Add target_ops argument to to_stop
[deliverable/binutils-gdb.git] / gdb / exec.c
CommitLineData
c906108c 1/* Work with executable files, for GDB.
4646aa9d 2
ecd75fc8 3 Copyright (C) 1988-2014 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "frame.h"
22#include "inferior.h"
23#include "target.h"
24#include "gdbcmd.h"
25#include "language.h"
0ba1096a 26#include "filenames.h"
c906108c
SS
27#include "symfile.h"
28#include "objfiles.h"
c5f0f3d0 29#include "completer.h"
fd0407d6 30#include "value.h"
4646aa9d 31#include "exec.h"
ea53e89f 32#include "observer.h"
dacec2a8 33#include "arch-utils.h"
6c95b8df
PA
34#include "gdbthread.h"
35#include "progspace.h"
cbb099e8 36#include "gdb_bfd.h"
c906108c 37
c906108c 38#include <fcntl.h>
dbda9972 39#include "readline/readline.h"
0e9f083f 40#include <string.h>
c906108c
SS
41
42#include "gdbcore.h"
43
44#include <ctype.h>
53ce3c39 45#include <sys/stat.h>
c906108c 46
9a4105ab 47void (*deprecated_file_changed_hook) (char *);
c906108c
SS
48
49/* Prototypes for local functions */
50
a14ed312 51static void file_command (char *, int);
c906108c 52
a14ed312 53static void set_section_command (char *, int);
c906108c 54
a14ed312 55static void exec_files_info (struct target_ops *);
c906108c 56
a14ed312 57static void init_exec_ops (void);
c906108c 58
a14ed312 59void _initialize_exec (void);
c906108c 60
c906108c
SS
61/* The target vector for executable files. */
62
63struct target_ops exec_ops;
64
6c95b8df
PA
65/* True if the exec target is pushed on the stack. */
66static int using_exec_ops;
07b82ea5 67
c906108c
SS
68/* Whether to open exec and core files read-only or read-write. */
69
70int write_files = 0;
920d2a44
AC
71static void
72show_write_files (struct ui_file *file, int from_tty,
73 struct cmd_list_element *c, const char *value)
74{
75 fprintf_filtered (file, _("Writing into executable and core files is %s.\n"),
76 value);
77}
78
c906108c 79
4c42eaff 80static void
1adeb98a
FN
81exec_open (char *args, int from_tty)
82{
83 target_preopen (from_tty);
84 exec_file_attach (args, from_tty);
85}
86
07b82ea5
PA
87/* Close and clear exec_bfd. If we end up with no target sections to
88 read memory from, this unpushes the exec_ops target. */
89
6c95b8df
PA
90void
91exec_close (void)
07b82ea5
PA
92{
93 if (exec_bfd)
94 {
95 bfd *abfd = exec_bfd;
07b82ea5 96
cbb099e8 97 gdb_bfd_unref (abfd);
07b82ea5
PA
98
99 /* Removing target sections may close the exec_ops target.
100 Clear exec_bfd before doing so to prevent recursion. */
101 exec_bfd = NULL;
102 exec_bfd_mtime = 0;
103
046ac79f 104 remove_target_sections (&exec_bfd);
1f0c4988
JK
105
106 xfree (exec_filename);
107 exec_filename = NULL;
07b82ea5
PA
108 }
109}
110
6c95b8df
PA
111/* This is the target_close implementation. Clears all target
112 sections and closes all executable bfds from all program spaces. */
113
c906108c 114static void
de90e03d 115exec_close_1 (struct target_ops *self)
c906108c 116{
6c95b8df
PA
117 using_exec_ops = 0;
118
6c95b8df
PA
119 {
120 struct program_space *ss;
121 struct cleanup *old_chain;
c906108c 122
6c95b8df
PA
123 old_chain = save_current_program_space ();
124 ALL_PSPACES (ss)
125 {
126 set_current_program_space (ss);
127
128 /* Delete all target sections. */
129 resize_section_table
130 (current_target_sections,
131 -resize_section_table (current_target_sections, 0));
132
133 exec_close ();
134 }
135
136 do_cleanups (old_chain);
137 }
c906108c
SS
138}
139
1adeb98a
FN
140void
141exec_file_clear (int from_tty)
142{
143 /* Remove exec file. */
6c95b8df 144 exec_close ();
1adeb98a
FN
145
146 if (from_tty)
a3f17187 147 printf_unfiltered (_("No executable file now.\n"));
1adeb98a
FN
148}
149
907083d1 150/* Set FILENAME as the new exec file.
c906108c 151
c5aa993b
JM
152 This function is intended to be behave essentially the same
153 as exec_file_command, except that the latter will detect when
154 a target is being debugged, and will ask the user whether it
155 should be shut down first. (If the answer is "no", then the
156 new file is ignored.)
c906108c 157
c5aa993b
JM
158 This file is used by exec_file_command, to do the work of opening
159 and processing the exec file after any prompting has happened.
c906108c 160
c5aa993b
JM
161 And, it is used by child_attach, when the attach command was
162 given a pid but not a exec pathname, and the attach command could
163 figure out the pathname from the pid. (In this case, we shouldn't
164 ask the user whether the current target should be shut down --
907083d1 165 we're supplying the exec pathname late for good reason.) */
c906108c
SS
166
167void
1adeb98a 168exec_file_attach (char *filename, int from_tty)
c906108c 169{
c906108c 170 /* Remove any previous exec file. */
6c95b8df 171 exec_close ();
c906108c
SS
172
173 /* Now open and digest the file the user requested, if any. */
174
1adeb98a
FN
175 if (!filename)
176 {
177 if (from_tty)
a3f17187 178 printf_unfiltered (_("No executable file now.\n"));
7a107747
DJ
179
180 set_gdbarch_from_file (NULL);
1adeb98a
FN
181 }
182 else
c906108c 183 {
f7545552 184 struct cleanup *cleanups;
1f0c4988 185 char *scratch_pathname, *canonical_pathname;
c906108c 186 int scratch_chan;
07b82ea5 187 struct target_section *sections = NULL, *sections_end = NULL;
d18b8b7a 188 char **matching;
c5aa993b 189
492c0ab7 190 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST, filename,
fbdebf46 191 write_files ? O_RDWR | O_BINARY : O_RDONLY | O_BINARY,
c906108c 192 &scratch_pathname);
cfc3008e 193#if defined(__GO32__) || defined(_WIN32) || defined(__CYGWIN__)
c906108c 194 if (scratch_chan < 0)
c5aa993b
JM
195 {
196 char *exename = alloca (strlen (filename) + 5);
d7f9d729 197
c5aa993b 198 strcat (strcpy (exename, filename), ".exe");
492c0ab7 199 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST, exename,
fbdebf46 200 write_files ? O_RDWR | O_BINARY : O_RDONLY | O_BINARY,
014d698b 201 &scratch_pathname);
c5aa993b 202 }
c906108c 203#endif
17d6efc4
JB
204 if (scratch_chan < 0)
205 perror_with_name (filename);
a4453b7e
TT
206
207 cleanups = make_cleanup (xfree, scratch_pathname);
208
1f0c4988
JK
209 /* gdb_bfd_open (and its variants) prefers canonicalized pathname for
210 better BFD caching. */
211 canonical_pathname = gdb_realpath (scratch_pathname);
212 make_cleanup (xfree, canonical_pathname);
213
1c00ec6b 214 if (write_files)
1f0c4988 215 exec_bfd = gdb_bfd_fopen (canonical_pathname, gnutarget,
1c00ec6b
TT
216 FOPEN_RUB, scratch_chan);
217 else
1f0c4988 218 exec_bfd = gdb_bfd_open (canonical_pathname, gnutarget, scratch_chan);
c906108c
SS
219
220 if (!exec_bfd)
9fe4a216 221 {
9fe4a216
TT
222 error (_("\"%s\": could not open as an executable file: %s"),
223 scratch_pathname, bfd_errmsg (bfd_get_error ()));
224 }
c906108c 225
1f0c4988 226 gdb_assert (exec_filename == NULL);
4856b6bc 227 exec_filename = gdb_realpath_keepfile (scratch_pathname);
1f0c4988 228
d18b8b7a 229 if (!bfd_check_format_matches (exec_bfd, bfd_object, &matching))
c906108c
SS
230 {
231 /* Make sure to close exec_bfd, or else "run" might try to use
232 it. */
6c95b8df 233 exec_close ();
8a3fe4f8 234 error (_("\"%s\": not in executable format: %s"),
d18b8b7a
HZ
235 scratch_pathname,
236 gdb_bfd_errmsg (bfd_get_error (), matching));
c906108c
SS
237 }
238
07b82ea5 239 if (build_section_table (exec_bfd, &sections, &sections_end))
c906108c
SS
240 {
241 /* Make sure to close exec_bfd, or else "run" might try to use
242 it. */
6c95b8df 243 exec_close ();
8a3fe4f8 244 error (_("\"%s\": can't find the file sections: %s"),
c906108c
SS
245 scratch_pathname, bfd_errmsg (bfd_get_error ()));
246 }
247
c04ea773
DJ
248 exec_bfd_mtime = bfd_get_mtime (exec_bfd);
249
c906108c
SS
250 validate_files ();
251
252 set_gdbarch_from_file (exec_bfd);
253
07b82ea5 254 /* Add the executable's sections to the current address spaces'
6c95b8df
PA
255 list of sections. This possibly pushes the exec_ops
256 target. */
ed9eebaf 257 add_target_sections (&exec_bfd, sections, sections_end);
07b82ea5 258 xfree (sections);
c906108c
SS
259
260 /* Tell display code (if any) about the changed file name. */
9a4105ab
AC
261 if (deprecated_exec_file_display_hook)
262 (*deprecated_exec_file_display_hook) (filename);
f7545552
TT
263
264 do_cleanups (cleanups);
c906108c 265 }
ce7d4522 266 bfd_cache_close_all ();
781b42b0 267 observer_notify_executable_changed ();
c906108c
SS
268}
269
270/* Process the first arg in ARGS as the new exec file.
271
c5aa993b
JM
272 Note that we have to explicitly ignore additional args, since we can
273 be called from file_command(), which also calls symbol_file_command()
1adeb98a
FN
274 which can take multiple args.
275
0963b4bd 276 If ARGS is NULL, we just want to close the exec file. */
c906108c 277
1adeb98a 278static void
fba45db2 279exec_file_command (char *args, int from_tty)
c906108c 280{
1adeb98a
FN
281 char **argv;
282 char *filename;
4c42eaff
DJ
283
284 if (from_tty && target_has_execution
285 && !query (_("A program is being debugged already.\n"
286 "Are you sure you want to change the file? ")))
287 error (_("File not changed."));
1adeb98a
FN
288
289 if (args)
290 {
f7545552
TT
291 struct cleanup *cleanups;
292
1adeb98a
FN
293 /* Scan through the args and pick up the first non option arg
294 as the filename. */
295
d1a41061 296 argv = gdb_buildargv (args);
f7545552 297 cleanups = make_cleanup_freeargv (argv);
1adeb98a
FN
298
299 for (; (*argv != NULL) && (**argv == '-'); argv++)
300 {;
301 }
302 if (*argv == NULL)
8a3fe4f8 303 error (_("No executable file name was specified"));
1adeb98a
FN
304
305 filename = tilde_expand (*argv);
306 make_cleanup (xfree, filename);
307 exec_file_attach (filename, from_tty);
f7545552
TT
308
309 do_cleanups (cleanups);
1adeb98a
FN
310 }
311 else
312 exec_file_attach (NULL, from_tty);
c906108c
SS
313}
314
0963b4bd 315/* Set both the exec file and the symbol file, in one command.
c906108c
SS
316 What a novelty. Why did GDB go through four major releases before this
317 command was added? */
318
319static void
fba45db2 320file_command (char *arg, int from_tty)
c906108c
SS
321{
322 /* FIXME, if we lose on reading the symbol file, we should revert
323 the exec file, but that's rough. */
324 exec_file_command (arg, from_tty);
325 symbol_file_command (arg, from_tty);
9a4105ab
AC
326 if (deprecated_file_changed_hook)
327 deprecated_file_changed_hook (arg);
c906108c 328}
c906108c 329\f
c5aa993b 330
0963b4bd 331/* Locate all mappable sections of a BFD file.
c906108c
SS
332 table_pp_char is a char * to get it through bfd_map_over_sections;
333 we cast it back to its proper type. */
334
335static void
7be0c536
AC
336add_to_section_table (bfd *abfd, struct bfd_section *asect,
337 void *table_pp_char)
c906108c 338{
0542c86d 339 struct target_section **table_pp = (struct target_section **) table_pp_char;
c906108c
SS
340 flagword aflag;
341
2b2848e2
DE
342 gdb_assert (abfd == asect->owner);
343
0f5d55d8
JB
344 /* Check the section flags, but do not discard zero-length sections, since
345 some symbols may still be attached to this section. For instance, we
346 encountered on sparc-solaris 2.10 a shared library with an empty .bss
347 section to which a symbol named "_end" was attached. The address
348 of this symbol still needs to be relocated. */
c906108c
SS
349 aflag = bfd_get_section_flags (abfd, asect);
350 if (!(aflag & SEC_ALLOC))
351 return;
0f5d55d8 352
046ac79f 353 (*table_pp)->owner = NULL;
c906108c
SS
354 (*table_pp)->the_bfd_section = asect;
355 (*table_pp)->addr = bfd_section_vma (abfd, asect);
356 (*table_pp)->endaddr = (*table_pp)->addr + bfd_section_size (abfd, asect);
357 (*table_pp)++;
358}
359
07b82ea5
PA
360int
361resize_section_table (struct target_section_table *table, int num_added)
362{
07b82ea5
PA
363 int old_count;
364 int new_count;
365
07b82ea5
PA
366 old_count = table->sections_end - table->sections;
367
368 new_count = num_added + old_count;
369
370 if (new_count)
371 {
372 table->sections = xrealloc (table->sections,
373 sizeof (struct target_section) * new_count);
374 table->sections_end = table->sections + new_count;
375 }
376 else
377 {
378 xfree (table->sections);
379 table->sections = table->sections_end = NULL;
380 }
381
382 return old_count;
383}
384
c906108c
SS
385/* Builds a section table, given args BFD, SECTABLE_PTR, SECEND_PTR.
386 Returns 0 if OK, 1 on error. */
387
388int
0542c86d
PA
389build_section_table (struct bfd *some_bfd, struct target_section **start,
390 struct target_section **end)
c906108c
SS
391{
392 unsigned count;
393
394 count = bfd_count_sections (some_bfd);
395 if (*start)
b8c9b27d 396 xfree (* start);
0542c86d 397 *start = (struct target_section *) xmalloc (count * sizeof (**start));
c906108c 398 *end = *start;
c5aa993b 399 bfd_map_over_sections (some_bfd, add_to_section_table, (char *) end);
c906108c 400 if (*end > *start + count)
3e43a32a
MS
401 internal_error (__FILE__, __LINE__,
402 _("failed internal consistency check"));
c906108c
SS
403 /* We could realloc the table, but it probably loses for most files. */
404 return 0;
405}
07b82ea5
PA
406
407/* Add the sections array defined by [SECTIONS..SECTIONS_END[ to the
408 current set of target sections. */
409
410void
046ac79f 411add_target_sections (void *owner,
ed9eebaf 412 struct target_section *sections,
07b82ea5
PA
413 struct target_section *sections_end)
414{
415 int count;
416 struct target_section_table *table = current_target_sections;
417
418 count = sections_end - sections;
419
420 if (count > 0)
421 {
422 int space = resize_section_table (table, count);
ed9eebaf 423 int i;
d7f9d729 424
ed9eebaf
TT
425 for (i = 0; i < count; ++i)
426 {
427 table->sections[space + i] = sections[i];
046ac79f 428 table->sections[space + i].owner = owner;
ed9eebaf 429 }
07b82ea5
PA
430
431 /* If these are the first file sections we can provide memory
432 from, push the file_stratum target. */
6c95b8df
PA
433 if (!using_exec_ops)
434 {
435 using_exec_ops = 1;
436 push_target (&exec_ops);
437 }
07b82ea5
PA
438 }
439}
440
76ad5e1e
NB
441/* Add the sections of OBJFILE to the current set of target sections. */
442
443void
444add_target_sections_of_objfile (struct objfile *objfile)
445{
446 struct target_section_table *table = current_target_sections;
447 struct obj_section *osect;
448 int space;
449 unsigned count = 0;
450 struct target_section *ts;
451
452 if (objfile == NULL)
453 return;
454
455 /* Compute the number of sections to add. */
456 ALL_OBJFILE_OSECTIONS (objfile, osect)
457 {
458 if (bfd_get_section_size (osect->the_bfd_section) == 0)
459 continue;
460 count++;
461 }
462
463 if (count == 0)
464 return;
465
466 space = resize_section_table (table, count);
467
468 ts = table->sections + space;
469
470 ALL_OBJFILE_OSECTIONS (objfile, osect)
471 {
472 if (bfd_get_section_size (osect->the_bfd_section) == 0)
473 continue;
474
475 gdb_assert (ts < table->sections + space + count);
476
477 ts->addr = obj_section_addr (osect);
478 ts->endaddr = obj_section_endaddr (osect);
479 ts->the_bfd_section = osect->the_bfd_section;
480 ts->owner = (void *) objfile;
481
482 ts++;
483 }
484}
485
046ac79f
JK
486/* Remove all target sections owned by OWNER.
487 OWNER must be the same value passed to add_target_sections. */
07b82ea5
PA
488
489void
046ac79f 490remove_target_sections (void *owner)
07b82ea5
PA
491{
492 struct target_section *src, *dest;
07b82ea5
PA
493 struct target_section_table *table = current_target_sections;
494
046ac79f
JK
495 gdb_assert (owner != NULL);
496
07b82ea5
PA
497 dest = table->sections;
498 for (src = table->sections; src < table->sections_end; src++)
046ac79f 499 if (src->owner != owner)
07b82ea5
PA
500 {
501 /* Keep this section. */
502 if (dest < src)
503 *dest = *src;
504 dest++;
505 }
506
507 /* If we've dropped any sections, resize the section table. */
508 if (dest < src)
509 {
510 int old_count;
511
512 old_count = resize_section_table (table, dest - src);
513
514 /* If we don't have any more sections to read memory from,
515 remove the file_stratum target from the stack. */
516 if (old_count + (dest - src) == 0)
6c95b8df
PA
517 {
518 struct program_space *pspace;
519
520 ALL_PSPACES (pspace)
521 if (pspace->target_sections.sections
522 != pspace->target_sections.sections_end)
523 return;
524
525 unpush_target (&exec_ops);
526 }
07b82ea5
PA
527 }
528}
529
c906108c 530\f
348f8c02 531
e6ca34fc
PA
532VEC(mem_range_s) *
533section_table_available_memory (VEC(mem_range_s) *memory,
424447ee 534 CORE_ADDR memaddr, ULONGEST len,
e6ca34fc
PA
535 struct target_section *sections,
536 struct target_section *sections_end)
537{
538 struct target_section *p;
e6ca34fc
PA
539
540 for (p = sections; p < sections_end; p++)
541 {
2b2848e2
DE
542 if ((bfd_get_section_flags (p->the_bfd_section->owner,
543 p->the_bfd_section)
e6ca34fc
PA
544 & SEC_READONLY) == 0)
545 continue;
546
547 /* Copy the meta-data, adjusted. */
548 if (mem_ranges_overlap (p->addr, p->endaddr - p->addr, memaddr, len))
549 {
550 ULONGEST lo1, hi1, lo2, hi2;
551 struct mem_range *r;
552
553 lo1 = memaddr;
554 hi1 = memaddr + len;
555
556 lo2 = p->addr;
557 hi2 = p->endaddr;
558
559 r = VEC_safe_push (mem_range_s, memory, NULL);
560
561 r->start = max (lo1, lo2);
562 r->length = min (hi1, hi2) - r->start;
563 }
564 }
565
566 return memory;
567}
568
9b409511 569enum target_xfer_status
07b82ea5 570section_table_xfer_memory_partial (gdb_byte *readbuf, const gdb_byte *writebuf,
b55e14c7 571 ULONGEST offset, ULONGEST len,
9b409511 572 ULONGEST *xfered_len,
07b82ea5
PA
573 struct target_section *sections,
574 struct target_section *sections_end,
575 const char *section_name)
c906108c 576{
020cc13c 577 int res;
0542c86d 578 struct target_section *p;
07b82ea5
PA
579 ULONGEST memaddr = offset;
580 ULONGEST memend = memaddr + len;
c906108c 581
b55e14c7 582 if (len == 0)
3e43a32a
MS
583 internal_error (__FILE__, __LINE__,
584 _("failed internal consistency check"));
c906108c 585
348f8c02 586 for (p = sections; p < sections_end; p++)
c906108c 587 {
2b2848e2
DE
588 struct bfd_section *asect = p->the_bfd_section;
589 bfd *abfd = asect->owner;
590
591 if (section_name && strcmp (section_name, asect->name) != 0)
0963b4bd 592 continue; /* not the section we need. */
c906108c 593 if (memaddr >= p->addr)
3db26b01
JB
594 {
595 if (memend <= p->endaddr)
596 {
597 /* Entire transfer is within this section. */
07b82ea5 598 if (writebuf)
2b2848e2 599 res = bfd_set_section_contents (abfd, asect,
07b82ea5 600 writebuf, memaddr - p->addr,
85302095
AC
601 len);
602 else
2b2848e2 603 res = bfd_get_section_contents (abfd, asect,
07b82ea5 604 readbuf, memaddr - p->addr,
85302095 605 len);
9b409511
YQ
606
607 if (res != 0)
608 {
609 *xfered_len = len;
610 return TARGET_XFER_OK;
611 }
612 else
613 return TARGET_XFER_EOF;
3db26b01
JB
614 }
615 else if (memaddr >= p->endaddr)
616 {
617 /* This section ends before the transfer starts. */
618 continue;
619 }
620 else
621 {
622 /* This section overlaps the transfer. Just do half. */
623 len = p->endaddr - memaddr;
07b82ea5 624 if (writebuf)
2b2848e2 625 res = bfd_set_section_contents (abfd, asect,
07b82ea5 626 writebuf, memaddr - p->addr,
85302095
AC
627 len);
628 else
2b2848e2 629 res = bfd_get_section_contents (abfd, asect,
07b82ea5 630 readbuf, memaddr - p->addr,
85302095 631 len);
9b409511
YQ
632 if (res != 0)
633 {
634 *xfered_len = len;
635 return TARGET_XFER_OK;
636 }
637 else
638 return TARGET_XFER_EOF;
3db26b01
JB
639 }
640 }
c906108c
SS
641 }
642
9b409511 643 return TARGET_XFER_EOF; /* We can't help. */
c906108c 644}
348f8c02 645
70221824 646static struct target_section_table *
07b82ea5 647exec_get_section_table (struct target_ops *ops)
348f8c02 648{
07b82ea5 649 return current_target_sections;
348f8c02
PA
650}
651
9b409511 652static enum target_xfer_status
07b82ea5
PA
653exec_xfer_partial (struct target_ops *ops, enum target_object object,
654 const char *annex, gdb_byte *readbuf,
655 const gdb_byte *writebuf,
9b409511 656 ULONGEST offset, ULONGEST len, ULONGEST *xfered_len)
348f8c02 657{
07b82ea5
PA
658 struct target_section_table *table = target_get_section_table (ops);
659
660 if (object == TARGET_OBJECT_MEMORY)
661 return section_table_xfer_memory_partial (readbuf, writebuf,
9b409511 662 offset, len, xfered_len,
07b82ea5
PA
663 table->sections,
664 table->sections_end,
665 NULL);
666 else
2ed4b548 667 return TARGET_XFER_E_IO;
348f8c02 668}
c906108c 669\f
c5aa993b 670
c906108c 671void
07b82ea5 672print_section_info (struct target_section_table *t, bfd *abfd)
c906108c 673{
5af949e3 674 struct gdbarch *gdbarch = gdbarch_from_bfd (abfd);
0542c86d 675 struct target_section *p;
17a912b6 676 /* FIXME: 16 is not wide enough when gdbarch_addr_bit > 64. */
5af949e3 677 int wid = gdbarch_addr_bit (gdbarch) <= 32 ? 8 : 16;
c906108c 678
c5aa993b 679 printf_filtered ("\t`%s', ", bfd_get_filename (abfd));
c906108c 680 wrap_here (" ");
a3f17187 681 printf_filtered (_("file type %s.\n"), bfd_get_target (abfd));
c906108c 682 if (abfd == exec_bfd)
51bee8e9 683 {
3e43a32a
MS
684 /* gcc-3.4 does not like the initialization in
685 <p == t->sections_end>. */
d904de5b 686 bfd_vma displacement = 0;
2f1bdd26 687 bfd_vma entry_point;
51bee8e9
JK
688
689 for (p = t->sections; p < t->sections_end; p++)
690 {
2b2848e2
DE
691 struct bfd_section *psect = p->the_bfd_section;
692 bfd *pbfd = psect->owner;
51bee8e9 693
2b2848e2 694 if ((bfd_get_section_flags (pbfd, psect) & (SEC_ALLOC | SEC_LOAD))
51bee8e9
JK
695 != (SEC_ALLOC | SEC_LOAD))
696 continue;
697
2b2848e2
DE
698 if (bfd_get_section_vma (pbfd, psect) <= abfd->start_address
699 && abfd->start_address < (bfd_get_section_vma (pbfd, psect)
700 + bfd_get_section_size (psect)))
51bee8e9 701 {
2b2848e2 702 displacement = p->addr - bfd_get_section_vma (pbfd, psect);
51bee8e9
JK
703 break;
704 }
705 }
706 if (p == t->sections_end)
b37520b6 707 warning (_("Cannot find section for the entry point of %s."),
d904de5b 708 bfd_get_filename (abfd));
51bee8e9 709
2f1bdd26
MGD
710 entry_point = gdbarch_addr_bits_remove (gdbarch,
711 bfd_get_start_address (abfd)
712 + displacement);
51bee8e9 713 printf_filtered (_("\tEntry point: %s\n"),
2f1bdd26 714 paddress (gdbarch, entry_point));
51bee8e9 715 }
07b82ea5 716 for (p = t->sections; p < t->sections_end; p++)
c906108c 717 {
2b2848e2
DE
718 struct bfd_section *psect = p->the_bfd_section;
719 bfd *pbfd = psect->owner;
720
bb599908
PH
721 printf_filtered ("\t%s", hex_string_custom (p->addr, wid));
722 printf_filtered (" - %s", hex_string_custom (p->endaddr, wid));
bcf16802
KB
723
724 /* FIXME: A format of "08l" is not wide enough for file offsets
725 larger than 4GB. OTOH, making it "016l" isn't desirable either
726 since most output will then be much wider than necessary. It
727 may make sense to test the size of the file and choose the
728 format string accordingly. */
a3f17187 729 /* FIXME: i18n: Need to rewrite this sentence. */
c906108c
SS
730 if (info_verbose)
731 printf_filtered (" @ %s",
2b2848e2
DE
732 hex_string_custom (psect->filepos, 8));
733 printf_filtered (" is %s", bfd_section_name (pbfd, psect));
734 if (pbfd != abfd)
735 printf_filtered (" in %s", bfd_get_filename (pbfd));
c906108c
SS
736 printf_filtered ("\n");
737 }
738}
739
740static void
fba45db2 741exec_files_info (struct target_ops *t)
c906108c 742{
57008375
JK
743 if (exec_bfd)
744 print_section_info (current_target_sections, exec_bfd);
745 else
746 puts_filtered (_("\t<no file loaded>\n"));
c906108c
SS
747}
748
749static void
fba45db2 750set_section_command (char *args, int from_tty)
c906108c 751{
0542c86d 752 struct target_section *p;
c906108c
SS
753 char *secname;
754 unsigned seclen;
755 unsigned long secaddr;
756 char secprint[100];
757 long offset;
07b82ea5 758 struct target_section_table *table;
c906108c
SS
759
760 if (args == 0)
8a3fe4f8 761 error (_("Must specify section name and its virtual address"));
c906108c 762
0963b4bd 763 /* Parse out section name. */
c5aa993b 764 for (secname = args; !isspace (*args); args++);
c906108c
SS
765 seclen = args - secname;
766
0963b4bd 767 /* Parse out new virtual address. */
c906108c
SS
768 secaddr = parse_and_eval_address (args);
769
07b82ea5
PA
770 table = current_target_sections;
771 for (p = table->sections; p < table->sections_end; p++)
c5aa993b 772 {
57008375 773 if (!strncmp (secname, bfd_section_name (p->bfd,
3e43a32a 774 p->the_bfd_section), seclen)
57008375 775 && bfd_section_name (p->bfd, p->the_bfd_section)[seclen] == '\0')
c5aa993b
JM
776 {
777 offset = secaddr - p->addr;
778 p->addr += offset;
779 p->endaddr += offset;
780 if (from_tty)
781 exec_files_info (&exec_ops);
782 return;
783 }
c906108c 784 }
c906108c
SS
785 if (seclen >= sizeof (secprint))
786 seclen = sizeof (secprint) - 1;
787 strncpy (secprint, secname, seclen);
788 secprint[seclen] = '\0';
8a3fe4f8 789 error (_("Section %s not found"), secprint);
c906108c
SS
790}
791
30510692
DJ
792/* If we can find a section in FILENAME with BFD index INDEX, adjust
793 it to ADDRESS. */
c1bd25fd
DJ
794
795void
796exec_set_section_address (const char *filename, int index, CORE_ADDR address)
797{
0542c86d 798 struct target_section *p;
07b82ea5 799 struct target_section_table *table;
c1bd25fd 800
07b82ea5
PA
801 table = current_target_sections;
802 for (p = table->sections; p < table->sections_end; p++)
c1bd25fd 803 {
2b2848e2 804 if (filename_cmp (filename, p->the_bfd_section->owner->filename) == 0
30510692 805 && index == p->the_bfd_section->index)
c1bd25fd 806 {
30510692 807 p->endaddr += address - p->addr;
c1bd25fd 808 p->addr = address;
c1bd25fd
DJ
809 }
810 }
811}
812
c906108c
SS
813/* If mourn is being called in all the right places, this could be say
814 `gdb internal error' (since generic_mourn calls
815 breakpoint_init_inferior). */
816
817static int
3db08215
MM
818ignore (struct target_ops *ops, struct gdbarch *gdbarch,
819 struct bp_target_info *bp_tgt)
c906108c
SS
820{
821 return 0;
822}
823
c35b1492
PA
824static int
825exec_has_memory (struct target_ops *ops)
826{
827 /* We can provide memory if we have any file/target sections to read
828 from. */
829 return (current_target_sections->sections
830 != current_target_sections->sections_end);
831}
832
0963b4bd 833/* Find mapped memory. */
be4d1333
MS
834
835extern void
b8edc417 836exec_set_find_memory_regions (int (*func) (find_memory_region_ftype, void *))
be4d1333
MS
837{
838 exec_ops.to_find_memory_regions = func;
839}
840
841static char *exec_make_note_section (bfd *, int *);
842
c906108c
SS
843/* Fill in the exec file target vector. Very few entries need to be
844 defined. */
845
be4d1333 846static void
fba45db2 847init_exec_ops (void)
c906108c
SS
848{
849 exec_ops.to_shortname = "exec";
850 exec_ops.to_longname = "Local exec file";
851 exec_ops.to_doc = "Use an executable file as a target.\n\
852Specify the filename of the executable file.";
1adeb98a 853 exec_ops.to_open = exec_open;
6c95b8df 854 exec_ops.to_close = exec_close_1;
c906108c 855 exec_ops.to_attach = find_default_attach;
07b82ea5
PA
856 exec_ops.to_xfer_partial = exec_xfer_partial;
857 exec_ops.to_get_section_table = exec_get_section_table;
c906108c
SS
858 exec_ops.to_files_info = exec_files_info;
859 exec_ops.to_insert_breakpoint = ignore;
860 exec_ops.to_remove_breakpoint = ignore;
861 exec_ops.to_create_inferior = find_default_create_inferior;
c906108c 862 exec_ops.to_stratum = file_stratum;
c35b1492 863 exec_ops.to_has_memory = exec_has_memory;
be4d1333 864 exec_ops.to_make_corefile_notes = exec_make_note_section;
c5aa993b 865 exec_ops.to_magic = OPS_MAGIC;
c906108c
SS
866}
867
868void
fba45db2 869_initialize_exec (void)
c906108c
SS
870{
871 struct cmd_list_element *c;
872
873 init_exec_ops ();
874
875 if (!dbx_commands)
876 {
1a966eab
AC
877 c = add_cmd ("file", class_files, file_command, _("\
878Use FILE as program to be debugged.\n\
c906108c
SS
879It is read for its symbols, for getting the contents of pure memory,\n\
880and it is the program executed when you use the `run' command.\n\
881If FILE cannot be found as specified, your execution directory path\n\
882($PATH) is searched for a command of that name.\n\
1a966eab 883No arg means to have no executable file and no symbols."), &cmdlist);
5ba2abeb 884 set_cmd_completer (c, filename_completer);
c906108c
SS
885 }
886
1a966eab
AC
887 c = add_cmd ("exec-file", class_files, exec_file_command, _("\
888Use FILE as program for getting contents of pure memory.\n\
c906108c
SS
889If FILE cannot be found as specified, your execution directory path\n\
890is searched for a command of that name.\n\
1a966eab 891No arg means have no executable file."), &cmdlist);
5ba2abeb 892 set_cmd_completer (c, filename_completer);
c906108c 893
1bedd215
AC
894 add_com ("section", class_files, set_section_command, _("\
895Change the base address of section SECTION of the exec file to ADDR.\n\
c906108c
SS
896This can be used if the exec file does not contain section addresses,\n\
897(such as in the a.out format), or when the addresses specified in the\n\
898file itself are wrong. Each section must be changed separately. The\n\
1bedd215 899``info files'' command lists all the sections and their addresses."));
c906108c 900
5bf193a2
AC
901 add_setshow_boolean_cmd ("write", class_support, &write_files, _("\
902Set writing into executable and core files."), _("\
903Show writing into executable and core files."), NULL,
904 NULL,
920d2a44 905 show_write_files,
5bf193a2 906 &setlist, &showlist);
c5aa993b 907
9852c492 908 add_target_with_completer (&exec_ops, filename_completer);
c906108c 909}
be4d1333
MS
910
911static char *
912exec_make_note_section (bfd *obfd, int *note_size)
913{
8a3fe4f8 914 error (_("Can't create a corefile"));
be4d1333 915}
This page took 1.093113 seconds and 4 git commands to generate.