]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/mem-break.c
gas: introduce .errif and .warnif
[thirdparty/binutils-gdb.git] / gdb / mem-break.c
CommitLineData
c906108c 1/* Simulate breakpoints by patching locations in the target system, for GDB.
f4f9705a 2
d01e8234 3 Copyright (C) 1990-2025 Free Software Foundation, Inc.
f4f9705a 4
c906108c
SS
5 Contributed by Cygnus Support. Written by John Gilmore.
6
c5aa993b 7 This file is part of GDB.
c906108c 8
c5aa993b
JM
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
a9762ec7 11 the Free Software Foundation; either version 3 of the License, or
c5aa993b 12 (at your option) any later version.
c906108c 13
c5aa993b
JM
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
c906108c 18
c5aa993b 19 You should have received a copy of the GNU General Public License
a9762ec7 20 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c 21
c906108c
SS
22#include "symtab.h"
23#include "breakpoint.h"
24#include "inferior.h"
25#include "target.h"
0d12e84c
TT
26#include "gdbarch.h"
27
8181d85f
DJ
28/* Insert a breakpoint on targets that don't have any better
29 breakpoint support. We read the contents of the target location
30 and stash it, then overwrite it with a breakpoint instruction.
31 BP_TGT->placed_address is the target location in the target
32 machine. BP_TGT->shadow_contents is some memory allocated for
33 saving the target contents. It is guaranteed by the caller to be
34 long enough to save BREAKPOINT_LEN bytes (this is accomplished via
35 BREAKPOINT_MAX). */
c906108c
SS
36
37int
ae4b2284
MD
38default_memory_insert_breakpoint (struct gdbarch *gdbarch,
39 struct bp_target_info *bp_tgt)
c906108c 40{
ba7b109b 41 CORE_ADDR addr = bp_tgt->placed_address;
f4f9705a 42 const unsigned char *bp;
35c63cd8 43 gdb_byte *readbuf;
0d5ed153
MR
44 int bplen;
45 int val;
c906108c
SS
46
47 /* Determine appropriate breakpoint contents and size for this address. */
579c6ad9 48 bp = gdbarch_sw_breakpoint_from_kind (gdbarch, bp_tgt->kind, &bplen);
0d5ed153 49
35c63cd8
JB
50 /* Save the memory contents in the shadow_contents buffer and then
51 write the breakpoint instruction. */
224c3ddb 52 readbuf = (gdb_byte *) alloca (bplen);
0d5ed153 53 val = target_read_memory (addr, readbuf, bplen);
c906108c 54 if (val == 0)
35c63cd8 55 {
68901c4d
PA
56 /* These must be set together, either before or after the shadow
57 read, so that if we're "reinserting" a breakpoint that
58 doesn't have a shadow yet, the breakpoint masking code inside
59 target_read_memory doesn't mask out this breakpoint using an
60 unfilled shadow buffer. The core may be trying to reinsert a
61 permanent breakpoint, for targets that support breakpoint
62 conditions/commands on the target side for some types of
63 breakpoints, such as target remote. */
64 bp_tgt->shadow_len = bplen;
0d5ed153 65 memcpy (bp_tgt->shadow_contents, readbuf, bplen);
68901c4d 66
0d5ed153 67 val = target_write_raw_memory (addr, bp, bplen);
35c63cd8 68 }
c906108c
SS
69
70 return val;
71}
72
73
74int
ae4b2284
MD
75default_memory_remove_breakpoint (struct gdbarch *gdbarch,
76 struct bp_target_info *bp_tgt)
c906108c 77{
cd6c3b4f
YQ
78 int bplen;
79
579c6ad9 80 gdbarch_sw_breakpoint_from_kind (gdbarch, bp_tgt->kind, &bplen);
cd6c3b4f 81
f0ba3972 82 return target_write_raw_memory (bp_tgt->placed_address, bp_tgt->shadow_contents,
cd6c3b4f 83 bplen);
c906108c 84}
917317f4
JM
85
86
917317f4 87int
3db08215 88memory_insert_breakpoint (struct target_ops *ops, struct gdbarch *gdbarch,
a6d9a66e 89 struct bp_target_info *bp_tgt)
917317f4 90{
a6d9a66e 91 return gdbarch_memory_insert_breakpoint (gdbarch, bp_tgt);
917317f4
JM
92}
93
917317f4 94int
3db08215 95memory_remove_breakpoint (struct target_ops *ops, struct gdbarch *gdbarch,
73971819
PA
96 struct bp_target_info *bp_tgt,
97 enum remove_bp_reason reason)
917317f4 98{
a6d9a66e 99 return gdbarch_memory_remove_breakpoint (gdbarch, bp_tgt);
917317f4 100}
08351840
PA
101
102int
103memory_validate_breakpoint (struct gdbarch *gdbarch,
104 struct bp_target_info *bp_tgt)
105{
106 CORE_ADDR addr = bp_tgt->placed_address;
107 const gdb_byte *bp;
108 int val;
109 int bplen;
110 gdb_byte cur_contents[BREAKPOINT_MAX];
08351840
PA
111
112 /* Determine appropriate breakpoint contents and size for this
113 address. */
114 bp = gdbarch_breakpoint_from_pc (gdbarch, &addr, &bplen);
115
cd6c3b4f 116 if (bp == NULL)
08351840
PA
117 return 0;
118
119 /* Make sure we see the memory breakpoints. */
cb85b21b
TT
120 scoped_restore restore_memory
121 = make_scoped_restore_show_memory_breakpoints (1);
08351840
PA
122 val = target_read_memory (addr, cur_contents, bplen);
123
124 /* If our breakpoint is no longer at the address, this means that
125 the program modified the code on us, so it is wrong to put back
126 the old value. */
cb85b21b 127 return (val == 0 && memcmp (bp, cur_contents, bplen) == 0);
08351840 128}