]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/exec.c
2003-01-21 Andrew Cagney <ac131313@redhat.com>
[thirdparty/binutils-gdb.git] / gdb / exec.c
CommitLineData
c906108c 1/* Work with executable files, for GDB.
b6ba6518 2 Copyright 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997,
be4d1333 3 1998, 1999, 2000, 2001, 2002
c5aa993b 4 Free Software Foundation, Inc.
c906108c 5
c5aa993b 6 This file is part of GDB.
c906108c 7
c5aa993b
JM
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
c906108c 12
c5aa993b
JM
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
c906108c 17
c5aa993b
JM
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 59 Temple Place - Suite 330,
21 Boston, MA 02111-1307, USA. */
c906108c
SS
22
23#include "defs.h"
24#include "frame.h"
25#include "inferior.h"
26#include "target.h"
27#include "gdbcmd.h"
28#include "language.h"
29#include "symfile.h"
30#include "objfiles.h"
c5f0f3d0 31#include "completer.h"
fd0407d6 32#include "value.h"
c906108c
SS
33
34#ifdef USG
35#include <sys/types.h>
36#endif
37
38#include <fcntl.h>
38017ce8 39#include <readline/readline.h>
c906108c
SS
40#include "gdb_string.h"
41
42#include "gdbcore.h"
43
44#include <ctype.h>
45#include "gdb_stat.h"
46#ifndef O_BINARY
47#define O_BINARY 0
48#endif
49
50#include "xcoffsolib.h"
51
a14ed312 52struct vmap *map_vmap (bfd *, bfd *);
c906108c 53
507f3c78 54void (*file_changed_hook) (char *);
c906108c
SS
55
56/* Prototypes for local functions */
57
4efb68b1 58static void add_to_section_table (bfd *, sec_ptr, void *);
c906108c 59
a14ed312 60static void exec_close (int);
c906108c 61
a14ed312 62static void file_command (char *, int);
c906108c 63
a14ed312 64static void set_section_command (char *, int);
c906108c 65
a14ed312 66static void exec_files_info (struct target_ops *);
c906108c 67
4efb68b1 68static void bfdsec_to_vmap (bfd *, sec_ptr, void *);
c906108c 69
a14ed312 70static int ignore (CORE_ADDR, char *);
c906108c 71
a14ed312 72static void init_exec_ops (void);
c906108c 73
a14ed312 74void _initialize_exec (void);
c906108c 75
c906108c
SS
76/* The target vector for executable files. */
77
78struct target_ops exec_ops;
79
80/* The Binary File Descriptor handle for the executable file. */
81
82bfd *exec_bfd = NULL;
83
84/* Whether to open exec and core files read-only or read-write. */
85
86int write_files = 0;
87
88/* Text start and end addresses (KLUDGE) if needed */
89
90#ifndef NEED_TEXT_START_END
91#define NEED_TEXT_START_END (0)
92#endif
c5aa993b 93CORE_ADDR text_end = 0;
c906108c
SS
94
95struct vmap *vmap;
96
1adeb98a
FN
97void
98exec_open (char *args, int from_tty)
99{
100 target_preopen (from_tty);
101 exec_file_attach (args, from_tty);
102}
103
c906108c
SS
104/* ARGSUSED */
105static void
fba45db2 106exec_close (int quitting)
c906108c
SS
107{
108 int need_symtab_cleanup = 0;
109 struct vmap *vp, *nxt;
c5aa993b
JM
110
111 for (nxt = vmap; nxt != NULL;)
c906108c
SS
112 {
113 vp = nxt;
114 nxt = vp->nxt;
115
116 /* if there is an objfile associated with this bfd,
c5aa993b
JM
117 free_objfile() will do proper cleanup of objfile *and* bfd. */
118
c906108c
SS
119 if (vp->objfile)
120 {
121 free_objfile (vp->objfile);
122 need_symtab_cleanup = 1;
123 }
124 else if (vp->bfd != exec_bfd)
125 /* FIXME-leak: We should be freeing vp->name too, I think. */
126 if (!bfd_close (vp->bfd))
127 warning ("cannot close \"%s\": %s",
128 vp->name, bfd_errmsg (bfd_get_error ()));
129
130 /* FIXME: This routine is #if 0'd in symfile.c. What should we
c5aa993b
JM
131 be doing here? Should we just free everything in
132 vp->objfile->symtabs? Should free_objfile do that?
133 FIXME-as-well: free_objfile already free'd vp->name, so it isn't
134 valid here. */
c906108c 135 free_named_symtabs (vp->name);
b8c9b27d 136 xfree (vp);
c906108c
SS
137 }
138
139 vmap = NULL;
140
141 if (exec_bfd)
142 {
143 char *name = bfd_get_filename (exec_bfd);
144
145 if (!bfd_close (exec_bfd))
146 warning ("cannot close \"%s\": %s",
147 name, bfd_errmsg (bfd_get_error ()));
b8c9b27d 148 xfree (name);
c906108c
SS
149 exec_bfd = NULL;
150 }
151
152 if (exec_ops.to_sections)
153 {
b8c9b27d 154 xfree (exec_ops.to_sections);
c906108c
SS
155 exec_ops.to_sections = NULL;
156 exec_ops.to_sections_end = NULL;
157 }
158}
159
1adeb98a
FN
160void
161exec_file_clear (int from_tty)
162{
163 /* Remove exec file. */
164 unpush_target (&exec_ops);
165
166 if (from_tty)
167 printf_unfiltered ("No executable file now.\n");
168}
169
c906108c
SS
170/* Process the first arg in ARGS as the new exec file.
171
c5aa993b
JM
172 This function is intended to be behave essentially the same
173 as exec_file_command, except that the latter will detect when
174 a target is being debugged, and will ask the user whether it
175 should be shut down first. (If the answer is "no", then the
176 new file is ignored.)
c906108c 177
c5aa993b
JM
178 This file is used by exec_file_command, to do the work of opening
179 and processing the exec file after any prompting has happened.
c906108c 180
c5aa993b
JM
181 And, it is used by child_attach, when the attach command was
182 given a pid but not a exec pathname, and the attach command could
183 figure out the pathname from the pid. (In this case, we shouldn't
184 ask the user whether the current target should be shut down --
1adeb98a
FN
185 we're supplying the exec pathname late for good reason.)
186
187 ARGS is assumed to be the filename. */
c906108c
SS
188
189void
1adeb98a 190exec_file_attach (char *filename, int from_tty)
c906108c 191{
c906108c
SS
192 /* Remove any previous exec file. */
193 unpush_target (&exec_ops);
194
195 /* Now open and digest the file the user requested, if any. */
196
1adeb98a
FN
197 if (!filename)
198 {
199 if (from_tty)
200 printf_unfiltered ("No executable file now.\n");
201 }
202 else
c906108c
SS
203 {
204 char *scratch_pathname;
205 int scratch_chan;
c5aa993b 206
c5aa993b
JM
207 scratch_chan = openp (getenv ("PATH"), 1, filename,
208 write_files ? O_RDWR | O_BINARY : O_RDONLY | O_BINARY, 0,
c906108c 209 &scratch_pathname);
cfc3008e 210#if defined(__GO32__) || defined(_WIN32) || defined(__CYGWIN__)
c906108c 211 if (scratch_chan < 0)
c5aa993b
JM
212 {
213 char *exename = alloca (strlen (filename) + 5);
214 strcat (strcpy (exename, filename), ".exe");
215 scratch_chan = openp (getenv ("PATH"), 1, exename, write_files ?
216 O_RDWR | O_BINARY : O_RDONLY | O_BINARY, 0, &scratch_pathname);
217 }
c906108c
SS
218#endif
219 if (scratch_chan < 0)
220 perror_with_name (filename);
221 exec_bfd = bfd_fdopenr (scratch_pathname, gnutarget, scratch_chan);
222
223 if (!exec_bfd)
224 error ("\"%s\": could not open as an executable file: %s",
225 scratch_pathname, bfd_errmsg (bfd_get_error ()));
226
227 /* At this point, scratch_pathname and exec_bfd->name both point to the
c5aa993b
JM
228 same malloc'd string. However exec_close() will attempt to free it
229 via the exec_bfd->name pointer, so we need to make another copy and
230 leave exec_bfd as the new owner of the original copy. */
c2d11a7d 231 scratch_pathname = xstrdup (scratch_pathname);
b8c9b27d 232 make_cleanup (xfree, scratch_pathname);
c5aa993b 233
c906108c
SS
234 if (!bfd_check_format (exec_bfd, bfd_object))
235 {
236 /* Make sure to close exec_bfd, or else "run" might try to use
237 it. */
238 exec_close (0);
239 error ("\"%s\": not in executable format: %s",
240 scratch_pathname, bfd_errmsg (bfd_get_error ()));
241 }
242
243 /* FIXME - This should only be run for RS6000, but the ifdef is a poor
c5aa993b 244 way to accomplish. */
c906108c
SS
245#ifdef IBM6000_TARGET
246 /* Setup initial vmap. */
247
248 map_vmap (exec_bfd, 0);
249 if (vmap == NULL)
250 {
251 /* Make sure to close exec_bfd, or else "run" might try to use
252 it. */
253 exec_close (0);
254 error ("\"%s\": can't find the file sections: %s",
255 scratch_pathname, bfd_errmsg (bfd_get_error ()));
256 }
257#endif /* IBM6000_TARGET */
258
259 if (build_section_table (exec_bfd, &exec_ops.to_sections,
c5aa993b 260 &exec_ops.to_sections_end))
c906108c
SS
261 {
262 /* Make sure to close exec_bfd, or else "run" might try to use
263 it. */
264 exec_close (0);
c5aa993b 265 error ("\"%s\": can't find the file sections: %s",
c906108c
SS
266 scratch_pathname, bfd_errmsg (bfd_get_error ()));
267 }
268
269 /* text_end is sometimes used for where to put call dummies. A
c5aa993b 270 few ports use these for other purposes too. */
c906108c
SS
271 if (NEED_TEXT_START_END)
272 {
273 struct section_table *p;
c5aa993b 274
c906108c
SS
275 /* Set text_start to the lowest address of the start of any
276 readonly code section and set text_end to the highest
277 address of the end of any readonly code section. */
278 /* FIXME: The comment above does not match the code. The
279 code checks for sections with are either code *or*
280 readonly. */
73c1f219 281 CORE_ADDR text_start = ~(CORE_ADDR) 0;
c5aa993b 282 text_end = (CORE_ADDR) 0;
c906108c
SS
283 for (p = exec_ops.to_sections; p < exec_ops.to_sections_end; p++)
284 if (bfd_get_section_flags (p->bfd, p->the_bfd_section)
285 & (SEC_CODE | SEC_READONLY))
286 {
c5aa993b 287 if (text_start > p->addr)
c906108c
SS
288 text_start = p->addr;
289 if (text_end < p->endaddr)
290 text_end = p->endaddr;
291 }
292 }
293
294 validate_files ();
295
296 set_gdbarch_from_file (exec_bfd);
297
298 push_target (&exec_ops);
299
300 /* Tell display code (if any) about the changed file name. */
301 if (exec_file_display_hook)
302 (*exec_file_display_hook) (filename);
303 }
c906108c
SS
304}
305
306/* Process the first arg in ARGS as the new exec file.
307
c5aa993b
JM
308 Note that we have to explicitly ignore additional args, since we can
309 be called from file_command(), which also calls symbol_file_command()
1adeb98a
FN
310 which can take multiple args.
311
312 If ARGS is NULL, we just want to close the exec file. */
c906108c 313
1adeb98a 314static void
fba45db2 315exec_file_command (char *args, int from_tty)
c906108c 316{
1adeb98a
FN
317 char **argv;
318 char *filename;
319
c906108c 320 target_preopen (from_tty);
1adeb98a
FN
321
322 if (args)
323 {
324 /* Scan through the args and pick up the first non option arg
325 as the filename. */
326
327 argv = buildargv (args);
328 if (argv == NULL)
329 nomem (0);
330
331 make_cleanup_freeargv (argv);
332
333 for (; (*argv != NULL) && (**argv == '-'); argv++)
334 {;
335 }
336 if (*argv == NULL)
337 error ("No executable file name was specified");
338
339 filename = tilde_expand (*argv);
340 make_cleanup (xfree, filename);
341 exec_file_attach (filename, from_tty);
342 }
343 else
344 exec_file_attach (NULL, from_tty);
c906108c
SS
345}
346
347/* Set both the exec file and the symbol file, in one command.
348 What a novelty. Why did GDB go through four major releases before this
349 command was added? */
350
351static void
fba45db2 352file_command (char *arg, int from_tty)
c906108c
SS
353{
354 /* FIXME, if we lose on reading the symbol file, we should revert
355 the exec file, but that's rough. */
356 exec_file_command (arg, from_tty);
357 symbol_file_command (arg, from_tty);
358 if (file_changed_hook)
359 file_changed_hook (arg);
360}
c906108c 361\f
c5aa993b 362
c906108c
SS
363/* Locate all mappable sections of a BFD file.
364 table_pp_char is a char * to get it through bfd_map_over_sections;
365 we cast it back to its proper type. */
366
367static void
4efb68b1 368add_to_section_table (bfd *abfd, sec_ptr asect, void *table_pp_char)
c906108c 369{
c5aa993b 370 struct section_table **table_pp = (struct section_table **) table_pp_char;
c906108c
SS
371 flagword aflag;
372
373 aflag = bfd_get_section_flags (abfd, asect);
374 if (!(aflag & SEC_ALLOC))
375 return;
376 if (0 == bfd_section_size (abfd, asect))
377 return;
378 (*table_pp)->bfd = abfd;
379 (*table_pp)->the_bfd_section = asect;
380 (*table_pp)->addr = bfd_section_vma (abfd, asect);
381 (*table_pp)->endaddr = (*table_pp)->addr + bfd_section_size (abfd, asect);
382 (*table_pp)++;
383}
384
385/* Builds a section table, given args BFD, SECTABLE_PTR, SECEND_PTR.
386 Returns 0 if OK, 1 on error. */
387
388int
fba45db2
KB
389build_section_table (bfd *some_bfd, struct section_table **start,
390 struct section_table **end)
c906108c
SS
391{
392 unsigned count;
393
394 count = bfd_count_sections (some_bfd);
395 if (*start)
b8c9b27d 396 xfree (* start);
c906108c
SS
397 *start = (struct section_table *) xmalloc (count * sizeof (**start));
398 *end = *start;
c5aa993b 399 bfd_map_over_sections (some_bfd, add_to_section_table, (char *) end);
c906108c 400 if (*end > *start + count)
e1e9e218 401 internal_error (__FILE__, __LINE__, "failed internal consistency check");
c906108c
SS
402 /* We could realloc the table, but it probably loses for most files. */
403 return 0;
404}
405\f
406static void
4efb68b1 407bfdsec_to_vmap (bfd *abfd, sec_ptr sect, void *arg3)
c906108c
SS
408{
409 struct vmap_and_bfd *vmap_bfd = (struct vmap_and_bfd *) arg3;
410 struct vmap *vp;
411
412 vp = vmap_bfd->pvmap;
413
414 if ((bfd_get_section_flags (abfd, sect) & SEC_LOAD) == 0)
415 return;
416
417 if (STREQ (bfd_section_name (abfd, sect), ".text"))
418 {
419 vp->tstart = bfd_section_vma (abfd, sect);
420 vp->tend = vp->tstart + bfd_section_size (abfd, sect);
421 vp->tvma = bfd_section_vma (abfd, sect);
422 vp->toffs = sect->filepos;
423 }
424 else if (STREQ (bfd_section_name (abfd, sect), ".data"))
425 {
426 vp->dstart = bfd_section_vma (abfd, sect);
427 vp->dend = vp->dstart + bfd_section_size (abfd, sect);
428 vp->dvma = bfd_section_vma (abfd, sect);
429 }
430 /* Silently ignore other types of sections. (FIXME?) */
431}
432
433/* Make a vmap for ABFD which might be a member of the archive ARCH.
434 Return the new vmap. */
435
436struct vmap *
fba45db2 437map_vmap (bfd *abfd, bfd *arch)
c906108c
SS
438{
439 struct vmap_and_bfd vmap_bfd;
440 struct vmap *vp, **vpp;
441
442 vp = (struct vmap *) xmalloc (sizeof (*vp));
443 memset ((char *) vp, '\0', sizeof (*vp));
444 vp->nxt = 0;
445 vp->bfd = abfd;
446 vp->name = bfd_get_filename (arch ? arch : abfd);
447 vp->member = arch ? bfd_get_filename (abfd) : "";
c5aa993b 448
c906108c
SS
449 vmap_bfd.pbfd = arch;
450 vmap_bfd.pvmap = vp;
451 bfd_map_over_sections (abfd, bfdsec_to_vmap, &vmap_bfd);
452
453 /* Find the end of the list and append. */
454 for (vpp = &vmap; *vpp; vpp = &(*vpp)->nxt)
455 ;
456 *vpp = vp;
457
458 return vp;
459}
460\f
461/* Read or write the exec file.
462
463 Args are address within a BFD file, address within gdb address-space,
464 length, and a flag indicating whether to read or write.
465
466 Result is a length:
467
c5aa993b
JM
468 0: We cannot handle this address and length.
469 > 0: We have handled N bytes starting at this address.
470 (If N == length, we did it all.) We might be able
471 to handle more bytes beyond this length, but no
472 promises.
473 < 0: We cannot handle this address, but if somebody
474 else handles (-N) bytes, we can start from there.
c906108c 475
c5aa993b
JM
476 The same routine is used to handle both core and exec files;
477 we just tail-call it with more arguments to select between them. */
c906108c
SS
478
479int
fba45db2 480xfer_memory (CORE_ADDR memaddr, char *myaddr, int len, int write,
29e57380 481 struct mem_attrib *attrib,
fba45db2 482 struct target_ops *target)
c906108c 483{
020cc13c 484 int res;
c906108c
SS
485 struct section_table *p;
486 CORE_ADDR nextsectaddr, memend;
4efb68b1 487 int (*xfer_fn) (bfd *, sec_ptr, void *, file_ptr, bfd_size_type);
88665544 488 asection *section = NULL;
c906108c
SS
489
490 if (len <= 0)
e1e9e218 491 internal_error (__FILE__, __LINE__, "failed internal consistency check");
c906108c
SS
492
493 if (overlay_debugging)
494 {
495 section = find_pc_overlay (memaddr);
496 if (pc_in_unmapped_range (memaddr, section))
497 memaddr = overlay_mapped_address (memaddr, section);
498 }
499
500 memend = memaddr + len;
501 xfer_fn = write ? bfd_set_section_contents : bfd_get_section_contents;
502 nextsectaddr = memend;
503
c906108c
SS
504 for (p = target->to_sections; p < target->to_sections_end; p++)
505 {
506 if (overlay_debugging && section && p->the_bfd_section &&
507 strcmp (section->name, p->the_bfd_section->name) != 0)
c5aa993b 508 continue; /* not the section we need */
c906108c 509 if (memaddr >= p->addr)
3db26b01
JB
510 {
511 if (memend <= p->endaddr)
512 {
513 /* Entire transfer is within this section. */
514 res = xfer_fn (p->bfd, p->the_bfd_section, myaddr,
515 memaddr - p->addr, len);
516 return (res != 0) ? len : 0;
517 }
518 else if (memaddr >= p->endaddr)
519 {
520 /* This section ends before the transfer starts. */
521 continue;
522 }
523 else
524 {
525 /* This section overlaps the transfer. Just do half. */
526 len = p->endaddr - memaddr;
527 res = xfer_fn (p->bfd, p->the_bfd_section, myaddr,
528 memaddr - p->addr, len);
529 return (res != 0) ? len : 0;
530 }
531 }
c906108c
SS
532 else
533 nextsectaddr = min (nextsectaddr, p->addr);
534 }
535
536 if (nextsectaddr >= memend)
c5aa993b 537 return 0; /* We can't help */
c906108c 538 else
c5aa993b 539 return -(nextsectaddr - memaddr); /* Next boundary where we can help */
c906108c 540}
c906108c 541\f
c5aa993b 542
c906108c 543void
fba45db2 544print_section_info (struct target_ops *t, bfd *abfd)
c906108c
SS
545{
546 struct section_table *p;
bcf16802 547 /* FIXME: "016l" is not wide enough when TARGET_ADDR_BIT > 64. */
2fc70c99 548 char *fmt = TARGET_ADDR_BIT <= 32 ? "08l" : "016l";
c906108c 549
c5aa993b 550 printf_filtered ("\t`%s', ", bfd_get_filename (abfd));
c906108c 551 wrap_here (" ");
c5aa993b 552 printf_filtered ("file type %s.\n", bfd_get_target (abfd));
c906108c
SS
553 if (abfd == exec_bfd)
554 {
555 printf_filtered ("\tEntry point: ");
556 print_address_numeric (bfd_get_start_address (abfd), 1, gdb_stdout);
557 printf_filtered ("\n");
558 }
559 for (p = t->to_sections; p < t->to_sections_end; p++)
560 {
2fc70c99
KB
561 printf_filtered ("\t%s", local_hex_string_custom (p->addr, fmt));
562 printf_filtered (" - %s", local_hex_string_custom (p->endaddr, fmt));
bcf16802
KB
563
564 /* FIXME: A format of "08l" is not wide enough for file offsets
565 larger than 4GB. OTOH, making it "016l" isn't desirable either
566 since most output will then be much wider than necessary. It
567 may make sense to test the size of the file and choose the
568 format string accordingly. */
c906108c
SS
569 if (info_verbose)
570 printf_filtered (" @ %s",
2fc70c99 571 local_hex_string_custom (p->the_bfd_section->filepos, "08l"));
c906108c
SS
572 printf_filtered (" is %s", bfd_section_name (p->bfd, p->the_bfd_section));
573 if (p->bfd != abfd)
574 {
575 printf_filtered (" in %s", bfd_get_filename (p->bfd));
576 }
577 printf_filtered ("\n");
578 }
579}
580
581static void
fba45db2 582exec_files_info (struct target_ops *t)
c906108c
SS
583{
584 print_section_info (t, exec_bfd);
585
586 if (vmap)
587 {
588 struct vmap *vp;
589
590 printf_unfiltered ("\tMapping info for file `%s'.\n", vmap->name);
d4f3574e
SS
591 printf_unfiltered ("\t %*s %*s %*s %*s %8.8s %s\n",
592 strlen_paddr (), "tstart",
593 strlen_paddr (), "tend",
594 strlen_paddr (), "dstart",
595 strlen_paddr (), "dend",
596 "section",
c5aa993b
JM
597 "file(member)");
598
599 for (vp = vmap; vp; vp = vp->nxt)
d4f3574e
SS
600 printf_unfiltered ("\t0x%s 0x%s 0x%s 0x%s %s%s%s%s\n",
601 paddr (vp->tstart),
602 paddr (vp->tend),
603 paddr (vp->dstart),
604 paddr (vp->dend),
605 vp->name,
c5aa993b
JM
606 *vp->member ? "(" : "", vp->member,
607 *vp->member ? ")" : "");
c906108c
SS
608 }
609}
610
0f71a2f6
JM
611/* msnyder 5/21/99:
612 exec_set_section_offsets sets the offsets of all the sections
613 in the exec objfile. */
614
615void
fba45db2
KB
616exec_set_section_offsets (bfd_signed_vma text_off, bfd_signed_vma data_off,
617 bfd_signed_vma bss_off)
0f71a2f6
JM
618{
619 struct section_table *sect;
c5aa993b
JM
620
621 for (sect = exec_ops.to_sections;
622 sect < exec_ops.to_sections_end;
0f71a2f6
JM
623 sect++)
624 {
625 flagword flags;
626
627 flags = bfd_get_section_flags (exec_bfd, sect->the_bfd_section);
628
629 if (flags & SEC_CODE)
630 {
c5aa993b 631 sect->addr += text_off;
0f71a2f6
JM
632 sect->endaddr += text_off;
633 }
634 else if (flags & (SEC_DATA | SEC_LOAD))
635 {
c5aa993b 636 sect->addr += data_off;
0f71a2f6
JM
637 sect->endaddr += data_off;
638 }
639 else if (flags & SEC_ALLOC)
640 {
c5aa993b 641 sect->addr += bss_off;
0f71a2f6
JM
642 sect->endaddr += bss_off;
643 }
644 }
645}
646
c906108c 647static void
fba45db2 648set_section_command (char *args, int from_tty)
c906108c
SS
649{
650 struct section_table *p;
651 char *secname;
652 unsigned seclen;
653 unsigned long secaddr;
654 char secprint[100];
655 long offset;
656
657 if (args == 0)
658 error ("Must specify section name and its virtual address");
659
660 /* Parse out section name */
c5aa993b 661 for (secname = args; !isspace (*args); args++);
c906108c
SS
662 seclen = args - secname;
663
664 /* Parse out new virtual address */
665 secaddr = parse_and_eval_address (args);
666
c5aa993b
JM
667 for (p = exec_ops.to_sections; p < exec_ops.to_sections_end; p++)
668 {
669 if (!strncmp (secname, bfd_section_name (exec_bfd, p->the_bfd_section), seclen)
670 && bfd_section_name (exec_bfd, p->the_bfd_section)[seclen] == '\0')
671 {
672 offset = secaddr - p->addr;
673 p->addr += offset;
674 p->endaddr += offset;
675 if (from_tty)
676 exec_files_info (&exec_ops);
677 return;
678 }
c906108c 679 }
c906108c
SS
680 if (seclen >= sizeof (secprint))
681 seclen = sizeof (secprint) - 1;
682 strncpy (secprint, secname, seclen);
683 secprint[seclen] = '\0';
684 error ("Section %s not found", secprint);
685}
686
687/* If mourn is being called in all the right places, this could be say
688 `gdb internal error' (since generic_mourn calls
689 breakpoint_init_inferior). */
690
691static int
fba45db2 692ignore (CORE_ADDR addr, char *contents)
c906108c
SS
693{
694 return 0;
695}
696
be4d1333
MS
697/* Find mapped memory. */
698
699extern void
700exec_set_find_memory_regions (int (*func) (int (*) (CORE_ADDR,
701 unsigned long,
702 int, int, int,
703 void *),
704 void *))
705{
706 exec_ops.to_find_memory_regions = func;
707}
708
709static char *exec_make_note_section (bfd *, int *);
710
c906108c
SS
711/* Fill in the exec file target vector. Very few entries need to be
712 defined. */
713
be4d1333 714static void
fba45db2 715init_exec_ops (void)
c906108c
SS
716{
717 exec_ops.to_shortname = "exec";
718 exec_ops.to_longname = "Local exec file";
719 exec_ops.to_doc = "Use an executable file as a target.\n\
720Specify the filename of the executable file.";
1adeb98a 721 exec_ops.to_open = exec_open;
c906108c
SS
722 exec_ops.to_close = exec_close;
723 exec_ops.to_attach = find_default_attach;
c906108c
SS
724 exec_ops.to_xfer_memory = xfer_memory;
725 exec_ops.to_files_info = exec_files_info;
726 exec_ops.to_insert_breakpoint = ignore;
727 exec_ops.to_remove_breakpoint = ignore;
728 exec_ops.to_create_inferior = find_default_create_inferior;
c906108c
SS
729 exec_ops.to_stratum = file_stratum;
730 exec_ops.to_has_memory = 1;
be4d1333 731 exec_ops.to_make_corefile_notes = exec_make_note_section;
c5aa993b 732 exec_ops.to_magic = OPS_MAGIC;
c906108c
SS
733}
734
735void
fba45db2 736_initialize_exec (void)
c906108c
SS
737{
738 struct cmd_list_element *c;
739
740 init_exec_ops ();
741
742 if (!dbx_commands)
743 {
744 c = add_cmd ("file", class_files, file_command,
745 "Use FILE as program to be debugged.\n\
746It is read for its symbols, for getting the contents of pure memory,\n\
747and it is the program executed when you use the `run' command.\n\
748If FILE cannot be found as specified, your execution directory path\n\
749($PATH) is searched for a command of that name.\n\
750No arg means to have no executable file and no symbols.", &cmdlist);
5ba2abeb 751 set_cmd_completer (c, filename_completer);
c906108c
SS
752 }
753
754 c = add_cmd ("exec-file", class_files, exec_file_command,
c5aa993b 755 "Use FILE as program for getting contents of pure memory.\n\
c906108c
SS
756If FILE cannot be found as specified, your execution directory path\n\
757is searched for a command of that name.\n\
758No arg means have no executable file.", &cmdlist);
5ba2abeb 759 set_cmd_completer (c, filename_completer);
c906108c
SS
760
761 add_com ("section", class_files, set_section_command,
c5aa993b 762 "Change the base address of section SECTION of the exec file to ADDR.\n\
c906108c
SS
763This can be used if the exec file does not contain section addresses,\n\
764(such as in the a.out format), or when the addresses specified in the\n\
765file itself are wrong. Each section must be changed separately. The\n\
766``info files'' command lists all the sections and their addresses.");
767
768 add_show_from_set
c5aa993b 769 (add_set_cmd ("write", class_support, var_boolean, (char *) &write_files,
c906108c
SS
770 "Set writing into executable and core files.",
771 &setlist),
772 &showlist);
c5aa993b 773
c906108c
SS
774 add_target (&exec_ops);
775}
be4d1333
MS
776
777static char *
778exec_make_note_section (bfd *obfd, int *note_size)
779{
c564377f 780 error ("Can't create a corefile");
be4d1333 781}