa993b 873
c906108c 874void
07b82ea5 875print_section_info (struct target_section_table *t, bfd *abfd)
c906108c 876{
5af949e3 877 struct gdbarch *gdbarch = gdbarch_from_bfd (abfd);
0542c86d 878 struct target_section *p;
17a912b6 879 /* FIXME: 16 is not wide enough when gdbarch_addr_bit > 64. */
5af949e3 880 int wid = gdbarch_addr_bit (gdbarch) <= 32 ? 8 : 16;
c906108c 881
c5aa993b 882 printf_filtered ("\t`%s', ", bfd_get_filename (abfd));
c906108c 883 wrap_here (" ");
a3f17187 884 printf_filtered (_("file type %s.\n"), bfd_get_target (abfd));
c906108c 885 if (abfd == exec_bfd)
51bee8e9 886 {
3e43a32a
MS
887 /* gcc-3.4 does not like the initialization in
888 <p == t->sections_end>. */
d904de5b 889 bfd_vma displacement = 0;
2f1bdd26 890 bfd_vma entry_point;
51bee8e9
JK
891
892 for (p = t->sections; p < t->sections_end; p++)
893 {
2b2848e2 894 struct bfd_section *psect = p->the_bfd_section;
51bee8e9 895
fd361982 896 if ((bfd_section_flags (psect) & (SEC_ALLOC | SEC_LOAD))
51bee8e9
JK
897 != (SEC_ALLOC | SEC_LOAD))
898 continue;
899
fd361982
AM
900 if (bfd_section_vma (psect) <= abfd->start_address
901 && abfd->start_address < (bfd_section_vma (psect)
902 + bfd_section_size (psect)))
51bee8e9 903 {
fd361982 904 displacement = p->addr - bfd_section_vma (psect);
51bee8e9
JK
905 break;
906 }
907 }
908 if (p == t->sections_end)
b37520b6 909 warning (_("Cannot find section for the entry point of %s."),
d904de5b 910 bfd_get_filename (abfd));
51bee8e9 911
2f1bdd26
MGD
912 entry_point = gdbarch_addr_bits_remove (gdbarch,
913 bfd_get_start_address (abfd)
914 + displacement);
51bee8e9 915 printf_filtered (_("\tEntry point: %s\n"),
2f1bdd26 916 paddress (gdbarch, entry_point));
51bee8e9 917 }
07b82ea5 918 for (p = t->sections; p < t->sections_end; p++)
c906108c 919 {
2b2848e2
DE
920 struct bfd_section *psect = p->the_bfd_section;
921 bfd *pbfd = psect->owner;
922
bb599908
PH
923 printf_filtered ("\t%s", hex_string_custom (p->addr, wid));
924 printf_filtered (" - %s", hex_string_custom (p->endaddr, wid));
bcf16802
KB
925
926 /* FIXME: A format of "08l" is not wide enough for file offsets
927 larger than 4GB. OTOH, making it "016l" isn't desirable either
928 since most output will then be much wider than necessary. It
929 may make sense to test the size of the file and choose the
930 format string accordingly. */
a3f17187 931 /* FIXME: i18n: Need to rewrite this sentence. */
c906108c
SS
932 if (info_verbose)
933 printf_filtered (" @ %s",
2b2848e2 934 hex_string_custom (psect->filepos, 8));
fd361982 935 printf_filtered (" is %s", bfd_section_name (psect));
2b2848e2
DE
936 if (pbfd != abfd)
937 printf_filtered (" in %s", bfd_get_filename (pbfd));
c906108c
SS
938 printf_filtered ("\n");
939 }
940}
941
f6ac5f3d
PA
942void
943exec_target::files_info ()
c906108c 944{
57008375
JK
945 if (exec_bfd)
946 print_section_info (current_target_sections, exec_bfd);
947 else
948 puts_filtered (_("\t<no file loaded>\n"));
c906108c
SS
949}
950
951static void
0b39b52e 952set_section_command (const char *args, int from_tty)
c906108c 953{
0542c86d 954 struct target_section *p;
0b39b52e 955 const char *secname;
c906108c
SS
956 unsigned seclen;
957 unsigned long secaddr;
958 char secprint[100];
959 long offset;
07b82ea5 960 struct target_section_table *table;
c906108c
SS
961
962 if (args == 0)
8a3fe4f8 963 error (_("Must specify section name and its virtual address"));
c906108c 964
0963b4bd 965 /* Parse out section name. */
c5aa993b 966 for (secname = args; !isspace (*args); args++);
c906108c
SS
967 seclen = args - secname;
968
0963b4bd 969 /* Parse out new virtual address. */
c906108c
SS
970 secaddr = parse_and_eval_address (args);
971
07b82ea5
PA
972 table = current_target_sections;
973 for (p = table->sections; p < table->sections_end; p++)
c5aa993b 974 {
fd361982
AM
975 if (!strncmp (secname, bfd_section_name (p->the_bfd_section), seclen)
976 && bfd_section_name (p->the_bfd_section)[seclen] == '\0')
c5aa993b
JM
977 {
978 offset = secaddr - p->addr;
979 p->addr += offset;
980 p->endaddr += offset;
981 if (from_tty)
f6ac5f3d 982 exec_ops.files_info ();
c5aa993b
JM
983 return;
984 }
c906108c 985 }
c906108c
SS
986 if (seclen >= sizeof (secprint))
987 seclen = sizeof (secprint) - 1;
988 strncpy (secprint, secname, seclen);
989 secprint[seclen] = '\0';
8a3fe4f8 990 error (_("Section %s not found"), secprint);
c906108c
SS
991}
992
30510692
DJ
993/* If we can find a section in FILENAME with BFD index INDEX, adjust
994 it to ADDRESS. */
c1bd25fd
DJ
995
996void
997exec_set_section_address (const char *filename, int index, CORE_ADDR address)
998{
0542c86d 999 struct target_section *p;
07b82ea5 1000 struct target_section_table *table;
c1bd25fd 1001
07b82ea5
PA
1002 table = current_target_sections;
1003 for (p = table->sections; p < table->sections_end; p++)
c1bd25fd 1004 {
2b2848e2 1005 if (filename_cmp (filename, p->the_bfd_section->owner->filename) == 0
30510692 1006 && index == p->the_bfd_section->index)
c1bd25fd 1007 {
30510692 1008 p->endaddr += address - p->addr;
c1bd25fd 1009 p->addr = address;
c1bd25fd
DJ
1010 }
1011 }
1012}
1013
57810aa7 1014bool
f6ac5f3d 1015exec_target::has_memory ()
c35b1492
PA
1016{
1017 /* We can provide memory if we have any file/target sections to read
1018 from. */
1019 return (current_target_sections->sections
1020 != current_target_sections->sections_end);
1021}
1022
f6ac5f3d
PA
1023char *
1024exec_target::make_corefile_notes (bfd *obfd, int *note_size)
83814951
TT
1025{
1026 error (_("Can't create a corefile"));
1027}
be4d1333 1028
f6ac5f3d
PA
1029int
1030exec_target::find_memory_regions (find_memory_region_ftype func, void *data)
c906108c 1031{
f6ac5f3d 1032 return objfile_find_memory_regions (this, func, data);
c906108c
SS
1033}
1034
1035void
fba45db2 1036_initialize_exec (void)
c906108c
SS
1037{
1038 struct cmd_list_element *c;
1039
c906108c
SS
1040 if (!dbx_commands)
1041 {
1a966eab
AC
1042 c = add_cmd ("file", class_files, file_command, _("\
1043Use FILE as program to be debugged.\n\
c906108c
SS
1044It is read for its symbols, for getting the contents of pure memory,\n\
1045and it is the program executed when you use the `run' command.\n\
1046If FILE cannot be found as specified, your execution directory path\n\
1047($PATH) is searched for a command of that name.\n\
1a966eab 1048No arg means to have no executable file and no symbols."), &cmdlist);
5ba2abeb 1049 set_cmd_completer (c, filename_completer);
c906108c
SS
1050 }
1051
1a966eab
AC
1052 c = add_cmd ("exec-file", class_files, exec_file_command, _("\
1053Use FILE as program for getting contents of pure memory.\n\
c906108c
SS
1054If FILE cannot be found as specified, your execution directory path\n\
1055is searched for a command of that name.\n\
1a966eab 1056No arg means have no executable file."), &cmdlist);
5ba2abeb 1057 set_cmd_completer (c, filename_completer);
c906108c 1058
1bedd215
AC
1059 add_com ("section", class_files, set_section_command, _("\
1060Change the base address of section SECTION of the exec file to ADDR.\n\
c906108c
SS
1061This can be used if the exec file does not contain section addresses,\n\
1062(such as in the a.out format), or when the addresses specified in the\n\
1063file itself are wrong. Each section must be changed separately. The\n\
1bedd215 1064``info files'' command lists all the sections and their addresses."));
c906108c 1065
5bf193a2
AC
1066 add_setshow_boolean_cmd ("write", class_support, &write_files, _("\
1067Set writing into executable and core files."), _("\
1068Show writing into executable and core files."), NULL,
1069 NULL,
920d2a44 1070 show_write_files,
5bf193a2 1071 &setlist, &showlist);
c5aa993b 1072
d9f719f1 1073 add_target (exec_target_info, exec_target_open, filename_completer);
c906108c 1074}
This page took 1.393498 seconds and 4 git commands to generate.