Remote non-stop mode support.
[deliverable/binutils-gdb.git] / gdb / exec.c
CommitLineData
c906108c 1/* Work with executable files, for GDB.
4646aa9d 2
6aba47ca 3 Copyright (C) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997,
9b254dd1
DJ
4 1998, 1999, 2000, 2001, 2002, 2003, 2007, 2008
5 Free Software Foundation, Inc.
c906108c 6
c5aa993b 7 This file is part of GDB.
c906108c 8
c5aa993b
JM
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
a9762ec7 11 the Free Software Foundation; either version 3 of the License, or
c5aa993b 12 (at your option) any later version.
c906108c 13
c5aa993b
JM
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
c906108c 18
c5aa993b 19 You should have received a copy of the GNU General Public License
a9762ec7 20 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
21
22#include "defs.h"
23#include "frame.h"
24#include "inferior.h"
25#include "target.h"
26#include "gdbcmd.h"
27#include "language.h"
28#include "symfile.h"
29#include "objfiles.h"
c5f0f3d0 30#include "completer.h"
fd0407d6 31#include "value.h"
4646aa9d 32#include "exec.h"
ea53e89f 33#include "observer.h"
dacec2a8 34#include "arch-utils.h"
c906108c 35
c906108c 36#include <fcntl.h>
dbda9972 37#include "readline/readline.h"
c906108c
SS
38#include "gdb_string.h"
39
40#include "gdbcore.h"
41
42#include <ctype.h>
43#include "gdb_stat.h"
c906108c
SS
44
45#include "xcoffsolib.h"
46
a14ed312 47struct vmap *map_vmap (bfd *, bfd *);
c906108c 48
9a4105ab 49void (*deprecated_file_changed_hook) (char *);
c906108c
SS
50
51/* Prototypes for local functions */
52
a14ed312 53static void exec_close (int);
c906108c 54
a14ed312 55static void file_command (char *, int);
c906108c 56
a14ed312 57static void set_section_command (char *, int);
c906108c 58
a14ed312 59static void exec_files_info (struct target_ops *);
c906108c 60
a14ed312 61static void init_exec_ops (void);
c906108c 62
a14ed312 63void _initialize_exec (void);
c906108c 64
c906108c
SS
65/* The target vector for executable files. */
66
67struct target_ops exec_ops;
68
69/* The Binary File Descriptor handle for the executable file. */
70
71bfd *exec_bfd = NULL;
c04ea773 72long exec_bfd_mtime = 0;
c906108c
SS
73
74/* Whether to open exec and core files read-only or read-write. */
75
76int write_files = 0;
920d2a44
AC
77static void
78show_write_files (struct ui_file *file, int from_tty,
79 struct cmd_list_element *c, const char *value)
80{
81 fprintf_filtered (file, _("Writing into executable and core files is %s.\n"),
82 value);
83}
84
c906108c 85
c906108c
SS
86struct vmap *vmap;
87
4c42eaff 88static void
1adeb98a
FN
89exec_open (char *args, int from_tty)
90{
91 target_preopen (from_tty);
92 exec_file_attach (args, from_tty);
93}
94
c906108c 95static void
fba45db2 96exec_close (int quitting)
c906108c
SS
97{
98 int need_symtab_cleanup = 0;
99 struct vmap *vp, *nxt;
c5aa993b
JM
100
101 for (nxt = vmap; nxt != NULL;)
c906108c
SS
102 {
103 vp = nxt;
104 nxt = vp->nxt;
105
106 /* if there is an objfile associated with this bfd,
c5aa993b
JM
107 free_objfile() will do proper cleanup of objfile *and* bfd. */
108
c906108c
SS
109 if (vp->objfile)
110 {
111 free_objfile (vp->objfile);
112 need_symtab_cleanup = 1;
113 }
114 else if (vp->bfd != exec_bfd)
115 /* FIXME-leak: We should be freeing vp->name too, I think. */
116 if (!bfd_close (vp->bfd))
8a3fe4f8 117 warning (_("cannot close \"%s\": %s"),
c906108c
SS
118 vp->name, bfd_errmsg (bfd_get_error ()));
119
120 /* FIXME: This routine is #if 0'd in symfile.c. What should we
c5aa993b
JM
121 be doing here? Should we just free everything in
122 vp->objfile->symtabs? Should free_objfile do that?
123 FIXME-as-well: free_objfile already free'd vp->name, so it isn't
124 valid here. */
c906108c 125 free_named_symtabs (vp->name);
b8c9b27d 126 xfree (vp);
c906108c
SS
127 }
128
129 vmap = NULL;
130
131 if (exec_bfd)
132 {
133 char *name = bfd_get_filename (exec_bfd);
134
135 if (!bfd_close (exec_bfd))
8a3fe4f8 136 warning (_("cannot close \"%s\": %s"),
c906108c 137 name, bfd_errmsg (bfd_get_error ()));
b8c9b27d 138 xfree (name);
c906108c 139 exec_bfd = NULL;
c04ea773 140 exec_bfd_mtime = 0;
c906108c
SS
141 }
142
143 if (exec_ops.to_sections)
144 {
b8c9b27d 145 xfree (exec_ops.to_sections);
c906108c
SS
146 exec_ops.to_sections = NULL;
147 exec_ops.to_sections_end = NULL;
148 }
149}
150
1adeb98a
FN
151void
152exec_file_clear (int from_tty)
153{
154 /* Remove exec file. */
155 unpush_target (&exec_ops);
156
157 if (from_tty)
a3f17187 158 printf_unfiltered (_("No executable file now.\n"));
1adeb98a
FN
159}
160
c906108c
SS
161/* Process the first arg in ARGS as the new exec file.
162
c5aa993b
JM
163 This function is intended to be behave essentially the same
164 as exec_file_command, except that the latter will detect when
165 a target is being debugged, and will ask the user whether it
166 should be shut down first. (If the answer is "no", then the
167 new file is ignored.)
c906108c 168
c5aa993b
JM
169 This file is used by exec_file_command, to do the work of opening
170 and processing the exec file after any prompting has happened.
c906108c 171
c5aa993b
JM
172 And, it is used by child_attach, when the attach command was
173 given a pid but not a exec pathname, and the attach command could
174 figure out the pathname from the pid. (In this case, we shouldn't
175 ask the user whether the current target should be shut down --
1adeb98a
FN
176 we're supplying the exec pathname late for good reason.)
177
178 ARGS is assumed to be the filename. */
c906108c
SS
179
180void
1adeb98a 181exec_file_attach (char *filename, int from_tty)
c906108c 182{
c906108c
SS
183 /* Remove any previous exec file. */
184 unpush_target (&exec_ops);
185
186 /* Now open and digest the file the user requested, if any. */
187
1adeb98a
FN
188 if (!filename)
189 {
190 if (from_tty)
a3f17187 191 printf_unfiltered (_("No executable file now.\n"));
7a107747
DJ
192
193 set_gdbarch_from_file (NULL);
1adeb98a
FN
194 }
195 else
c906108c
SS
196 {
197 char *scratch_pathname;
198 int scratch_chan;
c5aa993b 199
014d698b 200 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST, filename,
c5aa993b 201 write_files ? O_RDWR | O_BINARY : O_RDONLY | O_BINARY, 0,
c906108c 202 &scratch_pathname);
cfc3008e 203#if defined(__GO32__) || defined(_WIN32) || defined(__CYGWIN__)
c906108c 204 if (scratch_chan < 0)
c5aa993b
JM
205 {
206 char *exename = alloca (strlen (filename) + 5);
207 strcat (strcpy (exename, filename), ".exe");
014d698b
EZ
208 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST, exename,
209 write_files ? O_RDWR | O_BINARY : O_RDONLY | O_BINARY, 0,
210 &scratch_pathname);
c5aa993b 211 }
c906108c
SS
212#endif
213 if (scratch_chan < 0)
214 perror_with_name (filename);
9f76c2cd
MM
215 exec_bfd = bfd_fopen (scratch_pathname, gnutarget,
216 write_files ? FOPEN_RUB : FOPEN_RB,
217 scratch_chan);
c906108c
SS
218
219 if (!exec_bfd)
8a3fe4f8 220 error (_("\"%s\": could not open as an executable file: %s"),
c906108c
SS
221 scratch_pathname, bfd_errmsg (bfd_get_error ()));
222
223 /* At this point, scratch_pathname and exec_bfd->name both point to the
c5aa993b
JM
224 same malloc'd string. However exec_close() will attempt to free it
225 via the exec_bfd->name pointer, so we need to make another copy and
226 leave exec_bfd as the new owner of the original copy. */
c2d11a7d 227 scratch_pathname = xstrdup (scratch_pathname);
b8c9b27d 228 make_cleanup (xfree, scratch_pathname);
c5aa993b 229
c906108c
SS
230 if (!bfd_check_format (exec_bfd, bfd_object))
231 {
232 /* Make sure to close exec_bfd, or else "run" might try to use
233 it. */
234 exec_close (0);
8a3fe4f8 235 error (_("\"%s\": not in executable format: %s"),
c906108c
SS
236 scratch_pathname, bfd_errmsg (bfd_get_error ()));
237 }
238
239 /* FIXME - This should only be run for RS6000, but the ifdef is a poor
c5aa993b 240 way to accomplish. */
52d16ba8 241#ifdef DEPRECATED_IBM6000_TARGET
c906108c
SS
242 /* Setup initial vmap. */
243
244 map_vmap (exec_bfd, 0);
245 if (vmap == NULL)
246 {
247 /* Make sure to close exec_bfd, or else "run" might try to use
248 it. */
249 exec_close (0);
8a3fe4f8 250 error (_("\"%s\": can't find the file sections: %s"),
c906108c
SS
251 scratch_pathname, bfd_errmsg (bfd_get_error ()));
252 }
52d16ba8 253#endif /* DEPRECATED_IBM6000_TARGET */
c906108c
SS
254
255 if (build_section_table (exec_bfd, &exec_ops.to_sections,
c5aa993b 256 &exec_ops.to_sections_end))
c906108c
SS
257 {
258 /* Make sure to close exec_bfd, or else "run" might try to use
259 it. */
260 exec_close (0);
8a3fe4f8 261 error (_("\"%s\": can't find the file sections: %s"),
c906108c
SS
262 scratch_pathname, bfd_errmsg (bfd_get_error ()));
263 }
264
c04ea773
DJ
265 exec_bfd_mtime = bfd_get_mtime (exec_bfd);
266
c906108c
SS
267 validate_files ();
268
269 set_gdbarch_from_file (exec_bfd);
270
271 push_target (&exec_ops);
272
273 /* Tell display code (if any) about the changed file name. */
9a4105ab
AC
274 if (deprecated_exec_file_display_hook)
275 (*deprecated_exec_file_display_hook) (filename);
c906108c 276 }
ce7d4522 277 bfd_cache_close_all ();
781b42b0 278 observer_notify_executable_changed ();
c906108c
SS
279}
280
281/* Process the first arg in ARGS as the new exec file.
282
c5aa993b
JM
283 Note that we have to explicitly ignore additional args, since we can
284 be called from file_command(), which also calls symbol_file_command()
1adeb98a
FN
285 which can take multiple args.
286
287 If ARGS is NULL, we just want to close the exec file. */
c906108c 288
1adeb98a 289static void
fba45db2 290exec_file_command (char *args, int from_tty)
c906108c 291{
1adeb98a
FN
292 char **argv;
293 char *filename;
4c42eaff
DJ
294
295 if (from_tty && target_has_execution
296 && !query (_("A program is being debugged already.\n"
297 "Are you sure you want to change the file? ")))
298 error (_("File not changed."));
1adeb98a
FN
299
300 if (args)
301 {
302 /* Scan through the args and pick up the first non option arg
303 as the filename. */
304
d1a41061 305 argv = gdb_buildargv (args);
1adeb98a
FN
306 make_cleanup_freeargv (argv);
307
308 for (; (*argv != NULL) && (**argv == '-'); argv++)
309 {;
310 }
311 if (*argv == NULL)
8a3fe4f8 312 error (_("No executable file name was specified"));
1adeb98a
FN
313
314 filename = tilde_expand (*argv);
315 make_cleanup (xfree, filename);
316 exec_file_attach (filename, from_tty);
317 }
318 else
319 exec_file_attach (NULL, from_tty);
c906108c
SS
320}
321
322/* Set both the exec file and the symbol file, in one command.
323 What a novelty. Why did GDB go through four major releases before this
324 command was added? */
325
326static void
fba45db2 327file_command (char *arg, int from_tty)
c906108c
SS
328{
329 /* FIXME, if we lose on reading the symbol file, we should revert
330 the exec file, but that's rough. */
331 exec_file_command (arg, from_tty);
332 symbol_file_command (arg, from_tty);
9a4105ab
AC
333 if (deprecated_file_changed_hook)
334 deprecated_file_changed_hook (arg);
c906108c 335}
c906108c 336\f
c5aa993b 337
c906108c
SS
338/* Locate all mappable sections of a BFD file.
339 table_pp_char is a char * to get it through bfd_map_over_sections;
340 we cast it back to its proper type. */
341
342static void
7be0c536
AC
343add_to_section_table (bfd *abfd, struct bfd_section *asect,
344 void *table_pp_char)
c906108c 345{
c5aa993b 346 struct section_table **table_pp = (struct section_table **) table_pp_char;
c906108c
SS
347 flagword aflag;
348
0f5d55d8
JB
349 /* Check the section flags, but do not discard zero-length sections, since
350 some symbols may still be attached to this section. For instance, we
351 encountered on sparc-solaris 2.10 a shared library with an empty .bss
352 section to which a symbol named "_end" was attached. The address
353 of this symbol still needs to be relocated. */
c906108c
SS
354 aflag = bfd_get_section_flags (abfd, asect);
355 if (!(aflag & SEC_ALLOC))
356 return;
0f5d55d8 357
c906108c
SS
358 (*table_pp)->bfd = abfd;
359 (*table_pp)->the_bfd_section = asect;
360 (*table_pp)->addr = bfd_section_vma (abfd, asect);
361 (*table_pp)->endaddr = (*table_pp)->addr + bfd_section_size (abfd, asect);
362 (*table_pp)++;
363}
364
365/* Builds a section table, given args BFD, SECTABLE_PTR, SECEND_PTR.
366 Returns 0 if OK, 1 on error. */
367
368int
7be0c536 369build_section_table (struct bfd *some_bfd, struct section_table **start,
fba45db2 370 struct section_table **end)
c906108c
SS
371{
372 unsigned count;
373
374 count = bfd_count_sections (some_bfd);
375 if (*start)
b8c9b27d 376 xfree (* start);
c906108c
SS
377 *start = (struct section_table *) xmalloc (count * sizeof (**start));
378 *end = *start;
c5aa993b 379 bfd_map_over_sections (some_bfd, add_to_section_table, (char *) end);
c906108c 380 if (*end > *start + count)
e2e0b3e5 381 internal_error (__FILE__, __LINE__, _("failed internal consistency check"));
c906108c
SS
382 /* We could realloc the table, but it probably loses for most files. */
383 return 0;
384}
385\f
386static void
7be0c536 387bfdsec_to_vmap (struct bfd *abfd, struct bfd_section *sect, void *arg3)
c906108c
SS
388{
389 struct vmap_and_bfd *vmap_bfd = (struct vmap_and_bfd *) arg3;
390 struct vmap *vp;
391
392 vp = vmap_bfd->pvmap;
393
394 if ((bfd_get_section_flags (abfd, sect) & SEC_LOAD) == 0)
395 return;
396
dc6a2ca4 397 if (strcmp (bfd_section_name (abfd, sect), ".text") == 0)
c906108c
SS
398 {
399 vp->tstart = bfd_section_vma (abfd, sect);
400 vp->tend = vp->tstart + bfd_section_size (abfd, sect);
401 vp->tvma = bfd_section_vma (abfd, sect);
402 vp->toffs = sect->filepos;
403 }
dc6a2ca4 404 else if (strcmp (bfd_section_name (abfd, sect), ".data") == 0)
c906108c
SS
405 {
406 vp->dstart = bfd_section_vma (abfd, sect);
407 vp->dend = vp->dstart + bfd_section_size (abfd, sect);
408 vp->dvma = bfd_section_vma (abfd, sect);
409 }
410 /* Silently ignore other types of sections. (FIXME?) */
411}
412
413/* Make a vmap for ABFD which might be a member of the archive ARCH.
414 Return the new vmap. */
415
416struct vmap *
fba45db2 417map_vmap (bfd *abfd, bfd *arch)
c906108c
SS
418{
419 struct vmap_and_bfd vmap_bfd;
420 struct vmap *vp, **vpp;
421
422 vp = (struct vmap *) xmalloc (sizeof (*vp));
423 memset ((char *) vp, '\0', sizeof (*vp));
424 vp->nxt = 0;
425 vp->bfd = abfd;
426 vp->name = bfd_get_filename (arch ? arch : abfd);
427 vp->member = arch ? bfd_get_filename (abfd) : "";
c5aa993b 428
c906108c
SS
429 vmap_bfd.pbfd = arch;
430 vmap_bfd.pvmap = vp;
431 bfd_map_over_sections (abfd, bfdsec_to_vmap, &vmap_bfd);
432
433 /* Find the end of the list and append. */
434 for (vpp = &vmap; *vpp; vpp = &(*vpp)->nxt)
435 ;
436 *vpp = vp;
437
438 return vp;
439}
440\f
441/* Read or write the exec file.
442
443 Args are address within a BFD file, address within gdb address-space,
444 length, and a flag indicating whether to read or write.
445
446 Result is a length:
447
c5aa993b
JM
448 0: We cannot handle this address and length.
449 > 0: We have handled N bytes starting at this address.
450 (If N == length, we did it all.) We might be able
451 to handle more bytes beyond this length, but no
452 promises.
453 < 0: We cannot handle this address, but if somebody
454 else handles (-N) bytes, we can start from there.
c906108c 455
c5aa993b
JM
456 The same routine is used to handle both core and exec files;
457 we just tail-call it with more arguments to select between them. */
c906108c
SS
458
459int
1b0ba102
AC
460xfer_memory (CORE_ADDR memaddr, gdb_byte *myaddr, int len, int write,
461 struct mem_attrib *attrib, struct target_ops *target)
c906108c 462{
020cc13c 463 int res;
c906108c
SS
464 struct section_table *p;
465 CORE_ADDR nextsectaddr, memend;
714835d5 466 struct obj_section *section = NULL;
c906108c
SS
467
468 if (len <= 0)
e2e0b3e5 469 internal_error (__FILE__, __LINE__, _("failed internal consistency check"));
c906108c
SS
470
471 if (overlay_debugging)
472 {
473 section = find_pc_overlay (memaddr);
474 if (pc_in_unmapped_range (memaddr, section))
475 memaddr = overlay_mapped_address (memaddr, section);
476 }
477
478 memend = memaddr + len;
c906108c
SS
479 nextsectaddr = memend;
480
c906108c
SS
481 for (p = target->to_sections; p < target->to_sections_end; p++)
482 {
714835d5
UW
483 if (overlay_debugging && section
484 && strcmp (section->the_bfd_section->name,
485 p->the_bfd_section->name) != 0)
c5aa993b 486 continue; /* not the section we need */
c906108c 487 if (memaddr >= p->addr)
3db26b01
JB
488 {
489 if (memend <= p->endaddr)
490 {
491 /* Entire transfer is within this section. */
85302095
AC
492 if (write)
493 res = bfd_set_section_contents (p->bfd, p->the_bfd_section,
494 myaddr, memaddr - p->addr,
495 len);
496 else
497 res = bfd_get_section_contents (p->bfd, p->the_bfd_section,
498 myaddr, memaddr - p->addr,
499 len);
3db26b01
JB
500 return (res != 0) ? len : 0;
501 }
502 else if (memaddr >= p->endaddr)
503 {
504 /* This section ends before the transfer starts. */
505 continue;
506 }
507 else
508 {
509 /* This section overlaps the transfer. Just do half. */
510 len = p->endaddr - memaddr;
85302095
AC
511 if (write)
512 res = bfd_set_section_contents (p->bfd, p->the_bfd_section,
513 myaddr, memaddr - p->addr,
514 len);
515 else
516 res = bfd_get_section_contents (p->bfd, p->the_bfd_section,
517 myaddr, memaddr - p->addr,
518 len);
3db26b01
JB
519 return (res != 0) ? len : 0;
520 }
521 }
c906108c
SS
522 else
523 nextsectaddr = min (nextsectaddr, p->addr);
524 }
525
526 if (nextsectaddr >= memend)
c5aa993b 527 return 0; /* We can't help */
c906108c 528 else
c5aa993b 529 return -(nextsectaddr - memaddr); /* Next boundary where we can help */
c906108c 530}
c906108c 531\f
c5aa993b 532
c906108c 533void
fba45db2 534print_section_info (struct target_ops *t, bfd *abfd)
c906108c
SS
535{
536 struct section_table *p;
17a912b6 537 /* FIXME: 16 is not wide enough when gdbarch_addr_bit > 64. */
ed49a04f 538 int wid = gdbarch_addr_bit (gdbarch_from_bfd (abfd)) <= 32 ? 8 : 16;
c906108c 539
c5aa993b 540 printf_filtered ("\t`%s', ", bfd_get_filename (abfd));
c906108c 541 wrap_here (" ");
a3f17187 542 printf_filtered (_("file type %s.\n"), bfd_get_target (abfd));
c906108c 543 if (abfd == exec_bfd)
944f08ab
JB
544 printf_filtered (_("\tEntry point: %s\n"),
545 paddress (bfd_get_start_address (abfd)));
c906108c
SS
546 for (p = t->to_sections; p < t->to_sections_end; p++)
547 {
bb599908
PH
548 printf_filtered ("\t%s", hex_string_custom (p->addr, wid));
549 printf_filtered (" - %s", hex_string_custom (p->endaddr, wid));
bcf16802
KB
550
551 /* FIXME: A format of "08l" is not wide enough for file offsets
552 larger than 4GB. OTOH, making it "016l" isn't desirable either
553 since most output will then be much wider than necessary. It
554 may make sense to test the size of the file and choose the
555 format string accordingly. */
a3f17187 556 /* FIXME: i18n: Need to rewrite this sentence. */
c906108c
SS
557 if (info_verbose)
558 printf_filtered (" @ %s",
bb599908 559 hex_string_custom (p->the_bfd_section->filepos, 8));
c906108c
SS
560 printf_filtered (" is %s", bfd_section_name (p->bfd, p->the_bfd_section));
561 if (p->bfd != abfd)
a3f17187 562 printf_filtered (" in %s", bfd_get_filename (p->bfd));
c906108c
SS
563 printf_filtered ("\n");
564 }
565}
566
567static void
fba45db2 568exec_files_info (struct target_ops *t)
c906108c
SS
569{
570 print_section_info (t, exec_bfd);
571
572 if (vmap)
573 {
574 struct vmap *vp;
575
a3f17187 576 printf_unfiltered (_("\tMapping info for file `%s'.\n"), vmap->name);
d4f3574e
SS
577 printf_unfiltered ("\t %*s %*s %*s %*s %8.8s %s\n",
578 strlen_paddr (), "tstart",
579 strlen_paddr (), "tend",
580 strlen_paddr (), "dstart",
581 strlen_paddr (), "dend",
582 "section",
c5aa993b
JM
583 "file(member)");
584
585 for (vp = vmap; vp; vp = vp->nxt)
d4f3574e
SS
586 printf_unfiltered ("\t0x%s 0x%s 0x%s 0x%s %s%s%s%s\n",
587 paddr (vp->tstart),
588 paddr (vp->tend),
589 paddr (vp->dstart),
590 paddr (vp->dend),
591 vp->name,
c5aa993b
JM
592 *vp->member ? "(" : "", vp->member,
593 *vp->member ? ")" : "");
c906108c
SS
594 }
595}
596
597static void
fba45db2 598set_section_command (char *args, int from_tty)
c906108c
SS
599{
600 struct section_table *p;
601 char *secname;
602 unsigned seclen;
603 unsigned long secaddr;
604 char secprint[100];
605 long offset;
606
607 if (args == 0)
8a3fe4f8 608 error (_("Must specify section name and its virtual address"));
c906108c
SS
609
610 /* Parse out section name */
c5aa993b 611 for (secname = args; !isspace (*args); args++);
c906108c
SS
612 seclen = args - secname;
613
614 /* Parse out new virtual address */
615 secaddr = parse_and_eval_address (args);
616
c5aa993b
JM
617 for (p = exec_ops.to_sections; p < exec_ops.to_sections_end; p++)
618 {
619 if (!strncmp (secname, bfd_section_name (exec_bfd, p->the_bfd_section), seclen)
620 && bfd_section_name (exec_bfd, p->the_bfd_section)[seclen] == '\0')
621 {
622 offset = secaddr - p->addr;
623 p->addr += offset;
624 p->endaddr += offset;
625 if (from_tty)
626 exec_files_info (&exec_ops);
627 return;
628 }
c906108c 629 }
c906108c
SS
630 if (seclen >= sizeof (secprint))
631 seclen = sizeof (secprint) - 1;
632 strncpy (secprint, secname, seclen);
633 secprint[seclen] = '\0';
8a3fe4f8 634 error (_("Section %s not found"), secprint);
c906108c
SS
635}
636
30510692
DJ
637/* If we can find a section in FILENAME with BFD index INDEX, adjust
638 it to ADDRESS. */
c1bd25fd
DJ
639
640void
641exec_set_section_address (const char *filename, int index, CORE_ADDR address)
642{
643 struct section_table *p;
644
645 for (p = exec_ops.to_sections; p < exec_ops.to_sections_end; p++)
646 {
647 if (strcmp (filename, p->bfd->filename) == 0
30510692 648 && index == p->the_bfd_section->index)
c1bd25fd 649 {
30510692 650 p->endaddr += address - p->addr;
c1bd25fd 651 p->addr = address;
c1bd25fd
DJ
652 }
653 }
654}
655
c906108c
SS
656/* If mourn is being called in all the right places, this could be say
657 `gdb internal error' (since generic_mourn calls
658 breakpoint_init_inferior). */
659
660static int
8181d85f 661ignore (struct bp_target_info *bp_tgt)
c906108c
SS
662{
663 return 0;
664}
665
be4d1333
MS
666/* Find mapped memory. */
667
668extern void
669exec_set_find_memory_regions (int (*func) (int (*) (CORE_ADDR,
670 unsigned long,
671 int, int, int,
672 void *),
673 void *))
674{
675 exec_ops.to_find_memory_regions = func;
676}
677
678static char *exec_make_note_section (bfd *, int *);
679
c906108c
SS
680/* Fill in the exec file target vector. Very few entries need to be
681 defined. */
682
be4d1333 683static void
fba45db2 684init_exec_ops (void)
c906108c
SS
685{
686 exec_ops.to_shortname = "exec";
687 exec_ops.to_longname = "Local exec file";
688 exec_ops.to_doc = "Use an executable file as a target.\n\
689Specify the filename of the executable file.";
1adeb98a 690 exec_ops.to_open = exec_open;
c906108c
SS
691 exec_ops.to_close = exec_close;
692 exec_ops.to_attach = find_default_attach;
c8e73a31 693 exec_ops.deprecated_xfer_memory = xfer_memory;
c906108c
SS
694 exec_ops.to_files_info = exec_files_info;
695 exec_ops.to_insert_breakpoint = ignore;
696 exec_ops.to_remove_breakpoint = ignore;
697 exec_ops.to_create_inferior = find_default_create_inferior;
c906108c
SS
698 exec_ops.to_stratum = file_stratum;
699 exec_ops.to_has_memory = 1;
be4d1333 700 exec_ops.to_make_corefile_notes = exec_make_note_section;
c5aa993b 701 exec_ops.to_magic = OPS_MAGIC;
c906108c
SS
702}
703
704void
fba45db2 705_initialize_exec (void)
c906108c
SS
706{
707 struct cmd_list_element *c;
708
709 init_exec_ops ();
710
711 if (!dbx_commands)
712 {
1a966eab
AC
713 c = add_cmd ("file", class_files, file_command, _("\
714Use FILE as program to be debugged.\n\
c906108c
SS
715It is read for its symbols, for getting the contents of pure memory,\n\
716and it is the program executed when you use the `run' command.\n\
717If FILE cannot be found as specified, your execution directory path\n\
718($PATH) is searched for a command of that name.\n\
1a966eab 719No arg means to have no executable file and no symbols."), &cmdlist);
5ba2abeb 720 set_cmd_completer (c, filename_completer);
c906108c
SS
721 }
722
1a966eab
AC
723 c = add_cmd ("exec-file", class_files, exec_file_command, _("\
724Use FILE as program for getting contents of pure memory.\n\
c906108c
SS
725If FILE cannot be found as specified, your execution directory path\n\
726is searched for a command of that name.\n\
1a966eab 727No arg means have no executable file."), &cmdlist);
5ba2abeb 728 set_cmd_completer (c, filename_completer);
c906108c 729
1bedd215
AC
730 add_com ("section", class_files, set_section_command, _("\
731Change the base address of section SECTION of the exec file to ADDR.\n\
c906108c
SS
732This can be used if the exec file does not contain section addresses,\n\
733(such as in the a.out format), or when the addresses specified in the\n\
734file itself are wrong. Each section must be changed separately. The\n\
1bedd215 735``info files'' command lists all the sections and their addresses."));
c906108c 736
5bf193a2
AC
737 add_setshow_boolean_cmd ("write", class_support, &write_files, _("\
738Set writing into executable and core files."), _("\
739Show writing into executable and core files."), NULL,
740 NULL,
920d2a44 741 show_write_files,
5bf193a2 742 &setlist, &showlist);
c5aa993b 743
c906108c
SS
744 add_target (&exec_ops);
745}
be4d1333
MS
746
747static char *
748exec_make_note_section (bfd *obfd, int *note_size)
749{
8a3fe4f8 750 error (_("Can't create a corefile"));
be4d1333 751}
This page took 0.882777 seconds and 4 git commands to generate.