]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/exec.c
*** empty log message ***
[thirdparty/binutils-gdb.git] / gdb / exec.c
CommitLineData
c906108c 1/* Work with executable files, for GDB.
b6ba6518
KB
2 Copyright 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997,
3 1998, 1999, 2000, 2001
c5aa993b 4 Free Software Foundation, Inc.
c906108c 5
c5aa993b 6 This file is part of GDB.
c906108c 7
c5aa993b
JM
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
c906108c 12
c5aa993b
JM
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
c906108c 17
c5aa993b
JM
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 59 Temple Place - Suite 330,
21 Boston, MA 02111-1307, USA. */
c906108c
SS
22
23#include "defs.h"
24#include "frame.h"
25#include "inferior.h"
26#include "target.h"
27#include "gdbcmd.h"
28#include "language.h"
29#include "symfile.h"
30#include "objfiles.h"
c5f0f3d0 31#include "completer.h"
fd0407d6 32#include "value.h"
c906108c
SS
33
34#ifdef USG
35#include <sys/types.h>
36#endif
37
38#include <fcntl.h>
39#include "gdb_string.h"
40
41#include "gdbcore.h"
42
43#include <ctype.h>
44#include "gdb_stat.h"
45#ifndef O_BINARY
46#define O_BINARY 0
47#endif
48
49#include "xcoffsolib.h"
50
a14ed312 51struct vmap *map_vmap (bfd *, bfd *);
c906108c 52
507f3c78 53void (*file_changed_hook) (char *);
c906108c
SS
54
55/* Prototypes for local functions */
56
a14ed312 57static void add_to_section_table (bfd *, sec_ptr, PTR);
c906108c 58
a14ed312 59static void exec_close (int);
c906108c 60
a14ed312 61static void file_command (char *, int);
c906108c 62
a14ed312 63static void set_section_command (char *, int);
c906108c 64
a14ed312 65static void exec_files_info (struct target_ops *);
c906108c 66
a14ed312 67static void bfdsec_to_vmap (bfd *, sec_ptr, PTR);
c906108c 68
a14ed312 69static int ignore (CORE_ADDR, char *);
c906108c 70
a14ed312 71static void init_exec_ops (void);
c906108c 72
a14ed312 73void _initialize_exec (void);
c906108c 74
c906108c
SS
75/* The target vector for executable files. */
76
77struct target_ops exec_ops;
78
79/* The Binary File Descriptor handle for the executable file. */
80
81bfd *exec_bfd = NULL;
82
83/* Whether to open exec and core files read-only or read-write. */
84
85int write_files = 0;
86
87/* Text start and end addresses (KLUDGE) if needed */
88
89#ifndef NEED_TEXT_START_END
90#define NEED_TEXT_START_END (0)
91#endif
92CORE_ADDR text_start = 0;
c5aa993b 93CORE_ADDR text_end = 0;
c906108c
SS
94
95struct vmap *vmap;
96
1adeb98a
FN
97void
98exec_open (char *args, int from_tty)
99{
100 target_preopen (from_tty);
101 exec_file_attach (args, from_tty);
102}
103
c906108c
SS
104/* ARGSUSED */
105static void
fba45db2 106exec_close (int quitting)
c906108c
SS
107{
108 int need_symtab_cleanup = 0;
109 struct vmap *vp, *nxt;
c5aa993b
JM
110
111 for (nxt = vmap; nxt != NULL;)
c906108c
SS
112 {
113 vp = nxt;
114 nxt = vp->nxt;
115
116 /* if there is an objfile associated with this bfd,
c5aa993b
JM
117 free_objfile() will do proper cleanup of objfile *and* bfd. */
118
c906108c
SS
119 if (vp->objfile)
120 {
121 free_objfile (vp->objfile);
122 need_symtab_cleanup = 1;
123 }
124 else if (vp->bfd != exec_bfd)
125 /* FIXME-leak: We should be freeing vp->name too, I think. */
126 if (!bfd_close (vp->bfd))
127 warning ("cannot close \"%s\": %s",
128 vp->name, bfd_errmsg (bfd_get_error ()));
129
130 /* FIXME: This routine is #if 0'd in symfile.c. What should we
c5aa993b
JM
131 be doing here? Should we just free everything in
132 vp->objfile->symtabs? Should free_objfile do that?
133 FIXME-as-well: free_objfile already free'd vp->name, so it isn't
134 valid here. */
c906108c 135 free_named_symtabs (vp->name);
b8c9b27d 136 xfree (vp);
c906108c
SS
137 }
138
139 vmap = NULL;
140
141 if (exec_bfd)
142 {
143 char *name = bfd_get_filename (exec_bfd);
144
145 if (!bfd_close (exec_bfd))
146 warning ("cannot close \"%s\": %s",
147 name, bfd_errmsg (bfd_get_error ()));
b8c9b27d 148 xfree (name);
c906108c
SS
149 exec_bfd = NULL;
150 }
151
152 if (exec_ops.to_sections)
153 {
b8c9b27d 154 xfree (exec_ops.to_sections);
c906108c
SS
155 exec_ops.to_sections = NULL;
156 exec_ops.to_sections_end = NULL;
157 }
158}
159
1adeb98a
FN
160void
161exec_file_clear (int from_tty)
162{
163 /* Remove exec file. */
164 unpush_target (&exec_ops);
165
166 if (from_tty)
167 printf_unfiltered ("No executable file now.\n");
168}
169
c906108c
SS
170/* Process the first arg in ARGS as the new exec file.
171
c5aa993b
JM
172 This function is intended to be behave essentially the same
173 as exec_file_command, except that the latter will detect when
174 a target is being debugged, and will ask the user whether it
175 should be shut down first. (If the answer is "no", then the
176 new file is ignored.)
c906108c 177
c5aa993b
JM
178 This file is used by exec_file_command, to do the work of opening
179 and processing the exec file after any prompting has happened.
c906108c 180
c5aa993b
JM
181 And, it is used by child_attach, when the attach command was
182 given a pid but not a exec pathname, and the attach command could
183 figure out the pathname from the pid. (In this case, we shouldn't
184 ask the user whether the current target should be shut down --
1adeb98a
FN
185 we're supplying the exec pathname late for good reason.)
186
187 ARGS is assumed to be the filename. */
c906108c
SS
188
189void
1adeb98a 190exec_file_attach (char *filename, int from_tty)
c906108c 191{
c906108c
SS
192 /* Remove any previous exec file. */
193 unpush_target (&exec_ops);
194
195 /* Now open and digest the file the user requested, if any. */
196
1adeb98a
FN
197 if (!filename)
198 {
199 if (from_tty)
200 printf_unfiltered ("No executable file now.\n");
201 }
202 else
c906108c
SS
203 {
204 char *scratch_pathname;
205 int scratch_chan;
c5aa993b 206
c5aa993b
JM
207 scratch_chan = openp (getenv ("PATH"), 1, filename,
208 write_files ? O_RDWR | O_BINARY : O_RDONLY | O_BINARY, 0,
c906108c 209 &scratch_pathname);
cfc3008e 210#if defined(__GO32__) || defined(_WIN32) || defined(__CYGWIN__)
c906108c 211 if (scratch_chan < 0)
c5aa993b
JM
212 {
213 char *exename = alloca (strlen (filename) + 5);
214 strcat (strcpy (exename, filename), ".exe");
215 scratch_chan = openp (getenv ("PATH"), 1, exename, write_files ?
216 O_RDWR | O_BINARY : O_RDONLY | O_BINARY, 0, &scratch_pathname);
217 }
c906108c
SS
218#endif
219 if (scratch_chan < 0)
220 perror_with_name (filename);
221 exec_bfd = bfd_fdopenr (scratch_pathname, gnutarget, scratch_chan);
222
223 if (!exec_bfd)
224 error ("\"%s\": could not open as an executable file: %s",
225 scratch_pathname, bfd_errmsg (bfd_get_error ()));
226
227 /* At this point, scratch_pathname and exec_bfd->name both point to the
c5aa993b
JM
228 same malloc'd string. However exec_close() will attempt to free it
229 via the exec_bfd->name pointer, so we need to make another copy and
230 leave exec_bfd as the new owner of the original copy. */
c2d11a7d 231 scratch_pathname = xstrdup (scratch_pathname);
b8c9b27d 232 make_cleanup (xfree, scratch_pathname);
c5aa993b 233
c906108c
SS
234 if (!bfd_check_format (exec_bfd, bfd_object))
235 {
236 /* Make sure to close exec_bfd, or else "run" might try to use
237 it. */
238 exec_close (0);
239 error ("\"%s\": not in executable format: %s",
240 scratch_pathname, bfd_errmsg (bfd_get_error ()));
241 }
242
243 /* FIXME - This should only be run for RS6000, but the ifdef is a poor
c5aa993b 244 way to accomplish. */
c906108c
SS
245#ifdef IBM6000_TARGET
246 /* Setup initial vmap. */
247
248 map_vmap (exec_bfd, 0);
249 if (vmap == NULL)
250 {
251 /* Make sure to close exec_bfd, or else "run" might try to use
252 it. */
253 exec_close (0);
254 error ("\"%s\": can't find the file sections: %s",
255 scratch_pathname, bfd_errmsg (bfd_get_error ()));
256 }
257#endif /* IBM6000_TARGET */
258
259 if (build_section_table (exec_bfd, &exec_ops.to_sections,
c5aa993b 260 &exec_ops.to_sections_end))
c906108c
SS
261 {
262 /* Make sure to close exec_bfd, or else "run" might try to use
263 it. */
264 exec_close (0);
c5aa993b 265 error ("\"%s\": can't find the file sections: %s",
c906108c
SS
266 scratch_pathname, bfd_errmsg (bfd_get_error ()));
267 }
268
269 /* text_end is sometimes used for where to put call dummies. A
c5aa993b 270 few ports use these for other purposes too. */
c906108c
SS
271 if (NEED_TEXT_START_END)
272 {
273 struct section_table *p;
c5aa993b 274
c906108c
SS
275 /* Set text_start to the lowest address of the start of any
276 readonly code section and set text_end to the highest
277 address of the end of any readonly code section. */
278 /* FIXME: The comment above does not match the code. The
279 code checks for sections with are either code *or*
280 readonly. */
c5aa993b
JM
281 text_start = ~(CORE_ADDR) 0;
282 text_end = (CORE_ADDR) 0;
c906108c
SS
283 for (p = exec_ops.to_sections; p < exec_ops.to_sections_end; p++)
284 if (bfd_get_section_flags (p->bfd, p->the_bfd_section)
285 & (SEC_CODE | SEC_READONLY))
286 {
c5aa993b 287 if (text_start > p->addr)
c906108c
SS
288 text_start = p->addr;
289 if (text_end < p->endaddr)
290 text_end = p->endaddr;
291 }
292 }
293
294 validate_files ();
295
296 set_gdbarch_from_file (exec_bfd);
297
298 push_target (&exec_ops);
299
300 /* Tell display code (if any) about the changed file name. */
301 if (exec_file_display_hook)
302 (*exec_file_display_hook) (filename);
303 }
c906108c
SS
304}
305
306/* Process the first arg in ARGS as the new exec file.
307
c5aa993b
JM
308 Note that we have to explicitly ignore additional args, since we can
309 be called from file_command(), which also calls symbol_file_command()
1adeb98a
FN
310 which can take multiple args.
311
312 If ARGS is NULL, we just want to close the exec file. */
c906108c 313
1adeb98a 314static void
fba45db2 315exec_file_command (char *args, int from_tty)
c906108c 316{
1adeb98a
FN
317 char **argv;
318 char *filename;
319
c906108c 320 target_preopen (from_tty);
1adeb98a
FN
321
322 if (args)
323 {
324 /* Scan through the args and pick up the first non option arg
325 as the filename. */
326
327 argv = buildargv (args);
328 if (argv == NULL)
329 nomem (0);
330
331 make_cleanup_freeargv (argv);
332
333 for (; (*argv != NULL) && (**argv == '-'); argv++)
334 {;
335 }
336 if (*argv == NULL)
337 error ("No executable file name was specified");
338
339 filename = tilde_expand (*argv);
340 make_cleanup (xfree, filename);
341 exec_file_attach (filename, from_tty);
342 }
343 else
344 exec_file_attach (NULL, from_tty);
c906108c
SS
345}
346
347/* Set both the exec file and the symbol file, in one command.
348 What a novelty. Why did GDB go through four major releases before this
349 command was added? */
350
351static void
fba45db2 352file_command (char *arg, int from_tty)
c906108c
SS
353{
354 /* FIXME, if we lose on reading the symbol file, we should revert
355 the exec file, but that's rough. */
356 exec_file_command (arg, from_tty);
357 symbol_file_command (arg, from_tty);
358 if (file_changed_hook)
359 file_changed_hook (arg);
360}
c906108c 361\f
c5aa993b 362
c906108c
SS
363/* Locate all mappable sections of a BFD file.
364 table_pp_char is a char * to get it through bfd_map_over_sections;
365 we cast it back to its proper type. */
366
367static void
fba45db2 368add_to_section_table (bfd *abfd, sec_ptr asect, PTR table_pp_char)
c906108c 369{
c5aa993b 370 struct section_table **table_pp = (struct section_table **) table_pp_char;
c906108c
SS
371 flagword aflag;
372
373 aflag = bfd_get_section_flags (abfd, asect);
374 if (!(aflag & SEC_ALLOC))
375 return;
376 if (0 == bfd_section_size (abfd, asect))
377 return;
378 (*table_pp)->bfd = abfd;
379 (*table_pp)->the_bfd_section = asect;
380 (*table_pp)->addr = bfd_section_vma (abfd, asect);
381 (*table_pp)->endaddr = (*table_pp)->addr + bfd_section_size (abfd, asect);
382 (*table_pp)++;
383}
384
385/* Builds a section table, given args BFD, SECTABLE_PTR, SECEND_PTR.
386 Returns 0 if OK, 1 on error. */
387
388int
fba45db2
KB
389build_section_table (bfd *some_bfd, struct section_table **start,
390 struct section_table **end)
c906108c
SS
391{
392 unsigned count;
393
394 count = bfd_count_sections (some_bfd);
395 if (*start)
b8c9b27d 396 xfree (* start);
c906108c
SS
397 *start = (struct section_table *) xmalloc (count * sizeof (**start));
398 *end = *start;
c5aa993b 399 bfd_map_over_sections (some_bfd, add_to_section_table, (char *) end);
c906108c 400 if (*end > *start + count)
e1e9e218 401 internal_error (__FILE__, __LINE__, "failed internal consistency check");
c906108c
SS
402 /* We could realloc the table, but it probably loses for most files. */
403 return 0;
404}
405\f
406static void
fba45db2 407bfdsec_to_vmap (bfd *abfd, sec_ptr sect, PTR arg3)
c906108c
SS
408{
409 struct vmap_and_bfd *vmap_bfd = (struct vmap_and_bfd *) arg3;
410 struct vmap *vp;
411
412 vp = vmap_bfd->pvmap;
413
414 if ((bfd_get_section_flags (abfd, sect) & SEC_LOAD) == 0)
415 return;
416
417 if (STREQ (bfd_section_name (abfd, sect), ".text"))
418 {
419 vp->tstart = bfd_section_vma (abfd, sect);
420 vp->tend = vp->tstart + bfd_section_size (abfd, sect);
421 vp->tvma = bfd_section_vma (abfd, sect);
422 vp->toffs = sect->filepos;
423 }
424 else if (STREQ (bfd_section_name (abfd, sect), ".data"))
425 {
426 vp->dstart = bfd_section_vma (abfd, sect);
427 vp->dend = vp->dstart + bfd_section_size (abfd, sect);
428 vp->dvma = bfd_section_vma (abfd, sect);
429 }
430 /* Silently ignore other types of sections. (FIXME?) */
431}
432
433/* Make a vmap for ABFD which might be a member of the archive ARCH.
434 Return the new vmap. */
435
436struct vmap *
fba45db2 437map_vmap (bfd *abfd, bfd *arch)
c906108c
SS
438{
439 struct vmap_and_bfd vmap_bfd;
440 struct vmap *vp, **vpp;
441
442 vp = (struct vmap *) xmalloc (sizeof (*vp));
443 memset ((char *) vp, '\0', sizeof (*vp));
444 vp->nxt = 0;
445 vp->bfd = abfd;
446 vp->name = bfd_get_filename (arch ? arch : abfd);
447 vp->member = arch ? bfd_get_filename (abfd) : "";
c5aa993b 448
c906108c
SS
449 vmap_bfd.pbfd = arch;
450 vmap_bfd.pvmap = vp;
451 bfd_map_over_sections (abfd, bfdsec_to_vmap, &vmap_bfd);
452
453 /* Find the end of the list and append. */
454 for (vpp = &vmap; *vpp; vpp = &(*vpp)->nxt)
455 ;
456 *vpp = vp;
457
458 return vp;
459}
460\f
461/* Read or write the exec file.
462
463 Args are address within a BFD file, address within gdb address-space,
464 length, and a flag indicating whether to read or write.
465
466 Result is a length:
467
c5aa993b
JM
468 0: We cannot handle this address and length.
469 > 0: We have handled N bytes starting at this address.
470 (If N == length, we did it all.) We might be able
471 to handle more bytes beyond this length, but no
472 promises.
473 < 0: We cannot handle this address, but if somebody
474 else handles (-N) bytes, we can start from there.
c906108c 475
c5aa993b
JM
476 The same routine is used to handle both core and exec files;
477 we just tail-call it with more arguments to select between them. */
c906108c
SS
478
479int
fba45db2 480xfer_memory (CORE_ADDR memaddr, char *myaddr, int len, int write,
29e57380 481 struct mem_attrib *attrib,
fba45db2 482 struct target_ops *target)
c906108c
SS
483{
484 boolean res;
485 struct section_table *p;
486 CORE_ADDR nextsectaddr, memend;
507f3c78 487 boolean (*xfer_fn) (bfd *, sec_ptr, PTR, file_ptr, bfd_size_type);
88665544 488 asection *section = NULL;
c906108c
SS
489
490 if (len <= 0)
e1e9e218 491 internal_error (__FILE__, __LINE__, "failed internal consistency check");
c906108c
SS
492
493 if (overlay_debugging)
494 {
495 section = find_pc_overlay (memaddr);
496 if (pc_in_unmapped_range (memaddr, section))
497 memaddr = overlay_mapped_address (memaddr, section);
498 }
499
500 memend = memaddr + len;
501 xfer_fn = write ? bfd_set_section_contents : bfd_get_section_contents;
502 nextsectaddr = memend;
503
c906108c
SS
504 for (p = target->to_sections; p < target->to_sections_end; p++)
505 {
506 if (overlay_debugging && section && p->the_bfd_section &&
507 strcmp (section->name, p->the_bfd_section->name) != 0)
c5aa993b 508 continue; /* not the section we need */
c906108c 509 if (memaddr >= p->addr)
c5aa993b 510 if (memend <= p->endaddr)
c906108c
SS
511 {
512 /* Entire transfer is within this section. */
513 res = xfer_fn (p->bfd, p->the_bfd_section, myaddr,
514 memaddr - p->addr, len);
515 return (res != 0) ? len : 0;
516 }
517 else if (memaddr >= p->endaddr)
518 {
519 /* This section ends before the transfer starts. */
520 continue;
521 }
c5aa993b 522 else
c906108c
SS
523 {
524 /* This section overlaps the transfer. Just do half. */
525 len = p->endaddr - memaddr;
526 res = xfer_fn (p->bfd, p->the_bfd_section, myaddr,
527 memaddr - p->addr, len);
528 return (res != 0) ? len : 0;
529 }
530 else
531 nextsectaddr = min (nextsectaddr, p->addr);
532 }
533
534 if (nextsectaddr >= memend)
c5aa993b 535 return 0; /* We can't help */
c906108c 536 else
c5aa993b 537 return -(nextsectaddr - memaddr); /* Next boundary where we can help */
c906108c 538}
c906108c 539\f
c5aa993b 540
c906108c 541void
fba45db2 542print_section_info (struct target_ops *t, bfd *abfd)
c906108c
SS
543{
544 struct section_table *p;
545
c5aa993b 546 printf_filtered ("\t`%s', ", bfd_get_filename (abfd));
c906108c 547 wrap_here (" ");
c5aa993b 548 printf_filtered ("file type %s.\n", bfd_get_target (abfd));
c906108c
SS
549 if (abfd == exec_bfd)
550 {
551 printf_filtered ("\tEntry point: ");
552 print_address_numeric (bfd_get_start_address (abfd), 1, gdb_stdout);
553 printf_filtered ("\n");
554 }
555 for (p = t->to_sections; p < t->to_sections_end; p++)
556 {
557 /* FIXME-32x64 need a print_address_numeric with field width */
558 printf_filtered ("\t%s", local_hex_string_custom ((unsigned long) p->addr, "08l"));
559 printf_filtered (" - %s", local_hex_string_custom ((unsigned long) p->endaddr, "08l"));
560 if (info_verbose)
561 printf_filtered (" @ %s",
562 local_hex_string_custom ((unsigned long) p->the_bfd_section->filepos, "08l"));
563 printf_filtered (" is %s", bfd_section_name (p->bfd, p->the_bfd_section));
564 if (p->bfd != abfd)
565 {
566 printf_filtered (" in %s", bfd_get_filename (p->bfd));
567 }
568 printf_filtered ("\n");
569 }
570}
571
572static void
fba45db2 573exec_files_info (struct target_ops *t)
c906108c
SS
574{
575 print_section_info (t, exec_bfd);
576
577 if (vmap)
578 {
579 struct vmap *vp;
580
581 printf_unfiltered ("\tMapping info for file `%s'.\n", vmap->name);
d4f3574e
SS
582 printf_unfiltered ("\t %*s %*s %*s %*s %8.8s %s\n",
583 strlen_paddr (), "tstart",
584 strlen_paddr (), "tend",
585 strlen_paddr (), "dstart",
586 strlen_paddr (), "dend",
587 "section",
c5aa993b
JM
588 "file(member)");
589
590 for (vp = vmap; vp; vp = vp->nxt)
d4f3574e
SS
591 printf_unfiltered ("\t0x%s 0x%s 0x%s 0x%s %s%s%s%s\n",
592 paddr (vp->tstart),
593 paddr (vp->tend),
594 paddr (vp->dstart),
595 paddr (vp->dend),
596 vp->name,
c5aa993b
JM
597 *vp->member ? "(" : "", vp->member,
598 *vp->member ? ")" : "");
c906108c
SS
599 }
600}
601
0f71a2f6
JM
602/* msnyder 5/21/99:
603 exec_set_section_offsets sets the offsets of all the sections
604 in the exec objfile. */
605
606void
fba45db2
KB
607exec_set_section_offsets (bfd_signed_vma text_off, bfd_signed_vma data_off,
608 bfd_signed_vma bss_off)
0f71a2f6
JM
609{
610 struct section_table *sect;
c5aa993b
JM
611
612 for (sect = exec_ops.to_sections;
613 sect < exec_ops.to_sections_end;
0f71a2f6
JM
614 sect++)
615 {
616 flagword flags;
617
618 flags = bfd_get_section_flags (exec_bfd, sect->the_bfd_section);
619
620 if (flags & SEC_CODE)
621 {
c5aa993b 622 sect->addr += text_off;
0f71a2f6
JM
623 sect->endaddr += text_off;
624 }
625 else if (flags & (SEC_DATA | SEC_LOAD))
626 {
c5aa993b 627 sect->addr += data_off;
0f71a2f6
JM
628 sect->endaddr += data_off;
629 }
630 else if (flags & SEC_ALLOC)
631 {
c5aa993b 632 sect->addr += bss_off;
0f71a2f6
JM
633 sect->endaddr += bss_off;
634 }
635 }
636}
637
c906108c 638static void
fba45db2 639set_section_command (char *args, int from_tty)
c906108c
SS
640{
641 struct section_table *p;
642 char *secname;
643 unsigned seclen;
644 unsigned long secaddr;
645 char secprint[100];
646 long offset;
647
648 if (args == 0)
649 error ("Must specify section name and its virtual address");
650
651 /* Parse out section name */
c5aa993b 652 for (secname = args; !isspace (*args); args++);
c906108c
SS
653 seclen = args - secname;
654
655 /* Parse out new virtual address */
656 secaddr = parse_and_eval_address (args);
657
c5aa993b
JM
658 for (p = exec_ops.to_sections; p < exec_ops.to_sections_end; p++)
659 {
660 if (!strncmp (secname, bfd_section_name (exec_bfd, p->the_bfd_section), seclen)
661 && bfd_section_name (exec_bfd, p->the_bfd_section)[seclen] == '\0')
662 {
663 offset = secaddr - p->addr;
664 p->addr += offset;
665 p->endaddr += offset;
666 if (from_tty)
667 exec_files_info (&exec_ops);
668 return;
669 }
c906108c 670 }
c906108c
SS
671 if (seclen >= sizeof (secprint))
672 seclen = sizeof (secprint) - 1;
673 strncpy (secprint, secname, seclen);
674 secprint[seclen] = '\0';
675 error ("Section %s not found", secprint);
676}
677
678/* If mourn is being called in all the right places, this could be say
679 `gdb internal error' (since generic_mourn calls
680 breakpoint_init_inferior). */
681
682static int
fba45db2 683ignore (CORE_ADDR addr, char *contents)
c906108c
SS
684{
685 return 0;
686}
687
688/* Fill in the exec file target vector. Very few entries need to be
689 defined. */
690
691void
fba45db2 692init_exec_ops (void)
c906108c
SS
693{
694 exec_ops.to_shortname = "exec";
695 exec_ops.to_longname = "Local exec file";
696 exec_ops.to_doc = "Use an executable file as a target.\n\
697Specify the filename of the executable file.";
1adeb98a 698 exec_ops.to_open = exec_open;
c906108c
SS
699 exec_ops.to_close = exec_close;
700 exec_ops.to_attach = find_default_attach;
701 exec_ops.to_require_attach = find_default_require_attach;
702 exec_ops.to_require_detach = find_default_require_detach;
703 exec_ops.to_xfer_memory = xfer_memory;
704 exec_ops.to_files_info = exec_files_info;
705 exec_ops.to_insert_breakpoint = ignore;
706 exec_ops.to_remove_breakpoint = ignore;
707 exec_ops.to_create_inferior = find_default_create_inferior;
708 exec_ops.to_clone_and_follow_inferior = find_default_clone_and_follow_inferior;
709 exec_ops.to_stratum = file_stratum;
710 exec_ops.to_has_memory = 1;
c5aa993b 711 exec_ops.to_magic = OPS_MAGIC;
c906108c
SS
712}
713
714void
fba45db2 715_initialize_exec (void)
c906108c
SS
716{
717 struct cmd_list_element *c;
718
719 init_exec_ops ();
720
721 if (!dbx_commands)
722 {
723 c = add_cmd ("file", class_files, file_command,
724 "Use FILE as program to be debugged.\n\
725It is read for its symbols, for getting the contents of pure memory,\n\
726and it is the program executed when you use the `run' command.\n\
727If FILE cannot be found as specified, your execution directory path\n\
728($PATH) is searched for a command of that name.\n\
729No arg means to have no executable file and no symbols.", &cmdlist);
730 c->completer = filename_completer;
731 }
732
733 c = add_cmd ("exec-file", class_files, exec_file_command,
c5aa993b 734 "Use FILE as program for getting contents of pure memory.\n\
c906108c
SS
735If FILE cannot be found as specified, your execution directory path\n\
736is searched for a command of that name.\n\
737No arg means have no executable file.", &cmdlist);
738 c->completer = filename_completer;
739
740 add_com ("section", class_files, set_section_command,
c5aa993b 741 "Change the base address of section SECTION of the exec file to ADDR.\n\
c906108c
SS
742This can be used if the exec file does not contain section addresses,\n\
743(such as in the a.out format), or when the addresses specified in the\n\
744file itself are wrong. Each section must be changed separately. The\n\
745``info files'' command lists all the sections and their addresses.");
746
747 add_show_from_set
c5aa993b 748 (add_set_cmd ("write", class_support, var_boolean, (char *) &write_files,
c906108c
SS
749 "Set writing into executable and core files.",
750 &setlist),
751 &showlist);
c5aa993b 752
c906108c
SS
753 add_target (&exec_ops);
754}