2007-06-13 Markus Deuling <deuling@de.ibm.com>
[deliverable/binutils-gdb.git] / gdb / exec.c
CommitLineData
c906108c 1/* Work with executable files, for GDB.
4646aa9d 2
6aba47ca
DJ
3 Copyright (C) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997,
4 1998, 1999, 2000, 2001, 2002, 2003, 2007 Free Software Foundation, Inc.
c906108c 5
c5aa993b 6 This file is part of GDB.
c906108c 7
c5aa993b
JM
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
c906108c 12
c5aa993b
JM
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
c906108c 17
c5aa993b
JM
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
197e01b6
EZ
20 Foundation, Inc., 51 Franklin Street, Fifth Floor,
21 Boston, MA 02110-1301, USA. */
c906108c
SS
22
23#include "defs.h"
24#include "frame.h"
25#include "inferior.h"
26#include "target.h"
27#include "gdbcmd.h"
28#include "language.h"
29#include "symfile.h"
30#include "objfiles.h"
c5f0f3d0 31#include "completer.h"
fd0407d6 32#include "value.h"
4646aa9d 33#include "exec.h"
ea53e89f 34#include "observer.h"
c906108c 35
c906108c 36#include <fcntl.h>
dbda9972 37#include "readline/readline.h"
c906108c
SS
38#include "gdb_string.h"
39
40#include "gdbcore.h"
41
42#include <ctype.h>
43#include "gdb_stat.h"
c906108c
SS
44
45#include "xcoffsolib.h"
46
a14ed312 47struct vmap *map_vmap (bfd *, bfd *);
c906108c 48
9a4105ab 49void (*deprecated_file_changed_hook) (char *);
c906108c
SS
50
51/* Prototypes for local functions */
52
a14ed312 53static void exec_close (int);
c906108c 54
a14ed312 55static void file_command (char *, int);
c906108c 56
a14ed312 57static void set_section_command (char *, int);
c906108c 58
a14ed312 59static void exec_files_info (struct target_ops *);
c906108c 60
a14ed312 61static void init_exec_ops (void);
c906108c 62
a14ed312 63void _initialize_exec (void);
c906108c 64
c906108c
SS
65/* The target vector for executable files. */
66
67struct target_ops exec_ops;
68
69/* The Binary File Descriptor handle for the executable file. */
70
71bfd *exec_bfd = NULL;
72
73/* Whether to open exec and core files read-only or read-write. */
74
75int write_files = 0;
920d2a44
AC
76static void
77show_write_files (struct ui_file *file, int from_tty,
78 struct cmd_list_element *c, const char *value)
79{
80 fprintf_filtered (file, _("Writing into executable and core files is %s.\n"),
81 value);
82}
83
c906108c 84
c906108c
SS
85struct vmap *vmap;
86
4c42eaff 87static void
1adeb98a
FN
88exec_open (char *args, int from_tty)
89{
90 target_preopen (from_tty);
91 exec_file_attach (args, from_tty);
92}
93
c906108c 94static void
fba45db2 95exec_close (int quitting)
c906108c
SS
96{
97 int need_symtab_cleanup = 0;
98 struct vmap *vp, *nxt;
c5aa993b
JM
99
100 for (nxt = vmap; nxt != NULL;)
c906108c
SS
101 {
102 vp = nxt;
103 nxt = vp->nxt;
104
105 /* if there is an objfile associated with this bfd,
c5aa993b
JM
106 free_objfile() will do proper cleanup of objfile *and* bfd. */
107
c906108c
SS
108 if (vp->objfile)
109 {
110 free_objfile (vp->objfile);
111 need_symtab_cleanup = 1;
112 }
113 else if (vp->bfd != exec_bfd)
114 /* FIXME-leak: We should be freeing vp->name too, I think. */
115 if (!bfd_close (vp->bfd))
8a3fe4f8 116 warning (_("cannot close \"%s\": %s"),
c906108c
SS
117 vp->name, bfd_errmsg (bfd_get_error ()));
118
119 /* FIXME: This routine is #if 0'd in symfile.c. What should we
c5aa993b
JM
120 be doing here? Should we just free everything in
121 vp->objfile->symtabs? Should free_objfile do that?
122 FIXME-as-well: free_objfile already free'd vp->name, so it isn't
123 valid here. */
c906108c 124 free_named_symtabs (vp->name);
b8c9b27d 125 xfree (vp);
c906108c
SS
126 }
127
128 vmap = NULL;
129
130 if (exec_bfd)
131 {
132 char *name = bfd_get_filename (exec_bfd);
133
134 if (!bfd_close (exec_bfd))
8a3fe4f8 135 warning (_("cannot close \"%s\": %s"),
c906108c 136 name, bfd_errmsg (bfd_get_error ()));
b8c9b27d 137 xfree (name);
c906108c
SS
138 exec_bfd = NULL;
139 }
140
141 if (exec_ops.to_sections)
142 {
b8c9b27d 143 xfree (exec_ops.to_sections);
c906108c
SS
144 exec_ops.to_sections = NULL;
145 exec_ops.to_sections_end = NULL;
146 }
147}
148
1adeb98a
FN
149void
150exec_file_clear (int from_tty)
151{
152 /* Remove exec file. */
153 unpush_target (&exec_ops);
154
155 if (from_tty)
a3f17187 156 printf_unfiltered (_("No executable file now.\n"));
1adeb98a
FN
157}
158
c906108c
SS
159/* Process the first arg in ARGS as the new exec file.
160
c5aa993b
JM
161 This function is intended to be behave essentially the same
162 as exec_file_command, except that the latter will detect when
163 a target is being debugged, and will ask the user whether it
164 should be shut down first. (If the answer is "no", then the
165 new file is ignored.)
c906108c 166
c5aa993b
JM
167 This file is used by exec_file_command, to do the work of opening
168 and processing the exec file after any prompting has happened.
c906108c 169
c5aa993b
JM
170 And, it is used by child_attach, when the attach command was
171 given a pid but not a exec pathname, and the attach command could
172 figure out the pathname from the pid. (In this case, we shouldn't
173 ask the user whether the current target should be shut down --
1adeb98a
FN
174 we're supplying the exec pathname late for good reason.)
175
176 ARGS is assumed to be the filename. */
c906108c
SS
177
178void
1adeb98a 179exec_file_attach (char *filename, int from_tty)
c906108c 180{
c906108c
SS
181 /* Remove any previous exec file. */
182 unpush_target (&exec_ops);
183
184 /* Now open and digest the file the user requested, if any. */
185
1adeb98a
FN
186 if (!filename)
187 {
188 if (from_tty)
a3f17187 189 printf_unfiltered (_("No executable file now.\n"));
7a107747
DJ
190
191 set_gdbarch_from_file (NULL);
1adeb98a
FN
192 }
193 else
c906108c
SS
194 {
195 char *scratch_pathname;
196 int scratch_chan;
c5aa993b 197
014d698b 198 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST, filename,
c5aa993b 199 write_files ? O_RDWR | O_BINARY : O_RDONLY | O_BINARY, 0,
c906108c 200 &scratch_pathname);
cfc3008e 201#if defined(__GO32__) || defined(_WIN32) || defined(__CYGWIN__)
c906108c 202 if (scratch_chan < 0)
c5aa993b
JM
203 {
204 char *exename = alloca (strlen (filename) + 5);
205 strcat (strcpy (exename, filename), ".exe");
014d698b
EZ
206 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST, exename,
207 write_files ? O_RDWR | O_BINARY : O_RDONLY | O_BINARY, 0,
208 &scratch_pathname);
c5aa993b 209 }
c906108c
SS
210#endif
211 if (scratch_chan < 0)
212 perror_with_name (filename);
9f76c2cd
MM
213 exec_bfd = bfd_fopen (scratch_pathname, gnutarget,
214 write_files ? FOPEN_RUB : FOPEN_RB,
215 scratch_chan);
c906108c
SS
216
217 if (!exec_bfd)
8a3fe4f8 218 error (_("\"%s\": could not open as an executable file: %s"),
c906108c
SS
219 scratch_pathname, bfd_errmsg (bfd_get_error ()));
220
221 /* At this point, scratch_pathname and exec_bfd->name both point to the
c5aa993b
JM
222 same malloc'd string. However exec_close() will attempt to free it
223 via the exec_bfd->name pointer, so we need to make another copy and
224 leave exec_bfd as the new owner of the original copy. */
c2d11a7d 225 scratch_pathname = xstrdup (scratch_pathname);
b8c9b27d 226 make_cleanup (xfree, scratch_pathname);
c5aa993b 227
c906108c
SS
228 if (!bfd_check_format (exec_bfd, bfd_object))
229 {
230 /* Make sure to close exec_bfd, or else "run" might try to use
231 it. */
232 exec_close (0);
8a3fe4f8 233 error (_("\"%s\": not in executable format: %s"),
c906108c
SS
234 scratch_pathname, bfd_errmsg (bfd_get_error ()));
235 }
236
237 /* FIXME - This should only be run for RS6000, but the ifdef is a poor
c5aa993b 238 way to accomplish. */
52d16ba8 239#ifdef DEPRECATED_IBM6000_TARGET
c906108c
SS
240 /* Setup initial vmap. */
241
242 map_vmap (exec_bfd, 0);
243 if (vmap == NULL)
244 {
245 /* Make sure to close exec_bfd, or else "run" might try to use
246 it. */
247 exec_close (0);
8a3fe4f8 248 error (_("\"%s\": can't find the file sections: %s"),
c906108c
SS
249 scratch_pathname, bfd_errmsg (bfd_get_error ()));
250 }
52d16ba8 251#endif /* DEPRECATED_IBM6000_TARGET */
c906108c
SS
252
253 if (build_section_table (exec_bfd, &exec_ops.to_sections,
c5aa993b 254 &exec_ops.to_sections_end))
c906108c
SS
255 {
256 /* Make sure to close exec_bfd, or else "run" might try to use
257 it. */
258 exec_close (0);
8a3fe4f8 259 error (_("\"%s\": can't find the file sections: %s"),
c906108c
SS
260 scratch_pathname, bfd_errmsg (bfd_get_error ()));
261 }
262
c906108c
SS
263 validate_files ();
264
265 set_gdbarch_from_file (exec_bfd);
266
267 push_target (&exec_ops);
268
269 /* Tell display code (if any) about the changed file name. */
9a4105ab
AC
270 if (deprecated_exec_file_display_hook)
271 (*deprecated_exec_file_display_hook) (filename);
c906108c 272 }
ce7d4522 273 bfd_cache_close_all ();
ea53e89f 274 observer_notify_executable_changed (NULL);
c906108c
SS
275}
276
277/* Process the first arg in ARGS as the new exec file.
278
c5aa993b
JM
279 Note that we have to explicitly ignore additional args, since we can
280 be called from file_command(), which also calls symbol_file_command()
1adeb98a
FN
281 which can take multiple args.
282
283 If ARGS is NULL, we just want to close the exec file. */
c906108c 284
1adeb98a 285static void
fba45db2 286exec_file_command (char *args, int from_tty)
c906108c 287{
1adeb98a
FN
288 char **argv;
289 char *filename;
4c42eaff
DJ
290
291 if (from_tty && target_has_execution
292 && !query (_("A program is being debugged already.\n"
293 "Are you sure you want to change the file? ")))
294 error (_("File not changed."));
1adeb98a
FN
295
296 if (args)
297 {
298 /* Scan through the args and pick up the first non option arg
299 as the filename. */
300
301 argv = buildargv (args);
302 if (argv == NULL)
303 nomem (0);
304
305 make_cleanup_freeargv (argv);
306
307 for (; (*argv != NULL) && (**argv == '-'); argv++)
308 {;
309 }
310 if (*argv == NULL)
8a3fe4f8 311 error (_("No executable file name was specified"));
1adeb98a
FN
312
313 filename = tilde_expand (*argv);
314 make_cleanup (xfree, filename);
315 exec_file_attach (filename, from_tty);
316 }
317 else
318 exec_file_attach (NULL, from_tty);
c906108c
SS
319}
320
321/* Set both the exec file and the symbol file, in one command.
322 What a novelty. Why did GDB go through four major releases before this
323 command was added? */
324
325static void
fba45db2 326file_command (char *arg, int from_tty)
c906108c
SS
327{
328 /* FIXME, if we lose on reading the symbol file, we should revert
329 the exec file, but that's rough. */
330 exec_file_command (arg, from_tty);
331 symbol_file_command (arg, from_tty);
9a4105ab
AC
332 if (deprecated_file_changed_hook)
333 deprecated_file_changed_hook (arg);
c906108c 334}
c906108c 335\f
c5aa993b 336
c906108c
SS
337/* Locate all mappable sections of a BFD file.
338 table_pp_char is a char * to get it through bfd_map_over_sections;
339 we cast it back to its proper type. */
340
341static void
7be0c536
AC
342add_to_section_table (bfd *abfd, struct bfd_section *asect,
343 void *table_pp_char)
c906108c 344{
c5aa993b 345 struct section_table **table_pp = (struct section_table **) table_pp_char;
c906108c
SS
346 flagword aflag;
347
0f5d55d8
JB
348 /* Check the section flags, but do not discard zero-length sections, since
349 some symbols may still be attached to this section. For instance, we
350 encountered on sparc-solaris 2.10 a shared library with an empty .bss
351 section to which a symbol named "_end" was attached. The address
352 of this symbol still needs to be relocated. */
c906108c
SS
353 aflag = bfd_get_section_flags (abfd, asect);
354 if (!(aflag & SEC_ALLOC))
355 return;
0f5d55d8 356
c906108c
SS
357 (*table_pp)->bfd = abfd;
358 (*table_pp)->the_bfd_section = asect;
359 (*table_pp)->addr = bfd_section_vma (abfd, asect);
360 (*table_pp)->endaddr = (*table_pp)->addr + bfd_section_size (abfd, asect);
361 (*table_pp)++;
362}
363
364/* Builds a section table, given args BFD, SECTABLE_PTR, SECEND_PTR.
365 Returns 0 if OK, 1 on error. */
366
367int
7be0c536 368build_section_table (struct bfd *some_bfd, struct section_table **start,
fba45db2 369 struct section_table **end)
c906108c
SS
370{
371 unsigned count;
372
373 count = bfd_count_sections (some_bfd);
374 if (*start)
b8c9b27d 375 xfree (* start);
c906108c
SS
376 *start = (struct section_table *) xmalloc (count * sizeof (**start));
377 *end = *start;
c5aa993b 378 bfd_map_over_sections (some_bfd, add_to_section_table, (char *) end);
c906108c 379 if (*end > *start + count)
e2e0b3e5 380 internal_error (__FILE__, __LINE__, _("failed internal consistency check"));
c906108c
SS
381 /* We could realloc the table, but it probably loses for most files. */
382 return 0;
383}
384\f
385static void
7be0c536 386bfdsec_to_vmap (struct bfd *abfd, struct bfd_section *sect, void *arg3)
c906108c
SS
387{
388 struct vmap_and_bfd *vmap_bfd = (struct vmap_and_bfd *) arg3;
389 struct vmap *vp;
390
391 vp = vmap_bfd->pvmap;
392
393 if ((bfd_get_section_flags (abfd, sect) & SEC_LOAD) == 0)
394 return;
395
dc6a2ca4 396 if (strcmp (bfd_section_name (abfd, sect), ".text") == 0)
c906108c
SS
397 {
398 vp->tstart = bfd_section_vma (abfd, sect);
399 vp->tend = vp->tstart + bfd_section_size (abfd, sect);
400 vp->tvma = bfd_section_vma (abfd, sect);
401 vp->toffs = sect->filepos;
402 }
dc6a2ca4 403 else if (strcmp (bfd_section_name (abfd, sect), ".data") == 0)
c906108c
SS
404 {
405 vp->dstart = bfd_section_vma (abfd, sect);
406 vp->dend = vp->dstart + bfd_section_size (abfd, sect);
407 vp->dvma = bfd_section_vma (abfd, sect);
408 }
409 /* Silently ignore other types of sections. (FIXME?) */
410}
411
412/* Make a vmap for ABFD which might be a member of the archive ARCH.
413 Return the new vmap. */
414
415struct vmap *
fba45db2 416map_vmap (bfd *abfd, bfd *arch)
c906108c
SS
417{
418 struct vmap_and_bfd vmap_bfd;
419 struct vmap *vp, **vpp;
420
421 vp = (struct vmap *) xmalloc (sizeof (*vp));
422 memset ((char *) vp, '\0', sizeof (*vp));
423 vp->nxt = 0;
424 vp->bfd = abfd;
425 vp->name = bfd_get_filename (arch ? arch : abfd);
426 vp->member = arch ? bfd_get_filename (abfd) : "";
c5aa993b 427
c906108c
SS
428 vmap_bfd.pbfd = arch;
429 vmap_bfd.pvmap = vp;
430 bfd_map_over_sections (abfd, bfdsec_to_vmap, &vmap_bfd);
431
432 /* Find the end of the list and append. */
433 for (vpp = &vmap; *vpp; vpp = &(*vpp)->nxt)
434 ;
435 *vpp = vp;
436
437 return vp;
438}
439\f
440/* Read or write the exec file.
441
442 Args are address within a BFD file, address within gdb address-space,
443 length, and a flag indicating whether to read or write.
444
445 Result is a length:
446
c5aa993b
JM
447 0: We cannot handle this address and length.
448 > 0: We have handled N bytes starting at this address.
449 (If N == length, we did it all.) We might be able
450 to handle more bytes beyond this length, but no
451 promises.
452 < 0: We cannot handle this address, but if somebody
453 else handles (-N) bytes, we can start from there.
c906108c 454
c5aa993b
JM
455 The same routine is used to handle both core and exec files;
456 we just tail-call it with more arguments to select between them. */
c906108c
SS
457
458int
1b0ba102
AC
459xfer_memory (CORE_ADDR memaddr, gdb_byte *myaddr, int len, int write,
460 struct mem_attrib *attrib, struct target_ops *target)
c906108c 461{
020cc13c 462 int res;
c906108c
SS
463 struct section_table *p;
464 CORE_ADDR nextsectaddr, memend;
88665544 465 asection *section = NULL;
c906108c
SS
466
467 if (len <= 0)
e2e0b3e5 468 internal_error (__FILE__, __LINE__, _("failed internal consistency check"));
c906108c
SS
469
470 if (overlay_debugging)
471 {
472 section = find_pc_overlay (memaddr);
473 if (pc_in_unmapped_range (memaddr, section))
474 memaddr = overlay_mapped_address (memaddr, section);
475 }
476
477 memend = memaddr + len;
c906108c
SS
478 nextsectaddr = memend;
479
c906108c
SS
480 for (p = target->to_sections; p < target->to_sections_end; p++)
481 {
482 if (overlay_debugging && section && p->the_bfd_section &&
483 strcmp (section->name, p->the_bfd_section->name) != 0)
c5aa993b 484 continue; /* not the section we need */
c906108c 485 if (memaddr >= p->addr)
3db26b01
JB
486 {
487 if (memend <= p->endaddr)
488 {
489 /* Entire transfer is within this section. */
85302095
AC
490 if (write)
491 res = bfd_set_section_contents (p->bfd, p->the_bfd_section,
492 myaddr, memaddr - p->addr,
493 len);
494 else
495 res = bfd_get_section_contents (p->bfd, p->the_bfd_section,
496 myaddr, memaddr - p->addr,
497 len);
3db26b01
JB
498 return (res != 0) ? len : 0;
499 }
500 else if (memaddr >= p->endaddr)
501 {
502 /* This section ends before the transfer starts. */
503 continue;
504 }
505 else
506 {
507 /* This section overlaps the transfer. Just do half. */
508 len = p->endaddr - memaddr;
85302095
AC
509 if (write)
510 res = bfd_set_section_contents (p->bfd, p->the_bfd_section,
511 myaddr, memaddr - p->addr,
512 len);
513 else
514 res = bfd_get_section_contents (p->bfd, p->the_bfd_section,
515 myaddr, memaddr - p->addr,
516 len);
3db26b01
JB
517 return (res != 0) ? len : 0;
518 }
519 }
c906108c
SS
520 else
521 nextsectaddr = min (nextsectaddr, p->addr);
522 }
523
524 if (nextsectaddr >= memend)
c5aa993b 525 return 0; /* We can't help */
c906108c 526 else
c5aa993b 527 return -(nextsectaddr - memaddr); /* Next boundary where we can help */
c906108c 528}
c906108c 529\f
c5aa993b 530
c906108c 531void
fba45db2 532print_section_info (struct target_ops *t, bfd *abfd)
c906108c
SS
533{
534 struct section_table *p;
bb599908
PH
535 /* FIXME: 16 is not wide enough when TARGET_ADDR_BIT > 64. */
536 int wid = TARGET_ADDR_BIT <= 32 ? 8 : 16;
c906108c 537
c5aa993b 538 printf_filtered ("\t`%s', ", bfd_get_filename (abfd));
c906108c 539 wrap_here (" ");
a3f17187 540 printf_filtered (_("file type %s.\n"), bfd_get_target (abfd));
c906108c
SS
541 if (abfd == exec_bfd)
542 {
a3f17187 543 printf_filtered (_("\tEntry point: "));
66bf4b3a 544 deprecated_print_address_numeric (bfd_get_start_address (abfd), 1, gdb_stdout);
c906108c
SS
545 printf_filtered ("\n");
546 }
547 for (p = t->to_sections; p < t->to_sections_end; p++)
548 {
bb599908
PH
549 printf_filtered ("\t%s", hex_string_custom (p->addr, wid));
550 printf_filtered (" - %s", hex_string_custom (p->endaddr, wid));
bcf16802
KB
551
552 /* FIXME: A format of "08l" is not wide enough for file offsets
553 larger than 4GB. OTOH, making it "016l" isn't desirable either
554 since most output will then be much wider than necessary. It
555 may make sense to test the size of the file and choose the
556 format string accordingly. */
a3f17187 557 /* FIXME: i18n: Need to rewrite this sentence. */
c906108c
SS
558 if (info_verbose)
559 printf_filtered (" @ %s",
bb599908 560 hex_string_custom (p->the_bfd_section->filepos, 8));
c906108c
SS
561 printf_filtered (" is %s", bfd_section_name (p->bfd, p->the_bfd_section));
562 if (p->bfd != abfd)
a3f17187 563 printf_filtered (" in %s", bfd_get_filename (p->bfd));
c906108c
SS
564 printf_filtered ("\n");
565 }
566}
567
568static void
fba45db2 569exec_files_info (struct target_ops *t)
c906108c
SS
570{
571 print_section_info (t, exec_bfd);
572
573 if (vmap)
574 {
575 struct vmap *vp;
576
a3f17187 577 printf_unfiltered (_("\tMapping info for file `%s'.\n"), vmap->name);
d4f3574e
SS
578 printf_unfiltered ("\t %*s %*s %*s %*s %8.8s %s\n",
579 strlen_paddr (), "tstart",
580 strlen_paddr (), "tend",
581 strlen_paddr (), "dstart",
582 strlen_paddr (), "dend",
583 "section",
c5aa993b
JM
584 "file(member)");
585
586 for (vp = vmap; vp; vp = vp->nxt)
d4f3574e
SS
587 printf_unfiltered ("\t0x%s 0x%s 0x%s 0x%s %s%s%s%s\n",
588 paddr (vp->tstart),
589 paddr (vp->tend),
590 paddr (vp->dstart),
591 paddr (vp->dend),
592 vp->name,
c5aa993b
JM
593 *vp->member ? "(" : "", vp->member,
594 *vp->member ? ")" : "");
c906108c
SS
595 }
596}
597
0f71a2f6
JM
598/* msnyder 5/21/99:
599 exec_set_section_offsets sets the offsets of all the sections
600 in the exec objfile. */
601
602void
fba45db2
KB
603exec_set_section_offsets (bfd_signed_vma text_off, bfd_signed_vma data_off,
604 bfd_signed_vma bss_off)
0f71a2f6
JM
605{
606 struct section_table *sect;
c5aa993b
JM
607
608 for (sect = exec_ops.to_sections;
609 sect < exec_ops.to_sections_end;
0f71a2f6
JM
610 sect++)
611 {
612 flagword flags;
613
614 flags = bfd_get_section_flags (exec_bfd, sect->the_bfd_section);
615
616 if (flags & SEC_CODE)
617 {
c5aa993b 618 sect->addr += text_off;
0f71a2f6
JM
619 sect->endaddr += text_off;
620 }
621 else if (flags & (SEC_DATA | SEC_LOAD))
622 {
c5aa993b 623 sect->addr += data_off;
0f71a2f6
JM
624 sect->endaddr += data_off;
625 }
626 else if (flags & SEC_ALLOC)
627 {
c5aa993b 628 sect->addr += bss_off;
0f71a2f6
JM
629 sect->endaddr += bss_off;
630 }
631 }
632}
633
c906108c 634static void
fba45db2 635set_section_command (char *args, int from_tty)
c906108c
SS
636{
637 struct section_table *p;
638 char *secname;
639 unsigned seclen;
640 unsigned long secaddr;
641 char secprint[100];
642 long offset;
643
644 if (args == 0)
8a3fe4f8 645 error (_("Must specify section name and its virtual address"));
c906108c
SS
646
647 /* Parse out section name */
c5aa993b 648 for (secname = args; !isspace (*args); args++);
c906108c
SS
649 seclen = args - secname;
650
651 /* Parse out new virtual address */
652 secaddr = parse_and_eval_address (args);
653
c5aa993b
JM
654 for (p = exec_ops.to_sections; p < exec_ops.to_sections_end; p++)
655 {
656 if (!strncmp (secname, bfd_section_name (exec_bfd, p->the_bfd_section), seclen)
657 && bfd_section_name (exec_bfd, p->the_bfd_section)[seclen] == '\0')
658 {
659 offset = secaddr - p->addr;
660 p->addr += offset;
661 p->endaddr += offset;
662 if (from_tty)
663 exec_files_info (&exec_ops);
664 return;
665 }
c906108c 666 }
c906108c
SS
667 if (seclen >= sizeof (secprint))
668 seclen = sizeof (secprint) - 1;
669 strncpy (secprint, secname, seclen);
670 secprint[seclen] = '\0';
8a3fe4f8 671 error (_("Section %s not found"), secprint);
c906108c
SS
672}
673
c1bd25fd
DJ
674/* If we can find a section in FILENAME with BFD index INDEX, and the
675 user has not assigned an address to it yet (via "set section"), adjust it
676 to ADDRESS. */
677
678void
679exec_set_section_address (const char *filename, int index, CORE_ADDR address)
680{
681 struct section_table *p;
682
683 for (p = exec_ops.to_sections; p < exec_ops.to_sections_end; p++)
684 {
685 if (strcmp (filename, p->bfd->filename) == 0
686 && index == p->the_bfd_section->index
687 && p->addr == 0)
688 {
689 p->addr = address;
690 p->endaddr += address;
691 }
692 }
693}
694
c906108c
SS
695/* If mourn is being called in all the right places, this could be say
696 `gdb internal error' (since generic_mourn calls
697 breakpoint_init_inferior). */
698
699static int
8181d85f 700ignore (struct bp_target_info *bp_tgt)
c906108c
SS
701{
702 return 0;
703}
704
be4d1333
MS
705/* Find mapped memory. */
706
707extern void
708exec_set_find_memory_regions (int (*func) (int (*) (CORE_ADDR,
709 unsigned long,
710 int, int, int,
711 void *),
712 void *))
713{
714 exec_ops.to_find_memory_regions = func;
715}
716
717static char *exec_make_note_section (bfd *, int *);
718
c906108c
SS
719/* Fill in the exec file target vector. Very few entries need to be
720 defined. */
721
be4d1333 722static void
fba45db2 723init_exec_ops (void)
c906108c
SS
724{
725 exec_ops.to_shortname = "exec";
726 exec_ops.to_longname = "Local exec file";
727 exec_ops.to_doc = "Use an executable file as a target.\n\
728Specify the filename of the executable file.";
1adeb98a 729 exec_ops.to_open = exec_open;
c906108c
SS
730 exec_ops.to_close = exec_close;
731 exec_ops.to_attach = find_default_attach;
c8e73a31 732 exec_ops.deprecated_xfer_memory = xfer_memory;
c906108c
SS
733 exec_ops.to_files_info = exec_files_info;
734 exec_ops.to_insert_breakpoint = ignore;
735 exec_ops.to_remove_breakpoint = ignore;
736 exec_ops.to_create_inferior = find_default_create_inferior;
c906108c
SS
737 exec_ops.to_stratum = file_stratum;
738 exec_ops.to_has_memory = 1;
be4d1333 739 exec_ops.to_make_corefile_notes = exec_make_note_section;
c5aa993b 740 exec_ops.to_magic = OPS_MAGIC;
c906108c
SS
741}
742
743void
fba45db2 744_initialize_exec (void)
c906108c
SS
745{
746 struct cmd_list_element *c;
747
748 init_exec_ops ();
749
750 if (!dbx_commands)
751 {
1a966eab
AC
752 c = add_cmd ("file", class_files, file_command, _("\
753Use FILE as program to be debugged.\n\
c906108c
SS
754It is read for its symbols, for getting the contents of pure memory,\n\
755and it is the program executed when you use the `run' command.\n\
756If FILE cannot be found as specified, your execution directory path\n\
757($PATH) is searched for a command of that name.\n\
1a966eab 758No arg means to have no executable file and no symbols."), &cmdlist);
5ba2abeb 759 set_cmd_completer (c, filename_completer);
c906108c
SS
760 }
761
1a966eab
AC
762 c = add_cmd ("exec-file", class_files, exec_file_command, _("\
763Use FILE as program for getting contents of pure memory.\n\
c906108c
SS
764If FILE cannot be found as specified, your execution directory path\n\
765is searched for a command of that name.\n\
1a966eab 766No arg means have no executable file."), &cmdlist);
5ba2abeb 767 set_cmd_completer (c, filename_completer);
c906108c 768
1bedd215
AC
769 add_com ("section", class_files, set_section_command, _("\
770Change the base address of section SECTION of the exec file to ADDR.\n\
c906108c
SS
771This can be used if the exec file does not contain section addresses,\n\
772(such as in the a.out format), or when the addresses specified in the\n\
773file itself are wrong. Each section must be changed separately. The\n\
1bedd215 774``info files'' command lists all the sections and their addresses."));
c906108c 775
5bf193a2
AC
776 add_setshow_boolean_cmd ("write", class_support, &write_files, _("\
777Set writing into executable and core files."), _("\
778Show writing into executable and core files."), NULL,
779 NULL,
920d2a44 780 show_write_files,
5bf193a2 781 &setlist, &showlist);
c5aa993b 782
c906108c
SS
783 add_target (&exec_ops);
784}
be4d1333
MS
785
786static char *
787exec_make_note_section (bfd *obfd, int *note_size)
788{
8a3fe4f8 789 error (_("Can't create a corefile"));
be4d1333 790}
This page took 0.545851 seconds and 4 git commands to generate.