Load r2e plugins with rasm2 too

This commit is contained in:
pancake 2015-04-23 00:46:42 +02:00
parent 56f4adf034
commit 33a64eab7e
3 changed files with 7 additions and 3 deletions

View File

@ -217,8 +217,12 @@ int main(int argc, char *argv[]) {
&__lib_asm_cb, &__lib_asm_dt, NULL);
path = r_sys_getenv ("LIBR_PLUGINS");
if (!path || !*path)
path = R2_PREFIX"/lib/radare2/"R2_VERSION;
path = R2_LIBDIR"/radare2/"R2_VERSION;
r_lib_opendir (l, path);
if (1) { //where & R_CORE_LOADLIBS_SYSTEM) {
r_lib_opendir (l, R2_LIBDIR"/radare2-extras/"R2_VERSION);
r_lib_opendir (l, R2_LIBDIR"/radare2-bindings/"R2_VERSION);
}
r_asm_use (a, R_SYS_ARCH);

View File

@ -49,7 +49,6 @@ Follow a flag in disassembly view (avoids to disasemble out of the visibility of
Execute a command every time a breakpoint is hit with 'e cmd.bp = !my-program'
Disassemble in intel syntax with 'e asm.syntax = intel'.
Change the UID of the debugged process with child.uid (requires root)
Enable full backtrace with dbg.fullbt
Find cp850 strings with 'e cfg.encoding=cp850' and '/s'
Enhace your graphs by increasing the size of the block and graph.depth eval variable.
Control the height of the terminal on serial consoles with e scr.height
@ -80,4 +79,4 @@ Run your own r2 scripts in awk using the r2awk program.
Use '-e bin.strings=false' to disable automatic string search when loading the binary.
The unix-like reverse engineering framework.
This code was intentionally left blank, try 'e asm.arch = ws'
For a full list of commands see `strings /dev/urandom`
For a full list of commands see `strings /dev/urandom`

View File

@ -1142,6 +1142,7 @@ static void r_core_cmd_bp(RCore *core, const char *input) {
"dbe", " <addr>", "Enable breakpoint",
"dbs", " <addr>", "Toggle breakpoint",
"dbt", "", "Display backtrace",
"dbte", " <addr>", "Enable Breakpoint Trace",
"dbtd", " <addr>", "Disable Breakpoint Trace",
"dbts", " <addr>", "Swap Breakpoint Trace",