Fix memory leak in ld ARM backend
[deliverable/binutils-gdb.git] / gdb / exec.c
CommitLineData
c906108c 1/* Work with executable files, for GDB.
4646aa9d 2
618f726f 3 Copyright (C) 1988-2016 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "frame.h"
22#include "inferior.h"
23#include "target.h"
24#include "gdbcmd.h"
25#include "language.h"
0ba1096a 26#include "filenames.h"
c906108c
SS
27#include "symfile.h"
28#include "objfiles.h"
c5f0f3d0 29#include "completer.h"
fd0407d6 30#include "value.h"
4646aa9d 31#include "exec.h"
ea53e89f 32#include "observer.h"
dacec2a8 33#include "arch-utils.h"
6c95b8df
PA
34#include "gdbthread.h"
35#include "progspace.h"
cbb099e8 36#include "gdb_bfd.h"
b427c1bc 37#include "gcore.h"
c906108c 38
c906108c 39#include <fcntl.h>
dbda9972 40#include "readline/readline.h"
c906108c
SS
41#include "gdbcore.h"
42
43#include <ctype.h>
53ce3c39 44#include <sys/stat.h>
a9a5a3d1 45#include "solist.h"
c906108c 46
9a4105ab 47void (*deprecated_file_changed_hook) (char *);
c906108c
SS
48
49/* Prototypes for local functions */
50
a14ed312 51static void file_command (char *, int);
c906108c 52
a14ed312 53static void set_section_command (char *, int);
c906108c 54
a14ed312 55static void exec_files_info (struct target_ops *);
c906108c 56
a14ed312 57static void init_exec_ops (void);
c906108c 58
a14ed312 59void _initialize_exec (void);
c906108c 60
c906108c
SS
61/* The target vector for executable files. */
62
e8b2341c 63static struct target_ops exec_ops;
c906108c 64
c906108c
SS
65/* Whether to open exec and core files read-only or read-write. */
66
67int write_files = 0;
920d2a44
AC
68static void
69show_write_files (struct ui_file *file, int from_tty,
70 struct cmd_list_element *c, const char *value)
71{
72 fprintf_filtered (file, _("Writing into executable and core files is %s.\n"),
73 value);
74}
75
c906108c 76
4c42eaff 77static void
014f9477 78exec_open (const char *args, int from_tty)
1adeb98a
FN
79{
80 target_preopen (from_tty);
81 exec_file_attach (args, from_tty);
82}
83
07b82ea5
PA
84/* Close and clear exec_bfd. If we end up with no target sections to
85 read memory from, this unpushes the exec_ops target. */
86
6c95b8df
PA
87void
88exec_close (void)
07b82ea5
PA
89{
90 if (exec_bfd)
91 {
92 bfd *abfd = exec_bfd;
07b82ea5 93
cbb099e8 94 gdb_bfd_unref (abfd);
07b82ea5
PA
95
96 /* Removing target sections may close the exec_ops target.
97 Clear exec_bfd before doing so to prevent recursion. */
98 exec_bfd = NULL;
99 exec_bfd_mtime = 0;
100
046ac79f 101 remove_target_sections (&exec_bfd);
1f0c4988
JK
102
103 xfree (exec_filename);
104 exec_filename = NULL;
07b82ea5
PA
105 }
106}
107
6c95b8df
PA
108/* This is the target_close implementation. Clears all target
109 sections and closes all executable bfds from all program spaces. */
110
c906108c 111static void
de90e03d 112exec_close_1 (struct target_ops *self)
c906108c 113{
ab16fce8
TT
114 struct program_space *ss;
115 struct cleanup *old_chain;
6c95b8df 116
ab16fce8
TT
117 old_chain = save_current_program_space ();
118 ALL_PSPACES (ss)
6c95b8df 119 {
ab16fce8
TT
120 set_current_program_space (ss);
121 clear_section_table (current_target_sections);
122 exec_close ();
6c95b8df 123 }
ab16fce8
TT
124
125 do_cleanups (old_chain);
c906108c
SS
126}
127
1adeb98a
FN
128void
129exec_file_clear (int from_tty)
130{
131 /* Remove exec file. */
6c95b8df 132 exec_close ();
1adeb98a
FN
133
134 if (from_tty)
a3f17187 135 printf_unfiltered (_("No executable file now.\n"));
1adeb98a
FN
136}
137
a10de604
GB
138/* See gdbcore.h. */
139
140void
141exec_file_locate_attach (int pid, int from_tty)
142{
143 char *exec_file, *full_exec_path = NULL;
88178e82 144 struct cleanup *old_chain;
a10de604
GB
145
146 /* Do nothing if we already have an executable filename. */
147 exec_file = (char *) get_exec_file (0);
148 if (exec_file != NULL)
149 return;
150
151 /* Try to determine a filename from the process itself. */
152 exec_file = target_pid_to_exec_file (pid);
153 if (exec_file == NULL)
154 return;
155
a9a5a3d1
GB
156 /* If gdb_sysroot is not empty and the discovered filename
157 is absolute then prefix the filename with gdb_sysroot. */
a3be80c3 158 if (*gdb_sysroot != '\0' && IS_ABSOLUTE_PATH (exec_file))
bf74e428
GB
159 {
160 full_exec_path = exec_file_find (exec_file, NULL);
161 if (full_exec_path == NULL)
162 return;
163 }
164 else
a9a5a3d1
GB
165 {
166 /* It's possible we don't have a full path, but rather just a
167 filename. Some targets, such as HP-UX, don't provide the
168 full path, sigh.
169
170 Attempt to qualify the filename against the source path.
171 (If that fails, we'll just fall back on the original
172 filename. Not much more we can do...) */
173 if (!source_full_path_of (exec_file, &full_exec_path))
174 full_exec_path = xstrdup (exec_file);
175 }
a10de604 176
88178e82
GB
177 old_chain = make_cleanup (xfree, full_exec_path);
178
a10de604
GB
179 exec_file_attach (full_exec_path, from_tty);
180 symbol_file_add_main (full_exec_path, from_tty);
88178e82
GB
181
182 do_cleanups (old_chain);
a10de604
GB
183}
184
907083d1 185/* Set FILENAME as the new exec file.
c906108c 186
c5aa993b
JM
187 This function is intended to be behave essentially the same
188 as exec_file_command, except that the latter will detect when
189 a target is being debugged, and will ask the user whether it
190 should be shut down first. (If the answer is "no", then the
191 new file is ignored.)
c906108c 192
c5aa993b
JM
193 This file is used by exec_file_command, to do the work of opening
194 and processing the exec file after any prompting has happened.
c906108c 195
c5aa993b
JM
196 And, it is used by child_attach, when the attach command was
197 given a pid but not a exec pathname, and the attach command could
198 figure out the pathname from the pid. (In this case, we shouldn't
199 ask the user whether the current target should be shut down --
907083d1 200 we're supplying the exec pathname late for good reason.) */
c906108c
SS
201
202void
5f08566b 203exec_file_attach (const char *filename, int from_tty)
c906108c 204{
9b333ba3
TT
205 struct cleanup *cleanups;
206
207 /* First, acquire a reference to the current exec_bfd. We release
208 this at the end of the function; but acquiring it now lets the
209 BFD cache return it if this call refers to the same file. */
210 gdb_bfd_ref (exec_bfd);
211 cleanups = make_cleanup_bfd_unref (exec_bfd);
212
c906108c 213 /* Remove any previous exec file. */
6c95b8df 214 exec_close ();
c906108c
SS
215
216 /* Now open and digest the file the user requested, if any. */
217
1adeb98a
FN
218 if (!filename)
219 {
220 if (from_tty)
a3f17187 221 printf_unfiltered (_("No executable file now.\n"));
7a107747
DJ
222
223 set_gdbarch_from_file (NULL);
1adeb98a
FN
224 }
225 else
c906108c 226 {
64c0b5de 227 int load_via_target = 0;
1f0c4988 228 char *scratch_pathname, *canonical_pathname;
c906108c 229 int scratch_chan;
07b82ea5 230 struct target_section *sections = NULL, *sections_end = NULL;
d18b8b7a 231 char **matching;
c5aa993b 232
64c0b5de
GB
233 if (is_target_filename (filename))
234 {
235 if (target_filesystem_is_local ())
236 filename += strlen (TARGET_SYSROOT_PREFIX);
237 else
238 load_via_target = 1;
239 }
240
241 if (load_via_target)
c5aa993b 242 {
64c0b5de
GB
243 /* gdb_bfd_fopen does not support "target:" filenames. */
244 if (write_files)
245 warning (_("writing into executable files is "
246 "not supported for %s sysroots"),
247 TARGET_SYSROOT_PREFIX);
248
249 scratch_pathname = xstrdup (filename);
250 make_cleanup (xfree, scratch_pathname);
251
252 scratch_chan = -1;
d7f9d729 253
64c0b5de 254 canonical_pathname = scratch_pathname;
c5aa993b 255 }
64c0b5de
GB
256 else
257 {
258 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
259 filename, write_files ?
260 O_RDWR | O_BINARY : O_RDONLY | O_BINARY,
261 &scratch_pathname);
262#if defined(__GO32__) || defined(_WIN32) || defined(__CYGWIN__)
263 if (scratch_chan < 0)
264 {
0ae1c716 265 char *exename = (char *) alloca (strlen (filename) + 5);
64c0b5de
GB
266
267 strcat (strcpy (exename, filename), ".exe");
268 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
269 exename, write_files ?
270 O_RDWR | O_BINARY
271 : O_RDONLY | O_BINARY,
272 &scratch_pathname);
273 }
c906108c 274#endif
64c0b5de
GB
275 if (scratch_chan < 0)
276 perror_with_name (filename);
a4453b7e 277
64c0b5de 278 make_cleanup (xfree, scratch_pathname);
a4453b7e 279
64c0b5de
GB
280 /* gdb_bfd_open (and its variants) prefers canonicalized
281 pathname for better BFD caching. */
282 canonical_pathname = gdb_realpath (scratch_pathname);
283 make_cleanup (xfree, canonical_pathname);
284 }
1f0c4988 285
64c0b5de 286 if (write_files && !load_via_target)
1f0c4988 287 exec_bfd = gdb_bfd_fopen (canonical_pathname, gnutarget,
1c00ec6b
TT
288 FOPEN_RUB, scratch_chan);
289 else
1f0c4988 290 exec_bfd = gdb_bfd_open (canonical_pathname, gnutarget, scratch_chan);
c906108c
SS
291
292 if (!exec_bfd)
9fe4a216 293 {
d5131498 294 error (_("\"%s\": could not open as an executable file: %s."),
9fe4a216
TT
295 scratch_pathname, bfd_errmsg (bfd_get_error ()));
296 }
c906108c 297
64c0b5de
GB
298 /* gdb_realpath_keepfile resolves symlinks on the local
299 filesystem and so cannot be used for "target:" files. */
1f0c4988 300 gdb_assert (exec_filename == NULL);
64c0b5de
GB
301 if (load_via_target)
302 exec_filename = xstrdup (bfd_get_filename (exec_bfd));
303 else
304 exec_filename = gdb_realpath_keepfile (scratch_pathname);
1f0c4988 305
d18b8b7a 306 if (!bfd_check_format_matches (exec_bfd, bfd_object, &matching))
c906108c
SS
307 {
308 /* Make sure to close exec_bfd, or else "run" might try to use
309 it. */
6c95b8df 310 exec_close ();
8a3fe4f8 311 error (_("\"%s\": not in executable format: %s"),
d18b8b7a
HZ
312 scratch_pathname,
313 gdb_bfd_errmsg (bfd_get_error (), matching));
c906108c
SS
314 }
315
07b82ea5 316 if (build_section_table (exec_bfd, &sections, &sections_end))
c906108c
SS
317 {
318 /* Make sure to close exec_bfd, or else "run" might try to use
319 it. */
6c95b8df 320 exec_close ();
8a3fe4f8 321 error (_("\"%s\": can't find the file sections: %s"),
c906108c
SS
322 scratch_pathname, bfd_errmsg (bfd_get_error ()));
323 }
324
c04ea773
DJ
325 exec_bfd_mtime = bfd_get_mtime (exec_bfd);
326
c906108c
SS
327 validate_files ();
328
329 set_gdbarch_from_file (exec_bfd);
330
07b82ea5 331 /* Add the executable's sections to the current address spaces'
6c95b8df
PA
332 list of sections. This possibly pushes the exec_ops
333 target. */
ed9eebaf 334 add_target_sections (&exec_bfd, sections, sections_end);
07b82ea5 335 xfree (sections);
c906108c
SS
336
337 /* Tell display code (if any) about the changed file name. */
9a4105ab
AC
338 if (deprecated_exec_file_display_hook)
339 (*deprecated_exec_file_display_hook) (filename);
c906108c 340 }
9b333ba3
TT
341
342 do_cleanups (cleanups);
343
ce7d4522 344 bfd_cache_close_all ();
781b42b0 345 observer_notify_executable_changed ();
c906108c
SS
346}
347
348/* Process the first arg in ARGS as the new exec file.
349
c5aa993b
JM
350 Note that we have to explicitly ignore additional args, since we can
351 be called from file_command(), which also calls symbol_file_command()
1adeb98a
FN
352 which can take multiple args.
353
0963b4bd 354 If ARGS is NULL, we just want to close the exec file. */
c906108c 355
1adeb98a 356static void
fba45db2 357exec_file_command (char *args, int from_tty)
c906108c 358{
1adeb98a
FN
359 char **argv;
360 char *filename;
4c42eaff
DJ
361
362 if (from_tty && target_has_execution
363 && !query (_("A program is being debugged already.\n"
364 "Are you sure you want to change the file? ")))
365 error (_("File not changed."));
1adeb98a
FN
366
367 if (args)
368 {
f7545552
TT
369 struct cleanup *cleanups;
370
1adeb98a
FN
371 /* Scan through the args and pick up the first non option arg
372 as the filename. */
373
d1a41061 374 argv = gdb_buildargv (args);
f7545552 375 cleanups = make_cleanup_freeargv (argv);
1adeb98a
FN
376
377 for (; (*argv != NULL) && (**argv == '-'); argv++)
378 {;
379 }
380 if (*argv == NULL)
8a3fe4f8 381 error (_("No executable file name was specified"));
1adeb98a
FN
382
383 filename = tilde_expand (*argv);
384 make_cleanup (xfree, filename);
385 exec_file_attach (filename, from_tty);
f7545552
TT
386
387 do_cleanups (cleanups);
1adeb98a
FN
388 }
389 else
390 exec_file_attach (NULL, from_tty);
c906108c
SS
391}
392
0963b4bd 393/* Set both the exec file and the symbol file, in one command.
c906108c
SS
394 What a novelty. Why did GDB go through four major releases before this
395 command was added? */
396
397static void
fba45db2 398file_command (char *arg, int from_tty)
c906108c
SS
399{
400 /* FIXME, if we lose on reading the symbol file, we should revert
401 the exec file, but that's rough. */
402 exec_file_command (arg, from_tty);
403 symbol_file_command (arg, from_tty);
9a4105ab
AC
404 if (deprecated_file_changed_hook)
405 deprecated_file_changed_hook (arg);
c906108c 406}
c906108c 407\f
c5aa993b 408
0963b4bd 409/* Locate all mappable sections of a BFD file.
c906108c
SS
410 table_pp_char is a char * to get it through bfd_map_over_sections;
411 we cast it back to its proper type. */
412
413static void
7be0c536
AC
414add_to_section_table (bfd *abfd, struct bfd_section *asect,
415 void *table_pp_char)
c906108c 416{
0542c86d 417 struct target_section **table_pp = (struct target_section **) table_pp_char;
c906108c
SS
418 flagword aflag;
419
2b2848e2
DE
420 gdb_assert (abfd == asect->owner);
421
0f5d55d8
JB
422 /* Check the section flags, but do not discard zero-length sections, since
423 some symbols may still be attached to this section. For instance, we
424 encountered on sparc-solaris 2.10 a shared library with an empty .bss
425 section to which a symbol named "_end" was attached. The address
426 of this symbol still needs to be relocated. */
c906108c
SS
427 aflag = bfd_get_section_flags (abfd, asect);
428 if (!(aflag & SEC_ALLOC))
429 return;
0f5d55d8 430
046ac79f 431 (*table_pp)->owner = NULL;
c906108c
SS
432 (*table_pp)->the_bfd_section = asect;
433 (*table_pp)->addr = bfd_section_vma (abfd, asect);
434 (*table_pp)->endaddr = (*table_pp)->addr + bfd_section_size (abfd, asect);
435 (*table_pp)++;
436}
437
a5b1fd27
DE
438/* See exec.h. */
439
440void
441clear_section_table (struct target_section_table *table)
442{
443 xfree (table->sections);
444 table->sections = table->sections_end = NULL;
445}
446
447/* Resize section table TABLE by ADJUSTMENT.
448 ADJUSTMENT may be negative, in which case the caller must have already
449 removed the sections being deleted.
450 Returns the old size. */
451
452static int
453resize_section_table (struct target_section_table *table, int adjustment)
07b82ea5 454{
07b82ea5
PA
455 int old_count;
456 int new_count;
457
07b82ea5
PA
458 old_count = table->sections_end - table->sections;
459
a5b1fd27 460 new_count = adjustment + old_count;
07b82ea5
PA
461
462 if (new_count)
463 {
224c3ddb
SM
464 table->sections = XRESIZEVEC (struct target_section, table->sections,
465 new_count);
07b82ea5
PA
466 table->sections_end = table->sections + new_count;
467 }
468 else
a5b1fd27 469 clear_section_table (table);
07b82ea5
PA
470
471 return old_count;
472}
473
c906108c
SS
474/* Builds a section table, given args BFD, SECTABLE_PTR, SECEND_PTR.
475 Returns 0 if OK, 1 on error. */
476
477int
0542c86d
PA
478build_section_table (struct bfd *some_bfd, struct target_section **start,
479 struct target_section **end)
c906108c
SS
480{
481 unsigned count;
482
483 count = bfd_count_sections (some_bfd);
484 if (*start)
b8c9b27d 485 xfree (* start);
8d749320 486 *start = XNEWVEC (struct target_section, count);
c906108c 487 *end = *start;
c5aa993b 488 bfd_map_over_sections (some_bfd, add_to_section_table, (char *) end);
c906108c 489 if (*end > *start + count)
3e43a32a
MS
490 internal_error (__FILE__, __LINE__,
491 _("failed internal consistency check"));
c906108c
SS
492 /* We could realloc the table, but it probably loses for most files. */
493 return 0;
494}
07b82ea5
PA
495
496/* Add the sections array defined by [SECTIONS..SECTIONS_END[ to the
497 current set of target sections. */
498
499void
046ac79f 500add_target_sections (void *owner,
ed9eebaf 501 struct target_section *sections,
07b82ea5
PA
502 struct target_section *sections_end)
503{
504 int count;
505 struct target_section_table *table = current_target_sections;
506
507 count = sections_end - sections;
508
509 if (count > 0)
510 {
511 int space = resize_section_table (table, count);
ed9eebaf 512 int i;
d7f9d729 513
ed9eebaf
TT
514 for (i = 0; i < count; ++i)
515 {
516 table->sections[space + i] = sections[i];
046ac79f 517 table->sections[space + i].owner = owner;
ed9eebaf 518 }
07b82ea5
PA
519
520 /* If these are the first file sections we can provide memory
521 from, push the file_stratum target. */
ab16fce8
TT
522 if (!target_is_pushed (&exec_ops))
523 push_target (&exec_ops);
07b82ea5
PA
524 }
525}
526
76ad5e1e
NB
527/* Add the sections of OBJFILE to the current set of target sections. */
528
529void
530add_target_sections_of_objfile (struct objfile *objfile)
531{
532 struct target_section_table *table = current_target_sections;
533 struct obj_section *osect;
534 int space;
535 unsigned count = 0;
536 struct target_section *ts;
537
538 if (objfile == NULL)
539 return;
540
541 /* Compute the number of sections to add. */
542 ALL_OBJFILE_OSECTIONS (objfile, osect)
543 {
544 if (bfd_get_section_size (osect->the_bfd_section) == 0)
545 continue;
546 count++;
547 }
548
549 if (count == 0)
550 return;
551
552 space = resize_section_table (table, count);
553
554 ts = table->sections + space;
555
556 ALL_OBJFILE_OSECTIONS (objfile, osect)
557 {
558 if (bfd_get_section_size (osect->the_bfd_section) == 0)
559 continue;
560
561 gdb_assert (ts < table->sections + space + count);
562
563 ts->addr = obj_section_addr (osect);
564 ts->endaddr = obj_section_endaddr (osect);
565 ts->the_bfd_section = osect->the_bfd_section;
566 ts->owner = (void *) objfile;
567
568 ts++;
569 }
570}
571
046ac79f
JK
572/* Remove all target sections owned by OWNER.
573 OWNER must be the same value passed to add_target_sections. */
07b82ea5
PA
574
575void
046ac79f 576remove_target_sections (void *owner)
07b82ea5
PA
577{
578 struct target_section *src, *dest;
07b82ea5
PA
579 struct target_section_table *table = current_target_sections;
580
046ac79f
JK
581 gdb_assert (owner != NULL);
582
07b82ea5
PA
583 dest = table->sections;
584 for (src = table->sections; src < table->sections_end; src++)
046ac79f 585 if (src->owner != owner)
07b82ea5
PA
586 {
587 /* Keep this section. */
588 if (dest < src)
589 *dest = *src;
590 dest++;
591 }
592
593 /* If we've dropped any sections, resize the section table. */
594 if (dest < src)
595 {
596 int old_count;
597
598 old_count = resize_section_table (table, dest - src);
599
600 /* If we don't have any more sections to read memory from,
601 remove the file_stratum target from the stack. */
602 if (old_count + (dest - src) == 0)
6c95b8df
PA
603 {
604 struct program_space *pspace;
605
606 ALL_PSPACES (pspace)
607 if (pspace->target_sections.sections
608 != pspace->target_sections.sections_end)
609 return;
610
611 unpush_target (&exec_ops);
612 }
07b82ea5
PA
613 }
614}
615
c906108c 616\f
348f8c02 617
1ca49d37
YQ
618enum target_xfer_status
619exec_read_partial_read_only (gdb_byte *readbuf, ULONGEST offset,
620 ULONGEST len, ULONGEST *xfered_len)
621{
622 /* It's unduly pedantic to refuse to look at the executable for
623 read-only pieces; so do the equivalent of readonly regions aka
624 QTro packet. */
625 if (exec_bfd != NULL)
626 {
627 asection *s;
628 bfd_size_type size;
629 bfd_vma vma;
630
631 for (s = exec_bfd->sections; s; s = s->next)
632 {
633 if ((s->flags & SEC_LOAD) == 0
634 || (s->flags & SEC_READONLY) == 0)
635 continue;
636
637 vma = s->vma;
638 size = bfd_get_section_size (s);
639 if (vma <= offset && offset < (vma + size))
640 {
641 ULONGEST amt;
642
643 amt = (vma + size) - offset;
644 if (amt > len)
645 amt = len;
646
647 amt = bfd_get_section_contents (exec_bfd, s,
648 readbuf, offset - vma, amt);
649
650 if (amt == 0)
651 return TARGET_XFER_EOF;
652 else
653 {
654 *xfered_len = amt;
655 return TARGET_XFER_OK;
656 }
657 }
658 }
659 }
660
661 /* Indicate failure to find the requested memory block. */
662 return TARGET_XFER_E_IO;
663}
664
5a2eb0ef
YQ
665/* Appends all read-only memory ranges found in the target section
666 table defined by SECTIONS and SECTIONS_END, starting at (and
667 intersected with) MEMADDR for LEN bytes. Returns the augmented
668 VEC. */
669
670static VEC(mem_range_s) *
e6ca34fc 671section_table_available_memory (VEC(mem_range_s) *memory,
424447ee 672 CORE_ADDR memaddr, ULONGEST len,
e6ca34fc
PA
673 struct target_section *sections,
674 struct target_section *sections_end)
675{
676 struct target_section *p;
e6ca34fc
PA
677
678 for (p = sections; p < sections_end; p++)
679 {
2b2848e2
DE
680 if ((bfd_get_section_flags (p->the_bfd_section->owner,
681 p->the_bfd_section)
e6ca34fc
PA
682 & SEC_READONLY) == 0)
683 continue;
684
685 /* Copy the meta-data, adjusted. */
686 if (mem_ranges_overlap (p->addr, p->endaddr - p->addr, memaddr, len))
687 {
688 ULONGEST lo1, hi1, lo2, hi2;
689 struct mem_range *r;
690
691 lo1 = memaddr;
692 hi1 = memaddr + len;
693
694 lo2 = p->addr;
695 hi2 = p->endaddr;
696
697 r = VEC_safe_push (mem_range_s, memory, NULL);
698
699 r->start = max (lo1, lo2);
700 r->length = min (hi1, hi2) - r->start;
701 }
702 }
703
704 return memory;
705}
706
1ee79381
YQ
707enum target_xfer_status
708section_table_read_available_memory (gdb_byte *readbuf, ULONGEST offset,
709 ULONGEST len, ULONGEST *xfered_len)
710{
711 VEC(mem_range_s) *available_memory = NULL;
712 struct target_section_table *table;
713 struct cleanup *old_chain;
714 mem_range_s *r;
715 int i;
716
717 table = target_get_section_table (&exec_ops);
718 available_memory = section_table_available_memory (available_memory,
719 offset, len,
720 table->sections,
721 table->sections_end);
722
723 old_chain = make_cleanup (VEC_cleanup(mem_range_s),
724 &available_memory);
725
726 normalize_mem_ranges (available_memory);
727
728 for (i = 0;
729 VEC_iterate (mem_range_s, available_memory, i, r);
730 i++)
731 {
732 if (mem_ranges_overlap (r->start, r->length, offset, len))
733 {
734 CORE_ADDR end;
735 enum target_xfer_status status;
736
737 /* Get the intersection window. */
738 end = min (offset + len, r->start + r->length);
739
740 gdb_assert (end - offset <= len);
741
742 if (offset >= r->start)
743 status = exec_read_partial_read_only (readbuf, offset,
744 end - offset,
745 xfered_len);
746 else
747 {
748 *xfered_len = r->start - offset;
bc113b4e 749 status = TARGET_XFER_UNAVAILABLE;
1ee79381
YQ
750 }
751 do_cleanups (old_chain);
752 return status;
753 }
754 }
755 do_cleanups (old_chain);
756
757 *xfered_len = len;
bc113b4e 758 return TARGET_XFER_UNAVAILABLE;
1ee79381
YQ
759}
760
9b409511 761enum target_xfer_status
07b82ea5 762section_table_xfer_memory_partial (gdb_byte *readbuf, const gdb_byte *writebuf,
b55e14c7 763 ULONGEST offset, ULONGEST len,
9b409511 764 ULONGEST *xfered_len,
07b82ea5
PA
765 struct target_section *sections,
766 struct target_section *sections_end,
767 const char *section_name)
c906108c 768{
020cc13c 769 int res;
0542c86d 770 struct target_section *p;
07b82ea5
PA
771 ULONGEST memaddr = offset;
772 ULONGEST memend = memaddr + len;
c906108c 773
b55e14c7 774 if (len == 0)
3e43a32a
MS
775 internal_error (__FILE__, __LINE__,
776 _("failed internal consistency check"));
c906108c 777
348f8c02 778 for (p = sections; p < sections_end; p++)
c906108c 779 {
2b2848e2
DE
780 struct bfd_section *asect = p->the_bfd_section;
781 bfd *abfd = asect->owner;
782
783 if (section_name && strcmp (section_name, asect->name) != 0)
0963b4bd 784 continue; /* not the section we need. */
c906108c 785 if (memaddr >= p->addr)
3db26b01
JB
786 {
787 if (memend <= p->endaddr)
788 {
789 /* Entire transfer is within this section. */
07b82ea5 790 if (writebuf)
2b2848e2 791 res = bfd_set_section_contents (abfd, asect,
07b82ea5 792 writebuf, memaddr - p->addr,
85302095
AC
793 len);
794 else
2b2848e2 795 res = bfd_get_section_contents (abfd, asect,
07b82ea5 796 readbuf, memaddr - p->addr,
85302095 797 len);
9b409511
YQ
798
799 if (res != 0)
800 {
801 *xfered_len = len;
802 return TARGET_XFER_OK;
803 }
804 else
805 return TARGET_XFER_EOF;
3db26b01
JB
806 }
807 else if (memaddr >= p->endaddr)
808 {
809 /* This section ends before the transfer starts. */
810 continue;
811 }
812 else
813 {
814 /* This section overlaps the transfer. Just do half. */
815 len = p->endaddr - memaddr;
07b82ea5 816 if (writebuf)
2b2848e2 817 res = bfd_set_section_contents (abfd, asect,
07b82ea5 818 writebuf, memaddr - p->addr,
85302095
AC
819 len);
820 else
2b2848e2 821 res = bfd_get_section_contents (abfd, asect,
07b82ea5 822 readbuf, memaddr - p->addr,
85302095 823 len);
9b409511
YQ
824 if (res != 0)
825 {
826 *xfered_len = len;
827 return TARGET_XFER_OK;
828 }
829 else
830 return TARGET_XFER_EOF;
3db26b01
JB
831 }
832 }
c906108c
SS
833 }
834
9b409511 835 return TARGET_XFER_EOF; /* We can't help. */
c906108c 836}
348f8c02 837
70221824 838static struct target_section_table *
07b82ea5 839exec_get_section_table (struct target_ops *ops)
348f8c02 840{
07b82ea5 841 return current_target_sections;
348f8c02
PA
842}
843
9b409511 844static enum target_xfer_status
07b82ea5
PA
845exec_xfer_partial (struct target_ops *ops, enum target_object object,
846 const char *annex, gdb_byte *readbuf,
847 const gdb_byte *writebuf,
9b409511 848 ULONGEST offset, ULONGEST len, ULONGEST *xfered_len)
348f8c02 849{
07b82ea5
PA
850 struct target_section_table *table = target_get_section_table (ops);
851
852 if (object == TARGET_OBJECT_MEMORY)
853 return section_table_xfer_memory_partial (readbuf, writebuf,
9b409511 854 offset, len, xfered_len,
07b82ea5
PA
855 table->sections,
856 table->sections_end,
857 NULL);
858 else
2ed4b548 859 return TARGET_XFER_E_IO;
348f8c02 860}
c906108c 861\f
c5aa993b 862
c906108c 863void
07b82ea5 864print_section_info (struct target_section_table *t, bfd *abfd)
c906108c 865{
5af949e3 866 struct gdbarch *gdbarch = gdbarch_from_bfd (abfd);
0542c86d 867 struct target_section *p;
17a912b6 868 /* FIXME: 16 is not wide enough when gdbarch_addr_bit > 64. */
5af949e3 869 int wid = gdbarch_addr_bit (gdbarch) <= 32 ? 8 : 16;
c906108c 870
c5aa993b 871 printf_filtered ("\t`%s', ", bfd_get_filename (abfd));
c906108c 872 wrap_here (" ");
a3f17187 873 printf_filtered (_("file type %s.\n"), bfd_get_target (abfd));
c906108c 874 if (abfd == exec_bfd)
51bee8e9 875 {
3e43a32a
MS
876 /* gcc-3.4 does not like the initialization in
877 <p == t->sections_end>. */
d904de5b 878 bfd_vma displacement = 0;
2f1bdd26 879 bfd_vma entry_point;
51bee8e9
JK
880
881 for (p = t->sections; p < t->sections_end; p++)
882 {
2b2848e2
DE
883 struct bfd_section *psect = p->the_bfd_section;
884 bfd *pbfd = psect->owner;
51bee8e9 885
2b2848e2 886 if ((bfd_get_section_flags (pbfd, psect) & (SEC_ALLOC | SEC_LOAD))
51bee8e9
JK
887 != (SEC_ALLOC | SEC_LOAD))
888 continue;
889
2b2848e2
DE
890 if (bfd_get_section_vma (pbfd, psect) <= abfd->start_address
891 && abfd->start_address < (bfd_get_section_vma (pbfd, psect)
892 + bfd_get_section_size (psect)))
51bee8e9 893 {
2b2848e2 894 displacement = p->addr - bfd_get_section_vma (pbfd, psect);
51bee8e9
JK
895 break;
896 }
897 }
898 if (p == t->sections_end)
b37520b6 899 warning (_("Cannot find section for the entry point of %s."),
d904de5b 900 bfd_get_filename (abfd));
51bee8e9 901
2f1bdd26
MGD
902 entry_point = gdbarch_addr_bits_remove (gdbarch,
903 bfd_get_start_address (abfd)
904 + displacement);
51bee8e9 905 printf_filtered (_("\tEntry point: %s\n"),
2f1bdd26 906 paddress (gdbarch, entry_point));
51bee8e9 907 }
07b82ea5 908 for (p = t->sections; p < t->sections_end; p++)
c906108c 909 {
2b2848e2
DE
910 struct bfd_section *psect = p->the_bfd_section;
911 bfd *pbfd = psect->owner;
912
bb599908
PH
913 printf_filtered ("\t%s", hex_string_custom (p->addr, wid));
914 printf_filtered (" - %s", hex_string_custom (p->endaddr, wid));
bcf16802
KB
915
916 /* FIXME: A format of "08l" is not wide enough for file offsets
917 larger than 4GB. OTOH, making it "016l" isn't desirable either
918 since most output will then be much wider than necessary. It
919 may make sense to test the size of the file and choose the
920 format string accordingly. */
a3f17187 921 /* FIXME: i18n: Need to rewrite this sentence. */
c906108c
SS
922 if (info_verbose)
923 printf_filtered (" @ %s",
2b2848e2
DE
924 hex_string_custom (psect->filepos, 8));
925 printf_filtered (" is %s", bfd_section_name (pbfd, psect));
926 if (pbfd != abfd)
927 printf_filtered (" in %s", bfd_get_filename (pbfd));
c906108c
SS
928 printf_filtered ("\n");
929 }
930}
931
932static void
fba45db2 933exec_files_info (struct target_ops *t)
c906108c 934{
57008375
JK
935 if (exec_bfd)
936 print_section_info (current_target_sections, exec_bfd);
937 else
938 puts_filtered (_("\t<no file loaded>\n"));
c906108c
SS
939}
940
941static void
fba45db2 942set_section_command (char *args, int from_tty)
c906108c 943{
0542c86d 944 struct target_section *p;
c906108c
SS
945 char *secname;
946 unsigned seclen;
947 unsigned long secaddr;
948 char secprint[100];
949 long offset;
07b82ea5 950 struct target_section_table *table;
c906108c
SS
951
952 if (args == 0)
8a3fe4f8 953 error (_("Must specify section name and its virtual address"));
c906108c 954
0963b4bd 955 /* Parse out section name. */
c5aa993b 956 for (secname = args; !isspace (*args); args++);
c906108c
SS
957 seclen = args - secname;
958
0963b4bd 959 /* Parse out new virtual address. */
c906108c
SS
960 secaddr = parse_and_eval_address (args);
961
07b82ea5
PA
962 table = current_target_sections;
963 for (p = table->sections; p < table->sections_end; p++)
c5aa993b 964 {
57008375 965 if (!strncmp (secname, bfd_section_name (p->bfd,
3e43a32a 966 p->the_bfd_section), seclen)
57008375 967 && bfd_section_name (p->bfd, p->the_bfd_section)[seclen] == '\0')
c5aa993b
JM
968 {
969 offset = secaddr - p->addr;
970 p->addr += offset;
971 p->endaddr += offset;
972 if (from_tty)
973 exec_files_info (&exec_ops);
974 return;
975 }
c906108c 976 }
c906108c
SS
977 if (seclen >= sizeof (secprint))
978 seclen = sizeof (secprint) - 1;
979 strncpy (secprint, secname, seclen);
980 secprint[seclen] = '\0';
8a3fe4f8 981 error (_("Section %s not found"), secprint);
c906108c
SS
982}
983
30510692
DJ
984/* If we can find a section in FILENAME with BFD index INDEX, adjust
985 it to ADDRESS. */
c1bd25fd
DJ
986
987void
988exec_set_section_address (const char *filename, int index, CORE_ADDR address)
989{
0542c86d 990 struct target_section *p;
07b82ea5 991 struct target_section_table *table;
c1bd25fd 992
07b82ea5
PA
993 table = current_target_sections;
994 for (p = table->sections; p < table->sections_end; p++)
c1bd25fd 995 {
2b2848e2 996 if (filename_cmp (filename, p->the_bfd_section->owner->filename) == 0
30510692 997 && index == p->the_bfd_section->index)
c1bd25fd 998 {
30510692 999 p->endaddr += address - p->addr;
c1bd25fd 1000 p->addr = address;
c1bd25fd
DJ
1001 }
1002 }
1003}
1004
c906108c
SS
1005/* If mourn is being called in all the right places, this could be say
1006 `gdb internal error' (since generic_mourn calls
1007 breakpoint_init_inferior). */
1008
1009static int
3db08215
MM
1010ignore (struct target_ops *ops, struct gdbarch *gdbarch,
1011 struct bp_target_info *bp_tgt)
c906108c
SS
1012{
1013 return 0;
1014}
1015
c35b1492
PA
1016static int
1017exec_has_memory (struct target_ops *ops)
1018{
1019 /* We can provide memory if we have any file/target sections to read
1020 from. */
1021 return (current_target_sections->sections
1022 != current_target_sections->sections_end);
1023}
1024
83814951
TT
1025static char *
1026exec_make_note_section (struct target_ops *self, bfd *obfd, int *note_size)
1027{
1028 error (_("Can't create a corefile"));
1029}
be4d1333 1030
c906108c
SS
1031/* Fill in the exec file target vector. Very few entries need to be
1032 defined. */
1033
be4d1333 1034static void
fba45db2 1035init_exec_ops (void)
c906108c
SS
1036{
1037 exec_ops.to_shortname = "exec";
1038 exec_ops.to_longname = "Local exec file";
1039 exec_ops.to_doc = "Use an executable file as a target.\n\
1040Specify the filename of the executable file.";
1adeb98a 1041 exec_ops.to_open = exec_open;
6c95b8df 1042 exec_ops.to_close = exec_close_1;
07b82ea5
PA
1043 exec_ops.to_xfer_partial = exec_xfer_partial;
1044 exec_ops.to_get_section_table = exec_get_section_table;
c906108c
SS
1045 exec_ops.to_files_info = exec_files_info;
1046 exec_ops.to_insert_breakpoint = ignore;
1047 exec_ops.to_remove_breakpoint = ignore;
c906108c 1048 exec_ops.to_stratum = file_stratum;
c35b1492 1049 exec_ops.to_has_memory = exec_has_memory;
be4d1333 1050 exec_ops.to_make_corefile_notes = exec_make_note_section;
b427c1bc 1051 exec_ops.to_find_memory_regions = objfile_find_memory_regions;
c5aa993b 1052 exec_ops.to_magic = OPS_MAGIC;
c906108c
SS
1053}
1054
1055void
fba45db2 1056_initialize_exec (void)
c906108c
SS
1057{
1058 struct cmd_list_element *c;
1059
1060 init_exec_ops ();
1061
1062 if (!dbx_commands)
1063 {
1a966eab
AC
1064 c = add_cmd ("file", class_files, file_command, _("\
1065Use FILE as program to be debugged.\n\
c906108c
SS
1066It is read for its symbols, for getting the contents of pure memory,\n\
1067and it is the program executed when you use the `run' command.\n\
1068If FILE cannot be found as specified, your execution directory path\n\
1069($PATH) is searched for a command of that name.\n\
1a966eab 1070No arg means to have no executable file and no symbols."), &cmdlist);
5ba2abeb 1071 set_cmd_completer (c, filename_completer);
c906108c
SS
1072 }
1073
1a966eab
AC
1074 c = add_cmd ("exec-file", class_files, exec_file_command, _("\
1075Use FILE as program for getting contents of pure memory.\n\
c906108c
SS
1076If FILE cannot be found as specified, your execution directory path\n\
1077is searched for a command of that name.\n\
1a966eab 1078No arg means have no executable file."), &cmdlist);
5ba2abeb 1079 set_cmd_completer (c, filename_completer);
c906108c 1080
1bedd215
AC
1081 add_com ("section", class_files, set_section_command, _("\
1082Change the base address of section SECTION of the exec file to ADDR.\n\
c906108c
SS
1083This can be used if the exec file does not contain section addresses,\n\
1084(such as in the a.out format), or when the addresses specified in the\n\
1085file itself are wrong. Each section must be changed separately. The\n\
1bedd215 1086``info files'' command lists all the sections and their addresses."));
c906108c 1087
5bf193a2
AC
1088 add_setshow_boolean_cmd ("write", class_support, &write_files, _("\
1089Set writing into executable and core files."), _("\
1090Show writing into executable and core files."), NULL,
1091 NULL,
920d2a44 1092 show_write_files,
5bf193a2 1093 &setlist, &showlist);
c5aa993b 1094
9852c492 1095 add_target_with_completer (&exec_ops, filename_completer);
c906108c 1096}
This page took 1.521943 seconds and 4 git commands to generate.