Add some more breakpoint/location range tests
[deliverable/binutils-gdb.git] / gdb / exec.c
CommitLineData
c906108c 1/* Work with executable files, for GDB.
4646aa9d 2
61baf725 3 Copyright (C) 1988-2017 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "frame.h"
22#include "inferior.h"
23#include "target.h"
24#include "gdbcmd.h"
25#include "language.h"
0ba1096a 26#include "filenames.h"
c906108c
SS
27#include "symfile.h"
28#include "objfiles.h"
c5f0f3d0 29#include "completer.h"
fd0407d6 30#include "value.h"
4646aa9d 31#include "exec.h"
ea53e89f 32#include "observer.h"
dacec2a8 33#include "arch-utils.h"
6c95b8df
PA
34#include "gdbthread.h"
35#include "progspace.h"
cbb099e8 36#include "gdb_bfd.h"
b427c1bc 37#include "gcore.h"
c906108c 38
c906108c 39#include <fcntl.h>
dbda9972 40#include "readline/readline.h"
c906108c
SS
41#include "gdbcore.h"
42
43#include <ctype.h>
53ce3c39 44#include <sys/stat.h>
a9a5a3d1 45#include "solist.h"
325fac50 46#include <algorithm>
c906108c 47
1d8b34a7 48void (*deprecated_file_changed_hook) (const char *);
c906108c
SS
49
50/* Prototypes for local functions */
51
a14ed312 52static void set_section_command (char *, int);
c906108c 53
a14ed312 54static void exec_files_info (struct target_ops *);
c906108c 55
a14ed312 56static void init_exec_ops (void);
c906108c 57
c906108c
SS
58/* The target vector for executable files. */
59
e8b2341c 60static struct target_ops exec_ops;
c906108c 61
c906108c
SS
62/* Whether to open exec and core files read-only or read-write. */
63
64int write_files = 0;
920d2a44
AC
65static void
66show_write_files (struct ui_file *file, int from_tty,
67 struct cmd_list_element *c, const char *value)
68{
69 fprintf_filtered (file, _("Writing into executable and core files is %s.\n"),
70 value);
71}
72
c906108c 73
4c42eaff 74static void
014f9477 75exec_open (const char *args, int from_tty)
1adeb98a
FN
76{
77 target_preopen (from_tty);
78 exec_file_attach (args, from_tty);
79}
80
07b82ea5
PA
81/* Close and clear exec_bfd. If we end up with no target sections to
82 read memory from, this unpushes the exec_ops target. */
83
6c95b8df
PA
84void
85exec_close (void)
07b82ea5
PA
86{
87 if (exec_bfd)
88 {
89 bfd *abfd = exec_bfd;
07b82ea5 90
cbb099e8 91 gdb_bfd_unref (abfd);
07b82ea5
PA
92
93 /* Removing target sections may close the exec_ops target.
94 Clear exec_bfd before doing so to prevent recursion. */
95 exec_bfd = NULL;
96 exec_bfd_mtime = 0;
97
046ac79f 98 remove_target_sections (&exec_bfd);
1f0c4988
JK
99
100 xfree (exec_filename);
101 exec_filename = NULL;
07b82ea5
PA
102 }
103}
104
6c95b8df
PA
105/* This is the target_close implementation. Clears all target
106 sections and closes all executable bfds from all program spaces. */
107
c906108c 108static void
de90e03d 109exec_close_1 (struct target_ops *self)
c906108c 110{
ab16fce8 111 struct program_space *ss;
5ed8105e 112 scoped_restore_current_program_space restore_pspace;
6c95b8df 113
ab16fce8 114 ALL_PSPACES (ss)
5ed8105e
PA
115 {
116 set_current_program_space (ss);
117 clear_section_table (current_target_sections);
118 exec_close ();
119 }
c906108c
SS
120}
121
1adeb98a
FN
122void
123exec_file_clear (int from_tty)
124{
125 /* Remove exec file. */
6c95b8df 126 exec_close ();
1adeb98a
FN
127
128 if (from_tty)
a3f17187 129 printf_unfiltered (_("No executable file now.\n"));
1adeb98a
FN
130}
131
ecf45d2c 132/* See exec.h. */
a10de604
GB
133
134void
ecf45d2c
SL
135try_open_exec_file (const char *exec_file_host, struct inferior *inf,
136 symfile_add_flags add_flags)
a10de604 137{
88178e82 138 struct cleanup *old_chain;
57d1de9c 139 struct gdb_exception prev_err = exception_none;
a10de604 140
ecf45d2c 141 old_chain = make_cleanup (free_current_contents, &prev_err.message);
57d1de9c
LM
142
143 /* exec_file_attach and symbol_file_add_main may throw an error if the file
144 cannot be opened either locally or remotely.
145
146 This happens for example, when the file is first found in the local
147 sysroot (above), and then disappears (a TOCTOU race), or when it doesn't
148 exist in the target filesystem, or when the file does exist, but
149 is not readable.
88178e82 150
57d1de9c
LM
151 Even without a symbol file, the remote-based debugging session should
152 continue normally instead of ending abruptly. Hence we catch thrown
153 errors/exceptions in the following code. */
154 TRY
155 {
ecf45d2c
SL
156 /* We must do this step even if exec_file_host is NULL, so that
157 exec_file_attach will clear state. */
158 exec_file_attach (exec_file_host, add_flags & SYMFILE_VERBOSE);
57d1de9c
LM
159 }
160 CATCH (err, RETURN_MASK_ERROR)
161 {
162 if (err.message != NULL)
163 warning ("%s", err.message);
164
165 prev_err = err;
166
167 /* Save message so it doesn't get trashed by the catch below. */
b5e1db87
LM
168 if (err.message != NULL)
169 prev_err.message = xstrdup (err.message);
57d1de9c
LM
170 }
171 END_CATCH
172
ecf45d2c 173 if (exec_file_host != NULL)
57d1de9c 174 {
ecf45d2c
SL
175 TRY
176 {
177 symbol_file_add_main (exec_file_host, add_flags);
178 }
179 CATCH (err, RETURN_MASK_ERROR)
180 {
181 if (!exception_print_same (prev_err, err))
182 warning ("%s", err.message);
183 }
184 END_CATCH
57d1de9c 185 }
ecf45d2c
SL
186
187 do_cleanups (old_chain);
188}
189
190/* See gdbcore.h. */
191
192void
193exec_file_locate_attach (int pid, int defer_bp_reset, int from_tty)
194{
195 char *exec_file_target, *exec_file_host;
196 struct cleanup *old_chain;
197 symfile_add_flags add_flags = 0;
198
199 /* Do nothing if we already have an executable filename. */
200 if (get_exec_file (0) != NULL)
201 return;
202
203 /* Try to determine a filename from the process itself. */
204 exec_file_target = target_pid_to_exec_file (pid);
205 if (exec_file_target == NULL)
57d1de9c 206 {
ecf45d2c
SL
207 warning (_("No executable has been specified and target does not "
208 "support\n"
209 "determining executable automatically. "
210 "Try using the \"file\" command."));
211 return;
57d1de9c 212 }
88178e82 213
ecf45d2c
SL
214 exec_file_host = exec_file_find (exec_file_target, NULL);
215 old_chain = make_cleanup (xfree, exec_file_host);
216
217 if (defer_bp_reset)
218 add_flags |= SYMFILE_DEFER_BP_RESET;
219
220 if (from_tty)
221 add_flags |= SYMFILE_VERBOSE;
222
223 /* Attempt to open the exec file. */
224 try_open_exec_file (exec_file_host, current_inferior (), add_flags);
88178e82 225 do_cleanups (old_chain);
a10de604
GB
226}
227
907083d1 228/* Set FILENAME as the new exec file.
c906108c 229
c5aa993b
JM
230 This function is intended to be behave essentially the same
231 as exec_file_command, except that the latter will detect when
232 a target is being debugged, and will ask the user whether it
233 should be shut down first. (If the answer is "no", then the
234 new file is ignored.)
c906108c 235
c5aa993b
JM
236 This file is used by exec_file_command, to do the work of opening
237 and processing the exec file after any prompting has happened.
c906108c 238
c5aa993b
JM
239 And, it is used by child_attach, when the attach command was
240 given a pid but not a exec pathname, and the attach command could
241 figure out the pathname from the pid. (In this case, we shouldn't
242 ask the user whether the current target should be shut down --
907083d1 243 we're supplying the exec pathname late for good reason.) */
c906108c
SS
244
245void
5f08566b 246exec_file_attach (const char *filename, int from_tty)
c906108c 247{
9b333ba3
TT
248 /* First, acquire a reference to the current exec_bfd. We release
249 this at the end of the function; but acquiring it now lets the
250 BFD cache return it if this call refers to the same file. */
2712ce2e 251 gdb_bfd_ref_ptr exec_bfd_holder = new_bfd_ref (exec_bfd);
192b62ce 252
c906108c 253 /* Remove any previous exec file. */
6c95b8df 254 exec_close ();
c906108c
SS
255
256 /* Now open and digest the file the user requested, if any. */
257
1adeb98a
FN
258 if (!filename)
259 {
260 if (from_tty)
a3f17187 261 printf_unfiltered (_("No executable file now.\n"));
7a107747
DJ
262
263 set_gdbarch_from_file (NULL);
1adeb98a
FN
264 }
265 else
c906108c 266 {
64c0b5de 267 int load_via_target = 0;
14278e1f 268 const char *scratch_pathname, *canonical_pathname;
c906108c 269 int scratch_chan;
07b82ea5 270 struct target_section *sections = NULL, *sections_end = NULL;
d18b8b7a 271 char **matching;
c5aa993b 272
64c0b5de
GB
273 if (is_target_filename (filename))
274 {
275 if (target_filesystem_is_local ())
276 filename += strlen (TARGET_SYSROOT_PREFIX);
277 else
278 load_via_target = 1;
279 }
280
14278e1f 281 gdb::unique_xmalloc_ptr<char> canonical_storage, scratch_storage;
64c0b5de 282 if (load_via_target)
c5aa993b 283 {
64c0b5de
GB
284 /* gdb_bfd_fopen does not support "target:" filenames. */
285 if (write_files)
286 warning (_("writing into executable files is "
287 "not supported for %s sysroots"),
288 TARGET_SYSROOT_PREFIX);
289
14278e1f 290 scratch_pathname = filename;
64c0b5de 291 scratch_chan = -1;
64c0b5de 292 canonical_pathname = scratch_pathname;
c5aa993b 293 }
64c0b5de
GB
294 else
295 {
14278e1f
TT
296 char *temp_pathname;
297
64c0b5de
GB
298 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
299 filename, write_files ?
300 O_RDWR | O_BINARY : O_RDONLY | O_BINARY,
14278e1f 301 &temp_pathname);
64c0b5de
GB
302#if defined(__GO32__) || defined(_WIN32) || defined(__CYGWIN__)
303 if (scratch_chan < 0)
304 {
0ae1c716 305 char *exename = (char *) alloca (strlen (filename) + 5);
64c0b5de
GB
306
307 strcat (strcpy (exename, filename), ".exe");
308 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
309 exename, write_files ?
310 O_RDWR | O_BINARY
311 : O_RDONLY | O_BINARY,
14278e1f 312 &temp_pathname);
64c0b5de 313 }
c906108c 314#endif
64c0b5de
GB
315 if (scratch_chan < 0)
316 perror_with_name (filename);
a4453b7e 317
14278e1f
TT
318 scratch_storage.reset (temp_pathname);
319 scratch_pathname = temp_pathname;
a4453b7e 320
64c0b5de
GB
321 /* gdb_bfd_open (and its variants) prefers canonicalized
322 pathname for better BFD caching. */
14278e1f
TT
323 canonical_storage = gdb_realpath (scratch_pathname);
324 canonical_pathname = canonical_storage.get ();
64c0b5de 325 }
1f0c4988 326
192b62ce 327 gdb_bfd_ref_ptr temp;
64c0b5de 328 if (write_files && !load_via_target)
192b62ce
TT
329 temp = gdb_bfd_fopen (canonical_pathname, gnutarget,
330 FOPEN_RUB, scratch_chan);
1c00ec6b 331 else
192b62ce
TT
332 temp = gdb_bfd_open (canonical_pathname, gnutarget, scratch_chan);
333 exec_bfd = temp.release ();
c906108c
SS
334
335 if (!exec_bfd)
9fe4a216 336 {
d5131498 337 error (_("\"%s\": could not open as an executable file: %s."),
9fe4a216
TT
338 scratch_pathname, bfd_errmsg (bfd_get_error ()));
339 }
c906108c 340
64c0b5de
GB
341 /* gdb_realpath_keepfile resolves symlinks on the local
342 filesystem and so cannot be used for "target:" files. */
1f0c4988 343 gdb_assert (exec_filename == NULL);
64c0b5de
GB
344 if (load_via_target)
345 exec_filename = xstrdup (bfd_get_filename (exec_bfd));
346 else
4971c9a7 347 exec_filename = gdb_realpath_keepfile (scratch_pathname).release ();
1f0c4988 348
d18b8b7a 349 if (!bfd_check_format_matches (exec_bfd, bfd_object, &matching))
c906108c
SS
350 {
351 /* Make sure to close exec_bfd, or else "run" might try to use
352 it. */
6c95b8df 353 exec_close ();
8a3fe4f8 354 error (_("\"%s\": not in executable format: %s"),
d18b8b7a
HZ
355 scratch_pathname,
356 gdb_bfd_errmsg (bfd_get_error (), matching));
c906108c
SS
357 }
358
07b82ea5 359 if (build_section_table (exec_bfd, &sections, &sections_end))
c906108c
SS
360 {
361 /* Make sure to close exec_bfd, or else "run" might try to use
362 it. */
6c95b8df 363 exec_close ();
8a3fe4f8 364 error (_("\"%s\": can't find the file sections: %s"),
c906108c
SS
365 scratch_pathname, bfd_errmsg (bfd_get_error ()));
366 }
367
c04ea773
DJ
368 exec_bfd_mtime = bfd_get_mtime (exec_bfd);
369
c906108c
SS
370 validate_files ();
371
372 set_gdbarch_from_file (exec_bfd);
373
07b82ea5 374 /* Add the executable's sections to the current address spaces'
6c95b8df
PA
375 list of sections. This possibly pushes the exec_ops
376 target. */
ed9eebaf 377 add_target_sections (&exec_bfd, sections, sections_end);
07b82ea5 378 xfree (sections);
c906108c
SS
379
380 /* Tell display code (if any) about the changed file name. */
9a4105ab
AC
381 if (deprecated_exec_file_display_hook)
382 (*deprecated_exec_file_display_hook) (filename);
c906108c 383 }
9b333ba3 384
ce7d4522 385 bfd_cache_close_all ();
781b42b0 386 observer_notify_executable_changed ();
c906108c
SS
387}
388
389/* Process the first arg in ARGS as the new exec file.
390
c5aa993b
JM
391 Note that we have to explicitly ignore additional args, since we can
392 be called from file_command(), which also calls symbol_file_command()
1adeb98a
FN
393 which can take multiple args.
394
0963b4bd 395 If ARGS is NULL, we just want to close the exec file. */
c906108c 396
1adeb98a 397static void
1d8b34a7 398exec_file_command (const char *args, int from_tty)
c906108c 399{
1adeb98a 400 char *filename;
4c42eaff
DJ
401
402 if (from_tty && target_has_execution
403 && !query (_("A program is being debugged already.\n"
404 "Are you sure you want to change the file? ")))
405 error (_("File not changed."));
1adeb98a
FN
406
407 if (args)
408 {
409 /* Scan through the args and pick up the first non option arg
410 as the filename. */
411
773a1edc
TT
412 gdb_argv built_argv (args);
413 char **argv = built_argv.get ();
1adeb98a
FN
414
415 for (; (*argv != NULL) && (**argv == '-'); argv++)
416 {;
417 }
418 if (*argv == NULL)
8a3fe4f8 419 error (_("No executable file name was specified"));
1adeb98a 420
773a1edc
TT
421 gdb::unique_xmalloc_ptr<char> filename (tilde_expand (*argv));
422 exec_file_attach (filename.get (), from_tty);
1adeb98a
FN
423 }
424 else
425 exec_file_attach (NULL, from_tty);
c906108c
SS
426}
427
0963b4bd 428/* Set both the exec file and the symbol file, in one command.
c906108c
SS
429 What a novelty. Why did GDB go through four major releases before this
430 command was added? */
431
432static void
1d8b34a7 433file_command (const char *arg, int from_tty)
c906108c
SS
434{
435 /* FIXME, if we lose on reading the symbol file, we should revert
436 the exec file, but that's rough. */
437 exec_file_command (arg, from_tty);
438 symbol_file_command (arg, from_tty);
9a4105ab
AC
439 if (deprecated_file_changed_hook)
440 deprecated_file_changed_hook (arg);
c906108c 441}
c906108c 442\f
c5aa993b 443
0963b4bd 444/* Locate all mappable sections of a BFD file.
c906108c
SS
445 table_pp_char is a char * to get it through bfd_map_over_sections;
446 we cast it back to its proper type. */
447
448static void
7be0c536
AC
449add_to_section_table (bfd *abfd, struct bfd_section *asect,
450 void *table_pp_char)
c906108c 451{
0542c86d 452 struct target_section **table_pp = (struct target_section **) table_pp_char;
c906108c
SS
453 flagword aflag;
454
2b2848e2
DE
455 gdb_assert (abfd == asect->owner);
456
0f5d55d8
JB
457 /* Check the section flags, but do not discard zero-length sections, since
458 some symbols may still be attached to this section. For instance, we
459 encountered on sparc-solaris 2.10 a shared library with an empty .bss
460 section to which a symbol named "_end" was attached. The address
461 of this symbol still needs to be relocated. */
c906108c
SS
462 aflag = bfd_get_section_flags (abfd, asect);
463 if (!(aflag & SEC_ALLOC))
464 return;
0f5d55d8 465
046ac79f 466 (*table_pp)->owner = NULL;
c906108c
SS
467 (*table_pp)->the_bfd_section = asect;
468 (*table_pp)->addr = bfd_section_vma (abfd, asect);
469 (*table_pp)->endaddr = (*table_pp)->addr + bfd_section_size (abfd, asect);
470 (*table_pp)++;
471}
472
a5b1fd27
DE
473/* See exec.h. */
474
475void
476clear_section_table (struct target_section_table *table)
477{
478 xfree (table->sections);
479 table->sections = table->sections_end = NULL;
480}
481
482/* Resize section table TABLE by ADJUSTMENT.
483 ADJUSTMENT may be negative, in which case the caller must have already
484 removed the sections being deleted.
485 Returns the old size. */
486
487static int
488resize_section_table (struct target_section_table *table, int adjustment)
07b82ea5 489{
07b82ea5
PA
490 int old_count;
491 int new_count;
492
07b82ea5
PA
493 old_count = table->sections_end - table->sections;
494
a5b1fd27 495 new_count = adjustment + old_count;
07b82ea5
PA
496
497 if (new_count)
498 {
224c3ddb
SM
499 table->sections = XRESIZEVEC (struct target_section, table->sections,
500 new_count);
07b82ea5
PA
501 table->sections_end = table->sections + new_count;
502 }
503 else
a5b1fd27 504 clear_section_table (table);
07b82ea5
PA
505
506 return old_count;
507}
508
c906108c
SS
509/* Builds a section table, given args BFD, SECTABLE_PTR, SECEND_PTR.
510 Returns 0 if OK, 1 on error. */
511
512int
0542c86d
PA
513build_section_table (struct bfd *some_bfd, struct target_section **start,
514 struct target_section **end)
c906108c
SS
515{
516 unsigned count;
517
518 count = bfd_count_sections (some_bfd);
519 if (*start)
b8c9b27d 520 xfree (* start);
8d749320 521 *start = XNEWVEC (struct target_section, count);
c906108c 522 *end = *start;
c5aa993b 523 bfd_map_over_sections (some_bfd, add_to_section_table, (char *) end);
c906108c 524 if (*end > *start + count)
3e43a32a
MS
525 internal_error (__FILE__, __LINE__,
526 _("failed internal consistency check"));
c906108c
SS
527 /* We could realloc the table, but it probably loses for most files. */
528 return 0;
529}
07b82ea5
PA
530
531/* Add the sections array defined by [SECTIONS..SECTIONS_END[ to the
532 current set of target sections. */
533
534void
046ac79f 535add_target_sections (void *owner,
ed9eebaf 536 struct target_section *sections,
07b82ea5
PA
537 struct target_section *sections_end)
538{
539 int count;
540 struct target_section_table *table = current_target_sections;
541
542 count = sections_end - sections;
543
544 if (count > 0)
545 {
546 int space = resize_section_table (table, count);
ed9eebaf 547 int i;
d7f9d729 548
ed9eebaf
TT
549 for (i = 0; i < count; ++i)
550 {
551 table->sections[space + i] = sections[i];
046ac79f 552 table->sections[space + i].owner = owner;
ed9eebaf 553 }
07b82ea5
PA
554
555 /* If these are the first file sections we can provide memory
556 from, push the file_stratum target. */
ab16fce8
TT
557 if (!target_is_pushed (&exec_ops))
558 push_target (&exec_ops);
07b82ea5
PA
559 }
560}
561
76ad5e1e
NB
562/* Add the sections of OBJFILE to the current set of target sections. */
563
564void
565add_target_sections_of_objfile (struct objfile *objfile)
566{
567 struct target_section_table *table = current_target_sections;
568 struct obj_section *osect;
569 int space;
570 unsigned count = 0;
571 struct target_section *ts;
572
573 if (objfile == NULL)
574 return;
575
576 /* Compute the number of sections to add. */
577 ALL_OBJFILE_OSECTIONS (objfile, osect)
578 {
579 if (bfd_get_section_size (osect->the_bfd_section) == 0)
580 continue;
581 count++;
582 }
583
584 if (count == 0)
585 return;
586
587 space = resize_section_table (table, count);
588
589 ts = table->sections + space;
590
591 ALL_OBJFILE_OSECTIONS (objfile, osect)
592 {
593 if (bfd_get_section_size (osect->the_bfd_section) == 0)
594 continue;
595
596 gdb_assert (ts < table->sections + space + count);
597
598 ts->addr = obj_section_addr (osect);
599 ts->endaddr = obj_section_endaddr (osect);
600 ts->the_bfd_section = osect->the_bfd_section;
601 ts->owner = (void *) objfile;
602
603 ts++;
604 }
605}
606
046ac79f
JK
607/* Remove all target sections owned by OWNER.
608 OWNER must be the same value passed to add_target_sections. */
07b82ea5
PA
609
610void
046ac79f 611remove_target_sections (void *owner)
07b82ea5
PA
612{
613 struct target_section *src, *dest;
07b82ea5
PA
614 struct target_section_table *table = current_target_sections;
615
046ac79f
JK
616 gdb_assert (owner != NULL);
617
07b82ea5
PA
618 dest = table->sections;
619 for (src = table->sections; src < table->sections_end; src++)
046ac79f 620 if (src->owner != owner)
07b82ea5
PA
621 {
622 /* Keep this section. */
623 if (dest < src)
624 *dest = *src;
625 dest++;
626 }
627
628 /* If we've dropped any sections, resize the section table. */
629 if (dest < src)
630 {
631 int old_count;
632
633 old_count = resize_section_table (table, dest - src);
634
635 /* If we don't have any more sections to read memory from,
636 remove the file_stratum target from the stack. */
637 if (old_count + (dest - src) == 0)
6c95b8df
PA
638 {
639 struct program_space *pspace;
640
641 ALL_PSPACES (pspace)
642 if (pspace->target_sections.sections
643 != pspace->target_sections.sections_end)
644 return;
645
646 unpush_target (&exec_ops);
647 }
07b82ea5
PA
648 }
649}
650
c906108c 651\f
348f8c02 652
1ca49d37
YQ
653enum target_xfer_status
654exec_read_partial_read_only (gdb_byte *readbuf, ULONGEST offset,
655 ULONGEST len, ULONGEST *xfered_len)
656{
657 /* It's unduly pedantic to refuse to look at the executable for
658 read-only pieces; so do the equivalent of readonly regions aka
659 QTro packet. */
660 if (exec_bfd != NULL)
661 {
662 asection *s;
663 bfd_size_type size;
664 bfd_vma vma;
665
666 for (s = exec_bfd->sections; s; s = s->next)
667 {
668 if ((s->flags & SEC_LOAD) == 0
669 || (s->flags & SEC_READONLY) == 0)
670 continue;
671
672 vma = s->vma;
673 size = bfd_get_section_size (s);
674 if (vma <= offset && offset < (vma + size))
675 {
676 ULONGEST amt;
677
678 amt = (vma + size) - offset;
679 if (amt > len)
680 amt = len;
681
682 amt = bfd_get_section_contents (exec_bfd, s,
683 readbuf, offset - vma, amt);
684
685 if (amt == 0)
686 return TARGET_XFER_EOF;
687 else
688 {
689 *xfered_len = amt;
690 return TARGET_XFER_OK;
691 }
692 }
693 }
694 }
695
696 /* Indicate failure to find the requested memory block. */
697 return TARGET_XFER_E_IO;
698}
699
a79b1bc6 700/* Return all read-only memory ranges found in the target section
5a2eb0ef 701 table defined by SECTIONS and SECTIONS_END, starting at (and
a79b1bc6 702 intersected with) MEMADDR for LEN bytes. */
5a2eb0ef 703
a79b1bc6
SM
704static std::vector<mem_range>
705section_table_available_memory (CORE_ADDR memaddr, ULONGEST len,
e6ca34fc
PA
706 struct target_section *sections,
707 struct target_section *sections_end)
708{
a79b1bc6 709 std::vector<mem_range> memory;
e6ca34fc 710
a79b1bc6 711 for (target_section *p = sections; p < sections_end; p++)
e6ca34fc 712 {
2b2848e2
DE
713 if ((bfd_get_section_flags (p->the_bfd_section->owner,
714 p->the_bfd_section)
e6ca34fc
PA
715 & SEC_READONLY) == 0)
716 continue;
717
718 /* Copy the meta-data, adjusted. */
719 if (mem_ranges_overlap (p->addr, p->endaddr - p->addr, memaddr, len))
720 {
721 ULONGEST lo1, hi1, lo2, hi2;
e6ca34fc
PA
722
723 lo1 = memaddr;
724 hi1 = memaddr + len;
725
726 lo2 = p->addr;
727 hi2 = p->endaddr;
728
a79b1bc6
SM
729 CORE_ADDR start = std::max (lo1, lo2);
730 int length = std::min (hi1, hi2) - start;
e6ca34fc 731
a79b1bc6 732 memory.emplace_back (start, length);
e6ca34fc
PA
733 }
734 }
735
736 return memory;
737}
738
1ee79381
YQ
739enum target_xfer_status
740section_table_read_available_memory (gdb_byte *readbuf, ULONGEST offset,
741 ULONGEST len, ULONGEST *xfered_len)
742{
a79b1bc6
SM
743 target_section_table *table = target_get_section_table (&exec_ops);
744 std::vector<mem_range> available_memory
745 = section_table_available_memory (offset, len,
746 table->sections, table->sections_end);
1ee79381 747
a79b1bc6 748 normalize_mem_ranges (&available_memory);
1ee79381 749
a79b1bc6 750 for (const mem_range &r : available_memory)
1ee79381 751 {
a79b1bc6 752 if (mem_ranges_overlap (r.start, r.length, offset, len))
1ee79381
YQ
753 {
754 CORE_ADDR end;
755 enum target_xfer_status status;
756
757 /* Get the intersection window. */
a79b1bc6 758 end = std::min<CORE_ADDR> (offset + len, r.start + r.length);
1ee79381
YQ
759
760 gdb_assert (end - offset <= len);
761
a79b1bc6 762 if (offset >= r.start)
1ee79381
YQ
763 status = exec_read_partial_read_only (readbuf, offset,
764 end - offset,
765 xfered_len);
766 else
767 {
a79b1bc6 768 *xfered_len = r.start - offset;
bc113b4e 769 status = TARGET_XFER_UNAVAILABLE;
1ee79381 770 }
1ee79381
YQ
771 return status;
772 }
773 }
1ee79381
YQ
774
775 *xfered_len = len;
bc113b4e 776 return TARGET_XFER_UNAVAILABLE;
1ee79381
YQ
777}
778
9b409511 779enum target_xfer_status
07b82ea5 780section_table_xfer_memory_partial (gdb_byte *readbuf, const gdb_byte *writebuf,
b55e14c7 781 ULONGEST offset, ULONGEST len,
9b409511 782 ULONGEST *xfered_len,
07b82ea5
PA
783 struct target_section *sections,
784 struct target_section *sections_end,
785 const char *section_name)
c906108c 786{
020cc13c 787 int res;
0542c86d 788 struct target_section *p;
07b82ea5
PA
789 ULONGEST memaddr = offset;
790 ULONGEST memend = memaddr + len;
c906108c 791
b55e14c7 792 if (len == 0)
3e43a32a
MS
793 internal_error (__FILE__, __LINE__,
794 _("failed internal consistency check"));
c906108c 795
348f8c02 796 for (p = sections; p < sections_end; p++)
c906108c 797 {
2b2848e2
DE
798 struct bfd_section *asect = p->the_bfd_section;
799 bfd *abfd = asect->owner;
800
801 if (section_name && strcmp (section_name, asect->name) != 0)
0963b4bd 802 continue; /* not the section we need. */
c906108c 803 if (memaddr >= p->addr)
3db26b01
JB
804 {
805 if (memend <= p->endaddr)
806 {
807 /* Entire transfer is within this section. */
07b82ea5 808 if (writebuf)
2b2848e2 809 res = bfd_set_section_contents (abfd, asect,
07b82ea5 810 writebuf, memaddr - p->addr,
85302095
AC
811 len);
812 else
2b2848e2 813 res = bfd_get_section_contents (abfd, asect,
07b82ea5 814 readbuf, memaddr - p->addr,
85302095 815 len);
9b409511
YQ
816
817 if (res != 0)
818 {
819 *xfered_len = len;
820 return TARGET_XFER_OK;
821 }
822 else
823 return TARGET_XFER_EOF;
3db26b01
JB
824 }
825 else if (memaddr >= p->endaddr)
826 {
827 /* This section ends before the transfer starts. */
828 continue;
829 }
830 else
831 {
832 /* This section overlaps the transfer. Just do half. */
833 len = p->endaddr - memaddr;
07b82ea5 834 if (writebuf)
2b2848e2 835 res = bfd_set_section_contents (abfd, asect,
07b82ea5 836 writebuf, memaddr - p->addr,
85302095
AC
837 len);
838 else
2b2848e2 839 res = bfd_get_section_contents (abfd, asect,
07b82ea5 840 readbuf, memaddr - p->addr,
85302095 841 len);
9b409511
YQ
842 if (res != 0)
843 {
844 *xfered_len = len;
845 return TARGET_XFER_OK;
846 }
847 else
848 return TARGET_XFER_EOF;
3db26b01
JB
849 }
850 }
c906108c
SS
851 }
852
9b409511 853 return TARGET_XFER_EOF; /* We can't help. */
c906108c 854}
348f8c02 855
70221824 856static struct target_section_table *
07b82ea5 857exec_get_section_table (struct target_ops *ops)
348f8c02 858{
07b82ea5 859 return current_target_sections;
348f8c02
PA
860}
861
9b409511 862static enum target_xfer_status
07b82ea5
PA
863exec_xfer_partial (struct target_ops *ops, enum target_object object,
864 const char *annex, gdb_byte *readbuf,
865 const gdb_byte *writebuf,
9b409511 866 ULONGEST offset, ULONGEST len, ULONGEST *xfered_len)
348f8c02 867{
07b82ea5
PA
868 struct target_section_table *table = target_get_section_table (ops);
869
870 if (object == TARGET_OBJECT_MEMORY)
871 return section_table_xfer_memory_partial (readbuf, writebuf,
9b409511 872 offset, len, xfered_len,
07b82ea5
PA
873 table->sections,
874 table->sections_end,
875 NULL);
876 else
2ed4b548 877 return TARGET_XFER_E_IO;
348f8c02 878}
c906108c 879\f
c5aa993b 880
c906108c 881void
07b82ea5 882print_section_info (struct target_section_table *t, bfd *abfd)
c906108c 883{
5af949e3 884 struct gdbarch *gdbarch = gdbarch_from_bfd (abfd);
0542c86d 885 struct target_section *p;
17a912b6 886 /* FIXME: 16 is not wide enough when gdbarch_addr_bit > 64. */
5af949e3 887 int wid = gdbarch_addr_bit (gdbarch) <= 32 ? 8 : 16;
c906108c 888
c5aa993b 889 printf_filtered ("\t`%s', ", bfd_get_filename (abfd));
c906108c 890 wrap_here (" ");
a3f17187 891 printf_filtered (_("file type %s.\n"), bfd_get_target (abfd));
c906108c 892 if (abfd == exec_bfd)
51bee8e9 893 {
3e43a32a
MS
894 /* gcc-3.4 does not like the initialization in
895 <p == t->sections_end>. */
d904de5b 896 bfd_vma displacement = 0;
2f1bdd26 897 bfd_vma entry_point;
51bee8e9
JK
898
899 for (p = t->sections; p < t->sections_end; p++)
900 {
2b2848e2
DE
901 struct bfd_section *psect = p->the_bfd_section;
902 bfd *pbfd = psect->owner;
51bee8e9 903
2b2848e2 904 if ((bfd_get_section_flags (pbfd, psect) & (SEC_ALLOC | SEC_LOAD))
51bee8e9
JK
905 != (SEC_ALLOC | SEC_LOAD))
906 continue;
907
2b2848e2
DE
908 if (bfd_get_section_vma (pbfd, psect) <= abfd->start_address
909 && abfd->start_address < (bfd_get_section_vma (pbfd, psect)
910 + bfd_get_section_size (psect)))
51bee8e9 911 {
2b2848e2 912 displacement = p->addr - bfd_get_section_vma (pbfd, psect);
51bee8e9
JK
913 break;
914 }
915 }
916 if (p == t->sections_end)
b37520b6 917 warning (_("Cannot find section for the entry point of %s."),
d904de5b 918 bfd_get_filename (abfd));
51bee8e9 919
2f1bdd26
MGD
920 entry_point = gdbarch_addr_bits_remove (gdbarch,
921 bfd_get_start_address (abfd)
922 + displacement);
51bee8e9 923 printf_filtered (_("\tEntry point: %s\n"),
2f1bdd26 924 paddress (gdbarch, entry_point));
51bee8e9 925 }
07b82ea5 926 for (p = t->sections; p < t->sections_end; p++)
c906108c 927 {
2b2848e2
DE
928 struct bfd_section *psect = p->the_bfd_section;
929 bfd *pbfd = psect->owner;
930
bb599908
PH
931 printf_filtered ("\t%s", hex_string_custom (p->addr, wid));
932 printf_filtered (" - %s", hex_string_custom (p->endaddr, wid));
bcf16802
KB
933
934 /* FIXME: A format of "08l" is not wide enough for file offsets
935 larger than 4GB. OTOH, making it "016l" isn't desirable either
936 since most output will then be much wider than necessary. It
937 may make sense to test the size of the file and choose the
938 format string accordingly. */
a3f17187 939 /* FIXME: i18n: Need to rewrite this sentence. */
c906108c
SS
940 if (info_verbose)
941 printf_filtered (" @ %s",
2b2848e2
DE
942 hex_string_custom (psect->filepos, 8));
943 printf_filtered (" is %s", bfd_section_name (pbfd, psect));
944 if (pbfd != abfd)
945 printf_filtered (" in %s", bfd_get_filename (pbfd));
c906108c
SS
946 printf_filtered ("\n");
947 }
948}
949
950static void
fba45db2 951exec_files_info (struct target_ops *t)
c906108c 952{
57008375
JK
953 if (exec_bfd)
954 print_section_info (current_target_sections, exec_bfd);
955 else
956 puts_filtered (_("\t<no file loaded>\n"));
c906108c
SS
957}
958
959static void
fba45db2 960set_section_command (char *args, int from_tty)
c906108c 961{
0542c86d 962 struct target_section *p;
c906108c
SS
963 char *secname;
964 unsigned seclen;
965 unsigned long secaddr;
966 char secprint[100];
967 long offset;
07b82ea5 968 struct target_section_table *table;
c906108c
SS
969
970 if (args == 0)
8a3fe4f8 971 error (_("Must specify section name and its virtual address"));
c906108c 972
0963b4bd 973 /* Parse out section name. */
c5aa993b 974 for (secname = args; !isspace (*args); args++);
c906108c
SS
975 seclen = args - secname;
976
0963b4bd 977 /* Parse out new virtual address. */
c906108c
SS
978 secaddr = parse_and_eval_address (args);
979
07b82ea5
PA
980 table = current_target_sections;
981 for (p = table->sections; p < table->sections_end; p++)
c5aa993b 982 {
57008375 983 if (!strncmp (secname, bfd_section_name (p->bfd,
3e43a32a 984 p->the_bfd_section), seclen)
57008375 985 && bfd_section_name (p->bfd, p->the_bfd_section)[seclen] == '\0')
c5aa993b
JM
986 {
987 offset = secaddr - p->addr;
988 p->addr += offset;
989 p->endaddr += offset;
990 if (from_tty)
991 exec_files_info (&exec_ops);
992 return;
993 }
c906108c 994 }
c906108c
SS
995 if (seclen >= sizeof (secprint))
996 seclen = sizeof (secprint) - 1;
997 strncpy (secprint, secname, seclen);
998 secprint[seclen] = '\0';
8a3fe4f8 999 error (_("Section %s not found"), secprint);
c906108c
SS
1000}
1001
30510692
DJ
1002/* If we can find a section in FILENAME with BFD index INDEX, adjust
1003 it to ADDRESS. */
c1bd25fd
DJ
1004
1005void
1006exec_set_section_address (const char *filename, int index, CORE_ADDR address)
1007{
0542c86d 1008 struct target_section *p;
07b82ea5 1009 struct target_section_table *table;
c1bd25fd 1010
07b82ea5
PA
1011 table = current_target_sections;
1012 for (p = table->sections; p < table->sections_end; p++)
c1bd25fd 1013 {
2b2848e2 1014 if (filename_cmp (filename, p->the_bfd_section->owner->filename) == 0
30510692 1015 && index == p->the_bfd_section->index)
c1bd25fd 1016 {
30510692 1017 p->endaddr += address - p->addr;
c1bd25fd 1018 p->addr = address;
c1bd25fd
DJ
1019 }
1020 }
1021}
1022
c906108c
SS
1023/* If mourn is being called in all the right places, this could be say
1024 `gdb internal error' (since generic_mourn calls
1025 breakpoint_init_inferior). */
1026
1027static int
3db08215
MM
1028ignore (struct target_ops *ops, struct gdbarch *gdbarch,
1029 struct bp_target_info *bp_tgt)
c906108c
SS
1030{
1031 return 0;
1032}
1033
73971819
PA
1034/* Implement the to_remove_breakpoint method. */
1035
1036static int
1037exec_remove_breakpoint (struct target_ops *ops, struct gdbarch *gdbarch,
1038 struct bp_target_info *bp_tgt,
1039 enum remove_bp_reason reason)
1040{
1041 return 0;
1042}
1043
c35b1492
PA
1044static int
1045exec_has_memory (struct target_ops *ops)
1046{
1047 /* We can provide memory if we have any file/target sections to read
1048 from. */
1049 return (current_target_sections->sections
1050 != current_target_sections->sections_end);
1051}
1052
83814951
TT
1053static char *
1054exec_make_note_section (struct target_ops *self, bfd *obfd, int *note_size)
1055{
1056 error (_("Can't create a corefile"));
1057}
be4d1333 1058
c906108c
SS
1059/* Fill in the exec file target vector. Very few entries need to be
1060 defined. */
1061
be4d1333 1062static void
fba45db2 1063init_exec_ops (void)
c906108c
SS
1064{
1065 exec_ops.to_shortname = "exec";
1066 exec_ops.to_longname = "Local exec file";
1067 exec_ops.to_doc = "Use an executable file as a target.\n\
1068Specify the filename of the executable file.";
1adeb98a 1069 exec_ops.to_open = exec_open;
6c95b8df 1070 exec_ops.to_close = exec_close_1;
07b82ea5
PA
1071 exec_ops.to_xfer_partial = exec_xfer_partial;
1072 exec_ops.to_get_section_table = exec_get_section_table;
c906108c
SS
1073 exec_ops.to_files_info = exec_files_info;
1074 exec_ops.to_insert_breakpoint = ignore;
73971819 1075 exec_ops.to_remove_breakpoint = exec_remove_breakpoint;
c906108c 1076 exec_ops.to_stratum = file_stratum;
c35b1492 1077 exec_ops.to_has_memory = exec_has_memory;
be4d1333 1078 exec_ops.to_make_corefile_notes = exec_make_note_section;
b427c1bc 1079 exec_ops.to_find_memory_regions = objfile_find_memory_regions;
c5aa993b 1080 exec_ops.to_magic = OPS_MAGIC;
c906108c
SS
1081}
1082
1083void
fba45db2 1084_initialize_exec (void)
c906108c
SS
1085{
1086 struct cmd_list_element *c;
1087
1088 init_exec_ops ();
1089
1090 if (!dbx_commands)
1091 {
1a966eab
AC
1092 c = add_cmd ("file", class_files, file_command, _("\
1093Use FILE as program to be debugged.\n\
c906108c
SS
1094It is read for its symbols, for getting the contents of pure memory,\n\
1095and it is the program executed when you use the `run' command.\n\
1096If FILE cannot be found as specified, your execution directory path\n\
1097($PATH) is searched for a command of that name.\n\
1a966eab 1098No arg means to have no executable file and no symbols."), &cmdlist);
5ba2abeb 1099 set_cmd_completer (c, filename_completer);
c906108c
SS
1100 }
1101
1a966eab
AC
1102 c = add_cmd ("exec-file", class_files, exec_file_command, _("\
1103Use FILE as program for getting contents of pure memory.\n\
c906108c
SS
1104If FILE cannot be found as specified, your execution directory path\n\
1105is searched for a command of that name.\n\
1a966eab 1106No arg means have no executable file."), &cmdlist);
5ba2abeb 1107 set_cmd_completer (c, filename_completer);
c906108c 1108
1bedd215
AC
1109 add_com ("section", class_files, set_section_command, _("\
1110Change the base address of section SECTION of the exec file to ADDR.\n\
c906108c
SS
1111This can be used if the exec file does not contain section addresses,\n\
1112(such as in the a.out format), or when the addresses specified in the\n\
1113file itself are wrong. Each section must be changed separately. The\n\
1bedd215 1114``info files'' command lists all the sections and their addresses."));
c906108c 1115
5bf193a2
AC
1116 add_setshow_boolean_cmd ("write", class_support, &write_files, _("\
1117Set writing into executable and core files."), _("\
1118Show writing into executable and core files."), NULL,
1119 NULL,
920d2a44 1120 show_write_files,
5bf193a2 1121 &setlist, &showlist);
c5aa993b 1122
9852c492 1123 add_target_with_completer (&exec_ops, filename_completer);
c906108c 1124}
This page took 1.253971 seconds and 4 git commands to generate.