PR 17819: Fix --build-id=tree when using --compress-debug-sections.
[deliverable/binutils-gdb.git] / gdb / exec.c
CommitLineData
c906108c 1/* Work with executable files, for GDB.
4646aa9d 2
32d0add0 3 Copyright (C) 1988-2015 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "frame.h"
22#include "inferior.h"
23#include "target.h"
24#include "gdbcmd.h"
25#include "language.h"
0ba1096a 26#include "filenames.h"
c906108c
SS
27#include "symfile.h"
28#include "objfiles.h"
c5f0f3d0 29#include "completer.h"
fd0407d6 30#include "value.h"
4646aa9d 31#include "exec.h"
ea53e89f 32#include "observer.h"
dacec2a8 33#include "arch-utils.h"
6c95b8df
PA
34#include "gdbthread.h"
35#include "progspace.h"
cbb099e8 36#include "gdb_bfd.h"
b427c1bc 37#include "gcore.h"
c906108c 38
c906108c 39#include <fcntl.h>
dbda9972 40#include "readline/readline.h"
c906108c
SS
41#include "gdbcore.h"
42
43#include <ctype.h>
53ce3c39 44#include <sys/stat.h>
a9a5a3d1 45#include "solist.h"
c906108c 46
9a4105ab 47void (*deprecated_file_changed_hook) (char *);
c906108c
SS
48
49/* Prototypes for local functions */
50
a14ed312 51static void file_command (char *, int);
c906108c 52
a14ed312 53static void set_section_command (char *, int);
c906108c 54
a14ed312 55static void exec_files_info (struct target_ops *);
c906108c 56
a14ed312 57static void init_exec_ops (void);
c906108c 58
a14ed312 59void _initialize_exec (void);
c906108c 60
c906108c
SS
61/* The target vector for executable files. */
62
e8b2341c 63static struct target_ops exec_ops;
c906108c 64
c906108c
SS
65/* Whether to open exec and core files read-only or read-write. */
66
67int write_files = 0;
920d2a44
AC
68static void
69show_write_files (struct ui_file *file, int from_tty,
70 struct cmd_list_element *c, const char *value)
71{
72 fprintf_filtered (file, _("Writing into executable and core files is %s.\n"),
73 value);
74}
75
c906108c 76
4c42eaff 77static void
014f9477 78exec_open (const char *args, int from_tty)
1adeb98a
FN
79{
80 target_preopen (from_tty);
81 exec_file_attach (args, from_tty);
82}
83
07b82ea5
PA
84/* Close and clear exec_bfd. If we end up with no target sections to
85 read memory from, this unpushes the exec_ops target. */
86
6c95b8df
PA
87void
88exec_close (void)
07b82ea5
PA
89{
90 if (exec_bfd)
91 {
92 bfd *abfd = exec_bfd;
07b82ea5 93
cbb099e8 94 gdb_bfd_unref (abfd);
07b82ea5
PA
95
96 /* Removing target sections may close the exec_ops target.
97 Clear exec_bfd before doing so to prevent recursion. */
98 exec_bfd = NULL;
99 exec_bfd_mtime = 0;
100
046ac79f 101 remove_target_sections (&exec_bfd);
1f0c4988
JK
102
103 xfree (exec_filename);
104 exec_filename = NULL;
07b82ea5
PA
105 }
106}
107
6c95b8df
PA
108/* This is the target_close implementation. Clears all target
109 sections and closes all executable bfds from all program spaces. */
110
c906108c 111static void
de90e03d 112exec_close_1 (struct target_ops *self)
c906108c 113{
ab16fce8
TT
114 struct program_space *ss;
115 struct cleanup *old_chain;
6c95b8df 116
ab16fce8
TT
117 old_chain = save_current_program_space ();
118 ALL_PSPACES (ss)
6c95b8df 119 {
ab16fce8
TT
120 set_current_program_space (ss);
121 clear_section_table (current_target_sections);
122 exec_close ();
6c95b8df 123 }
ab16fce8
TT
124
125 do_cleanups (old_chain);
c906108c
SS
126}
127
1adeb98a
FN
128void
129exec_file_clear (int from_tty)
130{
131 /* Remove exec file. */
6c95b8df 132 exec_close ();
1adeb98a
FN
133
134 if (from_tty)
a3f17187 135 printf_unfiltered (_("No executable file now.\n"));
1adeb98a
FN
136}
137
a10de604
GB
138/* See gdbcore.h. */
139
140void
141exec_file_locate_attach (int pid, int from_tty)
142{
143 char *exec_file, *full_exec_path = NULL;
144
145 /* Do nothing if we already have an executable filename. */
146 exec_file = (char *) get_exec_file (0);
147 if (exec_file != NULL)
148 return;
149
150 /* Try to determine a filename from the process itself. */
151 exec_file = target_pid_to_exec_file (pid);
152 if (exec_file == NULL)
153 return;
154
a9a5a3d1
GB
155 /* If gdb_sysroot is not empty and the discovered filename
156 is absolute then prefix the filename with gdb_sysroot. */
157 if (gdb_sysroot != NULL && *gdb_sysroot != '\0'
158 && IS_ABSOLUTE_PATH (exec_file))
998d2a3e 159 full_exec_path = exec_file_find (exec_file, NULL);
a10de604 160
a9a5a3d1
GB
161 if (full_exec_path == NULL)
162 {
163 /* It's possible we don't have a full path, but rather just a
164 filename. Some targets, such as HP-UX, don't provide the
165 full path, sigh.
166
167 Attempt to qualify the filename against the source path.
168 (If that fails, we'll just fall back on the original
169 filename. Not much more we can do...) */
170 if (!source_full_path_of (exec_file, &full_exec_path))
171 full_exec_path = xstrdup (exec_file);
172 }
a10de604
GB
173
174 exec_file_attach (full_exec_path, from_tty);
175 symbol_file_add_main (full_exec_path, from_tty);
176}
177
907083d1 178/* Set FILENAME as the new exec file.
c906108c 179
c5aa993b
JM
180 This function is intended to be behave essentially the same
181 as exec_file_command, except that the latter will detect when
182 a target is being debugged, and will ask the user whether it
183 should be shut down first. (If the answer is "no", then the
184 new file is ignored.)
c906108c 185
c5aa993b
JM
186 This file is used by exec_file_command, to do the work of opening
187 and processing the exec file after any prompting has happened.
c906108c 188
c5aa993b
JM
189 And, it is used by child_attach, when the attach command was
190 given a pid but not a exec pathname, and the attach command could
191 figure out the pathname from the pid. (In this case, we shouldn't
192 ask the user whether the current target should be shut down --
907083d1 193 we're supplying the exec pathname late for good reason.) */
c906108c
SS
194
195void
5f08566b 196exec_file_attach (const char *filename, int from_tty)
c906108c 197{
9b333ba3
TT
198 struct cleanup *cleanups;
199
200 /* First, acquire a reference to the current exec_bfd. We release
201 this at the end of the function; but acquiring it now lets the
202 BFD cache return it if this call refers to the same file. */
203 gdb_bfd_ref (exec_bfd);
204 cleanups = make_cleanup_bfd_unref (exec_bfd);
205
c906108c 206 /* Remove any previous exec file. */
6c95b8df 207 exec_close ();
c906108c
SS
208
209 /* Now open and digest the file the user requested, if any. */
210
1adeb98a
FN
211 if (!filename)
212 {
213 if (from_tty)
a3f17187 214 printf_unfiltered (_("No executable file now.\n"));
7a107747
DJ
215
216 set_gdbarch_from_file (NULL);
1adeb98a
FN
217 }
218 else
c906108c 219 {
64c0b5de 220 int load_via_target = 0;
1f0c4988 221 char *scratch_pathname, *canonical_pathname;
c906108c 222 int scratch_chan;
07b82ea5 223 struct target_section *sections = NULL, *sections_end = NULL;
d18b8b7a 224 char **matching;
c5aa993b 225
64c0b5de
GB
226 if (is_target_filename (filename))
227 {
228 if (target_filesystem_is_local ())
229 filename += strlen (TARGET_SYSROOT_PREFIX);
230 else
231 load_via_target = 1;
232 }
233
234 if (load_via_target)
c5aa993b 235 {
64c0b5de
GB
236 /* gdb_bfd_fopen does not support "target:" filenames. */
237 if (write_files)
238 warning (_("writing into executable files is "
239 "not supported for %s sysroots"),
240 TARGET_SYSROOT_PREFIX);
241
242 scratch_pathname = xstrdup (filename);
243 make_cleanup (xfree, scratch_pathname);
244
245 scratch_chan = -1;
d7f9d729 246
64c0b5de 247 canonical_pathname = scratch_pathname;
c5aa993b 248 }
64c0b5de
GB
249 else
250 {
251 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
252 filename, write_files ?
253 O_RDWR | O_BINARY : O_RDONLY | O_BINARY,
254 &scratch_pathname);
255#if defined(__GO32__) || defined(_WIN32) || defined(__CYGWIN__)
256 if (scratch_chan < 0)
257 {
258 char *exename = alloca (strlen (filename) + 5);
259
260 strcat (strcpy (exename, filename), ".exe");
261 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
262 exename, write_files ?
263 O_RDWR | O_BINARY
264 : O_RDONLY | O_BINARY,
265 &scratch_pathname);
266 }
c906108c 267#endif
64c0b5de
GB
268 if (scratch_chan < 0)
269 perror_with_name (filename);
a4453b7e 270
64c0b5de 271 make_cleanup (xfree, scratch_pathname);
a4453b7e 272
64c0b5de
GB
273 /* gdb_bfd_open (and its variants) prefers canonicalized
274 pathname for better BFD caching. */
275 canonical_pathname = gdb_realpath (scratch_pathname);
276 make_cleanup (xfree, canonical_pathname);
277 }
1f0c4988 278
64c0b5de 279 if (write_files && !load_via_target)
1f0c4988 280 exec_bfd = gdb_bfd_fopen (canonical_pathname, gnutarget,
1c00ec6b
TT
281 FOPEN_RUB, scratch_chan);
282 else
1f0c4988 283 exec_bfd = gdb_bfd_open (canonical_pathname, gnutarget, scratch_chan);
c906108c
SS
284
285 if (!exec_bfd)
9fe4a216 286 {
9fe4a216
TT
287 error (_("\"%s\": could not open as an executable file: %s"),
288 scratch_pathname, bfd_errmsg (bfd_get_error ()));
289 }
c906108c 290
64c0b5de
GB
291 /* gdb_realpath_keepfile resolves symlinks on the local
292 filesystem and so cannot be used for "target:" files. */
1f0c4988 293 gdb_assert (exec_filename == NULL);
64c0b5de
GB
294 if (load_via_target)
295 exec_filename = xstrdup (bfd_get_filename (exec_bfd));
296 else
297 exec_filename = gdb_realpath_keepfile (scratch_pathname);
1f0c4988 298
d18b8b7a 299 if (!bfd_check_format_matches (exec_bfd, bfd_object, &matching))
c906108c
SS
300 {
301 /* Make sure to close exec_bfd, or else "run" might try to use
302 it. */
6c95b8df 303 exec_close ();
8a3fe4f8 304 error (_("\"%s\": not in executable format: %s"),
d18b8b7a
HZ
305 scratch_pathname,
306 gdb_bfd_errmsg (bfd_get_error (), matching));
c906108c
SS
307 }
308
07b82ea5 309 if (build_section_table (exec_bfd, &sections, &sections_end))
c906108c
SS
310 {
311 /* Make sure to close exec_bfd, or else "run" might try to use
312 it. */
6c95b8df 313 exec_close ();
8a3fe4f8 314 error (_("\"%s\": can't find the file sections: %s"),
c906108c
SS
315 scratch_pathname, bfd_errmsg (bfd_get_error ()));
316 }
317
c04ea773
DJ
318 exec_bfd_mtime = bfd_get_mtime (exec_bfd);
319
c906108c
SS
320 validate_files ();
321
322 set_gdbarch_from_file (exec_bfd);
323
07b82ea5 324 /* Add the executable's sections to the current address spaces'
6c95b8df
PA
325 list of sections. This possibly pushes the exec_ops
326 target. */
ed9eebaf 327 add_target_sections (&exec_bfd, sections, sections_end);
07b82ea5 328 xfree (sections);
c906108c
SS
329
330 /* Tell display code (if any) about the changed file name. */
9a4105ab
AC
331 if (deprecated_exec_file_display_hook)
332 (*deprecated_exec_file_display_hook) (filename);
c906108c 333 }
9b333ba3
TT
334
335 do_cleanups (cleanups);
336
ce7d4522 337 bfd_cache_close_all ();
781b42b0 338 observer_notify_executable_changed ();
c906108c
SS
339}
340
341/* Process the first arg in ARGS as the new exec file.
342
c5aa993b
JM
343 Note that we have to explicitly ignore additional args, since we can
344 be called from file_command(), which also calls symbol_file_command()
1adeb98a
FN
345 which can take multiple args.
346
0963b4bd 347 If ARGS is NULL, we just want to close the exec file. */
c906108c 348
1adeb98a 349static void
fba45db2 350exec_file_command (char *args, int from_tty)
c906108c 351{
1adeb98a
FN
352 char **argv;
353 char *filename;
4c42eaff
DJ
354
355 if (from_tty && target_has_execution
356 && !query (_("A program is being debugged already.\n"
357 "Are you sure you want to change the file? ")))
358 error (_("File not changed."));
1adeb98a
FN
359
360 if (args)
361 {
f7545552
TT
362 struct cleanup *cleanups;
363
1adeb98a
FN
364 /* Scan through the args and pick up the first non option arg
365 as the filename. */
366
d1a41061 367 argv = gdb_buildargv (args);
f7545552 368 cleanups = make_cleanup_freeargv (argv);
1adeb98a
FN
369
370 for (; (*argv != NULL) && (**argv == '-'); argv++)
371 {;
372 }
373 if (*argv == NULL)
8a3fe4f8 374 error (_("No executable file name was specified"));
1adeb98a
FN
375
376 filename = tilde_expand (*argv);
377 make_cleanup (xfree, filename);
378 exec_file_attach (filename, from_tty);
f7545552
TT
379
380 do_cleanups (cleanups);
1adeb98a
FN
381 }
382 else
383 exec_file_attach (NULL, from_tty);
c906108c
SS
384}
385
0963b4bd 386/* Set both the exec file and the symbol file, in one command.
c906108c
SS
387 What a novelty. Why did GDB go through four major releases before this
388 command was added? */
389
390static void
fba45db2 391file_command (char *arg, int from_tty)
c906108c
SS
392{
393 /* FIXME, if we lose on reading the symbol file, we should revert
394 the exec file, but that's rough. */
395 exec_file_command (arg, from_tty);
396 symbol_file_command (arg, from_tty);
9a4105ab
AC
397 if (deprecated_file_changed_hook)
398 deprecated_file_changed_hook (arg);
c906108c 399}
c906108c 400\f
c5aa993b 401
0963b4bd 402/* Locate all mappable sections of a BFD file.
c906108c
SS
403 table_pp_char is a char * to get it through bfd_map_over_sections;
404 we cast it back to its proper type. */
405
406static void
7be0c536
AC
407add_to_section_table (bfd *abfd, struct bfd_section *asect,
408 void *table_pp_char)
c906108c 409{
0542c86d 410 struct target_section **table_pp = (struct target_section **) table_pp_char;
c906108c
SS
411 flagword aflag;
412
2b2848e2
DE
413 gdb_assert (abfd == asect->owner);
414
0f5d55d8
JB
415 /* Check the section flags, but do not discard zero-length sections, since
416 some symbols may still be attached to this section. For instance, we
417 encountered on sparc-solaris 2.10 a shared library with an empty .bss
418 section to which a symbol named "_end" was attached. The address
419 of this symbol still needs to be relocated. */
c906108c
SS
420 aflag = bfd_get_section_flags (abfd, asect);
421 if (!(aflag & SEC_ALLOC))
422 return;
0f5d55d8 423
046ac79f 424 (*table_pp)->owner = NULL;
c906108c
SS
425 (*table_pp)->the_bfd_section = asect;
426 (*table_pp)->addr = bfd_section_vma (abfd, asect);
427 (*table_pp)->endaddr = (*table_pp)->addr + bfd_section_size (abfd, asect);
428 (*table_pp)++;
429}
430
a5b1fd27
DE
431/* See exec.h. */
432
433void
434clear_section_table (struct target_section_table *table)
435{
436 xfree (table->sections);
437 table->sections = table->sections_end = NULL;
438}
439
440/* Resize section table TABLE by ADJUSTMENT.
441 ADJUSTMENT may be negative, in which case the caller must have already
442 removed the sections being deleted.
443 Returns the old size. */
444
445static int
446resize_section_table (struct target_section_table *table, int adjustment)
07b82ea5 447{
07b82ea5
PA
448 int old_count;
449 int new_count;
450
07b82ea5
PA
451 old_count = table->sections_end - table->sections;
452
a5b1fd27 453 new_count = adjustment + old_count;
07b82ea5
PA
454
455 if (new_count)
456 {
457 table->sections = xrealloc (table->sections,
458 sizeof (struct target_section) * new_count);
459 table->sections_end = table->sections + new_count;
460 }
461 else
a5b1fd27 462 clear_section_table (table);
07b82ea5
PA
463
464 return old_count;
465}
466
c906108c
SS
467/* Builds a section table, given args BFD, SECTABLE_PTR, SECEND_PTR.
468 Returns 0 if OK, 1 on error. */
469
470int
0542c86d
PA
471build_section_table (struct bfd *some_bfd, struct target_section **start,
472 struct target_section **end)
c906108c
SS
473{
474 unsigned count;
475
476 count = bfd_count_sections (some_bfd);
477 if (*start)
b8c9b27d 478 xfree (* start);
0542c86d 479 *start = (struct target_section *) xmalloc (count * sizeof (**start));
c906108c 480 *end = *start;
c5aa993b 481 bfd_map_over_sections (some_bfd, add_to_section_table, (char *) end);
c906108c 482 if (*end > *start + count)
3e43a32a
MS
483 internal_error (__FILE__, __LINE__,
484 _("failed internal consistency check"));
c906108c
SS
485 /* We could realloc the table, but it probably loses for most files. */
486 return 0;
487}
07b82ea5
PA
488
489/* Add the sections array defined by [SECTIONS..SECTIONS_END[ to the
490 current set of target sections. */
491
492void
046ac79f 493add_target_sections (void *owner,
ed9eebaf 494 struct target_section *sections,
07b82ea5
PA
495 struct target_section *sections_end)
496{
497 int count;
498 struct target_section_table *table = current_target_sections;
499
500 count = sections_end - sections;
501
502 if (count > 0)
503 {
504 int space = resize_section_table (table, count);
ed9eebaf 505 int i;
d7f9d729 506
ed9eebaf
TT
507 for (i = 0; i < count; ++i)
508 {
509 table->sections[space + i] = sections[i];
046ac79f 510 table->sections[space + i].owner = owner;
ed9eebaf 511 }
07b82ea5
PA
512
513 /* If these are the first file sections we can provide memory
514 from, push the file_stratum target. */
ab16fce8
TT
515 if (!target_is_pushed (&exec_ops))
516 push_target (&exec_ops);
07b82ea5
PA
517 }
518}
519
76ad5e1e
NB
520/* Add the sections of OBJFILE to the current set of target sections. */
521
522void
523add_target_sections_of_objfile (struct objfile *objfile)
524{
525 struct target_section_table *table = current_target_sections;
526 struct obj_section *osect;
527 int space;
528 unsigned count = 0;
529 struct target_section *ts;
530
531 if (objfile == NULL)
532 return;
533
534 /* Compute the number of sections to add. */
535 ALL_OBJFILE_OSECTIONS (objfile, osect)
536 {
537 if (bfd_get_section_size (osect->the_bfd_section) == 0)
538 continue;
539 count++;
540 }
541
542 if (count == 0)
543 return;
544
545 space = resize_section_table (table, count);
546
547 ts = table->sections + space;
548
549 ALL_OBJFILE_OSECTIONS (objfile, osect)
550 {
551 if (bfd_get_section_size (osect->the_bfd_section) == 0)
552 continue;
553
554 gdb_assert (ts < table->sections + space + count);
555
556 ts->addr = obj_section_addr (osect);
557 ts->endaddr = obj_section_endaddr (osect);
558 ts->the_bfd_section = osect->the_bfd_section;
559 ts->owner = (void *) objfile;
560
561 ts++;
562 }
563}
564
046ac79f
JK
565/* Remove all target sections owned by OWNER.
566 OWNER must be the same value passed to add_target_sections. */
07b82ea5
PA
567
568void
046ac79f 569remove_target_sections (void *owner)
07b82ea5
PA
570{
571 struct target_section *src, *dest;
07b82ea5
PA
572 struct target_section_table *table = current_target_sections;
573
046ac79f
JK
574 gdb_assert (owner != NULL);
575
07b82ea5
PA
576 dest = table->sections;
577 for (src = table->sections; src < table->sections_end; src++)
046ac79f 578 if (src->owner != owner)
07b82ea5
PA
579 {
580 /* Keep this section. */
581 if (dest < src)
582 *dest = *src;
583 dest++;
584 }
585
586 /* If we've dropped any sections, resize the section table. */
587 if (dest < src)
588 {
589 int old_count;
590
591 old_count = resize_section_table (table, dest - src);
592
593 /* If we don't have any more sections to read memory from,
594 remove the file_stratum target from the stack. */
595 if (old_count + (dest - src) == 0)
6c95b8df
PA
596 {
597 struct program_space *pspace;
598
599 ALL_PSPACES (pspace)
600 if (pspace->target_sections.sections
601 != pspace->target_sections.sections_end)
602 return;
603
604 unpush_target (&exec_ops);
605 }
07b82ea5
PA
606 }
607}
608
c906108c 609\f
348f8c02 610
1ca49d37
YQ
611enum target_xfer_status
612exec_read_partial_read_only (gdb_byte *readbuf, ULONGEST offset,
613 ULONGEST len, ULONGEST *xfered_len)
614{
615 /* It's unduly pedantic to refuse to look at the executable for
616 read-only pieces; so do the equivalent of readonly regions aka
617 QTro packet. */
618 if (exec_bfd != NULL)
619 {
620 asection *s;
621 bfd_size_type size;
622 bfd_vma vma;
623
624 for (s = exec_bfd->sections; s; s = s->next)
625 {
626 if ((s->flags & SEC_LOAD) == 0
627 || (s->flags & SEC_READONLY) == 0)
628 continue;
629
630 vma = s->vma;
631 size = bfd_get_section_size (s);
632 if (vma <= offset && offset < (vma + size))
633 {
634 ULONGEST amt;
635
636 amt = (vma + size) - offset;
637 if (amt > len)
638 amt = len;
639
640 amt = bfd_get_section_contents (exec_bfd, s,
641 readbuf, offset - vma, amt);
642
643 if (amt == 0)
644 return TARGET_XFER_EOF;
645 else
646 {
647 *xfered_len = amt;
648 return TARGET_XFER_OK;
649 }
650 }
651 }
652 }
653
654 /* Indicate failure to find the requested memory block. */
655 return TARGET_XFER_E_IO;
656}
657
5a2eb0ef
YQ
658/* Appends all read-only memory ranges found in the target section
659 table defined by SECTIONS and SECTIONS_END, starting at (and
660 intersected with) MEMADDR for LEN bytes. Returns the augmented
661 VEC. */
662
663static VEC(mem_range_s) *
e6ca34fc 664section_table_available_memory (VEC(mem_range_s) *memory,
424447ee 665 CORE_ADDR memaddr, ULONGEST len,
e6ca34fc
PA
666 struct target_section *sections,
667 struct target_section *sections_end)
668{
669 struct target_section *p;
e6ca34fc
PA
670
671 for (p = sections; p < sections_end; p++)
672 {
2b2848e2
DE
673 if ((bfd_get_section_flags (p->the_bfd_section->owner,
674 p->the_bfd_section)
e6ca34fc
PA
675 & SEC_READONLY) == 0)
676 continue;
677
678 /* Copy the meta-data, adjusted. */
679 if (mem_ranges_overlap (p->addr, p->endaddr - p->addr, memaddr, len))
680 {
681 ULONGEST lo1, hi1, lo2, hi2;
682 struct mem_range *r;
683
684 lo1 = memaddr;
685 hi1 = memaddr + len;
686
687 lo2 = p->addr;
688 hi2 = p->endaddr;
689
690 r = VEC_safe_push (mem_range_s, memory, NULL);
691
692 r->start = max (lo1, lo2);
693 r->length = min (hi1, hi2) - r->start;
694 }
695 }
696
697 return memory;
698}
699
1ee79381
YQ
700enum target_xfer_status
701section_table_read_available_memory (gdb_byte *readbuf, ULONGEST offset,
702 ULONGEST len, ULONGEST *xfered_len)
703{
704 VEC(mem_range_s) *available_memory = NULL;
705 struct target_section_table *table;
706 struct cleanup *old_chain;
707 mem_range_s *r;
708 int i;
709
710 table = target_get_section_table (&exec_ops);
711 available_memory = section_table_available_memory (available_memory,
712 offset, len,
713 table->sections,
714 table->sections_end);
715
716 old_chain = make_cleanup (VEC_cleanup(mem_range_s),
717 &available_memory);
718
719 normalize_mem_ranges (available_memory);
720
721 for (i = 0;
722 VEC_iterate (mem_range_s, available_memory, i, r);
723 i++)
724 {
725 if (mem_ranges_overlap (r->start, r->length, offset, len))
726 {
727 CORE_ADDR end;
728 enum target_xfer_status status;
729
730 /* Get the intersection window. */
731 end = min (offset + len, r->start + r->length);
732
733 gdb_assert (end - offset <= len);
734
735 if (offset >= r->start)
736 status = exec_read_partial_read_only (readbuf, offset,
737 end - offset,
738 xfered_len);
739 else
740 {
741 *xfered_len = r->start - offset;
bc113b4e 742 status = TARGET_XFER_UNAVAILABLE;
1ee79381
YQ
743 }
744 do_cleanups (old_chain);
745 return status;
746 }
747 }
748 do_cleanups (old_chain);
749
750 *xfered_len = len;
bc113b4e 751 return TARGET_XFER_UNAVAILABLE;
1ee79381
YQ
752}
753
9b409511 754enum target_xfer_status
07b82ea5 755section_table_xfer_memory_partial (gdb_byte *readbuf, const gdb_byte *writebuf,
b55e14c7 756 ULONGEST offset, ULONGEST len,
9b409511 757 ULONGEST *xfered_len,
07b82ea5
PA
758 struct target_section *sections,
759 struct target_section *sections_end,
760 const char *section_name)
c906108c 761{
020cc13c 762 int res;
0542c86d 763 struct target_section *p;
07b82ea5
PA
764 ULONGEST memaddr = offset;
765 ULONGEST memend = memaddr + len;
c906108c 766
b55e14c7 767 if (len == 0)
3e43a32a
MS
768 internal_error (__FILE__, __LINE__,
769 _("failed internal consistency check"));
c906108c 770
348f8c02 771 for (p = sections; p < sections_end; p++)
c906108c 772 {
2b2848e2
DE
773 struct bfd_section *asect = p->the_bfd_section;
774 bfd *abfd = asect->owner;
775
776 if (section_name && strcmp (section_name, asect->name) != 0)
0963b4bd 777 continue; /* not the section we need. */
c906108c 778 if (memaddr >= p->addr)
3db26b01
JB
779 {
780 if (memend <= p->endaddr)
781 {
782 /* Entire transfer is within this section. */
07b82ea5 783 if (writebuf)
2b2848e2 784 res = bfd_set_section_contents (abfd, asect,
07b82ea5 785 writebuf, memaddr - p->addr,
85302095
AC
786 len);
787 else
2b2848e2 788 res = bfd_get_section_contents (abfd, asect,
07b82ea5 789 readbuf, memaddr - p->addr,
85302095 790 len);
9b409511
YQ
791
792 if (res != 0)
793 {
794 *xfered_len = len;
795 return TARGET_XFER_OK;
796 }
797 else
798 return TARGET_XFER_EOF;
3db26b01
JB
799 }
800 else if (memaddr >= p->endaddr)
801 {
802 /* This section ends before the transfer starts. */
803 continue;
804 }
805 else
806 {
807 /* This section overlaps the transfer. Just do half. */
808 len = p->endaddr - memaddr;
07b82ea5 809 if (writebuf)
2b2848e2 810 res = bfd_set_section_contents (abfd, asect,
07b82ea5 811 writebuf, memaddr - p->addr,
85302095
AC
812 len);
813 else
2b2848e2 814 res = bfd_get_section_contents (abfd, asect,
07b82ea5 815 readbuf, memaddr - p->addr,
85302095 816 len);
9b409511
YQ
817 if (res != 0)
818 {
819 *xfered_len = len;
820 return TARGET_XFER_OK;
821 }
822 else
823 return TARGET_XFER_EOF;
3db26b01
JB
824 }
825 }
c906108c
SS
826 }
827
9b409511 828 return TARGET_XFER_EOF; /* We can't help. */
c906108c 829}
348f8c02 830
70221824 831static struct target_section_table *
07b82ea5 832exec_get_section_table (struct target_ops *ops)
348f8c02 833{
07b82ea5 834 return current_target_sections;
348f8c02
PA
835}
836
9b409511 837static enum target_xfer_status
07b82ea5
PA
838exec_xfer_partial (struct target_ops *ops, enum target_object object,
839 const char *annex, gdb_byte *readbuf,
840 const gdb_byte *writebuf,
9b409511 841 ULONGEST offset, ULONGEST len, ULONGEST *xfered_len)
348f8c02 842{
07b82ea5
PA
843 struct target_section_table *table = target_get_section_table (ops);
844
845 if (object == TARGET_OBJECT_MEMORY)
846 return section_table_xfer_memory_partial (readbuf, writebuf,
9b409511 847 offset, len, xfered_len,
07b82ea5
PA
848 table->sections,
849 table->sections_end,
850 NULL);
851 else
2ed4b548 852 return TARGET_XFER_E_IO;
348f8c02 853}
c906108c 854\f
c5aa993b 855
c906108c 856void
07b82ea5 857print_section_info (struct target_section_table *t, bfd *abfd)
c906108c 858{
5af949e3 859 struct gdbarch *gdbarch = gdbarch_from_bfd (abfd);
0542c86d 860 struct target_section *p;
17a912b6 861 /* FIXME: 16 is not wide enough when gdbarch_addr_bit > 64. */
5af949e3 862 int wid = gdbarch_addr_bit (gdbarch) <= 32 ? 8 : 16;
c906108c 863
c5aa993b 864 printf_filtered ("\t`%s', ", bfd_get_filename (abfd));
c906108c 865 wrap_here (" ");
a3f17187 866 printf_filtered (_("file type %s.\n"), bfd_get_target (abfd));
c906108c 867 if (abfd == exec_bfd)
51bee8e9 868 {
3e43a32a
MS
869 /* gcc-3.4 does not like the initialization in
870 <p == t->sections_end>. */
d904de5b 871 bfd_vma displacement = 0;
2f1bdd26 872 bfd_vma entry_point;
51bee8e9
JK
873
874 for (p = t->sections; p < t->sections_end; p++)
875 {
2b2848e2
DE
876 struct bfd_section *psect = p->the_bfd_section;
877 bfd *pbfd = psect->owner;
51bee8e9 878
2b2848e2 879 if ((bfd_get_section_flags (pbfd, psect) & (SEC_ALLOC | SEC_LOAD))
51bee8e9
JK
880 != (SEC_ALLOC | SEC_LOAD))
881 continue;
882
2b2848e2
DE
883 if (bfd_get_section_vma (pbfd, psect) <= abfd->start_address
884 && abfd->start_address < (bfd_get_section_vma (pbfd, psect)
885 + bfd_get_section_size (psect)))
51bee8e9 886 {
2b2848e2 887 displacement = p->addr - bfd_get_section_vma (pbfd, psect);
51bee8e9
JK
888 break;
889 }
890 }
891 if (p == t->sections_end)
b37520b6 892 warning (_("Cannot find section for the entry point of %s."),
d904de5b 893 bfd_get_filename (abfd));
51bee8e9 894
2f1bdd26
MGD
895 entry_point = gdbarch_addr_bits_remove (gdbarch,
896 bfd_get_start_address (abfd)
897 + displacement);
51bee8e9 898 printf_filtered (_("\tEntry point: %s\n"),
2f1bdd26 899 paddress (gdbarch, entry_point));
51bee8e9 900 }
07b82ea5 901 for (p = t->sections; p < t->sections_end; p++)
c906108c 902 {
2b2848e2
DE
903 struct bfd_section *psect = p->the_bfd_section;
904 bfd *pbfd = psect->owner;
905
bb599908
PH
906 printf_filtered ("\t%s", hex_string_custom (p->addr, wid));
907 printf_filtered (" - %s", hex_string_custom (p->endaddr, wid));
bcf16802
KB
908
909 /* FIXME: A format of "08l" is not wide enough for file offsets
910 larger than 4GB. OTOH, making it "016l" isn't desirable either
911 since most output will then be much wider than necessary. It
912 may make sense to test the size of the file and choose the
913 format string accordingly. */
a3f17187 914 /* FIXME: i18n: Need to rewrite this sentence. */
c906108c
SS
915 if (info_verbose)
916 printf_filtered (" @ %s",
2b2848e2
DE
917 hex_string_custom (psect->filepos, 8));
918 printf_filtered (" is %s", bfd_section_name (pbfd, psect));
919 if (pbfd != abfd)
920 printf_filtered (" in %s", bfd_get_filename (pbfd));
c906108c
SS
921 printf_filtered ("\n");
922 }
923}
924
925static void
fba45db2 926exec_files_info (struct target_ops *t)
c906108c 927{
57008375
JK
928 if (exec_bfd)
929 print_section_info (current_target_sections, exec_bfd);
930 else
931 puts_filtered (_("\t<no file loaded>\n"));
c906108c
SS
932}
933
934static void
fba45db2 935set_section_command (char *args, int from_tty)
c906108c 936{
0542c86d 937 struct target_section *p;
c906108c
SS
938 char *secname;
939 unsigned seclen;
940 unsigned long secaddr;
941 char secprint[100];
942 long offset;
07b82ea5 943 struct target_section_table *table;
c906108c
SS
944
945 if (args == 0)
8a3fe4f8 946 error (_("Must specify section name and its virtual address"));
c906108c 947
0963b4bd 948 /* Parse out section name. */
c5aa993b 949 for (secname = args; !isspace (*args); args++);
c906108c
SS
950 seclen = args - secname;
951
0963b4bd 952 /* Parse out new virtual address. */
c906108c
SS
953 secaddr = parse_and_eval_address (args);
954
07b82ea5
PA
955 table = current_target_sections;
956 for (p = table->sections; p < table->sections_end; p++)
c5aa993b 957 {
57008375 958 if (!strncmp (secname, bfd_section_name (p->bfd,
3e43a32a 959 p->the_bfd_section), seclen)
57008375 960 && bfd_section_name (p->bfd, p->the_bfd_section)[seclen] == '\0')
c5aa993b
JM
961 {
962 offset = secaddr - p->addr;
963 p->addr += offset;
964 p->endaddr += offset;
965 if (from_tty)
966 exec_files_info (&exec_ops);
967 return;
968 }
c906108c 969 }
c906108c
SS
970 if (seclen >= sizeof (secprint))
971 seclen = sizeof (secprint) - 1;
972 strncpy (secprint, secname, seclen);
973 secprint[seclen] = '\0';
8a3fe4f8 974 error (_("Section %s not found"), secprint);
c906108c
SS
975}
976
30510692
DJ
977/* If we can find a section in FILENAME with BFD index INDEX, adjust
978 it to ADDRESS. */
c1bd25fd
DJ
979
980void
981exec_set_section_address (const char *filename, int index, CORE_ADDR address)
982{
0542c86d 983 struct target_section *p;
07b82ea5 984 struct target_section_table *table;
c1bd25fd 985
07b82ea5
PA
986 table = current_target_sections;
987 for (p = table->sections; p < table->sections_end; p++)
c1bd25fd 988 {
2b2848e2 989 if (filename_cmp (filename, p->the_bfd_section->owner->filename) == 0
30510692 990 && index == p->the_bfd_section->index)
c1bd25fd 991 {
30510692 992 p->endaddr += address - p->addr;
c1bd25fd 993 p->addr = address;
c1bd25fd
DJ
994 }
995 }
996}
997
c906108c
SS
998/* If mourn is being called in all the right places, this could be say
999 `gdb internal error' (since generic_mourn calls
1000 breakpoint_init_inferior). */
1001
1002static int
3db08215
MM
1003ignore (struct target_ops *ops, struct gdbarch *gdbarch,
1004 struct bp_target_info *bp_tgt)
c906108c
SS
1005{
1006 return 0;
1007}
1008
c35b1492
PA
1009static int
1010exec_has_memory (struct target_ops *ops)
1011{
1012 /* We can provide memory if we have any file/target sections to read
1013 from. */
1014 return (current_target_sections->sections
1015 != current_target_sections->sections_end);
1016}
1017
83814951
TT
1018static char *
1019exec_make_note_section (struct target_ops *self, bfd *obfd, int *note_size)
1020{
1021 error (_("Can't create a corefile"));
1022}
be4d1333 1023
c906108c
SS
1024/* Fill in the exec file target vector. Very few entries need to be
1025 defined. */
1026
be4d1333 1027static void
fba45db2 1028init_exec_ops (void)
c906108c
SS
1029{
1030 exec_ops.to_shortname = "exec";
1031 exec_ops.to_longname = "Local exec file";
1032 exec_ops.to_doc = "Use an executable file as a target.\n\
1033Specify the filename of the executable file.";
1adeb98a 1034 exec_ops.to_open = exec_open;
6c95b8df 1035 exec_ops.to_close = exec_close_1;
07b82ea5
PA
1036 exec_ops.to_xfer_partial = exec_xfer_partial;
1037 exec_ops.to_get_section_table = exec_get_section_table;
c906108c
SS
1038 exec_ops.to_files_info = exec_files_info;
1039 exec_ops.to_insert_breakpoint = ignore;
1040 exec_ops.to_remove_breakpoint = ignore;
c906108c 1041 exec_ops.to_stratum = file_stratum;
c35b1492 1042 exec_ops.to_has_memory = exec_has_memory;
be4d1333 1043 exec_ops.to_make_corefile_notes = exec_make_note_section;
b427c1bc 1044 exec_ops.to_find_memory_regions = objfile_find_memory_regions;
c5aa993b 1045 exec_ops.to_magic = OPS_MAGIC;
c906108c
SS
1046}
1047
1048void
fba45db2 1049_initialize_exec (void)
c906108c
SS
1050{
1051 struct cmd_list_element *c;
1052
1053 init_exec_ops ();
1054
1055 if (!dbx_commands)
1056 {
1a966eab
AC
1057 c = add_cmd ("file", class_files, file_command, _("\
1058Use FILE as program to be debugged.\n\
c906108c
SS
1059It is read for its symbols, for getting the contents of pure memory,\n\
1060and it is the program executed when you use the `run' command.\n\
1061If FILE cannot be found as specified, your execution directory path\n\
1062($PATH) is searched for a command of that name.\n\
1a966eab 1063No arg means to have no executable file and no symbols."), &cmdlist);
5ba2abeb 1064 set_cmd_completer (c, filename_completer);
c906108c
SS
1065 }
1066
1a966eab
AC
1067 c = add_cmd ("exec-file", class_files, exec_file_command, _("\
1068Use FILE as program for getting contents of pure memory.\n\
c906108c
SS
1069If FILE cannot be found as specified, your execution directory path\n\
1070is searched for a command of that name.\n\
1a966eab 1071No arg means have no executable file."), &cmdlist);
5ba2abeb 1072 set_cmd_completer (c, filename_completer);
c906108c 1073
1bedd215
AC
1074 add_com ("section", class_files, set_section_command, _("\
1075Change the base address of section SECTION of the exec file to ADDR.\n\
c906108c
SS
1076This can be used if the exec file does not contain section addresses,\n\
1077(such as in the a.out format), or when the addresses specified in the\n\
1078file itself are wrong. Each section must be changed separately. The\n\
1bedd215 1079``info files'' command lists all the sections and their addresses."));
c906108c 1080
5bf193a2
AC
1081 add_setshow_boolean_cmd ("write", class_support, &write_files, _("\
1082Set writing into executable and core files."), _("\
1083Show writing into executable and core files."), NULL,
1084 NULL,
920d2a44 1085 show_write_files,
5bf193a2 1086 &setlist, &showlist);
c5aa993b 1087
9852c492 1088 add_target_with_completer (&exec_ops, filename_completer);
c906108c 1089}
This page took 1.13218 seconds and 4 git commands to generate.