X-Git-Url: http://git.efficios.com/?a=blobdiff_plain;f=gdb%2Fsymfile-mem.c;h=91125e15e5fe43333a0b8c3492f0d0ef3eccd463;hb=410978029e935ae8dd85153f327c53d5b5804ae0;hp=82342798f5f87eabc214a06294db9ed168677c16;hpb=197e01b6dcd118b70ed3621b62b2ff3fa929d50f;p=deliverable%2Fbinutils-gdb.git diff --git a/gdb/symfile-mem.c b/gdb/symfile-mem.c index 82342798f5..91125e15e5 100644 --- a/gdb/symfile-mem.c +++ b/gdb/symfile-mem.c @@ -1,13 +1,13 @@ /* Reading symbol files from memory. - Copyright (C) 1986, 1987, 1989, 1991, 1994, 1995, 1996, 1998, 2000, - 2001, 2002, 2003, 2004, 2005 Free Software Foundation, Inc. + Copyright (C) 1986-1987, 1989, 1991, 1994-1996, 1998, 2000-2005, + 2007-2012 Free Software Foundation, Inc. This file is part of GDB. This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or + the Free Software Foundation; either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, @@ -16,9 +16,7 @@ GNU General Public License for more details. You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 51 Franklin Street, Fifth Floor, - Boston, MA 02110-1301, USA. */ + along with this program. If not, see . */ /* This file defines functions (and commands to exercise those functions) for reading debugging information from object files @@ -73,6 +71,7 @@ symbol_file_add_from_memory (struct bfd *templ, CORE_ADDR addr, char *name, bfd_vma loadbase; struct section_addr_info *sai; unsigned int i; + struct cleanup *cleanup; if (bfd_get_flavour (templ) != bfd_target_elf_flavour) error (_("add-symbol-file-from-memory not supported for this target")); @@ -98,7 +97,7 @@ symbol_file_add_from_memory (struct bfd *templ, CORE_ADDR addr, char *name, } sai = alloc_section_addr_info (bfd_count_sections (nbfd)); - make_cleanup (xfree, sai); + cleanup = make_cleanup (xfree, sai); i = 0; for (sec = nbfd->sections; sec != NULL; sec = sec->next) if ((bfd_get_section_flags (nbfd, sec) & (SEC_ALLOC|SEC_LOAD)) != 0) @@ -109,12 +108,13 @@ symbol_file_add_from_memory (struct bfd *templ, CORE_ADDR addr, char *name, ++i; } - objf = symbol_file_add_from_bfd (nbfd, from_tty, - sai, 0, OBJF_SHARED); + objf = symbol_file_add_from_bfd (nbfd, from_tty ? SYMFILE_VERBOSE : 0, + sai, OBJF_SHARED, NULL); /* This might change our ideas about frames already looked at. */ reinit_frame_cache (); + do_cleanups (cleanup); return objf; } @@ -136,8 +136,8 @@ add_symbol_file_from_memory_command (char *args, int from_tty) else templ = exec_bfd; if (templ == NULL) - error (_("\ -Must use symbol-file or exec-file before add-symbol-file-from-memory.")); + error (_("Must use symbol-file or exec-file " + "before add-symbol-file-from-memory.")); symbol_file_add_from_memory (templ, addr, NULL, from_tty); } @@ -165,8 +165,8 @@ symbol_file_add_from_memory_wrapper (struct ui_out *uiout, void *data) return 0; } -/* Try to add the symbols for the vsyscall page, if there is one. This function - is called via the inferior_created observer. */ +/* Try to add the symbols for the vsyscall page, if there is one. + This function is called via the inferior_created observer. */ static void add_vsyscall_page (struct target_ops *target, int from_tty) @@ -191,32 +191,38 @@ add_vsyscall_page (struct target_ops *target, int from_tty) ``bfd_runtime'' (a BFD created using the loaded image) file format should fix this. */ { - warning (_("\ -Could not load vsyscall page because no executable was specified\n\ -try using the \"file\" command first.")); + warning (_("Could not load vsyscall page " + "because no executable was specified\n" + "try using the \"file\" command first.")); return; } args.bfd = bfd; args.sysinfo_ehdr = sysinfo_ehdr; - xasprintf (&args.name, "system-supplied DSO at 0x%s", - paddr_nz (sysinfo_ehdr)); + args.name = xstrprintf ("system-supplied DSO at %s", + paddress (target_gdbarch, sysinfo_ehdr)); /* Pass zero for FROM_TTY, because the action of loading the vsyscall DSO was not triggered by the user, even if the user typed "run" at the TTY. */ args.from_tty = 0; - catch_exceptions (uiout, symbol_file_add_from_memory_wrapper, + catch_exceptions (current_uiout, symbol_file_add_from_memory_wrapper, &args, RETURN_MASK_ALL); } } + +/* Provide a prototype to silence -Wmissing-prototypes. */ +extern initialize_file_ftype _initialize_symfile_mem; + void _initialize_symfile_mem (void) { add_cmd ("add-symbol-file-from-memory", class_files, - add_symbol_file_from_memory_command, _("\ -Load the symbols out of memory from a dynamically loaded object file.\n\ -Give an expression for the address of the file's shared object file header."), + add_symbol_file_from_memory_command, + _("Load the symbols out of memory from a " + "dynamically loaded object file.\n" + "Give an expression for the address " + "of the file's shared object file header."), &cmdlist); /* Want to know of each new inferior so that its vsyscall info can