Ensure 'exec-file has changed' check has priority over 'exec-file-mismatch' check
[deliverable/binutils-gdb.git] / gdb / exec.c
CommitLineData
c906108c 1/* Work with executable files, for GDB.
4646aa9d 2
b811d2c2 3 Copyright (C) 1988-2020 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "frame.h"
d55e5aa6 22#include "inferior.h"
4de283e4
TT
23#include "target.h"
24#include "gdbcmd.h"
c906108c 25#include "language.h"
4de283e4
TT
26#include "filenames.h"
27#include "symfile.h"
c906108c 28#include "objfiles.h"
4de283e4
TT
29#include "completer.h"
30#include "value.h"
31#include "exec.h"
76727919 32#include "observable.h"
4de283e4
TT
33#include "arch-utils.h"
34#include "gdbthread.h"
6c95b8df 35#include "progspace.h"
53af73bf 36#include "progspace-and-thread.h"
4de283e4
TT
37#include "gdb_bfd.h"
38#include "gcore.h"
39#include "source.h"
98c59b52 40#include "build-id.h"
4de283e4
TT
41
42#include <fcntl.h>
e0eac551 43#include "readline/tilde.h"
4de283e4
TT
44#include "gdbcore.h"
45
46#include <ctype.h>
47#include <sys/stat.h>
a9a5a3d1 48#include "solist.h"
4de283e4 49#include <algorithm>
268a13a5 50#include "gdbsupport/pathstuff.h"
a2fedca9 51#include "cli/cli-style.h"
c906108c 52
1d8b34a7 53void (*deprecated_file_changed_hook) (const char *);
c906108c 54
d9f719f1
PA
55static const target_info exec_target_info = {
56 "exec",
57 N_("Local exec file"),
58 N_("Use an executable file as a target.\n\
59Specify the filename of the executable file.")
60};
61
c906108c
SS
62/* The target vector for executable files. */
63
f6ac5f3d
PA
64struct exec_target final : public target_ops
65{
d9f719f1
PA
66 const target_info &info () const override
67 { return exec_target_info; }
f6ac5f3d 68
66b4deae
PA
69 strata stratum () const override { return file_stratum; }
70
f6ac5f3d
PA
71 void close () override;
72 enum target_xfer_status xfer_partial (enum target_object object,
73 const char *annex,
74 gdb_byte *readbuf,
75 const gdb_byte *writebuf,
76 ULONGEST offset, ULONGEST len,
77 ULONGEST *xfered_len) override;
78 struct target_section_table *get_section_table () override;
79 void files_info () override;
80
57810aa7 81 bool has_memory () override;
f6ac5f3d
PA
82 char *make_corefile_notes (bfd *, int *) override;
83 int find_memory_regions (find_memory_region_ftype func, void *data) override;
84};
85
86static exec_target exec_ops;
c906108c 87
a2fedca9
PW
88/* How to handle a mismatch between the current exec file and the exec
89 file determined from target. */
90
91static const char *const exec_file_mismatch_names[]
92 = {"ask", "warn", "off", NULL };
93enum exec_file_mismatch_mode
94 {
95 exec_file_mismatch_ask, exec_file_mismatch_warn, exec_file_mismatch_off
96 };
97static const char *exec_file_mismatch = exec_file_mismatch_names[0];
98static enum exec_file_mismatch_mode exec_file_mismatch_mode
99 = exec_file_mismatch_ask;
100
101/* Show command. */
102static void
103show_exec_file_mismatch_command (struct ui_file *file, int from_tty,
104 struct cmd_list_element *c, const char *value)
105{
106 fprintf_filtered (gdb_stdout,
107 _("exec-file-mismatch handling is currently \"%s\".\n"),
108 exec_file_mismatch_names[exec_file_mismatch_mode]);
109}
110
111/* Set command. Change the setting for range checking. */
112static void
113set_exec_file_mismatch_command (const char *ignore,
114 int from_tty, struct cmd_list_element *c)
115{
116 for (enum exec_file_mismatch_mode mode = exec_file_mismatch_ask;
117 ;
118 mode = static_cast<enum exec_file_mismatch_mode>(1 + (int) mode))
119 {
120 if (strcmp (exec_file_mismatch, exec_file_mismatch_names[mode]) == 0)
121 {
122 exec_file_mismatch_mode = mode;
123 return;
124 }
125 if (mode == exec_file_mismatch_off)
126 internal_error (__FILE__, __LINE__,
127 _("Unrecognized exec-file-mismatch setting: \"%s\""),
128 exec_file_mismatch);
129 }
130}
131
c906108c
SS
132/* Whether to open exec and core files read-only or read-write. */
133
491144b5 134bool write_files = false;
920d2a44
AC
135static void
136show_write_files (struct ui_file *file, int from_tty,
137 struct cmd_list_element *c, const char *value)
138{
139 fprintf_filtered (file, _("Writing into executable and core files is %s.\n"),
140 value);
141}
142
c906108c 143
d9f719f1
PA
144static void
145exec_target_open (const char *args, int from_tty)
1adeb98a
FN
146{
147 target_preopen (from_tty);
148 exec_file_attach (args, from_tty);
149}
150
07b82ea5
PA
151/* Close and clear exec_bfd. If we end up with no target sections to
152 read memory from, this unpushes the exec_ops target. */
153
6c95b8df
PA
154void
155exec_close (void)
07b82ea5
PA
156{
157 if (exec_bfd)
158 {
159 bfd *abfd = exec_bfd;
07b82ea5 160
cbb099e8 161 gdb_bfd_unref (abfd);
07b82ea5
PA
162
163 /* Removing target sections may close the exec_ops target.
164 Clear exec_bfd before doing so to prevent recursion. */
165 exec_bfd = NULL;
166 exec_bfd_mtime = 0;
167
046ac79f 168 remove_target_sections (&exec_bfd);
1f0c4988
JK
169
170 xfree (exec_filename);
171 exec_filename = NULL;
07b82ea5
PA
172 }
173}
174
6c95b8df
PA
175/* This is the target_close implementation. Clears all target
176 sections and closes all executable bfds from all program spaces. */
177
f6ac5f3d
PA
178void
179exec_target::close ()
c906108c 180{
5ed8105e 181 scoped_restore_current_program_space restore_pspace;
6c95b8df 182
94c93c35 183 for (struct program_space *ss : program_spaces)
5ed8105e
PA
184 {
185 set_current_program_space (ss);
186 clear_section_table (current_target_sections);
187 exec_close ();
188 }
c906108c
SS
189}
190
f6ac5f3d 191/* See gdbcore.h. */
a10de604
GB
192
193void
ecf45d2c
SL
194try_open_exec_file (const char *exec_file_host, struct inferior *inf,
195 symfile_add_flags add_flags)
a10de604 196{
cc06b668 197 struct gdb_exception prev_err;
a10de604 198
57d1de9c
LM
199 /* exec_file_attach and symbol_file_add_main may throw an error if the file
200 cannot be opened either locally or remotely.
201
202 This happens for example, when the file is first found in the local
203 sysroot (above), and then disappears (a TOCTOU race), or when it doesn't
204 exist in the target filesystem, or when the file does exist, but
205 is not readable.
88178e82 206
57d1de9c
LM
207 Even without a symbol file, the remote-based debugging session should
208 continue normally instead of ending abruptly. Hence we catch thrown
209 errors/exceptions in the following code. */
a70b8144 210 try
57d1de9c 211 {
ecf45d2c
SL
212 /* We must do this step even if exec_file_host is NULL, so that
213 exec_file_attach will clear state. */
214 exec_file_attach (exec_file_host, add_flags & SYMFILE_VERBOSE);
57d1de9c 215 }
94aeb44b 216 catch (gdb_exception_error &err)
57d1de9c
LM
217 {
218 if (err.message != NULL)
3d6e9d23 219 warning ("%s", err.what ());
57d1de9c 220
94aeb44b 221 prev_err = std::move (err);
57d1de9c 222 }
57d1de9c 223
ecf45d2c 224 if (exec_file_host != NULL)
57d1de9c 225 {
a70b8144 226 try
ecf45d2c
SL
227 {
228 symbol_file_add_main (exec_file_host, add_flags);
229 }
230d2906 230 catch (const gdb_exception_error &err)
ecf45d2c
SL
231 {
232 if (!exception_print_same (prev_err, err))
3d6e9d23 233 warning ("%s", err.what ());
ecf45d2c 234 }
57d1de9c 235 }
ecf45d2c
SL
236}
237
238/* See gdbcore.h. */
239
a2fedca9
PW
240void
241validate_exec_file (int from_tty)
242{
243 /* If user asked to ignore the mismatch, do nothing. */
244 if (exec_file_mismatch_mode == exec_file_mismatch_off)
245 return;
246
247 const char *current_exec_file = get_exec_file (0);
248 struct inferior *inf = current_inferior ();
249 /* Try to determine a filename from the process itself. */
250 const char *pid_exec_file = target_pid_to_exec_file (inf->pid);
98c59b52 251 bool build_id_mismatch = false;
a2fedca9 252
98c59b52 253 /* If we cannot validate the exec file, return. */
a2fedca9
PW
254 if (current_exec_file == NULL || pid_exec_file == NULL)
255 return;
256
98c59b52
PA
257 /* Try validating via build-id, if available. This is the most
258 reliable check. */
48e9cc84
PW
259
260 /* In case current_exec_file was changed, reopen_exec_file ensures
261 an up to date build_id (will do nothing if the file timestamp
262 did not change). If exec file changed, reopen_exec_file has
263 allocated another file name, so get_exec_file again. */
264 reopen_exec_file ();
265 current_exec_file = get_exec_file (0);
266
98c59b52
PA
267 const bfd_build_id *exec_file_build_id = build_id_bfd_get (exec_bfd);
268 if (exec_file_build_id != nullptr)
269 {
270 /* Prepend the target prefix, to force gdb_bfd_open to open the
271 file on the remote file system (if indeed remote). */
272 std::string target_pid_exec_file
273 = std::string (TARGET_SYSROOT_PREFIX) + pid_exec_file;
274
275 gdb_bfd_ref_ptr abfd (gdb_bfd_open (target_pid_exec_file.c_str (),
276 gnutarget, -1, false));
277 if (abfd != nullptr)
278 {
279 const bfd_build_id *target_exec_file_build_id
280 = build_id_bfd_get (abfd.get ());
a2fedca9 281
98c59b52
PA
282 if (target_exec_file_build_id != nullptr)
283 {
284 if (exec_file_build_id->size == target_exec_file_build_id->size
285 && memcmp (exec_file_build_id->data,
286 target_exec_file_build_id->data,
287 exec_file_build_id->size) == 0)
288 {
289 /* Match. */
290 return;
291 }
292 else
293 build_id_mismatch = true;
294 }
295 }
296 }
a2fedca9 297
98c59b52 298 if (build_id_mismatch)
a2fedca9 299 {
98c59b52
PA
300 std::string exec_file_target (pid_exec_file);
301
302 /* In case the exec file is not local, exec_file_target has to point at
303 the target file system. */
304 if (is_target_filename (current_exec_file) && !target_filesystem_is_local ())
305 exec_file_target = TARGET_SYSROOT_PREFIX + exec_file_target;
306
a2fedca9
PW
307 warning
308 (_("Mismatch between current exec-file %ps\n"
309 "and automatically determined exec-file %ps\n"
310 "exec-file-mismatch handling is currently \"%s\""),
311 styled_string (file_name_style.style (), current_exec_file),
312 styled_string (file_name_style.style (), exec_file_target.c_str ()),
313 exec_file_mismatch_names[exec_file_mismatch_mode]);
314 if (exec_file_mismatch_mode == exec_file_mismatch_ask)
315 {
316 symfile_add_flags add_flags = SYMFILE_MAINLINE;
317 if (from_tty)
318 add_flags |= SYMFILE_VERBOSE;
319 try
320 {
321 symbol_file_add_main (exec_file_target.c_str (), add_flags);
322 exec_file_attach (exec_file_target.c_str (), from_tty);
323 }
324 catch (gdb_exception_error &err)
325 {
326 warning (_("loading %ps %s"),
327 styled_string (file_name_style.style (),
328 exec_file_target.c_str ()),
329 err.message != NULL ? err.what () : "error");
330 }
331 }
332 }
333}
334
335/* See gdbcore.h. */
336
ecf45d2c
SL
337void
338exec_file_locate_attach (int pid, int defer_bp_reset, int from_tty)
339{
797bc1cb 340 char *exec_file_target;
ecf45d2c
SL
341 symfile_add_flags add_flags = 0;
342
343 /* Do nothing if we already have an executable filename. */
344 if (get_exec_file (0) != NULL)
345 return;
346
347 /* Try to determine a filename from the process itself. */
348 exec_file_target = target_pid_to_exec_file (pid);
349 if (exec_file_target == NULL)
57d1de9c 350 {
ecf45d2c
SL
351 warning (_("No executable has been specified and target does not "
352 "support\n"
353 "determining executable automatically. "
354 "Try using the \"file\" command."));
355 return;
57d1de9c 356 }
88178e82 357
797bc1cb
TT
358 gdb::unique_xmalloc_ptr<char> exec_file_host
359 = exec_file_find (exec_file_target, NULL);
ecf45d2c
SL
360
361 if (defer_bp_reset)
362 add_flags |= SYMFILE_DEFER_BP_RESET;
363
364 if (from_tty)
365 add_flags |= SYMFILE_VERBOSE;
366
367 /* Attempt to open the exec file. */
797bc1cb 368 try_open_exec_file (exec_file_host.get (), current_inferior (), add_flags);
a10de604
GB
369}
370
907083d1 371/* Set FILENAME as the new exec file.
c906108c 372
c5aa993b
JM
373 This function is intended to be behave essentially the same
374 as exec_file_command, except that the latter will detect when
375 a target is being debugged, and will ask the user whether it
376 should be shut down first. (If the answer is "no", then the
377 new file is ignored.)
c906108c 378
c5aa993b
JM
379 This file is used by exec_file_command, to do the work of opening
380 and processing the exec file after any prompting has happened.
c906108c 381
c5aa993b
JM
382 And, it is used by child_attach, when the attach command was
383 given a pid but not a exec pathname, and the attach command could
384 figure out the pathname from the pid. (In this case, we shouldn't
385 ask the user whether the current target should be shut down --
907083d1 386 we're supplying the exec pathname late for good reason.) */
c906108c
SS
387
388void
5f08566b 389exec_file_attach (const char *filename, int from_tty)
c906108c 390{
9b333ba3
TT
391 /* First, acquire a reference to the current exec_bfd. We release
392 this at the end of the function; but acquiring it now lets the
393 BFD cache return it if this call refers to the same file. */
1831a9f9 394 gdb_bfd_ref_ptr exec_bfd_holder = gdb_bfd_ref_ptr::new_reference (exec_bfd);
192b62ce 395
c906108c 396 /* Remove any previous exec file. */
6c95b8df 397 exec_close ();
c906108c
SS
398
399 /* Now open and digest the file the user requested, if any. */
400
1adeb98a
FN
401 if (!filename)
402 {
403 if (from_tty)
a3f17187 404 printf_unfiltered (_("No executable file now.\n"));
7a107747
DJ
405
406 set_gdbarch_from_file (NULL);
1adeb98a
FN
407 }
408 else
c906108c 409 {
64c0b5de 410 int load_via_target = 0;
14278e1f 411 const char *scratch_pathname, *canonical_pathname;
c906108c 412 int scratch_chan;
07b82ea5 413 struct target_section *sections = NULL, *sections_end = NULL;
d18b8b7a 414 char **matching;
c5aa993b 415
64c0b5de
GB
416 if (is_target_filename (filename))
417 {
418 if (target_filesystem_is_local ())
419 filename += strlen (TARGET_SYSROOT_PREFIX);
420 else
421 load_via_target = 1;
422 }
423
14278e1f 424 gdb::unique_xmalloc_ptr<char> canonical_storage, scratch_storage;
64c0b5de 425 if (load_via_target)
c5aa993b 426 {
64c0b5de
GB
427 /* gdb_bfd_fopen does not support "target:" filenames. */
428 if (write_files)
429 warning (_("writing into executable files is "
430 "not supported for %s sysroots"),
431 TARGET_SYSROOT_PREFIX);
432
14278e1f 433 scratch_pathname = filename;
64c0b5de 434 scratch_chan = -1;
64c0b5de 435 canonical_pathname = scratch_pathname;
c5aa993b 436 }
64c0b5de
GB
437 else
438 {
439 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
440 filename, write_files ?
441 O_RDWR | O_BINARY : O_RDONLY | O_BINARY,
e0cc99a6 442 &scratch_storage);
64c0b5de
GB
443#if defined(__GO32__) || defined(_WIN32) || defined(__CYGWIN__)
444 if (scratch_chan < 0)
445 {
96445f0b 446 int first_errno = errno;
0ae1c716 447 char *exename = (char *) alloca (strlen (filename) + 5);
64c0b5de
GB
448
449 strcat (strcpy (exename, filename), ".exe");
450 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
451 exename, write_files ?
452 O_RDWR | O_BINARY
453 : O_RDONLY | O_BINARY,
e0cc99a6 454 &scratch_storage);
96445f0b
HD
455 if (scratch_chan < 0)
456 errno = first_errno;
64c0b5de 457 }
c906108c 458#endif
64c0b5de
GB
459 if (scratch_chan < 0)
460 perror_with_name (filename);
a4453b7e 461
e0cc99a6 462 scratch_pathname = scratch_storage.get ();
a4453b7e 463
64c0b5de
GB
464 /* gdb_bfd_open (and its variants) prefers canonicalized
465 pathname for better BFD caching. */
14278e1f
TT
466 canonical_storage = gdb_realpath (scratch_pathname);
467 canonical_pathname = canonical_storage.get ();
64c0b5de 468 }
1f0c4988 469
192b62ce 470 gdb_bfd_ref_ptr temp;
64c0b5de 471 if (write_files && !load_via_target)
192b62ce
TT
472 temp = gdb_bfd_fopen (canonical_pathname, gnutarget,
473 FOPEN_RUB, scratch_chan);
1c00ec6b 474 else
192b62ce
TT
475 temp = gdb_bfd_open (canonical_pathname, gnutarget, scratch_chan);
476 exec_bfd = temp.release ();
c906108c
SS
477
478 if (!exec_bfd)
9fe4a216 479 {
a2fedca9
PW
480 error (_("\"%ps\": could not open as an executable file: %s."),
481 styled_string (file_name_style.style (), scratch_pathname),
482 bfd_errmsg (bfd_get_error ()));
9fe4a216 483 }
c906108c 484
64c0b5de
GB
485 /* gdb_realpath_keepfile resolves symlinks on the local
486 filesystem and so cannot be used for "target:" files. */
1f0c4988 487 gdb_assert (exec_filename == NULL);
64c0b5de
GB
488 if (load_via_target)
489 exec_filename = xstrdup (bfd_get_filename (exec_bfd));
490 else
4971c9a7 491 exec_filename = gdb_realpath_keepfile (scratch_pathname).release ();
1f0c4988 492
d18b8b7a 493 if (!bfd_check_format_matches (exec_bfd, bfd_object, &matching))
c906108c
SS
494 {
495 /* Make sure to close exec_bfd, or else "run" might try to use
496 it. */
6c95b8df 497 exec_close ();
a2fedca9
PW
498 error (_("\"%ps\": not in executable format: %s"),
499 styled_string (file_name_style.style (), scratch_pathname),
803c08d0 500 gdb_bfd_errmsg (bfd_get_error (), matching).c_str ());
c906108c
SS
501 }
502
07b82ea5 503 if (build_section_table (exec_bfd, &sections, &sections_end))
c906108c
SS
504 {
505 /* Make sure to close exec_bfd, or else "run" might try to use
506 it. */
6c95b8df 507 exec_close ();
a2fedca9
PW
508 error (_("\"%ps\": can't find the file sections: %s"),
509 styled_string (file_name_style.style (), scratch_pathname),
510 bfd_errmsg (bfd_get_error ()));
c906108c
SS
511 }
512
c04ea773
DJ
513 exec_bfd_mtime = bfd_get_mtime (exec_bfd);
514
c906108c
SS
515 validate_files ();
516
517 set_gdbarch_from_file (exec_bfd);
518
07b82ea5 519 /* Add the executable's sections to the current address spaces'
6c95b8df
PA
520 list of sections. This possibly pushes the exec_ops
521 target. */
ed9eebaf 522 add_target_sections (&exec_bfd, sections, sections_end);
07b82ea5 523 xfree (sections);
c906108c
SS
524
525 /* Tell display code (if any) about the changed file name. */
9a4105ab
AC
526 if (deprecated_exec_file_display_hook)
527 (*deprecated_exec_file_display_hook) (filename);
c906108c 528 }
9b333ba3 529
ce7d4522 530 bfd_cache_close_all ();
76727919 531 gdb::observers::executable_changed.notify ();
c906108c
SS
532}
533
534/* Process the first arg in ARGS as the new exec file.
535
c5aa993b
JM
536 Note that we have to explicitly ignore additional args, since we can
537 be called from file_command(), which also calls symbol_file_command()
1adeb98a
FN
538 which can take multiple args.
539
0963b4bd 540 If ARGS is NULL, we just want to close the exec file. */
c906108c 541
1adeb98a 542static void
1d8b34a7 543exec_file_command (const char *args, int from_tty)
c906108c 544{
4c42eaff
DJ
545 if (from_tty && target_has_execution
546 && !query (_("A program is being debugged already.\n"
547 "Are you sure you want to change the file? ")))
548 error (_("File not changed."));
1adeb98a
FN
549
550 if (args)
551 {
552 /* Scan through the args and pick up the first non option arg
553 as the filename. */
554
773a1edc
TT
555 gdb_argv built_argv (args);
556 char **argv = built_argv.get ();
1adeb98a
FN
557
558 for (; (*argv != NULL) && (**argv == '-'); argv++)
559 {;
560 }
561 if (*argv == NULL)
8a3fe4f8 562 error (_("No executable file name was specified"));
1adeb98a 563
773a1edc
TT
564 gdb::unique_xmalloc_ptr<char> filename (tilde_expand (*argv));
565 exec_file_attach (filename.get (), from_tty);
1adeb98a
FN
566 }
567 else
568 exec_file_attach (NULL, from_tty);
c906108c
SS
569}
570
0963b4bd 571/* Set both the exec file and the symbol file, in one command.
c906108c
SS
572 What a novelty. Why did GDB go through four major releases before this
573 command was added? */
574
575static void
1d8b34a7 576file_command (const char *arg, int from_tty)
c906108c
SS
577{
578 /* FIXME, if we lose on reading the symbol file, we should revert
579 the exec file, but that's rough. */
580 exec_file_command (arg, from_tty);
581 symbol_file_command (arg, from_tty);
9a4105ab
AC
582 if (deprecated_file_changed_hook)
583 deprecated_file_changed_hook (arg);
c906108c 584}
c906108c 585\f
c5aa993b 586
0963b4bd 587/* Locate all mappable sections of a BFD file.
c906108c
SS
588 table_pp_char is a char * to get it through bfd_map_over_sections;
589 we cast it back to its proper type. */
590
591static void
7be0c536
AC
592add_to_section_table (bfd *abfd, struct bfd_section *asect,
593 void *table_pp_char)
c906108c 594{
0542c86d 595 struct target_section **table_pp = (struct target_section **) table_pp_char;
c906108c
SS
596 flagword aflag;
597
2b2848e2
DE
598 gdb_assert (abfd == asect->owner);
599
0f5d55d8
JB
600 /* Check the section flags, but do not discard zero-length sections, since
601 some symbols may still be attached to this section. For instance, we
602 encountered on sparc-solaris 2.10 a shared library with an empty .bss
603 section to which a symbol named "_end" was attached. The address
604 of this symbol still needs to be relocated. */
fd361982 605 aflag = bfd_section_flags (asect);
c906108c
SS
606 if (!(aflag & SEC_ALLOC))
607 return;
0f5d55d8 608
046ac79f 609 (*table_pp)->owner = NULL;
c906108c 610 (*table_pp)->the_bfd_section = asect;
fd361982
AM
611 (*table_pp)->addr = bfd_section_vma (asect);
612 (*table_pp)->endaddr = (*table_pp)->addr + bfd_section_size (asect);
c906108c
SS
613 (*table_pp)++;
614}
615
a5b1fd27
DE
616/* See exec.h. */
617
618void
619clear_section_table (struct target_section_table *table)
620{
621 xfree (table->sections);
622 table->sections = table->sections_end = NULL;
623}
624
625/* Resize section table TABLE by ADJUSTMENT.
626 ADJUSTMENT may be negative, in which case the caller must have already
627 removed the sections being deleted.
628 Returns the old size. */
629
630static int
631resize_section_table (struct target_section_table *table, int adjustment)
07b82ea5 632{
07b82ea5
PA
633 int old_count;
634 int new_count;
635
07b82ea5
PA
636 old_count = table->sections_end - table->sections;
637
a5b1fd27 638 new_count = adjustment + old_count;
07b82ea5
PA
639
640 if (new_count)
641 {
224c3ddb
SM
642 table->sections = XRESIZEVEC (struct target_section, table->sections,
643 new_count);
07b82ea5
PA
644 table->sections_end = table->sections + new_count;
645 }
646 else
a5b1fd27 647 clear_section_table (table);
07b82ea5
PA
648
649 return old_count;
650}
651
c906108c
SS
652/* Builds a section table, given args BFD, SECTABLE_PTR, SECEND_PTR.
653 Returns 0 if OK, 1 on error. */
654
655int
0542c86d
PA
656build_section_table (struct bfd *some_bfd, struct target_section **start,
657 struct target_section **end)
c906108c
SS
658{
659 unsigned count;
660
661 count = bfd_count_sections (some_bfd);
84d53fa9 662 xfree (*start);
8d749320 663 *start = XNEWVEC (struct target_section, count);
c906108c 664 *end = *start;
c5aa993b 665 bfd_map_over_sections (some_bfd, add_to_section_table, (char *) end);
e2ff18a0
SM
666
667 gdb_assert (*end <= *start + count);
668
c906108c
SS
669 /* We could realloc the table, but it probably loses for most files. */
670 return 0;
671}
07b82ea5
PA
672
673/* Add the sections array defined by [SECTIONS..SECTIONS_END[ to the
674 current set of target sections. */
675
676void
046ac79f 677add_target_sections (void *owner,
ed9eebaf 678 struct target_section *sections,
07b82ea5
PA
679 struct target_section *sections_end)
680{
681 int count;
682 struct target_section_table *table = current_target_sections;
683
684 count = sections_end - sections;
685
686 if (count > 0)
687 {
688 int space = resize_section_table (table, count);
ed9eebaf 689 int i;
d7f9d729 690
ed9eebaf
TT
691 for (i = 0; i < count; ++i)
692 {
693 table->sections[space + i] = sections[i];
046ac79f 694 table->sections[space + i].owner = owner;
ed9eebaf 695 }
07b82ea5 696
53af73bf 697 scoped_restore_current_pspace_and_thread restore_pspace_thread;
5b6d1e4f
PA
698 program_space *curr_pspace = current_program_space;
699
07b82ea5 700 /* If these are the first file sections we can provide memory
5b6d1e4f
PA
701 from, push the file_stratum target. Must do this in all
702 inferiors sharing the program space. */
703 for (inferior *inf : all_inferiors ())
704 {
705 if (inf->pspace != curr_pspace)
706 continue;
707
708 if (inf->target_is_pushed (&exec_ops))
709 continue;
710
711 switch_to_inferior_no_thread (inf);
712 push_target (&exec_ops);
713 }
07b82ea5
PA
714 }
715}
716
76ad5e1e
NB
717/* Add the sections of OBJFILE to the current set of target sections. */
718
719void
720add_target_sections_of_objfile (struct objfile *objfile)
721{
722 struct target_section_table *table = current_target_sections;
723 struct obj_section *osect;
724 int space;
725 unsigned count = 0;
726 struct target_section *ts;
727
728 if (objfile == NULL)
729 return;
730
731 /* Compute the number of sections to add. */
732 ALL_OBJFILE_OSECTIONS (objfile, osect)
733 {
fd361982 734 if (bfd_section_size (osect->the_bfd_section) == 0)
76ad5e1e
NB
735 continue;
736 count++;
737 }
738
739 if (count == 0)
740 return;
741
742 space = resize_section_table (table, count);
743
744 ts = table->sections + space;
745
746 ALL_OBJFILE_OSECTIONS (objfile, osect)
747 {
fd361982 748 if (bfd_section_size (osect->the_bfd_section) == 0)
76ad5e1e
NB
749 continue;
750
751 gdb_assert (ts < table->sections + space + count);
752
753 ts->addr = obj_section_addr (osect);
754 ts->endaddr = obj_section_endaddr (osect);
755 ts->the_bfd_section = osect->the_bfd_section;
756 ts->owner = (void *) objfile;
757
758 ts++;
759 }
760}
761
046ac79f
JK
762/* Remove all target sections owned by OWNER.
763 OWNER must be the same value passed to add_target_sections. */
07b82ea5
PA
764
765void
046ac79f 766remove_target_sections (void *owner)
07b82ea5
PA
767{
768 struct target_section *src, *dest;
07b82ea5
PA
769 struct target_section_table *table = current_target_sections;
770
046ac79f
JK
771 gdb_assert (owner != NULL);
772
07b82ea5
PA
773 dest = table->sections;
774 for (src = table->sections; src < table->sections_end; src++)
046ac79f 775 if (src->owner != owner)
07b82ea5
PA
776 {
777 /* Keep this section. */
778 if (dest < src)
779 *dest = *src;
780 dest++;
781 }
782
783 /* If we've dropped any sections, resize the section table. */
784 if (dest < src)
785 {
786 int old_count;
787
788 old_count = resize_section_table (table, dest - src);
789
790 /* If we don't have any more sections to read memory from,
5b6d1e4f
PA
791 remove the file_stratum target from the stack of each
792 inferior sharing the program space. */
07b82ea5 793 if (old_count + (dest - src) == 0)
6c95b8df 794 {
53af73bf 795 scoped_restore_current_pspace_and_thread restore_pspace_thread;
5b6d1e4f
PA
796 program_space *curr_pspace = current_program_space;
797
798 for (inferior *inf : all_inferiors ())
799 {
800 if (inf->pspace != curr_pspace)
801 continue;
6c95b8df 802
5b6d1e4f
PA
803 if (inf->pspace->target_sections.sections
804 != inf->pspace->target_sections.sections_end)
805 continue;
6c95b8df 806
5b6d1e4f
PA
807 switch_to_inferior_no_thread (inf);
808 unpush_target (&exec_ops);
809 }
6c95b8df 810 }
07b82ea5
PA
811 }
812}
813
5b6d1e4f
PA
814/* See exec.h. */
815
816void
817exec_on_vfork ()
818{
819 if (current_program_space->target_sections.sections
820 != current_program_space->target_sections.sections_end)
821 push_target (&exec_ops);
822}
823
c906108c 824\f
348f8c02 825
1ca49d37
YQ
826enum target_xfer_status
827exec_read_partial_read_only (gdb_byte *readbuf, ULONGEST offset,
828 ULONGEST len, ULONGEST *xfered_len)
829{
830 /* It's unduly pedantic to refuse to look at the executable for
831 read-only pieces; so do the equivalent of readonly regions aka
832 QTro packet. */
833 if (exec_bfd != NULL)
834 {
835 asection *s;
836 bfd_size_type size;
837 bfd_vma vma;
838
839 for (s = exec_bfd->sections; s; s = s->next)
840 {
841 if ((s->flags & SEC_LOAD) == 0
842 || (s->flags & SEC_READONLY) == 0)
843 continue;
844
845 vma = s->vma;
fd361982 846 size = bfd_section_size (s);
1ca49d37
YQ
847 if (vma <= offset && offset < (vma + size))
848 {
849 ULONGEST amt;
850
851 amt = (vma + size) - offset;
852 if (amt > len)
853 amt = len;
854
855 amt = bfd_get_section_contents (exec_bfd, s,
856 readbuf, offset - vma, amt);
857
858 if (amt == 0)
859 return TARGET_XFER_EOF;
860 else
861 {
862 *xfered_len = amt;
863 return TARGET_XFER_OK;
864 }
865 }
866 }
867 }
868
869 /* Indicate failure to find the requested memory block. */
870 return TARGET_XFER_E_IO;
871}
872
a79b1bc6 873/* Return all read-only memory ranges found in the target section
5a2eb0ef 874 table defined by SECTIONS and SECTIONS_END, starting at (and
a79b1bc6 875 intersected with) MEMADDR for LEN bytes. */
5a2eb0ef 876
a79b1bc6
SM
877static std::vector<mem_range>
878section_table_available_memory (CORE_ADDR memaddr, ULONGEST len,
e6ca34fc
PA
879 struct target_section *sections,
880 struct target_section *sections_end)
881{
a79b1bc6 882 std::vector<mem_range> memory;
e6ca34fc 883
a79b1bc6 884 for (target_section *p = sections; p < sections_end; p++)
e6ca34fc 885 {
fd361982 886 if ((bfd_section_flags (p->the_bfd_section) & SEC_READONLY) == 0)
e6ca34fc
PA
887 continue;
888
889 /* Copy the meta-data, adjusted. */
890 if (mem_ranges_overlap (p->addr, p->endaddr - p->addr, memaddr, len))
891 {
892 ULONGEST lo1, hi1, lo2, hi2;
e6ca34fc
PA
893
894 lo1 = memaddr;
895 hi1 = memaddr + len;
896
897 lo2 = p->addr;
898 hi2 = p->endaddr;
899
a79b1bc6
SM
900 CORE_ADDR start = std::max (lo1, lo2);
901 int length = std::min (hi1, hi2) - start;
e6ca34fc 902
a79b1bc6 903 memory.emplace_back (start, length);
e6ca34fc
PA
904 }
905 }
906
907 return memory;
908}
909
1ee79381
YQ
910enum target_xfer_status
911section_table_read_available_memory (gdb_byte *readbuf, ULONGEST offset,
912 ULONGEST len, ULONGEST *xfered_len)
913{
a79b1bc6
SM
914 target_section_table *table = target_get_section_table (&exec_ops);
915 std::vector<mem_range> available_memory
916 = section_table_available_memory (offset, len,
917 table->sections, table->sections_end);
1ee79381 918
a79b1bc6 919 normalize_mem_ranges (&available_memory);
1ee79381 920
a79b1bc6 921 for (const mem_range &r : available_memory)
1ee79381 922 {
a79b1bc6 923 if (mem_ranges_overlap (r.start, r.length, offset, len))
1ee79381
YQ
924 {
925 CORE_ADDR end;
926 enum target_xfer_status status;
927
928 /* Get the intersection window. */
a79b1bc6 929 end = std::min<CORE_ADDR> (offset + len, r.start + r.length);
1ee79381
YQ
930
931 gdb_assert (end - offset <= len);
932
a79b1bc6 933 if (offset >= r.start)
1ee79381
YQ
934 status = exec_read_partial_read_only (readbuf, offset,
935 end - offset,
936 xfered_len);
937 else
938 {
a79b1bc6 939 *xfered_len = r.start - offset;
bc113b4e 940 status = TARGET_XFER_UNAVAILABLE;
1ee79381 941 }
1ee79381
YQ
942 return status;
943 }
944 }
1ee79381
YQ
945
946 *xfered_len = len;
bc113b4e 947 return TARGET_XFER_UNAVAILABLE;
1ee79381
YQ
948}
949
9b409511 950enum target_xfer_status
07b82ea5 951section_table_xfer_memory_partial (gdb_byte *readbuf, const gdb_byte *writebuf,
b55e14c7 952 ULONGEST offset, ULONGEST len,
9b409511 953 ULONGEST *xfered_len,
07b82ea5
PA
954 struct target_section *sections,
955 struct target_section *sections_end,
956 const char *section_name)
c906108c 957{
020cc13c 958 int res;
0542c86d 959 struct target_section *p;
07b82ea5
PA
960 ULONGEST memaddr = offset;
961 ULONGEST memend = memaddr + len;
c906108c 962
e2ff18a0 963 gdb_assert (len != 0);
c906108c 964
348f8c02 965 for (p = sections; p < sections_end; p++)
c906108c 966 {
2b2848e2
DE
967 struct bfd_section *asect = p->the_bfd_section;
968 bfd *abfd = asect->owner;
969
970 if (section_name && strcmp (section_name, asect->name) != 0)
0963b4bd 971 continue; /* not the section we need. */
c906108c 972 if (memaddr >= p->addr)
3db26b01
JB
973 {
974 if (memend <= p->endaddr)
975 {
976 /* Entire transfer is within this section. */
07b82ea5 977 if (writebuf)
2b2848e2 978 res = bfd_set_section_contents (abfd, asect,
07b82ea5 979 writebuf, memaddr - p->addr,
85302095
AC
980 len);
981 else
2b2848e2 982 res = bfd_get_section_contents (abfd, asect,
07b82ea5 983 readbuf, memaddr - p->addr,
85302095 984 len);
9b409511
YQ
985
986 if (res != 0)
987 {
988 *xfered_len = len;
989 return TARGET_XFER_OK;
990 }
991 else
992 return TARGET_XFER_EOF;
3db26b01
JB
993 }
994 else if (memaddr >= p->endaddr)
995 {
996 /* This section ends before the transfer starts. */
997 continue;
998 }
999 else
1000 {
1001 /* This section overlaps the transfer. Just do half. */
1002 len = p->endaddr - memaddr;
07b82ea5 1003 if (writebuf)
2b2848e2 1004 res = bfd_set_section_contents (abfd, asect,
07b82ea5 1005 writebuf, memaddr - p->addr,
85302095
AC
1006 len);
1007 else
2b2848e2 1008 res = bfd_get_section_contents (abfd, asect,
07b82ea5 1009 readbuf, memaddr - p->addr,
85302095 1010 len);
9b409511
YQ
1011 if (res != 0)
1012 {
1013 *xfered_len = len;
1014 return TARGET_XFER_OK;
1015 }
1016 else
1017 return TARGET_XFER_EOF;
3db26b01
JB
1018 }
1019 }
c906108c
SS
1020 }
1021
9b409511 1022 return TARGET_XFER_EOF; /* We can't help. */
c906108c 1023}
348f8c02 1024
f6ac5f3d
PA
1025struct target_section_table *
1026exec_target::get_section_table ()
348f8c02 1027{
07b82ea5 1028 return current_target_sections;
348f8c02
PA
1029}
1030
f6ac5f3d
PA
1031enum target_xfer_status
1032exec_target::xfer_partial (enum target_object object,
1033 const char *annex, gdb_byte *readbuf,
1034 const gdb_byte *writebuf,
1035 ULONGEST offset, ULONGEST len, ULONGEST *xfered_len)
348f8c02 1036{
f6ac5f3d 1037 struct target_section_table *table = get_section_table ();
07b82ea5
PA
1038
1039 if (object == TARGET_OBJECT_MEMORY)
1040 return section_table_xfer_memory_partial (readbuf, writebuf,
9b409511 1041 offset, len, xfered_len,
07b82ea5
PA
1042 table->sections,
1043 table->sections_end,
1044 NULL);
1045 else
2ed4b548 1046 return TARGET_XFER_E_IO;
348f8c02 1047}
c906108c 1048\f
c5aa993b 1049
c906108c 1050void
07b82ea5 1051print_section_info (struct target_section_table *t, bfd *abfd)
c906108c 1052{
5af949e3 1053 struct gdbarch *gdbarch = gdbarch_from_bfd (abfd);
0542c86d 1054 struct target_section *p;
17a912b6 1055 /* FIXME: 16 is not wide enough when gdbarch_addr_bit > 64. */
5af949e3 1056 int wid = gdbarch_addr_bit (gdbarch) <= 32 ? 8 : 16;
c906108c 1057
a2fedca9
PW
1058 printf_filtered ("\t`%ps', ",
1059 styled_string (file_name_style.style (),
1060 bfd_get_filename (abfd)));
c906108c 1061 wrap_here (" ");
a3f17187 1062 printf_filtered (_("file type %s.\n"), bfd_get_target (abfd));
c906108c 1063 if (abfd == exec_bfd)
51bee8e9 1064 {
3e43a32a
MS
1065 /* gcc-3.4 does not like the initialization in
1066 <p == t->sections_end>. */
d904de5b 1067 bfd_vma displacement = 0;
2f1bdd26 1068 bfd_vma entry_point;
51bee8e9
JK
1069
1070 for (p = t->sections; p < t->sections_end; p++)
1071 {
2b2848e2 1072 struct bfd_section *psect = p->the_bfd_section;
51bee8e9 1073
fd361982 1074 if ((bfd_section_flags (psect) & (SEC_ALLOC | SEC_LOAD))
51bee8e9
JK
1075 != (SEC_ALLOC | SEC_LOAD))
1076 continue;
1077
fd361982
AM
1078 if (bfd_section_vma (psect) <= abfd->start_address
1079 && abfd->start_address < (bfd_section_vma (psect)
1080 + bfd_section_size (psect)))
51bee8e9 1081 {
fd361982 1082 displacement = p->addr - bfd_section_vma (psect);
51bee8e9
JK
1083 break;
1084 }
1085 }
1086 if (p == t->sections_end)
a2fedca9
PW
1087 warning (_("Cannot find section for the entry point of %ps."),
1088 styled_string (file_name_style.style (),
1089 bfd_get_filename (abfd)));
51bee8e9 1090
2f1bdd26
MGD
1091 entry_point = gdbarch_addr_bits_remove (gdbarch,
1092 bfd_get_start_address (abfd)
1093 + displacement);
51bee8e9 1094 printf_filtered (_("\tEntry point: %s\n"),
2f1bdd26 1095 paddress (gdbarch, entry_point));
51bee8e9 1096 }
07b82ea5 1097 for (p = t->sections; p < t->sections_end; p++)
c906108c 1098 {
2b2848e2
DE
1099 struct bfd_section *psect = p->the_bfd_section;
1100 bfd *pbfd = psect->owner;
1101
bb599908
PH
1102 printf_filtered ("\t%s", hex_string_custom (p->addr, wid));
1103 printf_filtered (" - %s", hex_string_custom (p->endaddr, wid));
bcf16802
KB
1104
1105 /* FIXME: A format of "08l" is not wide enough for file offsets
1106 larger than 4GB. OTOH, making it "016l" isn't desirable either
1107 since most output will then be much wider than necessary. It
1108 may make sense to test the size of the file and choose the
1109 format string accordingly. */
a3f17187 1110 /* FIXME: i18n: Need to rewrite this sentence. */
c906108c
SS
1111 if (info_verbose)
1112 printf_filtered (" @ %s",
2b2848e2 1113 hex_string_custom (psect->filepos, 8));
fd361982 1114 printf_filtered (" is %s", bfd_section_name (psect));
2b2848e2 1115 if (pbfd != abfd)
a2fedca9
PW
1116 printf_filtered (" in %ps",
1117 styled_string (file_name_style.style (),
1118 bfd_get_filename (pbfd)));
c906108c
SS
1119 printf_filtered ("\n");
1120 }
1121}
1122
f6ac5f3d
PA
1123void
1124exec_target::files_info ()
c906108c 1125{
57008375
JK
1126 if (exec_bfd)
1127 print_section_info (current_target_sections, exec_bfd);
1128 else
1129 puts_filtered (_("\t<no file loaded>\n"));
c906108c
SS
1130}
1131
1132static void
0b39b52e 1133set_section_command (const char *args, int from_tty)
c906108c 1134{
0542c86d 1135 struct target_section *p;
0b39b52e 1136 const char *secname;
c906108c
SS
1137 unsigned seclen;
1138 unsigned long secaddr;
1139 char secprint[100];
1140 long offset;
07b82ea5 1141 struct target_section_table *table;
c906108c
SS
1142
1143 if (args == 0)
8a3fe4f8 1144 error (_("Must specify section name and its virtual address"));
c906108c 1145
0963b4bd 1146 /* Parse out section name. */
c5aa993b 1147 for (secname = args; !isspace (*args); args++);
c906108c
SS
1148 seclen = args - secname;
1149
0963b4bd 1150 /* Parse out new virtual address. */
c906108c
SS
1151 secaddr = parse_and_eval_address (args);
1152
07b82ea5
PA
1153 table = current_target_sections;
1154 for (p = table->sections; p < table->sections_end; p++)
c5aa993b 1155 {
fd361982
AM
1156 if (!strncmp (secname, bfd_section_name (p->the_bfd_section), seclen)
1157 && bfd_section_name (p->the_bfd_section)[seclen] == '\0')
c5aa993b
JM
1158 {
1159 offset = secaddr - p->addr;
1160 p->addr += offset;
1161 p->endaddr += offset;
1162 if (from_tty)
f6ac5f3d 1163 exec_ops.files_info ();
c5aa993b
JM
1164 return;
1165 }
c906108c 1166 }
c906108c
SS
1167 if (seclen >= sizeof (secprint))
1168 seclen = sizeof (secprint) - 1;
1169 strncpy (secprint, secname, seclen);
1170 secprint[seclen] = '\0';
8a3fe4f8 1171 error (_("Section %s not found"), secprint);
c906108c
SS
1172}
1173
30510692
DJ
1174/* If we can find a section in FILENAME with BFD index INDEX, adjust
1175 it to ADDRESS. */
c1bd25fd
DJ
1176
1177void
1178exec_set_section_address (const char *filename, int index, CORE_ADDR address)
1179{
0542c86d 1180 struct target_section *p;
07b82ea5 1181 struct target_section_table *table;
c1bd25fd 1182
07b82ea5
PA
1183 table = current_target_sections;
1184 for (p = table->sections; p < table->sections_end; p++)
c1bd25fd 1185 {
c7e97679
AM
1186 if (filename_cmp (filename,
1187 bfd_get_filename (p->the_bfd_section->owner)) == 0
30510692 1188 && index == p->the_bfd_section->index)
c1bd25fd 1189 {
30510692 1190 p->endaddr += address - p->addr;
c1bd25fd 1191 p->addr = address;
c1bd25fd
DJ
1192 }
1193 }
1194}
1195
57810aa7 1196bool
f6ac5f3d 1197exec_target::has_memory ()
c35b1492
PA
1198{
1199 /* We can provide memory if we have any file/target sections to read
1200 from. */
1201 return (current_target_sections->sections
1202 != current_target_sections->sections_end);
1203}
1204
f6ac5f3d
PA
1205char *
1206exec_target::make_corefile_notes (bfd *obfd, int *note_size)
83814951
TT
1207{
1208 error (_("Can't create a corefile"));
1209}
be4d1333 1210
f6ac5f3d
PA
1211int
1212exec_target::find_memory_regions (find_memory_region_ftype func, void *data)
c906108c 1213{
f6ac5f3d 1214 return objfile_find_memory_regions (this, func, data);
c906108c
SS
1215}
1216
6c265988 1217void _initialize_exec ();
c906108c 1218void
6c265988 1219_initialize_exec ()
c906108c
SS
1220{
1221 struct cmd_list_element *c;
1222
c906108c
SS
1223 if (!dbx_commands)
1224 {
1a966eab
AC
1225 c = add_cmd ("file", class_files, file_command, _("\
1226Use FILE as program to be debugged.\n\
c906108c
SS
1227It is read for its symbols, for getting the contents of pure memory,\n\
1228and it is the program executed when you use the `run' command.\n\
1229If FILE cannot be found as specified, your execution directory path\n\
1230($PATH) is searched for a command of that name.\n\
1a966eab 1231No arg means to have no executable file and no symbols."), &cmdlist);
5ba2abeb 1232 set_cmd_completer (c, filename_completer);
c906108c
SS
1233 }
1234
1a966eab
AC
1235 c = add_cmd ("exec-file", class_files, exec_file_command, _("\
1236Use FILE as program for getting contents of pure memory.\n\
c906108c
SS
1237If FILE cannot be found as specified, your execution directory path\n\
1238is searched for a command of that name.\n\
1a966eab 1239No arg means have no executable file."), &cmdlist);
5ba2abeb 1240 set_cmd_completer (c, filename_completer);
c906108c 1241
1bedd215
AC
1242 add_com ("section", class_files, set_section_command, _("\
1243Change the base address of section SECTION of the exec file to ADDR.\n\
c906108c
SS
1244This can be used if the exec file does not contain section addresses,\n\
1245(such as in the a.out format), or when the addresses specified in the\n\
1246file itself are wrong. Each section must be changed separately. The\n\
1bedd215 1247``info files'' command lists all the sections and their addresses."));
c906108c 1248
5bf193a2
AC
1249 add_setshow_boolean_cmd ("write", class_support, &write_files, _("\
1250Set writing into executable and core files."), _("\
1251Show writing into executable and core files."), NULL,
1252 NULL,
920d2a44 1253 show_write_files,
5bf193a2 1254 &setlist, &showlist);
c5aa993b 1255
a2fedca9
PW
1256 add_setshow_enum_cmd ("exec-file-mismatch", class_support,
1257 exec_file_mismatch_names,
1258 &exec_file_mismatch,
1259 _("\
1260Set exec-file-mismatch handling (ask|warn|off)."),
1261 _("\
1262Show exec-file-mismatch handling (ask|warn|off)."),
1263 _("\
98c59b52
PA
1264Specifies how to handle a mismatch between the current exec-file\n\
1265loaded by GDB and the exec-file automatically determined when attaching\n\
a2fedca9
PW
1266to a process:\n\n\
1267 ask - warn the user and ask whether to load the determined exec-file.\n\
1268 warn - warn the user, but do not change the exec-file.\n\
1269 off - do not check for mismatch."),
1270 set_exec_file_mismatch_command,
1271 show_exec_file_mismatch_command,
1272 &setlist, &showlist);
1273
d9f719f1 1274 add_target (exec_target_info, exec_target_open, filename_completer);
c906108c 1275}
This page took 1.66004 seconds and 4 git commands to generate.