Move some declarations to source.h
[deliverable/binutils-gdb.git] / gdb / exec.c
CommitLineData
c906108c 1/* Work with executable files, for GDB.
4646aa9d 2
e2882c85 3 Copyright (C) 1988-2018 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "frame.h"
22#include "inferior.h"
23#include "target.h"
24#include "gdbcmd.h"
25#include "language.h"
0ba1096a 26#include "filenames.h"
c906108c
SS
27#include "symfile.h"
28#include "objfiles.h"
c5f0f3d0 29#include "completer.h"
fd0407d6 30#include "value.h"
4646aa9d 31#include "exec.h"
ea53e89f 32#include "observer.h"
dacec2a8 33#include "arch-utils.h"
6c95b8df
PA
34#include "gdbthread.h"
35#include "progspace.h"
cbb099e8 36#include "gdb_bfd.h"
b427c1bc 37#include "gcore.h"
b46a8d7c 38#include "source.h"
c906108c 39
c906108c 40#include <fcntl.h>
dbda9972 41#include "readline/readline.h"
c906108c
SS
42#include "gdbcore.h"
43
44#include <ctype.h>
53ce3c39 45#include <sys/stat.h>
a9a5a3d1 46#include "solist.h"
325fac50 47#include <algorithm>
c906108c 48
1d8b34a7 49void (*deprecated_file_changed_hook) (const char *);
c906108c
SS
50
51/* Prototypes for local functions */
52
a14ed312 53static void exec_files_info (struct target_ops *);
c906108c 54
a14ed312 55static void init_exec_ops (void);
c906108c 56
c906108c
SS
57/* The target vector for executable files. */
58
e8b2341c 59static struct target_ops exec_ops;
c906108c 60
c906108c
SS
61/* Whether to open exec and core files read-only or read-write. */
62
63int write_files = 0;
920d2a44
AC
64static void
65show_write_files (struct ui_file *file, int from_tty,
66 struct cmd_list_element *c, const char *value)
67{
68 fprintf_filtered (file, _("Writing into executable and core files is %s.\n"),
69 value);
70}
71
c906108c 72
4c42eaff 73static void
014f9477 74exec_open (const char *args, int from_tty)
1adeb98a
FN
75{
76 target_preopen (from_tty);
77 exec_file_attach (args, from_tty);
78}
79
07b82ea5
PA
80/* Close and clear exec_bfd. If we end up with no target sections to
81 read memory from, this unpushes the exec_ops target. */
82
6c95b8df
PA
83void
84exec_close (void)
07b82ea5
PA
85{
86 if (exec_bfd)
87 {
88 bfd *abfd = exec_bfd;
07b82ea5 89
cbb099e8 90 gdb_bfd_unref (abfd);
07b82ea5
PA
91
92 /* Removing target sections may close the exec_ops target.
93 Clear exec_bfd before doing so to prevent recursion. */
94 exec_bfd = NULL;
95 exec_bfd_mtime = 0;
96
046ac79f 97 remove_target_sections (&exec_bfd);
1f0c4988
JK
98
99 xfree (exec_filename);
100 exec_filename = NULL;
07b82ea5
PA
101 }
102}
103
6c95b8df
PA
104/* This is the target_close implementation. Clears all target
105 sections and closes all executable bfds from all program spaces. */
106
c906108c 107static void
de90e03d 108exec_close_1 (struct target_ops *self)
c906108c 109{
ab16fce8 110 struct program_space *ss;
5ed8105e 111 scoped_restore_current_program_space restore_pspace;
6c95b8df 112
ab16fce8 113 ALL_PSPACES (ss)
5ed8105e
PA
114 {
115 set_current_program_space (ss);
116 clear_section_table (current_target_sections);
117 exec_close ();
118 }
c906108c
SS
119}
120
1adeb98a
FN
121void
122exec_file_clear (int from_tty)
123{
124 /* Remove exec file. */
6c95b8df 125 exec_close ();
1adeb98a
FN
126
127 if (from_tty)
a3f17187 128 printf_unfiltered (_("No executable file now.\n"));
1adeb98a
FN
129}
130
ecf45d2c 131/* See exec.h. */
a10de604
GB
132
133void
ecf45d2c
SL
134try_open_exec_file (const char *exec_file_host, struct inferior *inf,
135 symfile_add_flags add_flags)
a10de604 136{
88178e82 137 struct cleanup *old_chain;
57d1de9c 138 struct gdb_exception prev_err = exception_none;
a10de604 139
ecf45d2c 140 old_chain = make_cleanup (free_current_contents, &prev_err.message);
57d1de9c
LM
141
142 /* exec_file_attach and symbol_file_add_main may throw an error if the file
143 cannot be opened either locally or remotely.
144
145 This happens for example, when the file is first found in the local
146 sysroot (above), and then disappears (a TOCTOU race), or when it doesn't
147 exist in the target filesystem, or when the file does exist, but
148 is not readable.
88178e82 149
57d1de9c
LM
150 Even without a symbol file, the remote-based debugging session should
151 continue normally instead of ending abruptly. Hence we catch thrown
152 errors/exceptions in the following code. */
153 TRY
154 {
ecf45d2c
SL
155 /* We must do this step even if exec_file_host is NULL, so that
156 exec_file_attach will clear state. */
157 exec_file_attach (exec_file_host, add_flags & SYMFILE_VERBOSE);
57d1de9c
LM
158 }
159 CATCH (err, RETURN_MASK_ERROR)
160 {
161 if (err.message != NULL)
162 warning ("%s", err.message);
163
164 prev_err = err;
165
166 /* Save message so it doesn't get trashed by the catch below. */
b5e1db87
LM
167 if (err.message != NULL)
168 prev_err.message = xstrdup (err.message);
57d1de9c
LM
169 }
170 END_CATCH
171
ecf45d2c 172 if (exec_file_host != NULL)
57d1de9c 173 {
ecf45d2c
SL
174 TRY
175 {
176 symbol_file_add_main (exec_file_host, add_flags);
177 }
178 CATCH (err, RETURN_MASK_ERROR)
179 {
180 if (!exception_print_same (prev_err, err))
181 warning ("%s", err.message);
182 }
183 END_CATCH
57d1de9c 184 }
ecf45d2c
SL
185
186 do_cleanups (old_chain);
187}
188
189/* See gdbcore.h. */
190
191void
192exec_file_locate_attach (int pid, int defer_bp_reset, int from_tty)
193{
797bc1cb 194 char *exec_file_target;
ecf45d2c
SL
195 symfile_add_flags add_flags = 0;
196
197 /* Do nothing if we already have an executable filename. */
198 if (get_exec_file (0) != NULL)
199 return;
200
201 /* Try to determine a filename from the process itself. */
202 exec_file_target = target_pid_to_exec_file (pid);
203 if (exec_file_target == NULL)
57d1de9c 204 {
ecf45d2c
SL
205 warning (_("No executable has been specified and target does not "
206 "support\n"
207 "determining executable automatically. "
208 "Try using the \"file\" command."));
209 return;
57d1de9c 210 }
88178e82 211
797bc1cb
TT
212 gdb::unique_xmalloc_ptr<char> exec_file_host
213 = exec_file_find (exec_file_target, NULL);
ecf45d2c
SL
214
215 if (defer_bp_reset)
216 add_flags |= SYMFILE_DEFER_BP_RESET;
217
218 if (from_tty)
219 add_flags |= SYMFILE_VERBOSE;
220
221 /* Attempt to open the exec file. */
797bc1cb 222 try_open_exec_file (exec_file_host.get (), current_inferior (), add_flags);
a10de604
GB
223}
224
907083d1 225/* Set FILENAME as the new exec file.
c906108c 226
c5aa993b
JM
227 This function is intended to be behave essentially the same
228 as exec_file_command, except that the latter will detect when
229 a target is being debugged, and will ask the user whether it
230 should be shut down first. (If the answer is "no", then the
231 new file is ignored.)
c906108c 232
c5aa993b
JM
233 This file is used by exec_file_command, to do the work of opening
234 and processing the exec file after any prompting has happened.
c906108c 235
c5aa993b
JM
236 And, it is used by child_attach, when the attach command was
237 given a pid but not a exec pathname, and the attach command could
238 figure out the pathname from the pid. (In this case, we shouldn't
239 ask the user whether the current target should be shut down --
907083d1 240 we're supplying the exec pathname late for good reason.) */
c906108c
SS
241
242void
5f08566b 243exec_file_attach (const char *filename, int from_tty)
c906108c 244{
9b333ba3
TT
245 /* First, acquire a reference to the current exec_bfd. We release
246 this at the end of the function; but acquiring it now lets the
247 BFD cache return it if this call refers to the same file. */
2712ce2e 248 gdb_bfd_ref_ptr exec_bfd_holder = new_bfd_ref (exec_bfd);
192b62ce 249
c906108c 250 /* Remove any previous exec file. */
6c95b8df 251 exec_close ();
c906108c
SS
252
253 /* Now open and digest the file the user requested, if any. */
254
1adeb98a
FN
255 if (!filename)
256 {
257 if (from_tty)
a3f17187 258 printf_unfiltered (_("No executable file now.\n"));
7a107747
DJ
259
260 set_gdbarch_from_file (NULL);
1adeb98a
FN
261 }
262 else
c906108c 263 {
64c0b5de 264 int load_via_target = 0;
14278e1f 265 const char *scratch_pathname, *canonical_pathname;
c906108c 266 int scratch_chan;
07b82ea5 267 struct target_section *sections = NULL, *sections_end = NULL;
d18b8b7a 268 char **matching;
c5aa993b 269
64c0b5de
GB
270 if (is_target_filename (filename))
271 {
272 if (target_filesystem_is_local ())
273 filename += strlen (TARGET_SYSROOT_PREFIX);
274 else
275 load_via_target = 1;
276 }
277
14278e1f 278 gdb::unique_xmalloc_ptr<char> canonical_storage, scratch_storage;
64c0b5de 279 if (load_via_target)
c5aa993b 280 {
64c0b5de
GB
281 /* gdb_bfd_fopen does not support "target:" filenames. */
282 if (write_files)
283 warning (_("writing into executable files is "
284 "not supported for %s sysroots"),
285 TARGET_SYSROOT_PREFIX);
286
14278e1f 287 scratch_pathname = filename;
64c0b5de 288 scratch_chan = -1;
64c0b5de 289 canonical_pathname = scratch_pathname;
c5aa993b 290 }
64c0b5de
GB
291 else
292 {
14278e1f
TT
293 char *temp_pathname;
294
64c0b5de
GB
295 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
296 filename, write_files ?
297 O_RDWR | O_BINARY : O_RDONLY | O_BINARY,
14278e1f 298 &temp_pathname);
64c0b5de
GB
299#if defined(__GO32__) || defined(_WIN32) || defined(__CYGWIN__)
300 if (scratch_chan < 0)
301 {
0ae1c716 302 char *exename = (char *) alloca (strlen (filename) + 5);
64c0b5de
GB
303
304 strcat (strcpy (exename, filename), ".exe");
305 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
306 exename, write_files ?
307 O_RDWR | O_BINARY
308 : O_RDONLY | O_BINARY,
14278e1f 309 &temp_pathname);
64c0b5de 310 }
c906108c 311#endif
64c0b5de
GB
312 if (scratch_chan < 0)
313 perror_with_name (filename);
a4453b7e 314
14278e1f
TT
315 scratch_storage.reset (temp_pathname);
316 scratch_pathname = temp_pathname;
a4453b7e 317
64c0b5de
GB
318 /* gdb_bfd_open (and its variants) prefers canonicalized
319 pathname for better BFD caching. */
14278e1f
TT
320 canonical_storage = gdb_realpath (scratch_pathname);
321 canonical_pathname = canonical_storage.get ();
64c0b5de 322 }
1f0c4988 323
192b62ce 324 gdb_bfd_ref_ptr temp;
64c0b5de 325 if (write_files && !load_via_target)
192b62ce
TT
326 temp = gdb_bfd_fopen (canonical_pathname, gnutarget,
327 FOPEN_RUB, scratch_chan);
1c00ec6b 328 else
192b62ce
TT
329 temp = gdb_bfd_open (canonical_pathname, gnutarget, scratch_chan);
330 exec_bfd = temp.release ();
c906108c
SS
331
332 if (!exec_bfd)
9fe4a216 333 {
d5131498 334 error (_("\"%s\": could not open as an executable file: %s."),
9fe4a216
TT
335 scratch_pathname, bfd_errmsg (bfd_get_error ()));
336 }
c906108c 337
64c0b5de
GB
338 /* gdb_realpath_keepfile resolves symlinks on the local
339 filesystem and so cannot be used for "target:" files. */
1f0c4988 340 gdb_assert (exec_filename == NULL);
64c0b5de
GB
341 if (load_via_target)
342 exec_filename = xstrdup (bfd_get_filename (exec_bfd));
343 else
4971c9a7 344 exec_filename = gdb_realpath_keepfile (scratch_pathname).release ();
1f0c4988 345
d18b8b7a 346 if (!bfd_check_format_matches (exec_bfd, bfd_object, &matching))
c906108c
SS
347 {
348 /* Make sure to close exec_bfd, or else "run" might try to use
349 it. */
6c95b8df 350 exec_close ();
8a3fe4f8 351 error (_("\"%s\": not in executable format: %s"),
d18b8b7a
HZ
352 scratch_pathname,
353 gdb_bfd_errmsg (bfd_get_error (), matching));
c906108c
SS
354 }
355
07b82ea5 356 if (build_section_table (exec_bfd, &sections, &sections_end))
c906108c
SS
357 {
358 /* Make sure to close exec_bfd, or else "run" might try to use
359 it. */
6c95b8df 360 exec_close ();
8a3fe4f8 361 error (_("\"%s\": can't find the file sections: %s"),
c906108c
SS
362 scratch_pathname, bfd_errmsg (bfd_get_error ()));
363 }
364
c04ea773
DJ
365 exec_bfd_mtime = bfd_get_mtime (exec_bfd);
366
c906108c
SS
367 validate_files ();
368
369 set_gdbarch_from_file (exec_bfd);
370
07b82ea5 371 /* Add the executable's sections to the current address spaces'
6c95b8df
PA
372 list of sections. This possibly pushes the exec_ops
373 target. */
ed9eebaf 374 add_target_sections (&exec_bfd, sections, sections_end);
07b82ea5 375 xfree (sections);
c906108c
SS
376
377 /* Tell display code (if any) about the changed file name. */
9a4105ab
AC
378 if (deprecated_exec_file_display_hook)
379 (*deprecated_exec_file_display_hook) (filename);
c906108c 380 }
9b333ba3 381
ce7d4522 382 bfd_cache_close_all ();
781b42b0 383 observer_notify_executable_changed ();
c906108c
SS
384}
385
386/* Process the first arg in ARGS as the new exec file.
387
c5aa993b
JM
388 Note that we have to explicitly ignore additional args, since we can
389 be called from file_command(), which also calls symbol_file_command()
1adeb98a
FN
390 which can take multiple args.
391
0963b4bd 392 If ARGS is NULL, we just want to close the exec file. */
c906108c 393
1adeb98a 394static void
1d8b34a7 395exec_file_command (const char *args, int from_tty)
c906108c 396{
4c42eaff
DJ
397 if (from_tty && target_has_execution
398 && !query (_("A program is being debugged already.\n"
399 "Are you sure you want to change the file? ")))
400 error (_("File not changed."));
1adeb98a
FN
401
402 if (args)
403 {
404 /* Scan through the args and pick up the first non option arg
405 as the filename. */
406
773a1edc
TT
407 gdb_argv built_argv (args);
408 char **argv = built_argv.get ();
1adeb98a
FN
409
410 for (; (*argv != NULL) && (**argv == '-'); argv++)
411 {;
412 }
413 if (*argv == NULL)
8a3fe4f8 414 error (_("No executable file name was specified"));
1adeb98a 415
773a1edc
TT
416 gdb::unique_xmalloc_ptr<char> filename (tilde_expand (*argv));
417 exec_file_attach (filename.get (), from_tty);
1adeb98a
FN
418 }
419 else
420 exec_file_attach (NULL, from_tty);
c906108c
SS
421}
422
0963b4bd 423/* Set both the exec file and the symbol file, in one command.
c906108c
SS
424 What a novelty. Why did GDB go through four major releases before this
425 command was added? */
426
427static void
1d8b34a7 428file_command (const char *arg, int from_tty)
c906108c
SS
429{
430 /* FIXME, if we lose on reading the symbol file, we should revert
431 the exec file, but that's rough. */
432 exec_file_command (arg, from_tty);
433 symbol_file_command (arg, from_tty);
9a4105ab
AC
434 if (deprecated_file_changed_hook)
435 deprecated_file_changed_hook (arg);
c906108c 436}
c906108c 437\f
c5aa993b 438
0963b4bd 439/* Locate all mappable sections of a BFD file.
c906108c
SS
440 table_pp_char is a char * to get it through bfd_map_over_sections;
441 we cast it back to its proper type. */
442
443static void
7be0c536
AC
444add_to_section_table (bfd *abfd, struct bfd_section *asect,
445 void *table_pp_char)
c906108c 446{
0542c86d 447 struct target_section **table_pp = (struct target_section **) table_pp_char;
c906108c
SS
448 flagword aflag;
449
2b2848e2
DE
450 gdb_assert (abfd == asect->owner);
451
0f5d55d8
JB
452 /* Check the section flags, but do not discard zero-length sections, since
453 some symbols may still be attached to this section. For instance, we
454 encountered on sparc-solaris 2.10 a shared library with an empty .bss
455 section to which a symbol named "_end" was attached. The address
456 of this symbol still needs to be relocated. */
c906108c
SS
457 aflag = bfd_get_section_flags (abfd, asect);
458 if (!(aflag & SEC_ALLOC))
459 return;
0f5d55d8 460
046ac79f 461 (*table_pp)->owner = NULL;
c906108c
SS
462 (*table_pp)->the_bfd_section = asect;
463 (*table_pp)->addr = bfd_section_vma (abfd, asect);
464 (*table_pp)->endaddr = (*table_pp)->addr + bfd_section_size (abfd, asect);
465 (*table_pp)++;
466}
467
a5b1fd27
DE
468/* See exec.h. */
469
470void
471clear_section_table (struct target_section_table *table)
472{
473 xfree (table->sections);
474 table->sections = table->sections_end = NULL;
475}
476
477/* Resize section table TABLE by ADJUSTMENT.
478 ADJUSTMENT may be negative, in which case the caller must have already
479 removed the sections being deleted.
480 Returns the old size. */
481
482static int
483resize_section_table (struct target_section_table *table, int adjustment)
07b82ea5 484{
07b82ea5
PA
485 int old_count;
486 int new_count;
487
07b82ea5
PA
488 old_count = table->sections_end - table->sections;
489
a5b1fd27 490 new_count = adjustment + old_count;
07b82ea5
PA
491
492 if (new_count)
493 {
224c3ddb
SM
494 table->sections = XRESIZEVEC (struct target_section, table->sections,
495 new_count);
07b82ea5
PA
496 table->sections_end = table->sections + new_count;
497 }
498 else
a5b1fd27 499 clear_section_table (table);
07b82ea5
PA
500
501 return old_count;
502}
503
c906108c
SS
504/* Builds a section table, given args BFD, SECTABLE_PTR, SECEND_PTR.
505 Returns 0 if OK, 1 on error. */
506
507int
0542c86d
PA
508build_section_table (struct bfd *some_bfd, struct target_section **start,
509 struct target_section **end)
c906108c
SS
510{
511 unsigned count;
512
513 count = bfd_count_sections (some_bfd);
514 if (*start)
b8c9b27d 515 xfree (* start);
8d749320 516 *start = XNEWVEC (struct target_section, count);
c906108c 517 *end = *start;
c5aa993b 518 bfd_map_over_sections (some_bfd, add_to_section_table, (char *) end);
c906108c 519 if (*end > *start + count)
3e43a32a
MS
520 internal_error (__FILE__, __LINE__,
521 _("failed internal consistency check"));
c906108c
SS
522 /* We could realloc the table, but it probably loses for most files. */
523 return 0;
524}
07b82ea5
PA
525
526/* Add the sections array defined by [SECTIONS..SECTIONS_END[ to the
527 current set of target sections. */
528
529void
046ac79f 530add_target_sections (void *owner,
ed9eebaf 531 struct target_section *sections,
07b82ea5
PA
532 struct target_section *sections_end)
533{
534 int count;
535 struct target_section_table *table = current_target_sections;
536
537 count = sections_end - sections;
538
539 if (count > 0)
540 {
541 int space = resize_section_table (table, count);
ed9eebaf 542 int i;
d7f9d729 543
ed9eebaf
TT
544 for (i = 0; i < count; ++i)
545 {
546 table->sections[space + i] = sections[i];
046ac79f 547 table->sections[space + i].owner = owner;
ed9eebaf 548 }
07b82ea5
PA
549
550 /* If these are the first file sections we can provide memory
551 from, push the file_stratum target. */
ab16fce8
TT
552 if (!target_is_pushed (&exec_ops))
553 push_target (&exec_ops);
07b82ea5
PA
554 }
555}
556
76ad5e1e
NB
557/* Add the sections of OBJFILE to the current set of target sections. */
558
559void
560add_target_sections_of_objfile (struct objfile *objfile)
561{
562 struct target_section_table *table = current_target_sections;
563 struct obj_section *osect;
564 int space;
565 unsigned count = 0;
566 struct target_section *ts;
567
568 if (objfile == NULL)
569 return;
570
571 /* Compute the number of sections to add. */
572 ALL_OBJFILE_OSECTIONS (objfile, osect)
573 {
574 if (bfd_get_section_size (osect->the_bfd_section) == 0)
575 continue;
576 count++;
577 }
578
579 if (count == 0)
580 return;
581
582 space = resize_section_table (table, count);
583
584 ts = table->sections + space;
585
586 ALL_OBJFILE_OSECTIONS (objfile, osect)
587 {
588 if (bfd_get_section_size (osect->the_bfd_section) == 0)
589 continue;
590
591 gdb_assert (ts < table->sections + space + count);
592
593 ts->addr = obj_section_addr (osect);
594 ts->endaddr = obj_section_endaddr (osect);
595 ts->the_bfd_section = osect->the_bfd_section;
596 ts->owner = (void *) objfile;
597
598 ts++;
599 }
600}
601
046ac79f
JK
602/* Remove all target sections owned by OWNER.
603 OWNER must be the same value passed to add_target_sections. */
07b82ea5
PA
604
605void
046ac79f 606remove_target_sections (void *owner)
07b82ea5
PA
607{
608 struct target_section *src, *dest;
07b82ea5
PA
609 struct target_section_table *table = current_target_sections;
610
046ac79f
JK
611 gdb_assert (owner != NULL);
612
07b82ea5
PA
613 dest = table->sections;
614 for (src = table->sections; src < table->sections_end; src++)
046ac79f 615 if (src->owner != owner)
07b82ea5
PA
616 {
617 /* Keep this section. */
618 if (dest < src)
619 *dest = *src;
620 dest++;
621 }
622
623 /* If we've dropped any sections, resize the section table. */
624 if (dest < src)
625 {
626 int old_count;
627
628 old_count = resize_section_table (table, dest - src);
629
630 /* If we don't have any more sections to read memory from,
631 remove the file_stratum target from the stack. */
632 if (old_count + (dest - src) == 0)
6c95b8df
PA
633 {
634 struct program_space *pspace;
635
636 ALL_PSPACES (pspace)
637 if (pspace->target_sections.sections
638 != pspace->target_sections.sections_end)
639 return;
640
641 unpush_target (&exec_ops);
642 }
07b82ea5
PA
643 }
644}
645
c906108c 646\f
348f8c02 647
1ca49d37
YQ
648enum target_xfer_status
649exec_read_partial_read_only (gdb_byte *readbuf, ULONGEST offset,
650 ULONGEST len, ULONGEST *xfered_len)
651{
652 /* It's unduly pedantic to refuse to look at the executable for
653 read-only pieces; so do the equivalent of readonly regions aka
654 QTro packet. */
655 if (exec_bfd != NULL)
656 {
657 asection *s;
658 bfd_size_type size;
659 bfd_vma vma;
660
661 for (s = exec_bfd->sections; s; s = s->next)
662 {
663 if ((s->flags & SEC_LOAD) == 0
664 || (s->flags & SEC_READONLY) == 0)
665 continue;
666
667 vma = s->vma;
668 size = bfd_get_section_size (s);
669 if (vma <= offset && offset < (vma + size))
670 {
671 ULONGEST amt;
672
673 amt = (vma + size) - offset;
674 if (amt > len)
675 amt = len;
676
677 amt = bfd_get_section_contents (exec_bfd, s,
678 readbuf, offset - vma, amt);
679
680 if (amt == 0)
681 return TARGET_XFER_EOF;
682 else
683 {
684 *xfered_len = amt;
685 return TARGET_XFER_OK;
686 }
687 }
688 }
689 }
690
691 /* Indicate failure to find the requested memory block. */
692 return TARGET_XFER_E_IO;
693}
694
a79b1bc6 695/* Return all read-only memory ranges found in the target section
5a2eb0ef 696 table defined by SECTIONS and SECTIONS_END, starting at (and
a79b1bc6 697 intersected with) MEMADDR for LEN bytes. */
5a2eb0ef 698
a79b1bc6
SM
699static std::vector<mem_range>
700section_table_available_memory (CORE_ADDR memaddr, ULONGEST len,
e6ca34fc
PA
701 struct target_section *sections,
702 struct target_section *sections_end)
703{
a79b1bc6 704 std::vector<mem_range> memory;
e6ca34fc 705
a79b1bc6 706 for (target_section *p = sections; p < sections_end; p++)
e6ca34fc 707 {
2b2848e2
DE
708 if ((bfd_get_section_flags (p->the_bfd_section->owner,
709 p->the_bfd_section)
e6ca34fc
PA
710 & SEC_READONLY) == 0)
711 continue;
712
713 /* Copy the meta-data, adjusted. */
714 if (mem_ranges_overlap (p->addr, p->endaddr - p->addr, memaddr, len))
715 {
716 ULONGEST lo1, hi1, lo2, hi2;
e6ca34fc
PA
717
718 lo1 = memaddr;
719 hi1 = memaddr + len;
720
721 lo2 = p->addr;
722 hi2 = p->endaddr;
723
a79b1bc6
SM
724 CORE_ADDR start = std::max (lo1, lo2);
725 int length = std::min (hi1, hi2) - start;
e6ca34fc 726
a79b1bc6 727 memory.emplace_back (start, length);
e6ca34fc
PA
728 }
729 }
730
731 return memory;
732}
733
1ee79381
YQ
734enum target_xfer_status
735section_table_read_available_memory (gdb_byte *readbuf, ULONGEST offset,
736 ULONGEST len, ULONGEST *xfered_len)
737{
a79b1bc6
SM
738 target_section_table *table = target_get_section_table (&exec_ops);
739 std::vector<mem_range> available_memory
740 = section_table_available_memory (offset, len,
741 table->sections, table->sections_end);
1ee79381 742
a79b1bc6 743 normalize_mem_ranges (&available_memory);
1ee79381 744
a79b1bc6 745 for (const mem_range &r : available_memory)
1ee79381 746 {
a79b1bc6 747 if (mem_ranges_overlap (r.start, r.length, offset, len))
1ee79381
YQ
748 {
749 CORE_ADDR end;
750 enum target_xfer_status status;
751
752 /* Get the intersection window. */
a79b1bc6 753 end = std::min<CORE_ADDR> (offset + len, r.start + r.length);
1ee79381
YQ
754
755 gdb_assert (end - offset <= len);
756
a79b1bc6 757 if (offset >= r.start)
1ee79381
YQ
758 status = exec_read_partial_read_only (readbuf, offset,
759 end - offset,
760 xfered_len);
761 else
762 {
a79b1bc6 763 *xfered_len = r.start - offset;
bc113b4e 764 status = TARGET_XFER_UNAVAILABLE;
1ee79381 765 }
1ee79381
YQ
766 return status;
767 }
768 }
1ee79381
YQ
769
770 *xfered_len = len;
bc113b4e 771 return TARGET_XFER_UNAVAILABLE;
1ee79381
YQ
772}
773
9b409511 774enum target_xfer_status
07b82ea5 775section_table_xfer_memory_partial (gdb_byte *readbuf, const gdb_byte *writebuf,
b55e14c7 776 ULONGEST offset, ULONGEST len,
9b409511 777 ULONGEST *xfered_len,
07b82ea5
PA
778 struct target_section *sections,
779 struct target_section *sections_end,
780 const char *section_name)
c906108c 781{
020cc13c 782 int res;
0542c86d 783 struct target_section *p;
07b82ea5
PA
784 ULONGEST memaddr = offset;
785 ULONGEST memend = memaddr + len;
c906108c 786
b55e14c7 787 if (len == 0)
3e43a32a
MS
788 internal_error (__FILE__, __LINE__,
789 _("failed internal consistency check"));
c906108c 790
348f8c02 791 for (p = sections; p < sections_end; p++)
c906108c 792 {
2b2848e2
DE
793 struct bfd_section *asect = p->the_bfd_section;
794 bfd *abfd = asect->owner;
795
796 if (section_name && strcmp (section_name, asect->name) != 0)
0963b4bd 797 continue; /* not the section we need. */
c906108c 798 if (memaddr >= p->addr)
3db26b01
JB
799 {
800 if (memend <= p->endaddr)
801 {
802 /* Entire transfer is within this section. */
07b82ea5 803 if (writebuf)
2b2848e2 804 res = bfd_set_section_contents (abfd, asect,
07b82ea5 805 writebuf, memaddr - p->addr,
85302095
AC
806 len);
807 else
2b2848e2 808 res = bfd_get_section_contents (abfd, asect,
07b82ea5 809 readbuf, memaddr - p->addr,
85302095 810 len);
9b409511
YQ
811
812 if (res != 0)
813 {
814 *xfered_len = len;
815 return TARGET_XFER_OK;
816 }
817 else
818 return TARGET_XFER_EOF;
3db26b01
JB
819 }
820 else if (memaddr >= p->endaddr)
821 {
822 /* This section ends before the transfer starts. */
823 continue;
824 }
825 else
826 {
827 /* This section overlaps the transfer. Just do half. */
828 len = p->endaddr - memaddr;
07b82ea5 829 if (writebuf)
2b2848e2 830 res = bfd_set_section_contents (abfd, asect,
07b82ea5 831 writebuf, memaddr - p->addr,
85302095
AC
832 len);
833 else
2b2848e2 834 res = bfd_get_section_contents (abfd, asect,
07b82ea5 835 readbuf, memaddr - p->addr,
85302095 836 len);
9b409511
YQ
837 if (res != 0)
838 {
839 *xfered_len = len;
840 return TARGET_XFER_OK;
841 }
842 else
843 return TARGET_XFER_EOF;
3db26b01
JB
844 }
845 }
c906108c
SS
846 }
847
9b409511 848 return TARGET_XFER_EOF; /* We can't help. */
c906108c 849}
348f8c02 850
70221824 851static struct target_section_table *
07b82ea5 852exec_get_section_table (struct target_ops *ops)
348f8c02 853{
07b82ea5 854 return current_target_sections;
348f8c02
PA
855}
856
9b409511 857static enum target_xfer_status
07b82ea5
PA
858exec_xfer_partial (struct target_ops *ops, enum target_object object,
859 const char *annex, gdb_byte *readbuf,
860 const gdb_byte *writebuf,
9b409511 861 ULONGEST offset, ULONGEST len, ULONGEST *xfered_len)
348f8c02 862{
07b82ea5
PA
863 struct target_section_table *table = target_get_section_table (ops);
864
865 if (object == TARGET_OBJECT_MEMORY)
866 return section_table_xfer_memory_partial (readbuf, writebuf,
9b409511 867 offset, len, xfered_len,
07b82ea5
PA
868 table->sections,
869 table->sections_end,
870 NULL);
871 else
2ed4b548 872 return TARGET_XFER_E_IO;
348f8c02 873}
c906108c 874\f
c5aa993b 875
c906108c 876void
07b82ea5 877print_section_info (struct target_section_table *t, bfd *abfd)
c906108c 878{
5af949e3 879 struct gdbarch *gdbarch = gdbarch_from_bfd (abfd);
0542c86d 880 struct target_section *p;
17a912b6 881 /* FIXME: 16 is not wide enough when gdbarch_addr_bit > 64. */
5af949e3 882 int wid = gdbarch_addr_bit (gdbarch) <= 32 ? 8 : 16;
c906108c 883
c5aa993b 884 printf_filtered ("\t`%s', ", bfd_get_filename (abfd));
c906108c 885 wrap_here (" ");
a3f17187 886 printf_filtered (_("file type %s.\n"), bfd_get_target (abfd));
c906108c 887 if (abfd == exec_bfd)
51bee8e9 888 {
3e43a32a
MS
889 /* gcc-3.4 does not like the initialization in
890 <p == t->sections_end>. */
d904de5b 891 bfd_vma displacement = 0;
2f1bdd26 892 bfd_vma entry_point;
51bee8e9
JK
893
894 for (p = t->sections; p < t->sections_end; p++)
895 {
2b2848e2
DE
896 struct bfd_section *psect = p->the_bfd_section;
897 bfd *pbfd = psect->owner;
51bee8e9 898
2b2848e2 899 if ((bfd_get_section_flags (pbfd, psect) & (SEC_ALLOC | SEC_LOAD))
51bee8e9
JK
900 != (SEC_ALLOC | SEC_LOAD))
901 continue;
902
2b2848e2
DE
903 if (bfd_get_section_vma (pbfd, psect) <= abfd->start_address
904 && abfd->start_address < (bfd_get_section_vma (pbfd, psect)
905 + bfd_get_section_size (psect)))
51bee8e9 906 {
2b2848e2 907 displacement = p->addr - bfd_get_section_vma (pbfd, psect);
51bee8e9
JK
908 break;
909 }
910 }
911 if (p == t->sections_end)
b37520b6 912 warning (_("Cannot find section for the entry point of %s."),
d904de5b 913 bfd_get_filename (abfd));
51bee8e9 914
2f1bdd26
MGD
915 entry_point = gdbarch_addr_bits_remove (gdbarch,
916 bfd_get_start_address (abfd)
917 + displacement);
51bee8e9 918 printf_filtered (_("\tEntry point: %s\n"),
2f1bdd26 919 paddress (gdbarch, entry_point));
51bee8e9 920 }
07b82ea5 921 for (p = t->sections; p < t->sections_end; p++)
c906108c 922 {
2b2848e2
DE
923 struct bfd_section *psect = p->the_bfd_section;
924 bfd *pbfd = psect->owner;
925
bb599908
PH
926 printf_filtered ("\t%s", hex_string_custom (p->addr, wid));
927 printf_filtered (" - %s", hex_string_custom (p->endaddr, wid));
bcf16802
KB
928
929 /* FIXME: A format of "08l" is not wide enough for file offsets
930 larger than 4GB. OTOH, making it "016l" isn't desirable either
931 since most output will then be much wider than necessary. It
932 may make sense to test the size of the file and choose the
933 format string accordingly. */
a3f17187 934 /* FIXME: i18n: Need to rewrite this sentence. */
c906108c
SS
935 if (info_verbose)
936 printf_filtered (" @ %s",
2b2848e2
DE
937 hex_string_custom (psect->filepos, 8));
938 printf_filtered (" is %s", bfd_section_name (pbfd, psect));
939 if (pbfd != abfd)
940 printf_filtered (" in %s", bfd_get_filename (pbfd));
c906108c
SS
941 printf_filtered ("\n");
942 }
943}
944
945static void
fba45db2 946exec_files_info (struct target_ops *t)
c906108c 947{
57008375
JK
948 if (exec_bfd)
949 print_section_info (current_target_sections, exec_bfd);
950 else
951 puts_filtered (_("\t<no file loaded>\n"));
c906108c
SS
952}
953
954static void
0b39b52e 955set_section_command (const char *args, int from_tty)
c906108c 956{
0542c86d 957 struct target_section *p;
0b39b52e 958 const char *secname;
c906108c
SS
959 unsigned seclen;
960 unsigned long secaddr;
961 char secprint[100];
962 long offset;
07b82ea5 963 struct target_section_table *table;
c906108c
SS
964
965 if (args == 0)
8a3fe4f8 966 error (_("Must specify section name and its virtual address"));
c906108c 967
0963b4bd 968 /* Parse out section name. */
c5aa993b 969 for (secname = args; !isspace (*args); args++);
c906108c
SS
970 seclen = args - secname;
971
0963b4bd 972 /* Parse out new virtual address. */
c906108c
SS
973 secaddr = parse_and_eval_address (args);
974
07b82ea5
PA
975 table = current_target_sections;
976 for (p = table->sections; p < table->sections_end; p++)
c5aa993b 977 {
57008375 978 if (!strncmp (secname, bfd_section_name (p->bfd,
3e43a32a 979 p->the_bfd_section), seclen)
57008375 980 && bfd_section_name (p->bfd, p->the_bfd_section)[seclen] == '\0')
c5aa993b
JM
981 {
982 offset = secaddr - p->addr;
983 p->addr += offset;
984 p->endaddr += offset;
985 if (from_tty)
986 exec_files_info (&exec_ops);
987 return;
988 }
c906108c 989 }
c906108c
SS
990 if (seclen >= sizeof (secprint))
991 seclen = sizeof (secprint) - 1;
992 strncpy (secprint, secname, seclen);
993 secprint[seclen] = '\0';
8a3fe4f8 994 error (_("Section %s not found"), secprint);
c906108c
SS
995}
996
30510692
DJ
997/* If we can find a section in FILENAME with BFD index INDEX, adjust
998 it to ADDRESS. */
c1bd25fd
DJ
999
1000void
1001exec_set_section_address (const char *filename, int index, CORE_ADDR address)
1002{
0542c86d 1003 struct target_section *p;
07b82ea5 1004 struct target_section_table *table;
c1bd25fd 1005
07b82ea5
PA
1006 table = current_target_sections;
1007 for (p = table->sections; p < table->sections_end; p++)
c1bd25fd 1008 {
2b2848e2 1009 if (filename_cmp (filename, p->the_bfd_section->owner->filename) == 0
30510692 1010 && index == p->the_bfd_section->index)
c1bd25fd 1011 {
30510692 1012 p->endaddr += address - p->addr;
c1bd25fd 1013 p->addr = address;
c1bd25fd
DJ
1014 }
1015 }
1016}
1017
c906108c
SS
1018/* If mourn is being called in all the right places, this could be say
1019 `gdb internal error' (since generic_mourn calls
1020 breakpoint_init_inferior). */
1021
1022static int
3db08215
MM
1023ignore (struct target_ops *ops, struct gdbarch *gdbarch,
1024 struct bp_target_info *bp_tgt)
c906108c
SS
1025{
1026 return 0;
1027}
1028
73971819
PA
1029/* Implement the to_remove_breakpoint method. */
1030
1031static int
1032exec_remove_breakpoint (struct target_ops *ops, struct gdbarch *gdbarch,
1033 struct bp_target_info *bp_tgt,
1034 enum remove_bp_reason reason)
1035{
1036 return 0;
1037}
1038
c35b1492
PA
1039static int
1040exec_has_memory (struct target_ops *ops)
1041{
1042 /* We can provide memory if we have any file/target sections to read
1043 from. */
1044 return (current_target_sections->sections
1045 != current_target_sections->sections_end);
1046}
1047
83814951
TT
1048static char *
1049exec_make_note_section (struct target_ops *self, bfd *obfd, int *note_size)
1050{
1051 error (_("Can't create a corefile"));
1052}
be4d1333 1053
c906108c
SS
1054/* Fill in the exec file target vector. Very few entries need to be
1055 defined. */
1056
be4d1333 1057static void
fba45db2 1058init_exec_ops (void)
c906108c
SS
1059{
1060 exec_ops.to_shortname = "exec";
1061 exec_ops.to_longname = "Local exec file";
1062 exec_ops.to_doc = "Use an executable file as a target.\n\
1063Specify the filename of the executable file.";
1adeb98a 1064 exec_ops.to_open = exec_open;
6c95b8df 1065 exec_ops.to_close = exec_close_1;
07b82ea5
PA
1066 exec_ops.to_xfer_partial = exec_xfer_partial;
1067 exec_ops.to_get_section_table = exec_get_section_table;
c906108c
SS
1068 exec_ops.to_files_info = exec_files_info;
1069 exec_ops.to_insert_breakpoint = ignore;
73971819 1070 exec_ops.to_remove_breakpoint = exec_remove_breakpoint;
c906108c 1071 exec_ops.to_stratum = file_stratum;
c35b1492 1072 exec_ops.to_has_memory = exec_has_memory;
be4d1333 1073 exec_ops.to_make_corefile_notes = exec_make_note_section;
b427c1bc 1074 exec_ops.to_find_memory_regions = objfile_find_memory_regions;
c5aa993b 1075 exec_ops.to_magic = OPS_MAGIC;
c906108c
SS
1076}
1077
1078void
fba45db2 1079_initialize_exec (void)
c906108c
SS
1080{
1081 struct cmd_list_element *c;
1082
1083 init_exec_ops ();
1084
1085 if (!dbx_commands)
1086 {
1a966eab
AC
1087 c = add_cmd ("file", class_files, file_command, _("\
1088Use FILE as program to be debugged.\n\
c906108c
SS
1089It is read for its symbols, for getting the contents of pure memory,\n\
1090and it is the program executed when you use the `run' command.\n\
1091If FILE cannot be found as specified, your execution directory path\n\
1092($PATH) is searched for a command of that name.\n\
1a966eab 1093No arg means to have no executable file and no symbols."), &cmdlist);
5ba2abeb 1094 set_cmd_completer (c, filename_completer);
c906108c
SS
1095 }
1096
1a966eab
AC
1097 c = add_cmd ("exec-file", class_files, exec_file_command, _("\
1098Use FILE as program for getting contents of pure memory.\n\
c906108c
SS
1099If FILE cannot be found as specified, your execution directory path\n\
1100is searched for a command of that name.\n\
1a966eab 1101No arg means have no executable file."), &cmdlist);
5ba2abeb 1102 set_cmd_completer (c, filename_completer);
c906108c 1103
1bedd215
AC
1104 add_com ("section", class_files, set_section_command, _("\
1105Change the base address of section SECTION of the exec file to ADDR.\n\
c906108c
SS
1106This can be used if the exec file does not contain section addresses,\n\
1107(such as in the a.out format), or when the addresses specified in the\n\
1108file itself are wrong. Each section must be changed separately. The\n\
1bedd215 1109``info files'' command lists all the sections and their addresses."));
c906108c 1110
5bf193a2
AC
1111 add_setshow_boolean_cmd ("write", class_support, &write_files, _("\
1112Set writing into executable and core files."), _("\
1113Show writing into executable and core files."), NULL,
1114 NULL,
920d2a44 1115 show_write_files,
5bf193a2 1116 &setlist, &showlist);
c5aa993b 1117
9852c492 1118 add_target_with_completer (&exec_ops, filename_completer);
c906108c 1119}
This page took 2.267294 seconds and 4 git commands to generate.