gdb/testsuite: Disable path and duplicate checks when parallel testing
[deliverable/binutils-gdb.git] / gdb / exec.c
CommitLineData
c906108c 1/* Work with executable files, for GDB.
4646aa9d 2
b811d2c2 3 Copyright (C) 1988-2020 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "frame.h"
d55e5aa6 22#include "inferior.h"
4de283e4
TT
23#include "target.h"
24#include "gdbcmd.h"
c906108c 25#include "language.h"
4de283e4
TT
26#include "filenames.h"
27#include "symfile.h"
c906108c 28#include "objfiles.h"
4de283e4
TT
29#include "completer.h"
30#include "value.h"
31#include "exec.h"
76727919 32#include "observable.h"
4de283e4
TT
33#include "arch-utils.h"
34#include "gdbthread.h"
6c95b8df 35#include "progspace.h"
53af73bf 36#include "progspace-and-thread.h"
4de283e4
TT
37#include "gdb_bfd.h"
38#include "gcore.h"
39#include "source.h"
40
41#include <fcntl.h>
e0eac551 42#include "readline/tilde.h"
4de283e4
TT
43#include "gdbcore.h"
44
45#include <ctype.h>
46#include <sys/stat.h>
a9a5a3d1 47#include "solist.h"
4de283e4 48#include <algorithm>
268a13a5 49#include "gdbsupport/pathstuff.h"
a2fedca9 50#include "cli/cli-style.h"
c906108c 51
1d8b34a7 52void (*deprecated_file_changed_hook) (const char *);
c906108c 53
d9f719f1
PA
54static const target_info exec_target_info = {
55 "exec",
56 N_("Local exec file"),
57 N_("Use an executable file as a target.\n\
58Specify the filename of the executable file.")
59};
60
c906108c
SS
61/* The target vector for executable files. */
62
f6ac5f3d
PA
63struct exec_target final : public target_ops
64{
d9f719f1
PA
65 const target_info &info () const override
66 { return exec_target_info; }
f6ac5f3d 67
66b4deae
PA
68 strata stratum () const override { return file_stratum; }
69
f6ac5f3d
PA
70 void close () override;
71 enum target_xfer_status xfer_partial (enum target_object object,
72 const char *annex,
73 gdb_byte *readbuf,
74 const gdb_byte *writebuf,
75 ULONGEST offset, ULONGEST len,
76 ULONGEST *xfered_len) override;
77 struct target_section_table *get_section_table () override;
78 void files_info () override;
79
57810aa7 80 bool has_memory () override;
f6ac5f3d
PA
81 char *make_corefile_notes (bfd *, int *) override;
82 int find_memory_regions (find_memory_region_ftype func, void *data) override;
83};
84
85static exec_target exec_ops;
c906108c 86
a2fedca9
PW
87/* How to handle a mismatch between the current exec file and the exec
88 file determined from target. */
89
90static const char *const exec_file_mismatch_names[]
91 = {"ask", "warn", "off", NULL };
92enum exec_file_mismatch_mode
93 {
94 exec_file_mismatch_ask, exec_file_mismatch_warn, exec_file_mismatch_off
95 };
96static const char *exec_file_mismatch = exec_file_mismatch_names[0];
97static enum exec_file_mismatch_mode exec_file_mismatch_mode
98 = exec_file_mismatch_ask;
99
100/* Show command. */
101static void
102show_exec_file_mismatch_command (struct ui_file *file, int from_tty,
103 struct cmd_list_element *c, const char *value)
104{
105 fprintf_filtered (gdb_stdout,
106 _("exec-file-mismatch handling is currently \"%s\".\n"),
107 exec_file_mismatch_names[exec_file_mismatch_mode]);
108}
109
110/* Set command. Change the setting for range checking. */
111static void
112set_exec_file_mismatch_command (const char *ignore,
113 int from_tty, struct cmd_list_element *c)
114{
115 for (enum exec_file_mismatch_mode mode = exec_file_mismatch_ask;
116 ;
117 mode = static_cast<enum exec_file_mismatch_mode>(1 + (int) mode))
118 {
119 if (strcmp (exec_file_mismatch, exec_file_mismatch_names[mode]) == 0)
120 {
121 exec_file_mismatch_mode = mode;
122 return;
123 }
124 if (mode == exec_file_mismatch_off)
125 internal_error (__FILE__, __LINE__,
126 _("Unrecognized exec-file-mismatch setting: \"%s\""),
127 exec_file_mismatch);
128 }
129}
130
c906108c
SS
131/* Whether to open exec and core files read-only or read-write. */
132
491144b5 133bool write_files = false;
920d2a44
AC
134static void
135show_write_files (struct ui_file *file, int from_tty,
136 struct cmd_list_element *c, const char *value)
137{
138 fprintf_filtered (file, _("Writing into executable and core files is %s.\n"),
139 value);
140}
141
c906108c 142
d9f719f1
PA
143static void
144exec_target_open (const char *args, int from_tty)
1adeb98a
FN
145{
146 target_preopen (from_tty);
147 exec_file_attach (args, from_tty);
148}
149
07b82ea5
PA
150/* Close and clear exec_bfd. If we end up with no target sections to
151 read memory from, this unpushes the exec_ops target. */
152
6c95b8df
PA
153void
154exec_close (void)
07b82ea5
PA
155{
156 if (exec_bfd)
157 {
158 bfd *abfd = exec_bfd;
07b82ea5 159
cbb099e8 160 gdb_bfd_unref (abfd);
07b82ea5
PA
161
162 /* Removing target sections may close the exec_ops target.
163 Clear exec_bfd before doing so to prevent recursion. */
164 exec_bfd = NULL;
165 exec_bfd_mtime = 0;
166
046ac79f 167 remove_target_sections (&exec_bfd);
1f0c4988
JK
168
169 xfree (exec_filename);
170 exec_filename = NULL;
07b82ea5
PA
171 }
172}
173
6c95b8df
PA
174/* This is the target_close implementation. Clears all target
175 sections and closes all executable bfds from all program spaces. */
176
f6ac5f3d
PA
177void
178exec_target::close ()
c906108c 179{
5ed8105e 180 scoped_restore_current_program_space restore_pspace;
6c95b8df 181
94c93c35 182 for (struct program_space *ss : program_spaces)
5ed8105e
PA
183 {
184 set_current_program_space (ss);
185 clear_section_table (current_target_sections);
186 exec_close ();
187 }
c906108c
SS
188}
189
f6ac5f3d 190/* See gdbcore.h. */
a10de604
GB
191
192void
ecf45d2c
SL
193try_open_exec_file (const char *exec_file_host, struct inferior *inf,
194 symfile_add_flags add_flags)
a10de604 195{
cc06b668 196 struct gdb_exception prev_err;
a10de604 197
57d1de9c
LM
198 /* exec_file_attach and symbol_file_add_main may throw an error if the file
199 cannot be opened either locally or remotely.
200
201 This happens for example, when the file is first found in the local
202 sysroot (above), and then disappears (a TOCTOU race), or when it doesn't
203 exist in the target filesystem, or when the file does exist, but
204 is not readable.
88178e82 205
57d1de9c
LM
206 Even without a symbol file, the remote-based debugging session should
207 continue normally instead of ending abruptly. Hence we catch thrown
208 errors/exceptions in the following code. */
a70b8144 209 try
57d1de9c 210 {
ecf45d2c
SL
211 /* We must do this step even if exec_file_host is NULL, so that
212 exec_file_attach will clear state. */
213 exec_file_attach (exec_file_host, add_flags & SYMFILE_VERBOSE);
57d1de9c 214 }
94aeb44b 215 catch (gdb_exception_error &err)
57d1de9c
LM
216 {
217 if (err.message != NULL)
3d6e9d23 218 warning ("%s", err.what ());
57d1de9c 219
94aeb44b 220 prev_err = std::move (err);
57d1de9c 221 }
57d1de9c 222
ecf45d2c 223 if (exec_file_host != NULL)
57d1de9c 224 {
a70b8144 225 try
ecf45d2c
SL
226 {
227 symbol_file_add_main (exec_file_host, add_flags);
228 }
230d2906 229 catch (const gdb_exception_error &err)
ecf45d2c
SL
230 {
231 if (!exception_print_same (prev_err, err))
3d6e9d23 232 warning ("%s", err.what ());
ecf45d2c 233 }
57d1de9c 234 }
ecf45d2c
SL
235}
236
237/* See gdbcore.h. */
238
a2fedca9
PW
239void
240validate_exec_file (int from_tty)
241{
242 /* If user asked to ignore the mismatch, do nothing. */
243 if (exec_file_mismatch_mode == exec_file_mismatch_off)
244 return;
245
246 const char *current_exec_file = get_exec_file (0);
247 struct inferior *inf = current_inferior ();
248 /* Try to determine a filename from the process itself. */
249 const char *pid_exec_file = target_pid_to_exec_file (inf->pid);
250
251 /* If wee cannot validate the exec file, return. */
252 if (current_exec_file == NULL || pid_exec_file == NULL)
253 return;
254
255 std::string exec_file_target (pid_exec_file);
256
257 /* In case the exec file is not local, exec_file_target has to point at
258 the target file system. */
259 if (is_target_filename (current_exec_file) && !target_filesystem_is_local ())
260 exec_file_target = TARGET_SYSROOT_PREFIX + exec_file_target;
261
262 if (exec_file_target != current_exec_file)
263 {
264 warning
265 (_("Mismatch between current exec-file %ps\n"
266 "and automatically determined exec-file %ps\n"
267 "exec-file-mismatch handling is currently \"%s\""),
268 styled_string (file_name_style.style (), current_exec_file),
269 styled_string (file_name_style.style (), exec_file_target.c_str ()),
270 exec_file_mismatch_names[exec_file_mismatch_mode]);
271 if (exec_file_mismatch_mode == exec_file_mismatch_ask)
272 {
273 symfile_add_flags add_flags = SYMFILE_MAINLINE;
274 if (from_tty)
275 add_flags |= SYMFILE_VERBOSE;
276 try
277 {
278 symbol_file_add_main (exec_file_target.c_str (), add_flags);
279 exec_file_attach (exec_file_target.c_str (), from_tty);
280 }
281 catch (gdb_exception_error &err)
282 {
283 warning (_("loading %ps %s"),
284 styled_string (file_name_style.style (),
285 exec_file_target.c_str ()),
286 err.message != NULL ? err.what () : "error");
287 }
288 }
289 }
290}
291
292/* See gdbcore.h. */
293
ecf45d2c
SL
294void
295exec_file_locate_attach (int pid, int defer_bp_reset, int from_tty)
296{
797bc1cb 297 char *exec_file_target;
ecf45d2c
SL
298 symfile_add_flags add_flags = 0;
299
300 /* Do nothing if we already have an executable filename. */
301 if (get_exec_file (0) != NULL)
302 return;
303
304 /* Try to determine a filename from the process itself. */
305 exec_file_target = target_pid_to_exec_file (pid);
306 if (exec_file_target == NULL)
57d1de9c 307 {
ecf45d2c
SL
308 warning (_("No executable has been specified and target does not "
309 "support\n"
310 "determining executable automatically. "
311 "Try using the \"file\" command."));
312 return;
57d1de9c 313 }
88178e82 314
797bc1cb
TT
315 gdb::unique_xmalloc_ptr<char> exec_file_host
316 = exec_file_find (exec_file_target, NULL);
ecf45d2c
SL
317
318 if (defer_bp_reset)
319 add_flags |= SYMFILE_DEFER_BP_RESET;
320
321 if (from_tty)
322 add_flags |= SYMFILE_VERBOSE;
323
324 /* Attempt to open the exec file. */
797bc1cb 325 try_open_exec_file (exec_file_host.get (), current_inferior (), add_flags);
a10de604
GB
326}
327
907083d1 328/* Set FILENAME as the new exec file.
c906108c 329
c5aa993b
JM
330 This function is intended to be behave essentially the same
331 as exec_file_command, except that the latter will detect when
332 a target is being debugged, and will ask the user whether it
333 should be shut down first. (If the answer is "no", then the
334 new file is ignored.)
c906108c 335
c5aa993b
JM
336 This file is used by exec_file_command, to do the work of opening
337 and processing the exec file after any prompting has happened.
c906108c 338
c5aa993b
JM
339 And, it is used by child_attach, when the attach command was
340 given a pid but not a exec pathname, and the attach command could
341 figure out the pathname from the pid. (In this case, we shouldn't
342 ask the user whether the current target should be shut down --
907083d1 343 we're supplying the exec pathname late for good reason.) */
c906108c
SS
344
345void
5f08566b 346exec_file_attach (const char *filename, int from_tty)
c906108c 347{
9b333ba3
TT
348 /* First, acquire a reference to the current exec_bfd. We release
349 this at the end of the function; but acquiring it now lets the
350 BFD cache return it if this call refers to the same file. */
1831a9f9 351 gdb_bfd_ref_ptr exec_bfd_holder = gdb_bfd_ref_ptr::new_reference (exec_bfd);
192b62ce 352
c906108c 353 /* Remove any previous exec file. */
6c95b8df 354 exec_close ();
c906108c
SS
355
356 /* Now open and digest the file the user requested, if any. */
357
1adeb98a
FN
358 if (!filename)
359 {
360 if (from_tty)
a3f17187 361 printf_unfiltered (_("No executable file now.\n"));
7a107747
DJ
362
363 set_gdbarch_from_file (NULL);
1adeb98a
FN
364 }
365 else
c906108c 366 {
64c0b5de 367 int load_via_target = 0;
14278e1f 368 const char *scratch_pathname, *canonical_pathname;
c906108c 369 int scratch_chan;
07b82ea5 370 struct target_section *sections = NULL, *sections_end = NULL;
d18b8b7a 371 char **matching;
c5aa993b 372
64c0b5de
GB
373 if (is_target_filename (filename))
374 {
375 if (target_filesystem_is_local ())
376 filename += strlen (TARGET_SYSROOT_PREFIX);
377 else
378 load_via_target = 1;
379 }
380
14278e1f 381 gdb::unique_xmalloc_ptr<char> canonical_storage, scratch_storage;
64c0b5de 382 if (load_via_target)
c5aa993b 383 {
64c0b5de
GB
384 /* gdb_bfd_fopen does not support "target:" filenames. */
385 if (write_files)
386 warning (_("writing into executable files is "
387 "not supported for %s sysroots"),
388 TARGET_SYSROOT_PREFIX);
389
14278e1f 390 scratch_pathname = filename;
64c0b5de 391 scratch_chan = -1;
64c0b5de 392 canonical_pathname = scratch_pathname;
c5aa993b 393 }
64c0b5de
GB
394 else
395 {
396 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
397 filename, write_files ?
398 O_RDWR | O_BINARY : O_RDONLY | O_BINARY,
e0cc99a6 399 &scratch_storage);
64c0b5de
GB
400#if defined(__GO32__) || defined(_WIN32) || defined(__CYGWIN__)
401 if (scratch_chan < 0)
402 {
0ae1c716 403 char *exename = (char *) alloca (strlen (filename) + 5);
64c0b5de
GB
404
405 strcat (strcpy (exename, filename), ".exe");
406 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
407 exename, write_files ?
408 O_RDWR | O_BINARY
409 : O_RDONLY | O_BINARY,
e0cc99a6 410 &scratch_storage);
64c0b5de 411 }
c906108c 412#endif
64c0b5de
GB
413 if (scratch_chan < 0)
414 perror_with_name (filename);
a4453b7e 415
e0cc99a6 416 scratch_pathname = scratch_storage.get ();
a4453b7e 417
64c0b5de
GB
418 /* gdb_bfd_open (and its variants) prefers canonicalized
419 pathname for better BFD caching. */
14278e1f
TT
420 canonical_storage = gdb_realpath (scratch_pathname);
421 canonical_pathname = canonical_storage.get ();
64c0b5de 422 }
1f0c4988 423
192b62ce 424 gdb_bfd_ref_ptr temp;
64c0b5de 425 if (write_files && !load_via_target)
192b62ce
TT
426 temp = gdb_bfd_fopen (canonical_pathname, gnutarget,
427 FOPEN_RUB, scratch_chan);
1c00ec6b 428 else
192b62ce
TT
429 temp = gdb_bfd_open (canonical_pathname, gnutarget, scratch_chan);
430 exec_bfd = temp.release ();
c906108c
SS
431
432 if (!exec_bfd)
9fe4a216 433 {
a2fedca9
PW
434 error (_("\"%ps\": could not open as an executable file: %s."),
435 styled_string (file_name_style.style (), scratch_pathname),
436 bfd_errmsg (bfd_get_error ()));
9fe4a216 437 }
c906108c 438
64c0b5de
GB
439 /* gdb_realpath_keepfile resolves symlinks on the local
440 filesystem and so cannot be used for "target:" files. */
1f0c4988 441 gdb_assert (exec_filename == NULL);
64c0b5de
GB
442 if (load_via_target)
443 exec_filename = xstrdup (bfd_get_filename (exec_bfd));
444 else
4971c9a7 445 exec_filename = gdb_realpath_keepfile (scratch_pathname).release ();
1f0c4988 446
d18b8b7a 447 if (!bfd_check_format_matches (exec_bfd, bfd_object, &matching))
c906108c
SS
448 {
449 /* Make sure to close exec_bfd, or else "run" might try to use
450 it. */
6c95b8df 451 exec_close ();
a2fedca9
PW
452 error (_("\"%ps\": not in executable format: %s"),
453 styled_string (file_name_style.style (), scratch_pathname),
803c08d0 454 gdb_bfd_errmsg (bfd_get_error (), matching).c_str ());
c906108c
SS
455 }
456
07b82ea5 457 if (build_section_table (exec_bfd, &sections, &sections_end))
c906108c
SS
458 {
459 /* Make sure to close exec_bfd, or else "run" might try to use
460 it. */
6c95b8df 461 exec_close ();
a2fedca9
PW
462 error (_("\"%ps\": can't find the file sections: %s"),
463 styled_string (file_name_style.style (), scratch_pathname),
464 bfd_errmsg (bfd_get_error ()));
c906108c
SS
465 }
466
c04ea773
DJ
467 exec_bfd_mtime = bfd_get_mtime (exec_bfd);
468
c906108c
SS
469 validate_files ();
470
471 set_gdbarch_from_file (exec_bfd);
472
07b82ea5 473 /* Add the executable's sections to the current address spaces'
6c95b8df
PA
474 list of sections. This possibly pushes the exec_ops
475 target. */
ed9eebaf 476 add_target_sections (&exec_bfd, sections, sections_end);
07b82ea5 477 xfree (sections);
c906108c
SS
478
479 /* Tell display code (if any) about the changed file name. */
9a4105ab
AC
480 if (deprecated_exec_file_display_hook)
481 (*deprecated_exec_file_display_hook) (filename);
c906108c 482 }
9b333ba3 483
ce7d4522 484 bfd_cache_close_all ();
76727919 485 gdb::observers::executable_changed.notify ();
c906108c
SS
486}
487
488/* Process the first arg in ARGS as the new exec file.
489
c5aa993b
JM
490 Note that we have to explicitly ignore additional args, since we can
491 be called from file_command(), which also calls symbol_file_command()
1adeb98a
FN
492 which can take multiple args.
493
0963b4bd 494 If ARGS is NULL, we just want to close the exec file. */
c906108c 495
1adeb98a 496static void
1d8b34a7 497exec_file_command (const char *args, int from_tty)
c906108c 498{
4c42eaff
DJ
499 if (from_tty && target_has_execution
500 && !query (_("A program is being debugged already.\n"
501 "Are you sure you want to change the file? ")))
502 error (_("File not changed."));
1adeb98a
FN
503
504 if (args)
505 {
506 /* Scan through the args and pick up the first non option arg
507 as the filename. */
508
773a1edc
TT
509 gdb_argv built_argv (args);
510 char **argv = built_argv.get ();
1adeb98a
FN
511
512 for (; (*argv != NULL) && (**argv == '-'); argv++)
513 {;
514 }
515 if (*argv == NULL)
8a3fe4f8 516 error (_("No executable file name was specified"));
1adeb98a 517
773a1edc
TT
518 gdb::unique_xmalloc_ptr<char> filename (tilde_expand (*argv));
519 exec_file_attach (filename.get (), from_tty);
1adeb98a
FN
520 }
521 else
522 exec_file_attach (NULL, from_tty);
c906108c
SS
523}
524
0963b4bd 525/* Set both the exec file and the symbol file, in one command.
c906108c
SS
526 What a novelty. Why did GDB go through four major releases before this
527 command was added? */
528
529static void
1d8b34a7 530file_command (const char *arg, int from_tty)
c906108c
SS
531{
532 /* FIXME, if we lose on reading the symbol file, we should revert
533 the exec file, but that's rough. */
534 exec_file_command (arg, from_tty);
535 symbol_file_command (arg, from_tty);
9a4105ab
AC
536 if (deprecated_file_changed_hook)
537 deprecated_file_changed_hook (arg);
c906108c 538}
c906108c 539\f
c5aa993b 540
0963b4bd 541/* Locate all mappable sections of a BFD file.
c906108c
SS
542 table_pp_char is a char * to get it through bfd_map_over_sections;
543 we cast it back to its proper type. */
544
545static void
7be0c536
AC
546add_to_section_table (bfd *abfd, struct bfd_section *asect,
547 void *table_pp_char)
c906108c 548{
0542c86d 549 struct target_section **table_pp = (struct target_section **) table_pp_char;
c906108c
SS
550 flagword aflag;
551
2b2848e2
DE
552 gdb_assert (abfd == asect->owner);
553
0f5d55d8
JB
554 /* Check the section flags, but do not discard zero-length sections, since
555 some symbols may still be attached to this section. For instance, we
556 encountered on sparc-solaris 2.10 a shared library with an empty .bss
557 section to which a symbol named "_end" was attached. The address
558 of this symbol still needs to be relocated. */
fd361982 559 aflag = bfd_section_flags (asect);
c906108c
SS
560 if (!(aflag & SEC_ALLOC))
561 return;
0f5d55d8 562
046ac79f 563 (*table_pp)->owner = NULL;
c906108c 564 (*table_pp)->the_bfd_section = asect;
fd361982
AM
565 (*table_pp)->addr = bfd_section_vma (asect);
566 (*table_pp)->endaddr = (*table_pp)->addr + bfd_section_size (asect);
c906108c
SS
567 (*table_pp)++;
568}
569
a5b1fd27
DE
570/* See exec.h. */
571
572void
573clear_section_table (struct target_section_table *table)
574{
575 xfree (table->sections);
576 table->sections = table->sections_end = NULL;
577}
578
579/* Resize section table TABLE by ADJUSTMENT.
580 ADJUSTMENT may be negative, in which case the caller must have already
581 removed the sections being deleted.
582 Returns the old size. */
583
584static int
585resize_section_table (struct target_section_table *table, int adjustment)
07b82ea5 586{
07b82ea5
PA
587 int old_count;
588 int new_count;
589
07b82ea5
PA
590 old_count = table->sections_end - table->sections;
591
a5b1fd27 592 new_count = adjustment + old_count;
07b82ea5
PA
593
594 if (new_count)
595 {
224c3ddb
SM
596 table->sections = XRESIZEVEC (struct target_section, table->sections,
597 new_count);
07b82ea5
PA
598 table->sections_end = table->sections + new_count;
599 }
600 else
a5b1fd27 601 clear_section_table (table);
07b82ea5
PA
602
603 return old_count;
604}
605
c906108c
SS
606/* Builds a section table, given args BFD, SECTABLE_PTR, SECEND_PTR.
607 Returns 0 if OK, 1 on error. */
608
609int
0542c86d
PA
610build_section_table (struct bfd *some_bfd, struct target_section **start,
611 struct target_section **end)
c906108c
SS
612{
613 unsigned count;
614
615 count = bfd_count_sections (some_bfd);
616 if (*start)
b8c9b27d 617 xfree (* start);
8d749320 618 *start = XNEWVEC (struct target_section, count);
c906108c 619 *end = *start;
c5aa993b 620 bfd_map_over_sections (some_bfd, add_to_section_table, (char *) end);
e2ff18a0
SM
621
622 gdb_assert (*end <= *start + count);
623
c906108c
SS
624 /* We could realloc the table, but it probably loses for most files. */
625 return 0;
626}
07b82ea5
PA
627
628/* Add the sections array defined by [SECTIONS..SECTIONS_END[ to the
629 current set of target sections. */
630
631void
046ac79f 632add_target_sections (void *owner,
ed9eebaf 633 struct target_section *sections,
07b82ea5
PA
634 struct target_section *sections_end)
635{
636 int count;
637 struct target_section_table *table = current_target_sections;
638
639 count = sections_end - sections;
640
641 if (count > 0)
642 {
643 int space = resize_section_table (table, count);
ed9eebaf 644 int i;
d7f9d729 645
ed9eebaf
TT
646 for (i = 0; i < count; ++i)
647 {
648 table->sections[space + i] = sections[i];
046ac79f 649 table->sections[space + i].owner = owner;
ed9eebaf 650 }
07b82ea5 651
53af73bf 652 scoped_restore_current_pspace_and_thread restore_pspace_thread;
5b6d1e4f
PA
653 program_space *curr_pspace = current_program_space;
654
07b82ea5 655 /* If these are the first file sections we can provide memory
5b6d1e4f
PA
656 from, push the file_stratum target. Must do this in all
657 inferiors sharing the program space. */
658 for (inferior *inf : all_inferiors ())
659 {
660 if (inf->pspace != curr_pspace)
661 continue;
662
663 if (inf->target_is_pushed (&exec_ops))
664 continue;
665
666 switch_to_inferior_no_thread (inf);
667 push_target (&exec_ops);
668 }
07b82ea5
PA
669 }
670}
671
76ad5e1e
NB
672/* Add the sections of OBJFILE to the current set of target sections. */
673
674void
675add_target_sections_of_objfile (struct objfile *objfile)
676{
677 struct target_section_table *table = current_target_sections;
678 struct obj_section *osect;
679 int space;
680 unsigned count = 0;
681 struct target_section *ts;
682
683 if (objfile == NULL)
684 return;
685
686 /* Compute the number of sections to add. */
687 ALL_OBJFILE_OSECTIONS (objfile, osect)
688 {
fd361982 689 if (bfd_section_size (osect->the_bfd_section) == 0)
76ad5e1e
NB
690 continue;
691 count++;
692 }
693
694 if (count == 0)
695 return;
696
697 space = resize_section_table (table, count);
698
699 ts = table->sections + space;
700
701 ALL_OBJFILE_OSECTIONS (objfile, osect)
702 {
fd361982 703 if (bfd_section_size (osect->the_bfd_section) == 0)
76ad5e1e
NB
704 continue;
705
706 gdb_assert (ts < table->sections + space + count);
707
708 ts->addr = obj_section_addr (osect);
709 ts->endaddr = obj_section_endaddr (osect);
710 ts->the_bfd_section = osect->the_bfd_section;
711 ts->owner = (void *) objfile;
712
713 ts++;
714 }
715}
716
046ac79f
JK
717/* Remove all target sections owned by OWNER.
718 OWNER must be the same value passed to add_target_sections. */
07b82ea5
PA
719
720void
046ac79f 721remove_target_sections (void *owner)
07b82ea5
PA
722{
723 struct target_section *src, *dest;
07b82ea5
PA
724 struct target_section_table *table = current_target_sections;
725
046ac79f
JK
726 gdb_assert (owner != NULL);
727
07b82ea5
PA
728 dest = table->sections;
729 for (src = table->sections; src < table->sections_end; src++)
046ac79f 730 if (src->owner != owner)
07b82ea5
PA
731 {
732 /* Keep this section. */
733 if (dest < src)
734 *dest = *src;
735 dest++;
736 }
737
738 /* If we've dropped any sections, resize the section table. */
739 if (dest < src)
740 {
741 int old_count;
742
743 old_count = resize_section_table (table, dest - src);
744
745 /* If we don't have any more sections to read memory from,
5b6d1e4f
PA
746 remove the file_stratum target from the stack of each
747 inferior sharing the program space. */
07b82ea5 748 if (old_count + (dest - src) == 0)
6c95b8df 749 {
53af73bf 750 scoped_restore_current_pspace_and_thread restore_pspace_thread;
5b6d1e4f
PA
751 program_space *curr_pspace = current_program_space;
752
753 for (inferior *inf : all_inferiors ())
754 {
755 if (inf->pspace != curr_pspace)
756 continue;
6c95b8df 757
5b6d1e4f
PA
758 if (inf->pspace->target_sections.sections
759 != inf->pspace->target_sections.sections_end)
760 continue;
6c95b8df 761
5b6d1e4f
PA
762 switch_to_inferior_no_thread (inf);
763 unpush_target (&exec_ops);
764 }
6c95b8df 765 }
07b82ea5
PA
766 }
767}
768
5b6d1e4f
PA
769/* See exec.h. */
770
771void
772exec_on_vfork ()
773{
774 if (current_program_space->target_sections.sections
775 != current_program_space->target_sections.sections_end)
776 push_target (&exec_ops);
777}
778
c906108c 779\f
348f8c02 780
1ca49d37
YQ
781enum target_xfer_status
782exec_read_partial_read_only (gdb_byte *readbuf, ULONGEST offset,
783 ULONGEST len, ULONGEST *xfered_len)
784{
785 /* It's unduly pedantic to refuse to look at the executable for
786 read-only pieces; so do the equivalent of readonly regions aka
787 QTro packet. */
788 if (exec_bfd != NULL)
789 {
790 asection *s;
791 bfd_size_type size;
792 bfd_vma vma;
793
794 for (s = exec_bfd->sections; s; s = s->next)
795 {
796 if ((s->flags & SEC_LOAD) == 0
797 || (s->flags & SEC_READONLY) == 0)
798 continue;
799
800 vma = s->vma;
fd361982 801 size = bfd_section_size (s);
1ca49d37
YQ
802 if (vma <= offset && offset < (vma + size))
803 {
804 ULONGEST amt;
805
806 amt = (vma + size) - offset;
807 if (amt > len)
808 amt = len;
809
810 amt = bfd_get_section_contents (exec_bfd, s,
811 readbuf, offset - vma, amt);
812
813 if (amt == 0)
814 return TARGET_XFER_EOF;
815 else
816 {
817 *xfered_len = amt;
818 return TARGET_XFER_OK;
819 }
820 }
821 }
822 }
823
824 /* Indicate failure to find the requested memory block. */
825 return TARGET_XFER_E_IO;
826}
827
a79b1bc6 828/* Return all read-only memory ranges found in the target section
5a2eb0ef 829 table defined by SECTIONS and SECTIONS_END, starting at (and
a79b1bc6 830 intersected with) MEMADDR for LEN bytes. */
5a2eb0ef 831
a79b1bc6
SM
832static std::vector<mem_range>
833section_table_available_memory (CORE_ADDR memaddr, ULONGEST len,
e6ca34fc
PA
834 struct target_section *sections,
835 struct target_section *sections_end)
836{
a79b1bc6 837 std::vector<mem_range> memory;
e6ca34fc 838
a79b1bc6 839 for (target_section *p = sections; p < sections_end; p++)
e6ca34fc 840 {
fd361982 841 if ((bfd_section_flags (p->the_bfd_section) & SEC_READONLY) == 0)
e6ca34fc
PA
842 continue;
843
844 /* Copy the meta-data, adjusted. */
845 if (mem_ranges_overlap (p->addr, p->endaddr - p->addr, memaddr, len))
846 {
847 ULONGEST lo1, hi1, lo2, hi2;
e6ca34fc
PA
848
849 lo1 = memaddr;
850 hi1 = memaddr + len;
851
852 lo2 = p->addr;
853 hi2 = p->endaddr;
854
a79b1bc6
SM
855 CORE_ADDR start = std::max (lo1, lo2);
856 int length = std::min (hi1, hi2) - start;
e6ca34fc 857
a79b1bc6 858 memory.emplace_back (start, length);
e6ca34fc
PA
859 }
860 }
861
862 return memory;
863}
864
1ee79381
YQ
865enum target_xfer_status
866section_table_read_available_memory (gdb_byte *readbuf, ULONGEST offset,
867 ULONGEST len, ULONGEST *xfered_len)
868{
a79b1bc6
SM
869 target_section_table *table = target_get_section_table (&exec_ops);
870 std::vector<mem_range> available_memory
871 = section_table_available_memory (offset, len,
872 table->sections, table->sections_end);
1ee79381 873
a79b1bc6 874 normalize_mem_ranges (&available_memory);
1ee79381 875
a79b1bc6 876 for (const mem_range &r : available_memory)
1ee79381 877 {
a79b1bc6 878 if (mem_ranges_overlap (r.start, r.length, offset, len))
1ee79381
YQ
879 {
880 CORE_ADDR end;
881 enum target_xfer_status status;
882
883 /* Get the intersection window. */
a79b1bc6 884 end = std::min<CORE_ADDR> (offset + len, r.start + r.length);
1ee79381
YQ
885
886 gdb_assert (end - offset <= len);
887
a79b1bc6 888 if (offset >= r.start)
1ee79381
YQ
889 status = exec_read_partial_read_only (readbuf, offset,
890 end - offset,
891 xfered_len);
892 else
893 {
a79b1bc6 894 *xfered_len = r.start - offset;
bc113b4e 895 status = TARGET_XFER_UNAVAILABLE;
1ee79381 896 }
1ee79381
YQ
897 return status;
898 }
899 }
1ee79381
YQ
900
901 *xfered_len = len;
bc113b4e 902 return TARGET_XFER_UNAVAILABLE;
1ee79381
YQ
903}
904
9b409511 905enum target_xfer_status
07b82ea5 906section_table_xfer_memory_partial (gdb_byte *readbuf, const gdb_byte *writebuf,
b55e14c7 907 ULONGEST offset, ULONGEST len,
9b409511 908 ULONGEST *xfered_len,
07b82ea5
PA
909 struct target_section *sections,
910 struct target_section *sections_end,
911 const char *section_name)
c906108c 912{
020cc13c 913 int res;
0542c86d 914 struct target_section *p;
07b82ea5
PA
915 ULONGEST memaddr = offset;
916 ULONGEST memend = memaddr + len;
c906108c 917
e2ff18a0 918 gdb_assert (len != 0);
c906108c 919
348f8c02 920 for (p = sections; p < sections_end; p++)
c906108c 921 {
2b2848e2
DE
922 struct bfd_section *asect = p->the_bfd_section;
923 bfd *abfd = asect->owner;
924
925 if (section_name && strcmp (section_name, asect->name) != 0)
0963b4bd 926 continue; /* not the section we need. */
c906108c 927 if (memaddr >= p->addr)
3db26b01
JB
928 {
929 if (memend <= p->endaddr)
930 {
931 /* Entire transfer is within this section. */
07b82ea5 932 if (writebuf)
2b2848e2 933 res = bfd_set_section_contents (abfd, asect,
07b82ea5 934 writebuf, memaddr - p->addr,
85302095
AC
935 len);
936 else
2b2848e2 937 res = bfd_get_section_contents (abfd, asect,
07b82ea5 938 readbuf, memaddr - p->addr,
85302095 939 len);
9b409511
YQ
940
941 if (res != 0)
942 {
943 *xfered_len = len;
944 return TARGET_XFER_OK;
945 }
946 else
947 return TARGET_XFER_EOF;
3db26b01
JB
948 }
949 else if (memaddr >= p->endaddr)
950 {
951 /* This section ends before the transfer starts. */
952 continue;
953 }
954 else
955 {
956 /* This section overlaps the transfer. Just do half. */
957 len = p->endaddr - memaddr;
07b82ea5 958 if (writebuf)
2b2848e2 959 res = bfd_set_section_contents (abfd, asect,
07b82ea5 960 writebuf, memaddr - p->addr,
85302095
AC
961 len);
962 else
2b2848e2 963 res = bfd_get_section_contents (abfd, asect,
07b82ea5 964 readbuf, memaddr - p->addr,
85302095 965 len);
9b409511
YQ
966 if (res != 0)
967 {
968 *xfered_len = len;
969 return TARGET_XFER_OK;
970 }
971 else
972 return TARGET_XFER_EOF;
3db26b01
JB
973 }
974 }
c906108c
SS
975 }
976
9b409511 977 return TARGET_XFER_EOF; /* We can't help. */
c906108c 978}
348f8c02 979
f6ac5f3d
PA
980struct target_section_table *
981exec_target::get_section_table ()
348f8c02 982{
07b82ea5 983 return current_target_sections;
348f8c02
PA
984}
985
f6ac5f3d
PA
986enum target_xfer_status
987exec_target::xfer_partial (enum target_object object,
988 const char *annex, gdb_byte *readbuf,
989 const gdb_byte *writebuf,
990 ULONGEST offset, ULONGEST len, ULONGEST *xfered_len)
348f8c02 991{
f6ac5f3d 992 struct target_section_table *table = get_section_table ();
07b82ea5
PA
993
994 if (object == TARGET_OBJECT_MEMORY)
995 return section_table_xfer_memory_partial (readbuf, writebuf,
9b409511 996 offset, len, xfered_len,
07b82ea5
PA
997 table->sections,
998 table->sections_end,
999 NULL);
1000 else
2ed4b548 1001 return TARGET_XFER_E_IO;
348f8c02 1002}
c906108c 1003\f
c5aa993b 1004
c906108c 1005void
07b82ea5 1006print_section_info (struct target_section_table *t, bfd *abfd)
c906108c 1007{
5af949e3 1008 struct gdbarch *gdbarch = gdbarch_from_bfd (abfd);
0542c86d 1009 struct target_section *p;
17a912b6 1010 /* FIXME: 16 is not wide enough when gdbarch_addr_bit > 64. */
5af949e3 1011 int wid = gdbarch_addr_bit (gdbarch) <= 32 ? 8 : 16;
c906108c 1012
a2fedca9
PW
1013 printf_filtered ("\t`%ps', ",
1014 styled_string (file_name_style.style (),
1015 bfd_get_filename (abfd)));
c906108c 1016 wrap_here (" ");
a3f17187 1017 printf_filtered (_("file type %s.\n"), bfd_get_target (abfd));
c906108c 1018 if (abfd == exec_bfd)
51bee8e9 1019 {
3e43a32a
MS
1020 /* gcc-3.4 does not like the initialization in
1021 <p == t->sections_end>. */
d904de5b 1022 bfd_vma displacement = 0;
2f1bdd26 1023 bfd_vma entry_point;
51bee8e9
JK
1024
1025 for (p = t->sections; p < t->sections_end; p++)
1026 {
2b2848e2 1027 struct bfd_section *psect = p->the_bfd_section;
51bee8e9 1028
fd361982 1029 if ((bfd_section_flags (psect) & (SEC_ALLOC | SEC_LOAD))
51bee8e9
JK
1030 != (SEC_ALLOC | SEC_LOAD))
1031 continue;
1032
fd361982
AM
1033 if (bfd_section_vma (psect) <= abfd->start_address
1034 && abfd->start_address < (bfd_section_vma (psect)
1035 + bfd_section_size (psect)))
51bee8e9 1036 {
fd361982 1037 displacement = p->addr - bfd_section_vma (psect);
51bee8e9
JK
1038 break;
1039 }
1040 }
1041 if (p == t->sections_end)
a2fedca9
PW
1042 warning (_("Cannot find section for the entry point of %ps."),
1043 styled_string (file_name_style.style (),
1044 bfd_get_filename (abfd)));
51bee8e9 1045
2f1bdd26
MGD
1046 entry_point = gdbarch_addr_bits_remove (gdbarch,
1047 bfd_get_start_address (abfd)
1048 + displacement);
51bee8e9 1049 printf_filtered (_("\tEntry point: %s\n"),
2f1bdd26 1050 paddress (gdbarch, entry_point));
51bee8e9 1051 }
07b82ea5 1052 for (p = t->sections; p < t->sections_end; p++)
c906108c 1053 {
2b2848e2
DE
1054 struct bfd_section *psect = p->the_bfd_section;
1055 bfd *pbfd = psect->owner;
1056
bb599908
PH
1057 printf_filtered ("\t%s", hex_string_custom (p->addr, wid));
1058 printf_filtered (" - %s", hex_string_custom (p->endaddr, wid));
bcf16802
KB
1059
1060 /* FIXME: A format of "08l" is not wide enough for file offsets
1061 larger than 4GB. OTOH, making it "016l" isn't desirable either
1062 since most output will then be much wider than necessary. It
1063 may make sense to test the size of the file and choose the
1064 format string accordingly. */
a3f17187 1065 /* FIXME: i18n: Need to rewrite this sentence. */
c906108c
SS
1066 if (info_verbose)
1067 printf_filtered (" @ %s",
2b2848e2 1068 hex_string_custom (psect->filepos, 8));
fd361982 1069 printf_filtered (" is %s", bfd_section_name (psect));
2b2848e2 1070 if (pbfd != abfd)
a2fedca9
PW
1071 printf_filtered (" in %ps",
1072 styled_string (file_name_style.style (),
1073 bfd_get_filename (pbfd)));
c906108c
SS
1074 printf_filtered ("\n");
1075 }
1076}
1077
f6ac5f3d
PA
1078void
1079exec_target::files_info ()
c906108c 1080{
57008375
JK
1081 if (exec_bfd)
1082 print_section_info (current_target_sections, exec_bfd);
1083 else
1084 puts_filtered (_("\t<no file loaded>\n"));
c906108c
SS
1085}
1086
1087static void
0b39b52e 1088set_section_command (const char *args, int from_tty)
c906108c 1089{
0542c86d 1090 struct target_section *p;
0b39b52e 1091 const char *secname;
c906108c
SS
1092 unsigned seclen;
1093 unsigned long secaddr;
1094 char secprint[100];
1095 long offset;
07b82ea5 1096 struct target_section_table *table;
c906108c
SS
1097
1098 if (args == 0)
8a3fe4f8 1099 error (_("Must specify section name and its virtual address"));
c906108c 1100
0963b4bd 1101 /* Parse out section name. */
c5aa993b 1102 for (secname = args; !isspace (*args); args++);
c906108c
SS
1103 seclen = args - secname;
1104
0963b4bd 1105 /* Parse out new virtual address. */
c906108c
SS
1106 secaddr = parse_and_eval_address (args);
1107
07b82ea5
PA
1108 table = current_target_sections;
1109 for (p = table->sections; p < table->sections_end; p++)
c5aa993b 1110 {
fd361982
AM
1111 if (!strncmp (secname, bfd_section_name (p->the_bfd_section), seclen)
1112 && bfd_section_name (p->the_bfd_section)[seclen] == '\0')
c5aa993b
JM
1113 {
1114 offset = secaddr - p->addr;
1115 p->addr += offset;
1116 p->endaddr += offset;
1117 if (from_tty)
f6ac5f3d 1118 exec_ops.files_info ();
c5aa993b
JM
1119 return;
1120 }
c906108c 1121 }
c906108c
SS
1122 if (seclen >= sizeof (secprint))
1123 seclen = sizeof (secprint) - 1;
1124 strncpy (secprint, secname, seclen);
1125 secprint[seclen] = '\0';
8a3fe4f8 1126 error (_("Section %s not found"), secprint);
c906108c
SS
1127}
1128
30510692
DJ
1129/* If we can find a section in FILENAME with BFD index INDEX, adjust
1130 it to ADDRESS. */
c1bd25fd
DJ
1131
1132void
1133exec_set_section_address (const char *filename, int index, CORE_ADDR address)
1134{
0542c86d 1135 struct target_section *p;
07b82ea5 1136 struct target_section_table *table;
c1bd25fd 1137
07b82ea5
PA
1138 table = current_target_sections;
1139 for (p = table->sections; p < table->sections_end; p++)
c1bd25fd 1140 {
2b2848e2 1141 if (filename_cmp (filename, p->the_bfd_section->owner->filename) == 0
30510692 1142 && index == p->the_bfd_section->index)
c1bd25fd 1143 {
30510692 1144 p->endaddr += address - p->addr;
c1bd25fd 1145 p->addr = address;
c1bd25fd
DJ
1146 }
1147 }
1148}
1149
57810aa7 1150bool
f6ac5f3d 1151exec_target::has_memory ()
c35b1492
PA
1152{
1153 /* We can provide memory if we have any file/target sections to read
1154 from. */
1155 return (current_target_sections->sections
1156 != current_target_sections->sections_end);
1157}
1158
f6ac5f3d
PA
1159char *
1160exec_target::make_corefile_notes (bfd *obfd, int *note_size)
83814951
TT
1161{
1162 error (_("Can't create a corefile"));
1163}
be4d1333 1164
f6ac5f3d
PA
1165int
1166exec_target::find_memory_regions (find_memory_region_ftype func, void *data)
c906108c 1167{
f6ac5f3d 1168 return objfile_find_memory_regions (this, func, data);
c906108c
SS
1169}
1170
6c265988 1171void _initialize_exec ();
c906108c 1172void
6c265988 1173_initialize_exec ()
c906108c
SS
1174{
1175 struct cmd_list_element *c;
1176
c906108c
SS
1177 if (!dbx_commands)
1178 {
1a966eab
AC
1179 c = add_cmd ("file", class_files, file_command, _("\
1180Use FILE as program to be debugged.\n\
c906108c
SS
1181It is read for its symbols, for getting the contents of pure memory,\n\
1182and it is the program executed when you use the `run' command.\n\
1183If FILE cannot be found as specified, your execution directory path\n\
1184($PATH) is searched for a command of that name.\n\
1a966eab 1185No arg means to have no executable file and no symbols."), &cmdlist);
5ba2abeb 1186 set_cmd_completer (c, filename_completer);
c906108c
SS
1187 }
1188
1a966eab
AC
1189 c = add_cmd ("exec-file", class_files, exec_file_command, _("\
1190Use FILE as program for getting contents of pure memory.\n\
c906108c
SS
1191If FILE cannot be found as specified, your execution directory path\n\
1192is searched for a command of that name.\n\
1a966eab 1193No arg means have no executable file."), &cmdlist);
5ba2abeb 1194 set_cmd_completer (c, filename_completer);
c906108c 1195
1bedd215
AC
1196 add_com ("section", class_files, set_section_command, _("\
1197Change the base address of section SECTION of the exec file to ADDR.\n\
c906108c
SS
1198This can be used if the exec file does not contain section addresses,\n\
1199(such as in the a.out format), or when the addresses specified in the\n\
1200file itself are wrong. Each section must be changed separately. The\n\
1bedd215 1201``info files'' command lists all the sections and their addresses."));
c906108c 1202
5bf193a2
AC
1203 add_setshow_boolean_cmd ("write", class_support, &write_files, _("\
1204Set writing into executable and core files."), _("\
1205Show writing into executable and core files."), NULL,
1206 NULL,
920d2a44 1207 show_write_files,
5bf193a2 1208 &setlist, &showlist);
c5aa993b 1209
a2fedca9
PW
1210 add_setshow_enum_cmd ("exec-file-mismatch", class_support,
1211 exec_file_mismatch_names,
1212 &exec_file_mismatch,
1213 _("\
1214Set exec-file-mismatch handling (ask|warn|off)."),
1215 _("\
1216Show exec-file-mismatch handling (ask|warn|off)."),
1217 _("\
1218Specifies how to handle a mismatch between the current exec-file name\n\
1219loaded by GDB and the exec-file name automatically determined when attaching\n\
1220to a process:\n\n\
1221 ask - warn the user and ask whether to load the determined exec-file.\n\
1222 warn - warn the user, but do not change the exec-file.\n\
1223 off - do not check for mismatch."),
1224 set_exec_file_mismatch_command,
1225 show_exec_file_mismatch_command,
1226 &setlist, &showlist);
1227
d9f719f1 1228 add_target (exec_target_info, exec_target_open, filename_completer);
c906108c 1229}
This page took 1.478784 seconds and 4 git commands to generate.