]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/exec.c
* elfxx-ia64.c (elfNN_ia64_dynamic_symbol_p): Return false
[thirdparty/binutils-gdb.git] / gdb / exec.c
CommitLineData
c906108c 1/* Work with executable files, for GDB.
29e57380 2 Copyright 1988, 1989, 1991, 1992, 1993, 1994, 1997, 1998, 2001
c5aa993b 3 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b
JM
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 59 Temple Place - Suite 330,
20 Boston, MA 02111-1307, USA. */
c906108c
SS
21
22#include "defs.h"
23#include "frame.h"
24#include "inferior.h"
25#include "target.h"
26#include "gdbcmd.h"
27#include "language.h"
28#include "symfile.h"
29#include "objfiles.h"
c5f0f3d0 30#include "completer.h"
c906108c
SS
31
32#ifdef USG
33#include <sys/types.h>
34#endif
35
36#include <fcntl.h>
37#include "gdb_string.h"
38
39#include "gdbcore.h"
40
41#include <ctype.h>
42#include "gdb_stat.h"
43#ifndef O_BINARY
44#define O_BINARY 0
45#endif
46
47#include "xcoffsolib.h"
48
a14ed312 49struct vmap *map_vmap (bfd *, bfd *);
c906108c 50
507f3c78 51void (*file_changed_hook) (char *);
c906108c
SS
52
53/* Prototypes for local functions */
54
a14ed312 55static void add_to_section_table (bfd *, sec_ptr, PTR);
c906108c 56
a14ed312 57static void exec_close (int);
c906108c 58
a14ed312 59static void file_command (char *, int);
c906108c 60
a14ed312 61static void set_section_command (char *, int);
c906108c 62
a14ed312 63static void exec_files_info (struct target_ops *);
c906108c 64
a14ed312 65static void bfdsec_to_vmap (bfd *, sec_ptr, PTR);
c906108c 66
a14ed312 67static int ignore (CORE_ADDR, char *);
c906108c 68
a14ed312 69static void init_exec_ops (void);
c906108c 70
a14ed312 71void _initialize_exec (void);
c906108c
SS
72
73extern int info_verbose;
74
75/* The target vector for executable files. */
76
77struct target_ops exec_ops;
78
79/* The Binary File Descriptor handle for the executable file. */
80
81bfd *exec_bfd = NULL;
82
83/* Whether to open exec and core files read-only or read-write. */
84
85int write_files = 0;
86
87/* Text start and end addresses (KLUDGE) if needed */
88
89#ifndef NEED_TEXT_START_END
90#define NEED_TEXT_START_END (0)
91#endif
92CORE_ADDR text_start = 0;
c5aa993b 93CORE_ADDR text_end = 0;
c906108c
SS
94
95struct vmap *vmap;
96
97/* ARGSUSED */
98static void
fba45db2 99exec_close (int quitting)
c906108c
SS
100{
101 int need_symtab_cleanup = 0;
102 struct vmap *vp, *nxt;
c5aa993b
JM
103
104 for (nxt = vmap; nxt != NULL;)
c906108c
SS
105 {
106 vp = nxt;
107 nxt = vp->nxt;
108
109 /* if there is an objfile associated with this bfd,
c5aa993b
JM
110 free_objfile() will do proper cleanup of objfile *and* bfd. */
111
c906108c
SS
112 if (vp->objfile)
113 {
114 free_objfile (vp->objfile);
115 need_symtab_cleanup = 1;
116 }
117 else if (vp->bfd != exec_bfd)
118 /* FIXME-leak: We should be freeing vp->name too, I think. */
119 if (!bfd_close (vp->bfd))
120 warning ("cannot close \"%s\": %s",
121 vp->name, bfd_errmsg (bfd_get_error ()));
122
123 /* FIXME: This routine is #if 0'd in symfile.c. What should we
c5aa993b
JM
124 be doing here? Should we just free everything in
125 vp->objfile->symtabs? Should free_objfile do that?
126 FIXME-as-well: free_objfile already free'd vp->name, so it isn't
127 valid here. */
c906108c 128 free_named_symtabs (vp->name);
b8c9b27d 129 xfree (vp);
c906108c
SS
130 }
131
132 vmap = NULL;
133
134 if (exec_bfd)
135 {
136 char *name = bfd_get_filename (exec_bfd);
137
138 if (!bfd_close (exec_bfd))
139 warning ("cannot close \"%s\": %s",
140 name, bfd_errmsg (bfd_get_error ()));
b8c9b27d 141 xfree (name);
c906108c
SS
142 exec_bfd = NULL;
143 }
144
145 if (exec_ops.to_sections)
146 {
b8c9b27d 147 xfree (exec_ops.to_sections);
c906108c
SS
148 exec_ops.to_sections = NULL;
149 exec_ops.to_sections_end = NULL;
150 }
151}
152
153/* Process the first arg in ARGS as the new exec file.
154
c5aa993b
JM
155 This function is intended to be behave essentially the same
156 as exec_file_command, except that the latter will detect when
157 a target is being debugged, and will ask the user whether it
158 should be shut down first. (If the answer is "no", then the
159 new file is ignored.)
c906108c 160
c5aa993b
JM
161 This file is used by exec_file_command, to do the work of opening
162 and processing the exec file after any prompting has happened.
c906108c 163
c5aa993b
JM
164 And, it is used by child_attach, when the attach command was
165 given a pid but not a exec pathname, and the attach command could
166 figure out the pathname from the pid. (In this case, we shouldn't
167 ask the user whether the current target should be shut down --
168 we're supplying the exec pathname late for good reason.) */
c906108c
SS
169
170void
fba45db2 171exec_file_attach (char *args, int from_tty)
c906108c
SS
172{
173 char **argv;
174 char *filename;
175
176 /* Remove any previous exec file. */
177 unpush_target (&exec_ops);
178
179 /* Now open and digest the file the user requested, if any. */
180
181 if (args)
182 {
183 char *scratch_pathname;
184 int scratch_chan;
c5aa993b 185
c906108c 186 /* Scan through the args and pick up the first non option arg
c5aa993b 187 as the filename. */
c906108c
SS
188
189 argv = buildargv (args);
190 if (argv == NULL)
191 nomem (0);
192
7a292a7a 193 make_cleanup_freeargv (argv);
c906108c 194
c5aa993b
JM
195 for (; (*argv != NULL) && (**argv == '-'); argv++)
196 {;
197 }
c906108c 198 if (*argv == NULL)
4ce44c66 199 error ("No executable file name was specified");
c906108c
SS
200
201 filename = tilde_expand (*argv);
b8c9b27d 202 make_cleanup (xfree, filename);
c5aa993b
JM
203
204 scratch_chan = openp (getenv ("PATH"), 1, filename,
205 write_files ? O_RDWR | O_BINARY : O_RDONLY | O_BINARY, 0,
c906108c 206 &scratch_pathname);
cfc3008e 207#if defined(__GO32__) || defined(_WIN32) || defined(__CYGWIN__)
c906108c 208 if (scratch_chan < 0)
c5aa993b
JM
209 {
210 char *exename = alloca (strlen (filename) + 5);
211 strcat (strcpy (exename, filename), ".exe");
212 scratch_chan = openp (getenv ("PATH"), 1, exename, write_files ?
213 O_RDWR | O_BINARY : O_RDONLY | O_BINARY, 0, &scratch_pathname);
214 }
c906108c
SS
215#endif
216 if (scratch_chan < 0)
217 perror_with_name (filename);
218 exec_bfd = bfd_fdopenr (scratch_pathname, gnutarget, scratch_chan);
219
220 if (!exec_bfd)
221 error ("\"%s\": could not open as an executable file: %s",
222 scratch_pathname, bfd_errmsg (bfd_get_error ()));
223
224 /* At this point, scratch_pathname and exec_bfd->name both point to the
c5aa993b
JM
225 same malloc'd string. However exec_close() will attempt to free it
226 via the exec_bfd->name pointer, so we need to make another copy and
227 leave exec_bfd as the new owner of the original copy. */
c2d11a7d 228 scratch_pathname = xstrdup (scratch_pathname);
b8c9b27d 229 make_cleanup (xfree, scratch_pathname);
c5aa993b 230
c906108c
SS
231 if (!bfd_check_format (exec_bfd, bfd_object))
232 {
233 /* Make sure to close exec_bfd, or else "run" might try to use
234 it. */
235 exec_close (0);
236 error ("\"%s\": not in executable format: %s",
237 scratch_pathname, bfd_errmsg (bfd_get_error ()));
238 }
239
240 /* FIXME - This should only be run for RS6000, but the ifdef is a poor
c5aa993b 241 way to accomplish. */
c906108c
SS
242#ifdef IBM6000_TARGET
243 /* Setup initial vmap. */
244
245 map_vmap (exec_bfd, 0);
246 if (vmap == NULL)
247 {
248 /* Make sure to close exec_bfd, or else "run" might try to use
249 it. */
250 exec_close (0);
251 error ("\"%s\": can't find the file sections: %s",
252 scratch_pathname, bfd_errmsg (bfd_get_error ()));
253 }
254#endif /* IBM6000_TARGET */
255
256 if (build_section_table (exec_bfd, &exec_ops.to_sections,
c5aa993b 257 &exec_ops.to_sections_end))
c906108c
SS
258 {
259 /* Make sure to close exec_bfd, or else "run" might try to use
260 it. */
261 exec_close (0);
c5aa993b 262 error ("\"%s\": can't find the file sections: %s",
c906108c
SS
263 scratch_pathname, bfd_errmsg (bfd_get_error ()));
264 }
265
266 /* text_end is sometimes used for where to put call dummies. A
c5aa993b 267 few ports use these for other purposes too. */
c906108c
SS
268 if (NEED_TEXT_START_END)
269 {
270 struct section_table *p;
c5aa993b 271
c906108c
SS
272 /* Set text_start to the lowest address of the start of any
273 readonly code section and set text_end to the highest
274 address of the end of any readonly code section. */
275 /* FIXME: The comment above does not match the code. The
276 code checks for sections with are either code *or*
277 readonly. */
c5aa993b
JM
278 text_start = ~(CORE_ADDR) 0;
279 text_end = (CORE_ADDR) 0;
c906108c
SS
280 for (p = exec_ops.to_sections; p < exec_ops.to_sections_end; p++)
281 if (bfd_get_section_flags (p->bfd, p->the_bfd_section)
282 & (SEC_CODE | SEC_READONLY))
283 {
c5aa993b 284 if (text_start > p->addr)
c906108c
SS
285 text_start = p->addr;
286 if (text_end < p->endaddr)
287 text_end = p->endaddr;
288 }
289 }
290
291 validate_files ();
292
293 set_gdbarch_from_file (exec_bfd);
294
295 push_target (&exec_ops);
296
297 /* Tell display code (if any) about the changed file name. */
298 if (exec_file_display_hook)
299 (*exec_file_display_hook) (filename);
300 }
301 else if (from_tty)
302 printf_unfiltered ("No executable file now.\n");
303}
304
305/* Process the first arg in ARGS as the new exec file.
306
c5aa993b
JM
307 Note that we have to explicitly ignore additional args, since we can
308 be called from file_command(), which also calls symbol_file_command()
309 which can take multiple args. */
c906108c
SS
310
311void
fba45db2 312exec_file_command (char *args, int from_tty)
c906108c 313{
c906108c 314 target_preopen (from_tty);
c906108c
SS
315 exec_file_attach (args, from_tty);
316}
317
318/* Set both the exec file and the symbol file, in one command.
319 What a novelty. Why did GDB go through four major releases before this
320 command was added? */
321
322static void
fba45db2 323file_command (char *arg, int from_tty)
c906108c
SS
324{
325 /* FIXME, if we lose on reading the symbol file, we should revert
326 the exec file, but that's rough. */
327 exec_file_command (arg, from_tty);
328 symbol_file_command (arg, from_tty);
329 if (file_changed_hook)
330 file_changed_hook (arg);
331}
c906108c 332\f
c5aa993b 333
c906108c
SS
334/* Locate all mappable sections of a BFD file.
335 table_pp_char is a char * to get it through bfd_map_over_sections;
336 we cast it back to its proper type. */
337
338static void
fba45db2 339add_to_section_table (bfd *abfd, sec_ptr asect, PTR table_pp_char)
c906108c 340{
c5aa993b 341 struct section_table **table_pp = (struct section_table **) table_pp_char;
c906108c
SS
342 flagword aflag;
343
344 aflag = bfd_get_section_flags (abfd, asect);
345 if (!(aflag & SEC_ALLOC))
346 return;
347 if (0 == bfd_section_size (abfd, asect))
348 return;
349 (*table_pp)->bfd = abfd;
350 (*table_pp)->the_bfd_section = asect;
351 (*table_pp)->addr = bfd_section_vma (abfd, asect);
352 (*table_pp)->endaddr = (*table_pp)->addr + bfd_section_size (abfd, asect);
353 (*table_pp)++;
354}
355
356/* Builds a section table, given args BFD, SECTABLE_PTR, SECEND_PTR.
357 Returns 0 if OK, 1 on error. */
358
359int
fba45db2
KB
360build_section_table (bfd *some_bfd, struct section_table **start,
361 struct section_table **end)
c906108c
SS
362{
363 unsigned count;
364
365 count = bfd_count_sections (some_bfd);
366 if (*start)
b8c9b27d 367 xfree (* start);
c906108c
SS
368 *start = (struct section_table *) xmalloc (count * sizeof (**start));
369 *end = *start;
c5aa993b 370 bfd_map_over_sections (some_bfd, add_to_section_table, (char *) end);
c906108c 371 if (*end > *start + count)
c5aa993b 372 abort ();
c906108c
SS
373 /* We could realloc the table, but it probably loses for most files. */
374 return 0;
375}
376\f
377static void
fba45db2 378bfdsec_to_vmap (bfd *abfd, sec_ptr sect, PTR arg3)
c906108c
SS
379{
380 struct vmap_and_bfd *vmap_bfd = (struct vmap_and_bfd *) arg3;
381 struct vmap *vp;
382
383 vp = vmap_bfd->pvmap;
384
385 if ((bfd_get_section_flags (abfd, sect) & SEC_LOAD) == 0)
386 return;
387
388 if (STREQ (bfd_section_name (abfd, sect), ".text"))
389 {
390 vp->tstart = bfd_section_vma (abfd, sect);
391 vp->tend = vp->tstart + bfd_section_size (abfd, sect);
392 vp->tvma = bfd_section_vma (abfd, sect);
393 vp->toffs = sect->filepos;
394 }
395 else if (STREQ (bfd_section_name (abfd, sect), ".data"))
396 {
397 vp->dstart = bfd_section_vma (abfd, sect);
398 vp->dend = vp->dstart + bfd_section_size (abfd, sect);
399 vp->dvma = bfd_section_vma (abfd, sect);
400 }
401 /* Silently ignore other types of sections. (FIXME?) */
402}
403
404/* Make a vmap for ABFD which might be a member of the archive ARCH.
405 Return the new vmap. */
406
407struct vmap *
fba45db2 408map_vmap (bfd *abfd, bfd *arch)
c906108c
SS
409{
410 struct vmap_and_bfd vmap_bfd;
411 struct vmap *vp, **vpp;
412
413 vp = (struct vmap *) xmalloc (sizeof (*vp));
414 memset ((char *) vp, '\0', sizeof (*vp));
415 vp->nxt = 0;
416 vp->bfd = abfd;
417 vp->name = bfd_get_filename (arch ? arch : abfd);
418 vp->member = arch ? bfd_get_filename (abfd) : "";
c5aa993b 419
c906108c
SS
420 vmap_bfd.pbfd = arch;
421 vmap_bfd.pvmap = vp;
422 bfd_map_over_sections (abfd, bfdsec_to_vmap, &vmap_bfd);
423
424 /* Find the end of the list and append. */
425 for (vpp = &vmap; *vpp; vpp = &(*vpp)->nxt)
426 ;
427 *vpp = vp;
428
429 return vp;
430}
431\f
432/* Read or write the exec file.
433
434 Args are address within a BFD file, address within gdb address-space,
435 length, and a flag indicating whether to read or write.
436
437 Result is a length:
438
c5aa993b
JM
439 0: We cannot handle this address and length.
440 > 0: We have handled N bytes starting at this address.
441 (If N == length, we did it all.) We might be able
442 to handle more bytes beyond this length, but no
443 promises.
444 < 0: We cannot handle this address, but if somebody
445 else handles (-N) bytes, we can start from there.
c906108c 446
c5aa993b
JM
447 The same routine is used to handle both core and exec files;
448 we just tail-call it with more arguments to select between them. */
c906108c
SS
449
450int
fba45db2 451xfer_memory (CORE_ADDR memaddr, char *myaddr, int len, int write,
29e57380 452 struct mem_attrib *attrib,
fba45db2 453 struct target_ops *target)
c906108c
SS
454{
455 boolean res;
456 struct section_table *p;
457 CORE_ADDR nextsectaddr, memend;
507f3c78 458 boolean (*xfer_fn) (bfd *, sec_ptr, PTR, file_ptr, bfd_size_type);
c906108c
SS
459 asection *section;
460
461 if (len <= 0)
c5aa993b 462 abort ();
c906108c
SS
463
464 if (overlay_debugging)
465 {
466 section = find_pc_overlay (memaddr);
467 if (pc_in_unmapped_range (memaddr, section))
468 memaddr = overlay_mapped_address (memaddr, section);
469 }
470
471 memend = memaddr + len;
472 xfer_fn = write ? bfd_set_section_contents : bfd_get_section_contents;
473 nextsectaddr = memend;
474
c906108c
SS
475 for (p = target->to_sections; p < target->to_sections_end; p++)
476 {
477 if (overlay_debugging && section && p->the_bfd_section &&
478 strcmp (section->name, p->the_bfd_section->name) != 0)
c5aa993b 479 continue; /* not the section we need */
c906108c 480 if (memaddr >= p->addr)
c5aa993b 481 if (memend <= p->endaddr)
c906108c
SS
482 {
483 /* Entire transfer is within this section. */
484 res = xfer_fn (p->bfd, p->the_bfd_section, myaddr,
485 memaddr - p->addr, len);
486 return (res != 0) ? len : 0;
487 }
488 else if (memaddr >= p->endaddr)
489 {
490 /* This section ends before the transfer starts. */
491 continue;
492 }
c5aa993b 493 else
c906108c
SS
494 {
495 /* This section overlaps the transfer. Just do half. */
496 len = p->endaddr - memaddr;
497 res = xfer_fn (p->bfd, p->the_bfd_section, myaddr,
498 memaddr - p->addr, len);
499 return (res != 0) ? len : 0;
500 }
501 else
502 nextsectaddr = min (nextsectaddr, p->addr);
503 }
504
505 if (nextsectaddr >= memend)
c5aa993b 506 return 0; /* We can't help */
c906108c 507 else
c5aa993b 508 return -(nextsectaddr - memaddr); /* Next boundary where we can help */
c906108c 509}
c906108c 510\f
c5aa993b 511
c906108c 512void
fba45db2 513print_section_info (struct target_ops *t, bfd *abfd)
c906108c
SS
514{
515 struct section_table *p;
516
c5aa993b 517 printf_filtered ("\t`%s', ", bfd_get_filename (abfd));
c906108c 518 wrap_here (" ");
c5aa993b 519 printf_filtered ("file type %s.\n", bfd_get_target (abfd));
c906108c
SS
520 if (abfd == exec_bfd)
521 {
522 printf_filtered ("\tEntry point: ");
523 print_address_numeric (bfd_get_start_address (abfd), 1, gdb_stdout);
524 printf_filtered ("\n");
525 }
526 for (p = t->to_sections; p < t->to_sections_end; p++)
527 {
528 /* FIXME-32x64 need a print_address_numeric with field width */
529 printf_filtered ("\t%s", local_hex_string_custom ((unsigned long) p->addr, "08l"));
530 printf_filtered (" - %s", local_hex_string_custom ((unsigned long) p->endaddr, "08l"));
531 if (info_verbose)
532 printf_filtered (" @ %s",
533 local_hex_string_custom ((unsigned long) p->the_bfd_section->filepos, "08l"));
534 printf_filtered (" is %s", bfd_section_name (p->bfd, p->the_bfd_section));
535 if (p->bfd != abfd)
536 {
537 printf_filtered (" in %s", bfd_get_filename (p->bfd));
538 }
539 printf_filtered ("\n");
540 }
541}
542
543static void
fba45db2 544exec_files_info (struct target_ops *t)
c906108c
SS
545{
546 print_section_info (t, exec_bfd);
547
548 if (vmap)
549 {
550 struct vmap *vp;
551
552 printf_unfiltered ("\tMapping info for file `%s'.\n", vmap->name);
d4f3574e
SS
553 printf_unfiltered ("\t %*s %*s %*s %*s %8.8s %s\n",
554 strlen_paddr (), "tstart",
555 strlen_paddr (), "tend",
556 strlen_paddr (), "dstart",
557 strlen_paddr (), "dend",
558 "section",
c5aa993b
JM
559 "file(member)");
560
561 for (vp = vmap; vp; vp = vp->nxt)
d4f3574e
SS
562 printf_unfiltered ("\t0x%s 0x%s 0x%s 0x%s %s%s%s%s\n",
563 paddr (vp->tstart),
564 paddr (vp->tend),
565 paddr (vp->dstart),
566 paddr (vp->dend),
567 vp->name,
c5aa993b
JM
568 *vp->member ? "(" : "", vp->member,
569 *vp->member ? ")" : "");
c906108c
SS
570 }
571}
572
0f71a2f6
JM
573/* msnyder 5/21/99:
574 exec_set_section_offsets sets the offsets of all the sections
575 in the exec objfile. */
576
577void
fba45db2
KB
578exec_set_section_offsets (bfd_signed_vma text_off, bfd_signed_vma data_off,
579 bfd_signed_vma bss_off)
0f71a2f6
JM
580{
581 struct section_table *sect;
c5aa993b
JM
582
583 for (sect = exec_ops.to_sections;
584 sect < exec_ops.to_sections_end;
0f71a2f6
JM
585 sect++)
586 {
587 flagword flags;
588
589 flags = bfd_get_section_flags (exec_bfd, sect->the_bfd_section);
590
591 if (flags & SEC_CODE)
592 {
c5aa993b 593 sect->addr += text_off;
0f71a2f6
JM
594 sect->endaddr += text_off;
595 }
596 else if (flags & (SEC_DATA | SEC_LOAD))
597 {
c5aa993b 598 sect->addr += data_off;
0f71a2f6
JM
599 sect->endaddr += data_off;
600 }
601 else if (flags & SEC_ALLOC)
602 {
c5aa993b 603 sect->addr += bss_off;
0f71a2f6
JM
604 sect->endaddr += bss_off;
605 }
606 }
607}
608
c906108c 609static void
fba45db2 610set_section_command (char *args, int from_tty)
c906108c
SS
611{
612 struct section_table *p;
613 char *secname;
614 unsigned seclen;
615 unsigned long secaddr;
616 char secprint[100];
617 long offset;
618
619 if (args == 0)
620 error ("Must specify section name and its virtual address");
621
622 /* Parse out section name */
c5aa993b 623 for (secname = args; !isspace (*args); args++);
c906108c
SS
624 seclen = args - secname;
625
626 /* Parse out new virtual address */
627 secaddr = parse_and_eval_address (args);
628
c5aa993b
JM
629 for (p = exec_ops.to_sections; p < exec_ops.to_sections_end; p++)
630 {
631 if (!strncmp (secname, bfd_section_name (exec_bfd, p->the_bfd_section), seclen)
632 && bfd_section_name (exec_bfd, p->the_bfd_section)[seclen] == '\0')
633 {
634 offset = secaddr - p->addr;
635 p->addr += offset;
636 p->endaddr += offset;
637 if (from_tty)
638 exec_files_info (&exec_ops);
639 return;
640 }
c906108c 641 }
c906108c
SS
642 if (seclen >= sizeof (secprint))
643 seclen = sizeof (secprint) - 1;
644 strncpy (secprint, secname, seclen);
645 secprint[seclen] = '\0';
646 error ("Section %s not found", secprint);
647}
648
649/* If mourn is being called in all the right places, this could be say
650 `gdb internal error' (since generic_mourn calls
651 breakpoint_init_inferior). */
652
653static int
fba45db2 654ignore (CORE_ADDR addr, char *contents)
c906108c
SS
655{
656 return 0;
657}
658
659/* Fill in the exec file target vector. Very few entries need to be
660 defined. */
661
662void
fba45db2 663init_exec_ops (void)
c906108c
SS
664{
665 exec_ops.to_shortname = "exec";
666 exec_ops.to_longname = "Local exec file";
667 exec_ops.to_doc = "Use an executable file as a target.\n\
668Specify the filename of the executable file.";
669 exec_ops.to_open = exec_file_command;
670 exec_ops.to_close = exec_close;
671 exec_ops.to_attach = find_default_attach;
672 exec_ops.to_require_attach = find_default_require_attach;
673 exec_ops.to_require_detach = find_default_require_detach;
674 exec_ops.to_xfer_memory = xfer_memory;
675 exec_ops.to_files_info = exec_files_info;
676 exec_ops.to_insert_breakpoint = ignore;
677 exec_ops.to_remove_breakpoint = ignore;
678 exec_ops.to_create_inferior = find_default_create_inferior;
679 exec_ops.to_clone_and_follow_inferior = find_default_clone_and_follow_inferior;
680 exec_ops.to_stratum = file_stratum;
681 exec_ops.to_has_memory = 1;
c5aa993b 682 exec_ops.to_magic = OPS_MAGIC;
c906108c
SS
683}
684
685void
fba45db2 686_initialize_exec (void)
c906108c
SS
687{
688 struct cmd_list_element *c;
689
690 init_exec_ops ();
691
692 if (!dbx_commands)
693 {
694 c = add_cmd ("file", class_files, file_command,
695 "Use FILE as program to be debugged.\n\
696It is read for its symbols, for getting the contents of pure memory,\n\
697and it is the program executed when you use the `run' command.\n\
698If FILE cannot be found as specified, your execution directory path\n\
699($PATH) is searched for a command of that name.\n\
700No arg means to have no executable file and no symbols.", &cmdlist);
701 c->completer = filename_completer;
702 }
703
704 c = add_cmd ("exec-file", class_files, exec_file_command,
c5aa993b 705 "Use FILE as program for getting contents of pure memory.\n\
c906108c
SS
706If FILE cannot be found as specified, your execution directory path\n\
707is searched for a command of that name.\n\
708No arg means have no executable file.", &cmdlist);
709 c->completer = filename_completer;
710
711 add_com ("section", class_files, set_section_command,
c5aa993b 712 "Change the base address of section SECTION of the exec file to ADDR.\n\
c906108c
SS
713This can be used if the exec file does not contain section addresses,\n\
714(such as in the a.out format), or when the addresses specified in the\n\
715file itself are wrong. Each section must be changed separately. The\n\
716``info files'' command lists all the sections and their addresses.");
717
718 add_show_from_set
c5aa993b 719 (add_set_cmd ("write", class_support, var_boolean, (char *) &write_files,
c906108c
SS
720 "Set writing into executable and core files.",
721 &setlist),
722 &showlist);
c5aa993b 723
c906108c
SS
724 add_target (&exec_ops);
725}