[ARM] PR ld/21402, only override the symbol dynamic decision on undefined weak symbol.
[deliverable/binutils-gdb.git] / gdb / exec.c
CommitLineData
c906108c 1/* Work with executable files, for GDB.
4646aa9d 2
61baf725 3 Copyright (C) 1988-2017 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "frame.h"
22#include "inferior.h"
23#include "target.h"
24#include "gdbcmd.h"
25#include "language.h"
0ba1096a 26#include "filenames.h"
c906108c
SS
27#include "symfile.h"
28#include "objfiles.h"
c5f0f3d0 29#include "completer.h"
fd0407d6 30#include "value.h"
4646aa9d 31#include "exec.h"
ea53e89f 32#include "observer.h"
dacec2a8 33#include "arch-utils.h"
6c95b8df
PA
34#include "gdbthread.h"
35#include "progspace.h"
cbb099e8 36#include "gdb_bfd.h"
b427c1bc 37#include "gcore.h"
c906108c 38
c906108c 39#include <fcntl.h>
dbda9972 40#include "readline/readline.h"
c906108c
SS
41#include "gdbcore.h"
42
43#include <ctype.h>
53ce3c39 44#include <sys/stat.h>
a9a5a3d1 45#include "solist.h"
325fac50 46#include <algorithm>
c906108c 47
1d8b34a7 48void (*deprecated_file_changed_hook) (const char *);
c906108c
SS
49
50/* Prototypes for local functions */
51
a14ed312 52static void set_section_command (char *, int);
c906108c 53
a14ed312 54static void exec_files_info (struct target_ops *);
c906108c 55
a14ed312 56static void init_exec_ops (void);
c906108c 57
c906108c
SS
58/* The target vector for executable files. */
59
e8b2341c 60static struct target_ops exec_ops;
c906108c 61
c906108c
SS
62/* Whether to open exec and core files read-only or read-write. */
63
64int write_files = 0;
920d2a44
AC
65static void
66show_write_files (struct ui_file *file, int from_tty,
67 struct cmd_list_element *c, const char *value)
68{
69 fprintf_filtered (file, _("Writing into executable and core files is %s.\n"),
70 value);
71}
72
c906108c 73
4c42eaff 74static void
014f9477 75exec_open (const char *args, int from_tty)
1adeb98a
FN
76{
77 target_preopen (from_tty);
78 exec_file_attach (args, from_tty);
79}
80
07b82ea5
PA
81/* Close and clear exec_bfd. If we end up with no target sections to
82 read memory from, this unpushes the exec_ops target. */
83
6c95b8df
PA
84void
85exec_close (void)
07b82ea5
PA
86{
87 if (exec_bfd)
88 {
89 bfd *abfd = exec_bfd;
07b82ea5 90
cbb099e8 91 gdb_bfd_unref (abfd);
07b82ea5
PA
92
93 /* Removing target sections may close the exec_ops target.
94 Clear exec_bfd before doing so to prevent recursion. */
95 exec_bfd = NULL;
96 exec_bfd_mtime = 0;
97
046ac79f 98 remove_target_sections (&exec_bfd);
1f0c4988
JK
99
100 xfree (exec_filename);
101 exec_filename = NULL;
07b82ea5
PA
102 }
103}
104
6c95b8df
PA
105/* This is the target_close implementation. Clears all target
106 sections and closes all executable bfds from all program spaces. */
107
c906108c 108static void
de90e03d 109exec_close_1 (struct target_ops *self)
c906108c 110{
ab16fce8 111 struct program_space *ss;
5ed8105e 112 scoped_restore_current_program_space restore_pspace;
6c95b8df 113
ab16fce8 114 ALL_PSPACES (ss)
5ed8105e
PA
115 {
116 set_current_program_space (ss);
117 clear_section_table (current_target_sections);
118 exec_close ();
119 }
c906108c
SS
120}
121
1adeb98a
FN
122void
123exec_file_clear (int from_tty)
124{
125 /* Remove exec file. */
6c95b8df 126 exec_close ();
1adeb98a
FN
127
128 if (from_tty)
a3f17187 129 printf_unfiltered (_("No executable file now.\n"));
1adeb98a
FN
130}
131
ecf45d2c 132/* See exec.h. */
a10de604
GB
133
134void
ecf45d2c
SL
135try_open_exec_file (const char *exec_file_host, struct inferior *inf,
136 symfile_add_flags add_flags)
a10de604 137{
88178e82 138 struct cleanup *old_chain;
57d1de9c 139 struct gdb_exception prev_err = exception_none;
a10de604 140
ecf45d2c 141 old_chain = make_cleanup (free_current_contents, &prev_err.message);
57d1de9c
LM
142
143 /* exec_file_attach and symbol_file_add_main may throw an error if the file
144 cannot be opened either locally or remotely.
145
146 This happens for example, when the file is first found in the local
147 sysroot (above), and then disappears (a TOCTOU race), or when it doesn't
148 exist in the target filesystem, or when the file does exist, but
149 is not readable.
88178e82 150
57d1de9c
LM
151 Even without a symbol file, the remote-based debugging session should
152 continue normally instead of ending abruptly. Hence we catch thrown
153 errors/exceptions in the following code. */
154 TRY
155 {
ecf45d2c
SL
156 /* We must do this step even if exec_file_host is NULL, so that
157 exec_file_attach will clear state. */
158 exec_file_attach (exec_file_host, add_flags & SYMFILE_VERBOSE);
57d1de9c
LM
159 }
160 CATCH (err, RETURN_MASK_ERROR)
161 {
162 if (err.message != NULL)
163 warning ("%s", err.message);
164
165 prev_err = err;
166
167 /* Save message so it doesn't get trashed by the catch below. */
b5e1db87
LM
168 if (err.message != NULL)
169 prev_err.message = xstrdup (err.message);
57d1de9c
LM
170 }
171 END_CATCH
172
ecf45d2c 173 if (exec_file_host != NULL)
57d1de9c 174 {
ecf45d2c
SL
175 TRY
176 {
177 symbol_file_add_main (exec_file_host, add_flags);
178 }
179 CATCH (err, RETURN_MASK_ERROR)
180 {
181 if (!exception_print_same (prev_err, err))
182 warning ("%s", err.message);
183 }
184 END_CATCH
57d1de9c 185 }
ecf45d2c
SL
186
187 do_cleanups (old_chain);
188}
189
190/* See gdbcore.h. */
191
192void
193exec_file_locate_attach (int pid, int defer_bp_reset, int from_tty)
194{
195 char *exec_file_target, *exec_file_host;
196 struct cleanup *old_chain;
197 symfile_add_flags add_flags = 0;
198
199 /* Do nothing if we already have an executable filename. */
200 if (get_exec_file (0) != NULL)
201 return;
202
203 /* Try to determine a filename from the process itself. */
204 exec_file_target = target_pid_to_exec_file (pid);
205 if (exec_file_target == NULL)
57d1de9c 206 {
ecf45d2c
SL
207 warning (_("No executable has been specified and target does not "
208 "support\n"
209 "determining executable automatically. "
210 "Try using the \"file\" command."));
211 return;
57d1de9c 212 }
88178e82 213
ecf45d2c
SL
214 exec_file_host = exec_file_find (exec_file_target, NULL);
215 old_chain = make_cleanup (xfree, exec_file_host);
216
217 if (defer_bp_reset)
218 add_flags |= SYMFILE_DEFER_BP_RESET;
219
220 if (from_tty)
221 add_flags |= SYMFILE_VERBOSE;
222
223 /* Attempt to open the exec file. */
224 try_open_exec_file (exec_file_host, current_inferior (), add_flags);
88178e82 225 do_cleanups (old_chain);
a10de604
GB
226}
227
907083d1 228/* Set FILENAME as the new exec file.
c906108c 229
c5aa993b
JM
230 This function is intended to be behave essentially the same
231 as exec_file_command, except that the latter will detect when
232 a target is being debugged, and will ask the user whether it
233 should be shut down first. (If the answer is "no", then the
234 new file is ignored.)
c906108c 235
c5aa993b
JM
236 This file is used by exec_file_command, to do the work of opening
237 and processing the exec file after any prompting has happened.
c906108c 238
c5aa993b
JM
239 And, it is used by child_attach, when the attach command was
240 given a pid but not a exec pathname, and the attach command could
241 figure out the pathname from the pid. (In this case, we shouldn't
242 ask the user whether the current target should be shut down --
907083d1 243 we're supplying the exec pathname late for good reason.) */
c906108c
SS
244
245void
5f08566b 246exec_file_attach (const char *filename, int from_tty)
c906108c 247{
9b333ba3
TT
248 /* First, acquire a reference to the current exec_bfd. We release
249 this at the end of the function; but acquiring it now lets the
250 BFD cache return it if this call refers to the same file. */
251 gdb_bfd_ref (exec_bfd);
192b62ce
TT
252 gdb_bfd_ref_ptr exec_bfd_holder (exec_bfd);
253
c906108c 254 /* Remove any previous exec file. */
6c95b8df 255 exec_close ();
c906108c
SS
256
257 /* Now open and digest the file the user requested, if any. */
258
1adeb98a
FN
259 if (!filename)
260 {
261 if (from_tty)
a3f17187 262 printf_unfiltered (_("No executable file now.\n"));
7a107747
DJ
263
264 set_gdbarch_from_file (NULL);
1adeb98a
FN
265 }
266 else
c906108c 267 {
64c0b5de 268 int load_via_target = 0;
14278e1f 269 const char *scratch_pathname, *canonical_pathname;
c906108c 270 int scratch_chan;
07b82ea5 271 struct target_section *sections = NULL, *sections_end = NULL;
d18b8b7a 272 char **matching;
c5aa993b 273
64c0b5de
GB
274 if (is_target_filename (filename))
275 {
276 if (target_filesystem_is_local ())
277 filename += strlen (TARGET_SYSROOT_PREFIX);
278 else
279 load_via_target = 1;
280 }
281
14278e1f 282 gdb::unique_xmalloc_ptr<char> canonical_storage, scratch_storage;
64c0b5de 283 if (load_via_target)
c5aa993b 284 {
64c0b5de
GB
285 /* gdb_bfd_fopen does not support "target:" filenames. */
286 if (write_files)
287 warning (_("writing into executable files is "
288 "not supported for %s sysroots"),
289 TARGET_SYSROOT_PREFIX);
290
14278e1f 291 scratch_pathname = filename;
64c0b5de 292 scratch_chan = -1;
64c0b5de 293 canonical_pathname = scratch_pathname;
c5aa993b 294 }
64c0b5de
GB
295 else
296 {
14278e1f
TT
297 char *temp_pathname;
298
64c0b5de
GB
299 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
300 filename, write_files ?
301 O_RDWR | O_BINARY : O_RDONLY | O_BINARY,
14278e1f 302 &temp_pathname);
64c0b5de
GB
303#if defined(__GO32__) || defined(_WIN32) || defined(__CYGWIN__)
304 if (scratch_chan < 0)
305 {
0ae1c716 306 char *exename = (char *) alloca (strlen (filename) + 5);
64c0b5de
GB
307
308 strcat (strcpy (exename, filename), ".exe");
309 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
310 exename, write_files ?
311 O_RDWR | O_BINARY
312 : O_RDONLY | O_BINARY,
14278e1f 313 &temp_pathname);
64c0b5de 314 }
c906108c 315#endif
64c0b5de
GB
316 if (scratch_chan < 0)
317 perror_with_name (filename);
a4453b7e 318
14278e1f
TT
319 scratch_storage.reset (temp_pathname);
320 scratch_pathname = temp_pathname;
a4453b7e 321
64c0b5de
GB
322 /* gdb_bfd_open (and its variants) prefers canonicalized
323 pathname for better BFD caching. */
14278e1f
TT
324 canonical_storage = gdb_realpath (scratch_pathname);
325 canonical_pathname = canonical_storage.get ();
64c0b5de 326 }
1f0c4988 327
192b62ce 328 gdb_bfd_ref_ptr temp;
64c0b5de 329 if (write_files && !load_via_target)
192b62ce
TT
330 temp = gdb_bfd_fopen (canonical_pathname, gnutarget,
331 FOPEN_RUB, scratch_chan);
1c00ec6b 332 else
192b62ce
TT
333 temp = gdb_bfd_open (canonical_pathname, gnutarget, scratch_chan);
334 exec_bfd = temp.release ();
c906108c
SS
335
336 if (!exec_bfd)
9fe4a216 337 {
d5131498 338 error (_("\"%s\": could not open as an executable file: %s."),
9fe4a216
TT
339 scratch_pathname, bfd_errmsg (bfd_get_error ()));
340 }
c906108c 341
64c0b5de
GB
342 /* gdb_realpath_keepfile resolves symlinks on the local
343 filesystem and so cannot be used for "target:" files. */
1f0c4988 344 gdb_assert (exec_filename == NULL);
64c0b5de
GB
345 if (load_via_target)
346 exec_filename = xstrdup (bfd_get_filename (exec_bfd));
347 else
4971c9a7 348 exec_filename = gdb_realpath_keepfile (scratch_pathname).release ();
1f0c4988 349
d18b8b7a 350 if (!bfd_check_format_matches (exec_bfd, bfd_object, &matching))
c906108c
SS
351 {
352 /* Make sure to close exec_bfd, or else "run" might try to use
353 it. */
6c95b8df 354 exec_close ();
8a3fe4f8 355 error (_("\"%s\": not in executable format: %s"),
d18b8b7a
HZ
356 scratch_pathname,
357 gdb_bfd_errmsg (bfd_get_error (), matching));
c906108c
SS
358 }
359
07b82ea5 360 if (build_section_table (exec_bfd, &sections, &sections_end))
c906108c
SS
361 {
362 /* Make sure to close exec_bfd, or else "run" might try to use
363 it. */
6c95b8df 364 exec_close ();
8a3fe4f8 365 error (_("\"%s\": can't find the file sections: %s"),
c906108c
SS
366 scratch_pathname, bfd_errmsg (bfd_get_error ()));
367 }
368
c04ea773
DJ
369 exec_bfd_mtime = bfd_get_mtime (exec_bfd);
370
c906108c
SS
371 validate_files ();
372
373 set_gdbarch_from_file (exec_bfd);
374
07b82ea5 375 /* Add the executable's sections to the current address spaces'
6c95b8df
PA
376 list of sections. This possibly pushes the exec_ops
377 target. */
ed9eebaf 378 add_target_sections (&exec_bfd, sections, sections_end);
07b82ea5 379 xfree (sections);
c906108c
SS
380
381 /* Tell display code (if any) about the changed file name. */
9a4105ab
AC
382 if (deprecated_exec_file_display_hook)
383 (*deprecated_exec_file_display_hook) (filename);
c906108c 384 }
9b333ba3 385
ce7d4522 386 bfd_cache_close_all ();
781b42b0 387 observer_notify_executable_changed ();
c906108c
SS
388}
389
390/* Process the first arg in ARGS as the new exec file.
391
c5aa993b
JM
392 Note that we have to explicitly ignore additional args, since we can
393 be called from file_command(), which also calls symbol_file_command()
1adeb98a
FN
394 which can take multiple args.
395
0963b4bd 396 If ARGS is NULL, we just want to close the exec file. */
c906108c 397
1adeb98a 398static void
1d8b34a7 399exec_file_command (const char *args, int from_tty)
c906108c 400{
1adeb98a 401 char *filename;
4c42eaff
DJ
402
403 if (from_tty && target_has_execution
404 && !query (_("A program is being debugged already.\n"
405 "Are you sure you want to change the file? ")))
406 error (_("File not changed."));
1adeb98a
FN
407
408 if (args)
409 {
410 /* Scan through the args and pick up the first non option arg
411 as the filename. */
412
773a1edc
TT
413 gdb_argv built_argv (args);
414 char **argv = built_argv.get ();
1adeb98a
FN
415
416 for (; (*argv != NULL) && (**argv == '-'); argv++)
417 {;
418 }
419 if (*argv == NULL)
8a3fe4f8 420 error (_("No executable file name was specified"));
1adeb98a 421
773a1edc
TT
422 gdb::unique_xmalloc_ptr<char> filename (tilde_expand (*argv));
423 exec_file_attach (filename.get (), from_tty);
1adeb98a
FN
424 }
425 else
426 exec_file_attach (NULL, from_tty);
c906108c
SS
427}
428
0963b4bd 429/* Set both the exec file and the symbol file, in one command.
c906108c
SS
430 What a novelty. Why did GDB go through four major releases before this
431 command was added? */
432
433static void
1d8b34a7 434file_command (const char *arg, int from_tty)
c906108c
SS
435{
436 /* FIXME, if we lose on reading the symbol file, we should revert
437 the exec file, but that's rough. */
438 exec_file_command (arg, from_tty);
439 symbol_file_command (arg, from_tty);
9a4105ab
AC
440 if (deprecated_file_changed_hook)
441 deprecated_file_changed_hook (arg);
c906108c 442}
c906108c 443\f
c5aa993b 444
0963b4bd 445/* Locate all mappable sections of a BFD file.
c906108c
SS
446 table_pp_char is a char * to get it through bfd_map_over_sections;
447 we cast it back to its proper type. */
448
449static void
7be0c536
AC
450add_to_section_table (bfd *abfd, struct bfd_section *asect,
451 void *table_pp_char)
c906108c 452{
0542c86d 453 struct target_section **table_pp = (struct target_section **) table_pp_char;
c906108c
SS
454 flagword aflag;
455
2b2848e2
DE
456 gdb_assert (abfd == asect->owner);
457
0f5d55d8
JB
458 /* Check the section flags, but do not discard zero-length sections, since
459 some symbols may still be attached to this section. For instance, we
460 encountered on sparc-solaris 2.10 a shared library with an empty .bss
461 section to which a symbol named "_end" was attached. The address
462 of this symbol still needs to be relocated. */
c906108c
SS
463 aflag = bfd_get_section_flags (abfd, asect);
464 if (!(aflag & SEC_ALLOC))
465 return;
0f5d55d8 466
046ac79f 467 (*table_pp)->owner = NULL;
c906108c
SS
468 (*table_pp)->the_bfd_section = asect;
469 (*table_pp)->addr = bfd_section_vma (abfd, asect);
470 (*table_pp)->endaddr = (*table_pp)->addr + bfd_section_size (abfd, asect);
471 (*table_pp)++;
472}
473
a5b1fd27
DE
474/* See exec.h. */
475
476void
477clear_section_table (struct target_section_table *table)
478{
479 xfree (table->sections);
480 table->sections = table->sections_end = NULL;
481}
482
483/* Resize section table TABLE by ADJUSTMENT.
484 ADJUSTMENT may be negative, in which case the caller must have already
485 removed the sections being deleted.
486 Returns the old size. */
487
488static int
489resize_section_table (struct target_section_table *table, int adjustment)
07b82ea5 490{
07b82ea5
PA
491 int old_count;
492 int new_count;
493
07b82ea5
PA
494 old_count = table->sections_end - table->sections;
495
a5b1fd27 496 new_count = adjustment + old_count;
07b82ea5
PA
497
498 if (new_count)
499 {
224c3ddb
SM
500 table->sections = XRESIZEVEC (struct target_section, table->sections,
501 new_count);
07b82ea5
PA
502 table->sections_end = table->sections + new_count;
503 }
504 else
a5b1fd27 505 clear_section_table (table);
07b82ea5
PA
506
507 return old_count;
508}
509
c906108c
SS
510/* Builds a section table, given args BFD, SECTABLE_PTR, SECEND_PTR.
511 Returns 0 if OK, 1 on error. */
512
513int
0542c86d
PA
514build_section_table (struct bfd *some_bfd, struct target_section **start,
515 struct target_section **end)
c906108c
SS
516{
517 unsigned count;
518
519 count = bfd_count_sections (some_bfd);
520 if (*start)
b8c9b27d 521 xfree (* start);
8d749320 522 *start = XNEWVEC (struct target_section, count);
c906108c 523 *end = *start;
c5aa993b 524 bfd_map_over_sections (some_bfd, add_to_section_table, (char *) end);
c906108c 525 if (*end > *start + count)
3e43a32a
MS
526 internal_error (__FILE__, __LINE__,
527 _("failed internal consistency check"));
c906108c
SS
528 /* We could realloc the table, but it probably loses for most files. */
529 return 0;
530}
07b82ea5
PA
531
532/* Add the sections array defined by [SECTIONS..SECTIONS_END[ to the
533 current set of target sections. */
534
535void
046ac79f 536add_target_sections (void *owner,
ed9eebaf 537 struct target_section *sections,
07b82ea5
PA
538 struct target_section *sections_end)
539{
540 int count;
541 struct target_section_table *table = current_target_sections;
542
543 count = sections_end - sections;
544
545 if (count > 0)
546 {
547 int space = resize_section_table (table, count);
ed9eebaf 548 int i;
d7f9d729 549
ed9eebaf
TT
550 for (i = 0; i < count; ++i)
551 {
552 table->sections[space + i] = sections[i];
046ac79f 553 table->sections[space + i].owner = owner;
ed9eebaf 554 }
07b82ea5
PA
555
556 /* If these are the first file sections we can provide memory
557 from, push the file_stratum target. */
ab16fce8
TT
558 if (!target_is_pushed (&exec_ops))
559 push_target (&exec_ops);
07b82ea5
PA
560 }
561}
562
76ad5e1e
NB
563/* Add the sections of OBJFILE to the current set of target sections. */
564
565void
566add_target_sections_of_objfile (struct objfile *objfile)
567{
568 struct target_section_table *table = current_target_sections;
569 struct obj_section *osect;
570 int space;
571 unsigned count = 0;
572 struct target_section *ts;
573
574 if (objfile == NULL)
575 return;
576
577 /* Compute the number of sections to add. */
578 ALL_OBJFILE_OSECTIONS (objfile, osect)
579 {
580 if (bfd_get_section_size (osect->the_bfd_section) == 0)
581 continue;
582 count++;
583 }
584
585 if (count == 0)
586 return;
587
588 space = resize_section_table (table, count);
589
590 ts = table->sections + space;
591
592 ALL_OBJFILE_OSECTIONS (objfile, osect)
593 {
594 if (bfd_get_section_size (osect->the_bfd_section) == 0)
595 continue;
596
597 gdb_assert (ts < table->sections + space + count);
598
599 ts->addr = obj_section_addr (osect);
600 ts->endaddr = obj_section_endaddr (osect);
601 ts->the_bfd_section = osect->the_bfd_section;
602 ts->owner = (void *) objfile;
603
604 ts++;
605 }
606}
607
046ac79f
JK
608/* Remove all target sections owned by OWNER.
609 OWNER must be the same value passed to add_target_sections. */
07b82ea5
PA
610
611void
046ac79f 612remove_target_sections (void *owner)
07b82ea5
PA
613{
614 struct target_section *src, *dest;
07b82ea5
PA
615 struct target_section_table *table = current_target_sections;
616
046ac79f
JK
617 gdb_assert (owner != NULL);
618
07b82ea5
PA
619 dest = table->sections;
620 for (src = table->sections; src < table->sections_end; src++)
046ac79f 621 if (src->owner != owner)
07b82ea5
PA
622 {
623 /* Keep this section. */
624 if (dest < src)
625 *dest = *src;
626 dest++;
627 }
628
629 /* If we've dropped any sections, resize the section table. */
630 if (dest < src)
631 {
632 int old_count;
633
634 old_count = resize_section_table (table, dest - src);
635
636 /* If we don't have any more sections to read memory from,
637 remove the file_stratum target from the stack. */
638 if (old_count + (dest - src) == 0)
6c95b8df
PA
639 {
640 struct program_space *pspace;
641
642 ALL_PSPACES (pspace)
643 if (pspace->target_sections.sections
644 != pspace->target_sections.sections_end)
645 return;
646
647 unpush_target (&exec_ops);
648 }
07b82ea5
PA
649 }
650}
651
c906108c 652\f
348f8c02 653
1ca49d37
YQ
654enum target_xfer_status
655exec_read_partial_read_only (gdb_byte *readbuf, ULONGEST offset,
656 ULONGEST len, ULONGEST *xfered_len)
657{
658 /* It's unduly pedantic to refuse to look at the executable for
659 read-only pieces; so do the equivalent of readonly regions aka
660 QTro packet. */
661 if (exec_bfd != NULL)
662 {
663 asection *s;
664 bfd_size_type size;
665 bfd_vma vma;
666
667 for (s = exec_bfd->sections; s; s = s->next)
668 {
669 if ((s->flags & SEC_LOAD) == 0
670 || (s->flags & SEC_READONLY) == 0)
671 continue;
672
673 vma = s->vma;
674 size = bfd_get_section_size (s);
675 if (vma <= offset && offset < (vma + size))
676 {
677 ULONGEST amt;
678
679 amt = (vma + size) - offset;
680 if (amt > len)
681 amt = len;
682
683 amt = bfd_get_section_contents (exec_bfd, s,
684 readbuf, offset - vma, amt);
685
686 if (amt == 0)
687 return TARGET_XFER_EOF;
688 else
689 {
690 *xfered_len = amt;
691 return TARGET_XFER_OK;
692 }
693 }
694 }
695 }
696
697 /* Indicate failure to find the requested memory block. */
698 return TARGET_XFER_E_IO;
699}
700
5a2eb0ef
YQ
701/* Appends all read-only memory ranges found in the target section
702 table defined by SECTIONS and SECTIONS_END, starting at (and
703 intersected with) MEMADDR for LEN bytes. Returns the augmented
704 VEC. */
705
706static VEC(mem_range_s) *
e6ca34fc 707section_table_available_memory (VEC(mem_range_s) *memory,
424447ee 708 CORE_ADDR memaddr, ULONGEST len,
e6ca34fc
PA
709 struct target_section *sections,
710 struct target_section *sections_end)
711{
712 struct target_section *p;
e6ca34fc
PA
713
714 for (p = sections; p < sections_end; p++)
715 {
2b2848e2
DE
716 if ((bfd_get_section_flags (p->the_bfd_section->owner,
717 p->the_bfd_section)
e6ca34fc
PA
718 & SEC_READONLY) == 0)
719 continue;
720
721 /* Copy the meta-data, adjusted. */
722 if (mem_ranges_overlap (p->addr, p->endaddr - p->addr, memaddr, len))
723 {
724 ULONGEST lo1, hi1, lo2, hi2;
725 struct mem_range *r;
726
727 lo1 = memaddr;
728 hi1 = memaddr + len;
729
730 lo2 = p->addr;
731 hi2 = p->endaddr;
732
733 r = VEC_safe_push (mem_range_s, memory, NULL);
734
325fac50
PA
735 r->start = std::max (lo1, lo2);
736 r->length = std::min (hi1, hi2) - r->start;
e6ca34fc
PA
737 }
738 }
739
740 return memory;
741}
742
1ee79381
YQ
743enum target_xfer_status
744section_table_read_available_memory (gdb_byte *readbuf, ULONGEST offset,
745 ULONGEST len, ULONGEST *xfered_len)
746{
747 VEC(mem_range_s) *available_memory = NULL;
748 struct target_section_table *table;
749 struct cleanup *old_chain;
750 mem_range_s *r;
751 int i;
752
753 table = target_get_section_table (&exec_ops);
754 available_memory = section_table_available_memory (available_memory,
755 offset, len,
756 table->sections,
757 table->sections_end);
758
759 old_chain = make_cleanup (VEC_cleanup(mem_range_s),
760 &available_memory);
761
762 normalize_mem_ranges (available_memory);
763
764 for (i = 0;
765 VEC_iterate (mem_range_s, available_memory, i, r);
766 i++)
767 {
768 if (mem_ranges_overlap (r->start, r->length, offset, len))
769 {
770 CORE_ADDR end;
771 enum target_xfer_status status;
772
773 /* Get the intersection window. */
768adc05 774 end = std::min<CORE_ADDR> (offset + len, r->start + r->length);
1ee79381
YQ
775
776 gdb_assert (end - offset <= len);
777
778 if (offset >= r->start)
779 status = exec_read_partial_read_only (readbuf, offset,
780 end - offset,
781 xfered_len);
782 else
783 {
784 *xfered_len = r->start - offset;
bc113b4e 785 status = TARGET_XFER_UNAVAILABLE;
1ee79381
YQ
786 }
787 do_cleanups (old_chain);
788 return status;
789 }
790 }
791 do_cleanups (old_chain);
792
793 *xfered_len = len;
bc113b4e 794 return TARGET_XFER_UNAVAILABLE;
1ee79381
YQ
795}
796
9b409511 797enum target_xfer_status
07b82ea5 798section_table_xfer_memory_partial (gdb_byte *readbuf, const gdb_byte *writebuf,
b55e14c7 799 ULONGEST offset, ULONGEST len,
9b409511 800 ULONGEST *xfered_len,
07b82ea5
PA
801 struct target_section *sections,
802 struct target_section *sections_end,
803 const char *section_name)
c906108c 804{
020cc13c 805 int res;
0542c86d 806 struct target_section *p;
07b82ea5
PA
807 ULONGEST memaddr = offset;
808 ULONGEST memend = memaddr + len;
c906108c 809
b55e14c7 810 if (len == 0)
3e43a32a
MS
811 internal_error (__FILE__, __LINE__,
812 _("failed internal consistency check"));
c906108c 813
348f8c02 814 for (p = sections; p < sections_end; p++)
c906108c 815 {
2b2848e2
DE
816 struct bfd_section *asect = p->the_bfd_section;
817 bfd *abfd = asect->owner;
818
819 if (section_name && strcmp (section_name, asect->name) != 0)
0963b4bd 820 continue; /* not the section we need. */
c906108c 821 if (memaddr >= p->addr)
3db26b01
JB
822 {
823 if (memend <= p->endaddr)
824 {
825 /* Entire transfer is within this section. */
07b82ea5 826 if (writebuf)
2b2848e2 827 res = bfd_set_section_contents (abfd, asect,
07b82ea5 828 writebuf, memaddr - p->addr,
85302095
AC
829 len);
830 else
2b2848e2 831 res = bfd_get_section_contents (abfd, asect,
07b82ea5 832 readbuf, memaddr - p->addr,
85302095 833 len);
9b409511
YQ
834
835 if (res != 0)
836 {
837 *xfered_len = len;
838 return TARGET_XFER_OK;
839 }
840 else
841 return TARGET_XFER_EOF;
3db26b01
JB
842 }
843 else if (memaddr >= p->endaddr)
844 {
845 /* This section ends before the transfer starts. */
846 continue;
847 }
848 else
849 {
850 /* This section overlaps the transfer. Just do half. */
851 len = p->endaddr - memaddr;
07b82ea5 852 if (writebuf)
2b2848e2 853 res = bfd_set_section_contents (abfd, asect,
07b82ea5 854 writebuf, memaddr - p->addr,
85302095
AC
855 len);
856 else
2b2848e2 857 res = bfd_get_section_contents (abfd, asect,
07b82ea5 858 readbuf, memaddr - p->addr,
85302095 859 len);
9b409511
YQ
860 if (res != 0)
861 {
862 *xfered_len = len;
863 return TARGET_XFER_OK;
864 }
865 else
866 return TARGET_XFER_EOF;
3db26b01
JB
867 }
868 }
c906108c
SS
869 }
870
9b409511 871 return TARGET_XFER_EOF; /* We can't help. */
c906108c 872}
348f8c02 873
70221824 874static struct target_section_table *
07b82ea5 875exec_get_section_table (struct target_ops *ops)
348f8c02 876{
07b82ea5 877 return current_target_sections;
348f8c02
PA
878}
879
9b409511 880static enum target_xfer_status
07b82ea5
PA
881exec_xfer_partial (struct target_ops *ops, enum target_object object,
882 const char *annex, gdb_byte *readbuf,
883 const gdb_byte *writebuf,
9b409511 884 ULONGEST offset, ULONGEST len, ULONGEST *xfered_len)
348f8c02 885{
07b82ea5
PA
886 struct target_section_table *table = target_get_section_table (ops);
887
888 if (object == TARGET_OBJECT_MEMORY)
889 return section_table_xfer_memory_partial (readbuf, writebuf,
9b409511 890 offset, len, xfered_len,
07b82ea5
PA
891 table->sections,
892 table->sections_end,
893 NULL);
894 else
2ed4b548 895 return TARGET_XFER_E_IO;
348f8c02 896}
c906108c 897\f
c5aa993b 898
c906108c 899void
07b82ea5 900print_section_info (struct target_section_table *t, bfd *abfd)
c906108c 901{
5af949e3 902 struct gdbarch *gdbarch = gdbarch_from_bfd (abfd);
0542c86d 903 struct target_section *p;
17a912b6 904 /* FIXME: 16 is not wide enough when gdbarch_addr_bit > 64. */
5af949e3 905 int wid = gdbarch_addr_bit (gdbarch) <= 32 ? 8 : 16;
c906108c 906
c5aa993b 907 printf_filtered ("\t`%s', ", bfd_get_filename (abfd));
c906108c 908 wrap_here (" ");
a3f17187 909 printf_filtered (_("file type %s.\n"), bfd_get_target (abfd));
c906108c 910 if (abfd == exec_bfd)
51bee8e9 911 {
3e43a32a
MS
912 /* gcc-3.4 does not like the initialization in
913 <p == t->sections_end>. */
d904de5b 914 bfd_vma displacement = 0;
2f1bdd26 915 bfd_vma entry_point;
51bee8e9
JK
916
917 for (p = t->sections; p < t->sections_end; p++)
918 {
2b2848e2
DE
919 struct bfd_section *psect = p->the_bfd_section;
920 bfd *pbfd = psect->owner;
51bee8e9 921
2b2848e2 922 if ((bfd_get_section_flags (pbfd, psect) & (SEC_ALLOC | SEC_LOAD))
51bee8e9
JK
923 != (SEC_ALLOC | SEC_LOAD))
924 continue;
925
2b2848e2
DE
926 if (bfd_get_section_vma (pbfd, psect) <= abfd->start_address
927 && abfd->start_address < (bfd_get_section_vma (pbfd, psect)
928 + bfd_get_section_size (psect)))
51bee8e9 929 {
2b2848e2 930 displacement = p->addr - bfd_get_section_vma (pbfd, psect);
51bee8e9
JK
931 break;
932 }
933 }
934 if (p == t->sections_end)
b37520b6 935 warning (_("Cannot find section for the entry point of %s."),
d904de5b 936 bfd_get_filename (abfd));
51bee8e9 937
2f1bdd26
MGD
938 entry_point = gdbarch_addr_bits_remove (gdbarch,
939 bfd_get_start_address (abfd)
940 + displacement);
51bee8e9 941 printf_filtered (_("\tEntry point: %s\n"),
2f1bdd26 942 paddress (gdbarch, entry_point));
51bee8e9 943 }
07b82ea5 944 for (p = t->sections; p < t->sections_end; p++)
c906108c 945 {
2b2848e2
DE
946 struct bfd_section *psect = p->the_bfd_section;
947 bfd *pbfd = psect->owner;
948
bb599908
PH
949 printf_filtered ("\t%s", hex_string_custom (p->addr, wid));
950 printf_filtered (" - %s", hex_string_custom (p->endaddr, wid));
bcf16802
KB
951
952 /* FIXME: A format of "08l" is not wide enough for file offsets
953 larger than 4GB. OTOH, making it "016l" isn't desirable either
954 since most output will then be much wider than necessary. It
955 may make sense to test the size of the file and choose the
956 format string accordingly. */
a3f17187 957 /* FIXME: i18n: Need to rewrite this sentence. */
c906108c
SS
958 if (info_verbose)
959 printf_filtered (" @ %s",
2b2848e2
DE
960 hex_string_custom (psect->filepos, 8));
961 printf_filtered (" is %s", bfd_section_name (pbfd, psect));
962 if (pbfd != abfd)
963 printf_filtered (" in %s", bfd_get_filename (pbfd));
c906108c
SS
964 printf_filtered ("\n");
965 }
966}
967
968static void
fba45db2 969exec_files_info (struct target_ops *t)
c906108c 970{
57008375
JK
971 if (exec_bfd)
972 print_section_info (current_target_sections, exec_bfd);
973 else
974 puts_filtered (_("\t<no file loaded>\n"));
c906108c
SS
975}
976
977static void
fba45db2 978set_section_command (char *args, int from_tty)
c906108c 979{
0542c86d 980 struct target_section *p;
c906108c
SS
981 char *secname;
982 unsigned seclen;
983 unsigned long secaddr;
984 char secprint[100];
985 long offset;
07b82ea5 986 struct target_section_table *table;
c906108c
SS
987
988 if (args == 0)
8a3fe4f8 989 error (_("Must specify section name and its virtual address"));
c906108c 990
0963b4bd 991 /* Parse out section name. */
c5aa993b 992 for (secname = args; !isspace (*args); args++);
c906108c
SS
993 seclen = args - secname;
994
0963b4bd 995 /* Parse out new virtual address. */
c906108c
SS
996 secaddr = parse_and_eval_address (args);
997
07b82ea5
PA
998 table = current_target_sections;
999 for (p = table->sections; p < table->sections_end; p++)
c5aa993b 1000 {
57008375 1001 if (!strncmp (secname, bfd_section_name (p->bfd,
3e43a32a 1002 p->the_bfd_section), seclen)
57008375 1003 && bfd_section_name (p->bfd, p->the_bfd_section)[seclen] == '\0')
c5aa993b
JM
1004 {
1005 offset = secaddr - p->addr;
1006 p->addr += offset;
1007 p->endaddr += offset;
1008 if (from_tty)
1009 exec_files_info (&exec_ops);
1010 return;
1011 }
c906108c 1012 }
c906108c
SS
1013 if (seclen >= sizeof (secprint))
1014 seclen = sizeof (secprint) - 1;
1015 strncpy (secprint, secname, seclen);
1016 secprint[seclen] = '\0';
8a3fe4f8 1017 error (_("Section %s not found"), secprint);
c906108c
SS
1018}
1019
30510692
DJ
1020/* If we can find a section in FILENAME with BFD index INDEX, adjust
1021 it to ADDRESS. */
c1bd25fd
DJ
1022
1023void
1024exec_set_section_address (const char *filename, int index, CORE_ADDR address)
1025{
0542c86d 1026 struct target_section *p;
07b82ea5 1027 struct target_section_table *table;
c1bd25fd 1028
07b82ea5
PA
1029 table = current_target_sections;
1030 for (p = table->sections; p < table->sections_end; p++)
c1bd25fd 1031 {
2b2848e2 1032 if (filename_cmp (filename, p->the_bfd_section->owner->filename) == 0
30510692 1033 && index == p->the_bfd_section->index)
c1bd25fd 1034 {
30510692 1035 p->endaddr += address - p->addr;
c1bd25fd 1036 p->addr = address;
c1bd25fd
DJ
1037 }
1038 }
1039}
1040
c906108c
SS
1041/* If mourn is being called in all the right places, this could be say
1042 `gdb internal error' (since generic_mourn calls
1043 breakpoint_init_inferior). */
1044
1045static int
3db08215
MM
1046ignore (struct target_ops *ops, struct gdbarch *gdbarch,
1047 struct bp_target_info *bp_tgt)
c906108c
SS
1048{
1049 return 0;
1050}
1051
73971819
PA
1052/* Implement the to_remove_breakpoint method. */
1053
1054static int
1055exec_remove_breakpoint (struct target_ops *ops, struct gdbarch *gdbarch,
1056 struct bp_target_info *bp_tgt,
1057 enum remove_bp_reason reason)
1058{
1059 return 0;
1060}
1061
c35b1492
PA
1062static int
1063exec_has_memory (struct target_ops *ops)
1064{
1065 /* We can provide memory if we have any file/target sections to read
1066 from. */
1067 return (current_target_sections->sections
1068 != current_target_sections->sections_end);
1069}
1070
83814951
TT
1071static char *
1072exec_make_note_section (struct target_ops *self, bfd *obfd, int *note_size)
1073{
1074 error (_("Can't create a corefile"));
1075}
be4d1333 1076
c906108c
SS
1077/* Fill in the exec file target vector. Very few entries need to be
1078 defined. */
1079
be4d1333 1080static void
fba45db2 1081init_exec_ops (void)
c906108c
SS
1082{
1083 exec_ops.to_shortname = "exec";
1084 exec_ops.to_longname = "Local exec file";
1085 exec_ops.to_doc = "Use an executable file as a target.\n\
1086Specify the filename of the executable file.";
1adeb98a 1087 exec_ops.to_open = exec_open;
6c95b8df 1088 exec_ops.to_close = exec_close_1;
07b82ea5
PA
1089 exec_ops.to_xfer_partial = exec_xfer_partial;
1090 exec_ops.to_get_section_table = exec_get_section_table;
c906108c
SS
1091 exec_ops.to_files_info = exec_files_info;
1092 exec_ops.to_insert_breakpoint = ignore;
73971819 1093 exec_ops.to_remove_breakpoint = exec_remove_breakpoint;
c906108c 1094 exec_ops.to_stratum = file_stratum;
c35b1492 1095 exec_ops.to_has_memory = exec_has_memory;
be4d1333 1096 exec_ops.to_make_corefile_notes = exec_make_note_section;
b427c1bc 1097 exec_ops.to_find_memory_regions = objfile_find_memory_regions;
c5aa993b 1098 exec_ops.to_magic = OPS_MAGIC;
c906108c
SS
1099}
1100
1101void
fba45db2 1102_initialize_exec (void)
c906108c
SS
1103{
1104 struct cmd_list_element *c;
1105
1106 init_exec_ops ();
1107
1108 if (!dbx_commands)
1109 {
1a966eab
AC
1110 c = add_cmd ("file", class_files, file_command, _("\
1111Use FILE as program to be debugged.\n\
c906108c
SS
1112It is read for its symbols, for getting the contents of pure memory,\n\
1113and it is the program executed when you use the `run' command.\n\
1114If FILE cannot be found as specified, your execution directory path\n\
1115($PATH) is searched for a command of that name.\n\
1a966eab 1116No arg means to have no executable file and no symbols."), &cmdlist);
5ba2abeb 1117 set_cmd_completer (c, filename_completer);
c906108c
SS
1118 }
1119
1a966eab
AC
1120 c = add_cmd ("exec-file", class_files, exec_file_command, _("\
1121Use FILE as program for getting contents of pure memory.\n\
c906108c
SS
1122If FILE cannot be found as specified, your execution directory path\n\
1123is searched for a command of that name.\n\
1a966eab 1124No arg means have no executable file."), &cmdlist);
5ba2abeb 1125 set_cmd_completer (c, filename_completer);
c906108c 1126
1bedd215
AC
1127 add_com ("section", class_files, set_section_command, _("\
1128Change the base address of section SECTION of the exec file to ADDR.\n\
c906108c
SS
1129This can be used if the exec file does not contain section addresses,\n\
1130(such as in the a.out format), or when the addresses specified in the\n\
1131file itself are wrong. Each section must be changed separately. The\n\
1bedd215 1132``info files'' command lists all the sections and their addresses."));
c906108c 1133
5bf193a2
AC
1134 add_setshow_boolean_cmd ("write", class_support, &write_files, _("\
1135Set writing into executable and core files."), _("\
1136Show writing into executable and core files."), NULL,
1137 NULL,
920d2a44 1138 show_write_files,
5bf193a2 1139 &setlist, &showlist);
c5aa993b 1140
9852c492 1141 add_target_with_completer (&exec_ops, filename_completer);
c906108c 1142}
This page took 2.379439 seconds and 4 git commands to generate.