]>
Commit | Line | Data |
---|---|---|
c906108c | 1 | /* Work with executable files, for GDB. |
4646aa9d | 2 | |
4a94e368 | 3 | Copyright (C) 1988-2022 Free Software Foundation, Inc. |
c906108c | 4 | |
c5aa993b | 5 | This file is part of GDB. |
c906108c | 6 | |
c5aa993b JM |
7 | This program is free software; you can redistribute it and/or modify |
8 | it under the terms of the GNU General Public License as published by | |
a9762ec7 | 9 | the Free Software Foundation; either version 3 of the License, or |
c5aa993b | 10 | (at your option) any later version. |
c906108c | 11 | |
c5aa993b JM |
12 | This program is distributed in the hope that it will be useful, |
13 | but WITHOUT ANY WARRANTY; without even the implied warranty of | |
14 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
15 | GNU General Public License for more details. | |
c906108c | 16 | |
c5aa993b | 17 | You should have received a copy of the GNU General Public License |
a9762ec7 | 18 | along with this program. If not, see <http://www.gnu.org/licenses/>. */ |
c906108c SS |
19 | |
20 | #include "defs.h" | |
21 | #include "frame.h" | |
d55e5aa6 | 22 | #include "inferior.h" |
4de283e4 TT |
23 | #include "target.h" |
24 | #include "gdbcmd.h" | |
c906108c | 25 | #include "language.h" |
4de283e4 TT |
26 | #include "filenames.h" |
27 | #include "symfile.h" | |
c906108c | 28 | #include "objfiles.h" |
4de283e4 TT |
29 | #include "completer.h" |
30 | #include "value.h" | |
31 | #include "exec.h" | |
76727919 | 32 | #include "observable.h" |
4de283e4 TT |
33 | #include "arch-utils.h" |
34 | #include "gdbthread.h" | |
6c95b8df | 35 | #include "progspace.h" |
53af73bf | 36 | #include "progspace-and-thread.h" |
4de283e4 TT |
37 | #include "gdb_bfd.h" |
38 | #include "gcore.h" | |
39 | #include "source.h" | |
98c59b52 | 40 | #include "build-id.h" |
4de283e4 TT |
41 | |
42 | #include <fcntl.h> | |
e0eac551 | 43 | #include "readline/tilde.h" |
4de283e4 TT |
44 | #include "gdbcore.h" |
45 | ||
46 | #include <ctype.h> | |
47 | #include <sys/stat.h> | |
a9a5a3d1 | 48 | #include "solist.h" |
4de283e4 | 49 | #include <algorithm> |
268a13a5 | 50 | #include "gdbsupport/pathstuff.h" |
a2fedca9 | 51 | #include "cli/cli-style.h" |
7904e961 | 52 | #include "gdbsupport/buildargv.h" |
c906108c | 53 | |
1d8b34a7 | 54 | void (*deprecated_file_changed_hook) (const char *); |
c906108c | 55 | |
d9f719f1 PA |
56 | static const target_info exec_target_info = { |
57 | "exec", | |
58 | N_("Local exec file"), | |
59 | N_("Use an executable file as a target.\n\ | |
60 | Specify the filename of the executable file.") | |
61 | }; | |
62 | ||
c906108c SS |
63 | /* The target vector for executable files. */ |
64 | ||
f6ac5f3d PA |
65 | struct exec_target final : public target_ops |
66 | { | |
d9f719f1 PA |
67 | const target_info &info () const override |
68 | { return exec_target_info; } | |
f6ac5f3d | 69 | |
66b4deae PA |
70 | strata stratum () const override { return file_stratum; } |
71 | ||
f6ac5f3d PA |
72 | void close () override; |
73 | enum target_xfer_status xfer_partial (enum target_object object, | |
74 | const char *annex, | |
75 | gdb_byte *readbuf, | |
76 | const gdb_byte *writebuf, | |
77 | ULONGEST offset, ULONGEST len, | |
78 | ULONGEST *xfered_len) override; | |
f6ac5f3d PA |
79 | void files_info () override; |
80 | ||
57810aa7 | 81 | bool has_memory () override; |
24f5300a | 82 | gdb::unique_xmalloc_ptr<char> make_corefile_notes (bfd *, int *) override; |
f6ac5f3d PA |
83 | int find_memory_regions (find_memory_region_ftype func, void *data) override; |
84 | }; | |
85 | ||
86 | static exec_target exec_ops; | |
c906108c | 87 | |
a2fedca9 PW |
88 | /* How to handle a mismatch between the current exec file and the exec |
89 | file determined from target. */ | |
90 | ||
91 | static const char *const exec_file_mismatch_names[] | |
92 | = {"ask", "warn", "off", NULL }; | |
93 | enum exec_file_mismatch_mode | |
94 | { | |
95 | exec_file_mismatch_ask, exec_file_mismatch_warn, exec_file_mismatch_off | |
96 | }; | |
97 | static const char *exec_file_mismatch = exec_file_mismatch_names[0]; | |
98 | static enum exec_file_mismatch_mode exec_file_mismatch_mode | |
99 | = exec_file_mismatch_ask; | |
100 | ||
101 | /* Show command. */ | |
102 | static void | |
103 | show_exec_file_mismatch_command (struct ui_file *file, int from_tty, | |
104 | struct cmd_list_element *c, const char *value) | |
105 | { | |
6cb06a8c TT |
106 | gdb_printf (file, |
107 | _("exec-file-mismatch handling is currently \"%s\".\n"), | |
108 | exec_file_mismatch_names[exec_file_mismatch_mode]); | |
a2fedca9 PW |
109 | } |
110 | ||
111 | /* Set command. Change the setting for range checking. */ | |
112 | static void | |
113 | set_exec_file_mismatch_command (const char *ignore, | |
114 | int from_tty, struct cmd_list_element *c) | |
115 | { | |
116 | for (enum exec_file_mismatch_mode mode = exec_file_mismatch_ask; | |
117 | ; | |
118 | mode = static_cast<enum exec_file_mismatch_mode>(1 + (int) mode)) | |
119 | { | |
120 | if (strcmp (exec_file_mismatch, exec_file_mismatch_names[mode]) == 0) | |
121 | { | |
122 | exec_file_mismatch_mode = mode; | |
123 | return; | |
124 | } | |
125 | if (mode == exec_file_mismatch_off) | |
126 | internal_error (__FILE__, __LINE__, | |
127 | _("Unrecognized exec-file-mismatch setting: \"%s\""), | |
128 | exec_file_mismatch); | |
129 | } | |
130 | } | |
131 | ||
c906108c SS |
132 | /* Whether to open exec and core files read-only or read-write. */ |
133 | ||
491144b5 | 134 | bool write_files = false; |
920d2a44 AC |
135 | static void |
136 | show_write_files (struct ui_file *file, int from_tty, | |
137 | struct cmd_list_element *c, const char *value) | |
138 | { | |
6cb06a8c TT |
139 | gdb_printf (file, _("Writing into executable and core files is %s.\n"), |
140 | value); | |
920d2a44 AC |
141 | } |
142 | ||
c906108c | 143 | |
d9f719f1 PA |
144 | static void |
145 | exec_target_open (const char *args, int from_tty) | |
1adeb98a FN |
146 | { |
147 | target_preopen (from_tty); | |
148 | exec_file_attach (args, from_tty); | |
149 | } | |
150 | ||
6c95b8df PA |
151 | /* This is the target_close implementation. Clears all target |
152 | sections and closes all executable bfds from all program spaces. */ | |
153 | ||
f6ac5f3d PA |
154 | void |
155 | exec_target::close () | |
c906108c | 156 | { |
94c93c35 | 157 | for (struct program_space *ss : program_spaces) |
5ed8105e | 158 | { |
02f7d26b | 159 | ss->clear_target_sections (); |
8a4f1402 | 160 | ss->exec_close (); |
5ed8105e | 161 | } |
c906108c SS |
162 | } |
163 | ||
f6ac5f3d | 164 | /* See gdbcore.h. */ |
a10de604 GB |
165 | |
166 | void | |
ecf45d2c SL |
167 | try_open_exec_file (const char *exec_file_host, struct inferior *inf, |
168 | symfile_add_flags add_flags) | |
a10de604 | 169 | { |
cc06b668 | 170 | struct gdb_exception prev_err; |
a10de604 | 171 | |
57d1de9c LM |
172 | /* exec_file_attach and symbol_file_add_main may throw an error if the file |
173 | cannot be opened either locally or remotely. | |
174 | ||
175 | This happens for example, when the file is first found in the local | |
176 | sysroot (above), and then disappears (a TOCTOU race), or when it doesn't | |
177 | exist in the target filesystem, or when the file does exist, but | |
178 | is not readable. | |
88178e82 | 179 | |
57d1de9c LM |
180 | Even without a symbol file, the remote-based debugging session should |
181 | continue normally instead of ending abruptly. Hence we catch thrown | |
182 | errors/exceptions in the following code. */ | |
a70b8144 | 183 | try |
57d1de9c | 184 | { |
ecf45d2c SL |
185 | /* We must do this step even if exec_file_host is NULL, so that |
186 | exec_file_attach will clear state. */ | |
187 | exec_file_attach (exec_file_host, add_flags & SYMFILE_VERBOSE); | |
57d1de9c | 188 | } |
94aeb44b | 189 | catch (gdb_exception_error &err) |
57d1de9c LM |
190 | { |
191 | if (err.message != NULL) | |
3d6e9d23 | 192 | warning ("%s", err.what ()); |
57d1de9c | 193 | |
94aeb44b | 194 | prev_err = std::move (err); |
57d1de9c | 195 | } |
57d1de9c | 196 | |
ecf45d2c | 197 | if (exec_file_host != NULL) |
57d1de9c | 198 | { |
a70b8144 | 199 | try |
ecf45d2c SL |
200 | { |
201 | symbol_file_add_main (exec_file_host, add_flags); | |
202 | } | |
230d2906 | 203 | catch (const gdb_exception_error &err) |
ecf45d2c | 204 | { |
785e5700 | 205 | if (prev_err != err) |
3d6e9d23 | 206 | warning ("%s", err.what ()); |
ecf45d2c | 207 | } |
57d1de9c | 208 | } |
ecf45d2c SL |
209 | } |
210 | ||
211 | /* See gdbcore.h. */ | |
212 | ||
a2fedca9 PW |
213 | void |
214 | validate_exec_file (int from_tty) | |
215 | { | |
216 | /* If user asked to ignore the mismatch, do nothing. */ | |
217 | if (exec_file_mismatch_mode == exec_file_mismatch_off) | |
218 | return; | |
219 | ||
220 | const char *current_exec_file = get_exec_file (0); | |
221 | struct inferior *inf = current_inferior (); | |
222 | /* Try to determine a filename from the process itself. */ | |
223 | const char *pid_exec_file = target_pid_to_exec_file (inf->pid); | |
98c59b52 | 224 | bool build_id_mismatch = false; |
a2fedca9 | 225 | |
98c59b52 | 226 | /* If we cannot validate the exec file, return. */ |
a2fedca9 PW |
227 | if (current_exec_file == NULL || pid_exec_file == NULL) |
228 | return; | |
229 | ||
98c59b52 PA |
230 | /* Try validating via build-id, if available. This is the most |
231 | reliable check. */ | |
48e9cc84 PW |
232 | |
233 | /* In case current_exec_file was changed, reopen_exec_file ensures | |
234 | an up to date build_id (will do nothing if the file timestamp | |
235 | did not change). If exec file changed, reopen_exec_file has | |
236 | allocated another file name, so get_exec_file again. */ | |
237 | reopen_exec_file (); | |
238 | current_exec_file = get_exec_file (0); | |
239 | ||
7e10abd1 TT |
240 | const bfd_build_id *exec_file_build_id |
241 | = build_id_bfd_get (current_program_space->exec_bfd ()); | |
98c59b52 PA |
242 | if (exec_file_build_id != nullptr) |
243 | { | |
244 | /* Prepend the target prefix, to force gdb_bfd_open to open the | |
245 | file on the remote file system (if indeed remote). */ | |
246 | std::string target_pid_exec_file | |
247 | = std::string (TARGET_SYSROOT_PREFIX) + pid_exec_file; | |
248 | ||
249 | gdb_bfd_ref_ptr abfd (gdb_bfd_open (target_pid_exec_file.c_str (), | |
250 | gnutarget, -1, false)); | |
251 | if (abfd != nullptr) | |
252 | { | |
253 | const bfd_build_id *target_exec_file_build_id | |
254 | = build_id_bfd_get (abfd.get ()); | |
a2fedca9 | 255 | |
98c59b52 PA |
256 | if (target_exec_file_build_id != nullptr) |
257 | { | |
258 | if (exec_file_build_id->size == target_exec_file_build_id->size | |
259 | && memcmp (exec_file_build_id->data, | |
260 | target_exec_file_build_id->data, | |
261 | exec_file_build_id->size) == 0) | |
262 | { | |
263 | /* Match. */ | |
264 | return; | |
265 | } | |
266 | else | |
267 | build_id_mismatch = true; | |
268 | } | |
269 | } | |
270 | } | |
a2fedca9 | 271 | |
98c59b52 | 272 | if (build_id_mismatch) |
a2fedca9 | 273 | { |
98c59b52 PA |
274 | std::string exec_file_target (pid_exec_file); |
275 | ||
276 | /* In case the exec file is not local, exec_file_target has to point at | |
277 | the target file system. */ | |
278 | if (is_target_filename (current_exec_file) && !target_filesystem_is_local ()) | |
279 | exec_file_target = TARGET_SYSROOT_PREFIX + exec_file_target; | |
280 | ||
a2fedca9 | 281 | warning |
0a278aa7 | 282 | (_("Build ID mismatch between current exec-file %ps\n" |
a2fedca9 PW |
283 | "and automatically determined exec-file %ps\n" |
284 | "exec-file-mismatch handling is currently \"%s\""), | |
285 | styled_string (file_name_style.style (), current_exec_file), | |
286 | styled_string (file_name_style.style (), exec_file_target.c_str ()), | |
287 | exec_file_mismatch_names[exec_file_mismatch_mode]); | |
288 | if (exec_file_mismatch_mode == exec_file_mismatch_ask) | |
289 | { | |
290 | symfile_add_flags add_flags = SYMFILE_MAINLINE; | |
291 | if (from_tty) | |
a8654e7d PW |
292 | { |
293 | add_flags |= SYMFILE_VERBOSE; | |
294 | add_flags |= SYMFILE_ALWAYS_CONFIRM; | |
295 | } | |
a2fedca9 PW |
296 | try |
297 | { | |
298 | symbol_file_add_main (exec_file_target.c_str (), add_flags); | |
299 | exec_file_attach (exec_file_target.c_str (), from_tty); | |
300 | } | |
301 | catch (gdb_exception_error &err) | |
302 | { | |
303 | warning (_("loading %ps %s"), | |
304 | styled_string (file_name_style.style (), | |
305 | exec_file_target.c_str ()), | |
306 | err.message != NULL ? err.what () : "error"); | |
307 | } | |
308 | } | |
309 | } | |
310 | } | |
311 | ||
312 | /* See gdbcore.h. */ | |
313 | ||
ecf45d2c SL |
314 | void |
315 | exec_file_locate_attach (int pid, int defer_bp_reset, int from_tty) | |
316 | { | |
797bc1cb | 317 | char *exec_file_target; |
ecf45d2c SL |
318 | symfile_add_flags add_flags = 0; |
319 | ||
320 | /* Do nothing if we already have an executable filename. */ | |
321 | if (get_exec_file (0) != NULL) | |
322 | return; | |
323 | ||
324 | /* Try to determine a filename from the process itself. */ | |
325 | exec_file_target = target_pid_to_exec_file (pid); | |
326 | if (exec_file_target == NULL) | |
57d1de9c | 327 | { |
ecf45d2c SL |
328 | warning (_("No executable has been specified and target does not " |
329 | "support\n" | |
330 | "determining executable automatically. " | |
331 | "Try using the \"file\" command.")); | |
332 | return; | |
57d1de9c | 333 | } |
88178e82 | 334 | |
797bc1cb TT |
335 | gdb::unique_xmalloc_ptr<char> exec_file_host |
336 | = exec_file_find (exec_file_target, NULL); | |
ecf45d2c SL |
337 | |
338 | if (defer_bp_reset) | |
339 | add_flags |= SYMFILE_DEFER_BP_RESET; | |
340 | ||
341 | if (from_tty) | |
342 | add_flags |= SYMFILE_VERBOSE; | |
343 | ||
344 | /* Attempt to open the exec file. */ | |
797bc1cb | 345 | try_open_exec_file (exec_file_host.get (), current_inferior (), add_flags); |
a10de604 GB |
346 | } |
347 | ||
907083d1 | 348 | /* Set FILENAME as the new exec file. |
c906108c | 349 | |
c5aa993b JM |
350 | This function is intended to be behave essentially the same |
351 | as exec_file_command, except that the latter will detect when | |
352 | a target is being debugged, and will ask the user whether it | |
353 | should be shut down first. (If the answer is "no", then the | |
354 | new file is ignored.) | |
c906108c | 355 | |
c5aa993b JM |
356 | This file is used by exec_file_command, to do the work of opening |
357 | and processing the exec file after any prompting has happened. | |
c906108c | 358 | |
c5aa993b JM |
359 | And, it is used by child_attach, when the attach command was |
360 | given a pid but not a exec pathname, and the attach command could | |
361 | figure out the pathname from the pid. (In this case, we shouldn't | |
362 | ask the user whether the current target should be shut down -- | |
907083d1 | 363 | we're supplying the exec pathname late for good reason.) */ |
c906108c SS |
364 | |
365 | void | |
5f08566b | 366 | exec_file_attach (const char *filename, int from_tty) |
c906108c | 367 | { |
7e10abd1 | 368 | /* First, acquire a reference to the exec_bfd. We release |
9b333ba3 TT |
369 | this at the end of the function; but acquiring it now lets the |
370 | BFD cache return it if this call refers to the same file. */ | |
7e10abd1 TT |
371 | gdb_bfd_ref_ptr exec_bfd_holder |
372 | = gdb_bfd_ref_ptr::new_reference (current_program_space->exec_bfd ()); | |
192b62ce | 373 | |
c906108c | 374 | /* Remove any previous exec file. */ |
8a4f1402 | 375 | current_program_space->exec_close (); |
c906108c SS |
376 | |
377 | /* Now open and digest the file the user requested, if any. */ | |
378 | ||
1adeb98a FN |
379 | if (!filename) |
380 | { | |
381 | if (from_tty) | |
6cb06a8c | 382 | gdb_printf (_("No executable file now.\n")); |
7a107747 DJ |
383 | |
384 | set_gdbarch_from_file (NULL); | |
1adeb98a FN |
385 | } |
386 | else | |
c906108c | 387 | { |
64c0b5de | 388 | int load_via_target = 0; |
14278e1f | 389 | const char *scratch_pathname, *canonical_pathname; |
c906108c | 390 | int scratch_chan; |
d18b8b7a | 391 | char **matching; |
c5aa993b | 392 | |
64c0b5de GB |
393 | if (is_target_filename (filename)) |
394 | { | |
395 | if (target_filesystem_is_local ()) | |
396 | filename += strlen (TARGET_SYSROOT_PREFIX); | |
397 | else | |
398 | load_via_target = 1; | |
399 | } | |
400 | ||
14278e1f | 401 | gdb::unique_xmalloc_ptr<char> canonical_storage, scratch_storage; |
64c0b5de | 402 | if (load_via_target) |
c5aa993b | 403 | { |
64c0b5de GB |
404 | /* gdb_bfd_fopen does not support "target:" filenames. */ |
405 | if (write_files) | |
406 | warning (_("writing into executable files is " | |
407 | "not supported for %s sysroots"), | |
408 | TARGET_SYSROOT_PREFIX); | |
409 | ||
14278e1f | 410 | scratch_pathname = filename; |
64c0b5de | 411 | scratch_chan = -1; |
64c0b5de | 412 | canonical_pathname = scratch_pathname; |
c5aa993b | 413 | } |
64c0b5de GB |
414 | else |
415 | { | |
416 | scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST, | |
417 | filename, write_files ? | |
418 | O_RDWR | O_BINARY : O_RDONLY | O_BINARY, | |
e0cc99a6 | 419 | &scratch_storage); |
64c0b5de GB |
420 | #if defined(__GO32__) || defined(_WIN32) || defined(__CYGWIN__) |
421 | if (scratch_chan < 0) | |
422 | { | |
96445f0b | 423 | int first_errno = errno; |
0ae1c716 | 424 | char *exename = (char *) alloca (strlen (filename) + 5); |
64c0b5de GB |
425 | |
426 | strcat (strcpy (exename, filename), ".exe"); | |
427 | scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST, | |
428 | exename, write_files ? | |
429 | O_RDWR | O_BINARY | |
430 | : O_RDONLY | O_BINARY, | |
e0cc99a6 | 431 | &scratch_storage); |
96445f0b HD |
432 | if (scratch_chan < 0) |
433 | errno = first_errno; | |
64c0b5de | 434 | } |
c906108c | 435 | #endif |
64c0b5de GB |
436 | if (scratch_chan < 0) |
437 | perror_with_name (filename); | |
a4453b7e | 438 | |
e0cc99a6 | 439 | scratch_pathname = scratch_storage.get (); |
a4453b7e | 440 | |
64c0b5de GB |
441 | /* gdb_bfd_open (and its variants) prefers canonicalized |
442 | pathname for better BFD caching. */ | |
14278e1f TT |
443 | canonical_storage = gdb_realpath (scratch_pathname); |
444 | canonical_pathname = canonical_storage.get (); | |
64c0b5de | 445 | } |
1f0c4988 | 446 | |
192b62ce | 447 | gdb_bfd_ref_ptr temp; |
64c0b5de | 448 | if (write_files && !load_via_target) |
192b62ce TT |
449 | temp = gdb_bfd_fopen (canonical_pathname, gnutarget, |
450 | FOPEN_RUB, scratch_chan); | |
1c00ec6b | 451 | else |
192b62ce | 452 | temp = gdb_bfd_open (canonical_pathname, gnutarget, scratch_chan); |
19f6550e | 453 | current_program_space->set_exec_bfd (std::move (temp)); |
c906108c | 454 | |
7e10abd1 | 455 | if (!current_program_space->exec_bfd ()) |
9fe4a216 | 456 | { |
a9680e0e TV |
457 | error (_("\"%s\": could not open as an executable file: %s."), |
458 | scratch_pathname, bfd_errmsg (bfd_get_error ())); | |
9fe4a216 | 459 | } |
c906108c | 460 | |
64c0b5de GB |
461 | /* gdb_realpath_keepfile resolves symlinks on the local |
462 | filesystem and so cannot be used for "target:" files. */ | |
c20cb686 | 463 | gdb_assert (current_program_space->exec_filename == nullptr); |
64c0b5de | 464 | if (load_via_target) |
c20cb686 | 465 | current_program_space->exec_filename |
7e10abd1 TT |
466 | = (make_unique_xstrdup |
467 | (bfd_get_filename (current_program_space->exec_bfd ()))); | |
64c0b5de | 468 | else |
c20cb686 TT |
469 | current_program_space->exec_filename |
470 | = gdb_realpath_keepfile (scratch_pathname); | |
1f0c4988 | 471 | |
7e10abd1 TT |
472 | if (!bfd_check_format_matches (current_program_space->exec_bfd (), |
473 | bfd_object, &matching)) | |
c906108c SS |
474 | { |
475 | /* Make sure to close exec_bfd, or else "run" might try to use | |
476 | it. */ | |
8a4f1402 | 477 | current_program_space->exec_close (); |
a9680e0e | 478 | error (_("\"%s\": not in executable format: %s"), scratch_pathname, |
803c08d0 | 479 | gdb_bfd_errmsg (bfd_get_error (), matching).c_str ()); |
c906108c SS |
480 | } |
481 | ||
7e10abd1 TT |
482 | target_section_table sections |
483 | = build_section_table (current_program_space->exec_bfd ()); | |
c906108c | 484 | |
7e10abd1 TT |
485 | current_program_space->ebfd_mtime |
486 | = bfd_get_mtime (current_program_space->exec_bfd ()); | |
c04ea773 | 487 | |
c906108c SS |
488 | validate_files (); |
489 | ||
7e10abd1 | 490 | set_gdbarch_from_file (current_program_space->exec_bfd ()); |
c906108c | 491 | |
07b82ea5 | 492 | /* Add the executable's sections to the current address spaces' |
6c95b8df PA |
493 | list of sections. This possibly pushes the exec_ops |
494 | target. */ | |
3769e227 TT |
495 | current_program_space->add_target_sections (¤t_program_space->ebfd, |
496 | sections); | |
c906108c SS |
497 | |
498 | /* Tell display code (if any) about the changed file name. */ | |
9a4105ab AC |
499 | if (deprecated_exec_file_display_hook) |
500 | (*deprecated_exec_file_display_hook) (filename); | |
c906108c | 501 | } |
9b333ba3 | 502 | |
ce7d4522 | 503 | bfd_cache_close_all (); |
76727919 | 504 | gdb::observers::executable_changed.notify (); |
c906108c SS |
505 | } |
506 | ||
507 | /* Process the first arg in ARGS as the new exec file. | |
508 | ||
c5aa993b JM |
509 | Note that we have to explicitly ignore additional args, since we can |
510 | be called from file_command(), which also calls symbol_file_command() | |
1adeb98a FN |
511 | which can take multiple args. |
512 | ||
0963b4bd | 513 | If ARGS is NULL, we just want to close the exec file. */ |
c906108c | 514 | |
1adeb98a | 515 | static void |
1d8b34a7 | 516 | exec_file_command (const char *args, int from_tty) |
c906108c | 517 | { |
55f6301a | 518 | if (from_tty && target_has_execution () |
4c42eaff DJ |
519 | && !query (_("A program is being debugged already.\n" |
520 | "Are you sure you want to change the file? "))) | |
521 | error (_("File not changed.")); | |
1adeb98a FN |
522 | |
523 | if (args) | |
524 | { | |
525 | /* Scan through the args and pick up the first non option arg | |
dda83cd7 | 526 | as the filename. */ |
1adeb98a | 527 | |
773a1edc TT |
528 | gdb_argv built_argv (args); |
529 | char **argv = built_argv.get (); | |
1adeb98a FN |
530 | |
531 | for (; (*argv != NULL) && (**argv == '-'); argv++) | |
dda83cd7 SM |
532 | {; |
533 | } | |
1adeb98a | 534 | if (*argv == NULL) |
dda83cd7 | 535 | error (_("No executable file name was specified")); |
1adeb98a | 536 | |
773a1edc TT |
537 | gdb::unique_xmalloc_ptr<char> filename (tilde_expand (*argv)); |
538 | exec_file_attach (filename.get (), from_tty); | |
1adeb98a FN |
539 | } |
540 | else | |
541 | exec_file_attach (NULL, from_tty); | |
c906108c SS |
542 | } |
543 | ||
0963b4bd | 544 | /* Set both the exec file and the symbol file, in one command. |
c906108c SS |
545 | What a novelty. Why did GDB go through four major releases before this |
546 | command was added? */ | |
547 | ||
548 | static void | |
1d8b34a7 | 549 | file_command (const char *arg, int from_tty) |
c906108c SS |
550 | { |
551 | /* FIXME, if we lose on reading the symbol file, we should revert | |
552 | the exec file, but that's rough. */ | |
553 | exec_file_command (arg, from_tty); | |
554 | symbol_file_command (arg, from_tty); | |
9a4105ab AC |
555 | if (deprecated_file_changed_hook) |
556 | deprecated_file_changed_hook (arg); | |
c906108c | 557 | } |
c906108c | 558 | \f |
c5aa993b | 559 | |
2d128614 | 560 | /* Builds a section table, given args BFD, TABLE. */ |
c906108c | 561 | |
2d128614 TT |
562 | target_section_table |
563 | build_section_table (struct bfd *some_bfd) | |
c906108c | 564 | { |
2d128614 TT |
565 | target_section_table table; |
566 | ||
8a6bb1d1 TT |
567 | for (asection *asect : gdb_bfd_sections (some_bfd)) |
568 | { | |
569 | flagword aflag; | |
570 | ||
571 | /* Check the section flags, but do not discard zero-length | |
572 | sections, since some symbols may still be attached to this | |
573 | section. For instance, we encountered on sparc-solaris 2.10 | |
574 | a shared library with an empty .bss section to which a symbol | |
575 | named "_end" was attached. The address of this symbol still | |
576 | needs to be relocated. */ | |
577 | aflag = bfd_section_flags (asect); | |
578 | if (!(aflag & SEC_ALLOC)) | |
579 | continue; | |
580 | ||
6be2a9ab TT |
581 | table.emplace_back (bfd_section_vma (asect), |
582 | bfd_section_vma (asect) + bfd_section_size (asect), | |
583 | asect); | |
8a6bb1d1 | 584 | } |
e2ff18a0 | 585 | |
2d128614 | 586 | return table; |
c906108c | 587 | } |
07b82ea5 PA |
588 | |
589 | /* Add the sections array defined by [SECTIONS..SECTIONS_END[ to the | |
590 | current set of target sections. */ | |
591 | ||
592 | void | |
3769e227 TT |
593 | program_space::add_target_sections (void *owner, |
594 | const target_section_table §ions) | |
07b82ea5 | 595 | { |
d7a78e5c | 596 | if (!sections.empty ()) |
07b82ea5 | 597 | { |
d7a78e5c | 598 | for (const target_section &s : sections) |
ed9eebaf | 599 | { |
02f7d26b AB |
600 | m_target_sections.push_back (s); |
601 | m_target_sections.back ().owner = owner; | |
ed9eebaf | 602 | } |
07b82ea5 | 603 | |
53af73bf | 604 | scoped_restore_current_pspace_and_thread restore_pspace_thread; |
5b6d1e4f | 605 | |
07b82ea5 | 606 | /* If these are the first file sections we can provide memory |
5b6d1e4f PA |
607 | from, push the file_stratum target. Must do this in all |
608 | inferiors sharing the program space. */ | |
609 | for (inferior *inf : all_inferiors ()) | |
610 | { | |
3769e227 | 611 | if (inf->pspace != this) |
5b6d1e4f PA |
612 | continue; |
613 | ||
614 | if (inf->target_is_pushed (&exec_ops)) | |
615 | continue; | |
616 | ||
617 | switch_to_inferior_no_thread (inf); | |
02980c56 | 618 | inf->push_target (&exec_ops); |
5b6d1e4f | 619 | } |
07b82ea5 PA |
620 | } |
621 | } | |
622 | ||
76ad5e1e NB |
623 | /* Add the sections of OBJFILE to the current set of target sections. */ |
624 | ||
625 | void | |
d9eebde0 | 626 | program_space::add_target_sections (struct objfile *objfile) |
76ad5e1e | 627 | { |
76ad5e1e | 628 | struct obj_section *osect; |
76ad5e1e | 629 | |
91840ee3 | 630 | gdb_assert (objfile != nullptr); |
76ad5e1e NB |
631 | |
632 | /* Compute the number of sections to add. */ | |
76ad5e1e NB |
633 | ALL_OBJFILE_OSECTIONS (objfile, osect) |
634 | { | |
fd361982 | 635 | if (bfd_section_size (osect->the_bfd_section) == 0) |
76ad5e1e NB |
636 | continue; |
637 | ||
0c1bcd23 | 638 | m_target_sections.emplace_back (osect->addr (), osect->endaddr (), |
02f7d26b | 639 | osect->the_bfd_section, (void *) objfile); |
76ad5e1e NB |
640 | } |
641 | } | |
642 | ||
046ac79f JK |
643 | /* Remove all target sections owned by OWNER. |
644 | OWNER must be the same value passed to add_target_sections. */ | |
07b82ea5 PA |
645 | |
646 | void | |
2a3f84af | 647 | program_space::remove_target_sections (void *owner) |
07b82ea5 | 648 | { |
046ac79f JK |
649 | gdb_assert (owner != NULL); |
650 | ||
02f7d26b AB |
651 | auto it = std::remove_if (m_target_sections.begin (), |
652 | m_target_sections.end (), | |
bb2a6777 TT |
653 | [&] (target_section §) |
654 | { | |
655 | return sect.owner == owner; | |
656 | }); | |
02f7d26b | 657 | m_target_sections.erase (it, m_target_sections.end ()); |
bb2a6777 TT |
658 | |
659 | /* If we don't have any more sections to read memory from, | |
660 | remove the file_stratum target from the stack of each | |
661 | inferior sharing the program space. */ | |
02f7d26b | 662 | if (m_target_sections.empty ()) |
07b82ea5 | 663 | { |
bb2a6777 | 664 | scoped_restore_current_pspace_and_thread restore_pspace_thread; |
07b82ea5 | 665 | |
bb2a6777 | 666 | for (inferior *inf : all_inferiors ()) |
6c95b8df | 667 | { |
2a3f84af | 668 | if (inf->pspace != this) |
bb2a6777 | 669 | continue; |
6c95b8df | 670 | |
bb2a6777 | 671 | switch_to_inferior_no_thread (inf); |
fadf6add | 672 | inf->unpush_target (&exec_ops); |
6c95b8df | 673 | } |
07b82ea5 PA |
674 | } |
675 | } | |
676 | ||
5b6d1e4f PA |
677 | /* See exec.h. */ |
678 | ||
679 | void | |
82d1f134 | 680 | exec_on_vfork (inferior *vfork_child) |
5b6d1e4f | 681 | { |
82d1f134 SM |
682 | if (!vfork_child->pspace->target_sections ().empty ()) |
683 | vfork_child->push_target (&exec_ops); | |
5b6d1e4f PA |
684 | } |
685 | ||
c906108c | 686 | \f |
348f8c02 | 687 | |
1ca49d37 YQ |
688 | enum target_xfer_status |
689 | exec_read_partial_read_only (gdb_byte *readbuf, ULONGEST offset, | |
690 | ULONGEST len, ULONGEST *xfered_len) | |
691 | { | |
692 | /* It's unduly pedantic to refuse to look at the executable for | |
693 | read-only pieces; so do the equivalent of readonly regions aka | |
694 | QTro packet. */ | |
7e10abd1 | 695 | if (current_program_space->exec_bfd () != NULL) |
1ca49d37 YQ |
696 | { |
697 | asection *s; | |
698 | bfd_size_type size; | |
699 | bfd_vma vma; | |
700 | ||
7e10abd1 | 701 | for (s = current_program_space->exec_bfd ()->sections; s; s = s->next) |
1ca49d37 YQ |
702 | { |
703 | if ((s->flags & SEC_LOAD) == 0 | |
704 | || (s->flags & SEC_READONLY) == 0) | |
705 | continue; | |
706 | ||
707 | vma = s->vma; | |
fd361982 | 708 | size = bfd_section_size (s); |
1ca49d37 YQ |
709 | if (vma <= offset && offset < (vma + size)) |
710 | { | |
711 | ULONGEST amt; | |
712 | ||
713 | amt = (vma + size) - offset; | |
714 | if (amt > len) | |
715 | amt = len; | |
716 | ||
7e10abd1 | 717 | amt = bfd_get_section_contents (current_program_space->exec_bfd (), s, |
1ca49d37 YQ |
718 | readbuf, offset - vma, amt); |
719 | ||
720 | if (amt == 0) | |
721 | return TARGET_XFER_EOF; | |
722 | else | |
723 | { | |
724 | *xfered_len = amt; | |
725 | return TARGET_XFER_OK; | |
726 | } | |
727 | } | |
728 | } | |
729 | } | |
730 | ||
731 | /* Indicate failure to find the requested memory block. */ | |
732 | return TARGET_XFER_E_IO; | |
733 | } | |
734 | ||
a79b1bc6 | 735 | /* Return all read-only memory ranges found in the target section |
5a2eb0ef | 736 | table defined by SECTIONS and SECTIONS_END, starting at (and |
a79b1bc6 | 737 | intersected with) MEMADDR for LEN bytes. */ |
5a2eb0ef | 738 | |
a79b1bc6 SM |
739 | static std::vector<mem_range> |
740 | section_table_available_memory (CORE_ADDR memaddr, ULONGEST len, | |
bb2a6777 | 741 | const target_section_table §ions) |
e6ca34fc | 742 | { |
a79b1bc6 | 743 | std::vector<mem_range> memory; |
e6ca34fc | 744 | |
d7a78e5c | 745 | for (const target_section &p : sections) |
e6ca34fc | 746 | { |
bb2a6777 | 747 | if ((bfd_section_flags (p.the_bfd_section) & SEC_READONLY) == 0) |
e6ca34fc PA |
748 | continue; |
749 | ||
750 | /* Copy the meta-data, adjusted. */ | |
bb2a6777 | 751 | if (mem_ranges_overlap (p.addr, p.endaddr - p.addr, memaddr, len)) |
e6ca34fc PA |
752 | { |
753 | ULONGEST lo1, hi1, lo2, hi2; | |
e6ca34fc PA |
754 | |
755 | lo1 = memaddr; | |
756 | hi1 = memaddr + len; | |
757 | ||
bb2a6777 TT |
758 | lo2 = p.addr; |
759 | hi2 = p.endaddr; | |
e6ca34fc | 760 | |
a79b1bc6 SM |
761 | CORE_ADDR start = std::max (lo1, lo2); |
762 | int length = std::min (hi1, hi2) - start; | |
e6ca34fc | 763 | |
a79b1bc6 | 764 | memory.emplace_back (start, length); |
e6ca34fc PA |
765 | } |
766 | } | |
767 | ||
768 | return memory; | |
769 | } | |
770 | ||
1ee79381 YQ |
771 | enum target_xfer_status |
772 | section_table_read_available_memory (gdb_byte *readbuf, ULONGEST offset, | |
773 | ULONGEST len, ULONGEST *xfered_len) | |
774 | { | |
336aa7b7 | 775 | const target_section_table *table |
328d42d8 | 776 | = target_get_section_table (current_inferior ()->top_target ()); |
a79b1bc6 | 777 | std::vector<mem_range> available_memory |
bb2a6777 | 778 | = section_table_available_memory (offset, len, *table); |
1ee79381 | 779 | |
a79b1bc6 | 780 | normalize_mem_ranges (&available_memory); |
1ee79381 | 781 | |
a79b1bc6 | 782 | for (const mem_range &r : available_memory) |
1ee79381 | 783 | { |
a79b1bc6 | 784 | if (mem_ranges_overlap (r.start, r.length, offset, len)) |
1ee79381 YQ |
785 | { |
786 | CORE_ADDR end; | |
787 | enum target_xfer_status status; | |
788 | ||
789 | /* Get the intersection window. */ | |
a79b1bc6 | 790 | end = std::min<CORE_ADDR> (offset + len, r.start + r.length); |
1ee79381 YQ |
791 | |
792 | gdb_assert (end - offset <= len); | |
793 | ||
a79b1bc6 | 794 | if (offset >= r.start) |
1ee79381 YQ |
795 | status = exec_read_partial_read_only (readbuf, offset, |
796 | end - offset, | |
797 | xfered_len); | |
798 | else | |
799 | { | |
a79b1bc6 | 800 | *xfered_len = r.start - offset; |
bc113b4e | 801 | status = TARGET_XFER_UNAVAILABLE; |
1ee79381 | 802 | } |
1ee79381 YQ |
803 | return status; |
804 | } | |
805 | } | |
1ee79381 YQ |
806 | |
807 | *xfered_len = len; | |
bc113b4e | 808 | return TARGET_XFER_UNAVAILABLE; |
1ee79381 YQ |
809 | } |
810 | ||
9b409511 | 811 | enum target_xfer_status |
07b82ea5 | 812 | section_table_xfer_memory_partial (gdb_byte *readbuf, const gdb_byte *writebuf, |
b55e14c7 | 813 | ULONGEST offset, ULONGEST len, |
9b409511 | 814 | ULONGEST *xfered_len, |
bb2a6777 | 815 | const target_section_table §ions, |
e56cb451 KB |
816 | gdb::function_view<bool |
817 | (const struct target_section *)> match_cb) | |
c906108c | 818 | { |
020cc13c | 819 | int res; |
07b82ea5 PA |
820 | ULONGEST memaddr = offset; |
821 | ULONGEST memend = memaddr + len; | |
c906108c | 822 | |
e2ff18a0 | 823 | gdb_assert (len != 0); |
c906108c | 824 | |
d7a78e5c | 825 | for (const target_section &p : sections) |
c906108c | 826 | { |
bb2a6777 | 827 | struct bfd_section *asect = p.the_bfd_section; |
2b2848e2 DE |
828 | bfd *abfd = asect->owner; |
829 | ||
bb2a6777 | 830 | if (match_cb != nullptr && !match_cb (&p)) |
0963b4bd | 831 | continue; /* not the section we need. */ |
bb2a6777 | 832 | if (memaddr >= p.addr) |
dda83cd7 | 833 | { |
bb2a6777 | 834 | if (memend <= p.endaddr) |
3db26b01 JB |
835 | { |
836 | /* Entire transfer is within this section. */ | |
07b82ea5 | 837 | if (writebuf) |
2b2848e2 | 838 | res = bfd_set_section_contents (abfd, asect, |
bb2a6777 | 839 | writebuf, memaddr - p.addr, |
85302095 AC |
840 | len); |
841 | else | |
2b2848e2 | 842 | res = bfd_get_section_contents (abfd, asect, |
bb2a6777 | 843 | readbuf, memaddr - p.addr, |
85302095 | 844 | len); |
9b409511 YQ |
845 | |
846 | if (res != 0) | |
847 | { | |
848 | *xfered_len = len; | |
849 | return TARGET_XFER_OK; | |
850 | } | |
851 | else | |
852 | return TARGET_XFER_EOF; | |
3db26b01 | 853 | } |
bb2a6777 | 854 | else if (memaddr >= p.endaddr) |
3db26b01 JB |
855 | { |
856 | /* This section ends before the transfer starts. */ | |
857 | continue; | |
858 | } | |
859 | else | |
860 | { | |
861 | /* This section overlaps the transfer. Just do half. */ | |
bb2a6777 | 862 | len = p.endaddr - memaddr; |
07b82ea5 | 863 | if (writebuf) |
2b2848e2 | 864 | res = bfd_set_section_contents (abfd, asect, |
bb2a6777 | 865 | writebuf, memaddr - p.addr, |
85302095 AC |
866 | len); |
867 | else | |
2b2848e2 | 868 | res = bfd_get_section_contents (abfd, asect, |
bb2a6777 | 869 | readbuf, memaddr - p.addr, |
85302095 | 870 | len); |
9b409511 YQ |
871 | if (res != 0) |
872 | { | |
873 | *xfered_len = len; | |
874 | return TARGET_XFER_OK; | |
875 | } | |
876 | else | |
877 | return TARGET_XFER_EOF; | |
3db26b01 | 878 | } |
dda83cd7 | 879 | } |
c906108c SS |
880 | } |
881 | ||
9b409511 | 882 | return TARGET_XFER_EOF; /* We can't help. */ |
c906108c | 883 | } |
348f8c02 | 884 | |
f6ac5f3d PA |
885 | enum target_xfer_status |
886 | exec_target::xfer_partial (enum target_object object, | |
887 | const char *annex, gdb_byte *readbuf, | |
888 | const gdb_byte *writebuf, | |
889 | ULONGEST offset, ULONGEST len, ULONGEST *xfered_len) | |
348f8c02 | 890 | { |
19cf757a | 891 | const target_section_table *table = target_get_section_table (this); |
07b82ea5 PA |
892 | |
893 | if (object == TARGET_OBJECT_MEMORY) | |
894 | return section_table_xfer_memory_partial (readbuf, writebuf, | |
9b409511 | 895 | offset, len, xfered_len, |
bb2a6777 | 896 | *table); |
07b82ea5 | 897 | else |
2ed4b548 | 898 | return TARGET_XFER_E_IO; |
348f8c02 | 899 | } |
c906108c | 900 | \f |
c5aa993b | 901 | |
c906108c | 902 | void |
19cf757a | 903 | print_section_info (const target_section_table *t, bfd *abfd) |
c906108c | 904 | { |
5af949e3 | 905 | struct gdbarch *gdbarch = gdbarch_from_bfd (abfd); |
17a912b6 | 906 | /* FIXME: 16 is not wide enough when gdbarch_addr_bit > 64. */ |
5af949e3 | 907 | int wid = gdbarch_addr_bit (gdbarch) <= 32 ? 8 : 16; |
c906108c | 908 | |
6cb06a8c TT |
909 | gdb_printf ("\t`%ps', ", |
910 | styled_string (file_name_style.style (), | |
911 | bfd_get_filename (abfd))); | |
1285ce86 | 912 | gdb_stdout->wrap_here (8); |
6cb06a8c | 913 | gdb_printf (_("file type %s.\n"), bfd_get_target (abfd)); |
7e10abd1 | 914 | if (abfd == current_program_space->exec_bfd ()) |
51bee8e9 | 915 | { |
3e43a32a MS |
916 | /* gcc-3.4 does not like the initialization in |
917 | <p == t->sections_end>. */ | |
d904de5b | 918 | bfd_vma displacement = 0; |
2f1bdd26 | 919 | bfd_vma entry_point; |
bb2a6777 | 920 | bool found = false; |
51bee8e9 | 921 | |
d7a78e5c | 922 | for (const target_section &p : *t) |
51bee8e9 | 923 | { |
bb2a6777 | 924 | struct bfd_section *psect = p.the_bfd_section; |
51bee8e9 | 925 | |
fd361982 | 926 | if ((bfd_section_flags (psect) & (SEC_ALLOC | SEC_LOAD)) |
51bee8e9 JK |
927 | != (SEC_ALLOC | SEC_LOAD)) |
928 | continue; | |
929 | ||
fd361982 AM |
930 | if (bfd_section_vma (psect) <= abfd->start_address |
931 | && abfd->start_address < (bfd_section_vma (psect) | |
932 | + bfd_section_size (psect))) | |
51bee8e9 | 933 | { |
bb2a6777 TT |
934 | displacement = p.addr - bfd_section_vma (psect); |
935 | found = true; | |
51bee8e9 JK |
936 | break; |
937 | } | |
938 | } | |
bb2a6777 | 939 | if (!found) |
a2fedca9 PW |
940 | warning (_("Cannot find section for the entry point of %ps."), |
941 | styled_string (file_name_style.style (), | |
942 | bfd_get_filename (abfd))); | |
51bee8e9 | 943 | |
2f1bdd26 MGD |
944 | entry_point = gdbarch_addr_bits_remove (gdbarch, |
945 | bfd_get_start_address (abfd) | |
946 | + displacement); | |
6cb06a8c TT |
947 | gdb_printf (_("\tEntry point: %s\n"), |
948 | paddress (gdbarch, entry_point)); | |
51bee8e9 | 949 | } |
d7a78e5c | 950 | for (const target_section &p : *t) |
c906108c | 951 | { |
bb2a6777 | 952 | struct bfd_section *psect = p.the_bfd_section; |
2b2848e2 DE |
953 | bfd *pbfd = psect->owner; |
954 | ||
6cb06a8c TT |
955 | gdb_printf ("\t%s", hex_string_custom (p.addr, wid)); |
956 | gdb_printf (" - %s", hex_string_custom (p.endaddr, wid)); | |
bcf16802 KB |
957 | |
958 | /* FIXME: A format of "08l" is not wide enough for file offsets | |
959 | larger than 4GB. OTOH, making it "016l" isn't desirable either | |
960 | since most output will then be much wider than necessary. It | |
961 | may make sense to test the size of the file and choose the | |
962 | format string accordingly. */ | |
a3f17187 | 963 | /* FIXME: i18n: Need to rewrite this sentence. */ |
c906108c | 964 | if (info_verbose) |
6cb06a8c TT |
965 | gdb_printf (" @ %s", |
966 | hex_string_custom (psect->filepos, 8)); | |
967 | gdb_printf (" is %s", bfd_section_name (psect)); | |
2b2848e2 | 968 | if (pbfd != abfd) |
6cb06a8c TT |
969 | gdb_printf (" in %ps", |
970 | styled_string (file_name_style.style (), | |
971 | bfd_get_filename (pbfd))); | |
972 | gdb_printf ("\n"); | |
c906108c SS |
973 | } |
974 | } | |
975 | ||
f6ac5f3d PA |
976 | void |
977 | exec_target::files_info () | |
c906108c | 978 | { |
7e10abd1 | 979 | if (current_program_space->exec_bfd ()) |
02f7d26b | 980 | print_section_info (¤t_program_space->target_sections (), |
7e10abd1 | 981 | current_program_space->exec_bfd ()); |
57008375 | 982 | else |
0426ad51 | 983 | gdb_puts (_("\t<no file loaded>\n")); |
c906108c SS |
984 | } |
985 | ||
986 | static void | |
0b39b52e | 987 | set_section_command (const char *args, int from_tty) |
c906108c | 988 | { |
0b39b52e | 989 | const char *secname; |
c906108c SS |
990 | |
991 | if (args == 0) | |
8a3fe4f8 | 992 | error (_("Must specify section name and its virtual address")); |
c906108c | 993 | |
0963b4bd | 994 | /* Parse out section name. */ |
c5aa993b | 995 | for (secname = args; !isspace (*args); args++); |
dd80d750 | 996 | unsigned seclen = args - secname; |
c906108c | 997 | |
0963b4bd | 998 | /* Parse out new virtual address. */ |
dd80d750 | 999 | CORE_ADDR secaddr = parse_and_eval_address (args); |
c906108c | 1000 | |
02f7d26b | 1001 | for (target_section &p : current_program_space->target_sections ()) |
c5aa993b | 1002 | { |
bb2a6777 TT |
1003 | if (!strncmp (secname, bfd_section_name (p.the_bfd_section), seclen) |
1004 | && bfd_section_name (p.the_bfd_section)[seclen] == '\0') | |
c5aa993b | 1005 | { |
dd80d750 | 1006 | long offset = secaddr - p.addr; |
bb2a6777 TT |
1007 | p.addr += offset; |
1008 | p.endaddr += offset; | |
c5aa993b | 1009 | if (from_tty) |
f6ac5f3d | 1010 | exec_ops.files_info (); |
c5aa993b JM |
1011 | return; |
1012 | } | |
c906108c | 1013 | } |
dd80d750 AB |
1014 | |
1015 | std::string secprint (secname, seclen); | |
1016 | error (_("Section %s not found"), secprint.c_str ()); | |
c906108c SS |
1017 | } |
1018 | ||
30510692 DJ |
1019 | /* If we can find a section in FILENAME with BFD index INDEX, adjust |
1020 | it to ADDRESS. */ | |
c1bd25fd DJ |
1021 | |
1022 | void | |
1023 | exec_set_section_address (const char *filename, int index, CORE_ADDR address) | |
1024 | { | |
02f7d26b | 1025 | for (target_section &p : current_program_space->target_sections ()) |
c1bd25fd | 1026 | { |
c7e97679 | 1027 | if (filename_cmp (filename, |
bb2a6777 TT |
1028 | bfd_get_filename (p.the_bfd_section->owner)) == 0 |
1029 | && index == p.the_bfd_section->index) | |
c1bd25fd | 1030 | { |
bb2a6777 TT |
1031 | p.endaddr += address - p.addr; |
1032 | p.addr = address; | |
c1bd25fd DJ |
1033 | } |
1034 | } | |
1035 | } | |
1036 | ||
57810aa7 | 1037 | bool |
f6ac5f3d | 1038 | exec_target::has_memory () |
c35b1492 PA |
1039 | { |
1040 | /* We can provide memory if we have any file/target sections to read | |
1041 | from. */ | |
02f7d26b | 1042 | return !current_program_space->target_sections ().empty (); |
c35b1492 PA |
1043 | } |
1044 | ||
24f5300a | 1045 | gdb::unique_xmalloc_ptr<char> |
f6ac5f3d | 1046 | exec_target::make_corefile_notes (bfd *obfd, int *note_size) |
83814951 TT |
1047 | { |
1048 | error (_("Can't create a corefile")); | |
1049 | } | |
be4d1333 | 1050 | |
f6ac5f3d PA |
1051 | int |
1052 | exec_target::find_memory_regions (find_memory_region_ftype func, void *data) | |
c906108c | 1053 | { |
f6ac5f3d | 1054 | return objfile_find_memory_regions (this, func, data); |
c906108c SS |
1055 | } |
1056 | ||
6c265988 | 1057 | void _initialize_exec (); |
c906108c | 1058 | void |
6c265988 | 1059 | _initialize_exec () |
c906108c SS |
1060 | { |
1061 | struct cmd_list_element *c; | |
1062 | ||
c906108c SS |
1063 | if (!dbx_commands) |
1064 | { | |
1a966eab AC |
1065 | c = add_cmd ("file", class_files, file_command, _("\ |
1066 | Use FILE as program to be debugged.\n\ | |
c906108c SS |
1067 | It is read for its symbols, for getting the contents of pure memory,\n\ |
1068 | and it is the program executed when you use the `run' command.\n\ | |
1069 | If FILE cannot be found as specified, your execution directory path\n\ | |
1070 | ($PATH) is searched for a command of that name.\n\ | |
1a966eab | 1071 | No arg means to have no executable file and no symbols."), &cmdlist); |
5ba2abeb | 1072 | set_cmd_completer (c, filename_completer); |
c906108c SS |
1073 | } |
1074 | ||
1a966eab AC |
1075 | c = add_cmd ("exec-file", class_files, exec_file_command, _("\ |
1076 | Use FILE as program for getting contents of pure memory.\n\ | |
c906108c SS |
1077 | If FILE cannot be found as specified, your execution directory path\n\ |
1078 | is searched for a command of that name.\n\ | |
1a966eab | 1079 | No arg means have no executable file."), &cmdlist); |
5ba2abeb | 1080 | set_cmd_completer (c, filename_completer); |
c906108c | 1081 | |
1bedd215 AC |
1082 | add_com ("section", class_files, set_section_command, _("\ |
1083 | Change the base address of section SECTION of the exec file to ADDR.\n\ | |
c906108c SS |
1084 | This can be used if the exec file does not contain section addresses,\n\ |
1085 | (such as in the a.out format), or when the addresses specified in the\n\ | |
1086 | file itself are wrong. Each section must be changed separately. The\n\ | |
1bedd215 | 1087 | ``info files'' command lists all the sections and their addresses.")); |
c906108c | 1088 | |
5bf193a2 AC |
1089 | add_setshow_boolean_cmd ("write", class_support, &write_files, _("\ |
1090 | Set writing into executable and core files."), _("\ | |
1091 | Show writing into executable and core files."), NULL, | |
1092 | NULL, | |
920d2a44 | 1093 | show_write_files, |
5bf193a2 | 1094 | &setlist, &showlist); |
c5aa993b | 1095 | |
a2fedca9 PW |
1096 | add_setshow_enum_cmd ("exec-file-mismatch", class_support, |
1097 | exec_file_mismatch_names, | |
1098 | &exec_file_mismatch, | |
1099 | _("\ | |
1100 | Set exec-file-mismatch handling (ask|warn|off)."), | |
1101 | _("\ | |
1102 | Show exec-file-mismatch handling (ask|warn|off)."), | |
1103 | _("\ | |
98c59b52 PA |
1104 | Specifies how to handle a mismatch between the current exec-file\n\ |
1105 | loaded by GDB and the exec-file automatically determined when attaching\n\ | |
a2fedca9 PW |
1106 | to a process:\n\n\ |
1107 | ask - warn the user and ask whether to load the determined exec-file.\n\ | |
1108 | warn - warn the user, but do not change the exec-file.\n\ | |
0a278aa7 PW |
1109 | off - do not check for mismatch.\n\ |
1110 | \n\ | |
1111 | GDB detects a mismatch by comparing the build IDs of the files.\n\ | |
1112 | If the user confirms loading the determined exec-file, then its symbols\n\ | |
1113 | will be loaded as well."), | |
a2fedca9 PW |
1114 | set_exec_file_mismatch_command, |
1115 | show_exec_file_mismatch_command, | |
1116 | &setlist, &showlist); | |
1117 | ||
d9f719f1 | 1118 | add_target (exec_target_info, exec_target_open, filename_completer); |
c906108c | 1119 | } |