1 /* Intel 386 target-dependent stuff.
2 Copyright (C) 1988, 1989, 1991, 1994, 1995, 1996, 1998
3 Free Software Foundation, Inc.
5 This file is part of GDB.
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 59 Temple Place - Suite 330,
20 Boston, MA 02111-1307, USA. */
23 #include "gdb_string.h"
28 #include "floatformat.h"
33 static long i386_get_frame_setup
PARAMS ((CORE_ADDR
));
35 static void i386_follow_jump
PARAMS ((void));
37 static void codestream_read
PARAMS ((unsigned char *, int));
39 static void codestream_seek
PARAMS ((CORE_ADDR
));
41 static unsigned char codestream_fill
PARAMS ((int));
43 CORE_ADDR skip_trampoline_code
PARAMS ((CORE_ADDR
, char *));
45 static int gdb_print_insn_i386 (bfd_vma
, disassemble_info
*);
47 void _initialize_i386_tdep
PARAMS ((void));
49 /* This is the variable the is set with "set disassembly-flavor",
50 and its legitimate values. */
51 static char att_flavor
[] = "att";
52 static char intel_flavor
[] = "intel";
53 static char *valid_flavors
[] =
59 static char *disassembly_flavor
= att_flavor
;
61 /* This is used to keep the bfd arch_info in sync with the disassembly flavor. */
62 static void set_disassembly_flavor_sfunc
PARAMS ((char *, int, struct cmd_list_element
*));
63 static void set_disassembly_flavor ();
65 /* Stdio style buffering was used to minimize calls to ptrace, but this
66 buffering did not take into account that the code section being accessed
67 may not be an even number of buffers long (even if the buffer is only
68 sizeof(int) long). In cases where the code section size happened to
69 be a non-integral number of buffers long, attempting to read the last
70 buffer would fail. Simply using target_read_memory and ignoring errors,
71 rather than read_memory, is not the correct solution, since legitimate
72 access errors would then be totally ignored. To properly handle this
73 situation and continue to use buffering would require that this code
74 be able to determine the minimum code section size granularity (not the
75 alignment of the section itself, since the actual failing case that
76 pointed out this problem had a section alignment of 4 but was not a
77 multiple of 4 bytes long), on a target by target basis, and then
78 adjust it's buffer size accordingly. This is messy, but potentially
79 feasible. It probably needs the bfd library's help and support. For
80 now, the buffer size is set to 1. (FIXME -fnf) */
82 #define CODESTREAM_BUFSIZ 1 /* Was sizeof(int), see note above. */
83 static CORE_ADDR codestream_next_addr
;
84 static CORE_ADDR codestream_addr
;
85 static unsigned char codestream_buf
[CODESTREAM_BUFSIZ
];
86 static int codestream_off
;
87 static int codestream_cnt
;
89 #define codestream_tell() (codestream_addr + codestream_off)
90 #define codestream_peek() (codestream_cnt == 0 ? \
91 codestream_fill(1): codestream_buf[codestream_off])
92 #define codestream_get() (codestream_cnt-- == 0 ? \
93 codestream_fill(0) : codestream_buf[codestream_off++])
96 codestream_fill (peek_flag
)
99 codestream_addr
= codestream_next_addr
;
100 codestream_next_addr
+= CODESTREAM_BUFSIZ
;
102 codestream_cnt
= CODESTREAM_BUFSIZ
;
103 read_memory (codestream_addr
, (char *) codestream_buf
, CODESTREAM_BUFSIZ
);
106 return (codestream_peek ());
108 return (codestream_get ());
112 codestream_seek (place
)
115 codestream_next_addr
= place
/ CODESTREAM_BUFSIZ
;
116 codestream_next_addr
*= CODESTREAM_BUFSIZ
;
119 while (codestream_tell () != place
)
124 codestream_read (buf
, count
)
131 for (i
= 0; i
< count
; i
++)
132 *p
++ = codestream_get ();
135 /* next instruction is a jump, move to target */
140 unsigned char buf
[4];
146 pos
= codestream_tell ();
149 if (codestream_peek () == 0x66)
155 switch (codestream_get ())
158 /* relative jump: if data16 == 0, disp32, else disp16 */
161 codestream_read (buf
, 2);
162 delta
= extract_signed_integer (buf
, 2);
164 /* include size of jmp inst (including the 0x66 prefix). */
169 codestream_read (buf
, 4);
170 delta
= extract_signed_integer (buf
, 4);
176 /* relative jump, disp8 (ignore data16) */
177 codestream_read (buf
, 1);
178 /* Sign-extend it. */
179 delta
= extract_signed_integer (buf
, 1);
184 codestream_seek (pos
);
188 * find & return amound a local space allocated, and advance codestream to
189 * first register push (if any)
191 * if entry sequence doesn't make sense, return -1, and leave
192 * codestream pointer random
196 i386_get_frame_setup (pc
)
201 codestream_seek (pc
);
205 op
= codestream_get ();
207 if (op
== 0x58) /* popl %eax */
210 * this function must start with
213 * xchgl %eax, (%esp) 0x87 0x04 0x24
214 * or xchgl %eax, 0(%esp) 0x87 0x44 0x24 0x00
216 * (the system 5 compiler puts out the second xchg
217 * inst, and the assembler doesn't try to optimize it,
218 * so the 'sib' form gets generated)
220 * this sequence is used to get the address of the return
221 * buffer for a function that returns a structure
224 unsigned char buf
[4];
225 static unsigned char proto1
[3] =
227 static unsigned char proto2
[4] =
228 {0x87, 0x44, 0x24, 0x00};
229 pos
= codestream_tell ();
230 codestream_read (buf
, 4);
231 if (memcmp (buf
, proto1
, 3) == 0)
233 else if (memcmp (buf
, proto2
, 4) == 0)
236 codestream_seek (pos
);
237 op
= codestream_get (); /* update next opcode */
240 if (op
== 0x68 || op
== 0x6a)
243 * this function may start with
253 unsigned char buf
[8];
255 /* Skip past the pushl instruction; it has either a one-byte
256 or a four-byte operand, depending on the opcode. */
257 pos
= codestream_tell ();
262 codestream_seek (pos
);
264 /* Read the following 8 bytes, which should be "call _probe" (6 bytes)
265 followed by "addl $4,%esp" (2 bytes). */
266 codestream_read (buf
, sizeof (buf
));
267 if (buf
[0] == 0xe8 && buf
[6] == 0xc4 && buf
[7] == 0x4)
269 codestream_seek (pos
);
270 op
= codestream_get (); /* update next opcode */
273 if (op
== 0x55) /* pushl %ebp */
275 /* check for movl %esp, %ebp - can be written two ways */
276 switch (codestream_get ())
279 if (codestream_get () != 0xec)
283 if (codestream_get () != 0xe5)
289 /* check for stack adjustment
293 * note: you can't subtract a 16 bit immediate
294 * from a 32 bit reg, so we don't have to worry
295 * about a data16 prefix
297 op
= codestream_peek ();
300 /* subl with 8 bit immed */
302 if (codestream_get () != 0xec)
303 /* Some instruction starting with 0x83 other than subl. */
305 codestream_seek (codestream_tell () - 2);
308 /* subl with signed byte immediate
309 * (though it wouldn't make sense to be negative)
311 return (codestream_get ());
316 /* Maybe it is subl with 32 bit immedediate. */
318 if (codestream_get () != 0xec)
319 /* Some instruction starting with 0x81 other than subl. */
321 codestream_seek (codestream_tell () - 2);
324 /* It is subl with 32 bit immediate. */
325 codestream_read ((unsigned char *) buf
, 4);
326 return extract_signed_integer (buf
, 4);
336 /* enter instruction: arg is 16 bit unsigned immed */
337 codestream_read ((unsigned char *) buf
, 2);
338 codestream_get (); /* flush final byte of enter instruction */
339 return extract_unsigned_integer (buf
, 2);
344 /* Return number of args passed to a frame.
345 Can return -1, meaning no way to tell. */
348 i386_frame_num_args (fi
)
349 struct frame_info
*fi
;
354 /* This loses because not only might the compiler not be popping the
355 args right after the function call, it might be popping args from both
356 this call and a previous one, and we would say there are more args
357 than there really are. */
361 struct frame_info
*pfi
;
363 /* on the 386, the instruction following the call could be:
365 addl $imm, %esp - imm/4 args; imm may be 8 or 32 bits
366 anything else - zero args */
370 frameless
= FRAMELESS_FUNCTION_INVOCATION (fi
);
372 /* In the absence of a frame pointer, GDB doesn't get correct values
373 for nameless arguments. Return -1, so it doesn't print any
374 nameless arguments. */
377 pfi
= get_prev_frame (fi
);
380 /* Note: this can happen if we are looking at the frame for
381 main, because FRAME_CHAIN_VALID won't let us go into
382 start. If we have debugging symbols, that's not really
383 a big deal; it just means it will only show as many arguments
384 to main as are declared. */
390 op
= read_memory_integer (retpc
, 1);
396 op
= read_memory_integer (retpc
+ 1, 1);
398 /* addl $<signed imm 8 bits>, %esp */
399 return (read_memory_integer (retpc
+ 2, 1) & 0xff) / 4;
404 { /* add with 32 bit immediate */
405 op
= read_memory_integer (retpc
+ 1, 1);
407 /* addl $<imm 32>, %esp */
408 return read_memory_integer (retpc
+ 2, 4) / 4;
421 * parse the first few instructions of the function to see
422 * what registers were stored.
424 * We handle these cases:
426 * The startup sequence can be at the start of the function,
427 * or the function can start with a branch to startup code at the end.
429 * %ebp can be set up with either the 'enter' instruction, or
430 * 'pushl %ebp, movl %esp, %ebp' (enter is too slow to be useful,
431 * but was once used in the sys5 compiler)
433 * Local space is allocated just below the saved %ebp by either the
434 * 'enter' instruction, or by 'subl $<size>, %esp'. 'enter' has
435 * a 16 bit unsigned argument for space to allocate, and the
436 * 'addl' instruction could have either a signed byte, or
439 * Next, the registers used by this function are pushed. In
440 * the sys5 compiler they will always be in the order: %edi, %esi, %ebx
441 * (and sometimes a harmless bug causes it to also save but not restore %eax);
442 * however, the code below is willing to see the pushes in any order,
443 * and will handle up to 8 of them.
445 * If the setup sequence is at the end of the function, then the
446 * next instruction will be a branch back to the start.
450 i386_frame_find_saved_regs (fip
, fsrp
)
451 struct frame_info
*fip
;
452 struct frame_saved_regs
*fsrp
;
456 CORE_ADDR dummy_bottom
;
461 memset (fsrp
, 0, sizeof *fsrp
);
463 /* if frame is the end of a dummy, compute where the
466 dummy_bottom
= fip
->frame
- 4 - REGISTER_BYTES
- CALL_DUMMY_LENGTH
;
468 /* check if the PC is in the stack, in a dummy frame */
469 if (dummy_bottom
<= fip
->pc
&& fip
->pc
<= fip
->frame
)
471 /* all regs were saved by push_call_dummy () */
473 for (i
= 0; i
< NUM_REGS
; i
++)
475 adr
-= REGISTER_RAW_SIZE (i
);
481 pc
= get_pc_function_start (fip
->pc
);
483 locals
= i386_get_frame_setup (pc
);
487 adr
= fip
->frame
- 4 - locals
;
488 for (i
= 0; i
< 8; i
++)
490 op
= codestream_get ();
491 if (op
< 0x50 || op
> 0x57)
493 #ifdef I386_REGNO_TO_SYMMETRY
494 /* Dynix uses different internal numbering. Ick. */
495 fsrp
->regs
[I386_REGNO_TO_SYMMETRY (op
- 0x50)] = adr
;
497 fsrp
->regs
[op
- 0x50] = adr
;
503 fsrp
->regs
[PC_REGNUM
] = fip
->frame
+ 4;
504 fsrp
->regs
[FP_REGNUM
] = fip
->frame
;
507 /* return pc of first real instruction */
510 i386_skip_prologue (pc
)
515 static unsigned char pic_pat
[6] =
516 {0xe8, 0, 0, 0, 0, /* call 0x0 */
517 0x5b, /* popl %ebx */
521 if (i386_get_frame_setup (pc
) < 0)
524 /* found valid frame setup - codestream now points to
525 * start of push instructions for saving registers
528 /* skip over register saves */
529 for (i
= 0; i
< 8; i
++)
531 op
= codestream_peek ();
532 /* break if not pushl inst */
533 if (op
< 0x50 || op
> 0x57)
538 /* The native cc on SVR4 in -K PIC mode inserts the following code to get
539 the address of the global offset table (GOT) into register %ebx.
542 movl %ebx,x(%ebp) (optional)
544 This code is with the rest of the prologue (at the end of the
545 function), so we have to skip it to get to the first real
546 instruction at the start of the function. */
548 pos
= codestream_tell ();
549 for (i
= 0; i
< 6; i
++)
551 op
= codestream_get ();
552 if (pic_pat
[i
] != op
)
557 unsigned char buf
[4];
560 op
= codestream_get ();
561 if (op
== 0x89) /* movl %ebx, x(%ebp) */
563 op
= codestream_get ();
564 if (op
== 0x5d) /* one byte offset from %ebp */
567 codestream_read (buf
, 1);
569 else if (op
== 0x9d) /* four byte offset from %ebp */
572 codestream_read (buf
, 4);
574 else /* unexpected instruction */
576 op
= codestream_get ();
579 if (delta
> 0 && op
== 0x81 && codestream_get () == 0xc3)
584 codestream_seek (pos
);
588 return (codestream_tell ());
592 i386_push_dummy_frame ()
594 CORE_ADDR sp
= read_register (SP_REGNUM
);
596 char regbuf
[MAX_REGISTER_RAW_SIZE
];
598 sp
= push_word (sp
, read_register (PC_REGNUM
));
599 sp
= push_word (sp
, read_register (FP_REGNUM
));
600 write_register (FP_REGNUM
, sp
);
601 for (regnum
= 0; regnum
< NUM_REGS
; regnum
++)
603 read_register_gen (regnum
, regbuf
);
604 sp
= push_bytes (sp
, regbuf
, REGISTER_RAW_SIZE (regnum
));
606 write_register (SP_REGNUM
, sp
);
612 struct frame_info
*frame
= get_current_frame ();
615 struct frame_saved_regs fsr
;
616 char regbuf
[MAX_REGISTER_RAW_SIZE
];
618 fp
= FRAME_FP (frame
);
619 get_frame_saved_regs (frame
, &fsr
);
620 for (regnum
= 0; regnum
< NUM_REGS
; regnum
++)
623 adr
= fsr
.regs
[regnum
];
626 read_memory (adr
, regbuf
, REGISTER_RAW_SIZE (regnum
));
627 write_register_bytes (REGISTER_BYTE (regnum
), regbuf
,
628 REGISTER_RAW_SIZE (regnum
));
631 write_register (FP_REGNUM
, read_memory_integer (fp
, 4));
632 write_register (PC_REGNUM
, read_memory_integer (fp
+ 4, 4));
633 write_register (SP_REGNUM
, fp
+ 8);
634 flush_cached_frames ();
637 #ifdef GET_LONGJMP_TARGET
639 /* Figure out where the longjmp will land. Slurp the args out of the stack.
640 We expect the first arg to be a pointer to the jmp_buf structure from which
641 we extract the pc (JB_PC) that we will land at. The pc is copied into PC.
642 This routine returns true on success. */
645 get_longjmp_target (pc
)
648 char buf
[TARGET_PTR_BIT
/ TARGET_CHAR_BIT
];
649 CORE_ADDR sp
, jb_addr
;
651 sp
= read_register (SP_REGNUM
);
653 if (target_read_memory (sp
+ SP_ARG0
, /* Offset of first arg on stack */
655 TARGET_PTR_BIT
/ TARGET_CHAR_BIT
))
658 jb_addr
= extract_address (buf
, TARGET_PTR_BIT
/ TARGET_CHAR_BIT
);
660 if (target_read_memory (jb_addr
+ JB_PC
* JB_ELEMENT_SIZE
, buf
,
661 TARGET_PTR_BIT
/ TARGET_CHAR_BIT
))
664 *pc
= extract_address (buf
, TARGET_PTR_BIT
/ TARGET_CHAR_BIT
);
669 #endif /* GET_LONGJMP_TARGET */
672 i386_extract_return_value (type
, regbuf
, valbuf
)
674 char regbuf
[REGISTER_BYTES
];
677 /* On AIX, floating point values are returned in floating point registers. */
678 #ifdef I386_AIX_TARGET
679 if (TYPE_CODE_FLT
== TYPE_CODE (type
))
682 /* 387 %st(0), gcc uses this */
683 floatformat_to_double (&floatformat_i387_ext
,
684 ®buf
[REGISTER_BYTE (FP0_REGNUM
)],
686 store_floating (valbuf
, TYPE_LENGTH (type
), d
);
689 #endif /* I386_AIX_TARGET */
691 memcpy (valbuf
, regbuf
, TYPE_LENGTH (type
));
695 #ifdef I386V4_SIGTRAMP_SAVED_PC
696 /* Get saved user PC for sigtramp from the pushed ucontext on the stack
697 for all three variants of SVR4 sigtramps. */
700 i386v4_sigtramp_saved_pc (frame
)
701 struct frame_info
*frame
;
703 CORE_ADDR saved_pc_offset
= 4;
706 find_pc_partial_function (frame
->pc
, &name
, NULL
, NULL
);
709 if (STREQ (name
, "_sigreturn"))
710 saved_pc_offset
= 132 + 14 * 4;
711 else if (STREQ (name
, "_sigacthandler"))
712 saved_pc_offset
= 80 + 14 * 4;
713 else if (STREQ (name
, "sigvechandler"))
714 saved_pc_offset
= 120 + 14 * 4;
718 return read_memory_integer (frame
->next
->frame
+ saved_pc_offset
, 4);
719 return read_memory_integer (read_register (SP_REGNUM
) + saved_pc_offset
, 4);
721 #endif /* I386V4_SIGTRAMP_SAVED_PC */
723 #ifdef I386_LINUX_SIGTRAMP
725 /* When the i386 Linux kernel calls a signal handler, the return
726 address points to a bit of code on the stack. This function
727 returns whether the PC appears to be within this bit of code.
729 The instruction sequence is
733 or 0x58 0xb8 0x77 0x00 0x00 0x00 0xcd 0x80.
735 Checking for the code sequence should be somewhat reliable, because
736 the effect is to call the system call sigreturn. This is unlikely
737 to occur anywhere other than a signal trampoline.
739 It kind of sucks that we have to read memory from the process in
740 order to identify a signal trampoline, but there doesn't seem to be
741 any other way. The IN_SIGTRAMP macro in tm-linux.h arranges to
742 only call us if no function name could be identified, which should
743 be the case since the code is on the stack. */
745 #define LINUX_SIGTRAMP_INSN0 (0x58) /* pop %eax */
746 #define LINUX_SIGTRAMP_OFFSET0 (0)
747 #define LINUX_SIGTRAMP_INSN1 (0xb8) /* mov $NNNN,%eax */
748 #define LINUX_SIGTRAMP_OFFSET1 (1)
749 #define LINUX_SIGTRAMP_INSN2 (0xcd) /* int */
750 #define LINUX_SIGTRAMP_OFFSET2 (6)
752 static const unsigned char linux_sigtramp_code
[] =
754 LINUX_SIGTRAMP_INSN0
, /* pop %eax */
755 LINUX_SIGTRAMP_INSN1
, 0x77, 0x00, 0x00, 0x00, /* mov $0x77,%eax */
756 LINUX_SIGTRAMP_INSN2
, 0x80 /* int $0x80 */
759 #define LINUX_SIGTRAMP_LEN (sizeof linux_sigtramp_code)
761 /* If PC is in a sigtramp routine, return the address of the start of
762 the routine. Otherwise, return 0. */
765 i386_linux_sigtramp_start (pc
)
768 unsigned char buf
[LINUX_SIGTRAMP_LEN
];
770 /* We only recognize a signal trampoline if PC is at the start of
771 one of the three instructions. We optimize for finding the PC at
772 the start, as will be the case when the trampoline is not the
773 first frame on the stack. We assume that in the case where the
774 PC is not at the start of the instruction sequence, there will be
775 a few trailing readable bytes on the stack. */
777 if (read_memory_nobpt (pc
, (char *) buf
, LINUX_SIGTRAMP_LEN
) != 0)
780 if (buf
[0] != LINUX_SIGTRAMP_INSN0
)
786 case LINUX_SIGTRAMP_INSN1
:
787 adjust
= LINUX_SIGTRAMP_OFFSET1
;
789 case LINUX_SIGTRAMP_INSN2
:
790 adjust
= LINUX_SIGTRAMP_OFFSET2
;
798 if (read_memory_nobpt (pc
, (char *) buf
, LINUX_SIGTRAMP_LEN
) != 0)
802 if (memcmp (buf
, linux_sigtramp_code
, LINUX_SIGTRAMP_LEN
) != 0)
808 /* Return whether PC is in a Linux sigtramp routine. */
811 i386_linux_sigtramp (pc
)
814 return i386_linux_sigtramp_start (pc
) != 0;
817 /* Assuming FRAME is for a Linux sigtramp routine, return the saved
818 program counter. The Linux kernel will set up a sigcontext
819 structure immediately before the sigtramp routine on the stack. */
822 i386_linux_sigtramp_saved_pc (frame
)
823 struct frame_info
*frame
;
827 pc
= i386_linux_sigtramp_start (frame
->pc
);
829 error ("i386_linux_sigtramp_saved_pc called when no sigtramp");
830 return read_memory_integer ((pc
831 - LINUX_SIGCONTEXT_SIZE
832 + LINUX_SIGCONTEXT_PC_OFFSET
),
836 /* Assuming FRAME is for a Linux sigtramp routine, return the saved
837 stack pointer. The Linux kernel will set up a sigcontext structure
838 immediately before the sigtramp routine on the stack. */
841 i386_linux_sigtramp_saved_sp (frame
)
842 struct frame_info
*frame
;
846 pc
= i386_linux_sigtramp_start (frame
->pc
);
848 error ("i386_linux_sigtramp_saved_sp called when no sigtramp");
849 return read_memory_integer ((pc
850 - LINUX_SIGCONTEXT_SIZE
851 + LINUX_SIGCONTEXT_SP_OFFSET
),
855 #endif /* I386_LINUX_SIGTRAMP */
857 #ifdef STATIC_TRANSFORM_NAME
858 /* SunPRO encodes the static variables. This is not related to C++ mangling,
859 it is done for C too. */
862 sunpro_static_transform_name (name
)
866 if (IS_STATIC_TRANSFORM_NAME (name
))
868 /* For file-local statics there will be a period, a bunch
869 of junk (the contents of which match a string given in the
870 N_OPT), a period and the name. For function-local statics
871 there will be a bunch of junk (which seems to change the
872 second character from 'A' to 'B'), a period, the name of the
873 function, and the name. So just skip everything before the
875 p
= strrchr (name
, '.');
881 #endif /* STATIC_TRANSFORM_NAME */
885 /* Stuff for WIN32 PE style DLL's but is pretty generic really. */
888 skip_trampoline_code (pc
, name
)
892 if (pc
&& read_memory_unsigned_integer (pc
, 2) == 0x25ff) /* jmp *(dest) */
894 unsigned long indirect
= read_memory_unsigned_integer (pc
+ 2, 4);
895 struct minimal_symbol
*indsym
=
896 indirect
? lookup_minimal_symbol_by_pc (indirect
) : 0;
897 char *symname
= indsym
? SYMBOL_NAME (indsym
) : 0;
901 if (strncmp (symname
, "__imp_", 6) == 0
902 || strncmp (symname
, "_imp_", 5) == 0)
903 return name
? 1 : read_memory_unsigned_integer (indirect
, 4);
906 return 0; /* not a trampoline */
910 gdb_print_insn_i386 (memaddr
, info
)
912 disassemble_info
*info
;
914 if (disassembly_flavor
== att_flavor
)
915 return print_insn_i386_att (memaddr
, info
);
916 else if (disassembly_flavor
== intel_flavor
)
917 return print_insn_i386_intel (memaddr
, info
);
918 /* Never reached - disassembly_flavour is always either att_flavor
923 /* If the disassembly mode is intel, we have to also switch the
924 bfd mach_type. This function is run in the set disassembly_flavor
925 command, and does that. */
928 set_disassembly_flavor_sfunc (args
, from_tty
, c
)
931 struct cmd_list_element
*c
;
933 set_disassembly_flavor ();
937 set_disassembly_flavor ()
939 if (disassembly_flavor
== att_flavor
)
940 set_architecture_from_arch_mach (bfd_arch_i386
, bfd_mach_i386_i386
);
941 else if (disassembly_flavor
== intel_flavor
)
942 set_architecture_from_arch_mach (bfd_arch_i386
, bfd_mach_i386_i386_intel_syntax
);
946 _initialize_i386_tdep ()
948 struct cmd_list_element
*new_cmd
;
950 tm_print_insn
= gdb_print_insn_i386
;
951 tm_print_insn_info
.mach
= bfd_lookup_arch (bfd_arch_i386
, 0)->mach
;
953 /* Add the variable that controls the disassembly flavor */
955 new_cmd
= add_set_enum_cmd ("disassembly-flavor", no_class
,
957 (char *) &disassembly_flavor
,
958 "Set the disassembly flavor, the valid values are \"att\" and \"intel\", \
959 and the default value is \"att\".",
961 new_cmd
->function
.sfunc
= set_disassembly_flavor_sfunc
;
962 add_show_from_set (new_cmd
, &showlist
);
964 /* Finally, initialize the disassembly flavor to the default given
965 in the disassembly_flavor variable */
967 set_disassembly_flavor ();