]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/exec.c
Skip eh-frame-hdr test for arc-elf targets.
[thirdparty/binutils-gdb.git] / gdb / exec.c
CommitLineData
c906108c 1/* Work with executable files, for GDB.
4646aa9d 2
618f726f 3 Copyright (C) 1988-2016 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "frame.h"
22#include "inferior.h"
23#include "target.h"
24#include "gdbcmd.h"
25#include "language.h"
0ba1096a 26#include "filenames.h"
c906108c
SS
27#include "symfile.h"
28#include "objfiles.h"
c5f0f3d0 29#include "completer.h"
fd0407d6 30#include "value.h"
4646aa9d 31#include "exec.h"
ea53e89f 32#include "observer.h"
dacec2a8 33#include "arch-utils.h"
6c95b8df
PA
34#include "gdbthread.h"
35#include "progspace.h"
cbb099e8 36#include "gdb_bfd.h"
b427c1bc 37#include "gcore.h"
c906108c 38
c906108c 39#include <fcntl.h>
dbda9972 40#include "readline/readline.h"
c906108c
SS
41#include "gdbcore.h"
42
43#include <ctype.h>
53ce3c39 44#include <sys/stat.h>
a9a5a3d1 45#include "solist.h"
c906108c 46
9a4105ab 47void (*deprecated_file_changed_hook) (char *);
c906108c
SS
48
49/* Prototypes for local functions */
50
a14ed312 51static void file_command (char *, int);
c906108c 52
a14ed312 53static void set_section_command (char *, int);
c906108c 54
a14ed312 55static void exec_files_info (struct target_ops *);
c906108c 56
a14ed312 57static void init_exec_ops (void);
c906108c 58
a14ed312 59void _initialize_exec (void);
c906108c 60
c906108c
SS
61/* The target vector for executable files. */
62
e8b2341c 63static struct target_ops exec_ops;
c906108c 64
c906108c
SS
65/* Whether to open exec and core files read-only or read-write. */
66
67int write_files = 0;
920d2a44
AC
68static void
69show_write_files (struct ui_file *file, int from_tty,
70 struct cmd_list_element *c, const char *value)
71{
72 fprintf_filtered (file, _("Writing into executable and core files is %s.\n"),
73 value);
74}
75
c906108c 76
4c42eaff 77static void
014f9477 78exec_open (const char *args, int from_tty)
1adeb98a
FN
79{
80 target_preopen (from_tty);
81 exec_file_attach (args, from_tty);
82}
83
07b82ea5
PA
84/* Close and clear exec_bfd. If we end up with no target sections to
85 read memory from, this unpushes the exec_ops target. */
86
6c95b8df
PA
87void
88exec_close (void)
07b82ea5
PA
89{
90 if (exec_bfd)
91 {
92 bfd *abfd = exec_bfd;
07b82ea5 93
cbb099e8 94 gdb_bfd_unref (abfd);
07b82ea5
PA
95
96 /* Removing target sections may close the exec_ops target.
97 Clear exec_bfd before doing so to prevent recursion. */
98 exec_bfd = NULL;
99 exec_bfd_mtime = 0;
100
046ac79f 101 remove_target_sections (&exec_bfd);
1f0c4988
JK
102
103 xfree (exec_filename);
104 exec_filename = NULL;
07b82ea5
PA
105 }
106}
107
6c95b8df
PA
108/* This is the target_close implementation. Clears all target
109 sections and closes all executable bfds from all program spaces. */
110
c906108c 111static void
de90e03d 112exec_close_1 (struct target_ops *self)
c906108c 113{
ab16fce8
TT
114 struct program_space *ss;
115 struct cleanup *old_chain;
6c95b8df 116
ab16fce8
TT
117 old_chain = save_current_program_space ();
118 ALL_PSPACES (ss)
6c95b8df 119 {
ab16fce8
TT
120 set_current_program_space (ss);
121 clear_section_table (current_target_sections);
122 exec_close ();
6c95b8df 123 }
ab16fce8
TT
124
125 do_cleanups (old_chain);
c906108c
SS
126}
127
1adeb98a
FN
128void
129exec_file_clear (int from_tty)
130{
131 /* Remove exec file. */
6c95b8df 132 exec_close ();
1adeb98a
FN
133
134 if (from_tty)
a3f17187 135 printf_unfiltered (_("No executable file now.\n"));
1adeb98a
FN
136}
137
a10de604
GB
138/* See gdbcore.h. */
139
140void
141exec_file_locate_attach (int pid, int from_tty)
142{
143 char *exec_file, *full_exec_path = NULL;
144
145 /* Do nothing if we already have an executable filename. */
146 exec_file = (char *) get_exec_file (0);
147 if (exec_file != NULL)
148 return;
149
150 /* Try to determine a filename from the process itself. */
151 exec_file = target_pid_to_exec_file (pid);
152 if (exec_file == NULL)
153 return;
154
a9a5a3d1
GB
155 /* If gdb_sysroot is not empty and the discovered filename
156 is absolute then prefix the filename with gdb_sysroot. */
a3be80c3 157 if (*gdb_sysroot != '\0' && IS_ABSOLUTE_PATH (exec_file))
998d2a3e 158 full_exec_path = exec_file_find (exec_file, NULL);
a10de604 159
a9a5a3d1
GB
160 if (full_exec_path == NULL)
161 {
162 /* It's possible we don't have a full path, but rather just a
163 filename. Some targets, such as HP-UX, don't provide the
164 full path, sigh.
165
166 Attempt to qualify the filename against the source path.
167 (If that fails, we'll just fall back on the original
168 filename. Not much more we can do...) */
169 if (!source_full_path_of (exec_file, &full_exec_path))
170 full_exec_path = xstrdup (exec_file);
171 }
a10de604
GB
172
173 exec_file_attach (full_exec_path, from_tty);
174 symbol_file_add_main (full_exec_path, from_tty);
175}
176
907083d1 177/* Set FILENAME as the new exec file.
c906108c 178
c5aa993b
JM
179 This function is intended to be behave essentially the same
180 as exec_file_command, except that the latter will detect when
181 a target is being debugged, and will ask the user whether it
182 should be shut down first. (If the answer is "no", then the
183 new file is ignored.)
c906108c 184
c5aa993b
JM
185 This file is used by exec_file_command, to do the work of opening
186 and processing the exec file after any prompting has happened.
c906108c 187
c5aa993b
JM
188 And, it is used by child_attach, when the attach command was
189 given a pid but not a exec pathname, and the attach command could
190 figure out the pathname from the pid. (In this case, we shouldn't
191 ask the user whether the current target should be shut down --
907083d1 192 we're supplying the exec pathname late for good reason.) */
c906108c
SS
193
194void
5f08566b 195exec_file_attach (const char *filename, int from_tty)
c906108c 196{
9b333ba3
TT
197 struct cleanup *cleanups;
198
199 /* First, acquire a reference to the current exec_bfd. We release
200 this at the end of the function; but acquiring it now lets the
201 BFD cache return it if this call refers to the same file. */
202 gdb_bfd_ref (exec_bfd);
203 cleanups = make_cleanup_bfd_unref (exec_bfd);
204
c906108c 205 /* Remove any previous exec file. */
6c95b8df 206 exec_close ();
c906108c
SS
207
208 /* Now open and digest the file the user requested, if any. */
209
1adeb98a
FN
210 if (!filename)
211 {
212 if (from_tty)
a3f17187 213 printf_unfiltered (_("No executable file now.\n"));
7a107747
DJ
214
215 set_gdbarch_from_file (NULL);
1adeb98a
FN
216 }
217 else
c906108c 218 {
64c0b5de 219 int load_via_target = 0;
1f0c4988 220 char *scratch_pathname, *canonical_pathname;
c906108c 221 int scratch_chan;
07b82ea5 222 struct target_section *sections = NULL, *sections_end = NULL;
d18b8b7a 223 char **matching;
c5aa993b 224
64c0b5de
GB
225 if (is_target_filename (filename))
226 {
227 if (target_filesystem_is_local ())
228 filename += strlen (TARGET_SYSROOT_PREFIX);
229 else
230 load_via_target = 1;
231 }
232
233 if (load_via_target)
c5aa993b 234 {
64c0b5de
GB
235 /* gdb_bfd_fopen does not support "target:" filenames. */
236 if (write_files)
237 warning (_("writing into executable files is "
238 "not supported for %s sysroots"),
239 TARGET_SYSROOT_PREFIX);
240
241 scratch_pathname = xstrdup (filename);
242 make_cleanup (xfree, scratch_pathname);
243
244 scratch_chan = -1;
d7f9d729 245
64c0b5de 246 canonical_pathname = scratch_pathname;
c5aa993b 247 }
64c0b5de
GB
248 else
249 {
250 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
251 filename, write_files ?
252 O_RDWR | O_BINARY : O_RDONLY | O_BINARY,
253 &scratch_pathname);
254#if defined(__GO32__) || defined(_WIN32) || defined(__CYGWIN__)
255 if (scratch_chan < 0)
256 {
0ae1c716 257 char *exename = (char *) alloca (strlen (filename) + 5);
64c0b5de
GB
258
259 strcat (strcpy (exename, filename), ".exe");
260 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST,
261 exename, write_files ?
262 O_RDWR | O_BINARY
263 : O_RDONLY | O_BINARY,
264 &scratch_pathname);
265 }
c906108c 266#endif
64c0b5de
GB
267 if (scratch_chan < 0)
268 perror_with_name (filename);
a4453b7e 269
64c0b5de 270 make_cleanup (xfree, scratch_pathname);
a4453b7e 271
64c0b5de
GB
272 /* gdb_bfd_open (and its variants) prefers canonicalized
273 pathname for better BFD caching. */
274 canonical_pathname = gdb_realpath (scratch_pathname);
275 make_cleanup (xfree, canonical_pathname);
276 }
1f0c4988 277
64c0b5de 278 if (write_files && !load_via_target)
1f0c4988 279 exec_bfd = gdb_bfd_fopen (canonical_pathname, gnutarget,
1c00ec6b
TT
280 FOPEN_RUB, scratch_chan);
281 else
1f0c4988 282 exec_bfd = gdb_bfd_open (canonical_pathname, gnutarget, scratch_chan);
c906108c
SS
283
284 if (!exec_bfd)
9fe4a216 285 {
d5131498 286 error (_("\"%s\": could not open as an executable file: %s."),
9fe4a216
TT
287 scratch_pathname, bfd_errmsg (bfd_get_error ()));
288 }
c906108c 289
64c0b5de
GB
290 /* gdb_realpath_keepfile resolves symlinks on the local
291 filesystem and so cannot be used for "target:" files. */
1f0c4988 292 gdb_assert (exec_filename == NULL);
64c0b5de
GB
293 if (load_via_target)
294 exec_filename = xstrdup (bfd_get_filename (exec_bfd));
295 else
296 exec_filename = gdb_realpath_keepfile (scratch_pathname);
1f0c4988 297
d18b8b7a 298 if (!bfd_check_format_matches (exec_bfd, bfd_object, &matching))
c906108c
SS
299 {
300 /* Make sure to close exec_bfd, or else "run" might try to use
301 it. */
6c95b8df 302 exec_close ();
8a3fe4f8 303 error (_("\"%s\": not in executable format: %s"),
d18b8b7a
HZ
304 scratch_pathname,
305 gdb_bfd_errmsg (bfd_get_error (), matching));
c906108c
SS
306 }
307
07b82ea5 308 if (build_section_table (exec_bfd, &sections, &sections_end))
c906108c
SS
309 {
310 /* Make sure to close exec_bfd, or else "run" might try to use
311 it. */
6c95b8df 312 exec_close ();
8a3fe4f8 313 error (_("\"%s\": can't find the file sections: %s"),
c906108c
SS
314 scratch_pathname, bfd_errmsg (bfd_get_error ()));
315 }
316
c04ea773
DJ
317 exec_bfd_mtime = bfd_get_mtime (exec_bfd);
318
c906108c
SS
319 validate_files ();
320
321 set_gdbarch_from_file (exec_bfd);
322
07b82ea5 323 /* Add the executable's sections to the current address spaces'
6c95b8df
PA
324 list of sections. This possibly pushes the exec_ops
325 target. */
ed9eebaf 326 add_target_sections (&exec_bfd, sections, sections_end);
07b82ea5 327 xfree (sections);
c906108c
SS
328
329 /* Tell display code (if any) about the changed file name. */
9a4105ab
AC
330 if (deprecated_exec_file_display_hook)
331 (*deprecated_exec_file_display_hook) (filename);
c906108c 332 }
9b333ba3
TT
333
334 do_cleanups (cleanups);
335
ce7d4522 336 bfd_cache_close_all ();
781b42b0 337 observer_notify_executable_changed ();
c906108c
SS
338}
339
340/* Process the first arg in ARGS as the new exec file.
341
c5aa993b
JM
342 Note that we have to explicitly ignore additional args, since we can
343 be called from file_command(), which also calls symbol_file_command()
1adeb98a
FN
344 which can take multiple args.
345
0963b4bd 346 If ARGS is NULL, we just want to close the exec file. */
c906108c 347
1adeb98a 348static void
fba45db2 349exec_file_command (char *args, int from_tty)
c906108c 350{
1adeb98a
FN
351 char **argv;
352 char *filename;
4c42eaff
DJ
353
354 if (from_tty && target_has_execution
355 && !query (_("A program is being debugged already.\n"
356 "Are you sure you want to change the file? ")))
357 error (_("File not changed."));
1adeb98a
FN
358
359 if (args)
360 {
f7545552
TT
361 struct cleanup *cleanups;
362
1adeb98a
FN
363 /* Scan through the args and pick up the first non option arg
364 as the filename. */
365
d1a41061 366 argv = gdb_buildargv (args);
f7545552 367 cleanups = make_cleanup_freeargv (argv);
1adeb98a
FN
368
369 for (; (*argv != NULL) && (**argv == '-'); argv++)
370 {;
371 }
372 if (*argv == NULL)
8a3fe4f8 373 error (_("No executable file name was specified"));
1adeb98a
FN
374
375 filename = tilde_expand (*argv);
376 make_cleanup (xfree, filename);
377 exec_file_attach (filename, from_tty);
f7545552
TT
378
379 do_cleanups (cleanups);
1adeb98a
FN
380 }
381 else
382 exec_file_attach (NULL, from_tty);
c906108c
SS
383}
384
0963b4bd 385/* Set both the exec file and the symbol file, in one command.
c906108c
SS
386 What a novelty. Why did GDB go through four major releases before this
387 command was added? */
388
389static void
fba45db2 390file_command (char *arg, int from_tty)
c906108c
SS
391{
392 /* FIXME, if we lose on reading the symbol file, we should revert
393 the exec file, but that's rough. */
394 exec_file_command (arg, from_tty);
395 symbol_file_command (arg, from_tty);
9a4105ab
AC
396 if (deprecated_file_changed_hook)
397 deprecated_file_changed_hook (arg);
c906108c 398}
c906108c 399\f
c5aa993b 400
0963b4bd 401/* Locate all mappable sections of a BFD file.
c906108c
SS
402 table_pp_char is a char * to get it through bfd_map_over_sections;
403 we cast it back to its proper type. */
404
405static void
7be0c536
AC
406add_to_section_table (bfd *abfd, struct bfd_section *asect,
407 void *table_pp_char)
c906108c 408{
0542c86d 409 struct target_section **table_pp = (struct target_section **) table_pp_char;
c906108c
SS
410 flagword aflag;
411
2b2848e2
DE
412 gdb_assert (abfd == asect->owner);
413
0f5d55d8
JB
414 /* Check the section flags, but do not discard zero-length sections, since
415 some symbols may still be attached to this section. For instance, we
416 encountered on sparc-solaris 2.10 a shared library with an empty .bss
417 section to which a symbol named "_end" was attached. The address
418 of this symbol still needs to be relocated. */
c906108c
SS
419 aflag = bfd_get_section_flags (abfd, asect);
420 if (!(aflag & SEC_ALLOC))
421 return;
0f5d55d8 422
046ac79f 423 (*table_pp)->owner = NULL;
c906108c
SS
424 (*table_pp)->the_bfd_section = asect;
425 (*table_pp)->addr = bfd_section_vma (abfd, asect);
426 (*table_pp)->endaddr = (*table_pp)->addr + bfd_section_size (abfd, asect);
427 (*table_pp)++;
428}
429
a5b1fd27
DE
430/* See exec.h. */
431
432void
433clear_section_table (struct target_section_table *table)
434{
435 xfree (table->sections);
436 table->sections = table->sections_end = NULL;
437}
438
439/* Resize section table TABLE by ADJUSTMENT.
440 ADJUSTMENT may be negative, in which case the caller must have already
441 removed the sections being deleted.
442 Returns the old size. */
443
444static int
445resize_section_table (struct target_section_table *table, int adjustment)
07b82ea5 446{
07b82ea5
PA
447 int old_count;
448 int new_count;
449
07b82ea5
PA
450 old_count = table->sections_end - table->sections;
451
a5b1fd27 452 new_count = adjustment + old_count;
07b82ea5
PA
453
454 if (new_count)
455 {
224c3ddb
SM
456 table->sections = XRESIZEVEC (struct target_section, table->sections,
457 new_count);
07b82ea5
PA
458 table->sections_end = table->sections + new_count;
459 }
460 else
a5b1fd27 461 clear_section_table (table);
07b82ea5
PA
462
463 return old_count;
464}
465
c906108c
SS
466/* Builds a section table, given args BFD, SECTABLE_PTR, SECEND_PTR.
467 Returns 0 if OK, 1 on error. */
468
469int
0542c86d
PA
470build_section_table (struct bfd *some_bfd, struct target_section **start,
471 struct target_section **end)
c906108c
SS
472{
473 unsigned count;
474
475 count = bfd_count_sections (some_bfd);
476 if (*start)
b8c9b27d 477 xfree (* start);
8d749320 478 *start = XNEWVEC (struct target_section, count);
c906108c 479 *end = *start;
c5aa993b 480 bfd_map_over_sections (some_bfd, add_to_section_table, (char *) end);
c906108c 481 if (*end > *start + count)
3e43a32a
MS
482 internal_error (__FILE__, __LINE__,
483 _("failed internal consistency check"));
c906108c
SS
484 /* We could realloc the table, but it probably loses for most files. */
485 return 0;
486}
07b82ea5
PA
487
488/* Add the sections array defined by [SECTIONS..SECTIONS_END[ to the
489 current set of target sections. */
490
491void
046ac79f 492add_target_sections (void *owner,
ed9eebaf 493 struct target_section *sections,
07b82ea5
PA
494 struct target_section *sections_end)
495{
496 int count;
497 struct target_section_table *table = current_target_sections;
498
499 count = sections_end - sections;
500
501 if (count > 0)
502 {
503 int space = resize_section_table (table, count);
ed9eebaf 504 int i;
d7f9d729 505
ed9eebaf
TT
506 for (i = 0; i < count; ++i)
507 {
508 table->sections[space + i] = sections[i];
046ac79f 509 table->sections[space + i].owner = owner;
ed9eebaf 510 }
07b82ea5
PA
511
512 /* If these are the first file sections we can provide memory
513 from, push the file_stratum target. */
ab16fce8
TT
514 if (!target_is_pushed (&exec_ops))
515 push_target (&exec_ops);
07b82ea5
PA
516 }
517}
518
76ad5e1e
NB
519/* Add the sections of OBJFILE to the current set of target sections. */
520
521void
522add_target_sections_of_objfile (struct objfile *objfile)
523{
524 struct target_section_table *table = current_target_sections;
525 struct obj_section *osect;
526 int space;
527 unsigned count = 0;
528 struct target_section *ts;
529
530 if (objfile == NULL)
531 return;
532
533 /* Compute the number of sections to add. */
534 ALL_OBJFILE_OSECTIONS (objfile, osect)
535 {
536 if (bfd_get_section_size (osect->the_bfd_section) == 0)
537 continue;
538 count++;
539 }
540
541 if (count == 0)
542 return;
543
544 space = resize_section_table (table, count);
545
546 ts = table->sections + space;
547
548 ALL_OBJFILE_OSECTIONS (objfile, osect)
549 {
550 if (bfd_get_section_size (osect->the_bfd_section) == 0)
551 continue;
552
553 gdb_assert (ts < table->sections + space + count);
554
555 ts->addr = obj_section_addr (osect);
556 ts->endaddr = obj_section_endaddr (osect);
557 ts->the_bfd_section = osect->the_bfd_section;
558 ts->owner = (void *) objfile;
559
560 ts++;
561 }
562}
563
046ac79f
JK
564/* Remove all target sections owned by OWNER.
565 OWNER must be the same value passed to add_target_sections. */
07b82ea5
PA
566
567void
046ac79f 568remove_target_sections (void *owner)
07b82ea5
PA
569{
570 struct target_section *src, *dest;
07b82ea5
PA
571 struct target_section_table *table = current_target_sections;
572
046ac79f
JK
573 gdb_assert (owner != NULL);
574
07b82ea5
PA
575 dest = table->sections;
576 for (src = table->sections; src < table->sections_end; src++)
046ac79f 577 if (src->owner != owner)
07b82ea5
PA
578 {
579 /* Keep this section. */
580 if (dest < src)
581 *dest = *src;
582 dest++;
583 }
584
585 /* If we've dropped any sections, resize the section table. */
586 if (dest < src)
587 {
588 int old_count;
589
590 old_count = resize_section_table (table, dest - src);
591
592 /* If we don't have any more sections to read memory from,
593 remove the file_stratum target from the stack. */
594 if (old_count + (dest - src) == 0)
6c95b8df
PA
595 {
596 struct program_space *pspace;
597
598 ALL_PSPACES (pspace)
599 if (pspace->target_sections.sections
600 != pspace->target_sections.sections_end)
601 return;
602
603 unpush_target (&exec_ops);
604 }
07b82ea5
PA
605 }
606}
607
c906108c 608\f
348f8c02 609
1ca49d37
YQ
610enum target_xfer_status
611exec_read_partial_read_only (gdb_byte *readbuf, ULONGEST offset,
612 ULONGEST len, ULONGEST *xfered_len)
613{
614 /* It's unduly pedantic to refuse to look at the executable for
615 read-only pieces; so do the equivalent of readonly regions aka
616 QTro packet. */
617 if (exec_bfd != NULL)
618 {
619 asection *s;
620 bfd_size_type size;
621 bfd_vma vma;
622
623 for (s = exec_bfd->sections; s; s = s->next)
624 {
625 if ((s->flags & SEC_LOAD) == 0
626 || (s->flags & SEC_READONLY) == 0)
627 continue;
628
629 vma = s->vma;
630 size = bfd_get_section_size (s);
631 if (vma <= offset && offset < (vma + size))
632 {
633 ULONGEST amt;
634
635 amt = (vma + size) - offset;
636 if (amt > len)
637 amt = len;
638
639 amt = bfd_get_section_contents (exec_bfd, s,
640 readbuf, offset - vma, amt);
641
642 if (amt == 0)
643 return TARGET_XFER_EOF;
644 else
645 {
646 *xfered_len = amt;
647 return TARGET_XFER_OK;
648 }
649 }
650 }
651 }
652
653 /* Indicate failure to find the requested memory block. */
654 return TARGET_XFER_E_IO;
655}
656
5a2eb0ef
YQ
657/* Appends all read-only memory ranges found in the target section
658 table defined by SECTIONS and SECTIONS_END, starting at (and
659 intersected with) MEMADDR for LEN bytes. Returns the augmented
660 VEC. */
661
662static VEC(mem_range_s) *
e6ca34fc 663section_table_available_memory (VEC(mem_range_s) *memory,
424447ee 664 CORE_ADDR memaddr, ULONGEST len,
e6ca34fc
PA
665 struct target_section *sections,
666 struct target_section *sections_end)
667{
668 struct target_section *p;
e6ca34fc
PA
669
670 for (p = sections; p < sections_end; p++)
671 {
2b2848e2
DE
672 if ((bfd_get_section_flags (p->the_bfd_section->owner,
673 p->the_bfd_section)
e6ca34fc
PA
674 & SEC_READONLY) == 0)
675 continue;
676
677 /* Copy the meta-data, adjusted. */
678 if (mem_ranges_overlap (p->addr, p->endaddr - p->addr, memaddr, len))
679 {
680 ULONGEST lo1, hi1, lo2, hi2;
681 struct mem_range *r;
682
683 lo1 = memaddr;
684 hi1 = memaddr + len;
685
686 lo2 = p->addr;
687 hi2 = p->endaddr;
688
689 r = VEC_safe_push (mem_range_s, memory, NULL);
690
691 r->start = max (lo1, lo2);
692 r->length = min (hi1, hi2) - r->start;
693 }
694 }
695
696 return memory;
697}
698
1ee79381
YQ
699enum target_xfer_status
700section_table_read_available_memory (gdb_byte *readbuf, ULONGEST offset,
701 ULONGEST len, ULONGEST *xfered_len)
702{
703 VEC(mem_range_s) *available_memory = NULL;
704 struct target_section_table *table;
705 struct cleanup *old_chain;
706 mem_range_s *r;
707 int i;
708
709 table = target_get_section_table (&exec_ops);
710 available_memory = section_table_available_memory (available_memory,
711 offset, len,
712 table->sections,
713 table->sections_end);
714
715 old_chain = make_cleanup (VEC_cleanup(mem_range_s),
716 &available_memory);
717
718 normalize_mem_ranges (available_memory);
719
720 for (i = 0;
721 VEC_iterate (mem_range_s, available_memory, i, r);
722 i++)
723 {
724 if (mem_ranges_overlap (r->start, r->length, offset, len))
725 {
726 CORE_ADDR end;
727 enum target_xfer_status status;
728
729 /* Get the intersection window. */
730 end = min (offset + len, r->start + r->length);
731
732 gdb_assert (end - offset <= len);
733
734 if (offset >= r->start)
735 status = exec_read_partial_read_only (readbuf, offset,
736 end - offset,
737 xfered_len);
738 else
739 {
740 *xfered_len = r->start - offset;
bc113b4e 741 status = TARGET_XFER_UNAVAILABLE;
1ee79381
YQ
742 }
743 do_cleanups (old_chain);
744 return status;
745 }
746 }
747 do_cleanups (old_chain);
748
749 *xfered_len = len;
bc113b4e 750 return TARGET_XFER_UNAVAILABLE;
1ee79381
YQ
751}
752
9b409511 753enum target_xfer_status
07b82ea5 754section_table_xfer_memory_partial (gdb_byte *readbuf, const gdb_byte *writebuf,
b55e14c7 755 ULONGEST offset, ULONGEST len,
9b409511 756 ULONGEST *xfered_len,
07b82ea5
PA
757 struct target_section *sections,
758 struct target_section *sections_end,
759 const char *section_name)
c906108c 760{
020cc13c 761 int res;
0542c86d 762 struct target_section *p;
07b82ea5
PA
763 ULONGEST memaddr = offset;
764 ULONGEST memend = memaddr + len;
c906108c 765
b55e14c7 766 if (len == 0)
3e43a32a
MS
767 internal_error (__FILE__, __LINE__,
768 _("failed internal consistency check"));
c906108c 769
348f8c02 770 for (p = sections; p < sections_end; p++)
c906108c 771 {
2b2848e2
DE
772 struct bfd_section *asect = p->the_bfd_section;
773 bfd *abfd = asect->owner;
774
775 if (section_name && strcmp (section_name, asect->name) != 0)
0963b4bd 776 continue; /* not the section we need. */
c906108c 777 if (memaddr >= p->addr)
3db26b01
JB
778 {
779 if (memend <= p->endaddr)
780 {
781 /* Entire transfer is within this section. */
07b82ea5 782 if (writebuf)
2b2848e2 783 res = bfd_set_section_contents (abfd, asect,
07b82ea5 784 writebuf, memaddr - p->addr,
85302095
AC
785 len);
786 else
2b2848e2 787 res = bfd_get_section_contents (abfd, asect,
07b82ea5 788 readbuf, memaddr - p->addr,
85302095 789 len);
9b409511
YQ
790
791 if (res != 0)
792 {
793 *xfered_len = len;
794 return TARGET_XFER_OK;
795 }
796 else
797 return TARGET_XFER_EOF;
3db26b01
JB
798 }
799 else if (memaddr >= p->endaddr)
800 {
801 /* This section ends before the transfer starts. */
802 continue;
803 }
804 else
805 {
806 /* This section overlaps the transfer. Just do half. */
807 len = p->endaddr - memaddr;
07b82ea5 808 if (writebuf)
2b2848e2 809 res = bfd_set_section_contents (abfd, asect,
07b82ea5 810 writebuf, memaddr - p->addr,
85302095
AC
811 len);
812 else
2b2848e2 813 res = bfd_get_section_contents (abfd, asect,
07b82ea5 814 readbuf, memaddr - p->addr,
85302095 815 len);
9b409511
YQ
816 if (res != 0)
817 {
818 *xfered_len = len;
819 return TARGET_XFER_OK;
820 }
821 else
822 return TARGET_XFER_EOF;
3db26b01
JB
823 }
824 }
c906108c
SS
825 }
826
9b409511 827 return TARGET_XFER_EOF; /* We can't help. */
c906108c 828}
348f8c02 829
70221824 830static struct target_section_table *
07b82ea5 831exec_get_section_table (struct target_ops *ops)
348f8c02 832{
07b82ea5 833 return current_target_sections;
348f8c02
PA
834}
835
9b409511 836static enum target_xfer_status
07b82ea5
PA
837exec_xfer_partial (struct target_ops *ops, enum target_object object,
838 const char *annex, gdb_byte *readbuf,
839 const gdb_byte *writebuf,
9b409511 840 ULONGEST offset, ULONGEST len, ULONGEST *xfered_len)
348f8c02 841{
07b82ea5
PA
842 struct target_section_table *table = target_get_section_table (ops);
843
844 if (object == TARGET_OBJECT_MEMORY)
845 return section_table_xfer_memory_partial (readbuf, writebuf,
9b409511 846 offset, len, xfered_len,
07b82ea5
PA
847 table->sections,
848 table->sections_end,
849 NULL);
850 else
2ed4b548 851 return TARGET_XFER_E_IO;
348f8c02 852}
c906108c 853\f
c5aa993b 854
c906108c 855void
07b82ea5 856print_section_info (struct target_section_table *t, bfd *abfd)
c906108c 857{
5af949e3 858 struct gdbarch *gdbarch = gdbarch_from_bfd (abfd);
0542c86d 859 struct target_section *p;
17a912b6 860 /* FIXME: 16 is not wide enough when gdbarch_addr_bit > 64. */
5af949e3 861 int wid = gdbarch_addr_bit (gdbarch) <= 32 ? 8 : 16;
c906108c 862
c5aa993b 863 printf_filtered ("\t`%s', ", bfd_get_filename (abfd));
c906108c 864 wrap_here (" ");
a3f17187 865 printf_filtered (_("file type %s.\n"), bfd_get_target (abfd));
c906108c 866 if (abfd == exec_bfd)
51bee8e9 867 {
3e43a32a
MS
868 /* gcc-3.4 does not like the initialization in
869 <p == t->sections_end>. */
d904de5b 870 bfd_vma displacement = 0;
2f1bdd26 871 bfd_vma entry_point;
51bee8e9
JK
872
873 for (p = t->sections; p < t->sections_end; p++)
874 {
2b2848e2
DE
875 struct bfd_section *psect = p->the_bfd_section;
876 bfd *pbfd = psect->owner;
51bee8e9 877
2b2848e2 878 if ((bfd_get_section_flags (pbfd, psect) & (SEC_ALLOC | SEC_LOAD))
51bee8e9
JK
879 != (SEC_ALLOC | SEC_LOAD))
880 continue;
881
2b2848e2
DE
882 if (bfd_get_section_vma (pbfd, psect) <= abfd->start_address
883 && abfd->start_address < (bfd_get_section_vma (pbfd, psect)
884 + bfd_get_section_size (psect)))
51bee8e9 885 {
2b2848e2 886 displacement = p->addr - bfd_get_section_vma (pbfd, psect);
51bee8e9
JK
887 break;
888 }
889 }
890 if (p == t->sections_end)
b37520b6 891 warning (_("Cannot find section for the entry point of %s."),
d904de5b 892 bfd_get_filename (abfd));
51bee8e9 893
2f1bdd26
MGD
894 entry_point = gdbarch_addr_bits_remove (gdbarch,
895 bfd_get_start_address (abfd)
896 + displacement);
51bee8e9 897 printf_filtered (_("\tEntry point: %s\n"),
2f1bdd26 898 paddress (gdbarch, entry_point));
51bee8e9 899 }
07b82ea5 900 for (p = t->sections; p < t->sections_end; p++)
c906108c 901 {
2b2848e2
DE
902 struct bfd_section *psect = p->the_bfd_section;
903 bfd *pbfd = psect->owner;
904
bb599908
PH
905 printf_filtered ("\t%s", hex_string_custom (p->addr, wid));
906 printf_filtered (" - %s", hex_string_custom (p->endaddr, wid));
bcf16802
KB
907
908 /* FIXME: A format of "08l" is not wide enough for file offsets
909 larger than 4GB. OTOH, making it "016l" isn't desirable either
910 since most output will then be much wider than necessary. It
911 may make sense to test the size of the file and choose the
912 format string accordingly. */
a3f17187 913 /* FIXME: i18n: Need to rewrite this sentence. */
c906108c
SS
914 if (info_verbose)
915 printf_filtered (" @ %s",
2b2848e2
DE
916 hex_string_custom (psect->filepos, 8));
917 printf_filtered (" is %s", bfd_section_name (pbfd, psect));
918 if (pbfd != abfd)
919 printf_filtered (" in %s", bfd_get_filename (pbfd));
c906108c
SS
920 printf_filtered ("\n");
921 }
922}
923
924static void
fba45db2 925exec_files_info (struct target_ops *t)
c906108c 926{
57008375
JK
927 if (exec_bfd)
928 print_section_info (current_target_sections, exec_bfd);
929 else
930 puts_filtered (_("\t<no file loaded>\n"));
c906108c
SS
931}
932
933static void
fba45db2 934set_section_command (char *args, int from_tty)
c906108c 935{
0542c86d 936 struct target_section *p;
c906108c
SS
937 char *secname;
938 unsigned seclen;
939 unsigned long secaddr;
940 char secprint[100];
941 long offset;
07b82ea5 942 struct target_section_table *table;
c906108c
SS
943
944 if (args == 0)
8a3fe4f8 945 error (_("Must specify section name and its virtual address"));
c906108c 946
0963b4bd 947 /* Parse out section name. */
c5aa993b 948 for (secname = args; !isspace (*args); args++);
c906108c
SS
949 seclen = args - secname;
950
0963b4bd 951 /* Parse out new virtual address. */
c906108c
SS
952 secaddr = parse_and_eval_address (args);
953
07b82ea5
PA
954 table = current_target_sections;
955 for (p = table->sections; p < table->sections_end; p++)
c5aa993b 956 {
57008375 957 if (!strncmp (secname, bfd_section_name (p->bfd,
3e43a32a 958 p->the_bfd_section), seclen)
57008375 959 && bfd_section_name (p->bfd, p->the_bfd_section)[seclen] == '\0')
c5aa993b
JM
960 {
961 offset = secaddr - p->addr;
962 p->addr += offset;
963 p->endaddr += offset;
964 if (from_tty)
965 exec_files_info (&exec_ops);
966 return;
967 }
c906108c 968 }
c906108c
SS
969 if (seclen >= sizeof (secprint))
970 seclen = sizeof (secprint) - 1;
971 strncpy (secprint, secname, seclen);
972 secprint[seclen] = '\0';
8a3fe4f8 973 error (_("Section %s not found"), secprint);
c906108c
SS
974}
975
30510692
DJ
976/* If we can find a section in FILENAME with BFD index INDEX, adjust
977 it to ADDRESS. */
c1bd25fd
DJ
978
979void
980exec_set_section_address (const char *filename, int index, CORE_ADDR address)
981{
0542c86d 982 struct target_section *p;
07b82ea5 983 struct target_section_table *table;
c1bd25fd 984
07b82ea5
PA
985 table = current_target_sections;
986 for (p = table->sections; p < table->sections_end; p++)
c1bd25fd 987 {
2b2848e2 988 if (filename_cmp (filename, p->the_bfd_section->owner->filename) == 0
30510692 989 && index == p->the_bfd_section->index)
c1bd25fd 990 {
30510692 991 p->endaddr += address - p->addr;
c1bd25fd 992 p->addr = address;
c1bd25fd
DJ
993 }
994 }
995}
996
c906108c
SS
997/* If mourn is being called in all the right places, this could be say
998 `gdb internal error' (since generic_mourn calls
999 breakpoint_init_inferior). */
1000
1001static int
3db08215
MM
1002ignore (struct target_ops *ops, struct gdbarch *gdbarch,
1003 struct bp_target_info *bp_tgt)
c906108c
SS
1004{
1005 return 0;
1006}
1007
c35b1492
PA
1008static int
1009exec_has_memory (struct target_ops *ops)
1010{
1011 /* We can provide memory if we have any file/target sections to read
1012 from. */
1013 return (current_target_sections->sections
1014 != current_target_sections->sections_end);
1015}
1016
83814951
TT
1017static char *
1018exec_make_note_section (struct target_ops *self, bfd *obfd, int *note_size)
1019{
1020 error (_("Can't create a corefile"));
1021}
be4d1333 1022
c906108c
SS
1023/* Fill in the exec file target vector. Very few entries need to be
1024 defined. */
1025
be4d1333 1026static void
fba45db2 1027init_exec_ops (void)
c906108c
SS
1028{
1029 exec_ops.to_shortname = "exec";
1030 exec_ops.to_longname = "Local exec file";
1031 exec_ops.to_doc = "Use an executable file as a target.\n\
1032Specify the filename of the executable file.";
1adeb98a 1033 exec_ops.to_open = exec_open;
6c95b8df 1034 exec_ops.to_close = exec_close_1;
07b82ea5
PA
1035 exec_ops.to_xfer_partial = exec_xfer_partial;
1036 exec_ops.to_get_section_table = exec_get_section_table;
c906108c
SS
1037 exec_ops.to_files_info = exec_files_info;
1038 exec_ops.to_insert_breakpoint = ignore;
1039 exec_ops.to_remove_breakpoint = ignore;
c906108c 1040 exec_ops.to_stratum = file_stratum;
c35b1492 1041 exec_ops.to_has_memory = exec_has_memory;
be4d1333 1042 exec_ops.to_make_corefile_notes = exec_make_note_section;
b427c1bc 1043 exec_ops.to_find_memory_regions = objfile_find_memory_regions;
c5aa993b 1044 exec_ops.to_magic = OPS_MAGIC;
c906108c
SS
1045}
1046
1047void
fba45db2 1048_initialize_exec (void)
c906108c
SS
1049{
1050 struct cmd_list_element *c;
1051
1052 init_exec_ops ();
1053
1054 if (!dbx_commands)
1055 {
1a966eab
AC
1056 c = add_cmd ("file", class_files, file_command, _("\
1057Use FILE as program to be debugged.\n\
c906108c
SS
1058It is read for its symbols, for getting the contents of pure memory,\n\
1059and it is the program executed when you use the `run' command.\n\
1060If FILE cannot be found as specified, your execution directory path\n\
1061($PATH) is searched for a command of that name.\n\
1a966eab 1062No arg means to have no executable file and no symbols."), &cmdlist);
5ba2abeb 1063 set_cmd_completer (c, filename_completer);
c906108c
SS
1064 }
1065
1a966eab
AC
1066 c = add_cmd ("exec-file", class_files, exec_file_command, _("\
1067Use FILE as program for getting contents of pure memory.\n\
c906108c
SS
1068If FILE cannot be found as specified, your execution directory path\n\
1069is searched for a command of that name.\n\
1a966eab 1070No arg means have no executable file."), &cmdlist);
5ba2abeb 1071 set_cmd_completer (c, filename_completer);
c906108c 1072
1bedd215
AC
1073 add_com ("section", class_files, set_section_command, _("\
1074Change the base address of section SECTION of the exec file to ADDR.\n\
c906108c
SS
1075This can be used if the exec file does not contain section addresses,\n\
1076(such as in the a.out format), or when the addresses specified in the\n\
1077file itself are wrong. Each section must be changed separately. The\n\
1bedd215 1078``info files'' command lists all the sections and their addresses."));
c906108c 1079
5bf193a2
AC
1080 add_setshow_boolean_cmd ("write", class_support, &write_files, _("\
1081Set writing into executable and core files."), _("\
1082Show writing into executable and core files."), NULL,
1083 NULL,
920d2a44 1084 show_write_files,
5bf193a2 1085 &setlist, &showlist);
c5aa993b 1086
9852c492 1087 add_target_with_completer (&exec_ops, filename_completer);
c906108c 1088}