arc: Fix ARI warning for printf(%p)
[deliverable/binutils-gdb.git] / gdb / exec.c
CommitLineData
c906108c 1/* Work with executable files, for GDB.
4646aa9d 2
618f726f 3 Copyright (C) 1988-2016 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "frame.h"
22#include "inferior.h"
23#include "target.h"
24#include "gdbcmd.h"
25#include "language.h"
0ba1096a 26#include "filenames.h"
c906108c
SS
27#include "symfile.h"
28#include "objfiles.h"
c5f0f3d0 29#include "completer.h"
fd0407d6 30#include "value.h"
4646aa9d 31#include "exec.h"
ea53e89f 32#include "observer.h"
dacec2a8 33#include "arch-utils.h"
6c95b8df
PA
34#include "gdbthread.h"
35#include "progspace.h"
cbb099e8 36#include "gdb_bfd.h"
b427c1bc 37#include "gcore.h"
c906108c 38
c906108c 39#include <fcntl.h>
dbda9972 40#include "readline/readline.h"
c906108c
SS
41#include "gdbcore.h"
42
43#include <ctype.h>
53ce3c39 44#include <sys/stat.h>
a9a5a3d1 45#include "solist.h"
325fac50 46#include <algorithm>
c906108c 47
9a4105ab 48void (*deprecated_file_changed_hook) (char *);
c906108c
SS
49
50/* Prototypes for local functions */
51
a14ed312 52static void file_command (char *, int);
c906108c 53
a14ed312 54static void set_section_command (char *, int);
c906108c 55
a14ed312 56static void exec_files_info (struct target_ops *);
c906108c 57
a14ed312 58static void init_exec_ops (void);
c906108c 59
a14ed312 60void _initialize_exec (void);
c906108c 61
c906108c
SS
62/* The target vector for executable files. */
63
e8b2341c 64static struct target_ops exec_ops;
c906108c 65
c906108c
SS
66/* Whether to open exec and core files read-only or read-write. */
67
68int write_files = 0;
920d2a44
AC
69static void
70show_write_files (struct ui_file *file, int from_tty,
71 struct cmd_list_element *c, const char *value)
72{
73 fprintf_filtered (file, _("Writing into executable and core files is %s.\n"),
74 value);
75}
76
c906108c 77
4c42eaff 78static void
014f9477 79exec_open (const char *args, int from_tty)
1adeb98a
FN
80{
81 target_preopen (from_tty);
82 exec_file_attach (args, from_tty);
83}
84
07b82ea5
PA
85/* Close and clear exec_bfd. If we end up with no target sections to
86 read memory from, this unpushes the exec_ops target. */
87
6c95b8df
PA
88void
89exec_close (void)
07b82ea5
PA
90{
91 if (exec_bfd)
92 {
93 bfd *abfd = exec_bfd;
07b82ea5 94
cbb099e8 95 gdb_bfd_unref (abfd);
07b82ea5
PA
96
97 /* Removing target sections may close the exec_ops target.
98 Clear exec_bfd before doing so to prevent recursion. */
99 exec_bfd = NULL;
100 exec_bfd_mtime = 0;
101
046ac79f 102 remove_target_sections (&exec_bfd);
1f0c4988
JK
103
104 xfree (exec_filename);
105 exec_filename = NULL;
07b82ea5
PA
106 }
107}
108
6c95b8df
PA
109/* This is the target_close implementation. Clears all target
110 sections and closes all executable bfds from all program spaces. */
111
c906108c 112static void
de90e03d 113exec_close_1 (struct target_ops *self)
c906108c 114{
ab16fce8
TT
115 struct program_space *ss;
116 struct cleanup *old_chain;
6c95b8df 117
ab16fce8
TT
118 old_chain = save_current_program_space ();
119 ALL_PSPACES (ss)
6c95b8df 120 {
ab16fce8
TT
121 set_current_program_space (ss);
122 clear_section_table (current_target_sections);
123 exec_close ();
6c95b8df 124 }
ab16fce8
TT
125
126 do_cleanups (old_chain);
c906108c
SS
127}
128
1adeb98a
FN
129void
130exec_file_clear (int from_tty)
131{
132 /* Remove exec file. */
6c95b8df 133 exec_close ();
1adeb98a
FN
134
135 if (from_tty)
a3f17187 136 printf_unfiltered (_("No executable file now.\n"));
1adeb98a
FN
137}
138
57d1de9c
LM
139/* Returns non-zero if exceptions E1 and E2 are equal. Returns zero
140 otherwise. */
141
142static int
143exception_print_same (struct gdb_exception e1, struct gdb_exception e2)
144{
145 const char *msg1 = e1.message;
146 const char *msg2 = e2.message;
147
148 if (msg1 == NULL)
149 msg1 = "";
150 if (msg2 == NULL)
151 msg2 = "";
152
153 return (e1.reason == e2.reason
154 && e1.error == e2.error
155 && strcmp (e1.message, e2.message) == 0);
156}
157
a10de604
GB
158/* See gdbcore.h. */
159
160void
161exec_file_locate_attach (int pid, int from_tty)
162{
163 char *exec_file, *full_exec_path = NULL;
88178e82 164 struct cleanup *old_chain;
57d1de9c 165 struct gdb_exception prev_err = exception_none;
a10de604
GB
166
167 /* Do nothing if we already have an executable filename. */
168 exec_file = (char *) get_exec_file (0);
169 if (exec_file != NULL)
170 return;
171
172 /* Try to determine a filename from the process itself. */
173 exec_file = target_pid_to_exec_file (pid);
174 if (exec_file == NULL)
fef3cb9f
JK
175 {
176 warning (_("No executable has been specified and target does not "
177 "support\n"
178 "determining executable automatically. "
179 "Try using the \"file\" command."));
180 return;
181 }
a10de604 182
a9a5a3d1
GB
183 /* If gdb_sysroot is not empty and the discovered filename
184 is absolute then prefix the filename with gdb_sysroot. */
a3be80c3 185 if (*gdb_sysroot != '\0' && IS_ABSOLUTE_PATH (exec_file))
bf74e428
GB
186 {
187 full_exec_path = exec_file_find (exec_file, NULL);
188 if (full_exec_path == NULL)
189 return;
190 }
191 else
a9a5a3d1
GB
192 {
193 /* It's possible we don't have a full path, but rather just a
194 filename. Some targets, such as HP-UX, don't provide the
195 full path, sigh.
196
197 Attempt to qualify the filename against the source path.
198 (If that fails, we'll just fall back on the original
199 filename. Not much more we can do...) */
200 if (!source_full_path_of (exec_file, &full_exec_path))
201 full_exec_path = xstrdup (exec_file);
202 }
a10de604 203
88178e82 204 old_chain = make_cleanup (xfree, full_exec_path);
57d1de9c
LM
205 make_cleanup (free_current_contents, &prev_err.message);
206
207 /* exec_file_attach and symbol_file_add_main may throw an error if the file
208 cannot be opened either locally or remotely.
209
210 This happens for example, when the file is first found in the local
211 sysroot (above), and then disappears (a TOCTOU race), or when it doesn't
212 exist in the target filesystem, or when the file does exist, but
213 is not readable.
88178e82 214
57d1de9c
LM
215 Even without a symbol file, the remote-based debugging session should
216 continue normally instead of ending abruptly. Hence we catch thrown
217 errors/exceptions in the following code. */
218 TRY
219 {
220 exec_file_attach (full_exec_path, from_tty);
221 }
222 CATCH (err, RETURN_MASK_ERROR)
223 {
224 if (err.message != NULL)
225 warning ("%s", err.message);
226
227 prev_err = err;
228
229 /* Save message so it doesn't get trashed by the catch below. */
230 prev_err.message = xstrdup (err.message);
231 }
232 END_CATCH
233
234 TRY
235 {
236 symbol_file_add_main (full_exec_path, from_tty);
237 }
238 CATCH (err, RETURN_MASK_ERROR)
239 {
240 if (!exception_print_same (prev_err, err))
241 warning ("%s", err.message);
242 }
243 END_CATCH
88178e82
GB
244
245 do_cleanups (old_chain);
a10de604
GB
246}
247
907083d1 248/* Set FILENAME as the new exec file.
c906108c 249
c5aa993b
JM
250 This function is intended to be behave essentially the same
251 as exec_file_command, except that the latter will detect when
252 a target is being debugged, and will ask the user whether it
253 should be shut down first. (If the answer is "no", then the
254 new file is ignored.)
c906108c 255
c5aa993b
JM
256 This file is used by exec_file_command, to do the work of opening
257 and processing the exec file after any prompting has happened.
c906108c 258
c5aa993b
JM
259 And, it is used by child_attach, when the attach command was
260 given a pid but not a exec pathname, and the attach command could
261 figure out the pathname from the pid. (In this case, we shouldn't
262 ask the user whether the current target should be shut down --
907083d1 263 we're supplying the exec pathname late for good reason.) */
c906108c
SS
264
265void
5f08566b 266exec_file_attach (const char *filename, int from_tty)
c906108c 267{
9b333ba3
TT
268 struct cleanup *cleanups;
269
270 /* First, acquire a reference to the current exec_bfd. We release
271 this at the end of the function; but acquiring it now lets the
272 BFD cache return it if this call refers to the same file. */
273 gdb_bfd_ref (exec_bfd);
274 cleanups = make_cleanup_bfd_unref (exec_bfd);
275
c906108c 276 /* Remove any previous exec file. */
6c95b8df 277 exec_close ();
c906108c
SS
278
279 /* Now open and digest the file the user requested, if any. */
280
1adeb98a
FN
281 if (!filename)
282 {
283 if (from_tty)
a3f17187 284 printf_unfiltered (_("No executable file now.\n"));
7a107747
DJ
285
286 set_gdbarch_from_file (NULL);
1adeb98a
FN
287 }
288 else
c906108c 289 {
64c0b5de 290 int load_via_target = 0;
1f0c4988 291 char *scratch_pathname, *canonical_pathname;
c906108c 292 int scratch_chan;
07b82ea5 293 struct target_section *sections = NULL, *sections_end = NULL;
d18b8b7a 294 char **matching;
c5aa993b 295
64c0b5de
GB
296 if (is_target_filename (filename))
297 {
298 if (target_filesystem_is_local ())
299 filename += strlen (TARGET_SYSROOT_PREFIX);
300 else
301 load_via_target = 1;
302 }
303
304 if (load_via_target)
c5aa993b 305 {
64c0b5de
GB
306 /* gdb_bfd_fopen does not support "target:" filenames. */
307 if (write_files)
308 warning (_("writing into executable files is "
309 "not supported for %s sysroots"),
310 TARGET_SYSROOT_PREFIX);
311
312 scratch_pathname = xstrdup (filename);
313 make_cleanup (xfree, scratch_pathname);
314
315 scratch_chan = -1;
d7f9d729 316
64c0b5de 317 canonical_pathname = scratch_pathname;
c5aa993b 318 }
64c0b5de
GB
319 else
320 {
321 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
322 filename, write_files ?
323 O_RDWR | O_BINARY : O_RDONLY | O_BINARY,
324 &scratch_pathname);
325#if defined(__GO32__) || defined(_WIN32) || defined(__CYGWIN__)
326 if (scratch_chan < 0)
327 {
0ae1c716 328 char *exename = (char *) alloca (strlen (filename) + 5);
64c0b5de
GB
329
330 strcat (strcpy (exename, filename), ".exe");
331 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
332 exename, write_files ?
333 O_RDWR | O_BINARY
334 : O_RDONLY | O_BINARY,
335 &scratch_pathname);
336 }
c906108c 337#endif
64c0b5de
GB
338 if (scratch_chan < 0)
339 perror_with_name (filename);
a4453b7e 340
64c0b5de 341 make_cleanup (xfree, scratch_pathname);
a4453b7e 342
64c0b5de
GB
343 /* gdb_bfd_open (and its variants) prefers canonicalized
344 pathname for better BFD caching. */
345 canonical_pathname = gdb_realpath (scratch_pathname);
346 make_cleanup (xfree, canonical_pathname);
347 }
1f0c4988 348
64c0b5de 349 if (write_files && !load_via_target)
1f0c4988 350 exec_bfd = gdb_bfd_fopen (canonical_pathname, gnutarget,
1c00ec6b
TT
351 FOPEN_RUB, scratch_chan);
352 else
1f0c4988 353 exec_bfd = gdb_bfd_open (canonical_pathname, gnutarget, scratch_chan);
c906108c
SS
354
355 if (!exec_bfd)
9fe4a216 356 {
d5131498 357 error (_("\"%s\": could not open as an executable file: %s."),
9fe4a216
TT
358 scratch_pathname, bfd_errmsg (bfd_get_error ()));
359 }
c906108c 360
64c0b5de
GB
361 /* gdb_realpath_keepfile resolves symlinks on the local
362 filesystem and so cannot be used for "target:" files. */
1f0c4988 363 gdb_assert (exec_filename == NULL);
64c0b5de
GB
364 if (load_via_target)
365 exec_filename = xstrdup (bfd_get_filename (exec_bfd));
366 else
367 exec_filename = gdb_realpath_keepfile (scratch_pathname);
1f0c4988 368
d18b8b7a 369 if (!bfd_check_format_matches (exec_bfd, bfd_object, &matching))
c906108c
SS
370 {
371 /* Make sure to close exec_bfd, or else "run" might try to use
372 it. */
6c95b8df 373 exec_close ();
8a3fe4f8 374 error (_("\"%s\": not in executable format: %s"),
d18b8b7a
HZ
375 scratch_pathname,
376 gdb_bfd_errmsg (bfd_get_error (), matching));
c906108c
SS
377 }
378
07b82ea5 379 if (build_section_table (exec_bfd, &sections, &sections_end))
c906108c
SS
380 {
381 /* Make sure to close exec_bfd, or else "run" might try to use
382 it. */
6c95b8df 383 exec_close ();
8a3fe4f8 384 error (_("\"%s\": can't find the file sections: %s"),
c906108c
SS
385 scratch_pathname, bfd_errmsg (bfd_get_error ()));
386 }
387
c04ea773
DJ
388 exec_bfd_mtime = bfd_get_mtime (exec_bfd);
389
c906108c
SS
390 validate_files ();
391
392 set_gdbarch_from_file (exec_bfd);
393
07b82ea5 394 /* Add the executable's sections to the current address spaces'
6c95b8df
PA
395 list of sections. This possibly pushes the exec_ops
396 target. */
ed9eebaf 397 add_target_sections (&exec_bfd, sections, sections_end);
07b82ea5 398 xfree (sections);
c906108c
SS
399
400 /* Tell display code (if any) about the changed file name. */
9a4105ab
AC
401 if (deprecated_exec_file_display_hook)
402 (*deprecated_exec_file_display_hook) (filename);
c906108c 403 }
9b333ba3
TT
404
405 do_cleanups (cleanups);
406
ce7d4522 407 bfd_cache_close_all ();
781b42b0 408 observer_notify_executable_changed ();
c906108c
SS
409}
410
411/* Process the first arg in ARGS as the new exec file.
412
c5aa993b
JM
413 Note that we have to explicitly ignore additional args, since we can
414 be called from file_command(), which also calls symbol_file_command()
1adeb98a
FN
415 which can take multiple args.
416
0963b4bd 417 If ARGS is NULL, we just want to close the exec file. */
c906108c 418
1adeb98a 419static void
fba45db2 420exec_file_command (char *args, int from_tty)
c906108c 421{
1adeb98a
FN
422 char **argv;
423 char *filename;
4c42eaff
DJ
424
425 if (from_tty && target_has_execution
426 && !query (_("A program is being debugged already.\n"
427 "Are you sure you want to change the file? ")))
428 error (_("File not changed."));
1adeb98a
FN
429
430 if (args)
431 {
f7545552
TT
432 struct cleanup *cleanups;
433
1adeb98a
FN
434 /* Scan through the args and pick up the first non option arg
435 as the filename. */
436
d1a41061 437 argv = gdb_buildargv (args);
f7545552 438 cleanups = make_cleanup_freeargv (argv);
1adeb98a
FN
439
440 for (; (*argv != NULL) && (**argv == '-'); argv++)
441 {;
442 }
443 if (*argv == NULL)
8a3fe4f8 444 error (_("No executable file name was specified"));
1adeb98a
FN
445
446 filename = tilde_expand (*argv);
447 make_cleanup (xfree, filename);
448 exec_file_attach (filename, from_tty);
f7545552
TT
449
450 do_cleanups (cleanups);
1adeb98a
FN
451 }
452 else
453 exec_file_attach (NULL, from_tty);
c906108c
SS
454}
455
0963b4bd 456/* Set both the exec file and the symbol file, in one command.
c906108c
SS
457 What a novelty. Why did GDB go through four major releases before this
458 command was added? */
459
460static void
fba45db2 461file_command (char *arg, int from_tty)
c906108c
SS
462{
463 /* FIXME, if we lose on reading the symbol file, we should revert
464 the exec file, but that's rough. */
465 exec_file_command (arg, from_tty);
466 symbol_file_command (arg, from_tty);
9a4105ab
AC
467 if (deprecated_file_changed_hook)
468 deprecated_file_changed_hook (arg);
c906108c 469}
c906108c 470\f
c5aa993b 471
0963b4bd 472/* Locate all mappable sections of a BFD file.
c906108c
SS
473 table_pp_char is a char * to get it through bfd_map_over_sections;
474 we cast it back to its proper type. */
475
476static void
7be0c536
AC
477add_to_section_table (bfd *abfd, struct bfd_section *asect,
478 void *table_pp_char)
c906108c 479{
0542c86d 480 struct target_section **table_pp = (struct target_section **) table_pp_char;
c906108c
SS
481 flagword aflag;
482
2b2848e2
DE
483 gdb_assert (abfd == asect->owner);
484
0f5d55d8
JB
485 /* Check the section flags, but do not discard zero-length sections, since
486 some symbols may still be attached to this section. For instance, we
487 encountered on sparc-solaris 2.10 a shared library with an empty .bss
488 section to which a symbol named "_end" was attached. The address
489 of this symbol still needs to be relocated. */
c906108c
SS
490 aflag = bfd_get_section_flags (abfd, asect);
491 if (!(aflag & SEC_ALLOC))
492 return;
0f5d55d8 493
046ac79f 494 (*table_pp)->owner = NULL;
c906108c
SS
495 (*table_pp)->the_bfd_section = asect;
496 (*table_pp)->addr = bfd_section_vma (abfd, asect);
497 (*table_pp)->endaddr = (*table_pp)->addr + bfd_section_size (abfd, asect);
498 (*table_pp)++;
499}
500
a5b1fd27
DE
501/* See exec.h. */
502
503void
504clear_section_table (struct target_section_table *table)
505{
506 xfree (table->sections);
507 table->sections = table->sections_end = NULL;
508}
509
510/* Resize section table TABLE by ADJUSTMENT.
511 ADJUSTMENT may be negative, in which case the caller must have already
512 removed the sections being deleted.
513 Returns the old size. */
514
515static int
516resize_section_table (struct target_section_table *table, int adjustment)
07b82ea5 517{
07b82ea5
PA
518 int old_count;
519 int new_count;
520
07b82ea5
PA
521 old_count = table->sections_end - table->sections;
522
a5b1fd27 523 new_count = adjustment + old_count;
07b82ea5
PA
524
525 if (new_count)
526 {
224c3ddb
SM
527 table->sections = XRESIZEVEC (struct target_section, table->sections,
528 new_count);
07b82ea5
PA
529 table->sections_end = table->sections + new_count;
530 }
531 else
a5b1fd27 532 clear_section_table (table);
07b82ea5
PA
533
534 return old_count;
535}
536
c906108c
SS
537/* Builds a section table, given args BFD, SECTABLE_PTR, SECEND_PTR.
538 Returns 0 if OK, 1 on error. */
539
540int
0542c86d
PA
541build_section_table (struct bfd *some_bfd, struct target_section **start,
542 struct target_section **end)
c906108c
SS
543{
544 unsigned count;
545
546 count = bfd_count_sections (some_bfd);
547 if (*start)
b8c9b27d 548 xfree (* start);
8d749320 549 *start = XNEWVEC (struct target_section, count);
c906108c 550 *end = *start;
c5aa993b 551 bfd_map_over_sections (some_bfd, add_to_section_table, (char *) end);
c906108c 552 if (*end > *start + count)
3e43a32a
MS
553 internal_error (__FILE__, __LINE__,
554 _("failed internal consistency check"));
c906108c
SS
555 /* We could realloc the table, but it probably loses for most files. */
556 return 0;
557}
07b82ea5
PA
558
559/* Add the sections array defined by [SECTIONS..SECTIONS_END[ to the
560 current set of target sections. */
561
562void
046ac79f 563add_target_sections (void *owner,
ed9eebaf 564 struct target_section *sections,
07b82ea5
PA
565 struct target_section *sections_end)
566{
567 int count;
568 struct target_section_table *table = current_target_sections;
569
570 count = sections_end - sections;
571
572 if (count > 0)
573 {
574 int space = resize_section_table (table, count);
ed9eebaf 575 int i;
d7f9d729 576
ed9eebaf
TT
577 for (i = 0; i < count; ++i)
578 {
579 table->sections[space + i] = sections[i];
046ac79f 580 table->sections[space + i].owner = owner;
ed9eebaf 581 }
07b82ea5
PA
582
583 /* If these are the first file sections we can provide memory
584 from, push the file_stratum target. */
ab16fce8
TT
585 if (!target_is_pushed (&exec_ops))
586 push_target (&exec_ops);
07b82ea5
PA
587 }
588}
589
76ad5e1e
NB
590/* Add the sections of OBJFILE to the current set of target sections. */
591
592void
593add_target_sections_of_objfile (struct objfile *objfile)
594{
595 struct target_section_table *table = current_target_sections;
596 struct obj_section *osect;
597 int space;
598 unsigned count = 0;
599 struct target_section *ts;
600
601 if (objfile == NULL)
602 return;
603
604 /* Compute the number of sections to add. */
605 ALL_OBJFILE_OSECTIONS (objfile, osect)
606 {
607 if (bfd_get_section_size (osect->the_bfd_section) == 0)
608 continue;
609 count++;
610 }
611
612 if (count == 0)
613 return;
614
615 space = resize_section_table (table, count);
616
617 ts = table->sections + space;
618
619 ALL_OBJFILE_OSECTIONS (objfile, osect)
620 {
621 if (bfd_get_section_size (osect->the_bfd_section) == 0)
622 continue;
623
624 gdb_assert (ts < table->sections + space + count);
625
626 ts->addr = obj_section_addr (osect);
627 ts->endaddr = obj_section_endaddr (osect);
628 ts->the_bfd_section = osect->the_bfd_section;
629 ts->owner = (void *) objfile;
630
631 ts++;
632 }
633}
634
046ac79f
JK
635/* Remove all target sections owned by OWNER.
636 OWNER must be the same value passed to add_target_sections. */
07b82ea5
PA
637
638void
046ac79f 639remove_target_sections (void *owner)
07b82ea5
PA
640{
641 struct target_section *src, *dest;
07b82ea5
PA
642 struct target_section_table *table = current_target_sections;
643
046ac79f
JK
644 gdb_assert (owner != NULL);
645
07b82ea5
PA
646 dest = table->sections;
647 for (src = table->sections; src < table->sections_end; src++)
046ac79f 648 if (src->owner != owner)
07b82ea5
PA
649 {
650 /* Keep this section. */
651 if (dest < src)
652 *dest = *src;
653 dest++;
654 }
655
656 /* If we've dropped any sections, resize the section table. */
657 if (dest < src)
658 {
659 int old_count;
660
661 old_count = resize_section_table (table, dest - src);
662
663 /* If we don't have any more sections to read memory from,
664 remove the file_stratum target from the stack. */
665 if (old_count + (dest - src) == 0)
6c95b8df
PA
666 {
667 struct program_space *pspace;
668
669 ALL_PSPACES (pspace)
670 if (pspace->target_sections.sections
671 != pspace->target_sections.sections_end)
672 return;
673
674 unpush_target (&exec_ops);
675 }
07b82ea5
PA
676 }
677}
678
c906108c 679\f
348f8c02 680
1ca49d37
YQ
681enum target_xfer_status
682exec_read_partial_read_only (gdb_byte *readbuf, ULONGEST offset,
683 ULONGEST len, ULONGEST *xfered_len)
684{
685 /* It's unduly pedantic to refuse to look at the executable for
686 read-only pieces; so do the equivalent of readonly regions aka
687 QTro packet. */
688 if (exec_bfd != NULL)
689 {
690 asection *s;
691 bfd_size_type size;
692 bfd_vma vma;
693
694 for (s = exec_bfd->sections; s; s = s->next)
695 {
696 if ((s->flags & SEC_LOAD) == 0
697 || (s->flags & SEC_READONLY) == 0)
698 continue;
699
700 vma = s->vma;
701 size = bfd_get_section_size (s);
702 if (vma <= offset && offset < (vma + size))
703 {
704 ULONGEST amt;
705
706 amt = (vma + size) - offset;
707 if (amt > len)
708 amt = len;
709
710 amt = bfd_get_section_contents (exec_bfd, s,
711 readbuf, offset - vma, amt);
712
713 if (amt == 0)
714 return TARGET_XFER_EOF;
715 else
716 {
717 *xfered_len = amt;
718 return TARGET_XFER_OK;
719 }
720 }
721 }
722 }
723
724 /* Indicate failure to find the requested memory block. */
725 return TARGET_XFER_E_IO;
726}
727
5a2eb0ef
YQ
728/* Appends all read-only memory ranges found in the target section
729 table defined by SECTIONS and SECTIONS_END, starting at (and
730 intersected with) MEMADDR for LEN bytes. Returns the augmented
731 VEC. */
732
733static VEC(mem_range_s) *
e6ca34fc 734section_table_available_memory (VEC(mem_range_s) *memory,
424447ee 735 CORE_ADDR memaddr, ULONGEST len,
e6ca34fc
PA
736 struct target_section *sections,
737 struct target_section *sections_end)
738{
739 struct target_section *p;
e6ca34fc
PA
740
741 for (p = sections; p < sections_end; p++)
742 {
2b2848e2
DE
743 if ((bfd_get_section_flags (p->the_bfd_section->owner,
744 p->the_bfd_section)
e6ca34fc
PA
745 & SEC_READONLY) == 0)
746 continue;
747
748 /* Copy the meta-data, adjusted. */
749 if (mem_ranges_overlap (p->addr, p->endaddr - p->addr, memaddr, len))
750 {
751 ULONGEST lo1, hi1, lo2, hi2;
752 struct mem_range *r;
753
754 lo1 = memaddr;
755 hi1 = memaddr + len;
756
757 lo2 = p->addr;
758 hi2 = p->endaddr;
759
760 r = VEC_safe_push (mem_range_s, memory, NULL);
761
325fac50
PA
762 r->start = std::max (lo1, lo2);
763 r->length = std::min (hi1, hi2) - r->start;
e6ca34fc
PA
764 }
765 }
766
767 return memory;
768}
769
1ee79381
YQ
770enum target_xfer_status
771section_table_read_available_memory (gdb_byte *readbuf, ULONGEST offset,
772 ULONGEST len, ULONGEST *xfered_len)
773{
774 VEC(mem_range_s) *available_memory = NULL;
775 struct target_section_table *table;
776 struct cleanup *old_chain;
777 mem_range_s *r;
778 int i;
779
780 table = target_get_section_table (&exec_ops);
781 available_memory = section_table_available_memory (available_memory,
782 offset, len,
783 table->sections,
784 table->sections_end);
785
786 old_chain = make_cleanup (VEC_cleanup(mem_range_s),
787 &available_memory);
788
789 normalize_mem_ranges (available_memory);
790
791 for (i = 0;
792 VEC_iterate (mem_range_s, available_memory, i, r);
793 i++)
794 {
795 if (mem_ranges_overlap (r->start, r->length, offset, len))
796 {
797 CORE_ADDR end;
798 enum target_xfer_status status;
799
800 /* Get the intersection window. */
768adc05 801 end = std::min<CORE_ADDR> (offset + len, r->start + r->length);
1ee79381
YQ
802
803 gdb_assert (end - offset <= len);
804
805 if (offset >= r->start)
806 status = exec_read_partial_read_only (readbuf, offset,
807 end - offset,
808 xfered_len);
809 else
810 {
811 *xfered_len = r->start - offset;
bc113b4e 812 status = TARGET_XFER_UNAVAILABLE;
1ee79381
YQ
813 }
814 do_cleanups (old_chain);
815 return status;
816 }
817 }
818 do_cleanups (old_chain);
819
820 *xfered_len = len;
bc113b4e 821 return TARGET_XFER_UNAVAILABLE;
1ee79381
YQ
822}
823
9b409511 824enum target_xfer_status
07b82ea5 825section_table_xfer_memory_partial (gdb_byte *readbuf, const gdb_byte *writebuf,
b55e14c7 826 ULONGEST offset, ULONGEST len,
9b409511 827 ULONGEST *xfered_len,
07b82ea5
PA
828 struct target_section *sections,
829 struct target_section *sections_end,
830 const char *section_name)
c906108c 831{
020cc13c 832 int res;
0542c86d 833 struct target_section *p;
07b82ea5
PA
834 ULONGEST memaddr = offset;
835 ULONGEST memend = memaddr + len;
c906108c 836
b55e14c7 837 if (len == 0)
3e43a32a
MS
838 internal_error (__FILE__, __LINE__,
839 _("failed internal consistency check"));
c906108c 840
348f8c02 841 for (p = sections; p < sections_end; p++)
c906108c 842 {
2b2848e2
DE
843 struct bfd_section *asect = p->the_bfd_section;
844 bfd *abfd = asect->owner;
845
846 if (section_name && strcmp (section_name, asect->name) != 0)
0963b4bd 847 continue; /* not the section we need. */
c906108c 848 if (memaddr >= p->addr)
3db26b01
JB
849 {
850 if (memend <= p->endaddr)
851 {
852 /* Entire transfer is within this section. */
07b82ea5 853 if (writebuf)
2b2848e2 854 res = bfd_set_section_contents (abfd, asect,
07b82ea5 855 writebuf, memaddr - p->addr,
85302095
AC
856 len);
857 else
2b2848e2 858 res = bfd_get_section_contents (abfd, asect,
07b82ea5 859 readbuf, memaddr - p->addr,
85302095 860 len);
9b409511
YQ
861
862 if (res != 0)
863 {
864 *xfered_len = len;
865 return TARGET_XFER_OK;
866 }
867 else
868 return TARGET_XFER_EOF;
3db26b01
JB
869 }
870 else if (memaddr >= p->endaddr)
871 {
872 /* This section ends before the transfer starts. */
873 continue;
874 }
875 else
876 {
877 /* This section overlaps the transfer. Just do half. */
878 len = p->endaddr - memaddr;
07b82ea5 879 if (writebuf)
2b2848e2 880 res = bfd_set_section_contents (abfd, asect,
07b82ea5 881 writebuf, memaddr - p->addr,
85302095
AC
882 len);
883 else
2b2848e2 884 res = bfd_get_section_contents (abfd, asect,
07b82ea5 885 readbuf, memaddr - p->addr,
85302095 886 len);
9b409511
YQ
887 if (res != 0)
888 {
889 *xfered_len = len;
890 return TARGET_XFER_OK;
891 }
892 else
893 return TARGET_XFER_EOF;
3db26b01
JB
894 }
895 }
c906108c
SS
896 }
897
9b409511 898 return TARGET_XFER_EOF; /* We can't help. */
c906108c 899}
348f8c02 900
70221824 901static struct target_section_table *
07b82ea5 902exec_get_section_table (struct target_ops *ops)
348f8c02 903{
07b82ea5 904 return current_target_sections;
348f8c02
PA
905}
906
9b409511 907static enum target_xfer_status
07b82ea5
PA
908exec_xfer_partial (struct target_ops *ops, enum target_object object,
909 const char *annex, gdb_byte *readbuf,
910 const gdb_byte *writebuf,
9b409511 911 ULONGEST offset, ULONGEST len, ULONGEST *xfered_len)
348f8c02 912{
07b82ea5
PA
913 struct target_section_table *table = target_get_section_table (ops);
914
915 if (object == TARGET_OBJECT_MEMORY)
916 return section_table_xfer_memory_partial (readbuf, writebuf,
9b409511 917 offset, len, xfered_len,
07b82ea5
PA
918 table->sections,
919 table->sections_end,
920 NULL);
921 else
2ed4b548 922 return TARGET_XFER_E_IO;
348f8c02 923}
c906108c 924\f
c5aa993b 925
c906108c 926void
07b82ea5 927print_section_info (struct target_section_table *t, bfd *abfd)
c906108c 928{
5af949e3 929 struct gdbarch *gdbarch = gdbarch_from_bfd (abfd);
0542c86d 930 struct target_section *p;
17a912b6 931 /* FIXME: 16 is not wide enough when gdbarch_addr_bit > 64. */
5af949e3 932 int wid = gdbarch_addr_bit (gdbarch) <= 32 ? 8 : 16;
c906108c 933
c5aa993b 934 printf_filtered ("\t`%s', ", bfd_get_filename (abfd));
c906108c 935 wrap_here (" ");
a3f17187 936 printf_filtered (_("file type %s.\n"), bfd_get_target (abfd));
c906108c 937 if (abfd == exec_bfd)
51bee8e9 938 {
3e43a32a
MS
939 /* gcc-3.4 does not like the initialization in
940 <p == t->sections_end>. */
d904de5b 941 bfd_vma displacement = 0;
2f1bdd26 942 bfd_vma entry_point;
51bee8e9
JK
943
944 for (p = t->sections; p < t->sections_end; p++)
945 {
2b2848e2
DE
946 struct bfd_section *psect = p->the_bfd_section;
947 bfd *pbfd = psect->owner;
51bee8e9 948
2b2848e2 949 if ((bfd_get_section_flags (pbfd, psect) & (SEC_ALLOC | SEC_LOAD))
51bee8e9
JK
950 != (SEC_ALLOC | SEC_LOAD))
951 continue;
952
2b2848e2
DE
953 if (bfd_get_section_vma (pbfd, psect) <= abfd->start_address
954 && abfd->start_address < (bfd_get_section_vma (pbfd, psect)
955 + bfd_get_section_size (psect)))
51bee8e9 956 {
2b2848e2 957 displacement = p->addr - bfd_get_section_vma (pbfd, psect);
51bee8e9
JK
958 break;
959 }
960 }
961 if (p == t->sections_end)
b37520b6 962 warning (_("Cannot find section for the entry point of %s."),
d904de5b 963 bfd_get_filename (abfd));
51bee8e9 964
2f1bdd26
MGD
965 entry_point = gdbarch_addr_bits_remove (gdbarch,
966 bfd_get_start_address (abfd)
967 + displacement);
51bee8e9 968 printf_filtered (_("\tEntry point: %s\n"),
2f1bdd26 969 paddress (gdbarch, entry_point));
51bee8e9 970 }
07b82ea5 971 for (p = t->sections; p < t->sections_end; p++)
c906108c 972 {
2b2848e2
DE
973 struct bfd_section *psect = p->the_bfd_section;
974 bfd *pbfd = psect->owner;
975
bb599908
PH
976 printf_filtered ("\t%s", hex_string_custom (p->addr, wid));
977 printf_filtered (" - %s", hex_string_custom (p->endaddr, wid));
bcf16802
KB
978
979 /* FIXME: A format of "08l" is not wide enough for file offsets
980 larger than 4GB. OTOH, making it "016l" isn't desirable either
981 since most output will then be much wider than necessary. It
982 may make sense to test the size of the file and choose the
983 format string accordingly. */
a3f17187 984 /* FIXME: i18n: Need to rewrite this sentence. */
c906108c
SS
985 if (info_verbose)
986 printf_filtered (" @ %s",
2b2848e2
DE
987 hex_string_custom (psect->filepos, 8));
988 printf_filtered (" is %s", bfd_section_name (pbfd, psect));
989 if (pbfd != abfd)
990 printf_filtered (" in %s", bfd_get_filename (pbfd));
c906108c
SS
991 printf_filtered ("\n");
992 }
993}
994
995static void
fba45db2 996exec_files_info (struct target_ops *t)
c906108c 997{
57008375
JK
998 if (exec_bfd)
999 print_section_info (current_target_sections, exec_bfd);
1000 else
1001 puts_filtered (_("\t<no file loaded>\n"));
c906108c
SS
1002}
1003
1004static void
fba45db2 1005set_section_command (char *args, int from_tty)
c906108c 1006{
0542c86d 1007 struct target_section *p;
c906108c
SS
1008 char *secname;
1009 unsigned seclen;
1010 unsigned long secaddr;
1011 char secprint[100];
1012 long offset;
07b82ea5 1013 struct target_section_table *table;
c906108c
SS
1014
1015 if (args == 0)
8a3fe4f8 1016 error (_("Must specify section name and its virtual address"));
c906108c 1017
0963b4bd 1018 /* Parse out section name. */
c5aa993b 1019 for (secname = args; !isspace (*args); args++);
c906108c
SS
1020 seclen = args - secname;
1021
0963b4bd 1022 /* Parse out new virtual address. */
c906108c
SS
1023 secaddr = parse_and_eval_address (args);
1024
07b82ea5
PA
1025 table = current_target_sections;
1026 for (p = table->sections; p < table->sections_end; p++)
c5aa993b 1027 {
57008375 1028 if (!strncmp (secname, bfd_section_name (p->bfd,
3e43a32a 1029 p->the_bfd_section), seclen)
57008375 1030 && bfd_section_name (p->bfd, p->the_bfd_section)[seclen] == '\0')
c5aa993b
JM
1031 {
1032 offset = secaddr - p->addr;
1033 p->addr += offset;
1034 p->endaddr += offset;
1035 if (from_tty)
1036 exec_files_info (&exec_ops);
1037 return;
1038 }
c906108c 1039 }
c906108c
SS
1040 if (seclen >= sizeof (secprint))
1041 seclen = sizeof (secprint) - 1;
1042 strncpy (secprint, secname, seclen);
1043 secprint[seclen] = '\0';
8a3fe4f8 1044 error (_("Section %s not found"), secprint);
c906108c
SS
1045}
1046
30510692
DJ
1047/* If we can find a section in FILENAME with BFD index INDEX, adjust
1048 it to ADDRESS. */
c1bd25fd
DJ
1049
1050void
1051exec_set_section_address (const char *filename, int index, CORE_ADDR address)
1052{
0542c86d 1053 struct target_section *p;
07b82ea5 1054 struct target_section_table *table;
c1bd25fd 1055
07b82ea5
PA
1056 table = current_target_sections;
1057 for (p = table->sections; p < table->sections_end; p++)
c1bd25fd 1058 {
2b2848e2 1059 if (filename_cmp (filename, p->the_bfd_section->owner->filename) == 0
30510692 1060 && index == p->the_bfd_section->index)
c1bd25fd 1061 {
30510692 1062 p->endaddr += address - p->addr;
c1bd25fd 1063 p->addr = address;
c1bd25fd
DJ
1064 }
1065 }
1066}
1067
c906108c
SS
1068/* If mourn is being called in all the right places, this could be say
1069 `gdb internal error' (since generic_mourn calls
1070 breakpoint_init_inferior). */
1071
1072static int
3db08215
MM
1073ignore (struct target_ops *ops, struct gdbarch *gdbarch,
1074 struct bp_target_info *bp_tgt)
c906108c
SS
1075{
1076 return 0;
1077}
1078
73971819
PA
1079/* Implement the to_remove_breakpoint method. */
1080
1081static int
1082exec_remove_breakpoint (struct target_ops *ops, struct gdbarch *gdbarch,
1083 struct bp_target_info *bp_tgt,
1084 enum remove_bp_reason reason)
1085{
1086 return 0;
1087}
1088
c35b1492
PA
1089static int
1090exec_has_memory (struct target_ops *ops)
1091{
1092 /* We can provide memory if we have any file/target sections to read
1093 from. */
1094 return (current_target_sections->sections
1095 != current_target_sections->sections_end);
1096}
1097
83814951
TT
1098static char *
1099exec_make_note_section (struct target_ops *self, bfd *obfd, int *note_size)
1100{
1101 error (_("Can't create a corefile"));
1102}
be4d1333 1103
c906108c
SS
1104/* Fill in the exec file target vector. Very few entries need to be
1105 defined. */
1106
be4d1333 1107static void
fba45db2 1108init_exec_ops (void)
c906108c
SS
1109{
1110 exec_ops.to_shortname = "exec";
1111 exec_ops.to_longname = "Local exec file";
1112 exec_ops.to_doc = "Use an executable file as a target.\n\
1113Specify the filename of the executable file.";
1adeb98a 1114 exec_ops.to_open = exec_open;
6c95b8df 1115 exec_ops.to_close = exec_close_1;
07b82ea5
PA
1116 exec_ops.to_xfer_partial = exec_xfer_partial;
1117 exec_ops.to_get_section_table = exec_get_section_table;
c906108c
SS
1118 exec_ops.to_files_info = exec_files_info;
1119 exec_ops.to_insert_breakpoint = ignore;
73971819 1120 exec_ops.to_remove_breakpoint = exec_remove_breakpoint;
c906108c 1121 exec_ops.to_stratum = file_stratum;
c35b1492 1122 exec_ops.to_has_memory = exec_has_memory;
be4d1333 1123 exec_ops.to_make_corefile_notes = exec_make_note_section;
b427c1bc 1124 exec_ops.to_find_memory_regions = objfile_find_memory_regions;
c5aa993b 1125 exec_ops.to_magic = OPS_MAGIC;
c906108c
SS
1126}
1127
1128void
fba45db2 1129_initialize_exec (void)
c906108c
SS
1130{
1131 struct cmd_list_element *c;
1132
1133 init_exec_ops ();
1134
1135 if (!dbx_commands)
1136 {
1a966eab
AC
1137 c = add_cmd ("file", class_files, file_command, _("\
1138Use FILE as program to be debugged.\n\
c906108c
SS
1139It is read for its symbols, for getting the contents of pure memory,\n\
1140and it is the program executed when you use the `run' command.\n\
1141If FILE cannot be found as specified, your execution directory path\n\
1142($PATH) is searched for a command of that name.\n\
1a966eab 1143No arg means to have no executable file and no symbols."), &cmdlist);
5ba2abeb 1144 set_cmd_completer (c, filename_completer);
c906108c
SS
1145 }
1146
1a966eab
AC
1147 c = add_cmd ("exec-file", class_files, exec_file_command, _("\
1148Use FILE as program for getting contents of pure memory.\n\
c906108c
SS
1149If FILE cannot be found as specified, your execution directory path\n\
1150is searched for a command of that name.\n\
1a966eab 1151No arg means have no executable file."), &cmdlist);
5ba2abeb 1152 set_cmd_completer (c, filename_completer);
c906108c 1153
1bedd215
AC
1154 add_com ("section", class_files, set_section_command, _("\
1155Change the base address of section SECTION of the exec file to ADDR.\n\
c906108c
SS
1156This can be used if the exec file does not contain section addresses,\n\
1157(such as in the a.out format), or when the addresses specified in the\n\
1158file itself are wrong. Each section must be changed separately. The\n\
1bedd215 1159``info files'' command lists all the sections and their addresses."));
c906108c 1160
5bf193a2
AC
1161 add_setshow_boolean_cmd ("write", class_support, &write_files, _("\
1162Set writing into executable and core files."), _("\
1163Show writing into executable and core files."), NULL,
1164 NULL,
920d2a44 1165 show_write_files,
5bf193a2 1166 &setlist, &showlist);
c5aa993b 1167
9852c492 1168 add_target_with_completer (&exec_ops, filename_completer);
c906108c 1169}
This page took 1.31018 seconds and 4 git commands to generate.