Lines Matching defs:so

122      * We do the indirection as soon as we read it, so from then
278 som_solib_add_solib_objfile (struct so_list *so, char *name, int from_tty,
284 so->objfile = symbol_file_add (name, from_tty, NULL, 0, OBJF_SHARED);
285 so->abfd = so->objfile->obfd;
288 so I do my own right here. */
289 for (s = so->objfile->sections; s < so->objfile->sections_end; s++)
291 flagword aflag = bfd_get_section_flags(so->abfd, s->the_bfd_section);
294 s->addr += so->som_solib.text_addr - so->som_solib.text_link_addr;
295 s->endaddr += so->som_solib.text_addr - so->som_solib.text_link_addr;
299 s->addr += so->som_solib.data_start;
300 s->endaddr += so->som_solib.data_start;
308 so->objfile->flags |= OBJF_SHARED;
310 if (so->objfile->obj_private == NULL)
313 obstack_alloc (&so->objfile->objfile_obstack,
317 so->objfile->obj_private = obj_private;
320 obj_private = (obj_private_data_t *) so->objfile->obj_private;
321 obj_private->so_info = so;
323 if (!bfd_check_format (so->abfd, bfd_object))
332 som_solib_load_symbols (struct so_list *so, char *name, int from_tty,
344 som_solib_add_solib_objfile (so, name, from_tty, text_addr);
349 if (build_section_table (so->abfd,
350 &so->sections,
351 &so->sections_end))
358 for (p = so->sections; p < so->sections_end; p++)
362 p->addr += ANOFFSET (so->objfile->section_offsets, SECT_OFF_TEXT (so->objfile));
363 p->endaddr += ANOFFSET (so->objfile->section_offsets, SECT_OFF_TEXT (so->objfile));
367 p->addr += ANOFFSET (so->objfile->section_offsets, SECT_OFF_DATA (so->objfile));
368 p->endaddr += ANOFFSET (so->objfile->section_offsets, SECT_OFF_DATA (so->objfile));
387 new = so->sections_end - so->sections;
393 so->sections,
631 If so, were we invoked this time from the command-line, via
773 whether doing so would exceed the symbol table size threshold.
777 if the user so desires).
800 warning ("Symbols for some libraries have not been loaded, because\ndoing so would exceed the size threshold specified by auto-solib-limit.\nTo manually load symbols, use the 'sharedlibrary' command.\nTo raise the threshold, set auto-solib-limit to a larger value and rerun\nthe program.\n");
841 This is our opportunity to set magic flags in the inferior so
844 needed (so GDB can set breakpoints in the library).
854 Note that shared libraries are not mapped in at this time, so we have
969 /* Now set a shlib_event breakpoint at __d_trap so we can track
981 /* We have all the support usually found in end.o, so we can track
1019 * Not all sites have /opt/langtools/lib/end.o, so it's not always
1203 /* Do we already know the value of these symbols? If so, then
1275 /* Did we find everything we were looking for? If so, stop. */
1306 breakpoint in the dld callback anyways, so this hack should be
1490 struct so_list *so = so_list_head;
1492 while (so)
1494 /* Is this address within this shlib's text range? If so,
1497 if ((addr >= so->som_solib.text_addr) && (addr <= so->som_solib.text_end))
1498 return so->som_solib.name;
1501 so = so->next;
1621 so_lib_thread_start_addr (struct so_list *so)
1623 return so->som_solib.tsd_start_addr;