mirror of
https://sourceware.org/git/binutils-gdb.git
synced 2024-12-27 04:52:05 +08:00
1d506c26d9
This commit is the result of the following actions: - Running gdb/copyright.py to update all of the copyright headers to include 2024, - Manually updating a few files the copyright.py script told me to update, these files had copyright headers embedded within the file, - Regenerating gdbsupport/Makefile.in to refresh it's copyright date, - Using grep to find other files that still mentioned 2023. If these files were updated last year from 2022 to 2023 then I've updated them this year to 2024. I'm sure I've probably missed some dates. Feel free to fix them up as you spot them.
130 lines
4.1 KiB
C
130 lines
4.1 KiB
C
/* Simulate breakpoints by patching locations in the target system, for GDB.
|
|
|
|
Copyright (C) 1990-2024 Free Software Foundation, Inc.
|
|
|
|
Contributed by Cygnus Support. Written by John Gilmore.
|
|
|
|
This file is part of GDB.
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>. */
|
|
|
|
#include "defs.h"
|
|
#include "symtab.h"
|
|
#include "breakpoint.h"
|
|
#include "inferior.h"
|
|
#include "target.h"
|
|
#include "gdbarch.h"
|
|
|
|
/* Insert a breakpoint on targets that don't have any better
|
|
breakpoint support. We read the contents of the target location
|
|
and stash it, then overwrite it with a breakpoint instruction.
|
|
BP_TGT->placed_address is the target location in the target
|
|
machine. BP_TGT->shadow_contents is some memory allocated for
|
|
saving the target contents. It is guaranteed by the caller to be
|
|
long enough to save BREAKPOINT_LEN bytes (this is accomplished via
|
|
BREAKPOINT_MAX). */
|
|
|
|
int
|
|
default_memory_insert_breakpoint (struct gdbarch *gdbarch,
|
|
struct bp_target_info *bp_tgt)
|
|
{
|
|
CORE_ADDR addr = bp_tgt->placed_address;
|
|
const unsigned char *bp;
|
|
gdb_byte *readbuf;
|
|
int bplen;
|
|
int val;
|
|
|
|
/* Determine appropriate breakpoint contents and size for this address. */
|
|
bp = gdbarch_sw_breakpoint_from_kind (gdbarch, bp_tgt->kind, &bplen);
|
|
|
|
/* Save the memory contents in the shadow_contents buffer and then
|
|
write the breakpoint instruction. */
|
|
readbuf = (gdb_byte *) alloca (bplen);
|
|
val = target_read_memory (addr, readbuf, bplen);
|
|
if (val == 0)
|
|
{
|
|
/* These must be set together, either before or after the shadow
|
|
read, so that if we're "reinserting" a breakpoint that
|
|
doesn't have a shadow yet, the breakpoint masking code inside
|
|
target_read_memory doesn't mask out this breakpoint using an
|
|
unfilled shadow buffer. The core may be trying to reinsert a
|
|
permanent breakpoint, for targets that support breakpoint
|
|
conditions/commands on the target side for some types of
|
|
breakpoints, such as target remote. */
|
|
bp_tgt->shadow_len = bplen;
|
|
memcpy (bp_tgt->shadow_contents, readbuf, bplen);
|
|
|
|
val = target_write_raw_memory (addr, bp, bplen);
|
|
}
|
|
|
|
return val;
|
|
}
|
|
|
|
|
|
int
|
|
default_memory_remove_breakpoint (struct gdbarch *gdbarch,
|
|
struct bp_target_info *bp_tgt)
|
|
{
|
|
int bplen;
|
|
|
|
gdbarch_sw_breakpoint_from_kind (gdbarch, bp_tgt->kind, &bplen);
|
|
|
|
return target_write_raw_memory (bp_tgt->placed_address, bp_tgt->shadow_contents,
|
|
bplen);
|
|
}
|
|
|
|
|
|
int
|
|
memory_insert_breakpoint (struct target_ops *ops, struct gdbarch *gdbarch,
|
|
struct bp_target_info *bp_tgt)
|
|
{
|
|
return gdbarch_memory_insert_breakpoint (gdbarch, bp_tgt);
|
|
}
|
|
|
|
int
|
|
memory_remove_breakpoint (struct target_ops *ops, struct gdbarch *gdbarch,
|
|
struct bp_target_info *bp_tgt,
|
|
enum remove_bp_reason reason)
|
|
{
|
|
return gdbarch_memory_remove_breakpoint (gdbarch, bp_tgt);
|
|
}
|
|
|
|
int
|
|
memory_validate_breakpoint (struct gdbarch *gdbarch,
|
|
struct bp_target_info *bp_tgt)
|
|
{
|
|
CORE_ADDR addr = bp_tgt->placed_address;
|
|
const gdb_byte *bp;
|
|
int val;
|
|
int bplen;
|
|
gdb_byte cur_contents[BREAKPOINT_MAX];
|
|
|
|
/* Determine appropriate breakpoint contents and size for this
|
|
address. */
|
|
bp = gdbarch_breakpoint_from_pc (gdbarch, &addr, &bplen);
|
|
|
|
if (bp == NULL)
|
|
return 0;
|
|
|
|
/* Make sure we see the memory breakpoints. */
|
|
scoped_restore restore_memory
|
|
= make_scoped_restore_show_memory_breakpoints (1);
|
|
val = target_read_memory (addr, cur_contents, bplen);
|
|
|
|
/* If our breakpoint is no longer at the address, this means that
|
|
the program modified the code on us, so it is wrong to put back
|
|
the old value. */
|
|
return (val == 0 && memcmp (bp, cur_contents, bplen) == 0);
|
|
}
|