* dwarf2read.c (follow_die_ref): Add comment.
[deliverable/binutils-gdb.git] / gdb / exec.c
CommitLineData
c906108c 1/* Work with executable files, for GDB.
4646aa9d 2
6aba47ca 3 Copyright (C) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997,
0fb0cc75 4 1998, 1999, 2000, 2001, 2002, 2003, 2007, 2008, 2009
9b254dd1 5 Free Software Foundation, Inc.
c906108c 6
c5aa993b 7 This file is part of GDB.
c906108c 8
c5aa993b
JM
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
a9762ec7 11 the Free Software Foundation; either version 3 of the License, or
c5aa993b 12 (at your option) any later version.
c906108c 13
c5aa993b
JM
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
c906108c 18
c5aa993b 19 You should have received a copy of the GNU General Public License
a9762ec7 20 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
21
22#include "defs.h"
23#include "frame.h"
24#include "inferior.h"
25#include "target.h"
26#include "gdbcmd.h"
27#include "language.h"
28#include "symfile.h"
29#include "objfiles.h"
c5f0f3d0 30#include "completer.h"
fd0407d6 31#include "value.h"
4646aa9d 32#include "exec.h"
ea53e89f 33#include "observer.h"
dacec2a8 34#include "arch-utils.h"
c906108c 35
c906108c 36#include <fcntl.h>
dbda9972 37#include "readline/readline.h"
c906108c
SS
38#include "gdb_string.h"
39
40#include "gdbcore.h"
41
42#include <ctype.h>
43#include "gdb_stat.h"
c906108c
SS
44
45#include "xcoffsolib.h"
46
a14ed312 47struct vmap *map_vmap (bfd *, bfd *);
c906108c 48
9a4105ab 49void (*deprecated_file_changed_hook) (char *);
c906108c
SS
50
51/* Prototypes for local functions */
52
a14ed312 53static void exec_close (int);
c906108c 54
a14ed312 55static void file_command (char *, int);
c906108c 56
a14ed312 57static void set_section_command (char *, int);
c906108c 58
a14ed312 59static void exec_files_info (struct target_ops *);
c906108c 60
a14ed312 61static void init_exec_ops (void);
c906108c 62
a14ed312 63void _initialize_exec (void);
c906108c 64
c906108c
SS
65/* The target vector for executable files. */
66
67struct target_ops exec_ops;
68
69/* The Binary File Descriptor handle for the executable file. */
70
71bfd *exec_bfd = NULL;
c04ea773 72long exec_bfd_mtime = 0;
c906108c
SS
73
74/* Whether to open exec and core files read-only or read-write. */
75
76int write_files = 0;
920d2a44
AC
77static void
78show_write_files (struct ui_file *file, int from_tty,
79 struct cmd_list_element *c, const char *value)
80{
81 fprintf_filtered (file, _("Writing into executable and core files is %s.\n"),
82 value);
83}
84
c906108c 85
c906108c
SS
86struct vmap *vmap;
87
4c42eaff 88static void
1adeb98a
FN
89exec_open (char *args, int from_tty)
90{
91 target_preopen (from_tty);
92 exec_file_attach (args, from_tty);
93}
94
c906108c 95static void
fba45db2 96exec_close (int quitting)
c906108c
SS
97{
98 int need_symtab_cleanup = 0;
99 struct vmap *vp, *nxt;
c5aa993b
JM
100
101 for (nxt = vmap; nxt != NULL;)
c906108c
SS
102 {
103 vp = nxt;
104 nxt = vp->nxt;
105
106 /* if there is an objfile associated with this bfd,
c5aa993b
JM
107 free_objfile() will do proper cleanup of objfile *and* bfd. */
108
c906108c
SS
109 if (vp->objfile)
110 {
111 free_objfile (vp->objfile);
112 need_symtab_cleanup = 1;
113 }
114 else if (vp->bfd != exec_bfd)
115 /* FIXME-leak: We should be freeing vp->name too, I think. */
116 if (!bfd_close (vp->bfd))
8a3fe4f8 117 warning (_("cannot close \"%s\": %s"),
c906108c
SS
118 vp->name, bfd_errmsg (bfd_get_error ()));
119
120 /* FIXME: This routine is #if 0'd in symfile.c. What should we
c5aa993b
JM
121 be doing here? Should we just free everything in
122 vp->objfile->symtabs? Should free_objfile do that?
123 FIXME-as-well: free_objfile already free'd vp->name, so it isn't
124 valid here. */
c906108c 125 free_named_symtabs (vp->name);
b8c9b27d 126 xfree (vp);
c906108c
SS
127 }
128
129 vmap = NULL;
130
131 if (exec_bfd)
132 {
133 char *name = bfd_get_filename (exec_bfd);
134
135 if (!bfd_close (exec_bfd))
8a3fe4f8 136 warning (_("cannot close \"%s\": %s"),
c906108c 137 name, bfd_errmsg (bfd_get_error ()));
b8c9b27d 138 xfree (name);
c906108c 139 exec_bfd = NULL;
c04ea773 140 exec_bfd_mtime = 0;
c906108c
SS
141 }
142
143 if (exec_ops.to_sections)
144 {
b8c9b27d 145 xfree (exec_ops.to_sections);
c906108c
SS
146 exec_ops.to_sections = NULL;
147 exec_ops.to_sections_end = NULL;
148 }
149}
150
1adeb98a
FN
151void
152exec_file_clear (int from_tty)
153{
154 /* Remove exec file. */
155 unpush_target (&exec_ops);
156
157 if (from_tty)
a3f17187 158 printf_unfiltered (_("No executable file now.\n"));
1adeb98a
FN
159}
160
907083d1 161/* Set FILENAME as the new exec file.
c906108c 162
c5aa993b
JM
163 This function is intended to be behave essentially the same
164 as exec_file_command, except that the latter will detect when
165 a target is being debugged, and will ask the user whether it
166 should be shut down first. (If the answer is "no", then the
167 new file is ignored.)
c906108c 168
c5aa993b
JM
169 This file is used by exec_file_command, to do the work of opening
170 and processing the exec file after any prompting has happened.
c906108c 171
c5aa993b
JM
172 And, it is used by child_attach, when the attach command was
173 given a pid but not a exec pathname, and the attach command could
174 figure out the pathname from the pid. (In this case, we shouldn't
175 ask the user whether the current target should be shut down --
907083d1 176 we're supplying the exec pathname late for good reason.) */
c906108c
SS
177
178void
1adeb98a 179exec_file_attach (char *filename, int from_tty)
c906108c 180{
c906108c
SS
181 /* Remove any previous exec file. */
182 unpush_target (&exec_ops);
183
184 /* Now open and digest the file the user requested, if any. */
185
1adeb98a
FN
186 if (!filename)
187 {
188 if (from_tty)
a3f17187 189 printf_unfiltered (_("No executable file now.\n"));
7a107747
DJ
190
191 set_gdbarch_from_file (NULL);
1adeb98a
FN
192 }
193 else
c906108c 194 {
f7545552 195 struct cleanup *cleanups;
c906108c
SS
196 char *scratch_pathname;
197 int scratch_chan;
c5aa993b 198
014d698b 199 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST, filename,
fbdebf46 200 write_files ? O_RDWR | O_BINARY : O_RDONLY | O_BINARY,
c906108c 201 &scratch_pathname);
cfc3008e 202#if defined(__GO32__) || defined(_WIN32) || defined(__CYGWIN__)
c906108c 203 if (scratch_chan < 0)
c5aa993b
JM
204 {
205 char *exename = alloca (strlen (filename) + 5);
206 strcat (strcpy (exename, filename), ".exe");
014d698b 207 scratch_chan = openp (getenv ("PATH"), OPF_TRY_CWD_FIRST, exename,
fbdebf46 208 write_files ? O_RDWR | O_BINARY : O_RDONLY | O_BINARY,
014d698b 209 &scratch_pathname);
c5aa993b 210 }
c906108c
SS
211#endif
212 if (scratch_chan < 0)
213 perror_with_name (filename);
9f76c2cd
MM
214 exec_bfd = bfd_fopen (scratch_pathname, gnutarget,
215 write_files ? FOPEN_RUB : FOPEN_RB,
216 scratch_chan);
c906108c
SS
217
218 if (!exec_bfd)
9fe4a216
TT
219 {
220 close (scratch_chan);
221 error (_("\"%s\": could not open as an executable file: %s"),
222 scratch_pathname, bfd_errmsg (bfd_get_error ()));
223 }
c906108c
SS
224
225 /* At this point, scratch_pathname and exec_bfd->name both point to the
c5aa993b
JM
226 same malloc'd string. However exec_close() will attempt to free it
227 via the exec_bfd->name pointer, so we need to make another copy and
228 leave exec_bfd as the new owner of the original copy. */
c2d11a7d 229 scratch_pathname = xstrdup (scratch_pathname);
f7545552 230 cleanups = make_cleanup (xfree, scratch_pathname);
c5aa993b 231
c906108c
SS
232 if (!bfd_check_format (exec_bfd, bfd_object))
233 {
234 /* Make sure to close exec_bfd, or else "run" might try to use
235 it. */
236 exec_close (0);
8a3fe4f8 237 error (_("\"%s\": not in executable format: %s"),
c906108c
SS
238 scratch_pathname, bfd_errmsg (bfd_get_error ()));
239 }
240
241 /* FIXME - This should only be run for RS6000, but the ifdef is a poor
c5aa993b 242 way to accomplish. */
52d16ba8 243#ifdef DEPRECATED_IBM6000_TARGET
c906108c
SS
244 /* Setup initial vmap. */
245
246 map_vmap (exec_bfd, 0);
247 if (vmap == NULL)
248 {
249 /* Make sure to close exec_bfd, or else "run" might try to use
250 it. */
251 exec_close (0);
8a3fe4f8 252 error (_("\"%s\": can't find the file sections: %s"),
c906108c
SS
253 scratch_pathname, bfd_errmsg (bfd_get_error ()));
254 }
52d16ba8 255#endif /* DEPRECATED_IBM6000_TARGET */
c906108c
SS
256
257 if (build_section_table (exec_bfd, &exec_ops.to_sections,
c5aa993b 258 &exec_ops.to_sections_end))
c906108c
SS
259 {
260 /* Make sure to close exec_bfd, or else "run" might try to use
261 it. */
262 exec_close (0);
8a3fe4f8 263 error (_("\"%s\": can't find the file sections: %s"),
c906108c
SS
264 scratch_pathname, bfd_errmsg (bfd_get_error ()));
265 }
266
c04ea773
DJ
267 exec_bfd_mtime = bfd_get_mtime (exec_bfd);
268
c906108c
SS
269 validate_files ();
270
271 set_gdbarch_from_file (exec_bfd);
272
273 push_target (&exec_ops);
274
275 /* Tell display code (if any) about the changed file name. */
9a4105ab
AC
276 if (deprecated_exec_file_display_hook)
277 (*deprecated_exec_file_display_hook) (filename);
f7545552
TT
278
279 do_cleanups (cleanups);
c906108c 280 }
ce7d4522 281 bfd_cache_close_all ();
781b42b0 282 observer_notify_executable_changed ();
c906108c
SS
283}
284
285/* Process the first arg in ARGS as the new exec file.
286
c5aa993b
JM
287 Note that we have to explicitly ignore additional args, since we can
288 be called from file_command(), which also calls symbol_file_command()
1adeb98a
FN
289 which can take multiple args.
290
291 If ARGS is NULL, we just want to close the exec file. */
c906108c 292
1adeb98a 293static void
fba45db2 294exec_file_command (char *args, int from_tty)
c906108c 295{
1adeb98a
FN
296 char **argv;
297 char *filename;
4c42eaff
DJ
298
299 if (from_tty && target_has_execution
300 && !query (_("A program is being debugged already.\n"
301 "Are you sure you want to change the file? ")))
302 error (_("File not changed."));
1adeb98a
FN
303
304 if (args)
305 {
f7545552
TT
306 struct cleanup *cleanups;
307
1adeb98a
FN
308 /* Scan through the args and pick up the first non option arg
309 as the filename. */
310
d1a41061 311 argv = gdb_buildargv (args);
f7545552 312 cleanups = make_cleanup_freeargv (argv);
1adeb98a
FN
313
314 for (; (*argv != NULL) && (**argv == '-'); argv++)
315 {;
316 }
317 if (*argv == NULL)
8a3fe4f8 318 error (_("No executable file name was specified"));
1adeb98a
FN
319
320 filename = tilde_expand (*argv);
321 make_cleanup (xfree, filename);
322 exec_file_attach (filename, from_tty);
f7545552
TT
323
324 do_cleanups (cleanups);
1adeb98a
FN
325 }
326 else
327 exec_file_attach (NULL, from_tty);
c906108c
SS
328}
329
330/* Set both the exec file and the symbol file, in one command.
331 What a novelty. Why did GDB go through four major releases before this
332 command was added? */
333
334static void
fba45db2 335file_command (char *arg, int from_tty)
c906108c
SS
336{
337 /* FIXME, if we lose on reading the symbol file, we should revert
338 the exec file, but that's rough. */
339 exec_file_command (arg, from_tty);
340 symbol_file_command (arg, from_tty);
9a4105ab
AC
341 if (deprecated_file_changed_hook)
342 deprecated_file_changed_hook (arg);
c906108c 343}
c906108c 344\f
c5aa993b 345
c906108c
SS
346/* Locate all mappable sections of a BFD file.
347 table_pp_char is a char * to get it through bfd_map_over_sections;
348 we cast it back to its proper type. */
349
350static void
7be0c536
AC
351add_to_section_table (bfd *abfd, struct bfd_section *asect,
352 void *table_pp_char)
c906108c 353{
0542c86d 354 struct target_section **table_pp = (struct target_section **) table_pp_char;
c906108c
SS
355 flagword aflag;
356
0f5d55d8
JB
357 /* Check the section flags, but do not discard zero-length sections, since
358 some symbols may still be attached to this section. For instance, we
359 encountered on sparc-solaris 2.10 a shared library with an empty .bss
360 section to which a symbol named "_end" was attached. The address
361 of this symbol still needs to be relocated. */
c906108c
SS
362 aflag = bfd_get_section_flags (abfd, asect);
363 if (!(aflag & SEC_ALLOC))
364 return;
0f5d55d8 365
c906108c
SS
366 (*table_pp)->bfd = abfd;
367 (*table_pp)->the_bfd_section = asect;
368 (*table_pp)->addr = bfd_section_vma (abfd, asect);
369 (*table_pp)->endaddr = (*table_pp)->addr + bfd_section_size (abfd, asect);
370 (*table_pp)++;
371}
372
373/* Builds a section table, given args BFD, SECTABLE_PTR, SECEND_PTR.
374 Returns 0 if OK, 1 on error. */
375
376int
0542c86d
PA
377build_section_table (struct bfd *some_bfd, struct target_section **start,
378 struct target_section **end)
c906108c
SS
379{
380 unsigned count;
381
382 count = bfd_count_sections (some_bfd);
383 if (*start)
b8c9b27d 384 xfree (* start);
0542c86d 385 *start = (struct target_section *) xmalloc (count * sizeof (**start));
c906108c 386 *end = *start;
c5aa993b 387 bfd_map_over_sections (some_bfd, add_to_section_table, (char *) end);
c906108c 388 if (*end > *start + count)
e2e0b3e5 389 internal_error (__FILE__, __LINE__, _("failed internal consistency check"));
c906108c
SS
390 /* We could realloc the table, but it probably loses for most files. */
391 return 0;
392}
393\f
394static void
7be0c536 395bfdsec_to_vmap (struct bfd *abfd, struct bfd_section *sect, void *arg3)
c906108c
SS
396{
397 struct vmap_and_bfd *vmap_bfd = (struct vmap_and_bfd *) arg3;
398 struct vmap *vp;
399
400 vp = vmap_bfd->pvmap;
401
402 if ((bfd_get_section_flags (abfd, sect) & SEC_LOAD) == 0)
403 return;
404
dc6a2ca4 405 if (strcmp (bfd_section_name (abfd, sect), ".text") == 0)
c906108c
SS
406 {
407 vp->tstart = bfd_section_vma (abfd, sect);
408 vp->tend = vp->tstart + bfd_section_size (abfd, sect);
409 vp->tvma = bfd_section_vma (abfd, sect);
410 vp->toffs = sect->filepos;
411 }
dc6a2ca4 412 else if (strcmp (bfd_section_name (abfd, sect), ".data") == 0)
c906108c
SS
413 {
414 vp->dstart = bfd_section_vma (abfd, sect);
415 vp->dend = vp->dstart + bfd_section_size (abfd, sect);
416 vp->dvma = bfd_section_vma (abfd, sect);
417 }
418 /* Silently ignore other types of sections. (FIXME?) */
419}
420
421/* Make a vmap for ABFD which might be a member of the archive ARCH.
422 Return the new vmap. */
423
424struct vmap *
fba45db2 425map_vmap (bfd *abfd, bfd *arch)
c906108c
SS
426{
427 struct vmap_and_bfd vmap_bfd;
428 struct vmap *vp, **vpp;
429
430 vp = (struct vmap *) xmalloc (sizeof (*vp));
431 memset ((char *) vp, '\0', sizeof (*vp));
432 vp->nxt = 0;
433 vp->bfd = abfd;
434 vp->name = bfd_get_filename (arch ? arch : abfd);
435 vp->member = arch ? bfd_get_filename (abfd) : "";
c5aa993b 436
c906108c
SS
437 vmap_bfd.pbfd = arch;
438 vmap_bfd.pvmap = vp;
439 bfd_map_over_sections (abfd, bfdsec_to_vmap, &vmap_bfd);
440
441 /* Find the end of the list and append. */
442 for (vpp = &vmap; *vpp; vpp = &(*vpp)->nxt)
443 ;
444 *vpp = vp;
445
446 return vp;
447}
448\f
348f8c02 449/* Read or write from BFD executable files.
c906108c 450
348f8c02
PA
451 MEMADDR is an address within the target address space, MYADDR is an
452 address within GDB address-space where data is written to, LEN is
453 length of buffer, and WRITE indicates whether to read or write.
454 SECTIONS and SECTIONS_END defines a section table holding sections
455 from possibly multiple BFDs.
456
457 If SECTION_NAME is not NULL, only access sections with that same
458 name.
c906108c
SS
459
460 Result is a length:
461
c5aa993b
JM
462 0: We cannot handle this address and length.
463 > 0: We have handled N bytes starting at this address.
464 (If N == length, we did it all.) We might be able
465 to handle more bytes beyond this length, but no
466 promises.
467 < 0: We cannot handle this address, but if somebody
348f8c02
PA
468 else handles (-N) bytes, we can start from there. */
469
470static int
471section_table_xfer_memory (CORE_ADDR memaddr, gdb_byte *myaddr,
472 int len, int write,
0542c86d
PA
473 struct target_section *sections,
474 struct target_section *sections_end,
348f8c02 475 const char *section_name)
c906108c 476{
020cc13c 477 int res;
0542c86d 478 struct target_section *p;
c906108c 479 CORE_ADDR nextsectaddr, memend;
c906108c
SS
480
481 if (len <= 0)
e2e0b3e5 482 internal_error (__FILE__, __LINE__, _("failed internal consistency check"));
c906108c 483
c906108c 484 memend = memaddr + len;
c906108c
SS
485 nextsectaddr = memend;
486
348f8c02 487 for (p = sections; p < sections_end; p++)
c906108c 488 {
348f8c02 489 if (section_name && strcmp (section_name, p->the_bfd_section->name) != 0)
c5aa993b 490 continue; /* not the section we need */
c906108c 491 if (memaddr >= p->addr)
3db26b01
JB
492 {
493 if (memend <= p->endaddr)
494 {
495 /* Entire transfer is within this section. */
85302095
AC
496 if (write)
497 res = bfd_set_section_contents (p->bfd, p->the_bfd_section,
498 myaddr, memaddr - p->addr,
499 len);
500 else
501 res = bfd_get_section_contents (p->bfd, p->the_bfd_section,
502 myaddr, memaddr - p->addr,
503 len);
3db26b01
JB
504 return (res != 0) ? len : 0;
505 }
506 else if (memaddr >= p->endaddr)
507 {
508 /* This section ends before the transfer starts. */
509 continue;
510 }
511 else
512 {
513 /* This section overlaps the transfer. Just do half. */
514 len = p->endaddr - memaddr;
85302095
AC
515 if (write)
516 res = bfd_set_section_contents (p->bfd, p->the_bfd_section,
517 myaddr, memaddr - p->addr,
518 len);
519 else
520 res = bfd_get_section_contents (p->bfd, p->the_bfd_section,
521 myaddr, memaddr - p->addr,
522 len);
3db26b01
JB
523 return (res != 0) ? len : 0;
524 }
525 }
c906108c
SS
526 else
527 nextsectaddr = min (nextsectaddr, p->addr);
528 }
529
530 if (nextsectaddr >= memend)
c5aa993b 531 return 0; /* We can't help */
c906108c 532 else
c5aa993b 533 return -(nextsectaddr - memaddr); /* Next boundary where we can help */
c906108c 534}
348f8c02
PA
535
536int
537section_table_xfer_memory_partial (gdb_byte *readbuf, const gdb_byte *writebuf,
538 ULONGEST offset, LONGEST len,
0542c86d
PA
539 struct target_section *sections,
540 struct target_section *sections_end)
348f8c02
PA
541{
542 if (readbuf != NULL)
543 return section_table_xfer_memory (offset, readbuf, len, 0,
544 sections, sections_end, NULL);
545 else
546 return section_table_xfer_memory (offset, (gdb_byte *) writebuf, len, 1,
547 sections, sections_end, NULL);
548}
549
550/* Read or write the exec file.
551
552 Args are address within a BFD file, address within gdb address-space,
553 length, and a flag indicating whether to read or write.
554
555 Result is a length:
556
557 0: We cannot handle this address and length.
558 > 0: We have handled N bytes starting at this address.
559 (If N == length, we did it all.) We might be able
560 to handle more bytes beyond this length, but no
561 promises.
562 < 0: We cannot handle this address, but if somebody
563 else handles (-N) bytes, we can start from there.
564
565 The same routine is used to handle both core and exec files;
566 we just tail-call it with more arguments to select between them. */
567
568int
569xfer_memory (CORE_ADDR memaddr, gdb_byte *myaddr, int len, int write,
570 struct mem_attrib *attrib, struct target_ops *target)
571{
572 int res;
573 const char *section_name = NULL;
574
575 if (len <= 0)
576 internal_error (__FILE__, __LINE__, _("failed internal consistency check"));
577
578 if (overlay_debugging)
579 {
580 struct obj_section *section = find_pc_overlay (memaddr);
581
582 if (section != NULL)
583 {
584 if (pc_in_unmapped_range (memaddr, section))
585 memaddr = overlay_mapped_address (memaddr, section);
586 section_name = section->the_bfd_section->name;
587 }
588 }
589
590 return section_table_xfer_memory (memaddr, myaddr, len, write,
591 target->to_sections,
592 target->to_sections_end,
593 section_name);
594}
c906108c 595\f
c5aa993b 596
c906108c 597void
fba45db2 598print_section_info (struct target_ops *t, bfd *abfd)
c906108c 599{
0542c86d 600 struct target_section *p;
17a912b6 601 /* FIXME: 16 is not wide enough when gdbarch_addr_bit > 64. */
ed49a04f 602 int wid = gdbarch_addr_bit (gdbarch_from_bfd (abfd)) <= 32 ? 8 : 16;
c906108c 603
c5aa993b 604 printf_filtered ("\t`%s', ", bfd_get_filename (abfd));
c906108c 605 wrap_here (" ");
a3f17187 606 printf_filtered (_("file type %s.\n"), bfd_get_target (abfd));
c906108c 607 if (abfd == exec_bfd)
944f08ab
JB
608 printf_filtered (_("\tEntry point: %s\n"),
609 paddress (bfd_get_start_address (abfd)));
c906108c
SS
610 for (p = t->to_sections; p < t->to_sections_end; p++)
611 {
bb599908
PH
612 printf_filtered ("\t%s", hex_string_custom (p->addr, wid));
613 printf_filtered (" - %s", hex_string_custom (p->endaddr, wid));
bcf16802
KB
614
615 /* FIXME: A format of "08l" is not wide enough for file offsets
616 larger than 4GB. OTOH, making it "016l" isn't desirable either
617 since most output will then be much wider than necessary. It
618 may make sense to test the size of the file and choose the
619 format string accordingly. */
a3f17187 620 /* FIXME: i18n: Need to rewrite this sentence. */
c906108c
SS
621 if (info_verbose)
622 printf_filtered (" @ %s",
bb599908 623 hex_string_custom (p->the_bfd_section->filepos, 8));
c906108c
SS
624 printf_filtered (" is %s", bfd_section_name (p->bfd, p->the_bfd_section));
625 if (p->bfd != abfd)
a3f17187 626 printf_filtered (" in %s", bfd_get_filename (p->bfd));
c906108c
SS
627 printf_filtered ("\n");
628 }
629}
630
631static void
fba45db2 632exec_files_info (struct target_ops *t)
c906108c
SS
633{
634 print_section_info (t, exec_bfd);
635
636 if (vmap)
637 {
638 struct vmap *vp;
639
a3f17187 640 printf_unfiltered (_("\tMapping info for file `%s'.\n"), vmap->name);
d4f3574e
SS
641 printf_unfiltered ("\t %*s %*s %*s %*s %8.8s %s\n",
642 strlen_paddr (), "tstart",
643 strlen_paddr (), "tend",
644 strlen_paddr (), "dstart",
645 strlen_paddr (), "dend",
646 "section",
c5aa993b
JM
647 "file(member)");
648
649 for (vp = vmap; vp; vp = vp->nxt)
d4f3574e
SS
650 printf_unfiltered ("\t0x%s 0x%s 0x%s 0x%s %s%s%s%s\n",
651 paddr (vp->tstart),
652 paddr (vp->tend),
653 paddr (vp->dstart),
654 paddr (vp->dend),
655 vp->name,
c5aa993b
JM
656 *vp->member ? "(" : "", vp->member,
657 *vp->member ? ")" : "");
c906108c
SS
658 }
659}
660
661static void
fba45db2 662set_section_command (char *args, int from_tty)
c906108c 663{
0542c86d 664 struct target_section *p;
c906108c
SS
665 char *secname;
666 unsigned seclen;
667 unsigned long secaddr;
668 char secprint[100];
669 long offset;
670
671 if (args == 0)
8a3fe4f8 672 error (_("Must specify section name and its virtual address"));
c906108c
SS
673
674 /* Parse out section name */
c5aa993b 675 for (secname = args; !isspace (*args); args++);
c906108c
SS
676 seclen = args - secname;
677
678 /* Parse out new virtual address */
679 secaddr = parse_and_eval_address (args);
680
c5aa993b
JM
681 for (p = exec_ops.to_sections; p < exec_ops.to_sections_end; p++)
682 {
683 if (!strncmp (secname, bfd_section_name (exec_bfd, p->the_bfd_section), seclen)
684 && bfd_section_name (exec_bfd, p->the_bfd_section)[seclen] == '\0')
685 {
686 offset = secaddr - p->addr;
687 p->addr += offset;
688 p->endaddr += offset;
689 if (from_tty)
690 exec_files_info (&exec_ops);
691 return;
692 }
c906108c 693 }
c906108c
SS
694 if (seclen >= sizeof (secprint))
695 seclen = sizeof (secprint) - 1;
696 strncpy (secprint, secname, seclen);
697 secprint[seclen] = '\0';
8a3fe4f8 698 error (_("Section %s not found"), secprint);
c906108c
SS
699}
700
30510692
DJ
701/* If we can find a section in FILENAME with BFD index INDEX, adjust
702 it to ADDRESS. */
c1bd25fd
DJ
703
704void
705exec_set_section_address (const char *filename, int index, CORE_ADDR address)
706{
0542c86d 707 struct target_section *p;
c1bd25fd
DJ
708
709 for (p = exec_ops.to_sections; p < exec_ops.to_sections_end; p++)
710 {
711 if (strcmp (filename, p->bfd->filename) == 0
30510692 712 && index == p->the_bfd_section->index)
c1bd25fd 713 {
30510692 714 p->endaddr += address - p->addr;
c1bd25fd 715 p->addr = address;
c1bd25fd
DJ
716 }
717 }
718}
719
c906108c
SS
720/* If mourn is being called in all the right places, this could be say
721 `gdb internal error' (since generic_mourn calls
722 breakpoint_init_inferior). */
723
724static int
8181d85f 725ignore (struct bp_target_info *bp_tgt)
c906108c
SS
726{
727 return 0;
728}
729
be4d1333
MS
730/* Find mapped memory. */
731
732extern void
733exec_set_find_memory_regions (int (*func) (int (*) (CORE_ADDR,
734 unsigned long,
735 int, int, int,
736 void *),
737 void *))
738{
739 exec_ops.to_find_memory_regions = func;
740}
741
742static char *exec_make_note_section (bfd *, int *);
743
c906108c
SS
744/* Fill in the exec file target vector. Very few entries need to be
745 defined. */
746
be4d1333 747static void
fba45db2 748init_exec_ops (void)
c906108c
SS
749{
750 exec_ops.to_shortname = "exec";
751 exec_ops.to_longname = "Local exec file";
752 exec_ops.to_doc = "Use an executable file as a target.\n\
753Specify the filename of the executable file.";
1adeb98a 754 exec_ops.to_open = exec_open;
c906108c
SS
755 exec_ops.to_close = exec_close;
756 exec_ops.to_attach = find_default_attach;
c8e73a31 757 exec_ops.deprecated_xfer_memory = xfer_memory;
c906108c
SS
758 exec_ops.to_files_info = exec_files_info;
759 exec_ops.to_insert_breakpoint = ignore;
760 exec_ops.to_remove_breakpoint = ignore;
761 exec_ops.to_create_inferior = find_default_create_inferior;
c906108c
SS
762 exec_ops.to_stratum = file_stratum;
763 exec_ops.to_has_memory = 1;
be4d1333 764 exec_ops.to_make_corefile_notes = exec_make_note_section;
c5aa993b 765 exec_ops.to_magic = OPS_MAGIC;
c906108c
SS
766}
767
768void
fba45db2 769_initialize_exec (void)
c906108c
SS
770{
771 struct cmd_list_element *c;
772
773 init_exec_ops ();
774
775 if (!dbx_commands)
776 {
1a966eab
AC
777 c = add_cmd ("file", class_files, file_command, _("\
778Use FILE as program to be debugged.\n\
c906108c
SS
779It is read for its symbols, for getting the contents of pure memory,\n\
780and it is the program executed when you use the `run' command.\n\
781If FILE cannot be found as specified, your execution directory path\n\
782($PATH) is searched for a command of that name.\n\
1a966eab 783No arg means to have no executable file and no symbols."), &cmdlist);
5ba2abeb 784 set_cmd_completer (c, filename_completer);
c906108c
SS
785 }
786
1a966eab
AC
787 c = add_cmd ("exec-file", class_files, exec_file_command, _("\
788Use FILE as program for getting contents of pure memory.\n\
c906108c
SS
789If FILE cannot be found as specified, your execution directory path\n\
790is searched for a command of that name.\n\
1a966eab 791No arg means have no executable file."), &cmdlist);
5ba2abeb 792 set_cmd_completer (c, filename_completer);
c906108c 793
1bedd215
AC
794 add_com ("section", class_files, set_section_command, _("\
795Change the base address of section SECTION of the exec file to ADDR.\n\
c906108c
SS
796This can be used if the exec file does not contain section addresses,\n\
797(such as in the a.out format), or when the addresses specified in the\n\
798file itself are wrong. Each section must be changed separately. The\n\
1bedd215 799``info files'' command lists all the sections and their addresses."));
c906108c 800
5bf193a2
AC
801 add_setshow_boolean_cmd ("write", class_support, &write_files, _("\
802Set writing into executable and core files."), _("\
803Show writing into executable and core files."), NULL,
804 NULL,
920d2a44 805 show_write_files,
5bf193a2 806 &setlist, &showlist);
c5aa993b 807
c906108c
SS
808 add_target (&exec_ops);
809}
be4d1333
MS
810
811static char *
812exec_make_note_section (bfd *obfd, int *note_size)
813{
8a3fe4f8 814 error (_("Can't create a corefile"));
be4d1333 815}
This page took 1.061979 seconds and 4 git commands to generate.