Return std::string from gdb_bfd_errmsg
[deliverable/binutils-gdb.git] / gdb / exec.c
CommitLineData
c906108c 1/* Work with executable files, for GDB.
4646aa9d 2
e2882c85 3 Copyright (C) 1988-2018 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "frame.h"
22#include "inferior.h"
23#include "target.h"
24#include "gdbcmd.h"
25#include "language.h"
0ba1096a 26#include "filenames.h"
c906108c
SS
27#include "symfile.h"
28#include "objfiles.h"
c5f0f3d0 29#include "completer.h"
fd0407d6 30#include "value.h"
4646aa9d 31#include "exec.h"
76727919 32#include "observable.h"
dacec2a8 33#include "arch-utils.h"
6c95b8df
PA
34#include "gdbthread.h"
35#include "progspace.h"
cbb099e8 36#include "gdb_bfd.h"
b427c1bc 37#include "gcore.h"
b46a8d7c 38#include "source.h"
c906108c 39
c906108c 40#include <fcntl.h>
dbda9972 41#include "readline/readline.h"
c906108c
SS
42#include "gdbcore.h"
43
44#include <ctype.h>
53ce3c39 45#include <sys/stat.h>
a9a5a3d1 46#include "solist.h"
325fac50 47#include <algorithm>
b4987c95 48#include "common/pathstuff.h"
c906108c 49
1d8b34a7 50void (*deprecated_file_changed_hook) (const char *);
c906108c 51
d9f719f1
PA
52static const target_info exec_target_info = {
53 "exec",
54 N_("Local exec file"),
55 N_("Use an executable file as a target.\n\
56Specify the filename of the executable file.")
57};
58
c906108c
SS
59/* The target vector for executable files. */
60
f6ac5f3d
PA
61struct exec_target final : public target_ops
62{
63 exec_target ()
64 { to_stratum = file_stratum; }
65
d9f719f1
PA
66 const target_info &info () const override
67 { return exec_target_info; }
f6ac5f3d 68
f6ac5f3d
PA
69 void close () override;
70 enum target_xfer_status xfer_partial (enum target_object object,
71 const char *annex,
72 gdb_byte *readbuf,
73 const gdb_byte *writebuf,
74 ULONGEST offset, ULONGEST len,
75 ULONGEST *xfered_len) override;
76 struct target_section_table *get_section_table () override;
77 void files_info () override;
78
57810aa7 79 bool has_memory () override;
f6ac5f3d
PA
80 char *make_corefile_notes (bfd *, int *) override;
81 int find_memory_regions (find_memory_region_ftype func, void *data) override;
82};
83
84static exec_target exec_ops;
c906108c 85
c906108c
SS
86/* Whether to open exec and core files read-only or read-write. */
87
88int write_files = 0;
920d2a44
AC
89static void
90show_write_files (struct ui_file *file, int from_tty,
91 struct cmd_list_element *c, const char *value)
92{
93 fprintf_filtered (file, _("Writing into executable and core files is %s.\n"),
94 value);
95}
96
c906108c 97
d9f719f1
PA
98static void
99exec_target_open (const char *args, int from_tty)
1adeb98a
FN
100{
101 target_preopen (from_tty);
102 exec_file_attach (args, from_tty);
103}
104
07b82ea5
PA
105/* Close and clear exec_bfd. If we end up with no target sections to
106 read memory from, this unpushes the exec_ops target. */
107
6c95b8df
PA
108void
109exec_close (void)
07b82ea5
PA
110{
111 if (exec_bfd)
112 {
113 bfd *abfd = exec_bfd;
07b82ea5 114
cbb099e8 115 gdb_bfd_unref (abfd);
07b82ea5
PA
116
117 /* Removing target sections may close the exec_ops target.
118 Clear exec_bfd before doing so to prevent recursion. */
119 exec_bfd = NULL;
120 exec_bfd_mtime = 0;
121
046ac79f 122 remove_target_sections (&exec_bfd);
1f0c4988
JK
123
124 xfree (exec_filename);
125 exec_filename = NULL;
07b82ea5
PA
126 }
127}
128
6c95b8df
PA
129/* This is the target_close implementation. Clears all target
130 sections and closes all executable bfds from all program spaces. */
131
f6ac5f3d
PA
132void
133exec_target::close ()
c906108c 134{
ab16fce8 135 struct program_space *ss;
5ed8105e 136 scoped_restore_current_program_space restore_pspace;
6c95b8df 137
ab16fce8 138 ALL_PSPACES (ss)
5ed8105e
PA
139 {
140 set_current_program_space (ss);
141 clear_section_table (current_target_sections);
142 exec_close ();
143 }
c906108c
SS
144}
145
f6ac5f3d 146/* See gdbcore.h. */
a10de604
GB
147
148void
ecf45d2c
SL
149try_open_exec_file (const char *exec_file_host, struct inferior *inf,
150 symfile_add_flags add_flags)
a10de604 151{
88178e82 152 struct cleanup *old_chain;
57d1de9c 153 struct gdb_exception prev_err = exception_none;
a10de604 154
ecf45d2c 155 old_chain = make_cleanup (free_current_contents, &prev_err.message);
57d1de9c
LM
156
157 /* exec_file_attach and symbol_file_add_main may throw an error if the file
158 cannot be opened either locally or remotely.
159
160 This happens for example, when the file is first found in the local
161 sysroot (above), and then disappears (a TOCTOU race), or when it doesn't
162 exist in the target filesystem, or when the file does exist, but
163 is not readable.
88178e82 164
57d1de9c
LM
165 Even without a symbol file, the remote-based debugging session should
166 continue normally instead of ending abruptly. Hence we catch thrown
167 errors/exceptions in the following code. */
168 TRY
169 {
ecf45d2c
SL
170 /* We must do this step even if exec_file_host is NULL, so that
171 exec_file_attach will clear state. */
172 exec_file_attach (exec_file_host, add_flags & SYMFILE_VERBOSE);
57d1de9c
LM
173 }
174 CATCH (err, RETURN_MASK_ERROR)
175 {
176 if (err.message != NULL)
177 warning ("%s", err.message);
178
179 prev_err = err;
180
181 /* Save message so it doesn't get trashed by the catch below. */
b5e1db87
LM
182 if (err.message != NULL)
183 prev_err.message = xstrdup (err.message);
57d1de9c
LM
184 }
185 END_CATCH
186
ecf45d2c 187 if (exec_file_host != NULL)
57d1de9c 188 {
ecf45d2c
SL
189 TRY
190 {
191 symbol_file_add_main (exec_file_host, add_flags);
192 }
193 CATCH (err, RETURN_MASK_ERROR)
194 {
195 if (!exception_print_same (prev_err, err))
196 warning ("%s", err.message);
197 }
198 END_CATCH
57d1de9c 199 }
ecf45d2c
SL
200
201 do_cleanups (old_chain);
202}
203
204/* See gdbcore.h. */
205
206void
207exec_file_locate_attach (int pid, int defer_bp_reset, int from_tty)
208{
797bc1cb 209 char *exec_file_target;
ecf45d2c
SL
210 symfile_add_flags add_flags = 0;
211
212 /* Do nothing if we already have an executable filename. */
213 if (get_exec_file (0) != NULL)
214 return;
215
216 /* Try to determine a filename from the process itself. */
217 exec_file_target = target_pid_to_exec_file (pid);
218 if (exec_file_target == NULL)
57d1de9c 219 {
ecf45d2c
SL
220 warning (_("No executable has been specified and target does not "
221 "support\n"
222 "determining executable automatically. "
223 "Try using the \"file\" command."));
224 return;
57d1de9c 225 }
88178e82 226
797bc1cb
TT
227 gdb::unique_xmalloc_ptr<char> exec_file_host
228 = exec_file_find (exec_file_target, NULL);
ecf45d2c
SL
229
230 if (defer_bp_reset)
231 add_flags |= SYMFILE_DEFER_BP_RESET;
232
233 if (from_tty)
234 add_flags |= SYMFILE_VERBOSE;
235
236 /* Attempt to open the exec file. */
797bc1cb 237 try_open_exec_file (exec_file_host.get (), current_inferior (), add_flags);
a10de604
GB
238}
239
907083d1 240/* Set FILENAME as the new exec file.
c906108c 241
c5aa993b
JM
242 This function is intended to be behave essentially the same
243 as exec_file_command, except that the latter will detect when
244 a target is being debugged, and will ask the user whether it
245 should be shut down first. (If the answer is "no", then the
246 new file is ignored.)
c906108c 247
c5aa993b
JM
248 This file is used by exec_file_command, to do the work of opening
249 and processing the exec file after any prompting has happened.
c906108c 250
c5aa993b
JM
251 And, it is used by child_attach, when the attach command was
252 given a pid but not a exec pathname, and the attach command could
253 figure out the pathname from the pid. (In this case, we shouldn't
254 ask the user whether the current target should be shut down --
907083d1 255 we're supplying the exec pathname late for good reason.) */
c906108c
SS
256
257void
5f08566b 258exec_file_attach (const char *filename, int from_tty)
c906108c 259{
9b333ba3
TT
260 /* First, acquire a reference to the current exec_bfd. We release
261 this at the end of the function; but acquiring it now lets the
262 BFD cache return it if this call refers to the same file. */
1831a9f9 263 gdb_bfd_ref_ptr exec_bfd_holder = gdb_bfd_ref_ptr::new_reference (exec_bfd);
192b62ce 264
c906108c 265 /* Remove any previous exec file. */
6c95b8df 266 exec_close ();
c906108c
SS
267
268 /* Now open and digest the file the user requested, if any. */
269
1adeb98a
FN
270 if (!filename)
271 {
272 if (from_tty)
a3f17187 273 printf_unfiltered (_("No executable file now.\n"));
7a107747
DJ
274
275 set_gdbarch_from_file (NULL);
1adeb98a
FN
276 }
277 else
c906108c 278 {
64c0b5de 279 int load_via_target = 0;
14278e1f 280 const char *scratch_pathname, *canonical_pathname;
c906108c 281 int scratch_chan;
07b82ea5 282 struct target_section *sections = NULL, *sections_end = NULL;
d18b8b7a 283 char **matching;
c5aa993b 284
64c0b5de
GB
285 if (is_target_filename (filename))
286 {
287 if (target_filesystem_is_local ())
288 filename += strlen (TARGET_SYSROOT_PREFIX);
289 else
290 load_via_target = 1;
291 }
292
14278e1f 293 gdb::unique_xmalloc_ptr<char> canonical_storage, scratch_storage;
64c0b5de 294 if (load_via_target)
c5aa993b 295 {
64c0b5de
GB
296 /* gdb_bfd_fopen does not support "target:" filenames. */
297 if (write_files)
298 warning (_("writing into executable files is "
299 "not supported for %s sysroots"),
300 TARGET_SYSROOT_PREFIX);
301
14278e1f 302 scratch_pathname = filename;
64c0b5de 303 scratch_chan = -1;
64c0b5de 304 canonical_pathname = scratch_pathname;
c5aa993b 305 }
64c0b5de
GB
306 else
307 {
308 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
309 filename, write_files ?
310 O_RDWR | O_BINARY : O_RDONLY | O_BINARY,
e0cc99a6 311 &scratch_storage);
64c0b5de
GB
312#if defined(__GO32__) || defined(_WIN32) || defined(__CYGWIN__)
313 if (scratch_chan < 0)
314 {
0ae1c716 315 char *exename = (char *) alloca (strlen (filename) + 5);
64c0b5de
GB
316
317 strcat (strcpy (exename, filename), ".exe");
318 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
319 exename, write_files ?
320 O_RDWR | O_BINARY
321 : O_RDONLY | O_BINARY,
e0cc99a6 322 &scratch_storage);
64c0b5de 323 }
c906108c 324#endif
64c0b5de
GB
325 if (scratch_chan < 0)
326 perror_with_name (filename);
a4453b7e 327
e0cc99a6 328 scratch_pathname = scratch_storage.get ();
a4453b7e 329
64c0b5de
GB
330 /* gdb_bfd_open (and its variants) prefers canonicalized
331 pathname for better BFD caching. */
14278e1f
TT
332 canonical_storage = gdb_realpath (scratch_pathname);
333 canonical_pathname = canonical_storage.get ();
64c0b5de 334 }
1f0c4988 335
192b62ce 336 gdb_bfd_ref_ptr temp;
64c0b5de 337 if (write_files && !load_via_target)
192b62ce
TT
338 temp = gdb_bfd_fopen (canonical_pathname, gnutarget,
339 FOPEN_RUB, scratch_chan);
1c00ec6b 340 else
192b62ce
TT
341 temp = gdb_bfd_open (canonical_pathname, gnutarget, scratch_chan);
342 exec_bfd = temp.release ();
c906108c
SS
343
344 if (!exec_bfd)
9fe4a216 345 {
d5131498 346 error (_("\"%s\": could not open as an executable file: %s."),
9fe4a216
TT
347 scratch_pathname, bfd_errmsg (bfd_get_error ()));
348 }
c906108c 349
64c0b5de
GB
350 /* gdb_realpath_keepfile resolves symlinks on the local
351 filesystem and so cannot be used for "target:" files. */
1f0c4988 352 gdb_assert (exec_filename == NULL);
64c0b5de
GB
353 if (load_via_target)
354 exec_filename = xstrdup (bfd_get_filename (exec_bfd));
355 else
4971c9a7 356 exec_filename = gdb_realpath_keepfile (scratch_pathname).release ();
1f0c4988 357
d18b8b7a 358 if (!bfd_check_format_matches (exec_bfd, bfd_object, &matching))
c906108c
SS
359 {
360 /* Make sure to close exec_bfd, or else "run" might try to use
361 it. */
6c95b8df 362 exec_close ();
8a3fe4f8 363 error (_("\"%s\": not in executable format: %s"),
d18b8b7a 364 scratch_pathname,
803c08d0 365 gdb_bfd_errmsg (bfd_get_error (), matching).c_str ());
c906108c
SS
366 }
367
07b82ea5 368 if (build_section_table (exec_bfd, &sections, &sections_end))
c906108c
SS
369 {
370 /* Make sure to close exec_bfd, or else "run" might try to use
371 it. */
6c95b8df 372 exec_close ();
8a3fe4f8 373 error (_("\"%s\": can't find the file sections: %s"),
c906108c
SS
374 scratch_pathname, bfd_errmsg (bfd_get_error ()));
375 }
376
c04ea773
DJ
377 exec_bfd_mtime = bfd_get_mtime (exec_bfd);
378
c906108c
SS
379 validate_files ();
380
381 set_gdbarch_from_file (exec_bfd);
382
07b82ea5 383 /* Add the executable's sections to the current address spaces'
6c95b8df
PA
384 list of sections. This possibly pushes the exec_ops
385 target. */
ed9eebaf 386 add_target_sections (&exec_bfd, sections, sections_end);
07b82ea5 387 xfree (sections);
c906108c
SS
388
389 /* Tell display code (if any) about the changed file name. */
9a4105ab
AC
390 if (deprecated_exec_file_display_hook)
391 (*deprecated_exec_file_display_hook) (filename);
c906108c 392 }
9b333ba3 393
ce7d4522 394 bfd_cache_close_all ();
76727919 395 gdb::observers::executable_changed.notify ();
c906108c
SS
396}
397
398/* Process the first arg in ARGS as the new exec file.
399
c5aa993b
JM
400 Note that we have to explicitly ignore additional args, since we can
401 be called from file_command(), which also calls symbol_file_command()
1adeb98a
FN
402 which can take multiple args.
403
0963b4bd 404 If ARGS is NULL, we just want to close the exec file. */
c906108c 405
1adeb98a 406static void
1d8b34a7 407exec_file_command (const char *args, int from_tty)
c906108c 408{
4c42eaff
DJ
409 if (from_tty && target_has_execution
410 && !query (_("A program is being debugged already.\n"
411 "Are you sure you want to change the file? ")))
412 error (_("File not changed."));
1adeb98a
FN
413
414 if (args)
415 {
416 /* Scan through the args and pick up the first non option arg
417 as the filename. */
418
773a1edc
TT
419 gdb_argv built_argv (args);
420 char **argv = built_argv.get ();
1adeb98a
FN
421
422 for (; (*argv != NULL) && (**argv == '-'); argv++)
423 {;
424 }
425 if (*argv == NULL)
8a3fe4f8 426 error (_("No executable file name was specified"));
1adeb98a 427
773a1edc
TT
428 gdb::unique_xmalloc_ptr<char> filename (tilde_expand (*argv));
429 exec_file_attach (filename.get (), from_tty);
1adeb98a
FN
430 }
431 else
432 exec_file_attach (NULL, from_tty);
c906108c
SS
433}
434
0963b4bd 435/* Set both the exec file and the symbol file, in one command.
c906108c
SS
436 What a novelty. Why did GDB go through four major releases before this
437 command was added? */
438
439static void
1d8b34a7 440file_command (const char *arg, int from_tty)
c906108c
SS
441{
442 /* FIXME, if we lose on reading the symbol file, we should revert
443 the exec file, but that's rough. */
444 exec_file_command (arg, from_tty);
445 symbol_file_command (arg, from_tty);
9a4105ab
AC
446 if (deprecated_file_changed_hook)
447 deprecated_file_changed_hook (arg);
c906108c 448}
c906108c 449\f
c5aa993b 450
0963b4bd 451/* Locate all mappable sections of a BFD file.
c906108c
SS
452 table_pp_char is a char * to get it through bfd_map_over_sections;
453 we cast it back to its proper type. */
454
455static void
7be0c536
AC
456add_to_section_table (bfd *abfd, struct bfd_section *asect,
457 void *table_pp_char)
c906108c 458{
0542c86d 459 struct target_section **table_pp = (struct target_section **) table_pp_char;
c906108c
SS
460 flagword aflag;
461
2b2848e2
DE
462 gdb_assert (abfd == asect->owner);
463
0f5d55d8
JB
464 /* Check the section flags, but do not discard zero-length sections, since
465 some symbols may still be attached to this section. For instance, we
466 encountered on sparc-solaris 2.10 a shared library with an empty .bss
467 section to which a symbol named "_end" was attached. The address
468 of this symbol still needs to be relocated. */
c906108c
SS
469 aflag = bfd_get_section_flags (abfd, asect);
470 if (!(aflag & SEC_ALLOC))
471 return;
0f5d55d8 472
046ac79f 473 (*table_pp)->owner = NULL;
c906108c
SS
474 (*table_pp)->the_bfd_section = asect;
475 (*table_pp)->addr = bfd_section_vma (abfd, asect);
476 (*table_pp)->endaddr = (*table_pp)->addr + bfd_section_size (abfd, asect);
477 (*table_pp)++;
478}
479
a5b1fd27
DE
480/* See exec.h. */
481
482void
483clear_section_table (struct target_section_table *table)
484{
485 xfree (table->sections);
486 table->sections = table->sections_end = NULL;
487}
488
489/* Resize section table TABLE by ADJUSTMENT.
490 ADJUSTMENT may be negative, in which case the caller must have already
491 removed the sections being deleted.
492 Returns the old size. */
493
494static int
495resize_section_table (struct target_section_table *table, int adjustment)
07b82ea5 496{
07b82ea5
PA
497 int old_count;
498 int new_count;
499
07b82ea5
PA
500 old_count = table->sections_end - table->sections;
501
a5b1fd27 502 new_count = adjustment + old_count;
07b82ea5
PA
503
504 if (new_count)
505 {
224c3ddb
SM
506 table->sections = XRESIZEVEC (struct target_section, table->sections,
507 new_count);
07b82ea5
PA
508 table->sections_end = table->sections + new_count;
509 }
510 else
a5b1fd27 511 clear_section_table (table);
07b82ea5
PA
512
513 return old_count;
514}
515
c906108c
SS
516/* Builds a section table, given args BFD, SECTABLE_PTR, SECEND_PTR.
517 Returns 0 if OK, 1 on error. */
518
519int
0542c86d
PA
520build_section_table (struct bfd *some_bfd, struct target_section **start,
521 struct target_section **end)
c906108c
SS
522{
523 unsigned count;
524
525 count = bfd_count_sections (some_bfd);
526 if (*start)
b8c9b27d 527 xfree (* start);
8d749320 528 *start = XNEWVEC (struct target_section, count);
c906108c 529 *end = *start;
c5aa993b 530 bfd_map_over_sections (some_bfd, add_to_section_table, (char *) end);
c906108c 531 if (*end > *start + count)
3e43a32a
MS
532 internal_error (__FILE__, __LINE__,
533 _("failed internal consistency check"));
c906108c
SS
534 /* We could realloc the table, but it probably loses for most files. */
535 return 0;
536}
07b82ea5
PA
537
538/* Add the sections array defined by [SECTIONS..SECTIONS_END[ to the
539 current set of target sections. */
540
541void
046ac79f 542add_target_sections (void *owner,
ed9eebaf 543 struct target_section *sections,
07b82ea5
PA
544 struct target_section *sections_end)
545{
546 int count;
547 struct target_section_table *table = current_target_sections;
548
549 count = sections_end - sections;
550
551 if (count > 0)
552 {
553 int space = resize_section_table (table, count);
ed9eebaf 554 int i;
d7f9d729 555
ed9eebaf
TT
556 for (i = 0; i < count; ++i)
557 {
558 table->sections[space + i] = sections[i];
046ac79f 559 table->sections[space + i].owner = owner;
ed9eebaf 560 }
07b82ea5
PA
561
562 /* If these are the first file sections we can provide memory
563 from, push the file_stratum target. */
ab16fce8
TT
564 if (!target_is_pushed (&exec_ops))
565 push_target (&exec_ops);
07b82ea5
PA
566 }
567}
568
76ad5e1e
NB
569/* Add the sections of OBJFILE to the current set of target sections. */
570
571void
572add_target_sections_of_objfile (struct objfile *objfile)
573{
574 struct target_section_table *table = current_target_sections;
575 struct obj_section *osect;
576 int space;
577 unsigned count = 0;
578 struct target_section *ts;
579
580 if (objfile == NULL)
581 return;
582
583 /* Compute the number of sections to add. */
584 ALL_OBJFILE_OSECTIONS (objfile, osect)
585 {
586 if (bfd_get_section_size (osect->the_bfd_section) == 0)
587 continue;
588 count++;
589 }
590
591 if (count == 0)
592 return;
593
594 space = resize_section_table (table, count);
595
596 ts = table->sections + space;
597
598 ALL_OBJFILE_OSECTIONS (objfile, osect)
599 {
600 if (bfd_get_section_size (osect->the_bfd_section) == 0)
601 continue;
602
603 gdb_assert (ts < table->sections + space + count);
604
605 ts->addr = obj_section_addr (osect);
606 ts->endaddr = obj_section_endaddr (osect);
607 ts->the_bfd_section = osect->the_bfd_section;
608 ts->owner = (void *) objfile;
609
610 ts++;
611 }
612}
613
046ac79f
JK
614/* Remove all target sections owned by OWNER.
615 OWNER must be the same value passed to add_target_sections. */
07b82ea5
PA
616
617void
046ac79f 618remove_target_sections (void *owner)
07b82ea5
PA
619{
620 struct target_section *src, *dest;
07b82ea5
PA
621 struct target_section_table *table = current_target_sections;
622
046ac79f
JK
623 gdb_assert (owner != NULL);
624
07b82ea5
PA
625 dest = table->sections;
626 for (src = table->sections; src < table->sections_end; src++)
046ac79f 627 if (src->owner != owner)
07b82ea5
PA
628 {
629 /* Keep this section. */
630 if (dest < src)
631 *dest = *src;
632 dest++;
633 }
634
635 /* If we've dropped any sections, resize the section table. */
636 if (dest < src)
637 {
638 int old_count;
639
640 old_count = resize_section_table (table, dest - src);
641
642 /* If we don't have any more sections to read memory from,
643 remove the file_stratum target from the stack. */
644 if (old_count + (dest - src) == 0)
6c95b8df
PA
645 {
646 struct program_space *pspace;
647
648 ALL_PSPACES (pspace)
649 if (pspace->target_sections.sections
650 != pspace->target_sections.sections_end)
651 return;
652
653 unpush_target (&exec_ops);
654 }
07b82ea5
PA
655 }
656}
657
c906108c 658\f
348f8c02 659
1ca49d37
YQ
660enum target_xfer_status
661exec_read_partial_read_only (gdb_byte *readbuf, ULONGEST offset,
662 ULONGEST len, ULONGEST *xfered_len)
663{
664 /* It's unduly pedantic to refuse to look at the executable for
665 read-only pieces; so do the equivalent of readonly regions aka
666 QTro packet. */
667 if (exec_bfd != NULL)
668 {
669 asection *s;
670 bfd_size_type size;
671 bfd_vma vma;
672
673 for (s = exec_bfd->sections; s; s = s->next)
674 {
675 if ((s->flags & SEC_LOAD) == 0
676 || (s->flags & SEC_READONLY) == 0)
677 continue;
678
679 vma = s->vma;
680 size = bfd_get_section_size (s);
681 if (vma <= offset && offset < (vma + size))
682 {
683 ULONGEST amt;
684
685 amt = (vma + size) - offset;
686 if (amt > len)
687 amt = len;
688
689 amt = bfd_get_section_contents (exec_bfd, s,
690 readbuf, offset - vma, amt);
691
692 if (amt == 0)
693 return TARGET_XFER_EOF;
694 else
695 {
696 *xfered_len = amt;
697 return TARGET_XFER_OK;
698 }
699 }
700 }
701 }
702
703 /* Indicate failure to find the requested memory block. */
704 return TARGET_XFER_E_IO;
705}
706
a79b1bc6 707/* Return all read-only memory ranges found in the target section
5a2eb0ef 708 table defined by SECTIONS and SECTIONS_END, starting at (and
a79b1bc6 709 intersected with) MEMADDR for LEN bytes. */
5a2eb0ef 710
a79b1bc6
SM
711static std::vector<mem_range>
712section_table_available_memory (CORE_ADDR memaddr, ULONGEST len,
e6ca34fc
PA
713 struct target_section *sections,
714 struct target_section *sections_end)
715{
a79b1bc6 716 std::vector<mem_range> memory;
e6ca34fc 717
a79b1bc6 718 for (target_section *p = sections; p < sections_end; p++)
e6ca34fc 719 {
2b2848e2
DE
720 if ((bfd_get_section_flags (p->the_bfd_section->owner,
721 p->the_bfd_section)
e6ca34fc
PA
722 & SEC_READONLY) == 0)
723 continue;
724
725 /* Copy the meta-data, adjusted. */
726 if (mem_ranges_overlap (p->addr, p->endaddr - p->addr, memaddr, len))
727 {
728 ULONGEST lo1, hi1, lo2, hi2;
e6ca34fc
PA
729
730 lo1 = memaddr;
731 hi1 = memaddr + len;
732
733 lo2 = p->addr;
734 hi2 = p->endaddr;
735
a79b1bc6
SM
736 CORE_ADDR start = std::max (lo1, lo2);
737 int length = std::min (hi1, hi2) - start;
e6ca34fc 738
a79b1bc6 739 memory.emplace_back (start, length);
e6ca34fc
PA
740 }
741 }
742
743 return memory;
744}
745
1ee79381
YQ
746enum target_xfer_status
747section_table_read_available_memory (gdb_byte *readbuf, ULONGEST offset,
748 ULONGEST len, ULONGEST *xfered_len)
749{
a79b1bc6
SM
750 target_section_table *table = target_get_section_table (&exec_ops);
751 std::vector<mem_range> available_memory
752 = section_table_available_memory (offset, len,
753 table->sections, table->sections_end);
1ee79381 754
a79b1bc6 755 normalize_mem_ranges (&available_memory);
1ee79381 756
a79b1bc6 757 for (const mem_range &r : available_memory)
1ee79381 758 {
a79b1bc6 759 if (mem_ranges_overlap (r.start, r.length, offset, len))
1ee79381
YQ
760 {
761 CORE_ADDR end;
762 enum target_xfer_status status;
763
764 /* Get the intersection window. */
a79b1bc6 765 end = std::min<CORE_ADDR> (offset + len, r.start + r.length);
1ee79381
YQ
766
767 gdb_assert (end - offset <= len);
768
a79b1bc6 769 if (offset >= r.start)
1ee79381
YQ
770 status = exec_read_partial_read_only (readbuf, offset,
771 end - offset,
772 xfered_len);
773 else
774 {
a79b1bc6 775 *xfered_len = r.start - offset;
bc113b4e 776 status = TARGET_XFER_UNAVAILABLE;
1ee79381 777 }
1ee79381
YQ
778 return status;
779 }
780 }
1ee79381
YQ
781
782 *xfered_len = len;
bc113b4e 783 return TARGET_XFER_UNAVAILABLE;
1ee79381
YQ
784}
785
9b409511 786enum target_xfer_status
07b82ea5 787section_table_xfer_memory_partial (gdb_byte *readbuf, const gdb_byte *writebuf,
b55e14c7 788 ULONGEST offset, ULONGEST len,
9b409511 789 ULONGEST *xfered_len,
07b82ea5
PA
790 struct target_section *sections,
791 struct target_section *sections_end,
792 const char *section_name)
c906108c 793{
020cc13c 794 int res;
0542c86d 795 struct target_section *p;
07b82ea5
PA
796 ULONGEST memaddr = offset;
797 ULONGEST memend = memaddr + len;
c906108c 798
b55e14c7 799 if (len == 0)
3e43a32a
MS
800 internal_error (__FILE__, __LINE__,
801 _("failed internal consistency check"));
c906108c 802
348f8c02 803 for (p = sections; p < sections_end; p++)
c906108c 804 {
2b2848e2
DE
805 struct bfd_section *asect = p->the_bfd_section;
806 bfd *abfd = asect->owner;
807
808 if (section_name && strcmp (section_name, asect->name) != 0)
0963b4bd 809 continue; /* not the section we need. */
c906108c 810 if (memaddr >= p->addr)
3db26b01
JB
811 {
812 if (memend <= p->endaddr)
813 {
814 /* Entire transfer is within this section. */
07b82ea5 815 if (writebuf)
2b2848e2 816 res = bfd_set_section_contents (abfd, asect,
07b82ea5 817 writebuf, memaddr - p->addr,
85302095
AC
818 len);
819 else
2b2848e2 820 res = bfd_get_section_contents (abfd, asect,
07b82ea5 821 readbuf, memaddr - p->addr,
85302095 822 len);
9b409511
YQ
823
824 if (res != 0)
825 {
826 *xfered_len = len;
827 return TARGET_XFER_OK;
828 }
829 else
830 return TARGET_XFER_EOF;
3db26b01
JB
831 }
832 else if (memaddr >= p->endaddr)
833 {
834 /* This section ends before the transfer starts. */
835 continue;
836 }
837 else
838 {
839 /* This section overlaps the transfer. Just do half. */
840 len = p->endaddr - memaddr;
07b82ea5 841 if (writebuf)
2b2848e2 842 res = bfd_set_section_contents (abfd, asect,
07b82ea5 843 writebuf, memaddr - p->addr,
85302095
AC
844 len);
845 else
2b2848e2 846 res = bfd_get_section_contents (abfd, asect,
07b82ea5 847 readbuf, memaddr - p->addr,
85302095 848 len);
9b409511
YQ
849 if (res != 0)
850 {
851 *xfered_len = len;
852 return TARGET_XFER_OK;
853 }
854 else
855 return TARGET_XFER_EOF;
3db26b01
JB
856 }
857 }
c906108c
SS
858 }
859
9b409511 860 return TARGET_XFER_EOF; /* We can't help. */
c906108c 861}
348f8c02 862
f6ac5f3d
PA
863struct target_section_table *
864exec_target::get_section_table ()
348f8c02 865{
07b82ea5 866 return current_target_sections;
348f8c02
PA
867}
868
f6ac5f3d
PA
869enum target_xfer_status
870exec_target::xfer_partial (enum target_object object,
871 const char *annex, gdb_byte *readbuf,
872 const gdb_byte *writebuf,
873 ULONGEST offset, ULONGEST len, ULONGEST *xfered_len)
348f8c02 874{
f6ac5f3d 875 struct target_section_table *table = get_section_table ();
07b82ea5
PA
876
877 if (object == TARGET_OBJECT_MEMORY)
878 return section_table_xfer_memory_partial (readbuf, writebuf,
9b409511 879 offset, len, xfered_len,
07b82ea5
PA
880 table->sections,
881 table->sections_end,
882 NULL);
883 else
2ed4b548 884 return TARGET_XFER_E_IO;
348f8c02 885}
c906108c 886\f
c5aa993b 887
c906108c 888void
07b82ea5 889print_section_info (struct target_section_table *t, bfd *abfd)
c906108c 890{
5af949e3 891 struct gdbarch *gdbarch = gdbarch_from_bfd (abfd);
0542c86d 892 struct target_section *p;
17a912b6 893 /* FIXME: 16 is not wide enough when gdbarch_addr_bit > 64. */
5af949e3 894 int wid = gdbarch_addr_bit (gdbarch) <= 32 ? 8 : 16;
c906108c 895
c5aa993b 896 printf_filtered ("\t`%s', ", bfd_get_filename (abfd));
c906108c 897 wrap_here (" ");
a3f17187 898 printf_filtered (_("file type %s.\n"), bfd_get_target (abfd));
c906108c 899 if (abfd == exec_bfd)
51bee8e9 900 {
3e43a32a
MS
901 /* gcc-3.4 does not like the initialization in
902 <p == t->sections_end>. */
d904de5b 903 bfd_vma displacement = 0;
2f1bdd26 904 bfd_vma entry_point;
51bee8e9
JK
905
906 for (p = t->sections; p < t->sections_end; p++)
907 {
2b2848e2
DE
908 struct bfd_section *psect = p->the_bfd_section;
909 bfd *pbfd = psect->owner;
51bee8e9 910
2b2848e2 911 if ((bfd_get_section_flags (pbfd, psect) & (SEC_ALLOC | SEC_LOAD))
51bee8e9
JK
912 != (SEC_ALLOC | SEC_LOAD))
913 continue;
914
2b2848e2
DE
915 if (bfd_get_section_vma (pbfd, psect) <= abfd->start_address
916 && abfd->start_address < (bfd_get_section_vma (pbfd, psect)
917 + bfd_get_section_size (psect)))
51bee8e9 918 {
2b2848e2 919 displacement = p->addr - bfd_get_section_vma (pbfd, psect);
51bee8e9
JK
920 break;
921 }
922 }
923 if (p == t->sections_end)
b37520b6 924 warning (_("Cannot find section for the entry point of %s."),
d904de5b 925 bfd_get_filename (abfd));
51bee8e9 926
2f1bdd26
MGD
927 entry_point = gdbarch_addr_bits_remove (gdbarch,
928 bfd_get_start_address (abfd)
929 + displacement);
51bee8e9 930 printf_filtered (_("\tEntry point: %s\n"),
2f1bdd26 931 paddress (gdbarch, entry_point));
51bee8e9 932 }
07b82ea5 933 for (p = t->sections; p < t->sections_end; p++)
c906108c 934 {
2b2848e2
DE
935 struct bfd_section *psect = p->the_bfd_section;
936 bfd *pbfd = psect->owner;
937
bb599908
PH
938 printf_filtered ("\t%s", hex_string_custom (p->addr, wid));
939 printf_filtered (" - %s", hex_string_custom (p->endaddr, wid));
bcf16802
KB
940
941 /* FIXME: A format of "08l" is not wide enough for file offsets
942 larger than 4GB. OTOH, making it "016l" isn't desirable either
943 since most output will then be much wider than necessary. It
944 may make sense to test the size of the file and choose the
945 format string accordingly. */
a3f17187 946 /* FIXME: i18n: Need to rewrite this sentence. */
c906108c
SS
947 if (info_verbose)
948 printf_filtered (" @ %s",
2b2848e2
DE
949 hex_string_custom (psect->filepos, 8));
950 printf_filtered (" is %s", bfd_section_name (pbfd, psect));
951 if (pbfd != abfd)
952 printf_filtered (" in %s", bfd_get_filename (pbfd));
c906108c
SS
953 printf_filtered ("\n");
954 }
955}
956
f6ac5f3d
PA
957void
958exec_target::files_info ()
c906108c 959{
57008375
JK
960 if (exec_bfd)
961 print_section_info (current_target_sections, exec_bfd);
962 else
963 puts_filtered (_("\t<no file loaded>\n"));
c906108c
SS
964}
965
966static void
0b39b52e 967set_section_command (const char *args, int from_tty)
c906108c 968{
0542c86d 969 struct target_section *p;
0b39b52e 970 const char *secname;
c906108c
SS
971 unsigned seclen;
972 unsigned long secaddr;
973 char secprint[100];
974 long offset;
07b82ea5 975 struct target_section_table *table;
c906108c
SS
976
977 if (args == 0)
8a3fe4f8 978 error (_("Must specify section name and its virtual address"));
c906108c 979
0963b4bd 980 /* Parse out section name. */
c5aa993b 981 for (secname = args; !isspace (*args); args++);
c906108c
SS
982 seclen = args - secname;
983
0963b4bd 984 /* Parse out new virtual address. */
c906108c
SS
985 secaddr = parse_and_eval_address (args);
986
07b82ea5
PA
987 table = current_target_sections;
988 for (p = table->sections; p < table->sections_end; p++)
c5aa993b 989 {
57008375 990 if (!strncmp (secname, bfd_section_name (p->bfd,
3e43a32a 991 p->the_bfd_section), seclen)
57008375 992 && bfd_section_name (p->bfd, p->the_bfd_section)[seclen] == '\0')
c5aa993b
JM
993 {
994 offset = secaddr - p->addr;
995 p->addr += offset;
996 p->endaddr += offset;
997 if (from_tty)
f6ac5f3d 998 exec_ops.files_info ();
c5aa993b
JM
999 return;
1000 }
c906108c 1001 }
c906108c
SS
1002 if (seclen >= sizeof (secprint))
1003 seclen = sizeof (secprint) - 1;
1004 strncpy (secprint, secname, seclen);
1005 secprint[seclen] = '\0';
8a3fe4f8 1006 error (_("Section %s not found"), secprint);
c906108c
SS
1007}
1008
30510692
DJ
1009/* If we can find a section in FILENAME with BFD index INDEX, adjust
1010 it to ADDRESS. */
c1bd25fd
DJ
1011
1012void
1013exec_set_section_address (const char *filename, int index, CORE_ADDR address)
1014{
0542c86d 1015 struct target_section *p;
07b82ea5 1016 struct target_section_table *table;
c1bd25fd 1017
07b82ea5
PA
1018 table = current_target_sections;
1019 for (p = table->sections; p < table->sections_end; p++)
c1bd25fd 1020 {
2b2848e2 1021 if (filename_cmp (filename, p->the_bfd_section->owner->filename) == 0
30510692 1022 && index == p->the_bfd_section->index)
c1bd25fd 1023 {
30510692 1024 p->endaddr += address - p->addr;
c1bd25fd 1025 p->addr = address;
c1bd25fd
DJ
1026 }
1027 }
1028}
1029
57810aa7 1030bool
f6ac5f3d 1031exec_target::has_memory ()
c35b1492
PA
1032{
1033 /* We can provide memory if we have any file/target sections to read
1034 from. */
1035 return (current_target_sections->sections
1036 != current_target_sections->sections_end);
1037}
1038
f6ac5f3d
PA
1039char *
1040exec_target::make_corefile_notes (bfd *obfd, int *note_size)
83814951
TT
1041{
1042 error (_("Can't create a corefile"));
1043}
be4d1333 1044
f6ac5f3d
PA
1045int
1046exec_target::find_memory_regions (find_memory_region_ftype func, void *data)
c906108c 1047{
f6ac5f3d 1048 return objfile_find_memory_regions (this, func, data);
c906108c
SS
1049}
1050
1051void
fba45db2 1052_initialize_exec (void)
c906108c
SS
1053{
1054 struct cmd_list_element *c;
1055
c906108c
SS
1056 if (!dbx_commands)
1057 {
1a966eab
AC
1058 c = add_cmd ("file", class_files, file_command, _("\
1059Use FILE as program to be debugged.\n\
c906108c
SS
1060It is read for its symbols, for getting the contents of pure memory,\n\
1061and it is the program executed when you use the `run' command.\n\
1062If FILE cannot be found as specified, your execution directory path\n\
1063($PATH) is searched for a command of that name.\n\
1a966eab 1064No arg means to have no executable file and no symbols."), &cmdlist);
5ba2abeb 1065 set_cmd_completer (c, filename_completer);
c906108c
SS
1066 }
1067
1a966eab
AC
1068 c = add_cmd ("exec-file", class_files, exec_file_command, _("\
1069Use FILE as program for getting contents of pure memory.\n\
c906108c
SS
1070If FILE cannot be found as specified, your execution directory path\n\
1071is searched for a command of that name.\n\
1a966eab 1072No arg means have no executable file."), &cmdlist);
5ba2abeb 1073 set_cmd_completer (c, filename_completer);
c906108c 1074
1bedd215
AC
1075 add_com ("section", class_files, set_section_command, _("\
1076Change the base address of section SECTION of the exec file to ADDR.\n\
c906108c
SS
1077This can be used if the exec file does not contain section addresses,\n\
1078(such as in the a.out format), or when the addresses specified in the\n\
1079file itself are wrong. Each section must be changed separately. The\n\
1bedd215 1080``info files'' command lists all the sections and their addresses."));
c906108c 1081
5bf193a2
AC
1082 add_setshow_boolean_cmd ("write", class_support, &write_files, _("\
1083Set writing into executable and core files."), _("\
1084Show writing into executable and core files."), NULL,
1085 NULL,
920d2a44 1086 show_write_files,
5bf193a2 1087 &setlist, &showlist);
c5aa993b 1088
d9f719f1 1089 add_target (exec_target_info, exec_target_open, filename_completer);
c906108c 1090}
This page took 1.418928 seconds and 4 git commands to generate.