static int gcore_create_callback (CORE_ADDR vaddr, unsigned long size, int read, int write, int exec, void *data) { bfd *obfd = data; asection *osec; flagword flags = SEC_ALLOC | SEC_HAS_CONTENTS | SEC_LOAD; /* If the memory segment has no permissions set, ignore it, otherwise when we later try to access it for read/write, we'll get an error or jam the kernel. */ if (read == 0 && write == 0 && exec == 0) { if (info_verbose) { fprintf_filtered (gdb_stdout, "Ignore segment, %s bytes at 0x%s\n", paddr_d (size), paddr_nz (vaddr)); } return 0; } if (write == 0) { /* See if this region of memory lies inside a known file on disk. If so, we can avoid copying its contents by clearing SEC_LOAD. */ struct objfile *objfile; struct obj_section *objsec; ALL_OBJSECTIONS (objfile, objsec) { bfd *abfd = objfile->obfd; asection *asec = objsec->the_bfd_section; bfd_vma align = (bfd_vma) 1 << bfd_get_section_alignment (abfd, asec); bfd_vma start = objsec->addr & -align; bfd_vma end = (objsec->endaddr + align - 1) & -align; /* Match if either the entire memory region lies inside the section (i.e. a mapping covering some pages of a large segment) or the entire section lies inside the memory region (i.e. a mapping covering multiple small sections). This BFD was synthesized from reading target memory, we don't want to omit that. */ if (((vaddr >= start && vaddr + size <= end) || (start >= vaddr && end <= vaddr + size)) && !(bfd_get_file_flags (abfd) & BFD_IN_MEMORY)) { flags &= ~SEC_LOAD; flags |= SEC_NEVER_LOAD; goto keep; /* break out of two nested for loops */ } } keep: flags |= SEC_READONLY; }
/* Print the contents of the target's AUXV on the specified file. */ int fprint_target_auxv (struct ui_file *file, struct target_ops *ops) { CORE_ADDR type, val; gdb_byte *data; int len = target_auxv_read (ops, &data); gdb_byte *ptr = data; int ents = 0; if (len <= 0) return len; while (target_auxv_parse (ops, &ptr, data + len, &type, &val) > 0) { extern int addressprint; const char *name = "???"; const char *description = ""; enum { dec, hex, str } flavor = hex; switch (type) { #define TAG(tag, text, kind) \ case tag: name = #tag; description = text; flavor = kind; break TAG (AT_NULL, _("End of vector"), hex); TAG (AT_IGNORE, _("Entry should be ignored"), hex); TAG (AT_EXECFD, _("File descriptor of program"), dec); TAG (AT_PHDR, _("Program headers for program"), hex); TAG (AT_PHENT, _("Size of program header entry"), dec); TAG (AT_PHNUM, _("Number of program headers"), dec); TAG (AT_PAGESZ, _("System page size"), dec); TAG (AT_BASE, _("Base address of interpreter"), hex); TAG (AT_FLAGS, _("Flags"), hex); TAG (AT_ENTRY, _("Entry point of program"), hex); TAG (AT_NOTELF, _("Program is not ELF"), dec); TAG (AT_UID, _("Real user ID"), dec); TAG (AT_EUID, _("Effective user ID"), dec); TAG (AT_GID, _("Real group ID"), dec); TAG (AT_EGID, _("Effective group ID"), dec); TAG (AT_CLKTCK, _("Frequency of times()"), dec); TAG (AT_PLATFORM, _("String identifying platform"), str); TAG (AT_HWCAP, _("Machine-dependent CPU capability hints"), hex); TAG (AT_FPUCW, _("Used FPU control word"), dec); TAG (AT_DCACHEBSIZE, _("Data cache block size"), dec); TAG (AT_ICACHEBSIZE, _("Instruction cache block size"), dec); TAG (AT_UCACHEBSIZE, _("Unified cache block size"), dec); TAG (AT_IGNOREPPC, _("Entry should be ignored"), dec); TAG (AT_SYSINFO, _("Special system info/entry points"), hex); TAG (AT_SYSINFO_EHDR, _("System-supplied DSO's ELF header"), hex); TAG (AT_SECURE, _("Boolean, was exec setuid-like?"), dec); TAG (AT_SUN_UID, _("Effective user ID"), dec); TAG (AT_SUN_RUID, _("Real user ID"), dec); TAG (AT_SUN_GID, _("Effective group ID"), dec); TAG (AT_SUN_RGID, _("Real group ID"), dec); TAG (AT_SUN_LDELF, _("Dynamic linker's ELF header"), hex); TAG (AT_SUN_LDSHDR, _("Dynamic linker's section headers"), hex); TAG (AT_SUN_LDNAME, _("String giving name of dynamic linker"), str); TAG (AT_SUN_LPAGESZ, _("Large pagesize"), dec); TAG (AT_SUN_PLATFORM, _("Platform name string"), str); TAG (AT_SUN_HWCAP, _("Machine-dependent CPU capability hints"), hex); TAG (AT_SUN_IFLUSH, _("Should flush icache?"), dec); TAG (AT_SUN_CPU, _("CPU name string"), str); TAG (AT_SUN_EMUL_ENTRY, _("COFF entry point address"), hex); TAG (AT_SUN_EMUL_EXECFD, _("COFF executable file descriptor"), dec); TAG (AT_SUN_EXECNAME, _("Canonicalized file name given to execve"), str); TAG (AT_SUN_MMU, _("String for name of MMU module"), str); TAG (AT_SUN_LDDATA, _("Dynamic linker's data segment address"), hex); } fprintf_filtered (file, "%-4s %-20s %-30s ", paddr_d (type), name, description); switch (flavor) { case dec: fprintf_filtered (file, "%s\n", paddr_d (val)); break; case hex: fprintf_filtered (file, "0x%s\n", paddr_nz (val)); break; case str: if (addressprint) fprintf_filtered (file, "0x%s", paddr_nz (val)); val_print_string (val, -1, 1, file); fprintf_filtered (file, "\n"); break; } ++ents; } xfree (data); return ents; }