Properly set alarm value in gdb.threads/non-stop-fair-events.exp
[deliverable/binutils-gdb.git] / gdb / exec.c
CommitLineData
c906108c 1/* Work with executable files, for GDB.
4646aa9d 2
32d0add0 3 Copyright (C) 1988-2015 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "frame.h"
22#include "inferior.h"
23#include "target.h"
24#include "gdbcmd.h"
25#include "language.h"
0ba1096a 26#include "filenames.h"
c906108c
SS
27#include "symfile.h"
28#include "objfiles.h"
c5f0f3d0 29#include "completer.h"
fd0407d6 30#include "value.h"
4646aa9d 31#include "exec.h"
ea53e89f 32#include "observer.h"
dacec2a8 33#include "arch-utils.h"
6c95b8df
PA
34#include "gdbthread.h"
35#include "progspace.h"
cbb099e8 36#include "gdb_bfd.h"
b427c1bc 37#include "gcore.h"
c906108c 38
c906108c 39#include <fcntl.h>
dbda9972 40#include "readline/readline.h"
c906108c
SS
41#include "gdbcore.h"
42
43#include <ctype.h>
53ce3c39 44#include <sys/stat.h>
c906108c 45
9a4105ab 46void (*deprecated_file_changed_hook) (char *);
c906108c
SS
47
48/* Prototypes for local functions */
49
a14ed312 50static void file_command (char *, int);
c906108c 51
a14ed312 52static void set_section_command (char *, int);
c906108c 53
a14ed312 54static void exec_files_info (struct target_ops *);
c906108c 55
a14ed312 56static void init_exec_ops (void);
c906108c 57
a14ed312 58void _initialize_exec (void);
c906108c 59
c906108c
SS
60/* The target vector for executable files. */
61
e8b2341c 62static struct target_ops exec_ops;
c906108c 63
c906108c
SS
64/* Whether to open exec and core files read-only or read-write. */
65
66int write_files = 0;
920d2a44
AC
67static void
68show_write_files (struct ui_file *file, int from_tty,
69 struct cmd_list_element *c, const char *value)
70{
71 fprintf_filtered (file, _("Writing into executable and core files is %s.\n"),
72 value);
73}
74
c906108c 75
4c42eaff 76static void
014f9477 77exec_open (const char *args, int from_tty)
1adeb98a
FN
78{
79 target_preopen (from_tty);
80 exec_file_attach (args, from_tty);
81}
82
07b82ea5
PA
83/* Close and clear exec_bfd. If we end up with no target sections to
84 read memory from, this unpushes the exec_ops target. */
85
6c95b8df
PA
86void
87exec_close (void)
07b82ea5
PA
88{
89 if (exec_bfd)
90 {
91 bfd *abfd = exec_bfd;
07b82ea5 92
cbb099e8 93 gdb_bfd_unref (abfd);
07b82ea5
PA
94
95 /* Removing target sections may close the exec_ops target.
96 Clear exec_bfd before doing so to prevent recursion. */
97 exec_bfd = NULL;
98 exec_bfd_mtime = 0;
99
046ac79f 100 remove_target_sections (&exec_bfd);
1f0c4988
JK
101
102 xfree (exec_filename);
103 exec_filename = NULL;
07b82ea5
PA
104 }
105}
106
6c95b8df
PA
107/* This is the target_close implementation. Clears all target
108 sections and closes all executable bfds from all program spaces. */
109
c906108c 110static void
de90e03d 111exec_close_1 (struct target_ops *self)
c906108c 112{
ab16fce8
TT
113 struct program_space *ss;
114 struct cleanup *old_chain;
6c95b8df 115
ab16fce8
TT
116 old_chain = save_current_program_space ();
117 ALL_PSPACES (ss)
6c95b8df 118 {
ab16fce8
TT
119 set_current_program_space (ss);
120 clear_section_table (current_target_sections);
121 exec_close ();
6c95b8df 122 }
ab16fce8
TT
123
124 do_cleanups (old_chain);
c906108c
SS
125}
126
1adeb98a
FN
127void
128exec_file_clear (int from_tty)
129{
130 /* Remove exec file. */
6c95b8df 131 exec_close ();
1adeb98a
FN
132
133 if (from_tty)
a3f17187 134 printf_unfiltered (_("No executable file now.\n"));
1adeb98a
FN
135}
136
907083d1 137/* Set FILENAME as the new exec file.
c906108c 138
c5aa993b
JM
139 This function is intended to be behave essentially the same
140 as exec_file_command, except that the latter will detect when
141 a target is being debugged, and will ask the user whether it
142 should be shut down first. (If the answer is "no", then the
143 new file is ignored.)
c906108c 144
c5aa993b
JM
145 This file is used by exec_file_command, to do the work of opening
146 and processing the exec file after any prompting has happened.
c906108c 147
c5aa993b
JM
148 And, it is used by child_attach, when the attach command was
149 given a pid but not a exec pathname, and the attach command could
150 figure out the pathname from the pid. (In this case, we shouldn't
151 ask the user whether the current target should be shut down --
907083d1 152 we're supplying the exec pathname late for good reason.) */
c906108c
SS
153
154void
5f08566b 155exec_file_attach (const char *filename, int from_tty)
c906108c 156{
9b333ba3
TT
157 struct cleanup *cleanups;
158
159 /* First, acquire a reference to the current exec_bfd. We release
160 this at the end of the function; but acquiring it now lets the
161 BFD cache return it if this call refers to the same file. */
162 gdb_bfd_ref (exec_bfd);
163 cleanups = make_cleanup_bfd_unref (exec_bfd);
164
c906108c 165 /* Remove any previous exec file. */
6c95b8df 166 exec_close ();
c906108c
SS
167
168 /* Now open and digest the file the user requested, if any. */
169
1adeb98a
FN
170 if (!filename)
171 {
172 if (from_tty)
a3f17187 173 printf_unfiltered (_("No executable file now.\n"));
7a107747
DJ
174
175 set_gdbarch_from_file (NULL);
1adeb98a
FN
176 }
177 else
c906108c 178 {
64c0b5de 179 int load_via_target = 0;
1f0c4988 180 char *scratch_pathname, *canonical_pathname;
c906108c 181 int scratch_chan;
07b82ea5 182 struct target_section *sections = NULL, *sections_end = NULL;
d18b8b7a 183 char **matching;
c5aa993b 184
64c0b5de
GB
185 if (is_target_filename (filename))
186 {
187 if (target_filesystem_is_local ())
188 filename += strlen (TARGET_SYSROOT_PREFIX);
189 else
190 load_via_target = 1;
191 }
192
193 if (load_via_target)
c5aa993b 194 {
64c0b5de
GB
195 /* gdb_bfd_fopen does not support "target:" filenames. */
196 if (write_files)
197 warning (_("writing into executable files is "
198 "not supported for %s sysroots"),
199 TARGET_SYSROOT_PREFIX);
200
201 scratch_pathname = xstrdup (filename);
202 make_cleanup (xfree, scratch_pathname);
203
204 scratch_chan = -1;
d7f9d729 205
64c0b5de 206 canonical_pathname = scratch_pathname;
c5aa993b 207 }
64c0b5de
GB
208 else
209 {
210 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
211 filename, write_files ?
212 O_RDWR | O_BINARY : O_RDONLY | O_BINARY,
213 &scratch_pathname);
214#if defined(__GO32__) || defined(_WIN32) || defined(__CYGWIN__)
215 if (scratch_chan < 0)
216 {
217 char *exename = alloca (strlen (filename) + 5);
218
219 strcat (strcpy (exename, filename), ".exe");
220 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
221 exename, write_files ?
222 O_RDWR | O_BINARY
223 : O_RDONLY | O_BINARY,
224 &scratch_pathname);
225 }
c906108c 226#endif
64c0b5de
GB
227 if (scratch_chan < 0)
228 perror_with_name (filename);
a4453b7e 229
64c0b5de 230 make_cleanup (xfree, scratch_pathname);
a4453b7e 231
64c0b5de
GB
232 /* gdb_bfd_open (and its variants) prefers canonicalized
233 pathname for better BFD caching. */
234 canonical_pathname = gdb_realpath (scratch_pathname);
235 make_cleanup (xfree, canonical_pathname);
236 }
1f0c4988 237
64c0b5de 238 if (write_files && !load_via_target)
1f0c4988 239 exec_bfd = gdb_bfd_fopen (canonical_pathname, gnutarget,
1c00ec6b
TT
240 FOPEN_RUB, scratch_chan);
241 else
1f0c4988 242 exec_bfd = gdb_bfd_open (canonical_pathname, gnutarget, scratch_chan);
c906108c
SS
243
244 if (!exec_bfd)
9fe4a216 245 {
9fe4a216
TT
246 error (_("\"%s\": could not open as an executable file: %s"),
247 scratch_pathname, bfd_errmsg (bfd_get_error ()));
248 }
c906108c 249
64c0b5de
GB
250 /* gdb_realpath_keepfile resolves symlinks on the local
251 filesystem and so cannot be used for "target:" files. */
1f0c4988 252 gdb_assert (exec_filename == NULL);
64c0b5de
GB
253 if (load_via_target)
254 exec_filename = xstrdup (bfd_get_filename (exec_bfd));
255 else
256 exec_filename = gdb_realpath_keepfile (scratch_pathname);
1f0c4988 257
d18b8b7a 258 if (!bfd_check_format_matches (exec_bfd, bfd_object, &matching))
c906108c
SS
259 {
260 /* Make sure to close exec_bfd, or else "run" might try to use
261 it. */
6c95b8df 262 exec_close ();
8a3fe4f8 263 error (_("\"%s\": not in executable format: %s"),
d18b8b7a
HZ
264 scratch_pathname,
265 gdb_bfd_errmsg (bfd_get_error (), matching));
c906108c
SS
266 }
267
07b82ea5 268 if (build_section_table (exec_bfd, &sections, &sections_end))
c906108c
SS
269 {
270 /* Make sure to close exec_bfd, or else "run" might try to use
271 it. */
6c95b8df 272 exec_close ();
8a3fe4f8 273 error (_("\"%s\": can't find the file sections: %s"),
c906108c
SS
274 scratch_pathname, bfd_errmsg (bfd_get_error ()));
275 }
276
c04ea773
DJ
277 exec_bfd_mtime = bfd_get_mtime (exec_bfd);
278
c906108c
SS
279 validate_files ();
280
281 set_gdbarch_from_file (exec_bfd);
282
07b82ea5 283 /* Add the executable's sections to the current address spaces'
6c95b8df
PA
284 list of sections. This possibly pushes the exec_ops
285 target. */
ed9eebaf 286 add_target_sections (&exec_bfd, sections, sections_end);
07b82ea5 287 xfree (sections);
c906108c
SS
288
289 /* Tell display code (if any) about the changed file name. */
9a4105ab
AC
290 if (deprecated_exec_file_display_hook)
291 (*deprecated_exec_file_display_hook) (filename);
c906108c 292 }
9b333ba3
TT
293
294 do_cleanups (cleanups);
295
ce7d4522 296 bfd_cache_close_all ();
781b42b0 297 observer_notify_executable_changed ();
c906108c
SS
298}
299
300/* Process the first arg in ARGS as the new exec file.
301
c5aa993b
JM
302 Note that we have to explicitly ignore additional args, since we can
303 be called from file_command(), which also calls symbol_file_command()
1adeb98a
FN
304 which can take multiple args.
305
0963b4bd 306 If ARGS is NULL, we just want to close the exec file. */
c906108c 307
1adeb98a 308static void
fba45db2 309exec_file_command (char *args, int from_tty)
c906108c 310{
1adeb98a
FN
311 char **argv;
312 char *filename;
4c42eaff
DJ
313
314 if (from_tty && target_has_execution
315 && !query (_("A program is being debugged already.\n"
316 "Are you sure you want to change the file? ")))
317 error (_("File not changed."));
1adeb98a
FN
318
319 if (args)
320 {
f7545552
TT
321 struct cleanup *cleanups;
322
1adeb98a
FN
323 /* Scan through the args and pick up the first non option arg
324 as the filename. */
325
d1a41061 326 argv = gdb_buildargv (args);
f7545552 327 cleanups = make_cleanup_freeargv (argv);
1adeb98a
FN
328
329 for (; (*argv != NULL) && (**argv == '-'); argv++)
330 {;
331 }
332 if (*argv == NULL)
8a3fe4f8 333 error (_("No executable file name was specified"));
1adeb98a
FN
334
335 filename = tilde_expand (*argv);
336 make_cleanup (xfree, filename);
337 exec_file_attach (filename, from_tty);
f7545552
TT
338
339 do_cleanups (cleanups);
1adeb98a
FN
340 }
341 else
342 exec_file_attach (NULL, from_tty);
c906108c
SS
343}
344
0963b4bd 345/* Set both the exec file and the symbol file, in one command.
c906108c
SS
346 What a novelty. Why did GDB go through four major releases before this
347 command was added? */
348
349static void
fba45db2 350file_command (char *arg, int from_tty)
c906108c
SS
351{
352 /* FIXME, if we lose on reading the symbol file, we should revert
353 the exec file, but that's rough. */
354 exec_file_command (arg, from_tty);
355 symbol_file_command (arg, from_tty);
9a4105ab
AC
356 if (deprecated_file_changed_hook)
357 deprecated_file_changed_hook (arg);
c906108c 358}
c906108c 359\f
c5aa993b 360
0963b4bd 361/* Locate all mappable sections of a BFD file.
c906108c
SS
362 table_pp_char is a char * to get it through bfd_map_over_sections;
363 we cast it back to its proper type. */
364
365static void
7be0c536
AC
366add_to_section_table (bfd *abfd, struct bfd_section *asect,
367 void *table_pp_char)
c906108c 368{
0542c86d 369 struct target_section **table_pp = (struct target_section **) table_pp_char;
c906108c
SS
370 flagword aflag;
371
2b2848e2
DE
372 gdb_assert (abfd == asect->owner);
373
0f5d55d8
JB
374 /* Check the section flags, but do not discard zero-length sections, since
375 some symbols may still be attached to this section. For instance, we
376 encountered on sparc-solaris 2.10 a shared library with an empty .bss
377 section to which a symbol named "_end" was attached. The address
378 of this symbol still needs to be relocated. */
c906108c
SS
379 aflag = bfd_get_section_flags (abfd, asect);
380 if (!(aflag & SEC_ALLOC))
381 return;
0f5d55d8 382
046ac79f 383 (*table_pp)->owner = NULL;
c906108c
SS
384 (*table_pp)->the_bfd_section = asect;
385 (*table_pp)->addr = bfd_section_vma (abfd, asect);
386 (*table_pp)->endaddr = (*table_pp)->addr + bfd_section_size (abfd, asect);
387 (*table_pp)++;
388}
389
a5b1fd27
DE
390/* See exec.h. */
391
392void
393clear_section_table (struct target_section_table *table)
394{
395 xfree (table->sections);
396 table->sections = table->sections_end = NULL;
397}
398
399/* Resize section table TABLE by ADJUSTMENT.
400 ADJUSTMENT may be negative, in which case the caller must have already
401 removed the sections being deleted.
402 Returns the old size. */
403
404static int
405resize_section_table (struct target_section_table *table, int adjustment)
07b82ea5 406{
07b82ea5
PA
407 int old_count;
408 int new_count;
409
07b82ea5
PA
410 old_count = table->sections_end - table->sections;
411
a5b1fd27 412 new_count = adjustment + old_count;
07b82ea5
PA
413
414 if (new_count)
415 {
416 table->sections = xrealloc (table->sections,
417 sizeof (struct target_section) * new_count);
418 table->sections_end = table->sections + new_count;
419 }
420 else
a5b1fd27 421 clear_section_table (table);
07b82ea5
PA
422
423 return old_count;
424}
425
c906108c
SS
426/* Builds a section table, given args BFD, SECTABLE_PTR, SECEND_PTR.
427 Returns 0 if OK, 1 on error. */
428
429int
0542c86d
PA
430build_section_table (struct bfd *some_bfd, struct target_section **start,
431 struct target_section **end)
c906108c
SS
432{
433 unsigned count;
434
435 count = bfd_count_sections (some_bfd);
436 if (*start)
b8c9b27d 437 xfree (* start);
0542c86d 438 *start = (struct target_section *) xmalloc (count * sizeof (**start));
c906108c 439 *end = *start;
c5aa993b 440 bfd_map_over_sections (some_bfd, add_to_section_table, (char *) end);
c906108c 441 if (*end > *start + count)
3e43a32a
MS
442 internal_error (__FILE__, __LINE__,
443 _("failed internal consistency check"));
c906108c
SS
444 /* We could realloc the table, but it probably loses for most files. */
445 return 0;
446}
07b82ea5
PA
447
448/* Add the sections array defined by [SECTIONS..SECTIONS_END[ to the
449 current set of target sections. */
450
451void
046ac79f 452add_target_sections (void *owner,
ed9eebaf 453 struct target_section *sections,
07b82ea5
PA
454 struct target_section *sections_end)
455{
456 int count;
457 struct target_section_table *table = current_target_sections;
458
459 count = sections_end - sections;
460
461 if (count > 0)
462 {
463 int space = resize_section_table (table, count);
ed9eebaf 464 int i;
d7f9d729 465
ed9eebaf
TT
466 for (i = 0; i < count; ++i)
467 {
468 table->sections[space + i] = sections[i];
046ac79f 469 table->sections[space + i].owner = owner;
ed9eebaf 470 }
07b82ea5
PA
471
472 /* If these are the first file sections we can provide memory
473 from, push the file_stratum target. */
ab16fce8
TT
474 if (!target_is_pushed (&exec_ops))
475 push_target (&exec_ops);
07b82ea5
PA
476 }
477}
478
76ad5e1e
NB
479/* Add the sections of OBJFILE to the current set of target sections. */
480
481void
482add_target_sections_of_objfile (struct objfile *objfile)
483{
484 struct target_section_table *table = current_target_sections;
485 struct obj_section *osect;
486 int space;
487 unsigned count = 0;
488 struct target_section *ts;
489
490 if (objfile == NULL)
491 return;
492
493 /* Compute the number of sections to add. */
494 ALL_OBJFILE_OSECTIONS (objfile, osect)
495 {
496 if (bfd_get_section_size (osect->the_bfd_section) == 0)
497 continue;
498 count++;
499 }
500
501 if (count == 0)
502 return;
503
504 space = resize_section_table (table, count);
505
506 ts = table->sections + space;
507
508 ALL_OBJFILE_OSECTIONS (objfile, osect)
509 {
510 if (bfd_get_section_size (osect->the_bfd_section) == 0)
511 continue;
512
513 gdb_assert (ts < table->sections + space + count);
514
515 ts->addr = obj_section_addr (osect);
516 ts->endaddr = obj_section_endaddr (osect);
517 ts->the_bfd_section = osect->the_bfd_section;
518 ts->owner = (void *) objfile;
519
520 ts++;
521 }
522}
523
046ac79f
JK
524/* Remove all target sections owned by OWNER.
525 OWNER must be the same value passed to add_target_sections. */
07b82ea5
PA
526
527void
046ac79f 528remove_target_sections (void *owner)
07b82ea5
PA
529{
530 struct target_section *src, *dest;
07b82ea5
PA
531 struct target_section_table *table = current_target_sections;
532
046ac79f
JK
533 gdb_assert (owner != NULL);
534
07b82ea5
PA
535 dest = table->sections;
536 for (src = table->sections; src < table->sections_end; src++)
046ac79f 537 if (src->owner != owner)
07b82ea5
PA
538 {
539 /* Keep this section. */
540 if (dest < src)
541 *dest = *src;
542 dest++;
543 }
544
545 /* If we've dropped any sections, resize the section table. */
546 if (dest < src)
547 {
548 int old_count;
549
550 old_count = resize_section_table (table, dest - src);
551
552 /* If we don't have any more sections to read memory from,
553 remove the file_stratum target from the stack. */
554 if (old_count + (dest - src) == 0)
6c95b8df
PA
555 {
556 struct program_space *pspace;
557
558 ALL_PSPACES (pspace)
559 if (pspace->target_sections.sections
560 != pspace->target_sections.sections_end)
561 return;
562
563 unpush_target (&exec_ops);
564 }
07b82ea5
PA
565 }
566}
567
c906108c 568\f
348f8c02 569
1ca49d37
YQ
570enum target_xfer_status
571exec_read_partial_read_only (gdb_byte *readbuf, ULONGEST offset,
572 ULONGEST len, ULONGEST *xfered_len)
573{
574 /* It's unduly pedantic to refuse to look at the executable for
575 read-only pieces; so do the equivalent of readonly regions aka
576 QTro packet. */
577 if (exec_bfd != NULL)
578 {
579 asection *s;
580 bfd_size_type size;
581 bfd_vma vma;
582
583 for (s = exec_bfd->sections; s; s = s->next)
584 {
585 if ((s->flags & SEC_LOAD) == 0
586 || (s->flags & SEC_READONLY) == 0)
587 continue;
588
589 vma = s->vma;
590 size = bfd_get_section_size (s);
591 if (vma <= offset && offset < (vma + size))
592 {
593 ULONGEST amt;
594
595 amt = (vma + size) - offset;
596 if (amt > len)
597 amt = len;
598
599 amt = bfd_get_section_contents (exec_bfd, s,
600 readbuf, offset - vma, amt);
601
602 if (amt == 0)
603 return TARGET_XFER_EOF;
604 else
605 {
606 *xfered_len = amt;
607 return TARGET_XFER_OK;
608 }
609 }
610 }
611 }
612
613 /* Indicate failure to find the requested memory block. */
614 return TARGET_XFER_E_IO;
615}
616
5a2eb0ef
YQ
617/* Appends all read-only memory ranges found in the target section
618 table defined by SECTIONS and SECTIONS_END, starting at (and
619 intersected with) MEMADDR for LEN bytes. Returns the augmented
620 VEC. */
621
622static VEC(mem_range_s) *
e6ca34fc 623section_table_available_memory (VEC(mem_range_s) *memory,
424447ee 624 CORE_ADDR memaddr, ULONGEST len,
e6ca34fc
PA
625 struct target_section *sections,
626 struct target_section *sections_end)
627{
628 struct target_section *p;
e6ca34fc
PA
629
630 for (p = sections; p < sections_end; p++)
631 {
2b2848e2
DE
632 if ((bfd_get_section_flags (p->the_bfd_section->owner,
633 p->the_bfd_section)
e6ca34fc
PA
634 & SEC_READONLY) == 0)
635 continue;
636
637 /* Copy the meta-data, adjusted. */
638 if (mem_ranges_overlap (p->addr, p->endaddr - p->addr, memaddr, len))
639 {
640 ULONGEST lo1, hi1, lo2, hi2;
641 struct mem_range *r;
642
643 lo1 = memaddr;
644 hi1 = memaddr + len;
645
646 lo2 = p->addr;
647 hi2 = p->endaddr;
648
649 r = VEC_safe_push (mem_range_s, memory, NULL);
650
651 r->start = max (lo1, lo2);
652 r->length = min (hi1, hi2) - r->start;
653 }
654 }
655
656 return memory;
657}
658
1ee79381
YQ
659enum target_xfer_status
660section_table_read_available_memory (gdb_byte *readbuf, ULONGEST offset,
661 ULONGEST len, ULONGEST *xfered_len)
662{
663 VEC(mem_range_s) *available_memory = NULL;
664 struct target_section_table *table;
665 struct cleanup *old_chain;
666 mem_range_s *r;
667 int i;
668
669 table = target_get_section_table (&exec_ops);
670 available_memory = section_table_available_memory (available_memory,
671 offset, len,
672 table->sections,
673 table->sections_end);
674
675 old_chain = make_cleanup (VEC_cleanup(mem_range_s),
676 &available_memory);
677
678 normalize_mem_ranges (available_memory);
679
680 for (i = 0;
681 VEC_iterate (mem_range_s, available_memory, i, r);
682 i++)
683 {
684 if (mem_ranges_overlap (r->start, r->length, offset, len))
685 {
686 CORE_ADDR end;
687 enum target_xfer_status status;
688
689 /* Get the intersection window. */
690 end = min (offset + len, r->start + r->length);
691
692 gdb_assert (end - offset <= len);
693
694 if (offset >= r->start)
695 status = exec_read_partial_read_only (readbuf, offset,
696 end - offset,
697 xfered_len);
698 else
699 {
700 *xfered_len = r->start - offset;
bc113b4e 701 status = TARGET_XFER_UNAVAILABLE;
1ee79381
YQ
702 }
703 do_cleanups (old_chain);
704 return status;
705 }
706 }
707 do_cleanups (old_chain);
708
709 *xfered_len = len;
bc113b4e 710 return TARGET_XFER_UNAVAILABLE;
1ee79381
YQ
711}
712
9b409511 713enum target_xfer_status
07b82ea5 714section_table_xfer_memory_partial (gdb_byte *readbuf, const gdb_byte *writebuf,
b55e14c7 715 ULONGEST offset, ULONGEST len,
9b409511 716 ULONGEST *xfered_len,
07b82ea5
PA
717 struct target_section *sections,
718 struct target_section *sections_end,
719 const char *section_name)
c906108c 720{
020cc13c 721 int res;
0542c86d 722 struct target_section *p;
07b82ea5
PA
723 ULONGEST memaddr = offset;
724 ULONGEST memend = memaddr + len;
c906108c 725
b55e14c7 726 if (len == 0)
3e43a32a
MS
727 internal_error (__FILE__, __LINE__,
728 _("failed internal consistency check"));
c906108c 729
348f8c02 730 for (p = sections; p < sections_end; p++)
c906108c 731 {
2b2848e2
DE
732 struct bfd_section *asect = p->the_bfd_section;
733 bfd *abfd = asect->owner;
734
735 if (section_name && strcmp (section_name, asect->name) != 0)
0963b4bd 736 continue; /* not the section we need. */
c906108c 737 if (memaddr >= p->addr)
3db26b01
JB
738 {
739 if (memend <= p->endaddr)
740 {
741 /* Entire transfer is within this section. */
07b82ea5 742 if (writebuf)
2b2848e2 743 res = bfd_set_section_contents (abfd, asect,
07b82ea5 744 writebuf, memaddr - p->addr,
85302095
AC
745 len);
746 else
2b2848e2 747 res = bfd_get_section_contents (abfd, asect,
07b82ea5 748 readbuf, memaddr - p->addr,
85302095 749 len);
9b409511
YQ
750
751 if (res != 0)
752 {
753 *xfered_len = len;
754 return TARGET_XFER_OK;
755 }
756 else
757 return TARGET_XFER_EOF;
3db26b01
JB
758 }
759 else if (memaddr >= p->endaddr)
760 {
761 /* This section ends before the transfer starts. */
762 continue;
763 }
764 else
765 {
766 /* This section overlaps the transfer. Just do half. */
767 len = p->endaddr - memaddr;
07b82ea5 768 if (writebuf)
2b2848e2 769 res = bfd_set_section_contents (abfd, asect,
07b82ea5 770 writebuf, memaddr - p->addr,
85302095
AC
771 len);
772 else
2b2848e2 773 res = bfd_get_section_contents (abfd, asect,
07b82ea5 774 readbuf, memaddr - p->addr,
85302095 775 len);
9b409511
YQ
776 if (res != 0)
777 {
778 *xfered_len = len;
779 return TARGET_XFER_OK;
780 }
781 else
782 return TARGET_XFER_EOF;
3db26b01
JB
783 }
784 }
c906108c
SS
785 }
786
9b409511 787 return TARGET_XFER_EOF; /* We can't help. */
c906108c 788}
348f8c02 789
70221824 790static struct target_section_table *
07b82ea5 791exec_get_section_table (struct target_ops *ops)
348f8c02 792{
07b82ea5 793 return current_target_sections;
348f8c02
PA
794}
795
9b409511 796static enum target_xfer_status
07b82ea5
PA
797exec_xfer_partial (struct target_ops *ops, enum target_object object,
798 const char *annex, gdb_byte *readbuf,
799 const gdb_byte *writebuf,
9b409511 800 ULONGEST offset, ULONGEST len, ULONGEST *xfered_len)
348f8c02 801{
07b82ea5
PA
802 struct target_section_table *table = target_get_section_table (ops);
803
804 if (object == TARGET_OBJECT_MEMORY)
805 return section_table_xfer_memory_partial (readbuf, writebuf,
9b409511 806 offset, len, xfered_len,
07b82ea5
PA
807 table->sections,
808 table->sections_end,
809 NULL);
810 else
2ed4b548 811 return TARGET_XFER_E_IO;
348f8c02 812}
c906108c 813\f
c5aa993b 814
c906108c 815void
07b82ea5 816print_section_info (struct target_section_table *t, bfd *abfd)
c906108c 817{
5af949e3 818 struct gdbarch *gdbarch = gdbarch_from_bfd (abfd);
0542c86d 819 struct target_section *p;
17a912b6 820 /* FIXME: 16 is not wide enough when gdbarch_addr_bit > 64. */
5af949e3 821 int wid = gdbarch_addr_bit (gdbarch) <= 32 ? 8 : 16;
c906108c 822
c5aa993b 823 printf_filtered ("\t`%s', ", bfd_get_filename (abfd));
c906108c 824 wrap_here (" ");
a3f17187 825 printf_filtered (_("file type %s.\n"), bfd_get_target (abfd));
c906108c 826 if (abfd == exec_bfd)
51bee8e9 827 {
3e43a32a
MS
828 /* gcc-3.4 does not like the initialization in
829 <p == t->sections_end>. */
d904de5b 830 bfd_vma displacement = 0;
2f1bdd26 831 bfd_vma entry_point;
51bee8e9
JK
832
833 for (p = t->sections; p < t->sections_end; p++)
834 {
2b2848e2
DE
835 struct bfd_section *psect = p->the_bfd_section;
836 bfd *pbfd = psect->owner;
51bee8e9 837
2b2848e2 838 if ((bfd_get_section_flags (pbfd, psect) & (SEC_ALLOC | SEC_LOAD))
51bee8e9
JK
839 != (SEC_ALLOC | SEC_LOAD))
840 continue;
841
2b2848e2
DE
842 if (bfd_get_section_vma (pbfd, psect) <= abfd->start_address
843 && abfd->start_address < (bfd_get_section_vma (pbfd, psect)
844 + bfd_get_section_size (psect)))
51bee8e9 845 {
2b2848e2 846 displacement = p->addr - bfd_get_section_vma (pbfd, psect);
51bee8e9
JK
847 break;
848 }
849 }
850 if (p == t->sections_end)
b37520b6 851 warning (_("Cannot find section for the entry point of %s."),
d904de5b 852 bfd_get_filename (abfd));
51bee8e9 853
2f1bdd26
MGD
854 entry_point = gdbarch_addr_bits_remove (gdbarch,
855 bfd_get_start_address (abfd)
856 + displacement);
51bee8e9 857 printf_filtered (_("\tEntry point: %s\n"),
2f1bdd26 858 paddress (gdbarch, entry_point));
51bee8e9 859 }
07b82ea5 860 for (p = t->sections; p < t->sections_end; p++)
c906108c 861 {
2b2848e2
DE
862 struct bfd_section *psect = p->the_bfd_section;
863 bfd *pbfd = psect->owner;
864
bb599908
PH
865 printf_filtered ("\t%s", hex_string_custom (p->addr, wid));
866 printf_filtered (" - %s", hex_string_custom (p->endaddr, wid));
bcf16802
KB
867
868 /* FIXME: A format of "08l" is not wide enough for file offsets
869 larger than 4GB. OTOH, making it "016l" isn't desirable either
870 since most output will then be much wider than necessary. It
871 may make sense to test the size of the file and choose the
872 format string accordingly. */
a3f17187 873 /* FIXME: i18n: Need to rewrite this sentence. */
c906108c
SS
874 if (info_verbose)
875 printf_filtered (" @ %s",
2b2848e2
DE
876 hex_string_custom (psect->filepos, 8));
877 printf_filtered (" is %s", bfd_section_name (pbfd, psect));
878 if (pbfd != abfd)
879 printf_filtered (" in %s", bfd_get_filename (pbfd));
c906108c
SS
880 printf_filtered ("\n");
881 }
882}
883
884static void
fba45db2 885exec_files_info (struct target_ops *t)
c906108c 886{
57008375
JK
887 if (exec_bfd)
888 print_section_info (current_target_sections, exec_bfd);
889 else
890 puts_filtered (_("\t<no file loaded>\n"));
c906108c
SS
891}
892
893static void
fba45db2 894set_section_command (char *args, int from_tty)
c906108c 895{
0542c86d 896 struct target_section *p;
c906108c
SS
897 char *secname;
898 unsigned seclen;
899 unsigned long secaddr;
900 char secprint[100];
901 long offset;
07b82ea5 902 struct target_section_table *table;
c906108c
SS
903
904 if (args == 0)
8a3fe4f8 905 error (_("Must specify section name and its virtual address"));
c906108c 906
0963b4bd 907 /* Parse out section name. */
c5aa993b 908 for (secname = args; !isspace (*args); args++);
c906108c
SS
909 seclen = args - secname;
910
0963b4bd 911 /* Parse out new virtual address. */
c906108c
SS
912 secaddr = parse_and_eval_address (args);
913
07b82ea5
PA
914 table = current_target_sections;
915 for (p = table->sections; p < table->sections_end; p++)
c5aa993b 916 {
57008375 917 if (!strncmp (secname, bfd_section_name (p->bfd,
3e43a32a 918 p->the_bfd_section), seclen)
57008375 919 && bfd_section_name (p->bfd, p->the_bfd_section)[seclen] == '\0')
c5aa993b
JM
920 {
921 offset = secaddr - p->addr;
922 p->addr += offset;
923 p->endaddr += offset;
924 if (from_tty)
925 exec_files_info (&exec_ops);
926 return;
927 }
c906108c 928 }
c906108c
SS
929 if (seclen >= sizeof (secprint))
930 seclen = sizeof (secprint) - 1;
931 strncpy (secprint, secname, seclen);
932 secprint[seclen] = '\0';
8a3fe4f8 933 error (_("Section %s not found"), secprint);
c906108c
SS
934}
935
30510692
DJ
936/* If we can find a section in FILENAME with BFD index INDEX, adjust
937 it to ADDRESS. */
c1bd25fd
DJ
938
939void
940exec_set_section_address (const char *filename, int index, CORE_ADDR address)
941{
0542c86d 942 struct target_section *p;
07b82ea5 943 struct target_section_table *table;
c1bd25fd 944
07b82ea5
PA
945 table = current_target_sections;
946 for (p = table->sections; p < table->sections_end; p++)
c1bd25fd 947 {
2b2848e2 948 if (filename_cmp (filename, p->the_bfd_section->owner->filename) == 0
30510692 949 && index == p->the_bfd_section->index)
c1bd25fd 950 {
30510692 951 p->endaddr += address - p->addr;
c1bd25fd 952 p->addr = address;
c1bd25fd
DJ
953 }
954 }
955}
956
c906108c
SS
957/* If mourn is being called in all the right places, this could be say
958 `gdb internal error' (since generic_mourn calls
959 breakpoint_init_inferior). */
960
961static int
3db08215
MM
962ignore (struct target_ops *ops, struct gdbarch *gdbarch,
963 struct bp_target_info *bp_tgt)
c906108c
SS
964{
965 return 0;
966}
967
c35b1492
PA
968static int
969exec_has_memory (struct target_ops *ops)
970{
971 /* We can provide memory if we have any file/target sections to read
972 from. */
973 return (current_target_sections->sections
974 != current_target_sections->sections_end);
975}
976
83814951
TT
977static char *
978exec_make_note_section (struct target_ops *self, bfd *obfd, int *note_size)
979{
980 error (_("Can't create a corefile"));
981}
be4d1333 982
c906108c
SS
983/* Fill in the exec file target vector. Very few entries need to be
984 defined. */
985
be4d1333 986static void
fba45db2 987init_exec_ops (void)
c906108c
SS
988{
989 exec_ops.to_shortname = "exec";
990 exec_ops.to_longname = "Local exec file";
991 exec_ops.to_doc = "Use an executable file as a target.\n\
992Specify the filename of the executable file.";
1adeb98a 993 exec_ops.to_open = exec_open;
6c95b8df 994 exec_ops.to_close = exec_close_1;
07b82ea5
PA
995 exec_ops.to_xfer_partial = exec_xfer_partial;
996 exec_ops.to_get_section_table = exec_get_section_table;
c906108c
SS
997 exec_ops.to_files_info = exec_files_info;
998 exec_ops.to_insert_breakpoint = ignore;
999 exec_ops.to_remove_breakpoint = ignore;
c906108c 1000 exec_ops.to_stratum = file_stratum;
c35b1492 1001 exec_ops.to_has_memory = exec_has_memory;
be4d1333 1002 exec_ops.to_make_corefile_notes = exec_make_note_section;
b427c1bc 1003 exec_ops.to_find_memory_regions = objfile_find_memory_regions;
c5aa993b 1004 exec_ops.to_magic = OPS_MAGIC;
c906108c
SS
1005}
1006
1007void
fba45db2 1008_initialize_exec (void)
c906108c
SS
1009{
1010 struct cmd_list_element *c;
1011
1012 init_exec_ops ();
1013
1014 if (!dbx_commands)
1015 {
1a966eab
AC
1016 c = add_cmd ("file", class_files, file_command, _("\
1017Use FILE as program to be debugged.\n\
c906108c
SS
1018It is read for its symbols, for getting the contents of pure memory,\n\
1019and it is the program executed when you use the `run' command.\n\
1020If FILE cannot be found as specified, your execution directory path\n\
1021($PATH) is searched for a command of that name.\n\
1a966eab 1022No arg means to have no executable file and no symbols."), &cmdlist);
5ba2abeb 1023 set_cmd_completer (c, filename_completer);
c906108c
SS
1024 }
1025
1a966eab
AC
1026 c = add_cmd ("exec-file", class_files, exec_file_command, _("\
1027Use FILE as program for getting contents of pure memory.\n\
c906108c
SS
1028If FILE cannot be found as specified, your execution directory path\n\
1029is searched for a command of that name.\n\
1a966eab 1030No arg means have no executable file."), &cmdlist);
5ba2abeb 1031 set_cmd_completer (c, filename_completer);
c906108c 1032
1bedd215
AC
1033 add_com ("section", class_files, set_section_command, _("\
1034Change the base address of section SECTION of the exec file to ADDR.\n\
c906108c
SS
1035This can be used if the exec file does not contain section addresses,\n\
1036(such as in the a.out format), or when the addresses specified in the\n\
1037file itself are wrong. Each section must be changed separately. The\n\
1bedd215 1038``info files'' command lists all the sections and their addresses."));
c906108c 1039
5bf193a2
AC
1040 add_setshow_boolean_cmd ("write", class_support, &write_files, _("\
1041Set writing into executable and core files."), _("\
1042Show writing into executable and core files."), NULL,
1043 NULL,
920d2a44 1044 show_write_files,
5bf193a2 1045 &setlist, &showlist);
c5aa993b 1046
9852c492 1047 add_target_with_completer (&exec_ops, filename_completer);
c906108c 1048}
This page took 1.10366 seconds and 4 git commands to generate.