Multi-target support
[deliverable/binutils-gdb.git] / gdb / exec.c
CommitLineData
c906108c 1/* Work with executable files, for GDB.
4646aa9d 2
b811d2c2 3 Copyright (C) 1988-2020 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "frame.h"
d55e5aa6 22#include "inferior.h"
4de283e4
TT
23#include "target.h"
24#include "gdbcmd.h"
c906108c 25#include "language.h"
4de283e4
TT
26#include "filenames.h"
27#include "symfile.h"
c906108c 28#include "objfiles.h"
4de283e4
TT
29#include "completer.h"
30#include "value.h"
31#include "exec.h"
76727919 32#include "observable.h"
4de283e4
TT
33#include "arch-utils.h"
34#include "gdbthread.h"
6c95b8df 35#include "progspace.h"
4de283e4
TT
36#include "gdb_bfd.h"
37#include "gcore.h"
38#include "source.h"
39
40#include <fcntl.h>
e0eac551 41#include "readline/tilde.h"
4de283e4
TT
42#include "gdbcore.h"
43
44#include <ctype.h>
45#include <sys/stat.h>
a9a5a3d1 46#include "solist.h"
4de283e4 47#include <algorithm>
268a13a5 48#include "gdbsupport/pathstuff.h"
c906108c 49
1d8b34a7 50void (*deprecated_file_changed_hook) (const char *);
c906108c 51
d9f719f1
PA
52static const target_info exec_target_info = {
53 "exec",
54 N_("Local exec file"),
55 N_("Use an executable file as a target.\n\
56Specify the filename of the executable file.")
57};
58
c906108c
SS
59/* The target vector for executable files. */
60
f6ac5f3d
PA
61struct exec_target final : public target_ops
62{
d9f719f1
PA
63 const target_info &info () const override
64 { return exec_target_info; }
f6ac5f3d 65
66b4deae
PA
66 strata stratum () const override { return file_stratum; }
67
f6ac5f3d
PA
68 void close () override;
69 enum target_xfer_status xfer_partial (enum target_object object,
70 const char *annex,
71 gdb_byte *readbuf,
72 const gdb_byte *writebuf,
73 ULONGEST offset, ULONGEST len,
74 ULONGEST *xfered_len) override;
75 struct target_section_table *get_section_table () override;
76 void files_info () override;
77
57810aa7 78 bool has_memory () override;
f6ac5f3d
PA
79 char *make_corefile_notes (bfd *, int *) override;
80 int find_memory_regions (find_memory_region_ftype func, void *data) override;
81};
82
83static exec_target exec_ops;
c906108c 84
c906108c
SS
85/* Whether to open exec and core files read-only or read-write. */
86
491144b5 87bool write_files = false;
920d2a44
AC
88static void
89show_write_files (struct ui_file *file, int from_tty,
90 struct cmd_list_element *c, const char *value)
91{
92 fprintf_filtered (file, _("Writing into executable and core files is %s.\n"),
93 value);
94}
95
c906108c 96
d9f719f1
PA
97static void
98exec_target_open (const char *args, int from_tty)
1adeb98a
FN
99{
100 target_preopen (from_tty);
101 exec_file_attach (args, from_tty);
102}
103
07b82ea5
PA
104/* Close and clear exec_bfd. If we end up with no target sections to
105 read memory from, this unpushes the exec_ops target. */
106
6c95b8df
PA
107void
108exec_close (void)
07b82ea5
PA
109{
110 if (exec_bfd)
111 {
112 bfd *abfd = exec_bfd;
07b82ea5 113
cbb099e8 114 gdb_bfd_unref (abfd);
07b82ea5
PA
115
116 /* Removing target sections may close the exec_ops target.
117 Clear exec_bfd before doing so to prevent recursion. */
118 exec_bfd = NULL;
119 exec_bfd_mtime = 0;
120
046ac79f 121 remove_target_sections (&exec_bfd);
1f0c4988
JK
122
123 xfree (exec_filename);
124 exec_filename = NULL;
07b82ea5
PA
125 }
126}
127
6c95b8df
PA
128/* This is the target_close implementation. Clears all target
129 sections and closes all executable bfds from all program spaces. */
130
f6ac5f3d
PA
131void
132exec_target::close ()
c906108c 133{
ab16fce8 134 struct program_space *ss;
5ed8105e 135 scoped_restore_current_program_space restore_pspace;
6c95b8df 136
ab16fce8 137 ALL_PSPACES (ss)
5ed8105e
PA
138 {
139 set_current_program_space (ss);
140 clear_section_table (current_target_sections);
141 exec_close ();
142 }
c906108c
SS
143}
144
f6ac5f3d 145/* See gdbcore.h. */
a10de604
GB
146
147void
ecf45d2c
SL
148try_open_exec_file (const char *exec_file_host, struct inferior *inf,
149 symfile_add_flags add_flags)
a10de604 150{
cc06b668 151 struct gdb_exception prev_err;
a10de604 152
57d1de9c
LM
153 /* exec_file_attach and symbol_file_add_main may throw an error if the file
154 cannot be opened either locally or remotely.
155
156 This happens for example, when the file is first found in the local
157 sysroot (above), and then disappears (a TOCTOU race), or when it doesn't
158 exist in the target filesystem, or when the file does exist, but
159 is not readable.
88178e82 160
57d1de9c
LM
161 Even without a symbol file, the remote-based debugging session should
162 continue normally instead of ending abruptly. Hence we catch thrown
163 errors/exceptions in the following code. */
a70b8144 164 try
57d1de9c 165 {
ecf45d2c
SL
166 /* We must do this step even if exec_file_host is NULL, so that
167 exec_file_attach will clear state. */
168 exec_file_attach (exec_file_host, add_flags & SYMFILE_VERBOSE);
57d1de9c 169 }
94aeb44b 170 catch (gdb_exception_error &err)
57d1de9c
LM
171 {
172 if (err.message != NULL)
3d6e9d23 173 warning ("%s", err.what ());
57d1de9c 174
94aeb44b 175 prev_err = std::move (err);
57d1de9c 176 }
57d1de9c 177
ecf45d2c 178 if (exec_file_host != NULL)
57d1de9c 179 {
a70b8144 180 try
ecf45d2c
SL
181 {
182 symbol_file_add_main (exec_file_host, add_flags);
183 }
230d2906 184 catch (const gdb_exception_error &err)
ecf45d2c
SL
185 {
186 if (!exception_print_same (prev_err, err))
3d6e9d23 187 warning ("%s", err.what ());
ecf45d2c 188 }
57d1de9c 189 }
ecf45d2c
SL
190}
191
192/* See gdbcore.h. */
193
194void
195exec_file_locate_attach (int pid, int defer_bp_reset, int from_tty)
196{
797bc1cb 197 char *exec_file_target;
ecf45d2c
SL
198 symfile_add_flags add_flags = 0;
199
200 /* Do nothing if we already have an executable filename. */
201 if (get_exec_file (0) != NULL)
202 return;
203
204 /* Try to determine a filename from the process itself. */
205 exec_file_target = target_pid_to_exec_file (pid);
206 if (exec_file_target == NULL)
57d1de9c 207 {
ecf45d2c
SL
208 warning (_("No executable has been specified and target does not "
209 "support\n"
210 "determining executable automatically. "
211 "Try using the \"file\" command."));
212 return;
57d1de9c 213 }
88178e82 214
797bc1cb
TT
215 gdb::unique_xmalloc_ptr<char> exec_file_host
216 = exec_file_find (exec_file_target, NULL);
ecf45d2c
SL
217
218 if (defer_bp_reset)
219 add_flags |= SYMFILE_DEFER_BP_RESET;
220
221 if (from_tty)
222 add_flags |= SYMFILE_VERBOSE;
223
224 /* Attempt to open the exec file. */
797bc1cb 225 try_open_exec_file (exec_file_host.get (), current_inferior (), add_flags);
a10de604
GB
226}
227
907083d1 228/* Set FILENAME as the new exec file.
c906108c 229
c5aa993b
JM
230 This function is intended to be behave essentially the same
231 as exec_file_command, except that the latter will detect when
232 a target is being debugged, and will ask the user whether it
233 should be shut down first. (If the answer is "no", then the
234 new file is ignored.)
c906108c 235
c5aa993b
JM
236 This file is used by exec_file_command, to do the work of opening
237 and processing the exec file after any prompting has happened.
c906108c 238
c5aa993b
JM
239 And, it is used by child_attach, when the attach command was
240 given a pid but not a exec pathname, and the attach command could
241 figure out the pathname from the pid. (In this case, we shouldn't
242 ask the user whether the current target should be shut down --
907083d1 243 we're supplying the exec pathname late for good reason.) */
c906108c
SS
244
245void
5f08566b 246exec_file_attach (const char *filename, int from_tty)
c906108c 247{
9b333ba3
TT
248 /* First, acquire a reference to the current exec_bfd. We release
249 this at the end of the function; but acquiring it now lets the
250 BFD cache return it if this call refers to the same file. */
1831a9f9 251 gdb_bfd_ref_ptr exec_bfd_holder = gdb_bfd_ref_ptr::new_reference (exec_bfd);
192b62ce 252
c906108c 253 /* Remove any previous exec file. */
6c95b8df 254 exec_close ();
c906108c
SS
255
256 /* Now open and digest the file the user requested, if any. */
257
1adeb98a
FN
258 if (!filename)
259 {
260 if (from_tty)
a3f17187 261 printf_unfiltered (_("No executable file now.\n"));
7a107747
DJ
262
263 set_gdbarch_from_file (NULL);
1adeb98a
FN
264 }
265 else
c906108c 266 {
64c0b5de 267 int load_via_target = 0;
14278e1f 268 const char *scratch_pathname, *canonical_pathname;
c906108c 269 int scratch_chan;
07b82ea5 270 struct target_section *sections = NULL, *sections_end = NULL;
d18b8b7a 271 char **matching;
c5aa993b 272
64c0b5de
GB
273 if (is_target_filename (filename))
274 {
275 if (target_filesystem_is_local ())
276 filename += strlen (TARGET_SYSROOT_PREFIX);
277 else
278 load_via_target = 1;
279 }
280
14278e1f 281 gdb::unique_xmalloc_ptr<char> canonical_storage, scratch_storage;
64c0b5de 282 if (load_via_target)
c5aa993b 283 {
64c0b5de
GB
284 /* gdb_bfd_fopen does not support "target:" filenames. */
285 if (write_files)
286 warning (_("writing into executable files is "
287 "not supported for %s sysroots"),
288 TARGET_SYSROOT_PREFIX);
289
14278e1f 290 scratch_pathname = filename;
64c0b5de 291 scratch_chan = -1;
64c0b5de 292 canonical_pathname = scratch_pathname;
c5aa993b 293 }
64c0b5de
GB
294 else
295 {
296 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
297 filename, write_files ?
298 O_RDWR | O_BINARY : O_RDONLY | O_BINARY,
e0cc99a6 299 &scratch_storage);
64c0b5de
GB
300#if defined(__GO32__) || defined(_WIN32) || defined(__CYGWIN__)
301 if (scratch_chan < 0)
302 {
0ae1c716 303 char *exename = (char *) alloca (strlen (filename) + 5);
64c0b5de
GB
304
305 strcat (strcpy (exename, filename), ".exe");
306 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
307 exename, write_files ?
308 O_RDWR | O_BINARY
309 : O_RDONLY | O_BINARY,
e0cc99a6 310 &scratch_storage);
64c0b5de 311 }
c906108c 312#endif
64c0b5de
GB
313 if (scratch_chan < 0)
314 perror_with_name (filename);
a4453b7e 315
e0cc99a6 316 scratch_pathname = scratch_storage.get ();
a4453b7e 317
64c0b5de
GB
318 /* gdb_bfd_open (and its variants) prefers canonicalized
319 pathname for better BFD caching. */
14278e1f
TT
320 canonical_storage = gdb_realpath (scratch_pathname);
321 canonical_pathname = canonical_storage.get ();
64c0b5de 322 }
1f0c4988 323
192b62ce 324 gdb_bfd_ref_ptr temp;
64c0b5de 325 if (write_files && !load_via_target)
192b62ce
TT
326 temp = gdb_bfd_fopen (canonical_pathname, gnutarget,
327 FOPEN_RUB, scratch_chan);
1c00ec6b 328 else
192b62ce
TT
329 temp = gdb_bfd_open (canonical_pathname, gnutarget, scratch_chan);
330 exec_bfd = temp.release ();
c906108c
SS
331
332 if (!exec_bfd)
9fe4a216 333 {
d5131498 334 error (_("\"%s\": could not open as an executable file: %s."),
9fe4a216
TT
335 scratch_pathname, bfd_errmsg (bfd_get_error ()));
336 }
c906108c 337
64c0b5de
GB
338 /* gdb_realpath_keepfile resolves symlinks on the local
339 filesystem and so cannot be used for "target:" files. */
1f0c4988 340 gdb_assert (exec_filename == NULL);
64c0b5de
GB
341 if (load_via_target)
342 exec_filename = xstrdup (bfd_get_filename (exec_bfd));
343 else
4971c9a7 344 exec_filename = gdb_realpath_keepfile (scratch_pathname).release ();
1f0c4988 345
d18b8b7a 346 if (!bfd_check_format_matches (exec_bfd, bfd_object, &matching))
c906108c
SS
347 {
348 /* Make sure to close exec_bfd, or else "run" might try to use
349 it. */
6c95b8df 350 exec_close ();
8a3fe4f8 351 error (_("\"%s\": not in executable format: %s"),
d18b8b7a 352 scratch_pathname,
803c08d0 353 gdb_bfd_errmsg (bfd_get_error (), matching).c_str ());
c906108c
SS
354 }
355
07b82ea5 356 if (build_section_table (exec_bfd, &sections, &sections_end))
c906108c
SS
357 {
358 /* Make sure to close exec_bfd, or else "run" might try to use
359 it. */
6c95b8df 360 exec_close ();
8a3fe4f8 361 error (_("\"%s\": can't find the file sections: %s"),
c906108c
SS
362 scratch_pathname, bfd_errmsg (bfd_get_error ()));
363 }
364
c04ea773
DJ
365 exec_bfd_mtime = bfd_get_mtime (exec_bfd);
366
c906108c
SS
367 validate_files ();
368
369 set_gdbarch_from_file (exec_bfd);
370
07b82ea5 371 /* Add the executable's sections to the current address spaces'
6c95b8df
PA
372 list of sections. This possibly pushes the exec_ops
373 target. */
ed9eebaf 374 add_target_sections (&exec_bfd, sections, sections_end);
07b82ea5 375 xfree (sections);
c906108c
SS
376
377 /* Tell display code (if any) about the changed file name. */
9a4105ab
AC
378 if (deprecated_exec_file_display_hook)
379 (*deprecated_exec_file_display_hook) (filename);
c906108c 380 }
9b333ba3 381
ce7d4522 382 bfd_cache_close_all ();
76727919 383 gdb::observers::executable_changed.notify ();
c906108c
SS
384}
385
386/* Process the first arg in ARGS as the new exec file.
387
c5aa993b
JM
388 Note that we have to explicitly ignore additional args, since we can
389 be called from file_command(), which also calls symbol_file_command()
1adeb98a
FN
390 which can take multiple args.
391
0963b4bd 392 If ARGS is NULL, we just want to close the exec file. */
c906108c 393
1adeb98a 394static void
1d8b34a7 395exec_file_command (const char *args, int from_tty)
c906108c 396{
4c42eaff
DJ
397 if (from_tty && target_has_execution
398 && !query (_("A program is being debugged already.\n"
399 "Are you sure you want to change the file? ")))
400 error (_("File not changed."));
1adeb98a
FN
401
402 if (args)
403 {
404 /* Scan through the args and pick up the first non option arg
405 as the filename. */
406
773a1edc
TT
407 gdb_argv built_argv (args);
408 char **argv = built_argv.get ();
1adeb98a
FN
409
410 for (; (*argv != NULL) && (**argv == '-'); argv++)
411 {;
412 }
413 if (*argv == NULL)
8a3fe4f8 414 error (_("No executable file name was specified"));
1adeb98a 415
773a1edc
TT
416 gdb::unique_xmalloc_ptr<char> filename (tilde_expand (*argv));
417 exec_file_attach (filename.get (), from_tty);
1adeb98a
FN
418 }
419 else
420 exec_file_attach (NULL, from_tty);
c906108c
SS
421}
422
0963b4bd 423/* Set both the exec file and the symbol file, in one command.
c906108c
SS
424 What a novelty. Why did GDB go through four major releases before this
425 command was added? */
426
427static void
1d8b34a7 428file_command (const char *arg, int from_tty)
c906108c
SS
429{
430 /* FIXME, if we lose on reading the symbol file, we should revert
431 the exec file, but that's rough. */
432 exec_file_command (arg, from_tty);
433 symbol_file_command (arg, from_tty);
9a4105ab
AC
434 if (deprecated_file_changed_hook)
435 deprecated_file_changed_hook (arg);
c906108c 436}
c906108c 437\f
c5aa993b 438
0963b4bd 439/* Locate all mappable sections of a BFD file.
c906108c
SS
440 table_pp_char is a char * to get it through bfd_map_over_sections;
441 we cast it back to its proper type. */
442
443static void
7be0c536
AC
444add_to_section_table (bfd *abfd, struct bfd_section *asect,
445 void *table_pp_char)
c906108c 446{
0542c86d 447 struct target_section **table_pp = (struct target_section **) table_pp_char;
c906108c
SS
448 flagword aflag;
449
2b2848e2
DE
450 gdb_assert (abfd == asect->owner);
451
0f5d55d8
JB
452 /* Check the section flags, but do not discard zero-length sections, since
453 some symbols may still be attached to this section. For instance, we
454 encountered on sparc-solaris 2.10 a shared library with an empty .bss
455 section to which a symbol named "_end" was attached. The address
456 of this symbol still needs to be relocated. */
fd361982 457 aflag = bfd_section_flags (asect);
c906108c
SS
458 if (!(aflag & SEC_ALLOC))
459 return;
0f5d55d8 460
046ac79f 461 (*table_pp)->owner = NULL;
c906108c 462 (*table_pp)->the_bfd_section = asect;
fd361982
AM
463 (*table_pp)->addr = bfd_section_vma (asect);
464 (*table_pp)->endaddr = (*table_pp)->addr + bfd_section_size (asect);
c906108c
SS
465 (*table_pp)++;
466}
467
a5b1fd27
DE
468/* See exec.h. */
469
470void
471clear_section_table (struct target_section_table *table)
472{
473 xfree (table->sections);
474 table->sections = table->sections_end = NULL;
475}
476
477/* Resize section table TABLE by ADJUSTMENT.
478 ADJUSTMENT may be negative, in which case the caller must have already
479 removed the sections being deleted.
480 Returns the old size. */
481
482static int
483resize_section_table (struct target_section_table *table, int adjustment)
07b82ea5 484{
07b82ea5
PA
485 int old_count;
486 int new_count;
487
07b82ea5
PA
488 old_count = table->sections_end - table->sections;
489
a5b1fd27 490 new_count = adjustment + old_count;
07b82ea5
PA
491
492 if (new_count)
493 {
224c3ddb
SM
494 table->sections = XRESIZEVEC (struct target_section, table->sections,
495 new_count);
07b82ea5
PA
496 table->sections_end = table->sections + new_count;
497 }
498 else
a5b1fd27 499 clear_section_table (table);
07b82ea5
PA
500
501 return old_count;
502}
503
c906108c
SS
504/* Builds a section table, given args BFD, SECTABLE_PTR, SECEND_PTR.
505 Returns 0 if OK, 1 on error. */
506
507int
0542c86d
PA
508build_section_table (struct bfd *some_bfd, struct target_section **start,
509 struct target_section **end)
c906108c
SS
510{
511 unsigned count;
512
513 count = bfd_count_sections (some_bfd);
514 if (*start)
b8c9b27d 515 xfree (* start);
8d749320 516 *start = XNEWVEC (struct target_section, count);
c906108c 517 *end = *start;
c5aa993b 518 bfd_map_over_sections (some_bfd, add_to_section_table, (char *) end);
c906108c 519 if (*end > *start + count)
3e43a32a
MS
520 internal_error (__FILE__, __LINE__,
521 _("failed internal consistency check"));
c906108c
SS
522 /* We could realloc the table, but it probably loses for most files. */
523 return 0;
524}
07b82ea5
PA
525
526/* Add the sections array defined by [SECTIONS..SECTIONS_END[ to the
527 current set of target sections. */
528
529void
046ac79f 530add_target_sections (void *owner,
ed9eebaf 531 struct target_section *sections,
07b82ea5
PA
532 struct target_section *sections_end)
533{
534 int count;
535 struct target_section_table *table = current_target_sections;
536
537 count = sections_end - sections;
538
539 if (count > 0)
540 {
541 int space = resize_section_table (table, count);
ed9eebaf 542 int i;
d7f9d729 543
ed9eebaf
TT
544 for (i = 0; i < count; ++i)
545 {
546 table->sections[space + i] = sections[i];
046ac79f 547 table->sections[space + i].owner = owner;
ed9eebaf 548 }
07b82ea5 549
5b6d1e4f
PA
550 scoped_restore_current_thread restore_thread;
551 program_space *curr_pspace = current_program_space;
552
07b82ea5 553 /* If these are the first file sections we can provide memory
5b6d1e4f
PA
554 from, push the file_stratum target. Must do this in all
555 inferiors sharing the program space. */
556 for (inferior *inf : all_inferiors ())
557 {
558 if (inf->pspace != curr_pspace)
559 continue;
560
561 if (inf->target_is_pushed (&exec_ops))
562 continue;
563
564 switch_to_inferior_no_thread (inf);
565 push_target (&exec_ops);
566 }
07b82ea5
PA
567 }
568}
569
76ad5e1e
NB
570/* Add the sections of OBJFILE to the current set of target sections. */
571
572void
573add_target_sections_of_objfile (struct objfile *objfile)
574{
575 struct target_section_table *table = current_target_sections;
576 struct obj_section *osect;
577 int space;
578 unsigned count = 0;
579 struct target_section *ts;
580
581 if (objfile == NULL)
582 return;
583
584 /* Compute the number of sections to add. */
585 ALL_OBJFILE_OSECTIONS (objfile, osect)
586 {
fd361982 587 if (bfd_section_size (osect->the_bfd_section) == 0)
76ad5e1e
NB
588 continue;
589 count++;
590 }
591
592 if (count == 0)
593 return;
594
595 space = resize_section_table (table, count);
596
597 ts = table->sections + space;
598
599 ALL_OBJFILE_OSECTIONS (objfile, osect)
600 {
fd361982 601 if (bfd_section_size (osect->the_bfd_section) == 0)
76ad5e1e
NB
602 continue;
603
604 gdb_assert (ts < table->sections + space + count);
605
606 ts->addr = obj_section_addr (osect);
607 ts->endaddr = obj_section_endaddr (osect);
608 ts->the_bfd_section = osect->the_bfd_section;
609 ts->owner = (void *) objfile;
610
611 ts++;
612 }
613}
614
046ac79f
JK
615/* Remove all target sections owned by OWNER.
616 OWNER must be the same value passed to add_target_sections. */
07b82ea5
PA
617
618void
046ac79f 619remove_target_sections (void *owner)
07b82ea5
PA
620{
621 struct target_section *src, *dest;
07b82ea5
PA
622 struct target_section_table *table = current_target_sections;
623
046ac79f
JK
624 gdb_assert (owner != NULL);
625
07b82ea5
PA
626 dest = table->sections;
627 for (src = table->sections; src < table->sections_end; src++)
046ac79f 628 if (src->owner != owner)
07b82ea5
PA
629 {
630 /* Keep this section. */
631 if (dest < src)
632 *dest = *src;
633 dest++;
634 }
635
636 /* If we've dropped any sections, resize the section table. */
637 if (dest < src)
638 {
639 int old_count;
640
641 old_count = resize_section_table (table, dest - src);
642
643 /* If we don't have any more sections to read memory from,
5b6d1e4f
PA
644 remove the file_stratum target from the stack of each
645 inferior sharing the program space. */
07b82ea5 646 if (old_count + (dest - src) == 0)
6c95b8df 647 {
5b6d1e4f
PA
648 scoped_restore_current_thread restore_thread;
649 program_space *curr_pspace = current_program_space;
650
651 for (inferior *inf : all_inferiors ())
652 {
653 if (inf->pspace != curr_pspace)
654 continue;
6c95b8df 655
5b6d1e4f
PA
656 if (inf->pspace->target_sections.sections
657 != inf->pspace->target_sections.sections_end)
658 continue;
6c95b8df 659
5b6d1e4f
PA
660 switch_to_inferior_no_thread (inf);
661 unpush_target (&exec_ops);
662 }
6c95b8df 663 }
07b82ea5
PA
664 }
665}
666
5b6d1e4f
PA
667/* See exec.h. */
668
669void
670exec_on_vfork ()
671{
672 if (current_program_space->target_sections.sections
673 != current_program_space->target_sections.sections_end)
674 push_target (&exec_ops);
675}
676
c906108c 677\f
348f8c02 678
1ca49d37
YQ
679enum target_xfer_status
680exec_read_partial_read_only (gdb_byte *readbuf, ULONGEST offset,
681 ULONGEST len, ULONGEST *xfered_len)
682{
683 /* It's unduly pedantic to refuse to look at the executable for
684 read-only pieces; so do the equivalent of readonly regions aka
685 QTro packet. */
686 if (exec_bfd != NULL)
687 {
688 asection *s;
689 bfd_size_type size;
690 bfd_vma vma;
691
692 for (s = exec_bfd->sections; s; s = s->next)
693 {
694 if ((s->flags & SEC_LOAD) == 0
695 || (s->flags & SEC_READONLY) == 0)
696 continue;
697
698 vma = s->vma;
fd361982 699 size = bfd_section_size (s);
1ca49d37
YQ
700 if (vma <= offset && offset < (vma + size))
701 {
702 ULONGEST amt;
703
704 amt = (vma + size) - offset;
705 if (amt > len)
706 amt = len;
707
708 amt = bfd_get_section_contents (exec_bfd, s,
709 readbuf, offset - vma, amt);
710
711 if (amt == 0)
712 return TARGET_XFER_EOF;
713 else
714 {
715 *xfered_len = amt;
716 return TARGET_XFER_OK;
717 }
718 }
719 }
720 }
721
722 /* Indicate failure to find the requested memory block. */
723 return TARGET_XFER_E_IO;
724}
725
a79b1bc6 726/* Return all read-only memory ranges found in the target section
5a2eb0ef 727 table defined by SECTIONS and SECTIONS_END, starting at (and
a79b1bc6 728 intersected with) MEMADDR for LEN bytes. */
5a2eb0ef 729
a79b1bc6
SM
730static std::vector<mem_range>
731section_table_available_memory (CORE_ADDR memaddr, ULONGEST len,
e6ca34fc
PA
732 struct target_section *sections,
733 struct target_section *sections_end)
734{
a79b1bc6 735 std::vector<mem_range> memory;
e6ca34fc 736
a79b1bc6 737 for (target_section *p = sections; p < sections_end; p++)
e6ca34fc 738 {
fd361982 739 if ((bfd_section_flags (p->the_bfd_section) & SEC_READONLY) == 0)
e6ca34fc
PA
740 continue;
741
742 /* Copy the meta-data, adjusted. */
743 if (mem_ranges_overlap (p->addr, p->endaddr - p->addr, memaddr, len))
744 {
745 ULONGEST lo1, hi1, lo2, hi2;
e6ca34fc
PA
746
747 lo1 = memaddr;
748 hi1 = memaddr + len;
749
750 lo2 = p->addr;
751 hi2 = p->endaddr;
752
a79b1bc6
SM
753 CORE_ADDR start = std::max (lo1, lo2);
754 int length = std::min (hi1, hi2) - start;
e6ca34fc 755
a79b1bc6 756 memory.emplace_back (start, length);
e6ca34fc
PA
757 }
758 }
759
760 return memory;
761}
762
1ee79381
YQ
763enum target_xfer_status
764section_table_read_available_memory (gdb_byte *readbuf, ULONGEST offset,
765 ULONGEST len, ULONGEST *xfered_len)
766{
a79b1bc6
SM
767 target_section_table *table = target_get_section_table (&exec_ops);
768 std::vector<mem_range> available_memory
769 = section_table_available_memory (offset, len,
770 table->sections, table->sections_end);
1ee79381 771
a79b1bc6 772 normalize_mem_ranges (&available_memory);
1ee79381 773
a79b1bc6 774 for (const mem_range &r : available_memory)
1ee79381 775 {
a79b1bc6 776 if (mem_ranges_overlap (r.start, r.length, offset, len))
1ee79381
YQ
777 {
778 CORE_ADDR end;
779 enum target_xfer_status status;
780
781 /* Get the intersection window. */
a79b1bc6 782 end = std::min<CORE_ADDR> (offset + len, r.start + r.length);
1ee79381
YQ
783
784 gdb_assert (end - offset <= len);
785
a79b1bc6 786 if (offset >= r.start)
1ee79381
YQ
787 status = exec_read_partial_read_only (readbuf, offset,
788 end - offset,
789 xfered_len);
790 else
791 {
a79b1bc6 792 *xfered_len = r.start - offset;
bc113b4e 793 status = TARGET_XFER_UNAVAILABLE;
1ee79381 794 }
1ee79381
YQ
795 return status;
796 }
797 }
1ee79381
YQ
798
799 *xfered_len = len;
bc113b4e 800 return TARGET_XFER_UNAVAILABLE;
1ee79381
YQ
801}
802
9b409511 803enum target_xfer_status
07b82ea5 804section_table_xfer_memory_partial (gdb_byte *readbuf, const gdb_byte *writebuf,
b55e14c7 805 ULONGEST offset, ULONGEST len,
9b409511 806 ULONGEST *xfered_len,
07b82ea5
PA
807 struct target_section *sections,
808 struct target_section *sections_end,
809 const char *section_name)
c906108c 810{
020cc13c 811 int res;
0542c86d 812 struct target_section *p;
07b82ea5
PA
813 ULONGEST memaddr = offset;
814 ULONGEST memend = memaddr + len;
c906108c 815
b55e14c7 816 if (len == 0)
3e43a32a
MS
817 internal_error (__FILE__, __LINE__,
818 _("failed internal consistency check"));
c906108c 819
348f8c02 820 for (p = sections; p < sections_end; p++)
c906108c 821 {
2b2848e2
DE
822 struct bfd_section *asect = p->the_bfd_section;
823 bfd *abfd = asect->owner;
824
825 if (section_name && strcmp (section_name, asect->name) != 0)
0963b4bd 826 continue; /* not the section we need. */
c906108c 827 if (memaddr >= p->addr)
3db26b01
JB
828 {
829 if (memend <= p->endaddr)
830 {
831 /* Entire transfer is within this section. */
07b82ea5 832 if (writebuf)
2b2848e2 833 res = bfd_set_section_contents (abfd, asect,
07b82ea5 834 writebuf, memaddr - p->addr,
85302095
AC
835 len);
836 else
2b2848e2 837 res = bfd_get_section_contents (abfd, asect,
07b82ea5 838 readbuf, memaddr - p->addr,
85302095 839 len);
9b409511
YQ
840
841 if (res != 0)
842 {
843 *xfered_len = len;
844 return TARGET_XFER_OK;
845 }
846 else
847 return TARGET_XFER_EOF;
3db26b01
JB
848 }
849 else if (memaddr >= p->endaddr)
850 {
851 /* This section ends before the transfer starts. */
852 continue;
853 }
854 else
855 {
856 /* This section overlaps the transfer. Just do half. */
857 len = p->endaddr - memaddr;
07b82ea5 858 if (writebuf)
2b2848e2 859 res = bfd_set_section_contents (abfd, asect,
07b82ea5 860 writebuf, memaddr - p->addr,
85302095
AC
861 len);
862 else
2b2848e2 863 res = bfd_get_section_contents (abfd, asect,
07b82ea5 864 readbuf, memaddr - p->addr,
85302095 865 len);
9b409511
YQ
866 if (res != 0)
867 {
868 *xfered_len = len;
869 return TARGET_XFER_OK;
870 }
871 else
872 return TARGET_XFER_EOF;
3db26b01
JB
873 }
874 }
c906108c
SS
875 }
876
9b409511 877 return TARGET_XFER_EOF; /* We can't help. */
c906108c 878}
348f8c02 879
f6ac5f3d
PA
880struct target_section_table *
881exec_target::get_section_table ()
348f8c02 882{
07b82ea5 883 return current_target_sections;
348f8c02
PA
884}
885
f6ac5f3d
PA
886enum target_xfer_status
887exec_target::xfer_partial (enum target_object object,
888 const char *annex, gdb_byte *readbuf,
889 const gdb_byte *writebuf,
890 ULONGEST offset, ULONGEST len, ULONGEST *xfered_len)
348f8c02 891{
f6ac5f3d 892 struct target_section_table *table = get_section_table ();
07b82ea5
PA
893
894 if (object == TARGET_OBJECT_MEMORY)
895 return section_table_xfer_memory_partial (readbuf, writebuf,
9b409511 896 offset, len, xfered_len,
07b82ea5
PA
897 table->sections,
898 table->sections_end,
899 NULL);
900 else
2ed4b548 901 return TARGET_XFER_E_IO;
348f8c02 902}
c906108c 903\f
c5aa993b 904
c906108c 905void
07b82ea5 906print_section_info (struct target_section_table *t, bfd *abfd)
c906108c 907{
5af949e3 908 struct gdbarch *gdbarch = gdbarch_from_bfd (abfd);
0542c86d 909 struct target_section *p;
17a912b6 910 /* FIXME: 16 is not wide enough when gdbarch_addr_bit > 64. */
5af949e3 911 int wid = gdbarch_addr_bit (gdbarch) <= 32 ? 8 : 16;
c906108c 912
c5aa993b 913 printf_filtered ("\t`%s', ", bfd_get_filename (abfd));
c906108c 914 wrap_here (" ");
a3f17187 915 printf_filtered (_("file type %s.\n"), bfd_get_target (abfd));
c906108c 916 if (abfd == exec_bfd)
51bee8e9 917 {
3e43a32a
MS
918 /* gcc-3.4 does not like the initialization in
919 <p == t->sections_end>. */
d904de5b 920 bfd_vma displacement = 0;
2f1bdd26 921 bfd_vma entry_point;
51bee8e9
JK
922
923 for (p = t->sections; p < t->sections_end; p++)
924 {
2b2848e2 925 struct bfd_section *psect = p->the_bfd_section;
51bee8e9 926
fd361982 927 if ((bfd_section_flags (psect) & (SEC_ALLOC | SEC_LOAD))
51bee8e9
JK
928 != (SEC_ALLOC | SEC_LOAD))
929 continue;
930
fd361982
AM
931 if (bfd_section_vma (psect) <= abfd->start_address
932 && abfd->start_address < (bfd_section_vma (psect)
933 + bfd_section_size (psect)))
51bee8e9 934 {
fd361982 935 displacement = p->addr - bfd_section_vma (psect);
51bee8e9
JK
936 break;
937 }
938 }
939 if (p == t->sections_end)
b37520b6 940 warning (_("Cannot find section for the entry point of %s."),
d904de5b 941 bfd_get_filename (abfd));
51bee8e9 942
2f1bdd26
MGD
943 entry_point = gdbarch_addr_bits_remove (gdbarch,
944 bfd_get_start_address (abfd)
945 + displacement);
51bee8e9 946 printf_filtered (_("\tEntry point: %s\n"),
2f1bdd26 947 paddress (gdbarch, entry_point));
51bee8e9 948 }
07b82ea5 949 for (p = t->sections; p < t->sections_end; p++)
c906108c 950 {
2b2848e2
DE
951 struct bfd_section *psect = p->the_bfd_section;
952 bfd *pbfd = psect->owner;
953
bb599908
PH
954 printf_filtered ("\t%s", hex_string_custom (p->addr, wid));
955 printf_filtered (" - %s", hex_string_custom (p->endaddr, wid));
bcf16802
KB
956
957 /* FIXME: A format of "08l" is not wide enough for file offsets
958 larger than 4GB. OTOH, making it "016l" isn't desirable either
959 since most output will then be much wider than necessary. It
960 may make sense to test the size of the file and choose the
961 format string accordingly. */
a3f17187 962 /* FIXME: i18n: Need to rewrite this sentence. */
c906108c
SS
963 if (info_verbose)
964 printf_filtered (" @ %s",
2b2848e2 965 hex_string_custom (psect->filepos, 8));
fd361982 966 printf_filtered (" is %s", bfd_section_name (psect));
2b2848e2
DE
967 if (pbfd != abfd)
968 printf_filtered (" in %s", bfd_get_filename (pbfd));
c906108c
SS
969 printf_filtered ("\n");
970 }
971}
972
f6ac5f3d
PA
973void
974exec_target::files_info ()
c906108c 975{
57008375
JK
976 if (exec_bfd)
977 print_section_info (current_target_sections, exec_bfd);
978 else
979 puts_filtered (_("\t<no file loaded>\n"));
c906108c
SS
980}
981
982static void
0b39b52e 983set_section_command (const char *args, int from_tty)
c906108c 984{
0542c86d 985 struct target_section *p;
0b39b52e 986 const char *secname;
c906108c
SS
987 unsigned seclen;
988 unsigned long secaddr;
989 char secprint[100];
990 long offset;
07b82ea5 991 struct target_section_table *table;
c906108c
SS
992
993 if (args == 0)
8a3fe4f8 994 error (_("Must specify section name and its virtual address"));
c906108c 995
0963b4bd 996 /* Parse out section name. */
c5aa993b 997 for (secname = args; !isspace (*args); args++);
c906108c
SS
998 seclen = args - secname;
999
0963b4bd 1000 /* Parse out new virtual address. */
c906108c
SS
1001 secaddr = parse_and_eval_address (args);
1002
07b82ea5
PA
1003 table = current_target_sections;
1004 for (p = table->sections; p < table->sections_end; p++)
c5aa993b 1005 {
fd361982
AM
1006 if (!strncmp (secname, bfd_section_name (p->the_bfd_section), seclen)
1007 && bfd_section_name (p->the_bfd_section)[seclen] == '\0')
c5aa993b
JM
1008 {
1009 offset = secaddr - p->addr;
1010 p->addr += offset;
1011 p->endaddr += offset;
1012 if (from_tty)
f6ac5f3d 1013 exec_ops.files_info ();
c5aa993b
JM
1014 return;
1015 }
c906108c 1016 }
c906108c
SS
1017 if (seclen >= sizeof (secprint))
1018 seclen = sizeof (secprint) - 1;
1019 strncpy (secprint, secname, seclen);
1020 secprint[seclen] = '\0';
8a3fe4f8 1021 error (_("Section %s not found"), secprint);
c906108c
SS
1022}
1023
30510692
DJ
1024/* If we can find a section in FILENAME with BFD index INDEX, adjust
1025 it to ADDRESS. */
c1bd25fd
DJ
1026
1027void
1028exec_set_section_address (const char *filename, int index, CORE_ADDR address)
1029{
0542c86d 1030 struct target_section *p;
07b82ea5 1031 struct target_section_table *table;
c1bd25fd 1032
07b82ea5
PA
1033 table = current_target_sections;
1034 for (p = table->sections; p < table->sections_end; p++)
c1bd25fd 1035 {
2b2848e2 1036 if (filename_cmp (filename, p->the_bfd_section->owner->filename) == 0
30510692 1037 && index == p->the_bfd_section->index)
c1bd25fd 1038 {
30510692 1039 p->endaddr += address - p->addr;
c1bd25fd 1040 p->addr = address;
c1bd25fd
DJ
1041 }
1042 }
1043}
1044
57810aa7 1045bool
f6ac5f3d 1046exec_target::has_memory ()
c35b1492
PA
1047{
1048 /* We can provide memory if we have any file/target sections to read
1049 from. */
1050 return (current_target_sections->sections
1051 != current_target_sections->sections_end);
1052}
1053
f6ac5f3d
PA
1054char *
1055exec_target::make_corefile_notes (bfd *obfd, int *note_size)
83814951
TT
1056{
1057 error (_("Can't create a corefile"));
1058}
be4d1333 1059
f6ac5f3d
PA
1060int
1061exec_target::find_memory_regions (find_memory_region_ftype func, void *data)
c906108c 1062{
f6ac5f3d 1063 return objfile_find_memory_regions (this, func, data);
c906108c
SS
1064}
1065
1066void
fba45db2 1067_initialize_exec (void)
c906108c
SS
1068{
1069 struct cmd_list_element *c;
1070
c906108c
SS
1071 if (!dbx_commands)
1072 {
1a966eab
AC
1073 c = add_cmd ("file", class_files, file_command, _("\
1074Use FILE as program to be debugged.\n\
c906108c
SS
1075It is read for its symbols, for getting the contents of pure memory,\n\
1076and it is the program executed when you use the `run' command.\n\
1077If FILE cannot be found as specified, your execution directory path\n\
1078($PATH) is searched for a command of that name.\n\
1a966eab 1079No arg means to have no executable file and no symbols."), &cmdlist);
5ba2abeb 1080 set_cmd_completer (c, filename_completer);
c906108c
SS
1081 }
1082
1a966eab
AC
1083 c = add_cmd ("exec-file", class_files, exec_file_command, _("\
1084Use FILE as program for getting contents of pure memory.\n\
c906108c
SS
1085If FILE cannot be found as specified, your execution directory path\n\
1086is searched for a command of that name.\n\
1a966eab 1087No arg means have no executable file."), &cmdlist);
5ba2abeb 1088 set_cmd_completer (c, filename_completer);
c906108c 1089
1bedd215
AC
1090 add_com ("section", class_files, set_section_command, _("\
1091Change the base address of section SECTION of the exec file to ADDR.\n\
c906108c
SS
1092This can be used if the exec file does not contain section addresses,\n\
1093(such as in the a.out format), or when the addresses specified in the\n\
1094file itself are wrong. Each section must be changed separately. The\n\
1bedd215 1095``info files'' command lists all the sections and their addresses."));
c906108c 1096
5bf193a2
AC
1097 add_setshow_boolean_cmd ("write", class_support, &write_files, _("\
1098Set writing into executable and core files."), _("\
1099Show writing into executable and core files."), NULL,
1100 NULL,
920d2a44 1101 show_write_files,
5bf193a2 1102 &setlist, &showlist);
c5aa993b 1103
d9f719f1 1104 add_target (exec_target_info, exec_target_open, filename_completer);
c906108c 1105}
This page took 1.467333 seconds and 4 git commands to generate.