]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/exec.c
merge from gcc
[thirdparty/binutils-gdb.git] / gdb / exec.c
CommitLineData
c906108c 1/* Work with executable files, for GDB.
4646aa9d 2
28e7fd62 3 Copyright (C) 1988-2013 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "frame.h"
22#include "inferior.h"
23#include "target.h"
24#include "gdbcmd.h"
25#include "language.h"
0ba1096a 26#include "filenames.h"
c906108c
SS
27#include "symfile.h"
28#include "objfiles.h"
c5f0f3d0 29#include "completer.h"
fd0407d6 30#include "value.h"
4646aa9d 31#include "exec.h"
ea53e89f 32#include "observer.h"
dacec2a8 33#include "arch-utils.h"
6c95b8df
PA
34#include "gdbthread.h"
35#include "progspace.h"
cbb099e8 36#include "gdb_bfd.h"
c906108c 37
c906108c 38#include <fcntl.h>
dbda9972 39#include "readline/readline.h"
c906108c
SS
40#include "gdb_string.h"
41
42#include "gdbcore.h"
43
44#include <ctype.h>
45#include "gdb_stat.h"
c906108c 46
9a4105ab 47void (*deprecated_file_changed_hook) (char *);
c906108c
SS
48
49/* Prototypes for local functions */
50
a14ed312 51static void file_command (char *, int);
c906108c 52
a14ed312 53static void set_section_command (char *, int);
c906108c 54
a14ed312 55static void exec_files_info (struct target_ops *);
c906108c 56
a14ed312 57static void init_exec_ops (void);
c906108c 58
a14ed312 59void _initialize_exec (void);
c906108c 60
c906108c
SS
61/* The target vector for executable files. */
62
63struct target_ops exec_ops;
64
6c95b8df
PA
65/* True if the exec target is pushed on the stack. */
66static int using_exec_ops;
07b82ea5 67
c906108c
SS
68/* Whether to open exec and core files read-only or read-write. */
69
70int write_files = 0;
920d2a44
AC
71static void
72show_write_files (struct ui_file *file, int from_tty,
73 struct cmd_list_element *c, const char *value)
74{
75 fprintf_filtered (file, _("Writing into executable and core files is %s.\n"),
76 value);
77}
78
c906108c 79
4c42eaff 80static void
1adeb98a
FN
81exec_open (char *args, int from_tty)
82{
83 target_preopen (from_tty);
84 exec_file_attach (args, from_tty);
85}
86
07b82ea5
PA
87/* Close and clear exec_bfd. If we end up with no target sections to
88 read memory from, this unpushes the exec_ops target. */
89
6c95b8df
PA
90void
91exec_close (void)
07b82ea5
PA
92{
93 if (exec_bfd)
94 {
95 bfd *abfd = exec_bfd;
07b82ea5 96
cbb099e8 97 gdb_bfd_unref (abfd);
07b82ea5
PA
98
99 /* Removing target sections may close the exec_ops target.
100 Clear exec_bfd before doing so to prevent recursion. */
101 exec_bfd = NULL;
102 exec_bfd_mtime = 0;
103
ed9eebaf 104 remove_target_sections (&exec_bfd, abfd);
07b82ea5
PA
105 }
106}
107
6c95b8df
PA
108/* This is the target_close implementation. Clears all target
109 sections and closes all executable bfds from all program spaces. */
110
c906108c 111static void
460014f5 112exec_close_1 (void)
c906108c 113{
6c95b8df
PA
114 using_exec_ops = 0;
115
6c95b8df
PA
116 {
117 struct program_space *ss;
118 struct cleanup *old_chain;
c906108c 119
6c95b8df
PA
120 old_chain = save_current_program_space ();
121 ALL_PSPACES (ss)
122 {
123 set_current_program_space (ss);
124
125 /* Delete all target sections. */
126 resize_section_table
127 (current_target_sections,
128 -resize_section_table (current_target_sections, 0));
129
130 exec_close ();
131 }
132
133 do_cleanups (old_chain);
134 }
c906108c
SS
135}
136
1adeb98a
FN
137void
138exec_file_clear (int from_tty)
139{
140 /* Remove exec file. */
6c95b8df 141 exec_close ();
1adeb98a
FN
142
143 if (from_tty)
a3f17187 144 printf_unfiltered (_("No executable file now.\n"));
1adeb98a
FN
145}
146
907083d1 147/* Set FILENAME as the new exec file.
c906108c 148
c5aa993b
JM
149 This function is intended to be behave essentially the same
150 as exec_file_command, except that the latter will detect when
151 a target is being debugged, and will ask the user whether it
152 should be shut down first. (If the answer is "no", then the
153 new file is ignored.)
c906108c 154
c5aa993b
JM
155 This file is used by exec_file_command, to do the work of opening
156 and processing the exec file after any prompting has happened.
c906108c 157
c5aa993b
JM
158 And, it is used by child_attach, when the attach command was
159 given a pid but not a exec pathname, and the attach command could
160 figure out the pathname from the pid. (In this case, we shouldn't
161 ask the user whether the current target should be shut down --
907083d1 162 we're supplying the exec pathname late for good reason.) */
c906108c
SS
163
164void
1adeb98a 165exec_file_attach (char *filename, int from_tty)
c906108c 166{
c906108c 167 /* Remove any previous exec file. */
6c95b8df 168 exec_close ();
c906108c
SS
169
170 /* Now open and digest the file the user requested, if any. */
171
1adeb98a
FN
172 if (!filename)
173 {
174 if (from_tty)
a3f17187 175 printf_unfiltered (_("No executable file now.\n"));
7a107747
DJ
176
177 set_gdbarch_from_file (NULL);
1adeb98a
FN
178 }
179 else
c906108c 180 {
f7545552 181 struct cleanup *cleanups;
c906108c
SS
182 char *scratch_pathname;
183 int scratch_chan;
07b82ea5 184 struct target_section *sections = NULL, *sections_end = NULL;
d18b8b7a 185 char **matching;
c5aa993b 186
014d698b 187 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST, filename,
fbdebf46 188 write_files ? O_RDWR | O_BINARY : O_RDONLY | O_BINARY,
c906108c 189 &scratch_pathname);
cfc3008e 190#if defined(__GO32__) || defined(_WIN32) || defined(__CYGWIN__)
c906108c 191 if (scratch_chan < 0)
c5aa993b
JM
192 {
193 char *exename = alloca (strlen (filename) + 5);
d7f9d729 194
c5aa993b 195 strcat (strcpy (exename, filename), ".exe");
014d698b 196 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST, exename,
fbdebf46 197 write_files ? O_RDWR | O_BINARY : O_RDONLY | O_BINARY,
014d698b 198 &scratch_pathname);
c5aa993b 199 }
c906108c 200#endif
17d6efc4
JB
201 if (scratch_chan < 0)
202 perror_with_name (filename);
a4453b7e
TT
203
204 cleanups = make_cleanup (xfree, scratch_pathname);
205
1c00ec6b
TT
206 if (write_files)
207 exec_bfd = gdb_bfd_fopen (scratch_pathname, gnutarget,
208 FOPEN_RUB, scratch_chan);
209 else
210 exec_bfd = gdb_bfd_open (scratch_pathname, gnutarget, scratch_chan);
c906108c
SS
211
212 if (!exec_bfd)
9fe4a216 213 {
9fe4a216
TT
214 error (_("\"%s\": could not open as an executable file: %s"),
215 scratch_pathname, bfd_errmsg (bfd_get_error ()));
216 }
c906108c 217
d18b8b7a 218 if (!bfd_check_format_matches (exec_bfd, bfd_object, &matching))
c906108c
SS
219 {
220 /* Make sure to close exec_bfd, or else "run" might try to use
221 it. */
6c95b8df 222 exec_close ();
8a3fe4f8 223 error (_("\"%s\": not in executable format: %s"),
d18b8b7a
HZ
224 scratch_pathname,
225 gdb_bfd_errmsg (bfd_get_error (), matching));
c906108c
SS
226 }
227
07b82ea5 228 if (build_section_table (exec_bfd, &sections, &sections_end))
c906108c
SS
229 {
230 /* Make sure to close exec_bfd, or else "run" might try to use
231 it. */
6c95b8df 232 exec_close ();
8a3fe4f8 233 error (_("\"%s\": can't find the file sections: %s"),
c906108c
SS
234 scratch_pathname, bfd_errmsg (bfd_get_error ()));
235 }
236
c04ea773
DJ
237 exec_bfd_mtime = bfd_get_mtime (exec_bfd);
238
c906108c
SS
239 validate_files ();
240
241 set_gdbarch_from_file (exec_bfd);
242
07b82ea5 243 /* Add the executable's sections to the current address spaces'
6c95b8df
PA
244 list of sections. This possibly pushes the exec_ops
245 target. */
ed9eebaf 246 add_target_sections (&exec_bfd, sections, sections_end);
07b82ea5 247 xfree (sections);
c906108c
SS
248
249 /* Tell display code (if any) about the changed file name. */
9a4105ab
AC
250 if (deprecated_exec_file_display_hook)
251 (*deprecated_exec_file_display_hook) (filename);
f7545552
TT
252
253 do_cleanups (cleanups);
c906108c 254 }
ce7d4522 255 bfd_cache_close_all ();
781b42b0 256 observer_notify_executable_changed ();
c906108c
SS
257}
258
259/* Process the first arg in ARGS as the new exec file.
260
c5aa993b
JM
261 Note that we have to explicitly ignore additional args, since we can
262 be called from file_command(), which also calls symbol_file_command()
1adeb98a
FN
263 which can take multiple args.
264
0963b4bd 265 If ARGS is NULL, we just want to close the exec file. */
c906108c 266
1adeb98a 267static void
fba45db2 268exec_file_command (char *args, int from_tty)
c906108c 269{
1adeb98a
FN
270 char **argv;
271 char *filename;
4c42eaff
DJ
272
273 if (from_tty && target_has_execution
274 && !query (_("A program is being debugged already.\n"
275 "Are you sure you want to change the file? ")))
276 error (_("File not changed."));
1adeb98a
FN
277
278 if (args)
279 {
f7545552
TT
280 struct cleanup *cleanups;
281
1adeb98a
FN
282 /* Scan through the args and pick up the first non option arg
283 as the filename. */
284
d1a41061 285 argv = gdb_buildargv (args);
f7545552 286 cleanups = make_cleanup_freeargv (argv);
1adeb98a
FN
287
288 for (; (*argv != NULL) && (**argv == '-'); argv++)
289 {;
290 }
291 if (*argv == NULL)
8a3fe4f8 292 error (_("No executable file name was specified"));
1adeb98a
FN
293
294 filename = tilde_expand (*argv);
295 make_cleanup (xfree, filename);
296 exec_file_attach (filename, from_tty);
f7545552
TT
297
298 do_cleanups (cleanups);
1adeb98a
FN
299 }
300 else
301 exec_file_attach (NULL, from_tty);
c906108c
SS
302}
303
0963b4bd 304/* Set both the exec file and the symbol file, in one command.
c906108c
SS
305 What a novelty. Why did GDB go through four major releases before this
306 command was added? */
307
308static void
fba45db2 309file_command (char *arg, int from_tty)
c906108c
SS
310{
311 /* FIXME, if we lose on reading the symbol file, we should revert
312 the exec file, but that's rough. */
313 exec_file_command (arg, from_tty);
314 symbol_file_command (arg, from_tty);
9a4105ab
AC
315 if (deprecated_file_changed_hook)
316 deprecated_file_changed_hook (arg);
c906108c 317}
c906108c 318\f
c5aa993b 319
0963b4bd 320/* Locate all mappable sections of a BFD file.
c906108c
SS
321 table_pp_char is a char * to get it through bfd_map_over_sections;
322 we cast it back to its proper type. */
323
324static void
7be0c536
AC
325add_to_section_table (bfd *abfd, struct bfd_section *asect,
326 void *table_pp_char)
c906108c 327{
0542c86d 328 struct target_section **table_pp = (struct target_section **) table_pp_char;
c906108c
SS
329 flagword aflag;
330
2b2848e2
DE
331 gdb_assert (abfd == asect->owner);
332
0f5d55d8
JB
333 /* Check the section flags, but do not discard zero-length sections, since
334 some symbols may still be attached to this section. For instance, we
335 encountered on sparc-solaris 2.10 a shared library with an empty .bss
336 section to which a symbol named "_end" was attached. The address
337 of this symbol still needs to be relocated. */
c906108c
SS
338 aflag = bfd_get_section_flags (abfd, asect);
339 if (!(aflag & SEC_ALLOC))
340 return;
0f5d55d8 341
ed9eebaf 342 (*table_pp)->key = NULL;
c906108c
SS
343 (*table_pp)->the_bfd_section = asect;
344 (*table_pp)->addr = bfd_section_vma (abfd, asect);
345 (*table_pp)->endaddr = (*table_pp)->addr + bfd_section_size (abfd, asect);
346 (*table_pp)++;
347}
348
07b82ea5
PA
349int
350resize_section_table (struct target_section_table *table, int num_added)
351{
07b82ea5
PA
352 int old_count;
353 int new_count;
354
07b82ea5
PA
355 old_count = table->sections_end - table->sections;
356
357 new_count = num_added + old_count;
358
359 if (new_count)
360 {
361 table->sections = xrealloc (table->sections,
362 sizeof (struct target_section) * new_count);
363 table->sections_end = table->sections + new_count;
364 }
365 else
366 {
367 xfree (table->sections);
368 table->sections = table->sections_end = NULL;
369 }
370
371 return old_count;
372}
373
c906108c
SS
374/* Builds a section table, given args BFD, SECTABLE_PTR, SECEND_PTR.
375 Returns 0 if OK, 1 on error. */
376
377int
0542c86d
PA
378build_section_table (struct bfd *some_bfd, struct target_section **start,
379 struct target_section **end)
c906108c
SS
380{
381 unsigned count;
382
383 count = bfd_count_sections (some_bfd);
384 if (*start)
b8c9b27d 385 xfree (* start);
0542c86d 386 *start = (struct target_section *) xmalloc (count * sizeof (**start));
c906108c 387 *end = *start;
c5aa993b 388 bfd_map_over_sections (some_bfd, add_to_section_table, (char *) end);
c906108c 389 if (*end > *start + count)
3e43a32a
MS
390 internal_error (__FILE__, __LINE__,
391 _("failed internal consistency check"));
c906108c
SS
392 /* We could realloc the table, but it probably loses for most files. */
393 return 0;
394}
07b82ea5
PA
395
396/* Add the sections array defined by [SECTIONS..SECTIONS_END[ to the
397 current set of target sections. */
398
399void
ed9eebaf
TT
400add_target_sections (void *key,
401 struct target_section *sections,
07b82ea5
PA
402 struct target_section *sections_end)
403{
404 int count;
405 struct target_section_table *table = current_target_sections;
406
407 count = sections_end - sections;
408
409 if (count > 0)
410 {
411 int space = resize_section_table (table, count);
ed9eebaf 412 int i;
d7f9d729 413
ed9eebaf
TT
414 for (i = 0; i < count; ++i)
415 {
416 table->sections[space + i] = sections[i];
417 table->sections[space + i].key = key;
418 }
07b82ea5
PA
419
420 /* If these are the first file sections we can provide memory
421 from, push the file_stratum target. */
6c95b8df
PA
422 if (!using_exec_ops)
423 {
424 using_exec_ops = 1;
425 push_target (&exec_ops);
426 }
07b82ea5
PA
427 }
428}
429
430/* Remove all target sections taken from ABFD. */
431
432void
ed9eebaf 433remove_target_sections (void *key, bfd *abfd)
07b82ea5
PA
434{
435 struct target_section *src, *dest;
07b82ea5
PA
436 struct target_section_table *table = current_target_sections;
437
438 dest = table->sections;
439 for (src = table->sections; src < table->sections_end; src++)
2b2848e2 440 if (src->key != key || src->the_bfd_section->owner != abfd)
07b82ea5
PA
441 {
442 /* Keep this section. */
443 if (dest < src)
444 *dest = *src;
445 dest++;
446 }
447
448 /* If we've dropped any sections, resize the section table. */
449 if (dest < src)
450 {
451 int old_count;
452
453 old_count = resize_section_table (table, dest - src);
454
455 /* If we don't have any more sections to read memory from,
456 remove the file_stratum target from the stack. */
457 if (old_count + (dest - src) == 0)
6c95b8df
PA
458 {
459 struct program_space *pspace;
460
461 ALL_PSPACES (pspace)
462 if (pspace->target_sections.sections
463 != pspace->target_sections.sections_end)
464 return;
465
466 unpush_target (&exec_ops);
467 }
07b82ea5
PA
468 }
469}
470
c906108c 471\f
348f8c02 472
e6ca34fc
PA
473VEC(mem_range_s) *
474section_table_available_memory (VEC(mem_range_s) *memory,
424447ee 475 CORE_ADDR memaddr, ULONGEST len,
e6ca34fc
PA
476 struct target_section *sections,
477 struct target_section *sections_end)
478{
479 struct target_section *p;
e6ca34fc
PA
480
481 for (p = sections; p < sections_end; p++)
482 {
2b2848e2
DE
483 if ((bfd_get_section_flags (p->the_bfd_section->owner,
484 p->the_bfd_section)
e6ca34fc
PA
485 & SEC_READONLY) == 0)
486 continue;
487
488 /* Copy the meta-data, adjusted. */
489 if (mem_ranges_overlap (p->addr, p->endaddr - p->addr, memaddr, len))
490 {
491 ULONGEST lo1, hi1, lo2, hi2;
492 struct mem_range *r;
493
494 lo1 = memaddr;
495 hi1 = memaddr + len;
496
497 lo2 = p->addr;
498 hi2 = p->endaddr;
499
500 r = VEC_safe_push (mem_range_s, memory, NULL);
501
502 r->start = max (lo1, lo2);
503 r->length = min (hi1, hi2) - r->start;
504 }
505 }
506
507 return memory;
508}
509
07b82ea5
PA
510int
511section_table_xfer_memory_partial (gdb_byte *readbuf, const gdb_byte *writebuf,
512 ULONGEST offset, LONGEST len,
513 struct target_section *sections,
514 struct target_section *sections_end,
515 const char *section_name)
c906108c 516{
020cc13c 517 int res;
0542c86d 518 struct target_section *p;
07b82ea5
PA
519 ULONGEST memaddr = offset;
520 ULONGEST memend = memaddr + len;
c906108c
SS
521
522 if (len <= 0)
3e43a32a
MS
523 internal_error (__FILE__, __LINE__,
524 _("failed internal consistency check"));
c906108c 525
348f8c02 526 for (p = sections; p < sections_end; p++)
c906108c 527 {
2b2848e2
DE
528 struct bfd_section *asect = p->the_bfd_section;
529 bfd *abfd = asect->owner;
530
531 if (section_name && strcmp (section_name, asect->name) != 0)
0963b4bd 532 continue; /* not the section we need. */
c906108c 533 if (memaddr >= p->addr)
3db26b01
JB
534 {
535 if (memend <= p->endaddr)
536 {
537 /* Entire transfer is within this section. */
07b82ea5 538 if (writebuf)
2b2848e2 539 res = bfd_set_section_contents (abfd, asect,
07b82ea5 540 writebuf, memaddr - p->addr,
85302095
AC
541 len);
542 else
2b2848e2 543 res = bfd_get_section_contents (abfd, asect,
07b82ea5 544 readbuf, memaddr - p->addr,
85302095 545 len);
3db26b01
JB
546 return (res != 0) ? len : 0;
547 }
548 else if (memaddr >= p->endaddr)
549 {
550 /* This section ends before the transfer starts. */
551 continue;
552 }
553 else
554 {
555 /* This section overlaps the transfer. Just do half. */
556 len = p->endaddr - memaddr;
07b82ea5 557 if (writebuf)
2b2848e2 558 res = bfd_set_section_contents (abfd, asect,
07b82ea5 559 writebuf, memaddr - p->addr,
85302095
AC
560 len);
561 else
2b2848e2 562 res = bfd_get_section_contents (abfd, asect,
07b82ea5 563 readbuf, memaddr - p->addr,
85302095 564 len);
3db26b01
JB
565 return (res != 0) ? len : 0;
566 }
567 }
c906108c
SS
568 }
569
0963b4bd 570 return 0; /* We can't help. */
c906108c 571}
348f8c02 572
70221824 573static struct target_section_table *
07b82ea5 574exec_get_section_table (struct target_ops *ops)
348f8c02 575{
07b82ea5 576 return current_target_sections;
348f8c02
PA
577}
578
07b82ea5
PA
579static LONGEST
580exec_xfer_partial (struct target_ops *ops, enum target_object object,
581 const char *annex, gdb_byte *readbuf,
582 const gdb_byte *writebuf,
583 ULONGEST offset, LONGEST len)
348f8c02 584{
07b82ea5
PA
585 struct target_section_table *table = target_get_section_table (ops);
586
587 if (object == TARGET_OBJECT_MEMORY)
588 return section_table_xfer_memory_partial (readbuf, writebuf,
589 offset, len,
590 table->sections,
591 table->sections_end,
592 NULL);
593 else
594 return -1;
348f8c02 595}
c906108c 596\f
c5aa993b 597
c906108c 598void
07b82ea5 599print_section_info (struct target_section_table *t, bfd *abfd)
c906108c 600{
5af949e3 601 struct gdbarch *gdbarch = gdbarch_from_bfd (abfd);
0542c86d 602 struct target_section *p;
17a912b6 603 /* FIXME: 16 is not wide enough when gdbarch_addr_bit > 64. */
5af949e3 604 int wid = gdbarch_addr_bit (gdbarch) <= 32 ? 8 : 16;
c906108c 605
c5aa993b 606 printf_filtered ("\t`%s', ", bfd_get_filename (abfd));
c906108c 607 wrap_here (" ");
a3f17187 608 printf_filtered (_("file type %s.\n"), bfd_get_target (abfd));
c906108c 609 if (abfd == exec_bfd)
51bee8e9 610 {
3e43a32a
MS
611 /* gcc-3.4 does not like the initialization in
612 <p == t->sections_end>. */
d904de5b 613 bfd_vma displacement = 0;
2f1bdd26 614 bfd_vma entry_point;
51bee8e9
JK
615
616 for (p = t->sections; p < t->sections_end; p++)
617 {
2b2848e2
DE
618 struct bfd_section *psect = p->the_bfd_section;
619 bfd *pbfd = psect->owner;
51bee8e9 620
2b2848e2 621 if ((bfd_get_section_flags (pbfd, psect) & (SEC_ALLOC | SEC_LOAD))
51bee8e9
JK
622 != (SEC_ALLOC | SEC_LOAD))
623 continue;
624
2b2848e2
DE
625 if (bfd_get_section_vma (pbfd, psect) <= abfd->start_address
626 && abfd->start_address < (bfd_get_section_vma (pbfd, psect)
627 + bfd_get_section_size (psect)))
51bee8e9 628 {
2b2848e2 629 displacement = p->addr - bfd_get_section_vma (pbfd, psect);
51bee8e9
JK
630 break;
631 }
632 }
633 if (p == t->sections_end)
b37520b6 634 warning (_("Cannot find section for the entry point of %s."),
d904de5b 635 bfd_get_filename (abfd));
51bee8e9 636
2f1bdd26
MGD
637 entry_point = gdbarch_addr_bits_remove (gdbarch,
638 bfd_get_start_address (abfd)
639 + displacement);
51bee8e9 640 printf_filtered (_("\tEntry point: %s\n"),
2f1bdd26 641 paddress (gdbarch, entry_point));
51bee8e9 642 }
07b82ea5 643 for (p = t->sections; p < t->sections_end; p++)
c906108c 644 {
2b2848e2
DE
645 struct bfd_section *psect = p->the_bfd_section;
646 bfd *pbfd = psect->owner;
647
bb599908
PH
648 printf_filtered ("\t%s", hex_string_custom (p->addr, wid));
649 printf_filtered (" - %s", hex_string_custom (p->endaddr, wid));
bcf16802
KB
650
651 /* FIXME: A format of "08l" is not wide enough for file offsets
652 larger than 4GB. OTOH, making it "016l" isn't desirable either
653 since most output will then be much wider than necessary. It
654 may make sense to test the size of the file and choose the
655 format string accordingly. */
a3f17187 656 /* FIXME: i18n: Need to rewrite this sentence. */
c906108c
SS
657 if (info_verbose)
658 printf_filtered (" @ %s",
2b2848e2
DE
659 hex_string_custom (psect->filepos, 8));
660 printf_filtered (" is %s", bfd_section_name (pbfd, psect));
661 if (pbfd != abfd)
662 printf_filtered (" in %s", bfd_get_filename (pbfd));
c906108c
SS
663 printf_filtered ("\n");
664 }
665}
666
667static void
fba45db2 668exec_files_info (struct target_ops *t)
c906108c 669{
57008375
JK
670 if (exec_bfd)
671 print_section_info (current_target_sections, exec_bfd);
672 else
673 puts_filtered (_("\t<no file loaded>\n"));
c906108c
SS
674}
675
676static void
fba45db2 677set_section_command (char *args, int from_tty)
c906108c 678{
0542c86d 679 struct target_section *p;
c906108c
SS
680 char *secname;
681 unsigned seclen;
682 unsigned long secaddr;
683 char secprint[100];
684 long offset;
07b82ea5 685 struct target_section_table *table;
c906108c
SS
686
687 if (args == 0)
8a3fe4f8 688 error (_("Must specify section name and its virtual address"));
c906108c 689
0963b4bd 690 /* Parse out section name. */
c5aa993b 691 for (secname = args; !isspace (*args); args++);
c906108c
SS
692 seclen = args - secname;
693
0963b4bd 694 /* Parse out new virtual address. */
c906108c
SS
695 secaddr = parse_and_eval_address (args);
696
07b82ea5
PA
697 table = current_target_sections;
698 for (p = table->sections; p < table->sections_end; p++)
c5aa993b 699 {
57008375 700 if (!strncmp (secname, bfd_section_name (p->bfd,
3e43a32a 701 p->the_bfd_section), seclen)
57008375 702 && bfd_section_name (p->bfd, p->the_bfd_section)[seclen] == '\0')
c5aa993b
JM
703 {
704 offset = secaddr - p->addr;
705 p->addr += offset;
706 p->endaddr += offset;
707 if (from_tty)
708 exec_files_info (&exec_ops);
709 return;
710 }
c906108c 711 }
c906108c
SS
712 if (seclen >= sizeof (secprint))
713 seclen = sizeof (secprint) - 1;
714 strncpy (secprint, secname, seclen);
715 secprint[seclen] = '\0';
8a3fe4f8 716 error (_("Section %s not found"), secprint);
c906108c
SS
717}
718
30510692
DJ
719/* If we can find a section in FILENAME with BFD index INDEX, adjust
720 it to ADDRESS. */
c1bd25fd
DJ
721
722void
723exec_set_section_address (const char *filename, int index, CORE_ADDR address)
724{
0542c86d 725 struct target_section *p;
07b82ea5 726 struct target_section_table *table;
c1bd25fd 727
07b82ea5
PA
728 table = current_target_sections;
729 for (p = table->sections; p < table->sections_end; p++)
c1bd25fd 730 {
2b2848e2 731 if (filename_cmp (filename, p->the_bfd_section->owner->filename) == 0
30510692 732 && index == p->the_bfd_section->index)
c1bd25fd 733 {
30510692 734 p->endaddr += address - p->addr;
c1bd25fd 735 p->addr = address;
c1bd25fd
DJ
736 }
737 }
738}
739
c906108c
SS
740/* If mourn is being called in all the right places, this could be say
741 `gdb internal error' (since generic_mourn calls
742 breakpoint_init_inferior). */
743
744static int
a6d9a66e 745ignore (struct gdbarch *gdbarch, struct bp_target_info *bp_tgt)
c906108c
SS
746{
747 return 0;
748}
749
c35b1492
PA
750static int
751exec_has_memory (struct target_ops *ops)
752{
753 /* We can provide memory if we have any file/target sections to read
754 from. */
755 return (current_target_sections->sections
756 != current_target_sections->sections_end);
757}
758
0963b4bd 759/* Find mapped memory. */
be4d1333
MS
760
761extern void
b8edc417 762exec_set_find_memory_regions (int (*func) (find_memory_region_ftype, void *))
be4d1333
MS
763{
764 exec_ops.to_find_memory_regions = func;
765}
766
767static char *exec_make_note_section (bfd *, int *);
768
c906108c
SS
769/* Fill in the exec file target vector. Very few entries need to be
770 defined. */
771
be4d1333 772static void
fba45db2 773init_exec_ops (void)
c906108c
SS
774{
775 exec_ops.to_shortname = "exec";
776 exec_ops.to_longname = "Local exec file";
777 exec_ops.to_doc = "Use an executable file as a target.\n\
778Specify the filename of the executable file.";
1adeb98a 779 exec_ops.to_open = exec_open;
6c95b8df 780 exec_ops.to_close = exec_close_1;
c906108c 781 exec_ops.to_attach = find_default_attach;
07b82ea5
PA
782 exec_ops.to_xfer_partial = exec_xfer_partial;
783 exec_ops.to_get_section_table = exec_get_section_table;
c906108c
SS
784 exec_ops.to_files_info = exec_files_info;
785 exec_ops.to_insert_breakpoint = ignore;
786 exec_ops.to_remove_breakpoint = ignore;
787 exec_ops.to_create_inferior = find_default_create_inferior;
c906108c 788 exec_ops.to_stratum = file_stratum;
c35b1492 789 exec_ops.to_has_memory = exec_has_memory;
be4d1333 790 exec_ops.to_make_corefile_notes = exec_make_note_section;
c5aa993b 791 exec_ops.to_magic = OPS_MAGIC;
c906108c
SS
792}
793
794void
fba45db2 795_initialize_exec (void)
c906108c
SS
796{
797 struct cmd_list_element *c;
798
799 init_exec_ops ();
800
801 if (!dbx_commands)
802 {
1a966eab
AC
803 c = add_cmd ("file", class_files, file_command, _("\
804Use FILE as program to be debugged.\n\
c906108c
SS
805It is read for its symbols, for getting the contents of pure memory,\n\
806and it is the program executed when you use the `run' command.\n\
807If FILE cannot be found as specified, your execution directory path\n\
808($PATH) is searched for a command of that name.\n\
1a966eab 809No arg means to have no executable file and no symbols."), &cmdlist);
5ba2abeb 810 set_cmd_completer (c, filename_completer);
c906108c
SS
811 }
812
1a966eab
AC
813 c = add_cmd ("exec-file", class_files, exec_file_command, _("\
814Use FILE as program for getting contents of pure memory.\n\
c906108c
SS
815If FILE cannot be found as specified, your execution directory path\n\
816is searched for a command of that name.\n\
1a966eab 817No arg means have no executable file."), &cmdlist);
5ba2abeb 818 set_cmd_completer (c, filename_completer);
c906108c 819
1bedd215
AC
820 add_com ("section", class_files, set_section_command, _("\
821Change the base address of section SECTION of the exec file to ADDR.\n\
c906108c
SS
822This can be used if the exec file does not contain section addresses,\n\
823(such as in the a.out format), or when the addresses specified in the\n\
824file itself are wrong. Each section must be changed separately. The\n\
1bedd215 825``info files'' command lists all the sections and their addresses."));
c906108c 826
5bf193a2
AC
827 add_setshow_boolean_cmd ("write", class_support, &write_files, _("\
828Set writing into executable and core files."), _("\
829Show writing into executable and core files."), NULL,
830 NULL,
920d2a44 831 show_write_files,
5bf193a2 832 &setlist, &showlist);
c5aa993b 833
9852c492 834 add_target_with_completer (&exec_ops, filename_completer);
c906108c 835}
be4d1333
MS
836
837static char *
838exec_make_note_section (bfd *obfd, int *note_size)
839{
8a3fe4f8 840 error (_("Can't create a corefile"));
be4d1333 841}