Fix double-free corruption
[deliverable/binutils-gdb.git] / gdb / exec.c
CommitLineData
c906108c 1/* Work with executable files, for GDB.
4646aa9d 2
61baf725 3 Copyright (C) 1988-2017 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "frame.h"
22#include "inferior.h"
23#include "target.h"
24#include "gdbcmd.h"
25#include "language.h"
0ba1096a 26#include "filenames.h"
c906108c
SS
27#include "symfile.h"
28#include "objfiles.h"
c5f0f3d0 29#include "completer.h"
fd0407d6 30#include "value.h"
4646aa9d 31#include "exec.h"
ea53e89f 32#include "observer.h"
dacec2a8 33#include "arch-utils.h"
6c95b8df
PA
34#include "gdbthread.h"
35#include "progspace.h"
cbb099e8 36#include "gdb_bfd.h"
b427c1bc 37#include "gcore.h"
c906108c 38
c906108c 39#include <fcntl.h>
dbda9972 40#include "readline/readline.h"
c906108c
SS
41#include "gdbcore.h"
42
43#include <ctype.h>
53ce3c39 44#include <sys/stat.h>
a9a5a3d1 45#include "solist.h"
325fac50 46#include <algorithm>
c906108c 47
1d8b34a7 48void (*deprecated_file_changed_hook) (const char *);
c906108c
SS
49
50/* Prototypes for local functions */
51
a14ed312 52static void set_section_command (char *, int);
c906108c 53
a14ed312 54static void exec_files_info (struct target_ops *);
c906108c 55
a14ed312 56static void init_exec_ops (void);
c906108c 57
c906108c
SS
58/* The target vector for executable files. */
59
e8b2341c 60static struct target_ops exec_ops;
c906108c 61
c906108c
SS
62/* Whether to open exec and core files read-only or read-write. */
63
64int write_files = 0;
920d2a44
AC
65static void
66show_write_files (struct ui_file *file, int from_tty,
67 struct cmd_list_element *c, const char *value)
68{
69 fprintf_filtered (file, _("Writing into executable and core files is %s.\n"),
70 value);
71}
72
c906108c 73
4c42eaff 74static void
014f9477 75exec_open (const char *args, int from_tty)
1adeb98a
FN
76{
77 target_preopen (from_tty);
78 exec_file_attach (args, from_tty);
79}
80
07b82ea5
PA
81/* Close and clear exec_bfd. If we end up with no target sections to
82 read memory from, this unpushes the exec_ops target. */
83
6c95b8df
PA
84void
85exec_close (void)
07b82ea5
PA
86{
87 if (exec_bfd)
88 {
89 bfd *abfd = exec_bfd;
07b82ea5 90
cbb099e8 91 gdb_bfd_unref (abfd);
07b82ea5
PA
92
93 /* Removing target sections may close the exec_ops target.
94 Clear exec_bfd before doing so to prevent recursion. */
95 exec_bfd = NULL;
96 exec_bfd_mtime = 0;
97
046ac79f 98 remove_target_sections (&exec_bfd);
1f0c4988
JK
99
100 xfree (exec_filename);
101 exec_filename = NULL;
07b82ea5
PA
102 }
103}
104
6c95b8df
PA
105/* This is the target_close implementation. Clears all target
106 sections and closes all executable bfds from all program spaces. */
107
c906108c 108static void
de90e03d 109exec_close_1 (struct target_ops *self)
c906108c 110{
ab16fce8 111 struct program_space *ss;
5ed8105e 112 scoped_restore_current_program_space restore_pspace;
6c95b8df 113
ab16fce8 114 ALL_PSPACES (ss)
5ed8105e
PA
115 {
116 set_current_program_space (ss);
117 clear_section_table (current_target_sections);
118 exec_close ();
119 }
c906108c
SS
120}
121
1adeb98a
FN
122void
123exec_file_clear (int from_tty)
124{
125 /* Remove exec file. */
6c95b8df 126 exec_close ();
1adeb98a
FN
127
128 if (from_tty)
a3f17187 129 printf_unfiltered (_("No executable file now.\n"));
1adeb98a
FN
130}
131
ecf45d2c 132/* See exec.h. */
a10de604
GB
133
134void
ecf45d2c
SL
135try_open_exec_file (const char *exec_file_host, struct inferior *inf,
136 symfile_add_flags add_flags)
a10de604 137{
88178e82 138 struct cleanup *old_chain;
57d1de9c 139 struct gdb_exception prev_err = exception_none;
a10de604 140
ecf45d2c 141 old_chain = make_cleanup (free_current_contents, &prev_err.message);
57d1de9c
LM
142
143 /* exec_file_attach and symbol_file_add_main may throw an error if the file
144 cannot be opened either locally or remotely.
145
146 This happens for example, when the file is first found in the local
147 sysroot (above), and then disappears (a TOCTOU race), or when it doesn't
148 exist in the target filesystem, or when the file does exist, but
149 is not readable.
88178e82 150
57d1de9c
LM
151 Even without a symbol file, the remote-based debugging session should
152 continue normally instead of ending abruptly. Hence we catch thrown
153 errors/exceptions in the following code. */
154 TRY
155 {
ecf45d2c
SL
156 /* We must do this step even if exec_file_host is NULL, so that
157 exec_file_attach will clear state. */
158 exec_file_attach (exec_file_host, add_flags & SYMFILE_VERBOSE);
57d1de9c
LM
159 }
160 CATCH (err, RETURN_MASK_ERROR)
161 {
162 if (err.message != NULL)
163 warning ("%s", err.message);
164
165 prev_err = err;
166
167 /* Save message so it doesn't get trashed by the catch below. */
b5e1db87
LM
168 if (err.message != NULL)
169 prev_err.message = xstrdup (err.message);
57d1de9c
LM
170 }
171 END_CATCH
172
ecf45d2c 173 if (exec_file_host != NULL)
57d1de9c 174 {
ecf45d2c
SL
175 TRY
176 {
177 symbol_file_add_main (exec_file_host, add_flags);
178 }
179 CATCH (err, RETURN_MASK_ERROR)
180 {
181 if (!exception_print_same (prev_err, err))
182 warning ("%s", err.message);
183 }
184 END_CATCH
57d1de9c 185 }
ecf45d2c
SL
186
187 do_cleanups (old_chain);
188}
189
190/* See gdbcore.h. */
191
192void
193exec_file_locate_attach (int pid, int defer_bp_reset, int from_tty)
194{
195 char *exec_file_target, *exec_file_host;
196 struct cleanup *old_chain;
197 symfile_add_flags add_flags = 0;
198
199 /* Do nothing if we already have an executable filename. */
200 if (get_exec_file (0) != NULL)
201 return;
202
203 /* Try to determine a filename from the process itself. */
204 exec_file_target = target_pid_to_exec_file (pid);
205 if (exec_file_target == NULL)
57d1de9c 206 {
ecf45d2c
SL
207 warning (_("No executable has been specified and target does not "
208 "support\n"
209 "determining executable automatically. "
210 "Try using the \"file\" command."));
211 return;
57d1de9c 212 }
88178e82 213
ecf45d2c
SL
214 exec_file_host = exec_file_find (exec_file_target, NULL);
215 old_chain = make_cleanup (xfree, exec_file_host);
216
217 if (defer_bp_reset)
218 add_flags |= SYMFILE_DEFER_BP_RESET;
219
220 if (from_tty)
221 add_flags |= SYMFILE_VERBOSE;
222
223 /* Attempt to open the exec file. */
224 try_open_exec_file (exec_file_host, current_inferior (), add_flags);
88178e82 225 do_cleanups (old_chain);
a10de604
GB
226}
227
907083d1 228/* Set FILENAME as the new exec file.
c906108c 229
c5aa993b
JM
230 This function is intended to be behave essentially the same
231 as exec_file_command, except that the latter will detect when
232 a target is being debugged, and will ask the user whether it
233 should be shut down first. (If the answer is "no", then the
234 new file is ignored.)
c906108c 235
c5aa993b
JM
236 This file is used by exec_file_command, to do the work of opening
237 and processing the exec file after any prompting has happened.
c906108c 238
c5aa993b
JM
239 And, it is used by child_attach, when the attach command was
240 given a pid but not a exec pathname, and the attach command could
241 figure out the pathname from the pid. (In this case, we shouldn't
242 ask the user whether the current target should be shut down --
907083d1 243 we're supplying the exec pathname late for good reason.) */
c906108c
SS
244
245void
5f08566b 246exec_file_attach (const char *filename, int from_tty)
c906108c 247{
9b333ba3
TT
248 /* First, acquire a reference to the current exec_bfd. We release
249 this at the end of the function; but acquiring it now lets the
250 BFD cache return it if this call refers to the same file. */
251 gdb_bfd_ref (exec_bfd);
192b62ce
TT
252 gdb_bfd_ref_ptr exec_bfd_holder (exec_bfd);
253
c906108c 254 /* Remove any previous exec file. */
6c95b8df 255 exec_close ();
c906108c
SS
256
257 /* Now open and digest the file the user requested, if any. */
258
1adeb98a
FN
259 if (!filename)
260 {
261 if (from_tty)
a3f17187 262 printf_unfiltered (_("No executable file now.\n"));
7a107747
DJ
263
264 set_gdbarch_from_file (NULL);
1adeb98a
FN
265 }
266 else
c906108c 267 {
64c0b5de 268 int load_via_target = 0;
14278e1f 269 const char *scratch_pathname, *canonical_pathname;
c906108c 270 int scratch_chan;
07b82ea5 271 struct target_section *sections = NULL, *sections_end = NULL;
d18b8b7a 272 char **matching;
c5aa993b 273
64c0b5de
GB
274 if (is_target_filename (filename))
275 {
276 if (target_filesystem_is_local ())
277 filename += strlen (TARGET_SYSROOT_PREFIX);
278 else
279 load_via_target = 1;
280 }
281
14278e1f 282 gdb::unique_xmalloc_ptr<char> canonical_storage, scratch_storage;
64c0b5de 283 if (load_via_target)
c5aa993b 284 {
64c0b5de
GB
285 /* gdb_bfd_fopen does not support "target:" filenames. */
286 if (write_files)
287 warning (_("writing into executable files is "
288 "not supported for %s sysroots"),
289 TARGET_SYSROOT_PREFIX);
290
14278e1f 291 scratch_pathname = filename;
64c0b5de 292 scratch_chan = -1;
64c0b5de 293 canonical_pathname = scratch_pathname;
c5aa993b 294 }
64c0b5de
GB
295 else
296 {
14278e1f
TT
297 char *temp_pathname;
298
64c0b5de
GB
299 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
300 filename, write_files ?
301 O_RDWR | O_BINARY : O_RDONLY | O_BINARY,
14278e1f 302 &temp_pathname);
64c0b5de
GB
303#if defined(__GO32__) || defined(_WIN32) || defined(__CYGWIN__)
304 if (scratch_chan < 0)
305 {
0ae1c716 306 char *exename = (char *) alloca (strlen (filename) + 5);
64c0b5de
GB
307
308 strcat (strcpy (exename, filename), ".exe");
309 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
310 exename, write_files ?
311 O_RDWR | O_BINARY
312 : O_RDONLY | O_BINARY,
14278e1f 313 &temp_pathname);
64c0b5de 314 }
c906108c 315#endif
64c0b5de
GB
316 if (scratch_chan < 0)
317 perror_with_name (filename);
a4453b7e 318
14278e1f
TT
319 scratch_storage.reset (temp_pathname);
320 scratch_pathname = temp_pathname;
a4453b7e 321
64c0b5de
GB
322 /* gdb_bfd_open (and its variants) prefers canonicalized
323 pathname for better BFD caching. */
14278e1f
TT
324 canonical_storage = gdb_realpath (scratch_pathname);
325 canonical_pathname = canonical_storage.get ();
64c0b5de 326 }
1f0c4988 327
192b62ce 328 gdb_bfd_ref_ptr temp;
64c0b5de 329 if (write_files && !load_via_target)
192b62ce
TT
330 temp = gdb_bfd_fopen (canonical_pathname, gnutarget,
331 FOPEN_RUB, scratch_chan);
1c00ec6b 332 else
192b62ce
TT
333 temp = gdb_bfd_open (canonical_pathname, gnutarget, scratch_chan);
334 exec_bfd = temp.release ();
c906108c
SS
335
336 if (!exec_bfd)
9fe4a216 337 {
d5131498 338 error (_("\"%s\": could not open as an executable file: %s."),
9fe4a216
TT
339 scratch_pathname, bfd_errmsg (bfd_get_error ()));
340 }
c906108c 341
64c0b5de
GB
342 /* gdb_realpath_keepfile resolves symlinks on the local
343 filesystem and so cannot be used for "target:" files. */
1f0c4988 344 gdb_assert (exec_filename == NULL);
64c0b5de
GB
345 if (load_via_target)
346 exec_filename = xstrdup (bfd_get_filename (exec_bfd));
347 else
4971c9a7 348 exec_filename = gdb_realpath_keepfile (scratch_pathname).release ();
1f0c4988 349
d18b8b7a 350 if (!bfd_check_format_matches (exec_bfd, bfd_object, &matching))
c906108c
SS
351 {
352 /* Make sure to close exec_bfd, or else "run" might try to use
353 it. */
6c95b8df 354 exec_close ();
8a3fe4f8 355 error (_("\"%s\": not in executable format: %s"),
d18b8b7a
HZ
356 scratch_pathname,
357 gdb_bfd_errmsg (bfd_get_error (), matching));
c906108c
SS
358 }
359
07b82ea5 360 if (build_section_table (exec_bfd, &sections, &sections_end))
c906108c
SS
361 {
362 /* Make sure to close exec_bfd, or else "run" might try to use
363 it. */
6c95b8df 364 exec_close ();
8a3fe4f8 365 error (_("\"%s\": can't find the file sections: %s"),
c906108c
SS
366 scratch_pathname, bfd_errmsg (bfd_get_error ()));
367 }
368
c04ea773
DJ
369 exec_bfd_mtime = bfd_get_mtime (exec_bfd);
370
c906108c
SS
371 validate_files ();
372
373 set_gdbarch_from_file (exec_bfd);
374
07b82ea5 375 /* Add the executable's sections to the current address spaces'
6c95b8df
PA
376 list of sections. This possibly pushes the exec_ops
377 target. */
ed9eebaf 378 add_target_sections (&exec_bfd, sections, sections_end);
07b82ea5 379 xfree (sections);
c906108c
SS
380
381 /* Tell display code (if any) about the changed file name. */
9a4105ab
AC
382 if (deprecated_exec_file_display_hook)
383 (*deprecated_exec_file_display_hook) (filename);
c906108c 384 }
9b333ba3 385
ce7d4522 386 bfd_cache_close_all ();
781b42b0 387 observer_notify_executable_changed ();
c906108c
SS
388}
389
390/* Process the first arg in ARGS as the new exec file.
391
c5aa993b
JM
392 Note that we have to explicitly ignore additional args, since we can
393 be called from file_command(), which also calls symbol_file_command()
1adeb98a
FN
394 which can take multiple args.
395
0963b4bd 396 If ARGS is NULL, we just want to close the exec file. */
c906108c 397
1adeb98a 398static void
1d8b34a7 399exec_file_command (const char *args, int from_tty)
c906108c 400{
1adeb98a 401 char *filename;
4c42eaff
DJ
402
403 if (from_tty && target_has_execution
404 && !query (_("A program is being debugged already.\n"
405 "Are you sure you want to change the file? ")))
406 error (_("File not changed."));
1adeb98a
FN
407
408 if (args)
409 {
410 /* Scan through the args and pick up the first non option arg
411 as the filename. */
412
773a1edc
TT
413 gdb_argv built_argv (args);
414 char **argv = built_argv.get ();
1adeb98a
FN
415
416 for (; (*argv != NULL) && (**argv == '-'); argv++)
417 {;
418 }
419 if (*argv == NULL)
8a3fe4f8 420 error (_("No executable file name was specified"));
1adeb98a 421
773a1edc
TT
422 gdb::unique_xmalloc_ptr<char> filename (tilde_expand (*argv));
423 exec_file_attach (filename.get (), from_tty);
1adeb98a
FN
424 }
425 else
426 exec_file_attach (NULL, from_tty);
c906108c
SS
427}
428
0963b4bd 429/* Set both the exec file and the symbol file, in one command.
c906108c
SS
430 What a novelty. Why did GDB go through four major releases before this
431 command was added? */
432
433static void
1d8b34a7 434file_command (const char *arg, int from_tty)
c906108c
SS
435{
436 /* FIXME, if we lose on reading the symbol file, we should revert
437 the exec file, but that's rough. */
438 exec_file_command (arg, from_tty);
439 symbol_file_command (arg, from_tty);
9a4105ab
AC
440 if (deprecated_file_changed_hook)
441 deprecated_file_changed_hook (arg);
c906108c 442}
c906108c 443\f
c5aa993b 444
0963b4bd 445/* Locate all mappable sections of a BFD file.
c906108c
SS
446 table_pp_char is a char * to get it through bfd_map_over_sections;
447 we cast it back to its proper type. */
448
449static void
7be0c536
AC
450add_to_section_table (bfd *abfd, struct bfd_section *asect,
451 void *table_pp_char)
c906108c 452{
0542c86d 453 struct target_section **table_pp = (struct target_section **) table_pp_char;
c906108c
SS
454 flagword aflag;
455
2b2848e2
DE
456 gdb_assert (abfd == asect->owner);
457
0f5d55d8
JB
458 /* Check the section flags, but do not discard zero-length sections, since
459 some symbols may still be attached to this section. For instance, we
460 encountered on sparc-solaris 2.10 a shared library with an empty .bss
461 section to which a symbol named "_end" was attached. The address
462 of this symbol still needs to be relocated. */
c906108c
SS
463 aflag = bfd_get_section_flags (abfd, asect);
464 if (!(aflag & SEC_ALLOC))
465 return;
0f5d55d8 466
046ac79f 467 (*table_pp)->owner = NULL;
c906108c
SS
468 (*table_pp)->the_bfd_section = asect;
469 (*table_pp)->addr = bfd_section_vma (abfd, asect);
470 (*table_pp)->endaddr = (*table_pp)->addr + bfd_section_size (abfd, asect);
471 (*table_pp)++;
472}
473
a5b1fd27
DE
474/* See exec.h. */
475
476void
477clear_section_table (struct target_section_table *table)
478{
479 xfree (table->sections);
480 table->sections = table->sections_end = NULL;
481}
482
483/* Resize section table TABLE by ADJUSTMENT.
484 ADJUSTMENT may be negative, in which case the caller must have already
485 removed the sections being deleted.
486 Returns the old size. */
487
488static int
489resize_section_table (struct target_section_table *table, int adjustment)
07b82ea5 490{
07b82ea5
PA
491 int old_count;
492 int new_count;
493
07b82ea5
PA
494 old_count = table->sections_end - table->sections;
495
a5b1fd27 496 new_count = adjustment + old_count;
07b82ea5
PA
497
498 if (new_count)
499 {
224c3ddb
SM
500 table->sections = XRESIZEVEC (struct target_section, table->sections,
501 new_count);
07b82ea5
PA
502 table->sections_end = table->sections + new_count;
503 }
504 else
a5b1fd27 505 clear_section_table (table);
07b82ea5
PA
506
507 return old_count;
508}
509
c906108c
SS
510/* Builds a section table, given args BFD, SECTABLE_PTR, SECEND_PTR.
511 Returns 0 if OK, 1 on error. */
512
513int
0542c86d
PA
514build_section_table (struct bfd *some_bfd, struct target_section **start,
515 struct target_section **end)
c906108c
SS
516{
517 unsigned count;
518
519 count = bfd_count_sections (some_bfd);
520 if (*start)
b8c9b27d 521 xfree (* start);
8d749320 522 *start = XNEWVEC (struct target_section, count);
c906108c 523 *end = *start;
c5aa993b 524 bfd_map_over_sections (some_bfd, add_to_section_table, (char *) end);
c906108c 525 if (*end > *start + count)
3e43a32a
MS
526 internal_error (__FILE__, __LINE__,
527 _("failed internal consistency check"));
c906108c
SS
528 /* We could realloc the table, but it probably loses for most files. */
529 return 0;
530}
07b82ea5
PA
531
532/* Add the sections array defined by [SECTIONS..SECTIONS_END[ to the
533 current set of target sections. */
534
535void
046ac79f 536add_target_sections (void *owner,
ed9eebaf 537 struct target_section *sections,
07b82ea5
PA
538 struct target_section *sections_end)
539{
540 int count;
541 struct target_section_table *table = current_target_sections;
542
543 count = sections_end - sections;
544
545 if (count > 0)
546 {
547 int space = resize_section_table (table, count);
ed9eebaf 548 int i;
d7f9d729 549
ed9eebaf
TT
550 for (i = 0; i < count; ++i)
551 {
552 table->sections[space + i] = sections[i];
046ac79f 553 table->sections[space + i].owner = owner;
ed9eebaf 554 }
07b82ea5
PA
555
556 /* If these are the first file sections we can provide memory
557 from, push the file_stratum target. */
ab16fce8
TT
558 if (!target_is_pushed (&exec_ops))
559 push_target (&exec_ops);
07b82ea5
PA
560 }
561}
562
76ad5e1e
NB
563/* Add the sections of OBJFILE to the current set of target sections. */
564
565void
566add_target_sections_of_objfile (struct objfile *objfile)
567{
568 struct target_section_table *table = current_target_sections;
569 struct obj_section *osect;
570 int space;
571 unsigned count = 0;
572 struct target_section *ts;
573
574 if (objfile == NULL)
575 return;
576
577 /* Compute the number of sections to add. */
578 ALL_OBJFILE_OSECTIONS (objfile, osect)
579 {
580 if (bfd_get_section_size (osect->the_bfd_section) == 0)
581 continue;
582 count++;
583 }
584
585 if (count == 0)
586 return;
587
588 space = resize_section_table (table, count);
589
590 ts = table->sections + space;
591
592 ALL_OBJFILE_OSECTIONS (objfile, osect)
593 {
594 if (bfd_get_section_size (osect->the_bfd_section) == 0)
595 continue;
596
597 gdb_assert (ts < table->sections + space + count);
598
599 ts->addr = obj_section_addr (osect);
600 ts->endaddr = obj_section_endaddr (osect);
601 ts->the_bfd_section = osect->the_bfd_section;
602 ts->owner = (void *) objfile;
603
604 ts++;
605 }
606}
607
046ac79f
JK
608/* Remove all target sections owned by OWNER.
609 OWNER must be the same value passed to add_target_sections. */
07b82ea5
PA
610
611void
046ac79f 612remove_target_sections (void *owner)
07b82ea5
PA
613{
614 struct target_section *src, *dest;
07b82ea5
PA
615 struct target_section_table *table = current_target_sections;
616
046ac79f
JK
617 gdb_assert (owner != NULL);
618
07b82ea5
PA
619 dest = table->sections;
620 for (src = table->sections; src < table->sections_end; src++)
046ac79f 621 if (src->owner != owner)
07b82ea5
PA
622 {
623 /* Keep this section. */
624 if (dest < src)
625 *dest = *src;
626 dest++;
627 }
628
629 /* If we've dropped any sections, resize the section table. */
630 if (dest < src)
631 {
632 int old_count;
633
634 old_count = resize_section_table (table, dest - src);
635
636 /* If we don't have any more sections to read memory from,
637 remove the file_stratum target from the stack. */
638 if (old_count + (dest - src) == 0)
6c95b8df
PA
639 {
640 struct program_space *pspace;
641
642 ALL_PSPACES (pspace)
643 if (pspace->target_sections.sections
644 != pspace->target_sections.sections_end)
645 return;
646
647 unpush_target (&exec_ops);
648 }
07b82ea5
PA
649 }
650}
651
c906108c 652\f
348f8c02 653
1ca49d37
YQ
654enum target_xfer_status
655exec_read_partial_read_only (gdb_byte *readbuf, ULONGEST offset,
656 ULONGEST len, ULONGEST *xfered_len)
657{
658 /* It's unduly pedantic to refuse to look at the executable for
659 read-only pieces; so do the equivalent of readonly regions aka
660 QTro packet. */
661 if (exec_bfd != NULL)
662 {
663 asection *s;
664 bfd_size_type size;
665 bfd_vma vma;
666
667 for (s = exec_bfd->sections; s; s = s->next)
668 {
669 if ((s->flags & SEC_LOAD) == 0
670 || (s->flags & SEC_READONLY) == 0)
671 continue;
672
673 vma = s->vma;
674 size = bfd_get_section_size (s);
675 if (vma <= offset && offset < (vma + size))
676 {
677 ULONGEST amt;
678
679 amt = (vma + size) - offset;
680 if (amt > len)
681 amt = len;
682
683 amt = bfd_get_section_contents (exec_bfd, s,
684 readbuf, offset - vma, amt);
685
686 if (amt == 0)
687 return TARGET_XFER_EOF;
688 else
689 {
690 *xfered_len = amt;
691 return TARGET_XFER_OK;
692 }
693 }
694 }
695 }
696
697 /* Indicate failure to find the requested memory block. */
698 return TARGET_XFER_E_IO;
699}
700
a79b1bc6 701/* Return all read-only memory ranges found in the target section
5a2eb0ef 702 table defined by SECTIONS and SECTIONS_END, starting at (and
a79b1bc6 703 intersected with) MEMADDR for LEN bytes. */
5a2eb0ef 704
a79b1bc6
SM
705static std::vector<mem_range>
706section_table_available_memory (CORE_ADDR memaddr, ULONGEST len,
e6ca34fc
PA
707 struct target_section *sections,
708 struct target_section *sections_end)
709{
a79b1bc6 710 std::vector<mem_range> memory;
e6ca34fc 711
a79b1bc6 712 for (target_section *p = sections; p < sections_end; p++)
e6ca34fc 713 {
2b2848e2
DE
714 if ((bfd_get_section_flags (p->the_bfd_section->owner,
715 p->the_bfd_section)
e6ca34fc
PA
716 & SEC_READONLY) == 0)
717 continue;
718
719 /* Copy the meta-data, adjusted. */
720 if (mem_ranges_overlap (p->addr, p->endaddr - p->addr, memaddr, len))
721 {
722 ULONGEST lo1, hi1, lo2, hi2;
e6ca34fc
PA
723
724 lo1 = memaddr;
725 hi1 = memaddr + len;
726
727 lo2 = p->addr;
728 hi2 = p->endaddr;
729
a79b1bc6
SM
730 CORE_ADDR start = std::max (lo1, lo2);
731 int length = std::min (hi1, hi2) - start;
e6ca34fc 732
a79b1bc6 733 memory.emplace_back (start, length);
e6ca34fc
PA
734 }
735 }
736
737 return memory;
738}
739
1ee79381
YQ
740enum target_xfer_status
741section_table_read_available_memory (gdb_byte *readbuf, ULONGEST offset,
742 ULONGEST len, ULONGEST *xfered_len)
743{
a79b1bc6
SM
744 target_section_table *table = target_get_section_table (&exec_ops);
745 std::vector<mem_range> available_memory
746 = section_table_available_memory (offset, len,
747 table->sections, table->sections_end);
1ee79381 748
a79b1bc6 749 normalize_mem_ranges (&available_memory);
1ee79381 750
a79b1bc6 751 for (const mem_range &r : available_memory)
1ee79381 752 {
a79b1bc6 753 if (mem_ranges_overlap (r.start, r.length, offset, len))
1ee79381
YQ
754 {
755 CORE_ADDR end;
756 enum target_xfer_status status;
757
758 /* Get the intersection window. */
a79b1bc6 759 end = std::min<CORE_ADDR> (offset + len, r.start + r.length);
1ee79381
YQ
760
761 gdb_assert (end - offset <= len);
762
a79b1bc6 763 if (offset >= r.start)
1ee79381
YQ
764 status = exec_read_partial_read_only (readbuf, offset,
765 end - offset,
766 xfered_len);
767 else
768 {
a79b1bc6 769 *xfered_len = r.start - offset;
bc113b4e 770 status = TARGET_XFER_UNAVAILABLE;
1ee79381 771 }
1ee79381
YQ
772 return status;
773 }
774 }
1ee79381
YQ
775
776 *xfered_len = len;
bc113b4e 777 return TARGET_XFER_UNAVAILABLE;
1ee79381
YQ
778}
779
9b409511 780enum target_xfer_status
07b82ea5 781section_table_xfer_memory_partial (gdb_byte *readbuf, const gdb_byte *writebuf,
b55e14c7 782 ULONGEST offset, ULONGEST len,
9b409511 783 ULONGEST *xfered_len,
07b82ea5
PA
784 struct target_section *sections,
785 struct target_section *sections_end,
786 const char *section_name)
c906108c 787{
020cc13c 788 int res;
0542c86d 789 struct target_section *p;
07b82ea5
PA
790 ULONGEST memaddr = offset;
791 ULONGEST memend = memaddr + len;
c906108c 792
b55e14c7 793 if (len == 0)
3e43a32a
MS
794 internal_error (__FILE__, __LINE__,
795 _("failed internal consistency check"));
c906108c 796
348f8c02 797 for (p = sections; p < sections_end; p++)
c906108c 798 {
2b2848e2
DE
799 struct bfd_section *asect = p->the_bfd_section;
800 bfd *abfd = asect->owner;
801
802 if (section_name && strcmp (section_name, asect->name) != 0)
0963b4bd 803 continue; /* not the section we need. */
c906108c 804 if (memaddr >= p->addr)
3db26b01
JB
805 {
806 if (memend <= p->endaddr)
807 {
808 /* Entire transfer is within this section. */
07b82ea5 809 if (writebuf)
2b2848e2 810 res = bfd_set_section_contents (abfd, asect,
07b82ea5 811 writebuf, memaddr - p->addr,
85302095
AC
812 len);
813 else
2b2848e2 814 res = bfd_get_section_contents (abfd, asect,
07b82ea5 815 readbuf, memaddr - p->addr,
85302095 816 len);
9b409511
YQ
817
818 if (res != 0)
819 {
820 *xfered_len = len;
821 return TARGET_XFER_OK;
822 }
823 else
824 return TARGET_XFER_EOF;
3db26b01
JB
825 }
826 else if (memaddr >= p->endaddr)
827 {
828 /* This section ends before the transfer starts. */
829 continue;
830 }
831 else
832 {
833 /* This section overlaps the transfer. Just do half. */
834 len = p->endaddr - memaddr;
07b82ea5 835 if (writebuf)
2b2848e2 836 res = bfd_set_section_contents (abfd, asect,
07b82ea5 837 writebuf, memaddr - p->addr,
85302095
AC
838 len);
839 else
2b2848e2 840 res = bfd_get_section_contents (abfd, asect,
07b82ea5 841 readbuf, memaddr - p->addr,
85302095 842 len);
9b409511
YQ
843 if (res != 0)
844 {
845 *xfered_len = len;
846 return TARGET_XFER_OK;
847 }
848 else
849 return TARGET_XFER_EOF;
3db26b01
JB
850 }
851 }
c906108c
SS
852 }
853
9b409511 854 return TARGET_XFER_EOF; /* We can't help. */
c906108c 855}
348f8c02 856
70221824 857static struct target_section_table *
07b82ea5 858exec_get_section_table (struct target_ops *ops)
348f8c02 859{
07b82ea5 860 return current_target_sections;
348f8c02
PA
861}
862
9b409511 863static enum target_xfer_status
07b82ea5
PA
864exec_xfer_partial (struct target_ops *ops, enum target_object object,
865 const char *annex, gdb_byte *readbuf,
866 const gdb_byte *writebuf,
9b409511 867 ULONGEST offset, ULONGEST len, ULONGEST *xfered_len)
348f8c02 868{
07b82ea5
PA
869 struct target_section_table *table = target_get_section_table (ops);
870
871 if (object == TARGET_OBJECT_MEMORY)
872 return section_table_xfer_memory_partial (readbuf, writebuf,
9b409511 873 offset, len, xfered_len,
07b82ea5
PA
874 table->sections,
875 table->sections_end,
876 NULL);
877 else
2ed4b548 878 return TARGET_XFER_E_IO;
348f8c02 879}
c906108c 880\f
c5aa993b 881
c906108c 882void
07b82ea5 883print_section_info (struct target_section_table *t, bfd *abfd)
c906108c 884{
5af949e3 885 struct gdbarch *gdbarch = gdbarch_from_bfd (abfd);
0542c86d 886 struct target_section *p;
17a912b6 887 /* FIXME: 16 is not wide enough when gdbarch_addr_bit > 64. */
5af949e3 888 int wid = gdbarch_addr_bit (gdbarch) <= 32 ? 8 : 16;
c906108c 889
c5aa993b 890 printf_filtered ("\t`%s', ", bfd_get_filename (abfd));
c906108c 891 wrap_here (" ");
a3f17187 892 printf_filtered (_("file type %s.\n"), bfd_get_target (abfd));
c906108c 893 if (abfd == exec_bfd)
51bee8e9 894 {
3e43a32a
MS
895 /* gcc-3.4 does not like the initialization in
896 <p == t->sections_end>. */
d904de5b 897 bfd_vma displacement = 0;
2f1bdd26 898 bfd_vma entry_point;
51bee8e9
JK
899
900 for (p = t->sections; p < t->sections_end; p++)
901 {
2b2848e2
DE
902 struct bfd_section *psect = p->the_bfd_section;
903 bfd *pbfd = psect->owner;
51bee8e9 904
2b2848e2 905 if ((bfd_get_section_flags (pbfd, psect) & (SEC_ALLOC | SEC_LOAD))
51bee8e9
JK
906 != (SEC_ALLOC | SEC_LOAD))
907 continue;
908
2b2848e2
DE
909 if (bfd_get_section_vma (pbfd, psect) <= abfd->start_address
910 && abfd->start_address < (bfd_get_section_vma (pbfd, psect)
911 + bfd_get_section_size (psect)))
51bee8e9 912 {
2b2848e2 913 displacement = p->addr - bfd_get_section_vma (pbfd, psect);
51bee8e9
JK
914 break;
915 }
916 }
917 if (p == t->sections_end)
b37520b6 918 warning (_("Cannot find section for the entry point of %s."),
d904de5b 919 bfd_get_filename (abfd));
51bee8e9 920
2f1bdd26
MGD
921 entry_point = gdbarch_addr_bits_remove (gdbarch,
922 bfd_get_start_address (abfd)
923 + displacement);
51bee8e9 924 printf_filtered (_("\tEntry point: %s\n"),
2f1bdd26 925 paddress (gdbarch, entry_point));
51bee8e9 926 }
07b82ea5 927 for (p = t->sections; p < t->sections_end; p++)
c906108c 928 {
2b2848e2
DE
929 struct bfd_section *psect = p->the_bfd_section;
930 bfd *pbfd = psect->owner;
931
bb599908
PH
932 printf_filtered ("\t%s", hex_string_custom (p->addr, wid));
933 printf_filtered (" - %s", hex_string_custom (p->endaddr, wid));
bcf16802
KB
934
935 /* FIXME: A format of "08l" is not wide enough for file offsets
936 larger than 4GB. OTOH, making it "016l" isn't desirable either
937 since most output will then be much wider than necessary. It
938 may make sense to test the size of the file and choose the
939 format string accordingly. */
a3f17187 940 /* FIXME: i18n: Need to rewrite this sentence. */
c906108c
SS
941 if (info_verbose)
942 printf_filtered (" @ %s",
2b2848e2
DE
943 hex_string_custom (psect->filepos, 8));
944 printf_filtered (" is %s", bfd_section_name (pbfd, psect));
945 if (pbfd != abfd)
946 printf_filtered (" in %s", bfd_get_filename (pbfd));
c906108c
SS
947 printf_filtered ("\n");
948 }
949}
950
951static void
fba45db2 952exec_files_info (struct target_ops *t)
c906108c 953{
57008375
JK
954 if (exec_bfd)
955 print_section_info (current_target_sections, exec_bfd);
956 else
957 puts_filtered (_("\t<no file loaded>\n"));
c906108c
SS
958}
959
960static void
fba45db2 961set_section_command (char *args, int from_tty)
c906108c 962{
0542c86d 963 struct target_section *p;
c906108c
SS
964 char *secname;
965 unsigned seclen;
966 unsigned long secaddr;
967 char secprint[100];
968 long offset;
07b82ea5 969 struct target_section_table *table;
c906108c
SS
970
971 if (args == 0)
8a3fe4f8 972 error (_("Must specify section name and its virtual address"));
c906108c 973
0963b4bd 974 /* Parse out section name. */
c5aa993b 975 for (secname = args; !isspace (*args); args++);
c906108c
SS
976 seclen = args - secname;
977
0963b4bd 978 /* Parse out new virtual address. */
c906108c
SS
979 secaddr = parse_and_eval_address (args);
980
07b82ea5
PA
981 table = current_target_sections;
982 for (p = table->sections; p < table->sections_end; p++)
c5aa993b 983 {
57008375 984 if (!strncmp (secname, bfd_section_name (p->bfd,
3e43a32a 985 p->the_bfd_section), seclen)
57008375 986 && bfd_section_name (p->bfd, p->the_bfd_section)[seclen] == '\0')
c5aa993b
JM
987 {
988 offset = secaddr - p->addr;
989 p->addr += offset;
990 p->endaddr += offset;
991 if (from_tty)
992 exec_files_info (&exec_ops);
993 return;
994 }
c906108c 995 }
c906108c
SS
996 if (seclen >= sizeof (secprint))
997 seclen = sizeof (secprint) - 1;
998 strncpy (secprint, secname, seclen);
999 secprint[seclen] = '\0';
8a3fe4f8 1000 error (_("Section %s not found"), secprint);
c906108c
SS
1001}
1002
30510692
DJ
1003/* If we can find a section in FILENAME with BFD index INDEX, adjust
1004 it to ADDRESS. */
c1bd25fd
DJ
1005
1006void
1007exec_set_section_address (const char *filename, int index, CORE_ADDR address)
1008{
0542c86d 1009 struct target_section *p;
07b82ea5 1010 struct target_section_table *table;
c1bd25fd 1011
07b82ea5
PA
1012 table = current_target_sections;
1013 for (p = table->sections; p < table->sections_end; p++)
c1bd25fd 1014 {
2b2848e2 1015 if (filename_cmp (filename, p->the_bfd_section->owner->filename) == 0
30510692 1016 && index == p->the_bfd_section->index)
c1bd25fd 1017 {
30510692 1018 p->endaddr += address - p->addr;
c1bd25fd 1019 p->addr = address;
c1bd25fd
DJ
1020 }
1021 }
1022}
1023
c906108c
SS
1024/* If mourn is being called in all the right places, this could be say
1025 `gdb internal error' (since generic_mourn calls
1026 breakpoint_init_inferior). */
1027
1028static int
3db08215
MM
1029ignore (struct target_ops *ops, struct gdbarch *gdbarch,
1030 struct bp_target_info *bp_tgt)
c906108c
SS
1031{
1032 return 0;
1033}
1034
73971819
PA
1035/* Implement the to_remove_breakpoint method. */
1036
1037static int
1038exec_remove_breakpoint (struct target_ops *ops, struct gdbarch *gdbarch,
1039 struct bp_target_info *bp_tgt,
1040 enum remove_bp_reason reason)
1041{
1042 return 0;
1043}
1044
c35b1492
PA
1045static int
1046exec_has_memory (struct target_ops *ops)
1047{
1048 /* We can provide memory if we have any file/target sections to read
1049 from. */
1050 return (current_target_sections->sections
1051 != current_target_sections->sections_end);
1052}
1053
83814951
TT
1054static char *
1055exec_make_note_section (struct target_ops *self, bfd *obfd, int *note_size)
1056{
1057 error (_("Can't create a corefile"));
1058}
be4d1333 1059
c906108c
SS
1060/* Fill in the exec file target vector. Very few entries need to be
1061 defined. */
1062
be4d1333 1063static void
fba45db2 1064init_exec_ops (void)
c906108c
SS
1065{
1066 exec_ops.to_shortname = "exec";
1067 exec_ops.to_longname = "Local exec file";
1068 exec_ops.to_doc = "Use an executable file as a target.\n\
1069Specify the filename of the executable file.";
1adeb98a 1070 exec_ops.to_open = exec_open;
6c95b8df 1071 exec_ops.to_close = exec_close_1;
07b82ea5
PA
1072 exec_ops.to_xfer_partial = exec_xfer_partial;
1073 exec_ops.to_get_section_table = exec_get_section_table;
c906108c
SS
1074 exec_ops.to_files_info = exec_files_info;
1075 exec_ops.to_insert_breakpoint = ignore;
73971819 1076 exec_ops.to_remove_breakpoint = exec_remove_breakpoint;
c906108c 1077 exec_ops.to_stratum = file_stratum;
c35b1492 1078 exec_ops.to_has_memory = exec_has_memory;
be4d1333 1079 exec_ops.to_make_corefile_notes = exec_make_note_section;
b427c1bc 1080 exec_ops.to_find_memory_regions = objfile_find_memory_regions;
c5aa993b 1081 exec_ops.to_magic = OPS_MAGIC;
c906108c
SS
1082}
1083
1084void
fba45db2 1085_initialize_exec (void)
c906108c
SS
1086{
1087 struct cmd_list_element *c;
1088
1089 init_exec_ops ();
1090
1091 if (!dbx_commands)
1092 {
1a966eab
AC
1093 c = add_cmd ("file", class_files, file_command, _("\
1094Use FILE as program to be debugged.\n\
c906108c
SS
1095It is read for its symbols, for getting the contents of pure memory,\n\
1096and it is the program executed when you use the `run' command.\n\
1097If FILE cannot be found as specified, your execution directory path\n\
1098($PATH) is searched for a command of that name.\n\
1a966eab 1099No arg means to have no executable file and no symbols."), &cmdlist);
5ba2abeb 1100 set_cmd_completer (c, filename_completer);
c906108c
SS
1101 }
1102
1a966eab
AC
1103 c = add_cmd ("exec-file", class_files, exec_file_command, _("\
1104Use FILE as program for getting contents of pure memory.\n\
c906108c
SS
1105If FILE cannot be found as specified, your execution directory path\n\
1106is searched for a command of that name.\n\
1a966eab 1107No arg means have no executable file."), &cmdlist);
5ba2abeb 1108 set_cmd_completer (c, filename_completer);
c906108c 1109
1bedd215
AC
1110 add_com ("section", class_files, set_section_command, _("\
1111Change the base address of section SECTION of the exec file to ADDR.\n\
c906108c
SS
1112This can be used if the exec file does not contain section addresses,\n\
1113(such as in the a.out format), or when the addresses specified in the\n\
1114file itself are wrong. Each section must be changed separately. The\n\
1bedd215 1115``info files'' command lists all the sections and their addresses."));
c906108c 1116
5bf193a2
AC
1117 add_setshow_boolean_cmd ("write", class_support, &write_files, _("\
1118Set writing into executable and core files."), _("\
1119Show writing into executable and core files."), NULL,
1120 NULL,
920d2a44 1121 show_write_files,
5bf193a2 1122 &setlist, &showlist);
c5aa993b 1123
9852c492 1124 add_target_with_completer (&exec_ops, filename_completer);
c906108c 1125}
This page took 1.25036 seconds and 4 git commands to generate.