]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/exec.c
* elf32-rx.c (rx_table_map): Use BFD_VMA_FMT for portability.
[thirdparty/binutils-gdb.git] / gdb / exec.c
CommitLineData
c906108c 1/* Work with executable files, for GDB.
4646aa9d 2
ecd75fc8 3 Copyright (C) 1988-2014 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "frame.h"
22#include "inferior.h"
23#include "target.h"
24#include "gdbcmd.h"
25#include "language.h"
0ba1096a 26#include "filenames.h"
c906108c
SS
27#include "symfile.h"
28#include "objfiles.h"
c5f0f3d0 29#include "completer.h"
fd0407d6 30#include "value.h"
4646aa9d 31#include "exec.h"
ea53e89f 32#include "observer.h"
dacec2a8 33#include "arch-utils.h"
6c95b8df
PA
34#include "gdbthread.h"
35#include "progspace.h"
cbb099e8 36#include "gdb_bfd.h"
b427c1bc 37#include "gcore.h"
c906108c 38
c906108c 39#include <fcntl.h>
dbda9972 40#include "readline/readline.h"
0e9f083f 41#include <string.h>
c906108c
SS
42
43#include "gdbcore.h"
44
45#include <ctype.h>
53ce3c39 46#include <sys/stat.h>
c906108c 47
9a4105ab 48void (*deprecated_file_changed_hook) (char *);
c906108c
SS
49
50/* Prototypes for local functions */
51
a14ed312 52static void file_command (char *, int);
c906108c 53
a14ed312 54static void set_section_command (char *, int);
c906108c 55
a14ed312 56static void exec_files_info (struct target_ops *);
c906108c 57
a14ed312 58static void init_exec_ops (void);
c906108c 59
a14ed312 60void _initialize_exec (void);
c906108c 61
c906108c
SS
62/* The target vector for executable files. */
63
64struct target_ops exec_ops;
65
6c95b8df
PA
66/* True if the exec target is pushed on the stack. */
67static int using_exec_ops;
07b82ea5 68
c906108c
SS
69/* Whether to open exec and core files read-only or read-write. */
70
71int write_files = 0;
920d2a44
AC
72static void
73show_write_files (struct ui_file *file, int from_tty,
74 struct cmd_list_element *c, const char *value)
75{
76 fprintf_filtered (file, _("Writing into executable and core files is %s.\n"),
77 value);
78}
79
c906108c 80
4c42eaff 81static void
1adeb98a
FN
82exec_open (char *args, int from_tty)
83{
84 target_preopen (from_tty);
85 exec_file_attach (args, from_tty);
86}
87
07b82ea5
PA
88/* Close and clear exec_bfd. If we end up with no target sections to
89 read memory from, this unpushes the exec_ops target. */
90
6c95b8df
PA
91void
92exec_close (void)
07b82ea5
PA
93{
94 if (exec_bfd)
95 {
96 bfd *abfd = exec_bfd;
07b82ea5 97
cbb099e8 98 gdb_bfd_unref (abfd);
07b82ea5
PA
99
100 /* Removing target sections may close the exec_ops target.
101 Clear exec_bfd before doing so to prevent recursion. */
102 exec_bfd = NULL;
103 exec_bfd_mtime = 0;
104
046ac79f 105 remove_target_sections (&exec_bfd);
1f0c4988
JK
106
107 xfree (exec_filename);
108 exec_filename = NULL;
07b82ea5
PA
109 }
110}
111
6c95b8df
PA
112/* This is the target_close implementation. Clears all target
113 sections and closes all executable bfds from all program spaces. */
114
c906108c 115static void
de90e03d 116exec_close_1 (struct target_ops *self)
c906108c 117{
6c95b8df
PA
118 using_exec_ops = 0;
119
6c95b8df
PA
120 {
121 struct program_space *ss;
122 struct cleanup *old_chain;
c906108c 123
6c95b8df
PA
124 old_chain = save_current_program_space ();
125 ALL_PSPACES (ss)
126 {
127 set_current_program_space (ss);
128
129 /* Delete all target sections. */
130 resize_section_table
131 (current_target_sections,
132 -resize_section_table (current_target_sections, 0));
133
134 exec_close ();
135 }
136
137 do_cleanups (old_chain);
138 }
c906108c
SS
139}
140
1adeb98a
FN
141void
142exec_file_clear (int from_tty)
143{
144 /* Remove exec file. */
6c95b8df 145 exec_close ();
1adeb98a
FN
146
147 if (from_tty)
a3f17187 148 printf_unfiltered (_("No executable file now.\n"));
1adeb98a
FN
149}
150
907083d1 151/* Set FILENAME as the new exec file.
c906108c 152
c5aa993b
JM
153 This function is intended to be behave essentially the same
154 as exec_file_command, except that the latter will detect when
155 a target is being debugged, and will ask the user whether it
156 should be shut down first. (If the answer is "no", then the
157 new file is ignored.)
c906108c 158
c5aa993b
JM
159 This file is used by exec_file_command, to do the work of opening
160 and processing the exec file after any prompting has happened.
c906108c 161
c5aa993b
JM
162 And, it is used by child_attach, when the attach command was
163 given a pid but not a exec pathname, and the attach command could
164 figure out the pathname from the pid. (In this case, we shouldn't
165 ask the user whether the current target should be shut down --
907083d1 166 we're supplying the exec pathname late for good reason.) */
c906108c
SS
167
168void
1adeb98a 169exec_file_attach (char *filename, int from_tty)
c906108c 170{
9b333ba3
TT
171 struct cleanup *cleanups;
172
173 /* First, acquire a reference to the current exec_bfd. We release
174 this at the end of the function; but acquiring it now lets the
175 BFD cache return it if this call refers to the same file. */
176 gdb_bfd_ref (exec_bfd);
177 cleanups = make_cleanup_bfd_unref (exec_bfd);
178
c906108c 179 /* Remove any previous exec file. */
6c95b8df 180 exec_close ();
c906108c
SS
181
182 /* Now open and digest the file the user requested, if any. */
183
1adeb98a
FN
184 if (!filename)
185 {
186 if (from_tty)
a3f17187 187 printf_unfiltered (_("No executable file now.\n"));
7a107747
DJ
188
189 set_gdbarch_from_file (NULL);
1adeb98a
FN
190 }
191 else
c906108c 192 {
1f0c4988 193 char *scratch_pathname, *canonical_pathname;
c906108c 194 int scratch_chan;
07b82ea5 195 struct target_section *sections = NULL, *sections_end = NULL;
d18b8b7a 196 char **matching;
c5aa993b 197
492c0ab7 198 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST, filename,
fbdebf46 199 write_files ? O_RDWR | O_BINARY : O_RDONLY | O_BINARY,
c906108c 200 &scratch_pathname);
cfc3008e 201#if defined(__GO32__) || defined(_WIN32) || defined(__CYGWIN__)
c906108c 202 if (scratch_chan < 0)
c5aa993b
JM
203 {
204 char *exename = alloca (strlen (filename) + 5);
d7f9d729 205
c5aa993b 206 strcat (strcpy (exename, filename), ".exe");
492c0ab7 207 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST, exename,
fbdebf46 208 write_files ? O_RDWR | O_BINARY : O_RDONLY | O_BINARY,
014d698b 209 &scratch_pathname);
c5aa993b 210 }
c906108c 211#endif
17d6efc4
JB
212 if (scratch_chan < 0)
213 perror_with_name (filename);
a4453b7e 214
9b333ba3 215 make_cleanup (xfree, scratch_pathname);
a4453b7e 216
1f0c4988
JK
217 /* gdb_bfd_open (and its variants) prefers canonicalized pathname for
218 better BFD caching. */
219 canonical_pathname = gdb_realpath (scratch_pathname);
220 make_cleanup (xfree, canonical_pathname);
221
1c00ec6b 222 if (write_files)
1f0c4988 223 exec_bfd = gdb_bfd_fopen (canonical_pathname, gnutarget,
1c00ec6b
TT
224 FOPEN_RUB, scratch_chan);
225 else
1f0c4988 226 exec_bfd = gdb_bfd_open (canonical_pathname, gnutarget, scratch_chan);
c906108c
SS
227
228 if (!exec_bfd)
9fe4a216 229 {
9fe4a216
TT
230 error (_("\"%s\": could not open as an executable file: %s"),
231 scratch_pathname, bfd_errmsg (bfd_get_error ()));
232 }
c906108c 233
1f0c4988 234 gdb_assert (exec_filename == NULL);
4856b6bc 235 exec_filename = gdb_realpath_keepfile (scratch_pathname);
1f0c4988 236
d18b8b7a 237 if (!bfd_check_format_matches (exec_bfd, bfd_object, &matching))
c906108c
SS
238 {
239 /* Make sure to close exec_bfd, or else "run" might try to use
240 it. */
6c95b8df 241 exec_close ();
8a3fe4f8 242 error (_("\"%s\": not in executable format: %s"),
d18b8b7a
HZ
243 scratch_pathname,
244 gdb_bfd_errmsg (bfd_get_error (), matching));
c906108c
SS
245 }
246
07b82ea5 247 if (build_section_table (exec_bfd, &sections, &sections_end))
c906108c
SS
248 {
249 /* Make sure to close exec_bfd, or else "run" might try to use
250 it. */
6c95b8df 251 exec_close ();
8a3fe4f8 252 error (_("\"%s\": can't find the file sections: %s"),
c906108c
SS
253 scratch_pathname, bfd_errmsg (bfd_get_error ()));
254 }
255
c04ea773
DJ
256 exec_bfd_mtime = bfd_get_mtime (exec_bfd);
257
c906108c
SS
258 validate_files ();
259
260 set_gdbarch_from_file (exec_bfd);
261
07b82ea5 262 /* Add the executable's sections to the current address spaces'
6c95b8df
PA
263 list of sections. This possibly pushes the exec_ops
264 target. */
ed9eebaf 265 add_target_sections (&exec_bfd, sections, sections_end);
07b82ea5 266 xfree (sections);
c906108c
SS
267
268 /* Tell display code (if any) about the changed file name. */
9a4105ab
AC
269 if (deprecated_exec_file_display_hook)
270 (*deprecated_exec_file_display_hook) (filename);
c906108c 271 }
9b333ba3
TT
272
273 do_cleanups (cleanups);
274
ce7d4522 275 bfd_cache_close_all ();
781b42b0 276 observer_notify_executable_changed ();
c906108c
SS
277}
278
279/* Process the first arg in ARGS as the new exec file.
280
c5aa993b
JM
281 Note that we have to explicitly ignore additional args, since we can
282 be called from file_command(), which also calls symbol_file_command()
1adeb98a
FN
283 which can take multiple args.
284
0963b4bd 285 If ARGS is NULL, we just want to close the exec file. */
c906108c 286
1adeb98a 287static void
fba45db2 288exec_file_command (char *args, int from_tty)
c906108c 289{
1adeb98a
FN
290 char **argv;
291 char *filename;
4c42eaff
DJ
292
293 if (from_tty && target_has_execution
294 && !query (_("A program is being debugged already.\n"
295 "Are you sure you want to change the file? ")))
296 error (_("File not changed."));
1adeb98a
FN
297
298 if (args)
299 {
f7545552
TT
300 struct cleanup *cleanups;
301
1adeb98a
FN
302 /* Scan through the args and pick up the first non option arg
303 as the filename. */
304
d1a41061 305 argv = gdb_buildargv (args);
f7545552 306 cleanups = make_cleanup_freeargv (argv);
1adeb98a
FN
307
308 for (; (*argv != NULL) && (**argv == '-'); argv++)
309 {;
310 }
311 if (*argv == NULL)
8a3fe4f8 312 error (_("No executable file name was specified"));
1adeb98a
FN
313
314 filename = tilde_expand (*argv);
315 make_cleanup (xfree, filename);
316 exec_file_attach (filename, from_tty);
f7545552
TT
317
318 do_cleanups (cleanups);
1adeb98a
FN
319 }
320 else
321 exec_file_attach (NULL, from_tty);
c906108c
SS
322}
323
0963b4bd 324/* Set both the exec file and the symbol file, in one command.
c906108c
SS
325 What a novelty. Why did GDB go through four major releases before this
326 command was added? */
327
328static void
fba45db2 329file_command (char *arg, int from_tty)
c906108c
SS
330{
331 /* FIXME, if we lose on reading the symbol file, we should revert
332 the exec file, but that's rough. */
333 exec_file_command (arg, from_tty);
334 symbol_file_command (arg, from_tty);
9a4105ab
AC
335 if (deprecated_file_changed_hook)
336 deprecated_file_changed_hook (arg);
c906108c 337}
c906108c 338\f
c5aa993b 339
0963b4bd 340/* Locate all mappable sections of a BFD file.
c906108c
SS
341 table_pp_char is a char * to get it through bfd_map_over_sections;
342 we cast it back to its proper type. */
343
344static void
7be0c536
AC
345add_to_section_table (bfd *abfd, struct bfd_section *asect,
346 void *table_pp_char)
c906108c 347{
0542c86d 348 struct target_section **table_pp = (struct target_section **) table_pp_char;
c906108c
SS
349 flagword aflag;
350
2b2848e2
DE
351 gdb_assert (abfd == asect->owner);
352
0f5d55d8
JB
353 /* Check the section flags, but do not discard zero-length sections, since
354 some symbols may still be attached to this section. For instance, we
355 encountered on sparc-solaris 2.10 a shared library with an empty .bss
356 section to which a symbol named "_end" was attached. The address
357 of this symbol still needs to be relocated. */
c906108c
SS
358 aflag = bfd_get_section_flags (abfd, asect);
359 if (!(aflag & SEC_ALLOC))
360 return;
0f5d55d8 361
046ac79f 362 (*table_pp)->owner = NULL;
c906108c
SS
363 (*table_pp)->the_bfd_section = asect;
364 (*table_pp)->addr = bfd_section_vma (abfd, asect);
365 (*table_pp)->endaddr = (*table_pp)->addr + bfd_section_size (abfd, asect);
366 (*table_pp)++;
367}
368
07b82ea5
PA
369int
370resize_section_table (struct target_section_table *table, int num_added)
371{
07b82ea5
PA
372 int old_count;
373 int new_count;
374
07b82ea5
PA
375 old_count = table->sections_end - table->sections;
376
377 new_count = num_added + old_count;
378
379 if (new_count)
380 {
381 table->sections = xrealloc (table->sections,
382 sizeof (struct target_section) * new_count);
383 table->sections_end = table->sections + new_count;
384 }
385 else
386 {
387 xfree (table->sections);
388 table->sections = table->sections_end = NULL;
389 }
390
391 return old_count;
392}
393
c906108c
SS
394/* Builds a section table, given args BFD, SECTABLE_PTR, SECEND_PTR.
395 Returns 0 if OK, 1 on error. */
396
397int
0542c86d
PA
398build_section_table (struct bfd *some_bfd, struct target_section **start,
399 struct target_section **end)
c906108c
SS
400{
401 unsigned count;
402
403 count = bfd_count_sections (some_bfd);
404 if (*start)
b8c9b27d 405 xfree (* start);
0542c86d 406 *start = (struct target_section *) xmalloc (count * sizeof (**start));
c906108c 407 *end = *start;
c5aa993b 408 bfd_map_over_sections (some_bfd, add_to_section_table, (char *) end);
c906108c 409 if (*end > *start + count)
3e43a32a
MS
410 internal_error (__FILE__, __LINE__,
411 _("failed internal consistency check"));
c906108c
SS
412 /* We could realloc the table, but it probably loses for most files. */
413 return 0;
414}
07b82ea5
PA
415
416/* Add the sections array defined by [SECTIONS..SECTIONS_END[ to the
417 current set of target sections. */
418
419void
046ac79f 420add_target_sections (void *owner,
ed9eebaf 421 struct target_section *sections,
07b82ea5
PA
422 struct target_section *sections_end)
423{
424 int count;
425 struct target_section_table *table = current_target_sections;
426
427 count = sections_end - sections;
428
429 if (count > 0)
430 {
431 int space = resize_section_table (table, count);
ed9eebaf 432 int i;
d7f9d729 433
ed9eebaf
TT
434 for (i = 0; i < count; ++i)
435 {
436 table->sections[space + i] = sections[i];
046ac79f 437 table->sections[space + i].owner = owner;
ed9eebaf 438 }
07b82ea5
PA
439
440 /* If these are the first file sections we can provide memory
441 from, push the file_stratum target. */
6c95b8df
PA
442 if (!using_exec_ops)
443 {
444 using_exec_ops = 1;
445 push_target (&exec_ops);
446 }
07b82ea5
PA
447 }
448}
449
76ad5e1e
NB
450/* Add the sections of OBJFILE to the current set of target sections. */
451
452void
453add_target_sections_of_objfile (struct objfile *objfile)
454{
455 struct target_section_table *table = current_target_sections;
456 struct obj_section *osect;
457 int space;
458 unsigned count = 0;
459 struct target_section *ts;
460
461 if (objfile == NULL)
462 return;
463
464 /* Compute the number of sections to add. */
465 ALL_OBJFILE_OSECTIONS (objfile, osect)
466 {
467 if (bfd_get_section_size (osect->the_bfd_section) == 0)
468 continue;
469 count++;
470 }
471
472 if (count == 0)
473 return;
474
475 space = resize_section_table (table, count);
476
477 ts = table->sections + space;
478
479 ALL_OBJFILE_OSECTIONS (objfile, osect)
480 {
481 if (bfd_get_section_size (osect->the_bfd_section) == 0)
482 continue;
483
484 gdb_assert (ts < table->sections + space + count);
485
486 ts->addr = obj_section_addr (osect);
487 ts->endaddr = obj_section_endaddr (osect);
488 ts->the_bfd_section = osect->the_bfd_section;
489 ts->owner = (void *) objfile;
490
491 ts++;
492 }
493}
494
046ac79f
JK
495/* Remove all target sections owned by OWNER.
496 OWNER must be the same value passed to add_target_sections. */
07b82ea5
PA
497
498void
046ac79f 499remove_target_sections (void *owner)
07b82ea5
PA
500{
501 struct target_section *src, *dest;
07b82ea5
PA
502 struct target_section_table *table = current_target_sections;
503
046ac79f
JK
504 gdb_assert (owner != NULL);
505
07b82ea5
PA
506 dest = table->sections;
507 for (src = table->sections; src < table->sections_end; src++)
046ac79f 508 if (src->owner != owner)
07b82ea5
PA
509 {
510 /* Keep this section. */
511 if (dest < src)
512 *dest = *src;
513 dest++;
514 }
515
516 /* If we've dropped any sections, resize the section table. */
517 if (dest < src)
518 {
519 int old_count;
520
521 old_count = resize_section_table (table, dest - src);
522
523 /* If we don't have any more sections to read memory from,
524 remove the file_stratum target from the stack. */
525 if (old_count + (dest - src) == 0)
6c95b8df
PA
526 {
527 struct program_space *pspace;
528
529 ALL_PSPACES (pspace)
530 if (pspace->target_sections.sections
531 != pspace->target_sections.sections_end)
532 return;
533
534 unpush_target (&exec_ops);
535 }
07b82ea5
PA
536 }
537}
538
c906108c 539\f
348f8c02 540
1ca49d37
YQ
541enum target_xfer_status
542exec_read_partial_read_only (gdb_byte *readbuf, ULONGEST offset,
543 ULONGEST len, ULONGEST *xfered_len)
544{
545 /* It's unduly pedantic to refuse to look at the executable for
546 read-only pieces; so do the equivalent of readonly regions aka
547 QTro packet. */
548 if (exec_bfd != NULL)
549 {
550 asection *s;
551 bfd_size_type size;
552 bfd_vma vma;
553
554 for (s = exec_bfd->sections; s; s = s->next)
555 {
556 if ((s->flags & SEC_LOAD) == 0
557 || (s->flags & SEC_READONLY) == 0)
558 continue;
559
560 vma = s->vma;
561 size = bfd_get_section_size (s);
562 if (vma <= offset && offset < (vma + size))
563 {
564 ULONGEST amt;
565
566 amt = (vma + size) - offset;
567 if (amt > len)
568 amt = len;
569
570 amt = bfd_get_section_contents (exec_bfd, s,
571 readbuf, offset - vma, amt);
572
573 if (amt == 0)
574 return TARGET_XFER_EOF;
575 else
576 {
577 *xfered_len = amt;
578 return TARGET_XFER_OK;
579 }
580 }
581 }
582 }
583
584 /* Indicate failure to find the requested memory block. */
585 return TARGET_XFER_E_IO;
586}
587
5a2eb0ef
YQ
588/* Appends all read-only memory ranges found in the target section
589 table defined by SECTIONS and SECTIONS_END, starting at (and
590 intersected with) MEMADDR for LEN bytes. Returns the augmented
591 VEC. */
592
593static VEC(mem_range_s) *
e6ca34fc 594section_table_available_memory (VEC(mem_range_s) *memory,
424447ee 595 CORE_ADDR memaddr, ULONGEST len,
e6ca34fc
PA
596 struct target_section *sections,
597 struct target_section *sections_end)
598{
599 struct target_section *p;
e6ca34fc
PA
600
601 for (p = sections; p < sections_end; p++)
602 {
2b2848e2
DE
603 if ((bfd_get_section_flags (p->the_bfd_section->owner,
604 p->the_bfd_section)
e6ca34fc
PA
605 & SEC_READONLY) == 0)
606 continue;
607
608 /* Copy the meta-data, adjusted. */
609 if (mem_ranges_overlap (p->addr, p->endaddr - p->addr, memaddr, len))
610 {
611 ULONGEST lo1, hi1, lo2, hi2;
612 struct mem_range *r;
613
614 lo1 = memaddr;
615 hi1 = memaddr + len;
616
617 lo2 = p->addr;
618 hi2 = p->endaddr;
619
620 r = VEC_safe_push (mem_range_s, memory, NULL);
621
622 r->start = max (lo1, lo2);
623 r->length = min (hi1, hi2) - r->start;
624 }
625 }
626
627 return memory;
628}
629
1ee79381
YQ
630enum target_xfer_status
631section_table_read_available_memory (gdb_byte *readbuf, ULONGEST offset,
632 ULONGEST len, ULONGEST *xfered_len)
633{
634 VEC(mem_range_s) *available_memory = NULL;
635 struct target_section_table *table;
636 struct cleanup *old_chain;
637 mem_range_s *r;
638 int i;
639
640 table = target_get_section_table (&exec_ops);
641 available_memory = section_table_available_memory (available_memory,
642 offset, len,
643 table->sections,
644 table->sections_end);
645
646 old_chain = make_cleanup (VEC_cleanup(mem_range_s),
647 &available_memory);
648
649 normalize_mem_ranges (available_memory);
650
651 for (i = 0;
652 VEC_iterate (mem_range_s, available_memory, i, r);
653 i++)
654 {
655 if (mem_ranges_overlap (r->start, r->length, offset, len))
656 {
657 CORE_ADDR end;
658 enum target_xfer_status status;
659
660 /* Get the intersection window. */
661 end = min (offset + len, r->start + r->length);
662
663 gdb_assert (end - offset <= len);
664
665 if (offset >= r->start)
666 status = exec_read_partial_read_only (readbuf, offset,
667 end - offset,
668 xfered_len);
669 else
670 {
671 *xfered_len = r->start - offset;
bc113b4e 672 status = TARGET_XFER_UNAVAILABLE;
1ee79381
YQ
673 }
674 do_cleanups (old_chain);
675 return status;
676 }
677 }
678 do_cleanups (old_chain);
679
680 *xfered_len = len;
bc113b4e 681 return TARGET_XFER_UNAVAILABLE;
1ee79381
YQ
682}
683
9b409511 684enum target_xfer_status
07b82ea5 685section_table_xfer_memory_partial (gdb_byte *readbuf, const gdb_byte *writebuf,
b55e14c7 686 ULONGEST offset, ULONGEST len,
9b409511 687 ULONGEST *xfered_len,
07b82ea5
PA
688 struct target_section *sections,
689 struct target_section *sections_end,
690 const char *section_name)
c906108c 691{
020cc13c 692 int res;
0542c86d 693 struct target_section *p;
07b82ea5
PA
694 ULONGEST memaddr = offset;
695 ULONGEST memend = memaddr + len;
c906108c 696
b55e14c7 697 if (len == 0)
3e43a32a
MS
698 internal_error (__FILE__, __LINE__,
699 _("failed internal consistency check"));
c906108c 700
348f8c02 701 for (p = sections; p < sections_end; p++)
c906108c 702 {
2b2848e2
DE
703 struct bfd_section *asect = p->the_bfd_section;
704 bfd *abfd = asect->owner;
705
706 if (section_name && strcmp (section_name, asect->name) != 0)
0963b4bd 707 continue; /* not the section we need. */
c906108c 708 if (memaddr >= p->addr)
3db26b01
JB
709 {
710 if (memend <= p->endaddr)
711 {
712 /* Entire transfer is within this section. */
07b82ea5 713 if (writebuf)
2b2848e2 714 res = bfd_set_section_contents (abfd, asect,
07b82ea5 715 writebuf, memaddr - p->addr,
85302095
AC
716 len);
717 else
2b2848e2 718 res = bfd_get_section_contents (abfd, asect,
07b82ea5 719 readbuf, memaddr - p->addr,
85302095 720 len);
9b409511
YQ
721
722 if (res != 0)
723 {
724 *xfered_len = len;
725 return TARGET_XFER_OK;
726 }
727 else
728 return TARGET_XFER_EOF;
3db26b01
JB
729 }
730 else if (memaddr >= p->endaddr)
731 {
732 /* This section ends before the transfer starts. */
733 continue;
734 }
735 else
736 {
737 /* This section overlaps the transfer. Just do half. */
738 len = p->endaddr - memaddr;
07b82ea5 739 if (writebuf)
2b2848e2 740 res = bfd_set_section_contents (abfd, asect,
07b82ea5 741 writebuf, memaddr - p->addr,
85302095
AC
742 len);
743 else
2b2848e2 744 res = bfd_get_section_contents (abfd, asect,
07b82ea5 745 readbuf, memaddr - p->addr,
85302095 746 len);
9b409511
YQ
747 if (res != 0)
748 {
749 *xfered_len = len;
750 return TARGET_XFER_OK;
751 }
752 else
753 return TARGET_XFER_EOF;
3db26b01
JB
754 }
755 }
c906108c
SS
756 }
757
9b409511 758 return TARGET_XFER_EOF; /* We can't help. */
c906108c 759}
348f8c02 760
70221824 761static struct target_section_table *
07b82ea5 762exec_get_section_table (struct target_ops *ops)
348f8c02 763{
07b82ea5 764 return current_target_sections;
348f8c02
PA
765}
766
9b409511 767static enum target_xfer_status
07b82ea5
PA
768exec_xfer_partial (struct target_ops *ops, enum target_object object,
769 const char *annex, gdb_byte *readbuf,
770 const gdb_byte *writebuf,
9b409511 771 ULONGEST offset, ULONGEST len, ULONGEST *xfered_len)
348f8c02 772{
07b82ea5
PA
773 struct target_section_table *table = target_get_section_table (ops);
774
775 if (object == TARGET_OBJECT_MEMORY)
776 return section_table_xfer_memory_partial (readbuf, writebuf,
9b409511 777 offset, len, xfered_len,
07b82ea5
PA
778 table->sections,
779 table->sections_end,
780 NULL);
781 else
2ed4b548 782 return TARGET_XFER_E_IO;
348f8c02 783}
c906108c 784\f
c5aa993b 785
c906108c 786void
07b82ea5 787print_section_info (struct target_section_table *t, bfd *abfd)
c906108c 788{
5af949e3 789 struct gdbarch *gdbarch = gdbarch_from_bfd (abfd);
0542c86d 790 struct target_section *p;
17a912b6 791 /* FIXME: 16 is not wide enough when gdbarch_addr_bit > 64. */
5af949e3 792 int wid = gdbarch_addr_bit (gdbarch) <= 32 ? 8 : 16;
c906108c 793
c5aa993b 794 printf_filtered ("\t`%s', ", bfd_get_filename (abfd));
c906108c 795 wrap_here (" ");
a3f17187 796 printf_filtered (_("file type %s.\n"), bfd_get_target (abfd));
c906108c 797 if (abfd == exec_bfd)
51bee8e9 798 {
3e43a32a
MS
799 /* gcc-3.4 does not like the initialization in
800 <p == t->sections_end>. */
d904de5b 801 bfd_vma displacement = 0;
2f1bdd26 802 bfd_vma entry_point;
51bee8e9
JK
803
804 for (p = t->sections; p < t->sections_end; p++)
805 {
2b2848e2
DE
806 struct bfd_section *psect = p->the_bfd_section;
807 bfd *pbfd = psect->owner;
51bee8e9 808
2b2848e2 809 if ((bfd_get_section_flags (pbfd, psect) & (SEC_ALLOC | SEC_LOAD))
51bee8e9
JK
810 != (SEC_ALLOC | SEC_LOAD))
811 continue;
812
2b2848e2
DE
813 if (bfd_get_section_vma (pbfd, psect) <= abfd->start_address
814 && abfd->start_address < (bfd_get_section_vma (pbfd, psect)
815 + bfd_get_section_size (psect)))
51bee8e9 816 {
2b2848e2 817 displacement = p->addr - bfd_get_section_vma (pbfd, psect);
51bee8e9
JK
818 break;
819 }
820 }
821 if (p == t->sections_end)
b37520b6 822 warning (_("Cannot find section for the entry point of %s."),
d904de5b 823 bfd_get_filename (abfd));
51bee8e9 824
2f1bdd26
MGD
825 entry_point = gdbarch_addr_bits_remove (gdbarch,
826 bfd_get_start_address (abfd)
827 + displacement);
51bee8e9 828 printf_filtered (_("\tEntry point: %s\n"),
2f1bdd26 829 paddress (gdbarch, entry_point));
51bee8e9 830 }
07b82ea5 831 for (p = t->sections; p < t->sections_end; p++)
c906108c 832 {
2b2848e2
DE
833 struct bfd_section *psect = p->the_bfd_section;
834 bfd *pbfd = psect->owner;
835
bb599908
PH
836 printf_filtered ("\t%s", hex_string_custom (p->addr, wid));
837 printf_filtered (" - %s", hex_string_custom (p->endaddr, wid));
bcf16802
KB
838
839 /* FIXME: A format of "08l" is not wide enough for file offsets
840 larger than 4GB. OTOH, making it "016l" isn't desirable either
841 since most output will then be much wider than necessary. It
842 may make sense to test the size of the file and choose the
843 format string accordingly. */
a3f17187 844 /* FIXME: i18n: Need to rewrite this sentence. */
c906108c
SS
845 if (info_verbose)
846 printf_filtered (" @ %s",
2b2848e2
DE
847 hex_string_custom (psect->filepos, 8));
848 printf_filtered (" is %s", bfd_section_name (pbfd, psect));
849 if (pbfd != abfd)
850 printf_filtered (" in %s", bfd_get_filename (pbfd));
c906108c
SS
851 printf_filtered ("\n");
852 }
853}
854
855static void
fba45db2 856exec_files_info (struct target_ops *t)
c906108c 857{
57008375
JK
858 if (exec_bfd)
859 print_section_info (current_target_sections, exec_bfd);
860 else
861 puts_filtered (_("\t<no file loaded>\n"));
c906108c
SS
862}
863
864static void
fba45db2 865set_section_command (char *args, int from_tty)
c906108c 866{
0542c86d 867 struct target_section *p;
c906108c
SS
868 char *secname;
869 unsigned seclen;
870 unsigned long secaddr;
871 char secprint[100];
872 long offset;
07b82ea5 873 struct target_section_table *table;
c906108c
SS
874
875 if (args == 0)
8a3fe4f8 876 error (_("Must specify section name and its virtual address"));
c906108c 877
0963b4bd 878 /* Parse out section name. */
c5aa993b 879 for (secname = args; !isspace (*args); args++);
c906108c
SS
880 seclen = args - secname;
881
0963b4bd 882 /* Parse out new virtual address. */
c906108c
SS
883 secaddr = parse_and_eval_address (args);
884
07b82ea5
PA
885 table = current_target_sections;
886 for (p = table->sections; p < table->sections_end; p++)
c5aa993b 887 {
57008375 888 if (!strncmp (secname, bfd_section_name (p->bfd,
3e43a32a 889 p->the_bfd_section), seclen)
57008375 890 && bfd_section_name (p->bfd, p->the_bfd_section)[seclen] == '\0')
c5aa993b
JM
891 {
892 offset = secaddr - p->addr;
893 p->addr += offset;
894 p->endaddr += offset;
895 if (from_tty)
896 exec_files_info (&exec_ops);
897 return;
898 }
c906108c 899 }
c906108c
SS
900 if (seclen >= sizeof (secprint))
901 seclen = sizeof (secprint) - 1;
902 strncpy (secprint, secname, seclen);
903 secprint[seclen] = '\0';
8a3fe4f8 904 error (_("Section %s not found"), secprint);
c906108c
SS
905}
906
30510692
DJ
907/* If we can find a section in FILENAME with BFD index INDEX, adjust
908 it to ADDRESS. */
c1bd25fd
DJ
909
910void
911exec_set_section_address (const char *filename, int index, CORE_ADDR address)
912{
0542c86d 913 struct target_section *p;
07b82ea5 914 struct target_section_table *table;
c1bd25fd 915
07b82ea5
PA
916 table = current_target_sections;
917 for (p = table->sections; p < table->sections_end; p++)
c1bd25fd 918 {
2b2848e2 919 if (filename_cmp (filename, p->the_bfd_section->owner->filename) == 0
30510692 920 && index == p->the_bfd_section->index)
c1bd25fd 921 {
30510692 922 p->endaddr += address - p->addr;
c1bd25fd 923 p->addr = address;
c1bd25fd
DJ
924 }
925 }
926}
927
c906108c
SS
928/* If mourn is being called in all the right places, this could be say
929 `gdb internal error' (since generic_mourn calls
930 breakpoint_init_inferior). */
931
932static int
3db08215
MM
933ignore (struct target_ops *ops, struct gdbarch *gdbarch,
934 struct bp_target_info *bp_tgt)
c906108c
SS
935{
936 return 0;
937}
938
c35b1492
PA
939static int
940exec_has_memory (struct target_ops *ops)
941{
942 /* We can provide memory if we have any file/target sections to read
943 from. */
944 return (current_target_sections->sections
945 != current_target_sections->sections_end);
946}
947
fc6691b2 948static char *exec_make_note_section (struct target_ops *self, bfd *, int *);
be4d1333 949
c906108c
SS
950/* Fill in the exec file target vector. Very few entries need to be
951 defined. */
952
be4d1333 953static void
fba45db2 954init_exec_ops (void)
c906108c
SS
955{
956 exec_ops.to_shortname = "exec";
957 exec_ops.to_longname = "Local exec file";
958 exec_ops.to_doc = "Use an executable file as a target.\n\
959Specify the filename of the executable file.";
1adeb98a 960 exec_ops.to_open = exec_open;
6c95b8df 961 exec_ops.to_close = exec_close_1;
07b82ea5
PA
962 exec_ops.to_xfer_partial = exec_xfer_partial;
963 exec_ops.to_get_section_table = exec_get_section_table;
c906108c
SS
964 exec_ops.to_files_info = exec_files_info;
965 exec_ops.to_insert_breakpoint = ignore;
966 exec_ops.to_remove_breakpoint = ignore;
c906108c 967 exec_ops.to_stratum = file_stratum;
c35b1492 968 exec_ops.to_has_memory = exec_has_memory;
be4d1333 969 exec_ops.to_make_corefile_notes = exec_make_note_section;
b427c1bc 970 exec_ops.to_find_memory_regions = objfile_find_memory_regions;
c5aa993b 971 exec_ops.to_magic = OPS_MAGIC;
c906108c
SS
972}
973
974void
fba45db2 975_initialize_exec (void)
c906108c
SS
976{
977 struct cmd_list_element *c;
978
979 init_exec_ops ();
980
981 if (!dbx_commands)
982 {
1a966eab
AC
983 c = add_cmd ("file", class_files, file_command, _("\
984Use FILE as program to be debugged.\n\
c906108c
SS
985It is read for its symbols, for getting the contents of pure memory,\n\
986and it is the program executed when you use the `run' command.\n\
987If FILE cannot be found as specified, your execution directory path\n\
988($PATH) is searched for a command of that name.\n\
1a966eab 989No arg means to have no executable file and no symbols."), &cmdlist);
5ba2abeb 990 set_cmd_completer (c, filename_completer);
c906108c
SS
991 }
992
1a966eab
AC
993 c = add_cmd ("exec-file", class_files, exec_file_command, _("\
994Use FILE as program for getting contents of pure memory.\n\
c906108c
SS
995If FILE cannot be found as specified, your execution directory path\n\
996is searched for a command of that name.\n\
1a966eab 997No arg means have no executable file."), &cmdlist);
5ba2abeb 998 set_cmd_completer (c, filename_completer);
c906108c 999
1bedd215
AC
1000 add_com ("section", class_files, set_section_command, _("\
1001Change the base address of section SECTION of the exec file to ADDR.\n\
c906108c
SS
1002This can be used if the exec file does not contain section addresses,\n\
1003(such as in the a.out format), or when the addresses specified in the\n\
1004file itself are wrong. Each section must be changed separately. The\n\
1bedd215 1005``info files'' command lists all the sections and their addresses."));
c906108c 1006
5bf193a2
AC
1007 add_setshow_boolean_cmd ("write", class_support, &write_files, _("\
1008Set writing into executable and core files."), _("\
1009Show writing into executable and core files."), NULL,
1010 NULL,
920d2a44 1011 show_write_files,
5bf193a2 1012 &setlist, &showlist);
c5aa993b 1013
9852c492 1014 add_target_with_completer (&exec_ops, filename_completer);
c906108c 1015}
be4d1333
MS
1016
1017static char *
fc6691b2 1018exec_make_note_section (struct target_ops *self, bfd *obfd, int *note_size)
be4d1333 1019{
8a3fe4f8 1020 error (_("Can't create a corefile"));
be4d1333 1021}