* exec.c (map_vmap): Cast return from xmalloc to its proper type,
[deliverable/binutils-gdb.git] / gdb / osfsolib.c
CommitLineData
cef4c2e7 1/* Handle OSF/1 shared libraries for GDB, the GNU Debugger.
cef0333e 2 Copyright 1993, 1994 Free Software Foundation, Inc.
cef4c2e7
PS
3
4This file is part of GDB.
5
6This program is free software; you can redistribute it and/or modify
7it under the terms of the GNU General Public License as published by
8the Free Software Foundation; either version 2 of the License, or
9(at your option) any later version.
10
11This program is distributed in the hope that it will be useful,
12but WITHOUT ANY WARRANTY; without even the implied warranty of
13MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14GNU General Public License for more details.
15
16You should have received a copy of the GNU General Public License
17along with this program; if not, write to the Free Software
18Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */
19
20/* FIXME: Most of this code could be merged with solib.c by using
21 next_link_map_member and xfer_link_map_member in solib.c. */
22
23#include "defs.h"
24
25#include <sys/types.h>
26#include <signal.h>
27#include <string.h>
28#include <fcntl.h>
29
30#include "symtab.h"
31#include "bfd.h"
32#include "symfile.h"
33#include "objfiles.h"
34#include "gdbcore.h"
35#include "command.h"
36#include "target.h"
37#include "frame.h"
38#include "regex.h"
39#include "inferior.h"
40#include "language.h"
41
42#define MAX_PATH_SIZE 256 /* FIXME: Should be dynamic */
43
44/* FIXME: This is a terrible hack for shared library support under OSF/1.
45 The main problem is that the needed definitions are not contained in
46 the system header files.
47 The ldr_* routines described in loader(3) would be the way to go here.
48 But they do not work for arbitrary target processes (as documented). */
49
50#ifndef USE_LDR_ROUTINES
51#define RLD_CONTEXT_ADDRESS 0x3ffc0000000
52
53typedef struct
54{
55 CORE_ADDR next;
56 CORE_ADDR previous;
57 CORE_ADDR unknown;
58 char *module_name;
59 CORE_ADDR modinfo_addr;
60} ldr_module_info_t;
61
62typedef struct
63{
64 CORE_ADDR unknown1;
65 CORE_ADDR unknown2;
66 CORE_ADDR head;
67 CORE_ADDR tail;
68} ldr_context_t;
69
70static ldr_context_t ldr_context;
71#else
72#include <loader.h>
73#endif
74
75/* Define our own link_map structure.
76 This will help to share code with solib.c. */
77
78struct link_map {
79 CORE_ADDR l_addr; /* address at which object mapped */
80 char *l_name; /* full name of loaded object */
81 ldr_module_info_t module_info; /* corresponding module info */
82};
83
84#define LM_ADDR(so) ((so) -> lm.l_addr)
85#define LM_NAME(so) ((so) -> lm.l_name)
86
87struct so_list {
88 struct so_list *next; /* next structure in linked list */
89 struct link_map lm; /* copy of link map from inferior */
90 struct link_map *lmaddr; /* addr in inferior lm was read from */
91 CORE_ADDR lmend; /* upper addr bound of mapped object */
92 char so_name[MAX_PATH_SIZE]; /* shared object lib name (FIXME) */
93 char symbols_loaded; /* flag: symbols read in yet? */
94 char from_tty; /* flag: print msgs? */
95 struct objfile *objfile; /* objfile for loaded lib */
96 struct section_table *sections;
97 struct section_table *sections_end;
98 struct section_table *textsection;
a71c0593 99 bfd *abfd;
cef4c2e7
PS
100};
101
102static struct so_list *so_list_head; /* List of known shared objects */
103
104extern int
105fdmatch PARAMS ((int, int)); /* In libiberty */
106
107/* Local function prototypes */
108
109static void
110sharedlibrary_command PARAMS ((char *, int));
111
112static void
113info_sharedlibrary_command PARAMS ((char *, int));
114
115static int
116symbol_add_stub PARAMS ((char *));
117
118static struct so_list *
119find_solib PARAMS ((struct so_list *));
120
121static struct link_map *
122first_link_map_member PARAMS ((void));
123
124static struct link_map *
125next_link_map_member PARAMS ((struct so_list *));
126
127static void
128xfer_link_map_member PARAMS ((struct so_list *, struct link_map *));
129
130static void
131solib_map_sections PARAMS ((struct so_list *));
132
cef4c2e7
PS
133/*
134
135LOCAL FUNCTION
136
137 solib_map_sections -- open bfd and build sections for shared lib
138
139SYNOPSIS
140
141 static void solib_map_sections (struct so_list *so)
142
143DESCRIPTION
144
145 Given a pointer to one of the shared objects in our list
146 of mapped objects, use the recorded name to open a bfd
147 descriptor for the object, build a section table, and then
148 relocate all the section addresses by the base address at
149 which the shared object was mapped.
150
151FIXMES
152
153 In most (all?) cases the shared object file name recorded in the
154 dynamic linkage tables will be a fully qualified pathname. For
155 cases where it isn't, do we really mimic the systems search
156 mechanism correctly in the below code (particularly the tilde
157 expansion stuff?).
158 */
159
160static void
161solib_map_sections (so)
162 struct so_list *so;
163{
164 char *filename;
165 char *scratch_pathname;
166 int scratch_chan;
167 struct section_table *p;
168 struct cleanup *old_chain;
169 bfd *abfd;
170
171 filename = tilde_expand (so -> so_name);
172 old_chain = make_cleanup (free, filename);
173
174 scratch_chan = openp (getenv ("PATH"), 1, filename, O_RDONLY, 0,
175 &scratch_pathname);
176 if (scratch_chan < 0)
177 {
178 scratch_chan = openp (getenv ("LD_LIBRARY_PATH"), 1, filename,
179 O_RDONLY, 0, &scratch_pathname);
180 }
181 if (scratch_chan < 0)
182 {
183 perror_with_name (filename);
184 }
185 /* Leave scratch_pathname allocated. bfd->name will point to it. */
186
187 abfd = bfd_fdopenr (scratch_pathname, gnutarget, scratch_chan);
188 if (!abfd)
189 {
190 close (scratch_chan);
191 error ("Could not open `%s' as an executable file: %s",
c4a081e1 192 scratch_pathname, bfd_errmsg (bfd_get_error ()));
cef4c2e7
PS
193 }
194 /* Leave bfd open, core_xfer_memory and "info files" need it. */
a71c0593 195 so -> abfd = abfd;
cef4c2e7
PS
196 abfd -> cacheable = true;
197
198 if (!bfd_check_format (abfd, bfd_object))
199 {
200 error ("\"%s\": not in executable format: %s.",
c4a081e1 201 scratch_pathname, bfd_errmsg (bfd_get_error ()));
cef4c2e7
PS
202 }
203 if (build_section_table (abfd, &so -> sections, &so -> sections_end))
204 {
205 error ("Can't find the file sections in `%s': %s",
c4a081e1 206 bfd_get_filename (exec_bfd), bfd_errmsg (bfd_get_error ()));
cef4c2e7
PS
207 }
208
209 for (p = so -> sections; p < so -> sections_end; p++)
210 {
211 /* Relocate the section binding addresses as recorded in the shared
212 object's file by the base address to which the object was actually
213 mapped. */
214 p -> addr += (CORE_ADDR) LM_ADDR (so);
215 p -> endaddr += (CORE_ADDR) LM_ADDR (so);
216 so -> lmend = (CORE_ADDR) max (p -> endaddr, so -> lmend);
94d4b713 217 if (STREQ (p -> the_bfd_section -> name, ".text"))
cef4c2e7
PS
218 {
219 so -> textsection = p;
220 }
221 }
222
223 /* Free the file names, close the file now. */
224 do_cleanups (old_chain);
225}
226
227/*
228
229LOCAL FUNCTION
230
231 first_link_map_member -- locate first member in dynamic linker's map
232
233SYNOPSIS
234
235 static struct link_map *first_link_map_member (void)
236
237DESCRIPTION
238
239 Read in a copy of the first member in the inferior's dynamic
240 link map from the inferior's dynamic linker structures, and return
241 a pointer to the copy in our address space.
242*/
243
244static struct link_map *
245first_link_map_member ()
246{
247 struct link_map *lm = NULL;
248 static struct link_map first_lm;
249
250#ifdef USE_LDR_ROUTINES
251 ldr_module_t mod_id = LDR_NULL_MODULE;
252 size_t retsize;
253
254 if (ldr_next_module(inferior_pid, &mod_id) != 0
255 || mod_id == LDR_NULL_MODULE
256 || ldr_inq_module(inferior_pid, mod_id,
257 &first_lm.module_info, sizeof(ldr_module_info_t),
258 &retsize) != 0)
259 return lm;
260#else
261 CORE_ADDR ldr_context_addr;
262
263 if (target_read_memory ((CORE_ADDR) RLD_CONTEXT_ADDRESS,
264 (char *) &ldr_context_addr,
265 sizeof (CORE_ADDR)) != 0
266 || target_read_memory (ldr_context_addr,
267 (char *) &ldr_context,
268 sizeof (ldr_context_t)) != 0
269 || target_read_memory ((CORE_ADDR) ldr_context.head,
270 (char *) &first_lm.module_info,
271 sizeof (ldr_module_info_t)) != 0)
272 return lm;
273#endif
274
275 lm = &first_lm;
276
277 /* The first entry is for the main program and should be skipped. */
278 lm->l_name = NULL;
279
280 return lm;
281}
282
283static struct link_map *
284next_link_map_member (so_list_ptr)
285 struct so_list *so_list_ptr;
286{
287 struct link_map *lm = NULL;
288 static struct link_map next_lm;
289#ifdef USE_LDR_ROUTINES
290 ldr_module_t mod_id = lm->module_info.lmi_modid;
291 size_t retsize;
292
293 if (ldr_next_module(inferior_pid, &mod_id) != 0
294 || mod_id == LDR_NULL_MODULE
295 || ldr_inq_module(inferior_pid, mod_id,
296 &next_lm.module_info, sizeof(ldr_module_info_t),
297 &retsize) != 0)
298 return lm;
299
300 lm = &next_lm;
301 lm->l_name = lm->module_info.lmi_name;
302#else
303 CORE_ADDR ldr_context_addr;
304
305 /* Reread context in case ldr_context.tail was updated. */
306
307 if (target_read_memory ((CORE_ADDR) RLD_CONTEXT_ADDRESS,
308 (char *) &ldr_context_addr,
309 sizeof (CORE_ADDR)) != 0
310 || target_read_memory (ldr_context_addr,
311 (char *) &ldr_context,
312 sizeof (ldr_context_t)) != 0
313 || so_list_ptr->lm.module_info.modinfo_addr == ldr_context.tail
314 || target_read_memory (so_list_ptr->lm.module_info.next,
315 (char *) &next_lm.module_info,
316 sizeof (ldr_module_info_t)) != 0)
317 return lm;
318
319 lm = &next_lm;
320 lm->l_name = lm->module_info.module_name;
321#endif
322 return lm;
323}
324
325static void
326xfer_link_map_member (so_list_ptr, lm)
327 struct so_list *so_list_ptr;
328 struct link_map *lm;
329{
330 so_list_ptr->lm = *lm;
331
332 /* OSF/1 has absolute addresses in shared libraries. */
333 LM_ADDR (so_list_ptr) = 0;
334
335 /* There is one entry that has no name (for the inferior executable)
336 since it is not a shared object. */
337 if (LM_NAME (so_list_ptr) != 0)
338 {
339
340#ifdef USE_LDR_ROUTINES
341 int len = strlen (LM_NAME (so_list_ptr) + 1);
342
343 if (len > MAX_PATH_SIZE)
344 len = MAX_PATH_SIZE;
345 strncpy (so_list_ptr->so_name, LM_NAME (so_list_ptr), MAX_PATH_SIZE);
346#else
c485c7a9
PS
347 int errcode;
348 char *buffer;
349 target_read_string ((CORE_ADDR) LM_NAME (so_list_ptr), &buffer,
350 MAX_PATH_SIZE - 1, &errcode);
351 if (errcode != 0)
352 error ("xfer_link_map_member: Can't read pathname for load map: %s\n",
353 safe_strerror (errcode));
354 strncpy (so_list_ptr->so_name, buffer, MAX_PATH_SIZE - 1);
355 free (buffer);
cef4c2e7 356#endif
c485c7a9 357 so_list_ptr->so_name[MAX_PATH_SIZE - 1] = '\0';
cef4c2e7
PS
358
359 solib_map_sections (so_list_ptr);
360 }
361}
362
363/*
364
365LOCAL FUNCTION
366
367 find_solib -- step through list of shared objects
368
369SYNOPSIS
370
371 struct so_list *find_solib (struct so_list *so_list_ptr)
372
373DESCRIPTION
374
375 This module contains the routine which finds the names of any
376 loaded "images" in the current process. The argument in must be
377 NULL on the first call, and then the returned value must be passed
378 in on subsequent calls. This provides the capability to "step" down
379 the list of loaded objects. On the last object, a NULL value is
380 returned.
381
382 The arg and return value are "struct link_map" pointers, as defined
383 in <link.h>.
384 */
385
386static struct so_list *
387find_solib (so_list_ptr)
388 struct so_list *so_list_ptr; /* Last lm or NULL for first one */
389{
390 struct so_list *so_list_next = NULL;
391 struct link_map *lm = NULL;
392 struct so_list *new;
393
394 if (so_list_ptr == NULL)
395 {
396 /* We are setting up for a new scan through the loaded images. */
397 if ((so_list_next = so_list_head) == NULL)
398 {
399 /* Find the first link map list member. */
400 lm = first_link_map_member ();
401 }
402 }
403 else
404 {
405 /* We have been called before, and are in the process of walking
406 the shared library list. Advance to the next shared object. */
407 lm = next_link_map_member (so_list_ptr);
408 so_list_next = so_list_ptr -> next;
409 }
410 if ((so_list_next == NULL) && (lm != NULL))
411 {
412 /* Get next link map structure from inferior image and build a local
413 abbreviated load_map structure */
414 new = (struct so_list *) xmalloc (sizeof (struct so_list));
415 memset ((char *) new, 0, sizeof (struct so_list));
416 new -> lmaddr = lm;
417 /* Add the new node as the next node in the list, or as the root
418 node if this is the first one. */
419 if (so_list_ptr != NULL)
420 {
421 so_list_ptr -> next = new;
422 }
423 else
424 {
425 so_list_head = new;
426 }
427 so_list_next = new;
428 xfer_link_map_member (new, lm);
429 }
430 return (so_list_next);
431}
432
433/* A small stub to get us past the arg-passing pinhole of catch_errors. */
434
435static int
436symbol_add_stub (arg)
437 char *arg;
438{
439 register struct so_list *so = (struct so_list *) arg; /* catch_errs bogon */
440
441 so -> objfile = symbol_file_add (so -> so_name, so -> from_tty,
442 so -> textsection -> addr,
443 0, 0, 0);
444 return (1);
445}
446
447/*
448
449GLOBAL FUNCTION
450
451 solib_add -- add a shared library file to the symtab and section list
452
453SYNOPSIS
454
455 void solib_add (char *arg_string, int from_tty,
456 struct target_ops *target)
457
458DESCRIPTION
459
460*/
461
462void
463solib_add (arg_string, from_tty, target)
464 char *arg_string;
465 int from_tty;
466 struct target_ops *target;
467{
468 register struct so_list *so = NULL; /* link map state variable */
469
470 /* Last shared library that we read. */
471 struct so_list *so_last = NULL;
472
473 char *re_err;
474 int count;
475 int old;
476
477 if ((re_err = re_comp (arg_string ? arg_string : ".")) != NULL)
478 {
479 error ("Invalid regexp: %s", re_err);
480 }
481
482
483 /* Add the shared library sections to the section table of the
46d185d3 484 specified target, if any. */
cef4c2e7
PS
485 if (target)
486 {
487 /* Count how many new section_table entries there are. */
488 so = NULL;
489 count = 0;
490 while ((so = find_solib (so)) != NULL)
491 {
492 if (so -> so_name[0])
493 {
494 count += so -> sections_end - so -> sections;
495 }
496 }
497
498 if (count)
499 {
500 /* Reallocate the target's section table including the new size. */
501 if (target -> to_sections)
502 {
503 old = target -> to_sections_end - target -> to_sections;
504 target -> to_sections = (struct section_table *)
505 xrealloc ((char *)target -> to_sections,
506 (sizeof (struct section_table)) * (count + old));
507 }
508 else
509 {
510 old = 0;
511 target -> to_sections = (struct section_table *)
512 xmalloc ((sizeof (struct section_table)) * count);
513 }
514 target -> to_sections_end = target -> to_sections + (count + old);
515
516 /* Add these section table entries to the target's table. */
517 while ((so = find_solib (so)) != NULL)
518 {
519 if (so -> so_name[0])
520 {
521 count = so -> sections_end - so -> sections;
522 memcpy ((char *) (target -> to_sections + old),
523 so -> sections,
524 (sizeof (struct section_table)) * count);
525 old += count;
526 }
527 }
528 }
529 }
530
531 /* Now add the symbol files. */
532 so = NULL;
533 while ((so = find_solib (so)) != NULL)
534 {
535 if (so -> so_name[0] && re_exec (so -> so_name))
536 {
537 so -> from_tty = from_tty;
538 if (so -> symbols_loaded)
539 {
540 if (from_tty)
541 {
199b2450 542 printf_unfiltered ("Symbols already loaded for %s\n", so -> so_name);
cef4c2e7
PS
543 }
544 }
545 else if (catch_errors
546 (symbol_add_stub, (char *) so,
547 "Error while reading shared library symbols:\n",
548 RETURN_MASK_ALL))
549 {
550 so_last = so;
551 so -> symbols_loaded = 1;
552 }
553 }
554 }
46d185d3
PS
555
556 /* Getting new symbols may change our opinion about what is
557 frameless. */
54d478cd 558 if (so_last)
46d185d3 559 reinit_frame_cache ();
cef4c2e7
PS
560}
561
562/*
563
564LOCAL FUNCTION
565
566 info_sharedlibrary_command -- code for "info sharedlibrary"
567
568SYNOPSIS
569
570 static void info_sharedlibrary_command ()
571
572DESCRIPTION
573
574 Walk through the shared library list and print information
575 about each attached library.
576*/
577
578static void
579info_sharedlibrary_command (ignore, from_tty)
580 char *ignore;
581 int from_tty;
582{
583 register struct so_list *so = NULL; /* link map state variable */
584 int header_done = 0;
585
586 if (exec_bfd == NULL)
587 {
199b2450 588 printf_unfiltered ("No exec file.\n");
cef4c2e7
PS
589 return;
590 }
591 while ((so = find_solib (so)) != NULL)
592 {
593 if (so -> so_name[0])
594 {
595 unsigned long txt_start = 0;
596 unsigned long txt_end = 0;
597
598 if (!header_done)
599 {
199b2450 600 printf_unfiltered("%-20s%-20s%-12s%s\n", "From", "To", "Syms Read",
cef4c2e7
PS
601 "Shared Object Library");
602 header_done++;
603 }
604 if (so -> textsection)
605 {
606 txt_start = (unsigned long) so -> textsection -> addr;
607 txt_end = (unsigned long) so -> textsection -> endaddr;
608 }
199b2450
TL
609 printf_unfiltered ("%-20s", local_hex_string_custom (txt_start, "08l"));
610 printf_unfiltered ("%-20s", local_hex_string_custom (txt_end, "08l"));
611 printf_unfiltered ("%-12s", so -> symbols_loaded ? "Yes" : "No");
612 printf_unfiltered ("%s\n", so -> so_name);
cef4c2e7
PS
613 }
614 }
615 if (so_list_head == NULL)
616 {
199b2450 617 printf_unfiltered ("No shared libraries loaded at this time.\n");
cef4c2e7
PS
618 }
619}
620
621/*
622
623GLOBAL FUNCTION
624
625 solib_address -- check to see if an address is in a shared lib
626
627SYNOPSIS
628
629 int solib_address (CORE_ADDR address)
630
631DESCRIPTION
632
633 Provides a hook for other gdb routines to discover whether or
634 not a particular address is within the mapped address space of
635 a shared library. Any address between the base mapping address
636 and the first address beyond the end of the last mapping, is
637 considered to be within the shared library address space, for
638 our purposes.
639
640 For example, this routine is called at one point to disable
641 breakpoints which are in shared libraries that are not currently
642 mapped in.
643 */
644
645int
646solib_address (address)
647 CORE_ADDR address;
648{
649 register struct so_list *so = 0; /* link map state variable */
650
651 while ((so = find_solib (so)) != NULL)
652 {
653 if (so -> so_name[0] && so -> textsection)
654 {
655 if ((address >= (CORE_ADDR) so -> textsection -> addr) &&
656 (address < (CORE_ADDR) so -> textsection -> endaddr))
657 {
658 return (1);
659 }
660 }
661 }
662 return (0);
663}
664
665/* Called by free_all_symtabs */
666
667void
668clear_solib()
669{
670 struct so_list *next;
671 char *bfd_filename;
672
673 while (so_list_head)
674 {
675 if (so_list_head -> sections)
676 {
677 free ((PTR)so_list_head -> sections);
678 }
a71c0593 679 if (so_list_head -> abfd)
cef4c2e7 680 {
a71c0593
FF
681 bfd_filename = bfd_get_filename (so_list_head -> abfd);
682 bfd_close (so_list_head -> abfd);
cef4c2e7
PS
683 }
684 else
685 /* This happens for the executable on SVR4. */
686 bfd_filename = NULL;
687
688 next = so_list_head -> next;
689 if (bfd_filename)
690 free ((PTR)bfd_filename);
691 free ((PTR)so_list_head);
692 so_list_head = next;
693 }
694}
695
696/*
697
698GLOBAL FUNCTION
699
700 solib_create_inferior_hook -- shared library startup support
701
702SYNOPSIS
703
704 void solib_create_inferior_hook()
705
706DESCRIPTION
707
708 When gdb starts up the inferior, it nurses it along (through the
709 shell) until it is ready to execute it's first instruction. At this
710 point, this function gets called via expansion of the macro
711 SOLIB_CREATE_INFERIOR_HOOK.
712 For a statically bound executable, this first instruction is the
713 one at "_start", or a similar text label. No further processing is
714 needed in that case.
715 For a dynamically bound executable, this first instruction is somewhere
716 in the rld, and the actual user executable is not yet mapped in.
717 We continue the inferior again, rld then maps in the actual user
718 executable and any needed shared libraries and then sends
719 itself a SIGTRAP.
720 At that point we discover the names of all shared libraries and
721 read their symbols in.
722
723FIXME
724
725 This code does not properly handle hitting breakpoints which the
726 user might have set in the rld itself. Proper handling would have
727 to check if the SIGTRAP happened due to a kill call.
728
729 Also, what if child has exit()ed? Must exit loop somehow.
730 */
731
732void
733solib_create_inferior_hook()
734{
735
736 /* Nothing to do for statically bound executables. */
737
cef0333e
PS
738 if (symfile_objfile == NULL
739 || symfile_objfile->obfd == NULL
740 || ((bfd_get_file_flags (symfile_objfile->obfd) & DYNAMIC) == 0))
cef4c2e7
PS
741 return;
742
743 /* Now run the target. It will eventually get a SIGTRAP, at
744 which point all of the libraries will have been mapped in and we
745 can go groveling around in the rld structures to find
746 out what we need to know about them. */
747
748 clear_proceed_status ();
749 stop_soon_quietly = 1;
67ac9759 750 stop_signal = TARGET_SIGNAL_0;
cef4c2e7
PS
751 do
752 {
de43d7d0 753 target_resume (-1, 0, stop_signal);
cef4c2e7
PS
754 wait_for_inferior ();
755 }
67ac9759 756 while (stop_signal != TARGET_SIGNAL_TRAP);
cef4c2e7 757
46d185d3 758 /* solib_add will call reinit_frame_cache.
49d607d2
PS
759 But we are stopped in the runtime loader and we do not have symbols
760 for the runtime loader. So heuristic_proc_start will be called
761 and will put out an annoying warning.
cef0333e
PS
762 Delaying the resetting of stop_soon_quietly until after symbol loading
763 suppresses the warning. */
cef4c2e7 764 solib_add ((char *) 0, 0, (struct target_ops *) 0);
49d607d2 765 stop_soon_quietly = 0;
cef4c2e7
PS
766}
767
768
769/*
770
771LOCAL FUNCTION
772
773 sharedlibrary_command -- handle command to explicitly add library
774
775SYNOPSIS
776
777 static void sharedlibrary_command (char *args, int from_tty)
778
779DESCRIPTION
780
781*/
782
783static void
784sharedlibrary_command (args, from_tty)
785char *args;
786int from_tty;
787{
788 dont_repeat ();
789 solib_add (args, from_tty, (struct target_ops *) 0);
790}
791
792void
793_initialize_solib()
794{
795
796 add_com ("sharedlibrary", class_files, sharedlibrary_command,
797 "Load shared object library symbols for files matching REGEXP.");
798 add_info ("sharedlibrary", info_sharedlibrary_command,
799 "Status of loaded shared object libraries.");
800}
This page took 0.109695 seconds and 4 git commands to generate.