gdb: add target_ops::supports_displaced_step
[deliverable/binutils-gdb.git] / gdb / exec.c
CommitLineData
c906108c 1/* Work with executable files, for GDB.
4646aa9d 2
b811d2c2 3 Copyright (C) 1988-2020 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "frame.h"
d55e5aa6 22#include "inferior.h"
4de283e4
TT
23#include "target.h"
24#include "gdbcmd.h"
c906108c 25#include "language.h"
4de283e4
TT
26#include "filenames.h"
27#include "symfile.h"
c906108c 28#include "objfiles.h"
4de283e4
TT
29#include "completer.h"
30#include "value.h"
31#include "exec.h"
76727919 32#include "observable.h"
4de283e4
TT
33#include "arch-utils.h"
34#include "gdbthread.h"
6c95b8df 35#include "progspace.h"
53af73bf 36#include "progspace-and-thread.h"
4de283e4
TT
37#include "gdb_bfd.h"
38#include "gcore.h"
39#include "source.h"
98c59b52 40#include "build-id.h"
4de283e4
TT
41
42#include <fcntl.h>
e0eac551 43#include "readline/tilde.h"
4de283e4
TT
44#include "gdbcore.h"
45
46#include <ctype.h>
47#include <sys/stat.h>
a9a5a3d1 48#include "solist.h"
4de283e4 49#include <algorithm>
268a13a5 50#include "gdbsupport/pathstuff.h"
a2fedca9 51#include "cli/cli-style.h"
c906108c 52
1d8b34a7 53void (*deprecated_file_changed_hook) (const char *);
c906108c 54
d9f719f1
PA
55static const target_info exec_target_info = {
56 "exec",
57 N_("Local exec file"),
58 N_("Use an executable file as a target.\n\
59Specify the filename of the executable file.")
60};
61
c906108c
SS
62/* The target vector for executable files. */
63
f6ac5f3d
PA
64struct exec_target final : public target_ops
65{
d9f719f1
PA
66 const target_info &info () const override
67 { return exec_target_info; }
f6ac5f3d 68
66b4deae
PA
69 strata stratum () const override { return file_stratum; }
70
f6ac5f3d
PA
71 void close () override;
72 enum target_xfer_status xfer_partial (enum target_object object,
73 const char *annex,
74 gdb_byte *readbuf,
75 const gdb_byte *writebuf,
76 ULONGEST offset, ULONGEST len,
77 ULONGEST *xfered_len) override;
78 struct target_section_table *get_section_table () override;
79 void files_info () override;
80
57810aa7 81 bool has_memory () override;
f6ac5f3d
PA
82 char *make_corefile_notes (bfd *, int *) override;
83 int find_memory_regions (find_memory_region_ftype func, void *data) override;
84};
85
86static exec_target exec_ops;
c906108c 87
a2fedca9
PW
88/* How to handle a mismatch between the current exec file and the exec
89 file determined from target. */
90
91static const char *const exec_file_mismatch_names[]
92 = {"ask", "warn", "off", NULL };
93enum exec_file_mismatch_mode
94 {
95 exec_file_mismatch_ask, exec_file_mismatch_warn, exec_file_mismatch_off
96 };
97static const char *exec_file_mismatch = exec_file_mismatch_names[0];
98static enum exec_file_mismatch_mode exec_file_mismatch_mode
99 = exec_file_mismatch_ask;
100
101/* Show command. */
102static void
103show_exec_file_mismatch_command (struct ui_file *file, int from_tty,
104 struct cmd_list_element *c, const char *value)
105{
106 fprintf_filtered (gdb_stdout,
107 _("exec-file-mismatch handling is currently \"%s\".\n"),
108 exec_file_mismatch_names[exec_file_mismatch_mode]);
109}
110
111/* Set command. Change the setting for range checking. */
112static void
113set_exec_file_mismatch_command (const char *ignore,
114 int from_tty, struct cmd_list_element *c)
115{
116 for (enum exec_file_mismatch_mode mode = exec_file_mismatch_ask;
117 ;
118 mode = static_cast<enum exec_file_mismatch_mode>(1 + (int) mode))
119 {
120 if (strcmp (exec_file_mismatch, exec_file_mismatch_names[mode]) == 0)
121 {
122 exec_file_mismatch_mode = mode;
123 return;
124 }
125 if (mode == exec_file_mismatch_off)
126 internal_error (__FILE__, __LINE__,
127 _("Unrecognized exec-file-mismatch setting: \"%s\""),
128 exec_file_mismatch);
129 }
130}
131
c906108c
SS
132/* Whether to open exec and core files read-only or read-write. */
133
491144b5 134bool write_files = false;
920d2a44
AC
135static void
136show_write_files (struct ui_file *file, int from_tty,
137 struct cmd_list_element *c, const char *value)
138{
139 fprintf_filtered (file, _("Writing into executable and core files is %s.\n"),
140 value);
141}
142
c906108c 143
d9f719f1
PA
144static void
145exec_target_open (const char *args, int from_tty)
1adeb98a
FN
146{
147 target_preopen (from_tty);
148 exec_file_attach (args, from_tty);
149}
150
07b82ea5
PA
151/* Close and clear exec_bfd. If we end up with no target sections to
152 read memory from, this unpushes the exec_ops target. */
153
6c95b8df
PA
154void
155exec_close (void)
07b82ea5
PA
156{
157 if (exec_bfd)
158 {
159 bfd *abfd = exec_bfd;
07b82ea5 160
cbb099e8 161 gdb_bfd_unref (abfd);
07b82ea5
PA
162
163 /* Removing target sections may close the exec_ops target.
164 Clear exec_bfd before doing so to prevent recursion. */
165 exec_bfd = NULL;
166 exec_bfd_mtime = 0;
167
046ac79f 168 remove_target_sections (&exec_bfd);
1f0c4988
JK
169
170 xfree (exec_filename);
171 exec_filename = NULL;
07b82ea5
PA
172 }
173}
174
6c95b8df
PA
175/* This is the target_close implementation. Clears all target
176 sections and closes all executable bfds from all program spaces. */
177
f6ac5f3d
PA
178void
179exec_target::close ()
c906108c 180{
5ed8105e 181 scoped_restore_current_program_space restore_pspace;
6c95b8df 182
94c93c35 183 for (struct program_space *ss : program_spaces)
5ed8105e
PA
184 {
185 set_current_program_space (ss);
186 clear_section_table (current_target_sections);
187 exec_close ();
188 }
c906108c
SS
189}
190
f6ac5f3d 191/* See gdbcore.h. */
a10de604
GB
192
193void
ecf45d2c
SL
194try_open_exec_file (const char *exec_file_host, struct inferior *inf,
195 symfile_add_flags add_flags)
a10de604 196{
cc06b668 197 struct gdb_exception prev_err;
a10de604 198
57d1de9c
LM
199 /* exec_file_attach and symbol_file_add_main may throw an error if the file
200 cannot be opened either locally or remotely.
201
202 This happens for example, when the file is first found in the local
203 sysroot (above), and then disappears (a TOCTOU race), or when it doesn't
204 exist in the target filesystem, or when the file does exist, but
205 is not readable.
88178e82 206
57d1de9c
LM
207 Even without a symbol file, the remote-based debugging session should
208 continue normally instead of ending abruptly. Hence we catch thrown
209 errors/exceptions in the following code. */
a70b8144 210 try
57d1de9c 211 {
ecf45d2c
SL
212 /* We must do this step even if exec_file_host is NULL, so that
213 exec_file_attach will clear state. */
214 exec_file_attach (exec_file_host, add_flags & SYMFILE_VERBOSE);
57d1de9c 215 }
94aeb44b 216 catch (gdb_exception_error &err)
57d1de9c
LM
217 {
218 if (err.message != NULL)
3d6e9d23 219 warning ("%s", err.what ());
57d1de9c 220
94aeb44b 221 prev_err = std::move (err);
57d1de9c 222 }
57d1de9c 223
ecf45d2c 224 if (exec_file_host != NULL)
57d1de9c 225 {
a70b8144 226 try
ecf45d2c
SL
227 {
228 symbol_file_add_main (exec_file_host, add_flags);
229 }
230d2906 230 catch (const gdb_exception_error &err)
ecf45d2c
SL
231 {
232 if (!exception_print_same (prev_err, err))
3d6e9d23 233 warning ("%s", err.what ());
ecf45d2c 234 }
57d1de9c 235 }
ecf45d2c
SL
236}
237
238/* See gdbcore.h. */
239
a2fedca9
PW
240void
241validate_exec_file (int from_tty)
242{
243 /* If user asked to ignore the mismatch, do nothing. */
244 if (exec_file_mismatch_mode == exec_file_mismatch_off)
245 return;
246
247 const char *current_exec_file = get_exec_file (0);
248 struct inferior *inf = current_inferior ();
249 /* Try to determine a filename from the process itself. */
250 const char *pid_exec_file = target_pid_to_exec_file (inf->pid);
98c59b52 251 bool build_id_mismatch = false;
a2fedca9 252
98c59b52 253 /* If we cannot validate the exec file, return. */
a2fedca9
PW
254 if (current_exec_file == NULL || pid_exec_file == NULL)
255 return;
256
98c59b52
PA
257 /* Try validating via build-id, if available. This is the most
258 reliable check. */
259 const bfd_build_id *exec_file_build_id = build_id_bfd_get (exec_bfd);
260 if (exec_file_build_id != nullptr)
261 {
262 /* Prepend the target prefix, to force gdb_bfd_open to open the
263 file on the remote file system (if indeed remote). */
264 std::string target_pid_exec_file
265 = std::string (TARGET_SYSROOT_PREFIX) + pid_exec_file;
266
267 gdb_bfd_ref_ptr abfd (gdb_bfd_open (target_pid_exec_file.c_str (),
268 gnutarget, -1, false));
269 if (abfd != nullptr)
270 {
271 const bfd_build_id *target_exec_file_build_id
272 = build_id_bfd_get (abfd.get ());
a2fedca9 273
98c59b52
PA
274 if (target_exec_file_build_id != nullptr)
275 {
276 if (exec_file_build_id->size == target_exec_file_build_id->size
277 && memcmp (exec_file_build_id->data,
278 target_exec_file_build_id->data,
279 exec_file_build_id->size) == 0)
280 {
281 /* Match. */
282 return;
283 }
284 else
285 build_id_mismatch = true;
286 }
287 }
288 }
a2fedca9 289
98c59b52 290 if (build_id_mismatch)
a2fedca9 291 {
98c59b52
PA
292 std::string exec_file_target (pid_exec_file);
293
294 /* In case the exec file is not local, exec_file_target has to point at
295 the target file system. */
296 if (is_target_filename (current_exec_file) && !target_filesystem_is_local ())
297 exec_file_target = TARGET_SYSROOT_PREFIX + exec_file_target;
298
a2fedca9
PW
299 warning
300 (_("Mismatch between current exec-file %ps\n"
301 "and automatically determined exec-file %ps\n"
302 "exec-file-mismatch handling is currently \"%s\""),
303 styled_string (file_name_style.style (), current_exec_file),
304 styled_string (file_name_style.style (), exec_file_target.c_str ()),
305 exec_file_mismatch_names[exec_file_mismatch_mode]);
306 if (exec_file_mismatch_mode == exec_file_mismatch_ask)
307 {
308 symfile_add_flags add_flags = SYMFILE_MAINLINE;
309 if (from_tty)
310 add_flags |= SYMFILE_VERBOSE;
311 try
312 {
313 symbol_file_add_main (exec_file_target.c_str (), add_flags);
314 exec_file_attach (exec_file_target.c_str (), from_tty);
315 }
316 catch (gdb_exception_error &err)
317 {
318 warning (_("loading %ps %s"),
319 styled_string (file_name_style.style (),
320 exec_file_target.c_str ()),
321 err.message != NULL ? err.what () : "error");
322 }
323 }
324 }
325}
326
327/* See gdbcore.h. */
328
ecf45d2c
SL
329void
330exec_file_locate_attach (int pid, int defer_bp_reset, int from_tty)
331{
797bc1cb 332 char *exec_file_target;
ecf45d2c
SL
333 symfile_add_flags add_flags = 0;
334
335 /* Do nothing if we already have an executable filename. */
336 if (get_exec_file (0) != NULL)
337 return;
338
339 /* Try to determine a filename from the process itself. */
340 exec_file_target = target_pid_to_exec_file (pid);
341 if (exec_file_target == NULL)
57d1de9c 342 {
ecf45d2c
SL
343 warning (_("No executable has been specified and target does not "
344 "support\n"
345 "determining executable automatically. "
346 "Try using the \"file\" command."));
347 return;
57d1de9c 348 }
88178e82 349
797bc1cb
TT
350 gdb::unique_xmalloc_ptr<char> exec_file_host
351 = exec_file_find (exec_file_target, NULL);
ecf45d2c
SL
352
353 if (defer_bp_reset)
354 add_flags |= SYMFILE_DEFER_BP_RESET;
355
356 if (from_tty)
357 add_flags |= SYMFILE_VERBOSE;
358
359 /* Attempt to open the exec file. */
797bc1cb 360 try_open_exec_file (exec_file_host.get (), current_inferior (), add_flags);
a10de604
GB
361}
362
907083d1 363/* Set FILENAME as the new exec file.
c906108c 364
c5aa993b
JM
365 This function is intended to be behave essentially the same
366 as exec_file_command, except that the latter will detect when
367 a target is being debugged, and will ask the user whether it
368 should be shut down first. (If the answer is "no", then the
369 new file is ignored.)
c906108c 370
c5aa993b
JM
371 This file is used by exec_file_command, to do the work of opening
372 and processing the exec file after any prompting has happened.
c906108c 373
c5aa993b
JM
374 And, it is used by child_attach, when the attach command was
375 given a pid but not a exec pathname, and the attach command could
376 figure out the pathname from the pid. (In this case, we shouldn't
377 ask the user whether the current target should be shut down --
907083d1 378 we're supplying the exec pathname late for good reason.) */
c906108c
SS
379
380void
5f08566b 381exec_file_attach (const char *filename, int from_tty)
c906108c 382{
9b333ba3
TT
383 /* First, acquire a reference to the current exec_bfd. We release
384 this at the end of the function; but acquiring it now lets the
385 BFD cache return it if this call refers to the same file. */
1831a9f9 386 gdb_bfd_ref_ptr exec_bfd_holder = gdb_bfd_ref_ptr::new_reference (exec_bfd);
192b62ce 387
c906108c 388 /* Remove any previous exec file. */
6c95b8df 389 exec_close ();
c906108c
SS
390
391 /* Now open and digest the file the user requested, if any. */
392
1adeb98a
FN
393 if (!filename)
394 {
395 if (from_tty)
a3f17187 396 printf_unfiltered (_("No executable file now.\n"));
7a107747
DJ
397
398 set_gdbarch_from_file (NULL);
1adeb98a
FN
399 }
400 else
c906108c 401 {
64c0b5de 402 int load_via_target = 0;
14278e1f 403 const char *scratch_pathname, *canonical_pathname;
c906108c 404 int scratch_chan;
07b82ea5 405 struct target_section *sections = NULL, *sections_end = NULL;
d18b8b7a 406 char **matching;
c5aa993b 407
64c0b5de
GB
408 if (is_target_filename (filename))
409 {
410 if (target_filesystem_is_local ())
411 filename += strlen (TARGET_SYSROOT_PREFIX);
412 else
413 load_via_target = 1;
414 }
415
14278e1f 416 gdb::unique_xmalloc_ptr<char> canonical_storage, scratch_storage;
64c0b5de 417 if (load_via_target)
c5aa993b 418 {
64c0b5de
GB
419 /* gdb_bfd_fopen does not support "target:" filenames. */
420 if (write_files)
421 warning (_("writing into executable files is "
422 "not supported for %s sysroots"),
423 TARGET_SYSROOT_PREFIX);
424
14278e1f 425 scratch_pathname = filename;
64c0b5de 426 scratch_chan = -1;
64c0b5de 427 canonical_pathname = scratch_pathname;
c5aa993b 428 }
64c0b5de
GB
429 else
430 {
431 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
432 filename, write_files ?
433 O_RDWR | O_BINARY : O_RDONLY | O_BINARY,
e0cc99a6 434 &scratch_storage);
64c0b5de
GB
435#if defined(__GO32__) || defined(_WIN32) || defined(__CYGWIN__)
436 if (scratch_chan < 0)
437 {
96445f0b 438 int first_errno = errno;
0ae1c716 439 char *exename = (char *) alloca (strlen (filename) + 5);
64c0b5de
GB
440
441 strcat (strcpy (exename, filename), ".exe");
442 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
443 exename, write_files ?
444 O_RDWR | O_BINARY
445 : O_RDONLY | O_BINARY,
e0cc99a6 446 &scratch_storage);
96445f0b
HD
447 if (scratch_chan < 0)
448 errno = first_errno;
64c0b5de 449 }
c906108c 450#endif
64c0b5de
GB
451 if (scratch_chan < 0)
452 perror_with_name (filename);
a4453b7e 453
e0cc99a6 454 scratch_pathname = scratch_storage.get ();
a4453b7e 455
64c0b5de
GB
456 /* gdb_bfd_open (and its variants) prefers canonicalized
457 pathname for better BFD caching. */
14278e1f
TT
458 canonical_storage = gdb_realpath (scratch_pathname);
459 canonical_pathname = canonical_storage.get ();
64c0b5de 460 }
1f0c4988 461
192b62ce 462 gdb_bfd_ref_ptr temp;
64c0b5de 463 if (write_files && !load_via_target)
192b62ce
TT
464 temp = gdb_bfd_fopen (canonical_pathname, gnutarget,
465 FOPEN_RUB, scratch_chan);
1c00ec6b 466 else
192b62ce
TT
467 temp = gdb_bfd_open (canonical_pathname, gnutarget, scratch_chan);
468 exec_bfd = temp.release ();
c906108c
SS
469
470 if (!exec_bfd)
9fe4a216 471 {
a2fedca9
PW
472 error (_("\"%ps\": could not open as an executable file: %s."),
473 styled_string (file_name_style.style (), scratch_pathname),
474 bfd_errmsg (bfd_get_error ()));
9fe4a216 475 }
c906108c 476
64c0b5de
GB
477 /* gdb_realpath_keepfile resolves symlinks on the local
478 filesystem and so cannot be used for "target:" files. */
1f0c4988 479 gdb_assert (exec_filename == NULL);
64c0b5de
GB
480 if (load_via_target)
481 exec_filename = xstrdup (bfd_get_filename (exec_bfd));
482 else
4971c9a7 483 exec_filename = gdb_realpath_keepfile (scratch_pathname).release ();
1f0c4988 484
d18b8b7a 485 if (!bfd_check_format_matches (exec_bfd, bfd_object, &matching))
c906108c
SS
486 {
487 /* Make sure to close exec_bfd, or else "run" might try to use
488 it. */
6c95b8df 489 exec_close ();
a2fedca9
PW
490 error (_("\"%ps\": not in executable format: %s"),
491 styled_string (file_name_style.style (), scratch_pathname),
803c08d0 492 gdb_bfd_errmsg (bfd_get_error (), matching).c_str ());
c906108c
SS
493 }
494
07b82ea5 495 if (build_section_table (exec_bfd, &sections, &sections_end))
c906108c
SS
496 {
497 /* Make sure to close exec_bfd, or else "run" might try to use
498 it. */
6c95b8df 499 exec_close ();
a2fedca9
PW
500 error (_("\"%ps\": can't find the file sections: %s"),
501 styled_string (file_name_style.style (), scratch_pathname),
502 bfd_errmsg (bfd_get_error ()));
c906108c
SS
503 }
504
c04ea773
DJ
505 exec_bfd_mtime = bfd_get_mtime (exec_bfd);
506
c906108c
SS
507 validate_files ();
508
509 set_gdbarch_from_file (exec_bfd);
510
07b82ea5 511 /* Add the executable's sections to the current address spaces'
6c95b8df
PA
512 list of sections. This possibly pushes the exec_ops
513 target. */
ed9eebaf 514 add_target_sections (&exec_bfd, sections, sections_end);
07b82ea5 515 xfree (sections);
c906108c
SS
516
517 /* Tell display code (if any) about the changed file name. */
9a4105ab
AC
518 if (deprecated_exec_file_display_hook)
519 (*deprecated_exec_file_display_hook) (filename);
c906108c 520 }
9b333ba3 521
ce7d4522 522 bfd_cache_close_all ();
76727919 523 gdb::observers::executable_changed.notify ();
c906108c
SS
524}
525
526/* Process the first arg in ARGS as the new exec file.
527
c5aa993b
JM
528 Note that we have to explicitly ignore additional args, since we can
529 be called from file_command(), which also calls symbol_file_command()
1adeb98a
FN
530 which can take multiple args.
531
0963b4bd 532 If ARGS is NULL, we just want to close the exec file. */
c906108c 533
1adeb98a 534static void
1d8b34a7 535exec_file_command (const char *args, int from_tty)
c906108c 536{
4c42eaff
DJ
537 if (from_tty && target_has_execution
538 && !query (_("A program is being debugged already.\n"
539 "Are you sure you want to change the file? ")))
540 error (_("File not changed."));
1adeb98a
FN
541
542 if (args)
543 {
544 /* Scan through the args and pick up the first non option arg
545 as the filename. */
546
773a1edc
TT
547 gdb_argv built_argv (args);
548 char **argv = built_argv.get ();
1adeb98a
FN
549
550 for (; (*argv != NULL) && (**argv == '-'); argv++)
551 {;
552 }
553 if (*argv == NULL)
8a3fe4f8 554 error (_("No executable file name was specified"));
1adeb98a 555
773a1edc
TT
556 gdb::unique_xmalloc_ptr<char> filename (tilde_expand (*argv));
557 exec_file_attach (filename.get (), from_tty);
1adeb98a
FN
558 }
559 else
560 exec_file_attach (NULL, from_tty);
c906108c
SS
561}
562
0963b4bd 563/* Set both the exec file and the symbol file, in one command.
c906108c
SS
564 What a novelty. Why did GDB go through four major releases before this
565 command was added? */
566
567static void
1d8b34a7 568file_command (const char *arg, int from_tty)
c906108c
SS
569{
570 /* FIXME, if we lose on reading the symbol file, we should revert
571 the exec file, but that's rough. */
572 exec_file_command (arg, from_tty);
573 symbol_file_command (arg, from_tty);
9a4105ab
AC
574 if (deprecated_file_changed_hook)
575 deprecated_file_changed_hook (arg);
c906108c 576}
c906108c 577\f
c5aa993b 578
0963b4bd 579/* Locate all mappable sections of a BFD file.
c906108c
SS
580 table_pp_char is a char * to get it through bfd_map_over_sections;
581 we cast it back to its proper type. */
582
583static void
7be0c536
AC
584add_to_section_table (bfd *abfd, struct bfd_section *asect,
585 void *table_pp_char)
c906108c 586{
0542c86d 587 struct target_section **table_pp = (struct target_section **) table_pp_char;
c906108c
SS
588 flagword aflag;
589
2b2848e2
DE
590 gdb_assert (abfd == asect->owner);
591
0f5d55d8
JB
592 /* Check the section flags, but do not discard zero-length sections, since
593 some symbols may still be attached to this section. For instance, we
594 encountered on sparc-solaris 2.10 a shared library with an empty .bss
595 section to which a symbol named "_end" was attached. The address
596 of this symbol still needs to be relocated. */
fd361982 597 aflag = bfd_section_flags (asect);
c906108c
SS
598 if (!(aflag & SEC_ALLOC))
599 return;
0f5d55d8 600
046ac79f 601 (*table_pp)->owner = NULL;
c906108c 602 (*table_pp)->the_bfd_section = asect;
fd361982
AM
603 (*table_pp)->addr = bfd_section_vma (asect);
604 (*table_pp)->endaddr = (*table_pp)->addr + bfd_section_size (asect);
c906108c
SS
605 (*table_pp)++;
606}
607
a5b1fd27
DE
608/* See exec.h. */
609
610void
611clear_section_table (struct target_section_table *table)
612{
613 xfree (table->sections);
614 table->sections = table->sections_end = NULL;
615}
616
617/* Resize section table TABLE by ADJUSTMENT.
618 ADJUSTMENT may be negative, in which case the caller must have already
619 removed the sections being deleted.
620 Returns the old size. */
621
622static int
623resize_section_table (struct target_section_table *table, int adjustment)
07b82ea5 624{
07b82ea5
PA
625 int old_count;
626 int new_count;
627
07b82ea5
PA
628 old_count = table->sections_end - table->sections;
629
a5b1fd27 630 new_count = adjustment + old_count;
07b82ea5
PA
631
632 if (new_count)
633 {
224c3ddb
SM
634 table->sections = XRESIZEVEC (struct target_section, table->sections,
635 new_count);
07b82ea5
PA
636 table->sections_end = table->sections + new_count;
637 }
638 else
a5b1fd27 639 clear_section_table (table);
07b82ea5
PA
640
641 return old_count;
642}
643
c906108c
SS
644/* Builds a section table, given args BFD, SECTABLE_PTR, SECEND_PTR.
645 Returns 0 if OK, 1 on error. */
646
647int
0542c86d
PA
648build_section_table (struct bfd *some_bfd, struct target_section **start,
649 struct target_section **end)
c906108c
SS
650{
651 unsigned count;
652
653 count = bfd_count_sections (some_bfd);
84d53fa9 654 xfree (*start);
8d749320 655 *start = XNEWVEC (struct target_section, count);
c906108c 656 *end = *start;
c5aa993b 657 bfd_map_over_sections (some_bfd, add_to_section_table, (char *) end);
e2ff18a0
SM
658
659 gdb_assert (*end <= *start + count);
660
c906108c
SS
661 /* We could realloc the table, but it probably loses for most files. */
662 return 0;
663}
07b82ea5
PA
664
665/* Add the sections array defined by [SECTIONS..SECTIONS_END[ to the
666 current set of target sections. */
667
668void
046ac79f 669add_target_sections (void *owner,
ed9eebaf 670 struct target_section *sections,
07b82ea5
PA
671 struct target_section *sections_end)
672{
673 int count;
674 struct target_section_table *table = current_target_sections;
675
676 count = sections_end - sections;
677
678 if (count > 0)
679 {
680 int space = resize_section_table (table, count);
ed9eebaf 681 int i;
d7f9d729 682
ed9eebaf
TT
683 for (i = 0; i < count; ++i)
684 {
685 table->sections[space + i] = sections[i];
046ac79f 686 table->sections[space + i].owner = owner;
ed9eebaf 687 }
07b82ea5 688
53af73bf 689 scoped_restore_current_pspace_and_thread restore_pspace_thread;
5b6d1e4f
PA
690 program_space *curr_pspace = current_program_space;
691
07b82ea5 692 /* If these are the first file sections we can provide memory
5b6d1e4f
PA
693 from, push the file_stratum target. Must do this in all
694 inferiors sharing the program space. */
695 for (inferior *inf : all_inferiors ())
696 {
697 if (inf->pspace != curr_pspace)
698 continue;
699
700 if (inf->target_is_pushed (&exec_ops))
701 continue;
702
703 switch_to_inferior_no_thread (inf);
704 push_target (&exec_ops);
705 }
07b82ea5
PA
706 }
707}
708
76ad5e1e
NB
709/* Add the sections of OBJFILE to the current set of target sections. */
710
711void
712add_target_sections_of_objfile (struct objfile *objfile)
713{
714 struct target_section_table *table = current_target_sections;
715 struct obj_section *osect;
716 int space;
717 unsigned count = 0;
718 struct target_section *ts;
719
720 if (objfile == NULL)
721 return;
722
723 /* Compute the number of sections to add. */
724 ALL_OBJFILE_OSECTIONS (objfile, osect)
725 {
fd361982 726 if (bfd_section_size (osect->the_bfd_section) == 0)
76ad5e1e
NB
727 continue;
728 count++;
729 }
730
731 if (count == 0)
732 return;
733
734 space = resize_section_table (table, count);
735
736 ts = table->sections + space;
737
738 ALL_OBJFILE_OSECTIONS (objfile, osect)
739 {
fd361982 740 if (bfd_section_size (osect->the_bfd_section) == 0)
76ad5e1e
NB
741 continue;
742
743 gdb_assert (ts < table->sections + space + count);
744
745 ts->addr = obj_section_addr (osect);
746 ts->endaddr = obj_section_endaddr (osect);
747 ts->the_bfd_section = osect->the_bfd_section;
748 ts->owner = (void *) objfile;
749
750 ts++;
751 }
752}
753
046ac79f
JK
754/* Remove all target sections owned by OWNER.
755 OWNER must be the same value passed to add_target_sections. */
07b82ea5
PA
756
757void
046ac79f 758remove_target_sections (void *owner)
07b82ea5
PA
759{
760 struct target_section *src, *dest;
07b82ea5
PA
761 struct target_section_table *table = current_target_sections;
762
046ac79f
JK
763 gdb_assert (owner != NULL);
764
07b82ea5
PA
765 dest = table->sections;
766 for (src = table->sections; src < table->sections_end; src++)
046ac79f 767 if (src->owner != owner)
07b82ea5
PA
768 {
769 /* Keep this section. */
770 if (dest < src)
771 *dest = *src;
772 dest++;
773 }
774
775 /* If we've dropped any sections, resize the section table. */
776 if (dest < src)
777 {
778 int old_count;
779
780 old_count = resize_section_table (table, dest - src);
781
782 /* If we don't have any more sections to read memory from,
5b6d1e4f
PA
783 remove the file_stratum target from the stack of each
784 inferior sharing the program space. */
07b82ea5 785 if (old_count + (dest - src) == 0)
6c95b8df 786 {
53af73bf 787 scoped_restore_current_pspace_and_thread restore_pspace_thread;
5b6d1e4f
PA
788 program_space *curr_pspace = current_program_space;
789
790 for (inferior *inf : all_inferiors ())
791 {
792 if (inf->pspace != curr_pspace)
793 continue;
6c95b8df 794
5b6d1e4f
PA
795 if (inf->pspace->target_sections.sections
796 != inf->pspace->target_sections.sections_end)
797 continue;
6c95b8df 798
5b6d1e4f
PA
799 switch_to_inferior_no_thread (inf);
800 unpush_target (&exec_ops);
801 }
6c95b8df 802 }
07b82ea5
PA
803 }
804}
805
5b6d1e4f
PA
806/* See exec.h. */
807
808void
809exec_on_vfork ()
810{
811 if (current_program_space->target_sections.sections
812 != current_program_space->target_sections.sections_end)
813 push_target (&exec_ops);
814}
815
c906108c 816\f
348f8c02 817
1ca49d37
YQ
818enum target_xfer_status
819exec_read_partial_read_only (gdb_byte *readbuf, ULONGEST offset,
820 ULONGEST len, ULONGEST *xfered_len)
821{
822 /* It's unduly pedantic to refuse to look at the executable for
823 read-only pieces; so do the equivalent of readonly regions aka
824 QTro packet. */
825 if (exec_bfd != NULL)
826 {
827 asection *s;
828 bfd_size_type size;
829 bfd_vma vma;
830
831 for (s = exec_bfd->sections; s; s = s->next)
832 {
833 if ((s->flags & SEC_LOAD) == 0
834 || (s->flags & SEC_READONLY) == 0)
835 continue;
836
837 vma = s->vma;
fd361982 838 size = bfd_section_size (s);
1ca49d37
YQ
839 if (vma <= offset && offset < (vma + size))
840 {
841 ULONGEST amt;
842
843 amt = (vma + size) - offset;
844 if (amt > len)
845 amt = len;
846
847 amt = bfd_get_section_contents (exec_bfd, s,
848 readbuf, offset - vma, amt);
849
850 if (amt == 0)
851 return TARGET_XFER_EOF;
852 else
853 {
854 *xfered_len = amt;
855 return TARGET_XFER_OK;
856 }
857 }
858 }
859 }
860
861 /* Indicate failure to find the requested memory block. */
862 return TARGET_XFER_E_IO;
863}
864
a79b1bc6 865/* Return all read-only memory ranges found in the target section
5a2eb0ef 866 table defined by SECTIONS and SECTIONS_END, starting at (and
a79b1bc6 867 intersected with) MEMADDR for LEN bytes. */
5a2eb0ef 868
a79b1bc6
SM
869static std::vector<mem_range>
870section_table_available_memory (CORE_ADDR memaddr, ULONGEST len,
e6ca34fc
PA
871 struct target_section *sections,
872 struct target_section *sections_end)
873{
a79b1bc6 874 std::vector<mem_range> memory;
e6ca34fc 875
a79b1bc6 876 for (target_section *p = sections; p < sections_end; p++)
e6ca34fc 877 {
fd361982 878 if ((bfd_section_flags (p->the_bfd_section) & SEC_READONLY) == 0)
e6ca34fc
PA
879 continue;
880
881 /* Copy the meta-data, adjusted. */
882 if (mem_ranges_overlap (p->addr, p->endaddr - p->addr, memaddr, len))
883 {
884 ULONGEST lo1, hi1, lo2, hi2;
e6ca34fc
PA
885
886 lo1 = memaddr;
887 hi1 = memaddr + len;
888
889 lo2 = p->addr;
890 hi2 = p->endaddr;
891
a79b1bc6
SM
892 CORE_ADDR start = std::max (lo1, lo2);
893 int length = std::min (hi1, hi2) - start;
e6ca34fc 894
a79b1bc6 895 memory.emplace_back (start, length);
e6ca34fc
PA
896 }
897 }
898
899 return memory;
900}
901
1ee79381
YQ
902enum target_xfer_status
903section_table_read_available_memory (gdb_byte *readbuf, ULONGEST offset,
904 ULONGEST len, ULONGEST *xfered_len)
905{
a79b1bc6
SM
906 target_section_table *table = target_get_section_table (&exec_ops);
907 std::vector<mem_range> available_memory
908 = section_table_available_memory (offset, len,
909 table->sections, table->sections_end);
1ee79381 910
a79b1bc6 911 normalize_mem_ranges (&available_memory);
1ee79381 912
a79b1bc6 913 for (const mem_range &r : available_memory)
1ee79381 914 {
a79b1bc6 915 if (mem_ranges_overlap (r.start, r.length, offset, len))
1ee79381
YQ
916 {
917 CORE_ADDR end;
918 enum target_xfer_status status;
919
920 /* Get the intersection window. */
a79b1bc6 921 end = std::min<CORE_ADDR> (offset + len, r.start + r.length);
1ee79381
YQ
922
923 gdb_assert (end - offset <= len);
924
a79b1bc6 925 if (offset >= r.start)
1ee79381
YQ
926 status = exec_read_partial_read_only (readbuf, offset,
927 end - offset,
928 xfered_len);
929 else
930 {
a79b1bc6 931 *xfered_len = r.start - offset;
bc113b4e 932 status = TARGET_XFER_UNAVAILABLE;
1ee79381 933 }
1ee79381
YQ
934 return status;
935 }
936 }
1ee79381
YQ
937
938 *xfered_len = len;
bc113b4e 939 return TARGET_XFER_UNAVAILABLE;
1ee79381
YQ
940}
941
9b409511 942enum target_xfer_status
07b82ea5 943section_table_xfer_memory_partial (gdb_byte *readbuf, const gdb_byte *writebuf,
b55e14c7 944 ULONGEST offset, ULONGEST len,
9b409511 945 ULONGEST *xfered_len,
07b82ea5
PA
946 struct target_section *sections,
947 struct target_section *sections_end,
948 const char *section_name)
c906108c 949{
020cc13c 950 int res;
0542c86d 951 struct target_section *p;
07b82ea5
PA
952 ULONGEST memaddr = offset;
953 ULONGEST memend = memaddr + len;
c906108c 954
e2ff18a0 955 gdb_assert (len != 0);
c906108c 956
348f8c02 957 for (p = sections; p < sections_end; p++)
c906108c 958 {
2b2848e2
DE
959 struct bfd_section *asect = p->the_bfd_section;
960 bfd *abfd = asect->owner;
961
962 if (section_name && strcmp (section_name, asect->name) != 0)
0963b4bd 963 continue; /* not the section we need. */
c906108c 964 if (memaddr >= p->addr)
3db26b01
JB
965 {
966 if (memend <= p->endaddr)
967 {
968 /* Entire transfer is within this section. */
07b82ea5 969 if (writebuf)
2b2848e2 970 res = bfd_set_section_contents (abfd, asect,
07b82ea5 971 writebuf, memaddr - p->addr,
85302095
AC
972 len);
973 else
2b2848e2 974 res = bfd_get_section_contents (abfd, asect,
07b82ea5 975 readbuf, memaddr - p->addr,
85302095 976 len);
9b409511
YQ
977
978 if (res != 0)
979 {
980 *xfered_len = len;
981 return TARGET_XFER_OK;
982 }
983 else
984 return TARGET_XFER_EOF;
3db26b01
JB
985 }
986 else if (memaddr >= p->endaddr)
987 {
988 /* This section ends before the transfer starts. */
989 continue;
990 }
991 else
992 {
993 /* This section overlaps the transfer. Just do half. */
994 len = p->endaddr - memaddr;
07b82ea5 995 if (writebuf)
2b2848e2 996 res = bfd_set_section_contents (abfd, asect,
07b82ea5 997 writebuf, memaddr - p->addr,
85302095
AC
998 len);
999 else
2b2848e2 1000 res = bfd_get_section_contents (abfd, asect,
07b82ea5 1001 readbuf, memaddr - p->addr,
85302095 1002 len);
9b409511
YQ
1003 if (res != 0)
1004 {
1005 *xfered_len = len;
1006 return TARGET_XFER_OK;
1007 }
1008 else
1009 return TARGET_XFER_EOF;
3db26b01
JB
1010 }
1011 }
c906108c
SS
1012 }
1013
9b409511 1014 return TARGET_XFER_EOF; /* We can't help. */
c906108c 1015}
348f8c02 1016
f6ac5f3d
PA
1017struct target_section_table *
1018exec_target::get_section_table ()
348f8c02 1019{
07b82ea5 1020 return current_target_sections;
348f8c02
PA
1021}
1022
f6ac5f3d
PA
1023enum target_xfer_status
1024exec_target::xfer_partial (enum target_object object,
1025 const char *annex, gdb_byte *readbuf,
1026 const gdb_byte *writebuf,
1027 ULONGEST offset, ULONGEST len, ULONGEST *xfered_len)
348f8c02 1028{
f6ac5f3d 1029 struct target_section_table *table = get_section_table ();
07b82ea5
PA
1030
1031 if (object == TARGET_OBJECT_MEMORY)
1032 return section_table_xfer_memory_partial (readbuf, writebuf,
9b409511 1033 offset, len, xfered_len,
07b82ea5
PA
1034 table->sections,
1035 table->sections_end,
1036 NULL);
1037 else
2ed4b548 1038 return TARGET_XFER_E_IO;
348f8c02 1039}
c906108c 1040\f
c5aa993b 1041
c906108c 1042void
07b82ea5 1043print_section_info (struct target_section_table *t, bfd *abfd)
c906108c 1044{
5af949e3 1045 struct gdbarch *gdbarch = gdbarch_from_bfd (abfd);
0542c86d 1046 struct target_section *p;
17a912b6 1047 /* FIXME: 16 is not wide enough when gdbarch_addr_bit > 64. */
5af949e3 1048 int wid = gdbarch_addr_bit (gdbarch) <= 32 ? 8 : 16;
c906108c 1049
a2fedca9
PW
1050 printf_filtered ("\t`%ps', ",
1051 styled_string (file_name_style.style (),
1052 bfd_get_filename (abfd)));
c906108c 1053 wrap_here (" ");
a3f17187 1054 printf_filtered (_("file type %s.\n"), bfd_get_target (abfd));
c906108c 1055 if (abfd == exec_bfd)
51bee8e9 1056 {
3e43a32a
MS
1057 /* gcc-3.4 does not like the initialization in
1058 <p == t->sections_end>. */
d904de5b 1059 bfd_vma displacement = 0;
2f1bdd26 1060 bfd_vma entry_point;
51bee8e9
JK
1061
1062 for (p = t->sections; p < t->sections_end; p++)
1063 {
2b2848e2 1064 struct bfd_section *psect = p->the_bfd_section;
51bee8e9 1065
fd361982 1066 if ((bfd_section_flags (psect) & (SEC_ALLOC | SEC_LOAD))
51bee8e9
JK
1067 != (SEC_ALLOC | SEC_LOAD))
1068 continue;
1069
fd361982
AM
1070 if (bfd_section_vma (psect) <= abfd->start_address
1071 && abfd->start_address < (bfd_section_vma (psect)
1072 + bfd_section_size (psect)))
51bee8e9 1073 {
fd361982 1074 displacement = p->addr - bfd_section_vma (psect);
51bee8e9
JK
1075 break;
1076 }
1077 }
1078 if (p == t->sections_end)
a2fedca9
PW
1079 warning (_("Cannot find section for the entry point of %ps."),
1080 styled_string (file_name_style.style (),
1081 bfd_get_filename (abfd)));
51bee8e9 1082
2f1bdd26
MGD
1083 entry_point = gdbarch_addr_bits_remove (gdbarch,
1084 bfd_get_start_address (abfd)
1085 + displacement);
51bee8e9 1086 printf_filtered (_("\tEntry point: %s\n"),
2f1bdd26 1087 paddress (gdbarch, entry_point));
51bee8e9 1088 }
07b82ea5 1089 for (p = t->sections; p < t->sections_end; p++)
c906108c 1090 {
2b2848e2
DE
1091 struct bfd_section *psect = p->the_bfd_section;
1092 bfd *pbfd = psect->owner;
1093
bb599908
PH
1094 printf_filtered ("\t%s", hex_string_custom (p->addr, wid));
1095 printf_filtered (" - %s", hex_string_custom (p->endaddr, wid));
bcf16802
KB
1096
1097 /* FIXME: A format of "08l" is not wide enough for file offsets
1098 larger than 4GB. OTOH, making it "016l" isn't desirable either
1099 since most output will then be much wider than necessary. It
1100 may make sense to test the size of the file and choose the
1101 format string accordingly. */
a3f17187 1102 /* FIXME: i18n: Need to rewrite this sentence. */
c906108c
SS
1103 if (info_verbose)
1104 printf_filtered (" @ %s",
2b2848e2 1105 hex_string_custom (psect->filepos, 8));
fd361982 1106 printf_filtered (" is %s", bfd_section_name (psect));
2b2848e2 1107 if (pbfd != abfd)
a2fedca9
PW
1108 printf_filtered (" in %ps",
1109 styled_string (file_name_style.style (),
1110 bfd_get_filename (pbfd)));
c906108c
SS
1111 printf_filtered ("\n");
1112 }
1113}
1114
f6ac5f3d
PA
1115void
1116exec_target::files_info ()
c906108c 1117{
57008375
JK
1118 if (exec_bfd)
1119 print_section_info (current_target_sections, exec_bfd);
1120 else
1121 puts_filtered (_("\t<no file loaded>\n"));
c906108c
SS
1122}
1123
1124static void
0b39b52e 1125set_section_command (const char *args, int from_tty)
c906108c 1126{
0542c86d 1127 struct target_section *p;
0b39b52e 1128 const char *secname;
c906108c
SS
1129 unsigned seclen;
1130 unsigned long secaddr;
1131 char secprint[100];
1132 long offset;
07b82ea5 1133 struct target_section_table *table;
c906108c
SS
1134
1135 if (args == 0)
8a3fe4f8 1136 error (_("Must specify section name and its virtual address"));
c906108c 1137
0963b4bd 1138 /* Parse out section name. */
c5aa993b 1139 for (secname = args; !isspace (*args); args++);
c906108c
SS
1140 seclen = args - secname;
1141
0963b4bd 1142 /* Parse out new virtual address. */
c906108c
SS
1143 secaddr = parse_and_eval_address (args);
1144
07b82ea5
PA
1145 table = current_target_sections;
1146 for (p = table->sections; p < table->sections_end; p++)
c5aa993b 1147 {
fd361982
AM
1148 if (!strncmp (secname, bfd_section_name (p->the_bfd_section), seclen)
1149 && bfd_section_name (p->the_bfd_section)[seclen] == '\0')
c5aa993b
JM
1150 {
1151 offset = secaddr - p->addr;
1152 p->addr += offset;
1153 p->endaddr += offset;
1154 if (from_tty)
f6ac5f3d 1155 exec_ops.files_info ();
c5aa993b
JM
1156 return;
1157 }
c906108c 1158 }
c906108c
SS
1159 if (seclen >= sizeof (secprint))
1160 seclen = sizeof (secprint) - 1;
1161 strncpy (secprint, secname, seclen);
1162 secprint[seclen] = '\0';
8a3fe4f8 1163 error (_("Section %s not found"), secprint);
c906108c
SS
1164}
1165
30510692
DJ
1166/* If we can find a section in FILENAME with BFD index INDEX, adjust
1167 it to ADDRESS. */
c1bd25fd
DJ
1168
1169void
1170exec_set_section_address (const char *filename, int index, CORE_ADDR address)
1171{
0542c86d 1172 struct target_section *p;
07b82ea5 1173 struct target_section_table *table;
c1bd25fd 1174
07b82ea5
PA
1175 table = current_target_sections;
1176 for (p = table->sections; p < table->sections_end; p++)
c1bd25fd 1177 {
c7e97679
AM
1178 if (filename_cmp (filename,
1179 bfd_get_filename (p->the_bfd_section->owner)) == 0
30510692 1180 && index == p->the_bfd_section->index)
c1bd25fd 1181 {
30510692 1182 p->endaddr += address - p->addr;
c1bd25fd 1183 p->addr = address;
c1bd25fd
DJ
1184 }
1185 }
1186}
1187
57810aa7 1188bool
f6ac5f3d 1189exec_target::has_memory ()
c35b1492
PA
1190{
1191 /* We can provide memory if we have any file/target sections to read
1192 from. */
1193 return (current_target_sections->sections
1194 != current_target_sections->sections_end);
1195}
1196
f6ac5f3d
PA
1197char *
1198exec_target::make_corefile_notes (bfd *obfd, int *note_size)
83814951
TT
1199{
1200 error (_("Can't create a corefile"));
1201}
be4d1333 1202
f6ac5f3d
PA
1203int
1204exec_target::find_memory_regions (find_memory_region_ftype func, void *data)
c906108c 1205{
f6ac5f3d 1206 return objfile_find_memory_regions (this, func, data);
c906108c
SS
1207}
1208
6c265988 1209void _initialize_exec ();
c906108c 1210void
6c265988 1211_initialize_exec ()
c906108c
SS
1212{
1213 struct cmd_list_element *c;
1214
c906108c
SS
1215 if (!dbx_commands)
1216 {
1a966eab
AC
1217 c = add_cmd ("file", class_files, file_command, _("\
1218Use FILE as program to be debugged.\n\
c906108c
SS
1219It is read for its symbols, for getting the contents of pure memory,\n\
1220and it is the program executed when you use the `run' command.\n\
1221If FILE cannot be found as specified, your execution directory path\n\
1222($PATH) is searched for a command of that name.\n\
1a966eab 1223No arg means to have no executable file and no symbols."), &cmdlist);
5ba2abeb 1224 set_cmd_completer (c, filename_completer);
c906108c
SS
1225 }
1226
1a966eab
AC
1227 c = add_cmd ("exec-file", class_files, exec_file_command, _("\
1228Use FILE as program for getting contents of pure memory.\n\
c906108c
SS
1229If FILE cannot be found as specified, your execution directory path\n\
1230is searched for a command of that name.\n\
1a966eab 1231No arg means have no executable file."), &cmdlist);
5ba2abeb 1232 set_cmd_completer (c, filename_completer);
c906108c 1233
1bedd215
AC
1234 add_com ("section", class_files, set_section_command, _("\
1235Change the base address of section SECTION of the exec file to ADDR.\n\
c906108c
SS
1236This can be used if the exec file does not contain section addresses,\n\
1237(such as in the a.out format), or when the addresses specified in the\n\
1238file itself are wrong. Each section must be changed separately. The\n\
1bedd215 1239``info files'' command lists all the sections and their addresses."));
c906108c 1240
5bf193a2
AC
1241 add_setshow_boolean_cmd ("write", class_support, &write_files, _("\
1242Set writing into executable and core files."), _("\
1243Show writing into executable and core files."), NULL,
1244 NULL,
920d2a44 1245 show_write_files,
5bf193a2 1246 &setlist, &showlist);
c5aa993b 1247
a2fedca9
PW
1248 add_setshow_enum_cmd ("exec-file-mismatch", class_support,
1249 exec_file_mismatch_names,
1250 &exec_file_mismatch,
1251 _("\
1252Set exec-file-mismatch handling (ask|warn|off)."),
1253 _("\
1254Show exec-file-mismatch handling (ask|warn|off)."),
1255 _("\
98c59b52
PA
1256Specifies how to handle a mismatch between the current exec-file\n\
1257loaded by GDB and the exec-file automatically determined when attaching\n\
a2fedca9
PW
1258to a process:\n\n\
1259 ask - warn the user and ask whether to load the determined exec-file.\n\
1260 warn - warn the user, but do not change the exec-file.\n\
1261 off - do not check for mismatch."),
1262 set_exec_file_mismatch_command,
1263 show_exec_file_mismatch_command,
1264 &setlist, &showlist);
1265
d9f719f1 1266 add_target (exec_target_info, exec_target_open, filename_completer);
c906108c 1267}
This page took 1.512388 seconds and 4 git commands to generate.