diff options
author | Michael Snyder <msnyder@vmware.com> | 2002-08-20 23:01:29 +0000 |
---|---|---|
committer | Michael Snyder <msnyder@vmware.com> | 2002-08-20 23:01:29 +0000 |
commit | d50355b63cf93537c82e0eeb1b680acf493e7e73 (patch) | |
tree | 2bf33b9d27f2900934d0c0b03b37e9ed64a82906 /gdb/gdbarch.sh | |
parent | 757a7cc676c8decbdc2fd9f6b9d5289bf3fe54da (diff) | |
download | binutils-gdb-d50355b63cf93537c82e0eeb1b680acf493e7e73.tar.gz |
2002-08-20 Michael Snyder <msnyder@redhat.com>
* gdbarch.sh (IN_SOLIB_RETURN_TRAMPOLINE): Add.
* gdbarch.c, gdbarch.h: Regenerate.
* arch-utils.c, arch-utils.h (generic_in_solib_return_trampoline):
Add.
* infrun.c (IN_SOLIB_RETURN_TRAMPOLINE): Delete default definition.
Diffstat (limited to 'gdb/gdbarch.sh')
-rwxr-xr-x | gdb/gdbarch.sh | 8 |
1 files changed, 7 insertions, 1 deletions
diff --git a/gdb/gdbarch.sh b/gdb/gdbarch.sh index 87700da48e7..94d4c25fdc4 100755 --- a/gdb/gdbarch.sh +++ b/gdb/gdbarch.sh @@ -600,10 +600,16 @@ f:2:SMASH_TEXT_ADDRESS:CORE_ADDR:smash_text_address:CORE_ADDR addr:addr:::core_a F:2:SOFTWARE_SINGLE_STEP:void:software_single_step:enum target_signal sig, int insert_breakpoints_p:sig, insert_breakpoints_p::0:0 f:2:TARGET_PRINT_INSN:int:print_insn:bfd_vma vma, disassemble_info *info:vma, info:::legacy_print_insn::0 f:2:SKIP_TRAMPOLINE_CODE:CORE_ADDR:skip_trampoline_code:CORE_ADDR pc:pc:::generic_skip_trampoline_code::0 + + # For SVR4 shared libraries, each call goes through a small piece of # trampoline code in the ".plt" section. IN_SOLIB_CALL_TRAMPOLINE evaluates -# to nonzero if we are current stopped in one of these. +# to nonzero if we are currently stopped in one of these. f:2:IN_SOLIB_CALL_TRAMPOLINE:int:in_solib_call_trampoline:CORE_ADDR pc, char *name:pc, name:::generic_in_solib_call_trampoline::0 + +# Some systems also have trampoline code for returning from shared libs. +f:2:IN_SOLIB_RETURN_TRAMPOLINE:int:in_solib_return_trampoline:CORE_ADDR pc, char *name:pc, name:::generic_in_solib_return_trampoline::0 + # Sigtramp is a routine that the kernel calls (which then calls the # signal handler). On most machines it is a library routine that is # linked into the executable. |