testsuite: Fix false FAIL for gdb.base/morestack.exp
[deliverable/binutils-gdb.git] / gdb / exec.c
CommitLineData
c906108c 1/* Work with executable files, for GDB.
4646aa9d 2
618f726f 3 Copyright (C) 1988-2016 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "frame.h"
22#include "inferior.h"
23#include "target.h"
24#include "gdbcmd.h"
25#include "language.h"
0ba1096a 26#include "filenames.h"
c906108c
SS
27#include "symfile.h"
28#include "objfiles.h"
c5f0f3d0 29#include "completer.h"
fd0407d6 30#include "value.h"
4646aa9d 31#include "exec.h"
ea53e89f 32#include "observer.h"
dacec2a8 33#include "arch-utils.h"
6c95b8df
PA
34#include "gdbthread.h"
35#include "progspace.h"
cbb099e8 36#include "gdb_bfd.h"
b427c1bc 37#include "gcore.h"
c906108c 38
c906108c 39#include <fcntl.h>
dbda9972 40#include "readline/readline.h"
c906108c
SS
41#include "gdbcore.h"
42
43#include <ctype.h>
53ce3c39 44#include <sys/stat.h>
a9a5a3d1 45#include "solist.h"
325fac50 46#include <algorithm>
c906108c 47
9a4105ab 48void (*deprecated_file_changed_hook) (char *);
c906108c
SS
49
50/* Prototypes for local functions */
51
a14ed312 52static void file_command (char *, int);
c906108c 53
a14ed312 54static void set_section_command (char *, int);
c906108c 55
a14ed312 56static void exec_files_info (struct target_ops *);
c906108c 57
a14ed312 58static void init_exec_ops (void);
c906108c 59
a14ed312 60void _initialize_exec (void);
c906108c 61
c906108c
SS
62/* The target vector for executable files. */
63
e8b2341c 64static struct target_ops exec_ops;
c906108c 65
c906108c
SS
66/* Whether to open exec and core files read-only or read-write. */
67
68int write_files = 0;
920d2a44
AC
69static void
70show_write_files (struct ui_file *file, int from_tty,
71 struct cmd_list_element *c, const char *value)
72{
73 fprintf_filtered (file, _("Writing into executable and core files is %s.\n"),
74 value);
75}
76
c906108c 77
4c42eaff 78static void
014f9477 79exec_open (const char *args, int from_tty)
1adeb98a
FN
80{
81 target_preopen (from_tty);
82 exec_file_attach (args, from_tty);
83}
84
07b82ea5
PA
85/* Close and clear exec_bfd. If we end up with no target sections to
86 read memory from, this unpushes the exec_ops target. */
87
6c95b8df
PA
88void
89exec_close (void)
07b82ea5
PA
90{
91 if (exec_bfd)
92 {
93 bfd *abfd = exec_bfd;
07b82ea5 94
cbb099e8 95 gdb_bfd_unref (abfd);
07b82ea5
PA
96
97 /* Removing target sections may close the exec_ops target.
98 Clear exec_bfd before doing so to prevent recursion. */
99 exec_bfd = NULL;
100 exec_bfd_mtime = 0;
101
046ac79f 102 remove_target_sections (&exec_bfd);
1f0c4988
JK
103
104 xfree (exec_filename);
105 exec_filename = NULL;
07b82ea5
PA
106 }
107}
108
6c95b8df
PA
109/* This is the target_close implementation. Clears all target
110 sections and closes all executable bfds from all program spaces. */
111
c906108c 112static void
de90e03d 113exec_close_1 (struct target_ops *self)
c906108c 114{
ab16fce8
TT
115 struct program_space *ss;
116 struct cleanup *old_chain;
6c95b8df 117
ab16fce8
TT
118 old_chain = save_current_program_space ();
119 ALL_PSPACES (ss)
6c95b8df 120 {
ab16fce8
TT
121 set_current_program_space (ss);
122 clear_section_table (current_target_sections);
123 exec_close ();
6c95b8df 124 }
ab16fce8
TT
125
126 do_cleanups (old_chain);
c906108c
SS
127}
128
1adeb98a
FN
129void
130exec_file_clear (int from_tty)
131{
132 /* Remove exec file. */
6c95b8df 133 exec_close ();
1adeb98a
FN
134
135 if (from_tty)
a3f17187 136 printf_unfiltered (_("No executable file now.\n"));
1adeb98a
FN
137}
138
57d1de9c
LM
139/* Returns non-zero if exceptions E1 and E2 are equal. Returns zero
140 otherwise. */
141
142static int
143exception_print_same (struct gdb_exception e1, struct gdb_exception e2)
144{
145 const char *msg1 = e1.message;
146 const char *msg2 = e2.message;
147
148 if (msg1 == NULL)
149 msg1 = "";
150 if (msg2 == NULL)
151 msg2 = "";
152
153 return (e1.reason == e2.reason
154 && e1.error == e2.error
155 && strcmp (e1.message, e2.message) == 0);
156}
157
a10de604
GB
158/* See gdbcore.h. */
159
160void
bb805577 161exec_file_locate_attach (int pid, int defer_bp_reset, int from_tty)
a10de604
GB
162{
163 char *exec_file, *full_exec_path = NULL;
88178e82 164 struct cleanup *old_chain;
57d1de9c 165 struct gdb_exception prev_err = exception_none;
a10de604
GB
166
167 /* Do nothing if we already have an executable filename. */
168 exec_file = (char *) get_exec_file (0);
169 if (exec_file != NULL)
170 return;
171
172 /* Try to determine a filename from the process itself. */
173 exec_file = target_pid_to_exec_file (pid);
174 if (exec_file == NULL)
fef3cb9f
JK
175 {
176 warning (_("No executable has been specified and target does not "
177 "support\n"
178 "determining executable automatically. "
179 "Try using the \"file\" command."));
180 return;
181 }
a10de604 182
a9a5a3d1
GB
183 /* If gdb_sysroot is not empty and the discovered filename
184 is absolute then prefix the filename with gdb_sysroot. */
a3be80c3 185 if (*gdb_sysroot != '\0' && IS_ABSOLUTE_PATH (exec_file))
bf74e428
GB
186 {
187 full_exec_path = exec_file_find (exec_file, NULL);
188 if (full_exec_path == NULL)
189 return;
190 }
191 else
a9a5a3d1
GB
192 {
193 /* It's possible we don't have a full path, but rather just a
194 filename. Some targets, such as HP-UX, don't provide the
195 full path, sigh.
196
197 Attempt to qualify the filename against the source path.
198 (If that fails, we'll just fall back on the original
199 filename. Not much more we can do...) */
200 if (!source_full_path_of (exec_file, &full_exec_path))
201 full_exec_path = xstrdup (exec_file);
202 }
a10de604 203
88178e82 204 old_chain = make_cleanup (xfree, full_exec_path);
57d1de9c
LM
205 make_cleanup (free_current_contents, &prev_err.message);
206
207 /* exec_file_attach and symbol_file_add_main may throw an error if the file
208 cannot be opened either locally or remotely.
209
210 This happens for example, when the file is first found in the local
211 sysroot (above), and then disappears (a TOCTOU race), or when it doesn't
212 exist in the target filesystem, or when the file does exist, but
213 is not readable.
88178e82 214
57d1de9c
LM
215 Even without a symbol file, the remote-based debugging session should
216 continue normally instead of ending abruptly. Hence we catch thrown
217 errors/exceptions in the following code. */
218 TRY
219 {
220 exec_file_attach (full_exec_path, from_tty);
221 }
222 CATCH (err, RETURN_MASK_ERROR)
223 {
224 if (err.message != NULL)
225 warning ("%s", err.message);
226
227 prev_err = err;
228
229 /* Save message so it doesn't get trashed by the catch below. */
230 prev_err.message = xstrdup (err.message);
231 }
232 END_CATCH
233
234 TRY
235 {
bb805577
JK
236 if (defer_bp_reset)
237 current_inferior ()->symfile_flags |= SYMFILE_DEFER_BP_RESET;
57d1de9c
LM
238 symbol_file_add_main (full_exec_path, from_tty);
239 }
240 CATCH (err, RETURN_MASK_ERROR)
241 {
242 if (!exception_print_same (prev_err, err))
243 warning ("%s", err.message);
244 }
245 END_CATCH
bb805577 246 current_inferior ()->symfile_flags &= ~SYMFILE_DEFER_BP_RESET;
88178e82
GB
247
248 do_cleanups (old_chain);
a10de604
GB
249}
250
907083d1 251/* Set FILENAME as the new exec file.
c906108c 252
c5aa993b
JM
253 This function is intended to be behave essentially the same
254 as exec_file_command, except that the latter will detect when
255 a target is being debugged, and will ask the user whether it
256 should be shut down first. (If the answer is "no", then the
257 new file is ignored.)
c906108c 258
c5aa993b
JM
259 This file is used by exec_file_command, to do the work of opening
260 and processing the exec file after any prompting has happened.
c906108c 261
c5aa993b
JM
262 And, it is used by child_attach, when the attach command was
263 given a pid but not a exec pathname, and the attach command could
264 figure out the pathname from the pid. (In this case, we shouldn't
265 ask the user whether the current target should be shut down --
907083d1 266 we're supplying the exec pathname late for good reason.) */
c906108c
SS
267
268void
5f08566b 269exec_file_attach (const char *filename, int from_tty)
c906108c 270{
9b333ba3
TT
271 struct cleanup *cleanups;
272
273 /* First, acquire a reference to the current exec_bfd. We release
274 this at the end of the function; but acquiring it now lets the
275 BFD cache return it if this call refers to the same file. */
276 gdb_bfd_ref (exec_bfd);
277 cleanups = make_cleanup_bfd_unref (exec_bfd);
278
c906108c 279 /* Remove any previous exec file. */
6c95b8df 280 exec_close ();
c906108c
SS
281
282 /* Now open and digest the file the user requested, if any. */
283
1adeb98a
FN
284 if (!filename)
285 {
286 if (from_tty)
a3f17187 287 printf_unfiltered (_("No executable file now.\n"));
7a107747
DJ
288
289 set_gdbarch_from_file (NULL);
1adeb98a
FN
290 }
291 else
c906108c 292 {
64c0b5de 293 int load_via_target = 0;
1f0c4988 294 char *scratch_pathname, *canonical_pathname;
c906108c 295 int scratch_chan;
07b82ea5 296 struct target_section *sections = NULL, *sections_end = NULL;
d18b8b7a 297 char **matching;
c5aa993b 298
64c0b5de
GB
299 if (is_target_filename (filename))
300 {
301 if (target_filesystem_is_local ())
302 filename += strlen (TARGET_SYSROOT_PREFIX);
303 else
304 load_via_target = 1;
305 }
306
307 if (load_via_target)
c5aa993b 308 {
64c0b5de
GB
309 /* gdb_bfd_fopen does not support "target:" filenames. */
310 if (write_files)
311 warning (_("writing into executable files is "
312 "not supported for %s sysroots"),
313 TARGET_SYSROOT_PREFIX);
314
315 scratch_pathname = xstrdup (filename);
316 make_cleanup (xfree, scratch_pathname);
317
318 scratch_chan = -1;
d7f9d729 319
64c0b5de 320 canonical_pathname = scratch_pathname;
c5aa993b 321 }
64c0b5de
GB
322 else
323 {
324 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
325 filename, write_files ?
326 O_RDWR | O_BINARY : O_RDONLY | O_BINARY,
327 &scratch_pathname);
328#if defined(__GO32__) || defined(_WIN32) || defined(__CYGWIN__)
329 if (scratch_chan < 0)
330 {
0ae1c716 331 char *exename = (char *) alloca (strlen (filename) + 5);
64c0b5de
GB
332
333 strcat (strcpy (exename, filename), ".exe");
334 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
335 exename, write_files ?
336 O_RDWR | O_BINARY
337 : O_RDONLY | O_BINARY,
338 &scratch_pathname);
339 }
c906108c 340#endif
64c0b5de
GB
341 if (scratch_chan < 0)
342 perror_with_name (filename);
a4453b7e 343
64c0b5de 344 make_cleanup (xfree, scratch_pathname);
a4453b7e 345
64c0b5de
GB
346 /* gdb_bfd_open (and its variants) prefers canonicalized
347 pathname for better BFD caching. */
348 canonical_pathname = gdb_realpath (scratch_pathname);
349 make_cleanup (xfree, canonical_pathname);
350 }
1f0c4988 351
64c0b5de 352 if (write_files && !load_via_target)
1f0c4988 353 exec_bfd = gdb_bfd_fopen (canonical_pathname, gnutarget,
1c00ec6b
TT
354 FOPEN_RUB, scratch_chan);
355 else
1f0c4988 356 exec_bfd = gdb_bfd_open (canonical_pathname, gnutarget, scratch_chan);
c906108c
SS
357
358 if (!exec_bfd)
9fe4a216 359 {
d5131498 360 error (_("\"%s\": could not open as an executable file: %s."),
9fe4a216
TT
361 scratch_pathname, bfd_errmsg (bfd_get_error ()));
362 }
c906108c 363
64c0b5de
GB
364 /* gdb_realpath_keepfile resolves symlinks on the local
365 filesystem and so cannot be used for "target:" files. */
1f0c4988 366 gdb_assert (exec_filename == NULL);
64c0b5de
GB
367 if (load_via_target)
368 exec_filename = xstrdup (bfd_get_filename (exec_bfd));
369 else
370 exec_filename = gdb_realpath_keepfile (scratch_pathname);
1f0c4988 371
d18b8b7a 372 if (!bfd_check_format_matches (exec_bfd, bfd_object, &matching))
c906108c
SS
373 {
374 /* Make sure to close exec_bfd, or else "run" might try to use
375 it. */
6c95b8df 376 exec_close ();
8a3fe4f8 377 error (_("\"%s\": not in executable format: %s"),
d18b8b7a
HZ
378 scratch_pathname,
379 gdb_bfd_errmsg (bfd_get_error (), matching));
c906108c
SS
380 }
381
07b82ea5 382 if (build_section_table (exec_bfd, &sections, &sections_end))
c906108c
SS
383 {
384 /* Make sure to close exec_bfd, or else "run" might try to use
385 it. */
6c95b8df 386 exec_close ();
8a3fe4f8 387 error (_("\"%s\": can't find the file sections: %s"),
c906108c
SS
388 scratch_pathname, bfd_errmsg (bfd_get_error ()));
389 }
390
c04ea773
DJ
391 exec_bfd_mtime = bfd_get_mtime (exec_bfd);
392
c906108c
SS
393 validate_files ();
394
395 set_gdbarch_from_file (exec_bfd);
396
07b82ea5 397 /* Add the executable's sections to the current address spaces'
6c95b8df
PA
398 list of sections. This possibly pushes the exec_ops
399 target. */
ed9eebaf 400 add_target_sections (&exec_bfd, sections, sections_end);
07b82ea5 401 xfree (sections);
c906108c
SS
402
403 /* Tell display code (if any) about the changed file name. */
9a4105ab
AC
404 if (deprecated_exec_file_display_hook)
405 (*deprecated_exec_file_display_hook) (filename);
c906108c 406 }
9b333ba3
TT
407
408 do_cleanups (cleanups);
409
ce7d4522 410 bfd_cache_close_all ();
781b42b0 411 observer_notify_executable_changed ();
c906108c
SS
412}
413
414/* Process the first arg in ARGS as the new exec file.
415
c5aa993b
JM
416 Note that we have to explicitly ignore additional args, since we can
417 be called from file_command(), which also calls symbol_file_command()
1adeb98a
FN
418 which can take multiple args.
419
0963b4bd 420 If ARGS is NULL, we just want to close the exec file. */
c906108c 421
1adeb98a 422static void
fba45db2 423exec_file_command (char *args, int from_tty)
c906108c 424{
1adeb98a
FN
425 char **argv;
426 char *filename;
4c42eaff
DJ
427
428 if (from_tty && target_has_execution
429 && !query (_("A program is being debugged already.\n"
430 "Are you sure you want to change the file? ")))
431 error (_("File not changed."));
1adeb98a
FN
432
433 if (args)
434 {
f7545552
TT
435 struct cleanup *cleanups;
436
1adeb98a
FN
437 /* Scan through the args and pick up the first non option arg
438 as the filename. */
439
d1a41061 440 argv = gdb_buildargv (args);
f7545552 441 cleanups = make_cleanup_freeargv (argv);
1adeb98a
FN
442
443 for (; (*argv != NULL) && (**argv == '-'); argv++)
444 {;
445 }
446 if (*argv == NULL)
8a3fe4f8 447 error (_("No executable file name was specified"));
1adeb98a
FN
448
449 filename = tilde_expand (*argv);
450 make_cleanup (xfree, filename);
451 exec_file_attach (filename, from_tty);
f7545552
TT
452
453 do_cleanups (cleanups);
1adeb98a
FN
454 }
455 else
456 exec_file_attach (NULL, from_tty);
c906108c
SS
457}
458
0963b4bd 459/* Set both the exec file and the symbol file, in one command.
c906108c
SS
460 What a novelty. Why did GDB go through four major releases before this
461 command was added? */
462
463static void
fba45db2 464file_command (char *arg, int from_tty)
c906108c
SS
465{
466 /* FIXME, if we lose on reading the symbol file, we should revert
467 the exec file, but that's rough. */
468 exec_file_command (arg, from_tty);
469 symbol_file_command (arg, from_tty);
9a4105ab
AC
470 if (deprecated_file_changed_hook)
471 deprecated_file_changed_hook (arg);
c906108c 472}
c906108c 473\f
c5aa993b 474
0963b4bd 475/* Locate all mappable sections of a BFD file.
c906108c
SS
476 table_pp_char is a char * to get it through bfd_map_over_sections;
477 we cast it back to its proper type. */
478
479static void
7be0c536
AC
480add_to_section_table (bfd *abfd, struct bfd_section *asect,
481 void *table_pp_char)
c906108c 482{
0542c86d 483 struct target_section **table_pp = (struct target_section **) table_pp_char;
c906108c
SS
484 flagword aflag;
485
2b2848e2
DE
486 gdb_assert (abfd == asect->owner);
487
0f5d55d8
JB
488 /* Check the section flags, but do not discard zero-length sections, since
489 some symbols may still be attached to this section. For instance, we
490 encountered on sparc-solaris 2.10 a shared library with an empty .bss
491 section to which a symbol named "_end" was attached. The address
492 of this symbol still needs to be relocated. */
c906108c
SS
493 aflag = bfd_get_section_flags (abfd, asect);
494 if (!(aflag & SEC_ALLOC))
495 return;
0f5d55d8 496
046ac79f 497 (*table_pp)->owner = NULL;
c906108c
SS
498 (*table_pp)->the_bfd_section = asect;
499 (*table_pp)->addr = bfd_section_vma (abfd, asect);
500 (*table_pp)->endaddr = (*table_pp)->addr + bfd_section_size (abfd, asect);
501 (*table_pp)++;
502}
503
a5b1fd27
DE
504/* See exec.h. */
505
506void
507clear_section_table (struct target_section_table *table)
508{
509 xfree (table->sections);
510 table->sections = table->sections_end = NULL;
511}
512
513/* Resize section table TABLE by ADJUSTMENT.
514 ADJUSTMENT may be negative, in which case the caller must have already
515 removed the sections being deleted.
516 Returns the old size. */
517
518static int
519resize_section_table (struct target_section_table *table, int adjustment)
07b82ea5 520{
07b82ea5
PA
521 int old_count;
522 int new_count;
523
07b82ea5
PA
524 old_count = table->sections_end - table->sections;
525
a5b1fd27 526 new_count = adjustment + old_count;
07b82ea5
PA
527
528 if (new_count)
529 {
224c3ddb
SM
530 table->sections = XRESIZEVEC (struct target_section, table->sections,
531 new_count);
07b82ea5
PA
532 table->sections_end = table->sections + new_count;
533 }
534 else
a5b1fd27 535 clear_section_table (table);
07b82ea5
PA
536
537 return old_count;
538}
539
c906108c
SS
540/* Builds a section table, given args BFD, SECTABLE_PTR, SECEND_PTR.
541 Returns 0 if OK, 1 on error. */
542
543int
0542c86d
PA
544build_section_table (struct bfd *some_bfd, struct target_section **start,
545 struct target_section **end)
c906108c
SS
546{
547 unsigned count;
548
549 count = bfd_count_sections (some_bfd);
550 if (*start)
b8c9b27d 551 xfree (* start);
8d749320 552 *start = XNEWVEC (struct target_section, count);
c906108c 553 *end = *start;
c5aa993b 554 bfd_map_over_sections (some_bfd, add_to_section_table, (char *) end);
c906108c 555 if (*end > *start + count)
3e43a32a
MS
556 internal_error (__FILE__, __LINE__,
557 _("failed internal consistency check"));
c906108c
SS
558 /* We could realloc the table, but it probably loses for most files. */
559 return 0;
560}
07b82ea5
PA
561
562/* Add the sections array defined by [SECTIONS..SECTIONS_END[ to the
563 current set of target sections. */
564
565void
046ac79f 566add_target_sections (void *owner,
ed9eebaf 567 struct target_section *sections,
07b82ea5
PA
568 struct target_section *sections_end)
569{
570 int count;
571 struct target_section_table *table = current_target_sections;
572
573 count = sections_end - sections;
574
575 if (count > 0)
576 {
577 int space = resize_section_table (table, count);
ed9eebaf 578 int i;
d7f9d729 579
ed9eebaf
TT
580 for (i = 0; i < count; ++i)
581 {
582 table->sections[space + i] = sections[i];
046ac79f 583 table->sections[space + i].owner = owner;
ed9eebaf 584 }
07b82ea5
PA
585
586 /* If these are the first file sections we can provide memory
587 from, push the file_stratum target. */
ab16fce8
TT
588 if (!target_is_pushed (&exec_ops))
589 push_target (&exec_ops);
07b82ea5
PA
590 }
591}
592
76ad5e1e
NB
593/* Add the sections of OBJFILE to the current set of target sections. */
594
595void
596add_target_sections_of_objfile (struct objfile *objfile)
597{
598 struct target_section_table *table = current_target_sections;
599 struct obj_section *osect;
600 int space;
601 unsigned count = 0;
602 struct target_section *ts;
603
604 if (objfile == NULL)
605 return;
606
607 /* Compute the number of sections to add. */
608 ALL_OBJFILE_OSECTIONS (objfile, osect)
609 {
610 if (bfd_get_section_size (osect->the_bfd_section) == 0)
611 continue;
612 count++;
613 }
614
615 if (count == 0)
616 return;
617
618 space = resize_section_table (table, count);
619
620 ts = table->sections + space;
621
622 ALL_OBJFILE_OSECTIONS (objfile, osect)
623 {
624 if (bfd_get_section_size (osect->the_bfd_section) == 0)
625 continue;
626
627 gdb_assert (ts < table->sections + space + count);
628
629 ts->addr = obj_section_addr (osect);
630 ts->endaddr = obj_section_endaddr (osect);
631 ts->the_bfd_section = osect->the_bfd_section;
632 ts->owner = (void *) objfile;
633
634 ts++;
635 }
636}
637
046ac79f
JK
638/* Remove all target sections owned by OWNER.
639 OWNER must be the same value passed to add_target_sections. */
07b82ea5
PA
640
641void
046ac79f 642remove_target_sections (void *owner)
07b82ea5
PA
643{
644 struct target_section *src, *dest;
07b82ea5
PA
645 struct target_section_table *table = current_target_sections;
646
046ac79f
JK
647 gdb_assert (owner != NULL);
648
07b82ea5
PA
649 dest = table->sections;
650 for (src = table->sections; src < table->sections_end; src++)
046ac79f 651 if (src->owner != owner)
07b82ea5
PA
652 {
653 /* Keep this section. */
654 if (dest < src)
655 *dest = *src;
656 dest++;
657 }
658
659 /* If we've dropped any sections, resize the section table. */
660 if (dest < src)
661 {
662 int old_count;
663
664 old_count = resize_section_table (table, dest - src);
665
666 /* If we don't have any more sections to read memory from,
667 remove the file_stratum target from the stack. */
668 if (old_count + (dest - src) == 0)
6c95b8df
PA
669 {
670 struct program_space *pspace;
671
672 ALL_PSPACES (pspace)
673 if (pspace->target_sections.sections
674 != pspace->target_sections.sections_end)
675 return;
676
677 unpush_target (&exec_ops);
678 }
07b82ea5
PA
679 }
680}
681
c906108c 682\f
348f8c02 683
1ca49d37
YQ
684enum target_xfer_status
685exec_read_partial_read_only (gdb_byte *readbuf, ULONGEST offset,
686 ULONGEST len, ULONGEST *xfered_len)
687{
688 /* It's unduly pedantic to refuse to look at the executable for
689 read-only pieces; so do the equivalent of readonly regions aka
690 QTro packet. */
691 if (exec_bfd != NULL)
692 {
693 asection *s;
694 bfd_size_type size;
695 bfd_vma vma;
696
697 for (s = exec_bfd->sections; s; s = s->next)
698 {
699 if ((s->flags & SEC_LOAD) == 0
700 || (s->flags & SEC_READONLY) == 0)
701 continue;
702
703 vma = s->vma;
704 size = bfd_get_section_size (s);
705 if (vma <= offset && offset < (vma + size))
706 {
707 ULONGEST amt;
708
709 amt = (vma + size) - offset;
710 if (amt > len)
711 amt = len;
712
713 amt = bfd_get_section_contents (exec_bfd, s,
714 readbuf, offset - vma, amt);
715
716 if (amt == 0)
717 return TARGET_XFER_EOF;
718 else
719 {
720 *xfered_len = amt;
721 return TARGET_XFER_OK;
722 }
723 }
724 }
725 }
726
727 /* Indicate failure to find the requested memory block. */
728 return TARGET_XFER_E_IO;
729}
730
5a2eb0ef
YQ
731/* Appends all read-only memory ranges found in the target section
732 table defined by SECTIONS and SECTIONS_END, starting at (and
733 intersected with) MEMADDR for LEN bytes. Returns the augmented
734 VEC. */
735
736static VEC(mem_range_s) *
e6ca34fc 737section_table_available_memory (VEC(mem_range_s) *memory,
424447ee 738 CORE_ADDR memaddr, ULONGEST len,
e6ca34fc
PA
739 struct target_section *sections,
740 struct target_section *sections_end)
741{
742 struct target_section *p;
e6ca34fc
PA
743
744 for (p = sections; p < sections_end; p++)
745 {
2b2848e2
DE
746 if ((bfd_get_section_flags (p->the_bfd_section->owner,
747 p->the_bfd_section)
e6ca34fc
PA
748 & SEC_READONLY) == 0)
749 continue;
750
751 /* Copy the meta-data, adjusted. */
752 if (mem_ranges_overlap (p->addr, p->endaddr - p->addr, memaddr, len))
753 {
754 ULONGEST lo1, hi1, lo2, hi2;
755 struct mem_range *r;
756
757 lo1 = memaddr;
758 hi1 = memaddr + len;
759
760 lo2 = p->addr;
761 hi2 = p->endaddr;
762
763 r = VEC_safe_push (mem_range_s, memory, NULL);
764
325fac50
PA
765 r->start = std::max (lo1, lo2);
766 r->length = std::min (hi1, hi2) - r->start;
e6ca34fc
PA
767 }
768 }
769
770 return memory;
771}
772
1ee79381
YQ
773enum target_xfer_status
774section_table_read_available_memory (gdb_byte *readbuf, ULONGEST offset,
775 ULONGEST len, ULONGEST *xfered_len)
776{
777 VEC(mem_range_s) *available_memory = NULL;
778 struct target_section_table *table;
779 struct cleanup *old_chain;
780 mem_range_s *r;
781 int i;
782
783 table = target_get_section_table (&exec_ops);
784 available_memory = section_table_available_memory (available_memory,
785 offset, len,
786 table->sections,
787 table->sections_end);
788
789 old_chain = make_cleanup (VEC_cleanup(mem_range_s),
790 &available_memory);
791
792 normalize_mem_ranges (available_memory);
793
794 for (i = 0;
795 VEC_iterate (mem_range_s, available_memory, i, r);
796 i++)
797 {
798 if (mem_ranges_overlap (r->start, r->length, offset, len))
799 {
800 CORE_ADDR end;
801 enum target_xfer_status status;
802
803 /* Get the intersection window. */
768adc05 804 end = std::min<CORE_ADDR> (offset + len, r->start + r->length);
1ee79381
YQ
805
806 gdb_assert (end - offset <= len);
807
808 if (offset >= r->start)
809 status = exec_read_partial_read_only (readbuf, offset,
810 end - offset,
811 xfered_len);
812 else
813 {
814 *xfered_len = r->start - offset;
bc113b4e 815 status = TARGET_XFER_UNAVAILABLE;
1ee79381
YQ
816 }
817 do_cleanups (old_chain);
818 return status;
819 }
820 }
821 do_cleanups (old_chain);
822
823 *xfered_len = len;
bc113b4e 824 return TARGET_XFER_UNAVAILABLE;
1ee79381
YQ
825}
826
9b409511 827enum target_xfer_status
07b82ea5 828section_table_xfer_memory_partial (gdb_byte *readbuf, const gdb_byte *writebuf,
b55e14c7 829 ULONGEST offset, ULONGEST len,
9b409511 830 ULONGEST *xfered_len,
07b82ea5
PA
831 struct target_section *sections,
832 struct target_section *sections_end,
833 const char *section_name)
c906108c 834{
020cc13c 835 int res;
0542c86d 836 struct target_section *p;
07b82ea5
PA
837 ULONGEST memaddr = offset;
838 ULONGEST memend = memaddr + len;
c906108c 839
b55e14c7 840 if (len == 0)
3e43a32a
MS
841 internal_error (__FILE__, __LINE__,
842 _("failed internal consistency check"));
c906108c 843
348f8c02 844 for (p = sections; p < sections_end; p++)
c906108c 845 {
2b2848e2
DE
846 struct bfd_section *asect = p->the_bfd_section;
847 bfd *abfd = asect->owner;
848
849 if (section_name && strcmp (section_name, asect->name) != 0)
0963b4bd 850 continue; /* not the section we need. */
c906108c 851 if (memaddr >= p->addr)
3db26b01
JB
852 {
853 if (memend <= p->endaddr)
854 {
855 /* Entire transfer is within this section. */
07b82ea5 856 if (writebuf)
2b2848e2 857 res = bfd_set_section_contents (abfd, asect,
07b82ea5 858 writebuf, memaddr - p->addr,
85302095
AC
859 len);
860 else
2b2848e2 861 res = bfd_get_section_contents (abfd, asect,
07b82ea5 862 readbuf, memaddr - p->addr,
85302095 863 len);
9b409511
YQ
864
865 if (res != 0)
866 {
867 *xfered_len = len;
868 return TARGET_XFER_OK;
869 }
870 else
871 return TARGET_XFER_EOF;
3db26b01
JB
872 }
873 else if (memaddr >= p->endaddr)
874 {
875 /* This section ends before the transfer starts. */
876 continue;
877 }
878 else
879 {
880 /* This section overlaps the transfer. Just do half. */
881 len = p->endaddr - memaddr;
07b82ea5 882 if (writebuf)
2b2848e2 883 res = bfd_set_section_contents (abfd, asect,
07b82ea5 884 writebuf, memaddr - p->addr,
85302095
AC
885 len);
886 else
2b2848e2 887 res = bfd_get_section_contents (abfd, asect,
07b82ea5 888 readbuf, memaddr - p->addr,
85302095 889 len);
9b409511
YQ
890 if (res != 0)
891 {
892 *xfered_len = len;
893 return TARGET_XFER_OK;
894 }
895 else
896 return TARGET_XFER_EOF;
3db26b01
JB
897 }
898 }
c906108c
SS
899 }
900
9b409511 901 return TARGET_XFER_EOF; /* We can't help. */
c906108c 902}
348f8c02 903
70221824 904static struct target_section_table *
07b82ea5 905exec_get_section_table (struct target_ops *ops)
348f8c02 906{
07b82ea5 907 return current_target_sections;
348f8c02
PA
908}
909
9b409511 910static enum target_xfer_status
07b82ea5
PA
911exec_xfer_partial (struct target_ops *ops, enum target_object object,
912 const char *annex, gdb_byte *readbuf,
913 const gdb_byte *writebuf,
9b409511 914 ULONGEST offset, ULONGEST len, ULONGEST *xfered_len)
348f8c02 915{
07b82ea5
PA
916 struct target_section_table *table = target_get_section_table (ops);
917
918 if (object == TARGET_OBJECT_MEMORY)
919 return section_table_xfer_memory_partial (readbuf, writebuf,
9b409511 920 offset, len, xfered_len,
07b82ea5
PA
921 table->sections,
922 table->sections_end,
923 NULL);
924 else
2ed4b548 925 return TARGET_XFER_E_IO;
348f8c02 926}
c906108c 927\f
c5aa993b 928
c906108c 929void
07b82ea5 930print_section_info (struct target_section_table *t, bfd *abfd)
c906108c 931{
5af949e3 932 struct gdbarch *gdbarch = gdbarch_from_bfd (abfd);
0542c86d 933 struct target_section *p;
17a912b6 934 /* FIXME: 16 is not wide enough when gdbarch_addr_bit > 64. */
5af949e3 935 int wid = gdbarch_addr_bit (gdbarch) <= 32 ? 8 : 16;
c906108c 936
c5aa993b 937 printf_filtered ("\t`%s', ", bfd_get_filename (abfd));
c906108c 938 wrap_here (" ");
a3f17187 939 printf_filtered (_("file type %s.\n"), bfd_get_target (abfd));
c906108c 940 if (abfd == exec_bfd)
51bee8e9 941 {
3e43a32a
MS
942 /* gcc-3.4 does not like the initialization in
943 <p == t->sections_end>. */
d904de5b 944 bfd_vma displacement = 0;
2f1bdd26 945 bfd_vma entry_point;
51bee8e9
JK
946
947 for (p = t->sections; p < t->sections_end; p++)
948 {
2b2848e2
DE
949 struct bfd_section *psect = p->the_bfd_section;
950 bfd *pbfd = psect->owner;
51bee8e9 951
2b2848e2 952 if ((bfd_get_section_flags (pbfd, psect) & (SEC_ALLOC | SEC_LOAD))
51bee8e9
JK
953 != (SEC_ALLOC | SEC_LOAD))
954 continue;
955
2b2848e2
DE
956 if (bfd_get_section_vma (pbfd, psect) <= abfd->start_address
957 && abfd->start_address < (bfd_get_section_vma (pbfd, psect)
958 + bfd_get_section_size (psect)))
51bee8e9 959 {
2b2848e2 960 displacement = p->addr - bfd_get_section_vma (pbfd, psect);
51bee8e9
JK
961 break;
962 }
963 }
964 if (p == t->sections_end)
b37520b6 965 warning (_("Cannot find section for the entry point of %s."),
d904de5b 966 bfd_get_filename (abfd));
51bee8e9 967
2f1bdd26
MGD
968 entry_point = gdbarch_addr_bits_remove (gdbarch,
969 bfd_get_start_address (abfd)
970 + displacement);
51bee8e9 971 printf_filtered (_("\tEntry point: %s\n"),
2f1bdd26 972 paddress (gdbarch, entry_point));
51bee8e9 973 }
07b82ea5 974 for (p = t->sections; p < t->sections_end; p++)
c906108c 975 {
2b2848e2
DE
976 struct bfd_section *psect = p->the_bfd_section;
977 bfd *pbfd = psect->owner;
978
bb599908
PH
979 printf_filtered ("\t%s", hex_string_custom (p->addr, wid));
980 printf_filtered (" - %s", hex_string_custom (p->endaddr, wid));
bcf16802
KB
981
982 /* FIXME: A format of "08l" is not wide enough for file offsets
983 larger than 4GB. OTOH, making it "016l" isn't desirable either
984 since most output will then be much wider than necessary. It
985 may make sense to test the size of the file and choose the
986 format string accordingly. */
a3f17187 987 /* FIXME: i18n: Need to rewrite this sentence. */
c906108c
SS
988 if (info_verbose)
989 printf_filtered (" @ %s",
2b2848e2
DE
990 hex_string_custom (psect->filepos, 8));
991 printf_filtered (" is %s", bfd_section_name (pbfd, psect));
992 if (pbfd != abfd)
993 printf_filtered (" in %s", bfd_get_filename (pbfd));
c906108c
SS
994 printf_filtered ("\n");
995 }
996}
997
998static void
fba45db2 999exec_files_info (struct target_ops *t)
c906108c 1000{
57008375
JK
1001 if (exec_bfd)
1002 print_section_info (current_target_sections, exec_bfd);
1003 else
1004 puts_filtered (_("\t<no file loaded>\n"));
c906108c
SS
1005}
1006
1007static void
fba45db2 1008set_section_command (char *args, int from_tty)
c906108c 1009{
0542c86d 1010 struct target_section *p;
c906108c
SS
1011 char *secname;
1012 unsigned seclen;
1013 unsigned long secaddr;
1014 char secprint[100];
1015 long offset;
07b82ea5 1016 struct target_section_table *table;
c906108c
SS
1017
1018 if (args == 0)
8a3fe4f8 1019 error (_("Must specify section name and its virtual address"));
c906108c 1020
0963b4bd 1021 /* Parse out section name. */
c5aa993b 1022 for (secname = args; !isspace (*args); args++);
c906108c
SS
1023 seclen = args - secname;
1024
0963b4bd 1025 /* Parse out new virtual address. */
c906108c
SS
1026 secaddr = parse_and_eval_address (args);
1027
07b82ea5
PA
1028 table = current_target_sections;
1029 for (p = table->sections; p < table->sections_end; p++)
c5aa993b 1030 {
57008375 1031 if (!strncmp (secname, bfd_section_name (p->bfd,
3e43a32a 1032 p->the_bfd_section), seclen)
57008375 1033 && bfd_section_name (p->bfd, p->the_bfd_section)[seclen] == '\0')
c5aa993b
JM
1034 {
1035 offset = secaddr - p->addr;
1036 p->addr += offset;
1037 p->endaddr += offset;
1038 if (from_tty)
1039 exec_files_info (&exec_ops);
1040 return;
1041 }
c906108c 1042 }
c906108c
SS
1043 if (seclen >= sizeof (secprint))
1044 seclen = sizeof (secprint) - 1;
1045 strncpy (secprint, secname, seclen);
1046 secprint[seclen] = '\0';
8a3fe4f8 1047 error (_("Section %s not found"), secprint);
c906108c
SS
1048}
1049
30510692
DJ
1050/* If we can find a section in FILENAME with BFD index INDEX, adjust
1051 it to ADDRESS. */
c1bd25fd
DJ
1052
1053void
1054exec_set_section_address (const char *filename, int index, CORE_ADDR address)
1055{
0542c86d 1056 struct target_section *p;
07b82ea5 1057 struct target_section_table *table;
c1bd25fd 1058
07b82ea5
PA
1059 table = current_target_sections;
1060 for (p = table->sections; p < table->sections_end; p++)
c1bd25fd 1061 {
2b2848e2 1062 if (filename_cmp (filename, p->the_bfd_section->owner->filename) == 0
30510692 1063 && index == p->the_bfd_section->index)
c1bd25fd 1064 {
30510692 1065 p->endaddr += address - p->addr;
c1bd25fd 1066 p->addr = address;
c1bd25fd
DJ
1067 }
1068 }
1069}
1070
c906108c
SS
1071/* If mourn is being called in all the right places, this could be say
1072 `gdb internal error' (since generic_mourn calls
1073 breakpoint_init_inferior). */
1074
1075static int
3db08215
MM
1076ignore (struct target_ops *ops, struct gdbarch *gdbarch,
1077 struct bp_target_info *bp_tgt)
c906108c
SS
1078{
1079 return 0;
1080}
1081
73971819
PA
1082/* Implement the to_remove_breakpoint method. */
1083
1084static int
1085exec_remove_breakpoint (struct target_ops *ops, struct gdbarch *gdbarch,
1086 struct bp_target_info *bp_tgt,
1087 enum remove_bp_reason reason)
1088{
1089 return 0;
1090}
1091
c35b1492
PA
1092static int
1093exec_has_memory (struct target_ops *ops)
1094{
1095 /* We can provide memory if we have any file/target sections to read
1096 from. */
1097 return (current_target_sections->sections
1098 != current_target_sections->sections_end);
1099}
1100
83814951
TT
1101static char *
1102exec_make_note_section (struct target_ops *self, bfd *obfd, int *note_size)
1103{
1104 error (_("Can't create a corefile"));
1105}
be4d1333 1106
c906108c
SS
1107/* Fill in the exec file target vector. Very few entries need to be
1108 defined. */
1109
be4d1333 1110static void
fba45db2 1111init_exec_ops (void)
c906108c
SS
1112{
1113 exec_ops.to_shortname = "exec";
1114 exec_ops.to_longname = "Local exec file";
1115 exec_ops.to_doc = "Use an executable file as a target.\n\
1116Specify the filename of the executable file.";
1adeb98a 1117 exec_ops.to_open = exec_open;
6c95b8df 1118 exec_ops.to_close = exec_close_1;
07b82ea5
PA
1119 exec_ops.to_xfer_partial = exec_xfer_partial;
1120 exec_ops.to_get_section_table = exec_get_section_table;
c906108c
SS
1121 exec_ops.to_files_info = exec_files_info;
1122 exec_ops.to_insert_breakpoint = ignore;
73971819 1123 exec_ops.to_remove_breakpoint = exec_remove_breakpoint;
c906108c 1124 exec_ops.to_stratum = file_stratum;
c35b1492 1125 exec_ops.to_has_memory = exec_has_memory;
be4d1333 1126 exec_ops.to_make_corefile_notes = exec_make_note_section;
b427c1bc 1127 exec_ops.to_find_memory_regions = objfile_find_memory_regions;
c5aa993b 1128 exec_ops.to_magic = OPS_MAGIC;
c906108c
SS
1129}
1130
1131void
fba45db2 1132_initialize_exec (void)
c906108c
SS
1133{
1134 struct cmd_list_element *c;
1135
1136 init_exec_ops ();
1137
1138 if (!dbx_commands)
1139 {
1a966eab
AC
1140 c = add_cmd ("file", class_files, file_command, _("\
1141Use FILE as program to be debugged.\n\
c906108c
SS
1142It is read for its symbols, for getting the contents of pure memory,\n\
1143and it is the program executed when you use the `run' command.\n\
1144If FILE cannot be found as specified, your execution directory path\n\
1145($PATH) is searched for a command of that name.\n\
1a966eab 1146No arg means to have no executable file and no symbols."), &cmdlist);
5ba2abeb 1147 set_cmd_completer (c, filename_completer);
c906108c
SS
1148 }
1149
1a966eab
AC
1150 c = add_cmd ("exec-file", class_files, exec_file_command, _("\
1151Use FILE as program for getting contents of pure memory.\n\
c906108c
SS
1152If FILE cannot be found as specified, your execution directory path\n\
1153is searched for a command of that name.\n\
1a966eab 1154No arg means have no executable file."), &cmdlist);
5ba2abeb 1155 set_cmd_completer (c, filename_completer);
c906108c 1156
1bedd215
AC
1157 add_com ("section", class_files, set_section_command, _("\
1158Change the base address of section SECTION of the exec file to ADDR.\n\
c906108c
SS
1159This can be used if the exec file does not contain section addresses,\n\
1160(such as in the a.out format), or when the addresses specified in the\n\
1161file itself are wrong. Each section must be changed separately. The\n\
1bedd215 1162``info files'' command lists all the sections and their addresses."));
c906108c 1163
5bf193a2
AC
1164 add_setshow_boolean_cmd ("write", class_support, &write_files, _("\
1165Set writing into executable and core files."), _("\
1166Show writing into executable and core files."), NULL,
1167 NULL,
920d2a44 1168 show_write_files,
5bf193a2 1169 &setlist, &showlist);
c5aa993b 1170
9852c492 1171 add_target_with_completer (&exec_ops, filename_completer);
c906108c 1172}
This page took 1.397327 seconds and 4 git commands to generate.