1 |
227 |
jeremybenn |
This is gdb.info, produced by makeinfo version 4.8 from ./gdb.texinfo.
|
2 |
|
|
|
3 |
|
|
INFO-DIR-SECTION Software development
|
4 |
|
|
START-INFO-DIR-ENTRY
|
5 |
|
|
* Gdb: (gdb). The GNU debugger.
|
6 |
|
|
END-INFO-DIR-ENTRY
|
7 |
|
|
|
8 |
|
|
Copyright (C) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996,
|
9 |
|
|
1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009,
|
10 |
|
|
2010 Free Software Foundation, Inc.
|
11 |
|
|
|
12 |
|
|
Permission is granted to copy, distribute and/or modify this document
|
13 |
|
|
under the terms of the GNU Free Documentation License, Version 1.1 or
|
14 |
|
|
any later version published by the Free Software Foundation; with the
|
15 |
|
|
Invariant Sections being "Free Software" and "Free Software Needs Free
|
16 |
|
|
Documentation", with the Front-Cover Texts being "A GNU Manual," and
|
17 |
|
|
with the Back-Cover Texts as in (a) below.
|
18 |
|
|
|
19 |
|
|
(a) The FSF's Back-Cover Text is: "You are free to copy and modify
|
20 |
|
|
this GNU Manual. Buying copies from GNU Press supports the FSF in
|
21 |
|
|
developing GNU and promoting software freedom."
|
22 |
|
|
|
23 |
|
|
This file documents the GNU debugger GDB.
|
24 |
|
|
|
25 |
|
|
This is the Ninth Edition, of `Debugging with GDB: the GNU
|
26 |
|
|
Source-Level Debugger' for GDB (GDB) Version 7.1.
|
27 |
|
|
|
28 |
|
|
Copyright (C) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996,
|
29 |
|
|
1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009,
|
30 |
|
|
2010 Free Software Foundation, Inc.
|
31 |
|
|
|
32 |
|
|
Permission is granted to copy, distribute and/or modify this document
|
33 |
|
|
under the terms of the GNU Free Documentation License, Version 1.1 or
|
34 |
|
|
any later version published by the Free Software Foundation; with the
|
35 |
|
|
Invariant Sections being "Free Software" and "Free Software Needs Free
|
36 |
|
|
Documentation", with the Front-Cover Texts being "A GNU Manual," and
|
37 |
|
|
with the Back-Cover Texts as in (a) below.
|
38 |
|
|
|
39 |
|
|
(a) The FSF's Back-Cover Text is: "You are free to copy and modify
|
40 |
|
|
this GNU Manual. Buying copies from GNU Press supports the FSF in
|
41 |
|
|
developing GNU and promoting software freedom."
|
42 |
|
|
|
43 |
|
|
|
44 |
|
|
File: gdb.info, Node: Readline Movement Commands, Next: Readline Killing Commands, Prev: Readline Bare Essentials, Up: Readline Interaction
|
45 |
|
|
|
46 |
|
|
31.2.2 Readline Movement Commands
|
47 |
|
|
---------------------------------
|
48 |
|
|
|
49 |
|
|
The above table describes the most basic keystrokes that you need in
|
50 |
|
|
order to do editing of the input line. For your convenience, many
|
51 |
|
|
other commands have been added in addition to `C-b', `C-f', `C-d', and
|
52 |
|
|
. Here are some commands for moving more rapidly about the line.
|
53 |
|
|
|
54 |
|
|
`C-a'
|
55 |
|
|
Move to the start of the line.
|
56 |
|
|
|
57 |
|
|
`C-e'
|
58 |
|
|
Move to the end of the line.
|
59 |
|
|
|
60 |
|
|
`M-f'
|
61 |
|
|
Move forward a word, where a word is composed of letters and
|
62 |
|
|
digits.
|
63 |
|
|
|
64 |
|
|
`M-b'
|
65 |
|
|
Move backward a word.
|
66 |
|
|
|
67 |
|
|
`C-l'
|
68 |
|
|
Clear the screen, reprinting the current line at the top.
|
69 |
|
|
|
70 |
|
|
Notice how `C-f' moves forward a character, while `M-f' moves
|
71 |
|
|
forward a word. It is a loose convention that control keystrokes
|
72 |
|
|
operate on characters while meta keystrokes operate on words.
|
73 |
|
|
|
74 |
|
|
|
75 |
|
|
File: gdb.info, Node: Readline Killing Commands, Next: Readline Arguments, Prev: Readline Movement Commands, Up: Readline Interaction
|
76 |
|
|
|
77 |
|
|
31.2.3 Readline Killing Commands
|
78 |
|
|
--------------------------------
|
79 |
|
|
|
80 |
|
|
"Killing" text means to delete the text from the line, but to save it
|
81 |
|
|
away for later use, usually by "yanking" (re-inserting) it back into
|
82 |
|
|
the line. (`Cut' and `paste' are more recent jargon for `kill' and
|
83 |
|
|
`yank'.)
|
84 |
|
|
|
85 |
|
|
If the description for a command says that it `kills' text, then you
|
86 |
|
|
can be sure that you can get the text back in a different (or the same)
|
87 |
|
|
place later.
|
88 |
|
|
|
89 |
|
|
When you use a kill command, the text is saved in a "kill-ring".
|
90 |
|
|
Any number of consecutive kills save all of the killed text together, so
|
91 |
|
|
that when you yank it back, you get it all. The kill ring is not line
|
92 |
|
|
specific; the text that you killed on a previously typed line is
|
93 |
|
|
available to be yanked back later, when you are typing another line.
|
94 |
|
|
|
95 |
|
|
Here is the list of commands for killing text.
|
96 |
|
|
|
97 |
|
|
`C-k'
|
98 |
|
|
Kill the text from the current cursor position to the end of the
|
99 |
|
|
line.
|
100 |
|
|
|
101 |
|
|
`M-d'
|
102 |
|
|
Kill from the cursor to the end of the current word, or, if between
|
103 |
|
|
words, to the end of the next word. Word boundaries are the same
|
104 |
|
|
as those used by `M-f'.
|
105 |
|
|
|
106 |
|
|
`M-'
|
107 |
|
|
Kill from the cursor the start of the current word, or, if between
|
108 |
|
|
words, to the start of the previous word. Word boundaries are the
|
109 |
|
|
same as those used by `M-b'.
|
110 |
|
|
|
111 |
|
|
`C-w'
|
112 |
|
|
Kill from the cursor to the previous whitespace. This is
|
113 |
|
|
different than `M-' because the word boundaries differ.
|
114 |
|
|
|
115 |
|
|
|
116 |
|
|
Here is how to "yank" the text back into the line. Yanking means to
|
117 |
|
|
copy the most-recently-killed text from the kill buffer.
|
118 |
|
|
|
119 |
|
|
`C-y'
|
120 |
|
|
Yank the most recently killed text back into the buffer at the
|
121 |
|
|
cursor.
|
122 |
|
|
|
123 |
|
|
`M-y'
|
124 |
|
|
Rotate the kill-ring, and yank the new top. You can only do this
|
125 |
|
|
if the prior command is `C-y' or `M-y'.
|
126 |
|
|
|
127 |
|
|
|
128 |
|
|
File: gdb.info, Node: Readline Arguments, Next: Searching, Prev: Readline Killing Commands, Up: Readline Interaction
|
129 |
|
|
|
130 |
|
|
31.2.4 Readline Arguments
|
131 |
|
|
-------------------------
|
132 |
|
|
|
133 |
|
|
You can pass numeric arguments to Readline commands. Sometimes the
|
134 |
|
|
argument acts as a repeat count, other times it is the sign of the
|
135 |
|
|
argument that is significant. If you pass a negative argument to a
|
136 |
|
|
command which normally acts in a forward direction, that command will
|
137 |
|
|
act in a backward direction. For example, to kill text back to the
|
138 |
|
|
start of the line, you might type `M-- C-k'.
|
139 |
|
|
|
140 |
|
|
The general way to pass numeric arguments to a command is to type
|
141 |
|
|
meta digits before the command. If the first `digit' typed is a minus
|
142 |
|
|
sign (`-'), then the sign of the argument will be negative. Once you
|
143 |
|
|
have typed one meta digit to get the argument started, you can type the
|
144 |
|
|
remainder of the digits, and then the command. For example, to give
|
145 |
|
|
the `C-d' command an argument of 10, you could type `M-1 0 C-d', which
|
146 |
|
|
will delete the next ten characters on the input line.
|
147 |
|
|
|
148 |
|
|
|
149 |
|
|
File: gdb.info, Node: Searching, Prev: Readline Arguments, Up: Readline Interaction
|
150 |
|
|
|
151 |
|
|
31.2.5 Searching for Commands in the History
|
152 |
|
|
--------------------------------------------
|
153 |
|
|
|
154 |
|
|
Readline provides commands for searching through the command history
|
155 |
|
|
for lines containing a specified string. There are two search modes:
|
156 |
|
|
"incremental" and "non-incremental".
|
157 |
|
|
|
158 |
|
|
Incremental searches begin before the user has finished typing the
|
159 |
|
|
search string. As each character of the search string is typed,
|
160 |
|
|
Readline displays the next entry from the history matching the string
|
161 |
|
|
typed so far. An incremental search requires only as many characters
|
162 |
|
|
as needed to find the desired history entry. To search backward in the
|
163 |
|
|
history for a particular string, type `C-r'. Typing `C-s' searches
|
164 |
|
|
forward through the history. The characters present in the value of
|
165 |
|
|
the `isearch-terminators' variable are used to terminate an incremental
|
166 |
|
|
search. If that variable has not been assigned a value, the and
|
167 |
|
|
`C-J' characters will terminate an incremental search. `C-g' will
|
168 |
|
|
abort an incremental search and restore the original line. When the
|
169 |
|
|
search is terminated, the history entry containing the search string
|
170 |
|
|
becomes the current line.
|
171 |
|
|
|
172 |
|
|
To find other matching entries in the history list, type `C-r' or
|
173 |
|
|
`C-s' as appropriate. This will search backward or forward in the
|
174 |
|
|
history for the next entry matching the search string typed so far.
|
175 |
|
|
Any other key sequence bound to a Readline command will terminate the
|
176 |
|
|
search and execute that command. For instance, a will terminate
|
177 |
|
|
the search and accept the line, thereby executing the command from the
|
178 |
|
|
history list. A movement command will terminate the search, make the
|
179 |
|
|
last line found the current line, and begin editing.
|
180 |
|
|
|
181 |
|
|
Readline remembers the last incremental search string. If two
|
182 |
|
|
`C-r's are typed without any intervening characters defining a new
|
183 |
|
|
search string, any remembered search string is used.
|
184 |
|
|
|
185 |
|
|
Non-incremental searches read the entire search string before
|
186 |
|
|
starting to search for matching history lines. The search string may be
|
187 |
|
|
typed by the user or be part of the contents of the current line.
|
188 |
|
|
|
189 |
|
|
|
190 |
|
|
File: gdb.info, Node: Readline Init File, Next: Bindable Readline Commands, Prev: Readline Interaction, Up: Command Line Editing
|
191 |
|
|
|
192 |
|
|
31.3 Readline Init File
|
193 |
|
|
=======================
|
194 |
|
|
|
195 |
|
|
Although the Readline library comes with a set of Emacs-like
|
196 |
|
|
keybindings installed by default, it is possible to use a different set
|
197 |
|
|
of keybindings. Any user can customize programs that use Readline by
|
198 |
|
|
putting commands in an "inputrc" file, conventionally in his home
|
199 |
|
|
directory. The name of this file is taken from the value of the
|
200 |
|
|
environment variable `INPUTRC'. If that variable is unset, the default
|
201 |
|
|
is `~/.inputrc'.
|
202 |
|
|
|
203 |
|
|
When a program which uses the Readline library starts up, the init
|
204 |
|
|
file is read, and the key bindings are set.
|
205 |
|
|
|
206 |
|
|
In addition, the `C-x C-r' command re-reads this init file, thus
|
207 |
|
|
incorporating any changes that you might have made to it.
|
208 |
|
|
|
209 |
|
|
* Menu:
|
210 |
|
|
|
211 |
|
|
* Readline Init File Syntax:: Syntax for the commands in the inputrc file.
|
212 |
|
|
|
213 |
|
|
* Conditional Init Constructs:: Conditional key bindings in the inputrc file.
|
214 |
|
|
|
215 |
|
|
* Sample Init File:: An example inputrc file.
|
216 |
|
|
|
217 |
|
|
|
218 |
|
|
File: gdb.info, Node: Readline Init File Syntax, Next: Conditional Init Constructs, Up: Readline Init File
|
219 |
|
|
|
220 |
|
|
31.3.1 Readline Init File Syntax
|
221 |
|
|
--------------------------------
|
222 |
|
|
|
223 |
|
|
There are only a few basic constructs allowed in the Readline init
|
224 |
|
|
file. Blank lines are ignored. Lines beginning with a `#' are
|
225 |
|
|
comments. Lines beginning with a `$' indicate conditional constructs
|
226 |
|
|
(*note Conditional Init Constructs::). Other lines denote variable
|
227 |
|
|
settings and key bindings.
|
228 |
|
|
|
229 |
|
|
Variable Settings
|
230 |
|
|
You can modify the run-time behavior of Readline by altering the
|
231 |
|
|
values of variables in Readline using the `set' command within the
|
232 |
|
|
init file. The syntax is simple:
|
233 |
|
|
|
234 |
|
|
set VARIABLE VALUE
|
235 |
|
|
|
236 |
|
|
Here, for example, is how to change from the default Emacs-like
|
237 |
|
|
key binding to use `vi' line editing commands:
|
238 |
|
|
|
239 |
|
|
set editing-mode vi
|
240 |
|
|
|
241 |
|
|
Variable names and values, where appropriate, are recognized
|
242 |
|
|
without regard to case. Unrecognized variable names are ignored.
|
243 |
|
|
|
244 |
|
|
Boolean variables (those that can be set to on or off) are set to
|
245 |
|
|
on if the value is null or empty, ON (case-insensitive), or 1.
|
246 |
|
|
Any other value results in the variable being set to off.
|
247 |
|
|
|
248 |
|
|
A great deal of run-time behavior is changeable with the following
|
249 |
|
|
variables.
|
250 |
|
|
|
251 |
|
|
`bell-style'
|
252 |
|
|
Controls what happens when Readline wants to ring the
|
253 |
|
|
terminal bell. If set to `none', Readline never rings the
|
254 |
|
|
bell. If set to `visible', Readline uses a visible bell if
|
255 |
|
|
one is available. If set to `audible' (the default),
|
256 |
|
|
Readline attempts to ring the terminal's bell.
|
257 |
|
|
|
258 |
|
|
`bind-tty-special-chars'
|
259 |
|
|
If set to `on', Readline attempts to bind the control
|
260 |
|
|
characters treated specially by the kernel's terminal driver
|
261 |
|
|
to their Readline equivalents.
|
262 |
|
|
|
263 |
|
|
`comment-begin'
|
264 |
|
|
The string to insert at the beginning of the line when the
|
265 |
|
|
`insert-comment' command is executed. The default value is
|
266 |
|
|
`"#"'.
|
267 |
|
|
|
268 |
|
|
`completion-ignore-case'
|
269 |
|
|
If set to `on', Readline performs filename matching and
|
270 |
|
|
completion in a case-insensitive fashion. The default value
|
271 |
|
|
is `off'.
|
272 |
|
|
|
273 |
|
|
`completion-query-items'
|
274 |
|
|
The number of possible completions that determines when the
|
275 |
|
|
user is asked whether the list of possibilities should be
|
276 |
|
|
displayed. If the number of possible completions is greater
|
277 |
|
|
than this value, Readline will ask the user whether or not he
|
278 |
|
|
wishes to view them; otherwise, they are simply listed. This
|
279 |
|
|
variable must be set to an integer value greater than or
|
280 |
|
|
equal to 0. A negative value means Readline should never ask.
|
281 |
|
|
The default limit is `100'.
|
282 |
|
|
|
283 |
|
|
`convert-meta'
|
284 |
|
|
If set to `on', Readline will convert characters with the
|
285 |
|
|
eighth bit set to an ASCII key sequence by stripping the
|
286 |
|
|
eighth bit and prefixing an character, converting them
|
287 |
|
|
to a meta-prefixed key sequence. The default value is `on'.
|
288 |
|
|
|
289 |
|
|
`disable-completion'
|
290 |
|
|
If set to `On', Readline will inhibit word completion.
|
291 |
|
|
Completion characters will be inserted into the line as if
|
292 |
|
|
they had been mapped to `self-insert'. The default is `off'.
|
293 |
|
|
|
294 |
|
|
`editing-mode'
|
295 |
|
|
The `editing-mode' variable controls which default set of key
|
296 |
|
|
bindings is used. By default, Readline starts up in Emacs
|
297 |
|
|
editing mode, where the keystrokes are most similar to Emacs.
|
298 |
|
|
This variable can be set to either `emacs' or `vi'.
|
299 |
|
|
|
300 |
|
|
`enable-keypad'
|
301 |
|
|
When set to `on', Readline will try to enable the application
|
302 |
|
|
keypad when it is called. Some systems need this to enable
|
303 |
|
|
the arrow keys. The default is `off'.
|
304 |
|
|
|
305 |
|
|
`expand-tilde'
|
306 |
|
|
If set to `on', tilde expansion is performed when Readline
|
307 |
|
|
attempts word completion. The default is `off'.
|
308 |
|
|
|
309 |
|
|
`history-preserve-point'
|
310 |
|
|
If set to `on', the history code attempts to place point at
|
311 |
|
|
the same location on each history line retrieved with
|
312 |
|
|
`previous-history' or `next-history'. The default is `off'.
|
313 |
|
|
|
314 |
|
|
`horizontal-scroll-mode'
|
315 |
|
|
This variable can be set to either `on' or `off'. Setting it
|
316 |
|
|
to `on' means that the text of the lines being edited will
|
317 |
|
|
scroll horizontally on a single screen line when they are
|
318 |
|
|
longer than the width of the screen, instead of wrapping onto
|
319 |
|
|
a new screen line. By default, this variable is set to `off'.
|
320 |
|
|
|
321 |
|
|
`input-meta'
|
322 |
|
|
If set to `on', Readline will enable eight-bit input (it will
|
323 |
|
|
not clear the eighth bit in the characters it reads),
|
324 |
|
|
regardless of what the terminal claims it can support. The
|
325 |
|
|
default value is `off'. The name `meta-flag' is a synonym
|
326 |
|
|
for this variable.
|
327 |
|
|
|
328 |
|
|
`isearch-terminators'
|
329 |
|
|
The string of characters that should terminate an incremental
|
330 |
|
|
search without subsequently executing the character as a
|
331 |
|
|
command (*note Searching::). If this variable has not been
|
332 |
|
|
given a value, the characters and `C-J' will terminate
|
333 |
|
|
an incremental search.
|
334 |
|
|
|
335 |
|
|
`keymap'
|
336 |
|
|
Sets Readline's idea of the current keymap for key binding
|
337 |
|
|
commands. Acceptable `keymap' names are `emacs',
|
338 |
|
|
`emacs-standard', `emacs-meta', `emacs-ctlx', `vi', `vi-move',
|
339 |
|
|
`vi-command', and `vi-insert'. `vi' is equivalent to
|
340 |
|
|
`vi-command'; `emacs' is equivalent to `emacs-standard'. The
|
341 |
|
|
default value is `emacs'. The value of the `editing-mode'
|
342 |
|
|
variable also affects the default keymap.
|
343 |
|
|
|
344 |
|
|
`mark-directories'
|
345 |
|
|
If set to `on', completed directory names have a slash
|
346 |
|
|
appended. The default is `on'.
|
347 |
|
|
|
348 |
|
|
`mark-modified-lines'
|
349 |
|
|
This variable, when set to `on', causes Readline to display an
|
350 |
|
|
asterisk (`*') at the start of history lines which have been
|
351 |
|
|
modified. This variable is `off' by default.
|
352 |
|
|
|
353 |
|
|
`mark-symlinked-directories'
|
354 |
|
|
If set to `on', completed names which are symbolic links to
|
355 |
|
|
directories have a slash appended (subject to the value of
|
356 |
|
|
`mark-directories'). The default is `off'.
|
357 |
|
|
|
358 |
|
|
`match-hidden-files'
|
359 |
|
|
This variable, when set to `on', causes Readline to match
|
360 |
|
|
files whose names begin with a `.' (hidden files) when
|
361 |
|
|
performing filename completion, unless the leading `.' is
|
362 |
|
|
supplied by the user in the filename to be completed. This
|
363 |
|
|
variable is `on' by default.
|
364 |
|
|
|
365 |
|
|
`output-meta'
|
366 |
|
|
If set to `on', Readline will display characters with the
|
367 |
|
|
eighth bit set directly rather than as a meta-prefixed escape
|
368 |
|
|
sequence. The default is `off'.
|
369 |
|
|
|
370 |
|
|
`page-completions'
|
371 |
|
|
If set to `on', Readline uses an internal `more'-like pager
|
372 |
|
|
to display a screenful of possible completions at a time.
|
373 |
|
|
This variable is `on' by default.
|
374 |
|
|
|
375 |
|
|
`print-completions-horizontally'
|
376 |
|
|
If set to `on', Readline will display completions with matches
|
377 |
|
|
sorted horizontally in alphabetical order, rather than down
|
378 |
|
|
the screen. The default is `off'.
|
379 |
|
|
|
380 |
|
|
`show-all-if-ambiguous'
|
381 |
|
|
This alters the default behavior of the completion functions.
|
382 |
|
|
If set to `on', words which have more than one possible
|
383 |
|
|
completion cause the matches to be listed immediately instead
|
384 |
|
|
of ringing the bell. The default value is `off'.
|
385 |
|
|
|
386 |
|
|
`show-all-if-unmodified'
|
387 |
|
|
This alters the default behavior of the completion functions
|
388 |
|
|
in a fashion similar to SHOW-ALL-IF-AMBIGUOUS. If set to
|
389 |
|
|
`on', words which have more than one possible completion
|
390 |
|
|
without any possible partial completion (the possible
|
391 |
|
|
completions don't share a common prefix) cause the matches to
|
392 |
|
|
be listed immediately instead of ringing the bell. The
|
393 |
|
|
default value is `off'.
|
394 |
|
|
|
395 |
|
|
`visible-stats'
|
396 |
|
|
If set to `on', a character denoting a file's type is
|
397 |
|
|
appended to the filename when listing possible completions.
|
398 |
|
|
The default is `off'.
|
399 |
|
|
|
400 |
|
|
|
401 |
|
|
Key Bindings
|
402 |
|
|
The syntax for controlling key bindings in the init file is
|
403 |
|
|
simple. First you need to find the name of the command that you
|
404 |
|
|
want to change. The following sections contain tables of the
|
405 |
|
|
command name, the default keybinding, if any, and a short
|
406 |
|
|
description of what the command does.
|
407 |
|
|
|
408 |
|
|
Once you know the name of the command, simply place on a line in
|
409 |
|
|
the init file the name of the key you wish to bind the command to,
|
410 |
|
|
a colon, and then the name of the command. The name of the key
|
411 |
|
|
can be expressed in different ways, depending on what you find most
|
412 |
|
|
comfortable.
|
413 |
|
|
|
414 |
|
|
In addition to command names, readline allows keys to be bound to
|
415 |
|
|
a string that is inserted when the key is pressed (a MACRO).
|
416 |
|
|
|
417 |
|
|
KEYNAME: FUNCTION-NAME or MACRO
|
418 |
|
|
KEYNAME is the name of a key spelled out in English. For
|
419 |
|
|
example:
|
420 |
|
|
Control-u: universal-argument
|
421 |
|
|
Meta-Rubout: backward-kill-word
|
422 |
|
|
Control-o: "> output"
|
423 |
|
|
|
424 |
|
|
In the above example, `C-u' is bound to the function
|
425 |
|
|
`universal-argument', `M-DEL' is bound to the function
|
426 |
|
|
`backward-kill-word', and `C-o' is bound to run the macro
|
427 |
|
|
expressed on the right hand side (that is, to insert the text
|
428 |
|
|
`> output' into the line).
|
429 |
|
|
|
430 |
|
|
A number of symbolic character names are recognized while
|
431 |
|
|
processing this key binding syntax: DEL, ESC, ESCAPE, LFD,
|
432 |
|
|
NEWLINE, RET, RETURN, RUBOUT, SPACE, SPC, and TAB.
|
433 |
|
|
|
434 |
|
|
"KEYSEQ": FUNCTION-NAME or MACRO
|
435 |
|
|
KEYSEQ differs from KEYNAME above in that strings denoting an
|
436 |
|
|
entire key sequence can be specified, by placing the key
|
437 |
|
|
sequence in double quotes. Some GNU Emacs style key escapes
|
438 |
|
|
can be used, as in the following example, but the special
|
439 |
|
|
character names are not recognized.
|
440 |
|
|
|
441 |
|
|
"\C-u": universal-argument
|
442 |
|
|
"\C-x\C-r": re-read-init-file
|
443 |
|
|
"\e[11~": "Function Key 1"
|
444 |
|
|
|
445 |
|
|
In the above example, `C-u' is again bound to the function
|
446 |
|
|
`universal-argument' (just as it was in the first example),
|
447 |
|
|
`C-x C-r' is bound to the function `re-read-init-file', and
|
448 |
|
|
` <[> <1> <1> <~>' is bound to insert the text `Function
|
449 |
|
|
Key 1'.
|
450 |
|
|
|
451 |
|
|
|
452 |
|
|
The following GNU Emacs style escape sequences are available when
|
453 |
|
|
specifying key sequences:
|
454 |
|
|
|
455 |
|
|
`\C-'
|
456 |
|
|
control prefix
|
457 |
|
|
|
458 |
|
|
`\M-'
|
459 |
|
|
meta prefix
|
460 |
|
|
|
461 |
|
|
`\e'
|
462 |
|
|
an escape character
|
463 |
|
|
|
464 |
|
|
`\\'
|
465 |
|
|
backslash
|
466 |
|
|
|
467 |
|
|
`\"'
|
468 |
|
|
<">, a double quotation mark
|
469 |
|
|
|
470 |
|
|
`\''
|
471 |
|
|
<'>, a single quote or apostrophe
|
472 |
|
|
|
473 |
|
|
In addition to the GNU Emacs style escape sequences, a second set
|
474 |
|
|
of backslash escapes is available:
|
475 |
|
|
|
476 |
|
|
`\a'
|
477 |
|
|
alert (bell)
|
478 |
|
|
|
479 |
|
|
`\b'
|
480 |
|
|
backspace
|
481 |
|
|
|
482 |
|
|
`\d'
|
483 |
|
|
delete
|
484 |
|
|
|
485 |
|
|
`\f'
|
486 |
|
|
form feed
|
487 |
|
|
|
488 |
|
|
`\n'
|
489 |
|
|
newline
|
490 |
|
|
|
491 |
|
|
`\r'
|
492 |
|
|
carriage return
|
493 |
|
|
|
494 |
|
|
`\t'
|
495 |
|
|
horizontal tab
|
496 |
|
|
|
497 |
|
|
`\v'
|
498 |
|
|
vertical tab
|
499 |
|
|
|
500 |
|
|
`\NNN'
|
501 |
|
|
the eight-bit character whose value is the octal value NNN
|
502 |
|
|
(one to three digits)
|
503 |
|
|
|
504 |
|
|
`\xHH'
|
505 |
|
|
the eight-bit character whose value is the hexadecimal value
|
506 |
|
|
HH (one or two hex digits)
|
507 |
|
|
|
508 |
|
|
When entering the text of a macro, single or double quotes must be
|
509 |
|
|
used to indicate a macro definition. Unquoted text is assumed to
|
510 |
|
|
be a function name. In the macro body, the backslash escapes
|
511 |
|
|
described above are expanded. Backslash will quote any other
|
512 |
|
|
character in the macro text, including `"' and `''. For example,
|
513 |
|
|
the following binding will make `C-x \' insert a single `\' into
|
514 |
|
|
the line:
|
515 |
|
|
"\C-x\\": "\\"
|
516 |
|
|
|
517 |
|
|
|
518 |
|
|
|
519 |
|
|
File: gdb.info, Node: Conditional Init Constructs, Next: Sample Init File, Prev: Readline Init File Syntax, Up: Readline Init File
|
520 |
|
|
|
521 |
|
|
31.3.2 Conditional Init Constructs
|
522 |
|
|
----------------------------------
|
523 |
|
|
|
524 |
|
|
Readline implements a facility similar in spirit to the conditional
|
525 |
|
|
compilation features of the C preprocessor which allows key bindings
|
526 |
|
|
and variable settings to be performed as the result of tests. There
|
527 |
|
|
are four parser directives used.
|
528 |
|
|
|
529 |
|
|
`$if'
|
530 |
|
|
The `$if' construct allows bindings to be made based on the
|
531 |
|
|
editing mode, the terminal being used, or the application using
|
532 |
|
|
Readline. The text of the test extends to the end of the line; no
|
533 |
|
|
characters are required to isolate it.
|
534 |
|
|
|
535 |
|
|
`mode'
|
536 |
|
|
The `mode=' form of the `$if' directive is used to test
|
537 |
|
|
whether Readline is in `emacs' or `vi' mode. This may be
|
538 |
|
|
used in conjunction with the `set keymap' command, for
|
539 |
|
|
instance, to set bindings in the `emacs-standard' and
|
540 |
|
|
`emacs-ctlx' keymaps only if Readline is starting out in
|
541 |
|
|
`emacs' mode.
|
542 |
|
|
|
543 |
|
|
`term'
|
544 |
|
|
The `term=' form may be used to include terminal-specific key
|
545 |
|
|
bindings, perhaps to bind the key sequences output by the
|
546 |
|
|
terminal's function keys. The word on the right side of the
|
547 |
|
|
`=' is tested against both the full name of the terminal and
|
548 |
|
|
the portion of the terminal name before the first `-'. This
|
549 |
|
|
allows `sun' to match both `sun' and `sun-cmd', for instance.
|
550 |
|
|
|
551 |
|
|
`application'
|
552 |
|
|
The APPLICATION construct is used to include
|
553 |
|
|
application-specific settings. Each program using the
|
554 |
|
|
Readline library sets the APPLICATION NAME, and you can test
|
555 |
|
|
for a particular value. This could be used to bind key
|
556 |
|
|
sequences to functions useful for a specific program. For
|
557 |
|
|
instance, the following command adds a key sequence that
|
558 |
|
|
quotes the current or previous word in Bash:
|
559 |
|
|
$if Bash
|
560 |
|
|
# Quote the current or previous word
|
561 |
|
|
"\C-xq": "\eb\"\ef\""
|
562 |
|
|
$endif
|
563 |
|
|
|
564 |
|
|
`$endif'
|
565 |
|
|
This command, as seen in the previous example, terminates an `$if'
|
566 |
|
|
command.
|
567 |
|
|
|
568 |
|
|
`$else'
|
569 |
|
|
Commands in this branch of the `$if' directive are executed if the
|
570 |
|
|
test fails.
|
571 |
|
|
|
572 |
|
|
`$include'
|
573 |
|
|
This directive takes a single filename as an argument and reads
|
574 |
|
|
commands and bindings from that file. For example, the following
|
575 |
|
|
directive reads from `/etc/inputrc':
|
576 |
|
|
$include /etc/inputrc
|
577 |
|
|
|
578 |
|
|
|
579 |
|
|
File: gdb.info, Node: Sample Init File, Prev: Conditional Init Constructs, Up: Readline Init File
|
580 |
|
|
|
581 |
|
|
31.3.3 Sample Init File
|
582 |
|
|
-----------------------
|
583 |
|
|
|
584 |
|
|
Here is an example of an INPUTRC file. This illustrates key binding,
|
585 |
|
|
variable assignment, and conditional syntax.
|
586 |
|
|
|
587 |
|
|
|
588 |
|
|
# This file controls the behaviour of line input editing for
|
589 |
|
|
# programs that use the GNU Readline library. Existing
|
590 |
|
|
# programs include FTP, Bash, and GDB.
|
591 |
|
|
#
|
592 |
|
|
# You can re-read the inputrc file with C-x C-r.
|
593 |
|
|
# Lines beginning with '#' are comments.
|
594 |
|
|
#
|
595 |
|
|
# First, include any systemwide bindings and variable
|
596 |
|
|
# assignments from /etc/Inputrc
|
597 |
|
|
$include /etc/Inputrc
|
598 |
|
|
|
599 |
|
|
#
|
600 |
|
|
# Set various bindings for emacs mode.
|
601 |
|
|
|
602 |
|
|
set editing-mode emacs
|
603 |
|
|
|
604 |
|
|
$if mode=emacs
|
605 |
|
|
|
606 |
|
|
Meta-Control-h: backward-kill-word Text after the function name is ignored
|
607 |
|
|
|
608 |
|
|
#
|
609 |
|
|
# Arrow keys in keypad mode
|
610 |
|
|
#
|
611 |
|
|
#"\M-OD": backward-char
|
612 |
|
|
#"\M-OC": forward-char
|
613 |
|
|
#"\M-OA": previous-history
|
614 |
|
|
#"\M-OB": next-history
|
615 |
|
|
#
|
616 |
|
|
# Arrow keys in ANSI mode
|
617 |
|
|
#
|
618 |
|
|
"\M-[D": backward-char
|
619 |
|
|
"\M-[C": forward-char
|
620 |
|
|
"\M-[A": previous-history
|
621 |
|
|
"\M-[B": next-history
|
622 |
|
|
#
|
623 |
|
|
# Arrow keys in 8 bit keypad mode
|
624 |
|
|
#
|
625 |
|
|
#"\M-\C-OD": backward-char
|
626 |
|
|
#"\M-\C-OC": forward-char
|
627 |
|
|
#"\M-\C-OA": previous-history
|
628 |
|
|
#"\M-\C-OB": next-history
|
629 |
|
|
#
|
630 |
|
|
# Arrow keys in 8 bit ANSI mode
|
631 |
|
|
#
|
632 |
|
|
#"\M-\C-[D": backward-char
|
633 |
|
|
#"\M-\C-[C": forward-char
|
634 |
|
|
#"\M-\C-[A": previous-history
|
635 |
|
|
#"\M-\C-[B": next-history
|
636 |
|
|
|
637 |
|
|
C-q: quoted-insert
|
638 |
|
|
|
639 |
|
|
$endif
|
640 |
|
|
|
641 |
|
|
# An old-style binding. This happens to be the default.
|
642 |
|
|
TAB: complete
|
643 |
|
|
|
644 |
|
|
# Macros that are convenient for shell interaction
|
645 |
|
|
$if Bash
|
646 |
|
|
# edit the path
|
647 |
|
|
"\C-xp": "PATH=${PATH}\e\C-e\C-a\ef\C-f"
|
648 |
|
|
# prepare to type a quoted word --
|
649 |
|
|
# insert open and close double quotes
|
650 |
|
|
# and move to just after the open quote
|
651 |
|
|
"\C-x\"": "\"\"\C-b"
|
652 |
|
|
# insert a backslash (testing backslash escapes
|
653 |
|
|
# in sequences and macros)
|
654 |
|
|
"\C-x\\": "\\"
|
655 |
|
|
# Quote the current or previous word
|
656 |
|
|
"\C-xq": "\eb\"\ef\""
|
657 |
|
|
# Add a binding to refresh the line, which is unbound
|
658 |
|
|
"\C-xr": redraw-current-line
|
659 |
|
|
# Edit variable on current line.
|
660 |
|
|
"\M-\C-v": "\C-a\C-k$\C-y\M-\C-e\C-a\C-y="
|
661 |
|
|
$endif
|
662 |
|
|
|
663 |
|
|
# use a visible bell if one is available
|
664 |
|
|
set bell-style visible
|
665 |
|
|
|
666 |
|
|
# don't strip characters to 7 bits when reading
|
667 |
|
|
set input-meta on
|
668 |
|
|
|
669 |
|
|
# allow iso-latin1 characters to be inserted rather
|
670 |
|
|
# than converted to prefix-meta sequences
|
671 |
|
|
set convert-meta off
|
672 |
|
|
|
673 |
|
|
# display characters with the eighth bit set directly
|
674 |
|
|
# rather than as meta-prefixed characters
|
675 |
|
|
set output-meta on
|
676 |
|
|
|
677 |
|
|
# if there are more than 150 possible completions for
|
678 |
|
|
# a word, ask the user if he wants to see all of them
|
679 |
|
|
set completion-query-items 150
|
680 |
|
|
|
681 |
|
|
# For FTP
|
682 |
|
|
$if Ftp
|
683 |
|
|
"\C-xg": "get \M-?"
|
684 |
|
|
"\C-xt": "put \M-?"
|
685 |
|
|
"\M-.": yank-last-arg
|
686 |
|
|
$endif
|
687 |
|
|
|
688 |
|
|
|
689 |
|
|
File: gdb.info, Node: Bindable Readline Commands, Next: Readline vi Mode, Prev: Readline Init File, Up: Command Line Editing
|
690 |
|
|
|
691 |
|
|
31.4 Bindable Readline Commands
|
692 |
|
|
===============================
|
693 |
|
|
|
694 |
|
|
* Menu:
|
695 |
|
|
|
696 |
|
|
* Commands For Moving:: Moving about the line.
|
697 |
|
|
* Commands For History:: Getting at previous lines.
|
698 |
|
|
* Commands For Text:: Commands for changing text.
|
699 |
|
|
* Commands For Killing:: Commands for killing and yanking.
|
700 |
|
|
* Numeric Arguments:: Specifying numeric arguments, repeat counts.
|
701 |
|
|
* Commands For Completion:: Getting Readline to do the typing for you.
|
702 |
|
|
* Keyboard Macros:: Saving and re-executing typed characters
|
703 |
|
|
* Miscellaneous Commands:: Other miscellaneous commands.
|
704 |
|
|
|
705 |
|
|
This section describes Readline commands that may be bound to key
|
706 |
|
|
sequences. Command names without an accompanying key sequence are
|
707 |
|
|
unbound by default.
|
708 |
|
|
|
709 |
|
|
In the following descriptions, "point" refers to the current cursor
|
710 |
|
|
position, and "mark" refers to a cursor position saved by the
|
711 |
|
|
`set-mark' command. The text between the point and mark is referred to
|
712 |
|
|
as the "region".
|
713 |
|
|
|
714 |
|
|
|
715 |
|
|
File: gdb.info, Node: Commands For Moving, Next: Commands For History, Up: Bindable Readline Commands
|
716 |
|
|
|
717 |
|
|
31.4.1 Commands For Moving
|
718 |
|
|
--------------------------
|
719 |
|
|
|
720 |
|
|
`beginning-of-line (C-a)'
|
721 |
|
|
Move to the start of the current line.
|
722 |
|
|
|
723 |
|
|
`end-of-line (C-e)'
|
724 |
|
|
Move to the end of the line.
|
725 |
|
|
|
726 |
|
|
`forward-char (C-f)'
|
727 |
|
|
Move forward a character.
|
728 |
|
|
|
729 |
|
|
`backward-char (C-b)'
|
730 |
|
|
Move back a character.
|
731 |
|
|
|
732 |
|
|
`forward-word (M-f)'
|
733 |
|
|
Move forward to the end of the next word. Words are composed of
|
734 |
|
|
letters and digits.
|
735 |
|
|
|
736 |
|
|
`backward-word (M-b)'
|
737 |
|
|
Move back to the start of the current or previous word. Words are
|
738 |
|
|
composed of letters and digits.
|
739 |
|
|
|
740 |
|
|
`clear-screen (C-l)'
|
741 |
|
|
Clear the screen and redraw the current line, leaving the current
|
742 |
|
|
line at the top of the screen.
|
743 |
|
|
|
744 |
|
|
`redraw-current-line ()'
|
745 |
|
|
Refresh the current line. By default, this is unbound.
|
746 |
|
|
|
747 |
|
|
|
748 |
|
|
|
749 |
|
|
File: gdb.info, Node: Commands For History, Next: Commands For Text, Prev: Commands For Moving, Up: Bindable Readline Commands
|
750 |
|
|
|
751 |
|
|
31.4.2 Commands For Manipulating The History
|
752 |
|
|
--------------------------------------------
|
753 |
|
|
|
754 |
|
|
`accept-line (Newline or Return)'
|
755 |
|
|
Accept the line regardless of where the cursor is. If this line is
|
756 |
|
|
non-empty, it may be added to the history list for future recall
|
757 |
|
|
with `add_history()'. If this line is a modified history line,
|
758 |
|
|
the history line is restored to its original state.
|
759 |
|
|
|
760 |
|
|
`previous-history (C-p)'
|
761 |
|
|
Move `back' through the history list, fetching the previous
|
762 |
|
|
command.
|
763 |
|
|
|
764 |
|
|
`next-history (C-n)'
|
765 |
|
|
Move `forward' through the history list, fetching the next command.
|
766 |
|
|
|
767 |
|
|
`beginning-of-history (M-<)'
|
768 |
|
|
Move to the first line in the history.
|
769 |
|
|
|
770 |
|
|
`end-of-history (M->)'
|
771 |
|
|
Move to the end of the input history, i.e., the line currently
|
772 |
|
|
being entered.
|
773 |
|
|
|
774 |
|
|
`reverse-search-history (C-r)'
|
775 |
|
|
Search backward starting at the current line and moving `up'
|
776 |
|
|
through the history as necessary. This is an incremental search.
|
777 |
|
|
|
778 |
|
|
`forward-search-history (C-s)'
|
779 |
|
|
Search forward starting at the current line and moving `down'
|
780 |
|
|
through the the history as necessary. This is an incremental
|
781 |
|
|
search.
|
782 |
|
|
|
783 |
|
|
`non-incremental-reverse-search-history (M-p)'
|
784 |
|
|
Search backward starting at the current line and moving `up'
|
785 |
|
|
through the history as necessary using a non-incremental search
|
786 |
|
|
for a string supplied by the user.
|
787 |
|
|
|
788 |
|
|
`non-incremental-forward-search-history (M-n)'
|
789 |
|
|
Search forward starting at the current line and moving `down'
|
790 |
|
|
through the the history as necessary using a non-incremental search
|
791 |
|
|
for a string supplied by the user.
|
792 |
|
|
|
793 |
|
|
`history-search-forward ()'
|
794 |
|
|
Search forward through the history for the string of characters
|
795 |
|
|
between the start of the current line and the point. This is a
|
796 |
|
|
non-incremental search. By default, this command is unbound.
|
797 |
|
|
|
798 |
|
|
`history-search-backward ()'
|
799 |
|
|
Search backward through the history for the string of characters
|
800 |
|
|
between the start of the current line and the point. This is a
|
801 |
|
|
non-incremental search. By default, this command is unbound.
|
802 |
|
|
|
803 |
|
|
`yank-nth-arg (M-C-y)'
|
804 |
|
|
Insert the first argument to the previous command (usually the
|
805 |
|
|
second word on the previous line) at point. With an argument N,
|
806 |
|
|
insert the Nth word from the previous command (the words in the
|
807 |
|
|
previous command begin with word 0). A negative argument inserts
|
808 |
|
|
the Nth word from the end of the previous command. Once the
|
809 |
|
|
argument N is computed, the argument is extracted as if the `!N'
|
810 |
|
|
history expansion had been specified.
|
811 |
|
|
|
812 |
|
|
`yank-last-arg (M-. or M-_)'
|
813 |
|
|
Insert last argument to the previous command (the last word of the
|
814 |
|
|
previous history entry). With an argument, behave exactly like
|
815 |
|
|
`yank-nth-arg'. Successive calls to `yank-last-arg' move back
|
816 |
|
|
through the history list, inserting the last argument of each line
|
817 |
|
|
in turn. The history expansion facilities are used to extract the
|
818 |
|
|
last argument, as if the `!$' history expansion had been specified.
|
819 |
|
|
|
820 |
|
|
|
821 |
|
|
|
822 |
|
|
File: gdb.info, Node: Commands For Text, Next: Commands For Killing, Prev: Commands For History, Up: Bindable Readline Commands
|
823 |
|
|
|
824 |
|
|
31.4.3 Commands For Changing Text
|
825 |
|
|
---------------------------------
|
826 |
|
|
|
827 |
|
|
`delete-char (C-d)'
|
828 |
|
|
Delete the character at point. If point is at the beginning of
|
829 |
|
|
the line, there are no characters in the line, and the last
|
830 |
|
|
character typed was not bound to `delete-char', then return EOF.
|
831 |
|
|
|
832 |
|
|
`backward-delete-char (Rubout)'
|
833 |
|
|
Delete the character behind the cursor. A numeric argument means
|
834 |
|
|
to kill the characters instead of deleting them.
|
835 |
|
|
|
836 |
|
|
`forward-backward-delete-char ()'
|
837 |
|
|
Delete the character under the cursor, unless the cursor is at the
|
838 |
|
|
end of the line, in which case the character behind the cursor is
|
839 |
|
|
deleted. By default, this is not bound to a key.
|
840 |
|
|
|
841 |
|
|
`quoted-insert (C-q or C-v)'
|
842 |
|
|
Add the next character typed to the line verbatim. This is how to
|
843 |
|
|
insert key sequences like `C-q', for example.
|
844 |
|
|
|
845 |
|
|
`tab-insert (M-)'
|
846 |
|
|
Insert a tab character.
|
847 |
|
|
|
848 |
|
|
`self-insert (a, b, A, 1, !, ...)'
|
849 |
|
|
Insert yourself.
|
850 |
|
|
|
851 |
|
|
`transpose-chars (C-t)'
|
852 |
|
|
Drag the character before the cursor forward over the character at
|
853 |
|
|
the cursor, moving the cursor forward as well. If the insertion
|
854 |
|
|
point is at the end of the line, then this transposes the last two
|
855 |
|
|
characters of the line. Negative arguments have no effect.
|
856 |
|
|
|
857 |
|
|
`transpose-words (M-t)'
|
858 |
|
|
Drag the word before point past the word after point, moving point
|
859 |
|
|
past that word as well. If the insertion point is at the end of
|
860 |
|
|
the line, this transposes the last two words on the line.
|
861 |
|
|
|
862 |
|
|
`upcase-word (M-u)'
|
863 |
|
|
Uppercase the current (or following) word. With a negative
|
864 |
|
|
argument, uppercase the previous word, but do not move the cursor.
|
865 |
|
|
|
866 |
|
|
`downcase-word (M-l)'
|
867 |
|
|
Lowercase the current (or following) word. With a negative
|
868 |
|
|
argument, lowercase the previous word, but do not move the cursor.
|
869 |
|
|
|
870 |
|
|
`capitalize-word (M-c)'
|
871 |
|
|
Capitalize the current (or following) word. With a negative
|
872 |
|
|
argument, capitalize the previous word, but do not move the cursor.
|
873 |
|
|
|
874 |
|
|
`overwrite-mode ()'
|
875 |
|
|
Toggle overwrite mode. With an explicit positive numeric argument,
|
876 |
|
|
switches to overwrite mode. With an explicit non-positive numeric
|
877 |
|
|
argument, switches to insert mode. This command affects only
|
878 |
|
|
`emacs' mode; `vi' mode does overwrite differently. Each call to
|
879 |
|
|
`readline()' starts in insert mode.
|
880 |
|
|
|
881 |
|
|
In overwrite mode, characters bound to `self-insert' replace the
|
882 |
|
|
text at point rather than pushing the text to the right.
|
883 |
|
|
Characters bound to `backward-delete-char' replace the character
|
884 |
|
|
before point with a space.
|
885 |
|
|
|
886 |
|
|
By default, this command is unbound.
|
887 |
|
|
|
888 |
|
|
|
889 |
|
|
|
890 |
|
|
File: gdb.info, Node: Commands For Killing, Next: Numeric Arguments, Prev: Commands For Text, Up: Bindable Readline Commands
|
891 |
|
|
|
892 |
|
|
31.4.4 Killing And Yanking
|
893 |
|
|
--------------------------
|
894 |
|
|
|
895 |
|
|
`kill-line (C-k)'
|
896 |
|
|
Kill the text from point to the end of the line.
|
897 |
|
|
|
898 |
|
|
`backward-kill-line (C-x Rubout)'
|
899 |
|
|
Kill backward to the beginning of the line.
|
900 |
|
|
|
901 |
|
|
`unix-line-discard (C-u)'
|
902 |
|
|
Kill backward from the cursor to the beginning of the current line.
|
903 |
|
|
|
904 |
|
|
`kill-whole-line ()'
|
905 |
|
|
Kill all characters on the current line, no matter where point is.
|
906 |
|
|
By default, this is unbound.
|
907 |
|
|
|
908 |
|
|
`kill-word (M-d)'
|
909 |
|
|
Kill from point to the end of the current word, or if between
|
910 |
|
|
words, to the end of the next word. Word boundaries are the same
|
911 |
|
|
as `forward-word'.
|
912 |
|
|
|
913 |
|
|
`backward-kill-word (M-)'
|
914 |
|
|
Kill the word behind point. Word boundaries are the same as
|
915 |
|
|
`backward-word'.
|
916 |
|
|
|
917 |
|
|
`unix-word-rubout (C-w)'
|
918 |
|
|
Kill the word behind point, using white space as a word boundary.
|
919 |
|
|
The killed text is saved on the kill-ring.
|
920 |
|
|
|
921 |
|
|
`unix-filename-rubout ()'
|
922 |
|
|
Kill the word behind point, using white space and the slash
|
923 |
|
|
character as the word boundaries. The killed text is saved on the
|
924 |
|
|
kill-ring.
|
925 |
|
|
|
926 |
|
|
`delete-horizontal-space ()'
|
927 |
|
|
Delete all spaces and tabs around point. By default, this is
|
928 |
|
|
unbound.
|
929 |
|
|
|
930 |
|
|
`kill-region ()'
|
931 |
|
|
Kill the text in the current region. By default, this command is
|
932 |
|
|
unbound.
|
933 |
|
|
|
934 |
|
|
`copy-region-as-kill ()'
|
935 |
|
|
Copy the text in the region to the kill buffer, so it can be yanked
|
936 |
|
|
right away. By default, this command is unbound.
|
937 |
|
|
|
938 |
|
|
`copy-backward-word ()'
|
939 |
|
|
Copy the word before point to the kill buffer. The word
|
940 |
|
|
boundaries are the same as `backward-word'. By default, this
|
941 |
|
|
command is unbound.
|
942 |
|
|
|
943 |
|
|
`copy-forward-word ()'
|
944 |
|
|
Copy the word following point to the kill buffer. The word
|
945 |
|
|
boundaries are the same as `forward-word'. By default, this
|
946 |
|
|
command is unbound.
|
947 |
|
|
|
948 |
|
|
`yank (C-y)'
|
949 |
|
|
Yank the top of the kill ring into the buffer at point.
|
950 |
|
|
|
951 |
|
|
`yank-pop (M-y)'
|
952 |
|
|
Rotate the kill-ring, and yank the new top. You can only do this
|
953 |
|
|
if the prior command is `yank' or `yank-pop'.
|
954 |
|
|
|
955 |
|
|
|
956 |
|
|
File: gdb.info, Node: Numeric Arguments, Next: Commands For Completion, Prev: Commands For Killing, Up: Bindable Readline Commands
|
957 |
|
|
|
958 |
|
|
31.4.5 Specifying Numeric Arguments
|
959 |
|
|
-----------------------------------
|
960 |
|
|
|
961 |
|
|
`digit-argument (M-0, M-1, ... M--)'
|
962 |
|
|
Add this digit to the argument already accumulating, or start a new
|
963 |
|
|
argument. `M--' starts a negative argument.
|
964 |
|
|
|
965 |
|
|
`universal-argument ()'
|
966 |
|
|
This is another way to specify an argument. If this command is
|
967 |
|
|
followed by one or more digits, optionally with a leading minus
|
968 |
|
|
sign, those digits define the argument. If the command is
|
969 |
|
|
followed by digits, executing `universal-argument' again ends the
|
970 |
|
|
numeric argument, but is otherwise ignored. As a special case, if
|
971 |
|
|
this command is immediately followed by a character that is
|
972 |
|
|
neither a digit or minus sign, the argument count for the next
|
973 |
|
|
command is multiplied by four. The argument count is initially
|
974 |
|
|
one, so executing this function the first time makes the argument
|
975 |
|
|
count four, a second time makes the argument count sixteen, and so
|
976 |
|
|
on. By default, this is not bound to a key.
|
977 |
|
|
|
978 |
|
|
|
979 |
|
|
File: gdb.info, Node: Commands For Completion, Next: Keyboard Macros, Prev: Numeric Arguments, Up: Bindable Readline Commands
|
980 |
|
|
|
981 |
|
|
31.4.6 Letting Readline Type For You
|
982 |
|
|
------------------------------------
|
983 |
|
|
|
984 |
|
|
`complete ()'
|
985 |
|
|
Attempt to perform completion on the text before point. The
|
986 |
|
|
actual completion performed is application-specific. The default
|
987 |
|
|
is filename completion.
|
988 |
|
|
|
989 |
|
|
`possible-completions (M-?)'
|
990 |
|
|
List the possible completions of the text before point.
|
991 |
|
|
|
992 |
|
|
`insert-completions (M-*)'
|
993 |
|
|
Insert all completions of the text before point that would have
|
994 |
|
|
been generated by `possible-completions'.
|
995 |
|
|
|
996 |
|
|
`menu-complete ()'
|
997 |
|
|
Similar to `complete', but replaces the word to be completed with
|
998 |
|
|
a single match from the list of possible completions. Repeated
|
999 |
|
|
execution of `menu-complete' steps through the list of possible
|
1000 |
|
|
completions, inserting each match in turn. At the end of the list
|
1001 |
|
|
of completions, the bell is rung (subject to the setting of
|
1002 |
|
|
`bell-style') and the original text is restored. An argument of N
|
1003 |
|
|
moves N positions forward in the list of matches; a negative
|
1004 |
|
|
argument may be used to move backward through the list. This
|
1005 |
|
|
command is intended to be bound to , but is unbound by
|
1006 |
|
|
default.
|
1007 |
|
|
|
1008 |
|
|
`delete-char-or-list ()'
|
1009 |
|
|
Deletes the character under the cursor if not at the beginning or
|
1010 |
|
|
end of the line (like `delete-char'). If at the end of the line,
|
1011 |
|
|
behaves identically to `possible-completions'. This command is
|
1012 |
|
|
unbound by default.
|
1013 |
|
|
|
1014 |
|
|
|
1015 |
|
|
|
1016 |
|
|
File: gdb.info, Node: Keyboard Macros, Next: Miscellaneous Commands, Prev: Commands For Completion, Up: Bindable Readline Commands
|
1017 |
|
|
|
1018 |
|
|
31.4.7 Keyboard Macros
|
1019 |
|
|
----------------------
|
1020 |
|
|
|
1021 |
|
|
`start-kbd-macro (C-x ()'
|
1022 |
|
|
Begin saving the characters typed into the current keyboard macro.
|
1023 |
|
|
|
1024 |
|
|
`end-kbd-macro (C-x ))'
|
1025 |
|
|
Stop saving the characters typed into the current keyboard macro
|
1026 |
|
|
and save the definition.
|
1027 |
|
|
|
1028 |
|
|
`call-last-kbd-macro (C-x e)'
|
1029 |
|
|
Re-execute the last keyboard macro defined, by making the
|
1030 |
|
|
characters in the macro appear as if typed at the keyboard.
|
1031 |
|
|
|
1032 |
|
|
|
1033 |
|
|
|
1034 |
|
|
File: gdb.info, Node: Miscellaneous Commands, Prev: Keyboard Macros, Up: Bindable Readline Commands
|
1035 |
|
|
|
1036 |
|
|
31.4.8 Some Miscellaneous Commands
|
1037 |
|
|
----------------------------------
|
1038 |
|
|
|
1039 |
|
|
`re-read-init-file (C-x C-r)'
|
1040 |
|
|
Read in the contents of the INPUTRC file, and incorporate any
|
1041 |
|
|
bindings or variable assignments found there.
|
1042 |
|
|
|
1043 |
|
|
`abort (C-g)'
|
1044 |
|
|
Abort the current editing command and ring the terminal's bell
|
1045 |
|
|
(subject to the setting of `bell-style').
|
1046 |
|
|
|
1047 |
|
|
`do-uppercase-version (M-a, M-b, M-X, ...)'
|
1048 |
|
|
If the metafied character X is lowercase, run the command that is
|
1049 |
|
|
bound to the corresponding uppercase character.
|
1050 |
|
|
|
1051 |
|
|
`prefix-meta ()'
|
1052 |
|
|
Metafy the next character typed. This is for keyboards without a
|
1053 |
|
|
meta key. Typing ` f' is equivalent to typing `M-f'.
|
1054 |
|
|
|
1055 |
|
|
`undo (C-_ or C-x C-u)'
|
1056 |
|
|
Incremental undo, separately remembered for each line.
|
1057 |
|
|
|
1058 |
|
|
`revert-line (M-r)'
|
1059 |
|
|
Undo all changes made to this line. This is like executing the
|
1060 |
|
|
`undo' command enough times to get back to the beginning.
|
1061 |
|
|
|
1062 |
|
|
`tilde-expand (M-~)'
|
1063 |
|
|
Perform tilde expansion on the current word.
|
1064 |
|
|
|
1065 |
|
|
`set-mark (C-@)'
|
1066 |
|
|
Set the mark to the point. If a numeric argument is supplied, the
|
1067 |
|
|
mark is set to that position.
|
1068 |
|
|
|
1069 |
|
|
`exchange-point-and-mark (C-x C-x)'
|
1070 |
|
|
Swap the point with the mark. The current cursor position is set
|
1071 |
|
|
to the saved position, and the old cursor position is saved as the
|
1072 |
|
|
mark.
|
1073 |
|
|
|
1074 |
|
|
`character-search (C-])'
|
1075 |
|
|
A character is read and point is moved to the next occurrence of
|
1076 |
|
|
that character. A negative count searches for previous
|
1077 |
|
|
occurrences.
|
1078 |
|
|
|
1079 |
|
|
`character-search-backward (M-C-])'
|
1080 |
|
|
A character is read and point is moved to the previous occurrence
|
1081 |
|
|
of that character. A negative count searches for subsequent
|
1082 |
|
|
occurrences.
|
1083 |
|
|
|
1084 |
|
|
`insert-comment (M-#)'
|
1085 |
|
|
Without a numeric argument, the value of the `comment-begin'
|
1086 |
|
|
variable is inserted at the beginning of the current line. If a
|
1087 |
|
|
numeric argument is supplied, this command acts as a toggle: if
|
1088 |
|
|
the characters at the beginning of the line do not match the value
|
1089 |
|
|
of `comment-begin', the value is inserted, otherwise the
|
1090 |
|
|
characters in `comment-begin' are deleted from the beginning of
|
1091 |
|
|
the line. In either case, the line is accepted as if a newline
|
1092 |
|
|
had been typed.
|
1093 |
|
|
|
1094 |
|
|
`dump-functions ()'
|
1095 |
|
|
Print all of the functions and their key bindings to the Readline
|
1096 |
|
|
output stream. If a numeric argument is supplied, the output is
|
1097 |
|
|
formatted in such a way that it can be made part of an INPUTRC
|
1098 |
|
|
file. This command is unbound by default.
|
1099 |
|
|
|
1100 |
|
|
`dump-variables ()'
|
1101 |
|
|
Print all of the settable variables and their values to the
|
1102 |
|
|
Readline output stream. If a numeric argument is supplied, the
|
1103 |
|
|
output is formatted in such a way that it can be made part of an
|
1104 |
|
|
INPUTRC file. This command is unbound by default.
|
1105 |
|
|
|
1106 |
|
|
`dump-macros ()'
|
1107 |
|
|
Print all of the Readline key sequences bound to macros and the
|
1108 |
|
|
strings they output. If a numeric argument is supplied, the
|
1109 |
|
|
output is formatted in such a way that it can be made part of an
|
1110 |
|
|
INPUTRC file. This command is unbound by default.
|
1111 |
|
|
|
1112 |
|
|
`emacs-editing-mode (C-e)'
|
1113 |
|
|
When in `vi' command mode, this causes a switch to `emacs' editing
|
1114 |
|
|
mode.
|
1115 |
|
|
|
1116 |
|
|
`vi-editing-mode (M-C-j)'
|
1117 |
|
|
When in `emacs' editing mode, this causes a switch to `vi' editing
|
1118 |
|
|
mode.
|
1119 |
|
|
|
1120 |
|
|
|
1121 |
|
|
|
1122 |
|
|
File: gdb.info, Node: Readline vi Mode, Prev: Bindable Readline Commands, Up: Command Line Editing
|
1123 |
|
|
|
1124 |
|
|
31.5 Readline vi Mode
|
1125 |
|
|
=====================
|
1126 |
|
|
|
1127 |
|
|
While the Readline library does not have a full set of `vi' editing
|
1128 |
|
|
functions, it does contain enough to allow simple editing of the line.
|
1129 |
|
|
The Readline `vi' mode behaves as specified in the POSIX 1003.2
|
1130 |
|
|
standard.
|
1131 |
|
|
|
1132 |
|
|
In order to switch interactively between `emacs' and `vi' editing
|
1133 |
|
|
modes, use the command `M-C-j' (bound to emacs-editing-mode when in
|
1134 |
|
|
`vi' mode and to vi-editing-mode in `emacs' mode). The Readline
|
1135 |
|
|
default is `emacs' mode.
|
1136 |
|
|
|
1137 |
|
|
When you enter a line in `vi' mode, you are already placed in
|
1138 |
|
|
`insertion' mode, as if you had typed an `i'. Pressing switches
|
1139 |
|
|
you into `command' mode, where you can edit the text of the line with
|
1140 |
|
|
the standard `vi' movement keys, move to previous history lines with
|
1141 |
|
|
`k' and subsequent lines with `j', and so forth.
|
1142 |
|
|
|
1143 |
|
|
|
1144 |
|
|
File: gdb.info, Node: Using History Interactively, Next: Formatting Documentation, Prev: Command Line Editing, Up: Top
|
1145 |
|
|
|
1146 |
|
|
32 Using History Interactively
|
1147 |
|
|
******************************
|
1148 |
|
|
|
1149 |
|
|
This chapter describes how to use the GNU History Library interactively,
|
1150 |
|
|
from a user's standpoint. It should be considered a user's guide. For
|
1151 |
|
|
information on using the GNU History Library in other programs, see the
|
1152 |
|
|
GNU Readline Library Manual.
|
1153 |
|
|
|
1154 |
|
|
* Menu:
|
1155 |
|
|
|
1156 |
|
|
* History Interaction:: What it feels like using History as a user.
|
1157 |
|
|
|
1158 |
|
|
|
1159 |
|
|
File: gdb.info, Node: History Interaction, Up: Using History Interactively
|
1160 |
|
|
|
1161 |
|
|
32.1 History Expansion
|
1162 |
|
|
======================
|
1163 |
|
|
|
1164 |
|
|
The History library provides a history expansion feature that is similar
|
1165 |
|
|
to the history expansion provided by `csh'. This section describes the
|
1166 |
|
|
syntax used to manipulate the history information.
|
1167 |
|
|
|
1168 |
|
|
History expansions introduce words from the history list into the
|
1169 |
|
|
input stream, making it easy to repeat commands, insert the arguments
|
1170 |
|
|
to a previous command into the current input line, or fix errors in
|
1171 |
|
|
previous commands quickly.
|
1172 |
|
|
|
1173 |
|
|
History expansion takes place in two parts. The first is to
|
1174 |
|
|
determine which line from the history list should be used during
|
1175 |
|
|
substitution. The second is to select portions of that line for
|
1176 |
|
|
inclusion into the current one. The line selected from the history is
|
1177 |
|
|
called the "event", and the portions of that line that are acted upon
|
1178 |
|
|
are called "words". Various "modifiers" are available to manipulate
|
1179 |
|
|
the selected words. The line is broken into words in the same fashion
|
1180 |
|
|
that Bash does, so that several words surrounded by quotes are
|
1181 |
|
|
considered one word. History expansions are introduced by the
|
1182 |
|
|
appearance of the history expansion character, which is `!' by default.
|
1183 |
|
|
|
1184 |
|
|
* Menu:
|
1185 |
|
|
|
1186 |
|
|
* Event Designators:: How to specify which history line to use.
|
1187 |
|
|
* Word Designators:: Specifying which words are of interest.
|
1188 |
|
|
* Modifiers:: Modifying the results of substitution.
|
1189 |
|
|
|
1190 |
|
|
|
1191 |
|
|
File: gdb.info, Node: Event Designators, Next: Word Designators, Up: History Interaction
|
1192 |
|
|
|
1193 |
|
|
32.1.1 Event Designators
|
1194 |
|
|
------------------------
|
1195 |
|
|
|
1196 |
|
|
An event designator is a reference to a command line entry in the
|
1197 |
|
|
history list.
|
1198 |
|
|
|
1199 |
|
|
`!'
|
1200 |
|
|
Start a history substitution, except when followed by a space, tab,
|
1201 |
|
|
the end of the line, or `='.
|
1202 |
|
|
|
1203 |
|
|
`!N'
|
1204 |
|
|
Refer to command line N.
|
1205 |
|
|
|
1206 |
|
|
`!-N'
|
1207 |
|
|
Refer to the command N lines back.
|
1208 |
|
|
|
1209 |
|
|
`!!'
|
1210 |
|
|
Refer to the previous command. This is a synonym for `!-1'.
|
1211 |
|
|
|
1212 |
|
|
`!STRING'
|
1213 |
|
|
Refer to the most recent command starting with STRING.
|
1214 |
|
|
|
1215 |
|
|
`!?STRING[?]'
|
1216 |
|
|
Refer to the most recent command containing STRING. The trailing
|
1217 |
|
|
`?' may be omitted if the STRING is followed immediately by a
|
1218 |
|
|
newline.
|
1219 |
|
|
|
1220 |
|
|
`^STRING1^STRING2^'
|
1221 |
|
|
Quick Substitution. Repeat the last command, replacing STRING1
|
1222 |
|
|
with STRING2. Equivalent to `!!:s/STRING1/STRING2/'.
|
1223 |
|
|
|
1224 |
|
|
`!#'
|
1225 |
|
|
The entire command line typed so far.
|
1226 |
|
|
|
1227 |
|
|
|
1228 |
|
|
|
1229 |
|
|
File: gdb.info, Node: Word Designators, Next: Modifiers, Prev: Event Designators, Up: History Interaction
|
1230 |
|
|
|
1231 |
|
|
32.1.2 Word Designators
|
1232 |
|
|
-----------------------
|
1233 |
|
|
|
1234 |
|
|
Word designators are used to select desired words from the event. A
|
1235 |
|
|
`:' separates the event specification from the word designator. It may
|
1236 |
|
|
be omitted if the word designator begins with a `^', `$', `*', `-', or
|
1237 |
|
|
`%'. Words are numbered from the beginning of the line, with the first
|
1238 |
|
|
word being denoted by 0 (zero). Words are inserted into the current
|
1239 |
|
|
line separated by single spaces.
|
1240 |
|
|
|
1241 |
|
|
For example,
|
1242 |
|
|
|
1243 |
|
|
`!!'
|
1244 |
|
|
designates the preceding command. When you type this, the
|
1245 |
|
|
preceding command is repeated in toto.
|
1246 |
|
|
|
1247 |
|
|
`!!:$'
|
1248 |
|
|
designates the last argument of the preceding command. This may be
|
1249 |
|
|
shortened to `!$'.
|
1250 |
|
|
|
1251 |
|
|
`!fi:2'
|
1252 |
|
|
designates the second argument of the most recent command starting
|
1253 |
|
|
with the letters `fi'.
|
1254 |
|
|
|
1255 |
|
|
Here are the word designators:
|
1256 |
|
|
|
1257 |
|
|
`0 (zero)'
|
1258 |
|
|
The `0'th word. For many applications, this is the command word.
|
1259 |
|
|
|
1260 |
|
|
`N'
|
1261 |
|
|
The Nth word.
|
1262 |
|
|
|
1263 |
|
|
`^'
|
1264 |
|
|
The first argument; that is, word 1.
|
1265 |
|
|
|
1266 |
|
|
`$'
|
1267 |
|
|
The last argument.
|
1268 |
|
|
|
1269 |
|
|
`%'
|
1270 |
|
|
The word matched by the most recent `?STRING?' search.
|
1271 |
|
|
|
1272 |
|
|
`X-Y'
|
1273 |
|
|
A range of words; `-Y' abbreviates `0-Y'.
|
1274 |
|
|
|
1275 |
|
|
`*'
|
1276 |
|
|
All of the words, except the `0'th. This is a synonym for `1-$'.
|
1277 |
|
|
It is not an error to use `*' if there is just one word in the
|
1278 |
|
|
event; the empty string is returned in that case.
|
1279 |
|
|
|
1280 |
|
|
`X*'
|
1281 |
|
|
Abbreviates `X-$'
|
1282 |
|
|
|
1283 |
|
|
`X-'
|
1284 |
|
|
Abbreviates `X-$' like `X*', but omits the last word.
|
1285 |
|
|
|
1286 |
|
|
|
1287 |
|
|
If a word designator is supplied without an event specification, the
|
1288 |
|
|
previous command is used as the event.
|
1289 |
|
|
|
1290 |
|
|
|
1291 |
|
|
File: gdb.info, Node: Modifiers, Prev: Word Designators, Up: History Interaction
|
1292 |
|
|
|
1293 |
|
|
32.1.3 Modifiers
|
1294 |
|
|
----------------
|
1295 |
|
|
|
1296 |
|
|
After the optional word designator, you can add a sequence of one or
|
1297 |
|
|
more of the following modifiers, each preceded by a `:'.
|
1298 |
|
|
|
1299 |
|
|
`h'
|
1300 |
|
|
Remove a trailing pathname component, leaving only the head.
|
1301 |
|
|
|
1302 |
|
|
`t'
|
1303 |
|
|
Remove all leading pathname components, leaving the tail.
|
1304 |
|
|
|
1305 |
|
|
`r'
|
1306 |
|
|
Remove a trailing suffix of the form `.SUFFIX', leaving the
|
1307 |
|
|
basename.
|
1308 |
|
|
|
1309 |
|
|
`e'
|
1310 |
|
|
Remove all but the trailing suffix.
|
1311 |
|
|
|
1312 |
|
|
`p'
|
1313 |
|
|
Print the new command but do not execute it.
|
1314 |
|
|
|
1315 |
|
|
`s/OLD/NEW/'
|
1316 |
|
|
Substitute NEW for the first occurrence of OLD in the event line.
|
1317 |
|
|
Any delimiter may be used in place of `/'. The delimiter may be
|
1318 |
|
|
quoted in OLD and NEW with a single backslash. If `&' appears in
|
1319 |
|
|
NEW, it is replaced by OLD. A single backslash will quote the
|
1320 |
|
|
`&'. The final delimiter is optional if it is the last character
|
1321 |
|
|
on the input line.
|
1322 |
|
|
|
1323 |
|
|
`&'
|
1324 |
|
|
Repeat the previous substitution.
|
1325 |
|
|
|
1326 |
|
|
`g'
|
1327 |
|
|
`a'
|
1328 |
|
|
Cause changes to be applied over the entire event line. Used in
|
1329 |
|
|
conjunction with `s', as in `gs/OLD/NEW/', or with `&'.
|
1330 |
|
|
|
1331 |
|
|
`G'
|
1332 |
|
|
Apply the following `s' modifier once to each word in the event.
|
1333 |
|
|
|
1334 |
|
|
|
1335 |
|
|
|
1336 |
|
|
File: gdb.info, Node: Formatting Documentation, Next: Installing GDB, Prev: Using History Interactively, Up: Top
|
1337 |
|
|
|
1338 |
|
|
Appendix A Formatting Documentation
|
1339 |
|
|
***********************************
|
1340 |
|
|
|
1341 |
|
|
The GDB 4 release includes an already-formatted reference card, ready
|
1342 |
|
|
for printing with PostScript or Ghostscript, in the `gdb' subdirectory
|
1343 |
|
|
of the main source directory(1). If you can use PostScript or
|
1344 |
|
|
Ghostscript with your printer, you can print the reference card
|
1345 |
|
|
immediately with `refcard.ps'.
|
1346 |
|
|
|
1347 |
|
|
The release also includes the source for the reference card. You
|
1348 |
|
|
can format it, using TeX, by typing:
|
1349 |
|
|
|
1350 |
|
|
make refcard.dvi
|
1351 |
|
|
|
1352 |
|
|
The GDB reference card is designed to print in "landscape" mode on
|
1353 |
|
|
US "letter" size paper; that is, on a sheet 11 inches wide by 8.5 inches
|
1354 |
|
|
high. You will need to specify this form of printing as an option to
|
1355 |
|
|
your DVI output program.
|
1356 |
|
|
|
1357 |
|
|
All the documentation for GDB comes as part of the machine-readable
|
1358 |
|
|
distribution. The documentation is written in Texinfo format, which is
|
1359 |
|
|
a documentation system that uses a single source file to produce both
|
1360 |
|
|
on-line information and a printed manual. You can use one of the Info
|
1361 |
|
|
formatting commands to create the on-line version of the documentation
|
1362 |
|
|
and TeX (or `texi2roff') to typeset the printed version.
|
1363 |
|
|
|
1364 |
|
|
GDB includes an already formatted copy of the on-line Info version
|
1365 |
|
|
of this manual in the `gdb' subdirectory. The main Info file is
|
1366 |
|
|
`gdb-7.1/gdb/gdb.info', and it refers to subordinate files matching
|
1367 |
|
|
`gdb.info*' in the same directory. If necessary, you can print out
|
1368 |
|
|
these files, or read them with any editor; but they are easier to read
|
1369 |
|
|
using the `info' subsystem in GNU Emacs or the standalone `info'
|
1370 |
|
|
program, available as part of the GNU Texinfo distribution.
|
1371 |
|
|
|
1372 |
|
|
If you want to format these Info files yourself, you need one of the
|
1373 |
|
|
Info formatting programs, such as `texinfo-format-buffer' or `makeinfo'.
|
1374 |
|
|
|
1375 |
|
|
If you have `makeinfo' installed, and are in the top level GDB
|
1376 |
|
|
source directory (`gdb-7.1', in the case of version 7.1), you can make
|
1377 |
|
|
the Info file by typing:
|
1378 |
|
|
|
1379 |
|
|
cd gdb
|
1380 |
|
|
make gdb.info
|
1381 |
|
|
|
1382 |
|
|
If you want to typeset and print copies of this manual, you need TeX,
|
1383 |
|
|
a program to print its DVI output files, and `texinfo.tex', the Texinfo
|
1384 |
|
|
definitions file.
|
1385 |
|
|
|
1386 |
|
|
TeX is a typesetting program; it does not print files directly, but
|
1387 |
|
|
produces output files called DVI files. To print a typeset document,
|
1388 |
|
|
you need a program to print DVI files. If your system has TeX
|
1389 |
|
|
installed, chances are it has such a program. The precise command to
|
1390 |
|
|
use depends on your system; `lpr -d' is common; another (for PostScript
|
1391 |
|
|
devices) is `dvips'. The DVI print command may require a file name
|
1392 |
|
|
without any extension or a `.dvi' extension.
|
1393 |
|
|
|
1394 |
|
|
TeX also requires a macro definitions file called `texinfo.tex'.
|
1395 |
|
|
This file tells TeX how to typeset a document written in Texinfo
|
1396 |
|
|
format. On its own, TeX cannot either read or typeset a Texinfo file.
|
1397 |
|
|
`texinfo.tex' is distributed with GDB and is located in the
|
1398 |
|
|
`gdb-VERSION-NUMBER/texinfo' directory.
|
1399 |
|
|
|
1400 |
|
|
If you have TeX and a DVI printer program installed, you can typeset
|
1401 |
|
|
and print this manual. First switch to the `gdb' subdirectory of the
|
1402 |
|
|
main source directory (for example, to `gdb-7.1/gdb') and type:
|
1403 |
|
|
|
1404 |
|
|
make gdb.dvi
|
1405 |
|
|
|
1406 |
|
|
Then give `gdb.dvi' to your DVI printing program.
|
1407 |
|
|
|
1408 |
|
|
---------- Footnotes ----------
|
1409 |
|
|
|
1410 |
|
|
(1) In `gdb-7.1/gdb/refcard.ps' of the version 7.1 release.
|
1411 |
|
|
|
1412 |
|
|
|
1413 |
|
|
File: gdb.info, Node: Installing GDB, Next: Maintenance Commands, Prev: Formatting Documentation, Up: Top
|
1414 |
|
|
|
1415 |
|
|
Appendix B Installing GDB
|
1416 |
|
|
*************************
|
1417 |
|
|
|
1418 |
|
|
* Menu:
|
1419 |
|
|
|
1420 |
|
|
* Requirements:: Requirements for building GDB
|
1421 |
|
|
* Running Configure:: Invoking the GDB `configure' script
|
1422 |
|
|
* Separate Objdir:: Compiling GDB in another directory
|
1423 |
|
|
* Config Names:: Specifying names for hosts and targets
|
1424 |
|
|
* Configure Options:: Summary of options for configure
|
1425 |
|
|
* System-wide configuration:: Having a system-wide init file
|
1426 |
|
|
|
1427 |
|
|
|
1428 |
|
|
File: gdb.info, Node: Requirements, Next: Running Configure, Up: Installing GDB
|
1429 |
|
|
|
1430 |
|
|
B.1 Requirements for Building GDB
|
1431 |
|
|
=================================
|
1432 |
|
|
|
1433 |
|
|
Building GDB requires various tools and packages to be available.
|
1434 |
|
|
Other packages will be used only if they are found.
|
1435 |
|
|
|
1436 |
|
|
Tools/Packages Necessary for Building GDB
|
1437 |
|
|
=========================================
|
1438 |
|
|
|
1439 |
|
|
ISO C90 compiler
|
1440 |
|
|
GDB is written in ISO C90. It should be buildable with any
|
1441 |
|
|
working C90 compiler, e.g. GCC.
|
1442 |
|
|
|
1443 |
|
|
|
1444 |
|
|
Tools/Packages Optional for Building GDB
|
1445 |
|
|
========================================
|
1446 |
|
|
|
1447 |
|
|
Expat
|
1448 |
|
|
GDB can use the Expat XML parsing library. This library may be
|
1449 |
|
|
included with your operating system distribution; if it is not, you
|
1450 |
|
|
can get the latest version from `http://expat.sourceforge.net'.
|
1451 |
|
|
The `configure' script will search for this library in several
|
1452 |
|
|
standard locations; if it is installed in an unusual path, you can
|
1453 |
|
|
use the `--with-libexpat-prefix' option to specify its location.
|
1454 |
|
|
|
1455 |
|
|
Expat is used for:
|
1456 |
|
|
|
1457 |
|
|
* Remote protocol memory maps (*note Memory Map Format::)
|
1458 |
|
|
|
1459 |
|
|
* Target descriptions (*note Target Descriptions::)
|
1460 |
|
|
|
1461 |
|
|
* Remote shared library lists (*note Library List Format::)
|
1462 |
|
|
|
1463 |
|
|
* MS-Windows shared libraries (*note Shared Libraries::)
|
1464 |
|
|
|
1465 |
|
|
zlib
|
1466 |
|
|
GDB will use the `zlib' library, if available, to read compressed
|
1467 |
|
|
debug sections. Some linkers, such as GNU gold, are capable of
|
1468 |
|
|
producing binaries with compressed debug sections. If GDB is
|
1469 |
|
|
compiled with `zlib', it will be able to read the debug
|
1470 |
|
|
information in such binaries.
|
1471 |
|
|
|
1472 |
|
|
The `zlib' library is likely included with your operating system
|
1473 |
|
|
distribution; if it is not, you can get the latest version from
|
1474 |
|
|
`http://zlib.net'.
|
1475 |
|
|
|
1476 |
|
|
iconv
|
1477 |
|
|
GDB's features related to character sets (*note Character Sets::)
|
1478 |
|
|
require a functioning `iconv' implementation. If you are on a GNU
|
1479 |
|
|
system, then this is provided by the GNU C Library. Some other
|
1480 |
|
|
systems also provide a working `iconv'.
|
1481 |
|
|
|
1482 |
|
|
On systems with `iconv', you can install GNU Libiconv. If you
|
1483 |
|
|
have previously installed Libiconv, you can use the
|
1484 |
|
|
`--with-libiconv-prefix' option to configure.
|
1485 |
|
|
|
1486 |
|
|
GDB's top-level `configure' and `Makefile' will arrange to build
|
1487 |
|
|
Libiconv if a directory named `libiconv' appears in the top-most
|
1488 |
|
|
source directory. If Libiconv is built this way, and if the
|
1489 |
|
|
operating system does not provide a suitable `iconv'
|
1490 |
|
|
implementation, then the just-built library will automatically be
|
1491 |
|
|
used by GDB. One easy way to set this up is to download GNU
|
1492 |
|
|
Libiconv, unpack it, and then rename the directory holding the
|
1493 |
|
|
Libiconv source code to `libiconv'.
|
1494 |
|
|
|
1495 |
|
|
|
1496 |
|
|
File: gdb.info, Node: Running Configure, Next: Separate Objdir, Prev: Requirements, Up: Installing GDB
|
1497 |
|
|
|
1498 |
|
|
B.2 Invoking the GDB `configure' Script
|
1499 |
|
|
=======================================
|
1500 |
|
|
|
1501 |
|
|
GDB comes with a `configure' script that automates the process of
|
1502 |
|
|
preparing GDB for installation; you can then use `make' to build the
|
1503 |
|
|
`gdb' program.
|
1504 |
|
|
|
1505 |
|
|
The GDB distribution includes all the source code you need for GDB
|
1506 |
|
|
in a single directory, whose name is usually composed by appending the
|
1507 |
|
|
version number to `gdb'.
|
1508 |
|
|
|
1509 |
|
|
For example, the GDB version 7.1 distribution is in the `gdb-7.1'
|
1510 |
|
|
directory. That directory contains:
|
1511 |
|
|
|
1512 |
|
|
`gdb-7.1/configure (and supporting files)'
|
1513 |
|
|
script for configuring GDB and all its supporting libraries
|
1514 |
|
|
|
1515 |
|
|
`gdb-7.1/gdb'
|
1516 |
|
|
the source specific to GDB itself
|
1517 |
|
|
|
1518 |
|
|
`gdb-7.1/bfd'
|
1519 |
|
|
source for the Binary File Descriptor library
|
1520 |
|
|
|
1521 |
|
|
`gdb-7.1/include'
|
1522 |
|
|
GNU include files
|
1523 |
|
|
|
1524 |
|
|
`gdb-7.1/libiberty'
|
1525 |
|
|
source for the `-liberty' free software library
|
1526 |
|
|
|
1527 |
|
|
`gdb-7.1/opcodes'
|
1528 |
|
|
source for the library of opcode tables and disassemblers
|
1529 |
|
|
|
1530 |
|
|
`gdb-7.1/readline'
|
1531 |
|
|
source for the GNU command-line interface
|
1532 |
|
|
|
1533 |
|
|
`gdb-7.1/glob'
|
1534 |
|
|
source for the GNU filename pattern-matching subroutine
|
1535 |
|
|
|
1536 |
|
|
`gdb-7.1/mmalloc'
|
1537 |
|
|
source for the GNU memory-mapped malloc package
|
1538 |
|
|
|
1539 |
|
|
The simplest way to configure and build GDB is to run `configure'
|
1540 |
|
|
from the `gdb-VERSION-NUMBER' source directory, which in this example
|
1541 |
|
|
is the `gdb-7.1' directory.
|
1542 |
|
|
|
1543 |
|
|
First switch to the `gdb-VERSION-NUMBER' source directory if you are
|
1544 |
|
|
not already in it; then run `configure'. Pass the identifier for the
|
1545 |
|
|
platform on which GDB will run as an argument.
|
1546 |
|
|
|
1547 |
|
|
For example:
|
1548 |
|
|
|
1549 |
|
|
cd gdb-7.1
|
1550 |
|
|
./configure HOST
|
1551 |
|
|
make
|
1552 |
|
|
|
1553 |
|
|
where HOST is an identifier such as `sun4' or `decstation', that
|
1554 |
|
|
identifies the platform where GDB will run. (You can often leave off
|
1555 |
|
|
HOST; `configure' tries to guess the correct value by examining your
|
1556 |
|
|
system.)
|
1557 |
|
|
|
1558 |
|
|
Running `configure HOST' and then running `make' builds the `bfd',
|
1559 |
|
|
`readline', `mmalloc', and `libiberty' libraries, then `gdb' itself.
|
1560 |
|
|
The configured source files, and the binaries, are left in the
|
1561 |
|
|
corresponding source directories.
|
1562 |
|
|
|
1563 |
|
|
`configure' is a Bourne-shell (`/bin/sh') script; if your system
|
1564 |
|
|
does not recognize this automatically when you run a different shell,
|
1565 |
|
|
you may need to run `sh' on it explicitly:
|
1566 |
|
|
|
1567 |
|
|
sh configure HOST
|
1568 |
|
|
|
1569 |
|
|
If you run `configure' from a directory that contains source
|
1570 |
|
|
directories for multiple libraries or programs, such as the `gdb-7.1'
|
1571 |
|
|
source directory for version 7.1, `configure' creates configuration
|
1572 |
|
|
files for every directory level underneath (unless you tell it not to,
|
1573 |
|
|
with the `--norecursion' option).
|
1574 |
|
|
|
1575 |
|
|
You should run the `configure' script from the top directory in the
|
1576 |
|
|
source tree, the `gdb-VERSION-NUMBER' directory. If you run
|
1577 |
|
|
`configure' from one of the subdirectories, you will configure only
|
1578 |
|
|
that subdirectory. That is usually not what you want. In particular,
|
1579 |
|
|
if you run the first `configure' from the `gdb' subdirectory of the
|
1580 |
|
|
`gdb-VERSION-NUMBER' directory, you will omit the configuration of
|
1581 |
|
|
`bfd', `readline', and other sibling directories of the `gdb'
|
1582 |
|
|
subdirectory. This leads to build errors about missing include files
|
1583 |
|
|
such as `bfd/bfd.h'.
|
1584 |
|
|
|
1585 |
|
|
You can install `gdb' anywhere; it has no hardwired paths. However,
|
1586 |
|
|
you should make sure that the shell on your path (named by the `SHELL'
|
1587 |
|
|
environment variable) is publicly readable. Remember that GDB uses the
|
1588 |
|
|
shell to start your program--some systems refuse to let GDB debug child
|
1589 |
|
|
processes whose programs are not readable.
|
1590 |
|
|
|
1591 |
|
|
|
1592 |
|
|
File: gdb.info, Node: Separate Objdir, Next: Config Names, Prev: Running Configure, Up: Installing GDB
|
1593 |
|
|
|
1594 |
|
|
B.3 Compiling GDB in Another Directory
|
1595 |
|
|
======================================
|
1596 |
|
|
|
1597 |
|
|
If you want to run GDB versions for several host or target machines,
|
1598 |
|
|
you need a different `gdb' compiled for each combination of host and
|
1599 |
|
|
target. `configure' is designed to make this easy by allowing you to
|
1600 |
|
|
generate each configuration in a separate subdirectory, rather than in
|
1601 |
|
|
the source directory. If your `make' program handles the `VPATH'
|
1602 |
|
|
feature (GNU `make' does), running `make' in each of these directories
|
1603 |
|
|
builds the `gdb' program specified there.
|
1604 |
|
|
|
1605 |
|
|
To build `gdb' in a separate directory, run `configure' with the
|
1606 |
|
|
`--srcdir' option to specify where to find the source. (You also need
|
1607 |
|
|
to specify a path to find `configure' itself from your working
|
1608 |
|
|
directory. If the path to `configure' would be the same as the
|
1609 |
|
|
argument to `--srcdir', you can leave out the `--srcdir' option; it is
|
1610 |
|
|
assumed.)
|
1611 |
|
|
|
1612 |
|
|
For example, with version 7.1, you can build GDB in a separate
|
1613 |
|
|
directory for a Sun 4 like this:
|
1614 |
|
|
|
1615 |
|
|
cd gdb-7.1
|
1616 |
|
|
mkdir ../gdb-sun4
|
1617 |
|
|
cd ../gdb-sun4
|
1618 |
|
|
../gdb-7.1/configure sun4
|
1619 |
|
|
make
|
1620 |
|
|
|
1621 |
|
|
When `configure' builds a configuration using a remote source
|
1622 |
|
|
directory, it creates a tree for the binaries with the same structure
|
1623 |
|
|
(and using the same names) as the tree under the source directory. In
|
1624 |
|
|
the example, you'd find the Sun 4 library `libiberty.a' in the
|
1625 |
|
|
directory `gdb-sun4/libiberty', and GDB itself in `gdb-sun4/gdb'.
|
1626 |
|
|
|
1627 |
|
|
Make sure that your path to the `configure' script has just one
|
1628 |
|
|
instance of `gdb' in it. If your path to `configure' looks like
|
1629 |
|
|
`../gdb-7.1/gdb/configure', you are configuring only one subdirectory
|
1630 |
|
|
of GDB, not the whole package. This leads to build errors about
|
1631 |
|
|
missing include files such as `bfd/bfd.h'.
|
1632 |
|
|
|
1633 |
|
|
One popular reason to build several GDB configurations in separate
|
1634 |
|
|
directories is to configure GDB for cross-compiling (where GDB runs on
|
1635 |
|
|
one machine--the "host"--while debugging programs that run on another
|
1636 |
|
|
machine--the "target"). You specify a cross-debugging target by giving
|
1637 |
|
|
the `--target=TARGET' option to `configure'.
|
1638 |
|
|
|
1639 |
|
|
When you run `make' to build a program or library, you must run it
|
1640 |
|
|
in a configured directory--whatever directory you were in when you
|
1641 |
|
|
called `configure' (or one of its subdirectories).
|
1642 |
|
|
|
1643 |
|
|
The `Makefile' that `configure' generates in each source directory
|
1644 |
|
|
also runs recursively. If you type `make' in a source directory such
|
1645 |
|
|
as `gdb-7.1' (or in a separate configured directory configured with
|
1646 |
|
|
`--srcdir=DIRNAME/gdb-7.1'), you will build all the required libraries,
|
1647 |
|
|
and then build GDB.
|
1648 |
|
|
|
1649 |
|
|
When you have multiple hosts or targets configured in separate
|
1650 |
|
|
directories, you can run `make' on them in parallel (for example, if
|
1651 |
|
|
they are NFS-mounted on each of the hosts); they will not interfere
|
1652 |
|
|
with each other.
|
1653 |
|
|
|
1654 |
|
|
|
1655 |
|
|
File: gdb.info, Node: Config Names, Next: Configure Options, Prev: Separate Objdir, Up: Installing GDB
|
1656 |
|
|
|
1657 |
|
|
B.4 Specifying Names for Hosts and Targets
|
1658 |
|
|
==========================================
|
1659 |
|
|
|
1660 |
|
|
The specifications used for hosts and targets in the `configure' script
|
1661 |
|
|
are based on a three-part naming scheme, but some short predefined
|
1662 |
|
|
aliases are also supported. The full naming scheme encodes three pieces
|
1663 |
|
|
of information in the following pattern:
|
1664 |
|
|
|
1665 |
|
|
ARCHITECTURE-VENDOR-OS
|
1666 |
|
|
|
1667 |
|
|
For example, you can use the alias `sun4' as a HOST argument, or as
|
1668 |
|
|
the value for TARGET in a `--target=TARGET' option. The equivalent
|
1669 |
|
|
full name is `sparc-sun-sunos4'.
|
1670 |
|
|
|
1671 |
|
|
The `configure' script accompanying GDB does not provide any query
|
1672 |
|
|
facility to list all supported host and target names or aliases.
|
1673 |
|
|
`configure' calls the Bourne shell script `config.sub' to map
|
1674 |
|
|
abbreviations to full names; you can read the script, if you wish, or
|
1675 |
|
|
you can use it to test your guesses on abbreviations--for example:
|
1676 |
|
|
|
1677 |
|
|
% sh config.sub i386-linux
|
1678 |
|
|
i386-pc-linux-gnu
|
1679 |
|
|
% sh config.sub alpha-linux
|
1680 |
|
|
alpha-unknown-linux-gnu
|
1681 |
|
|
% sh config.sub hp9k700
|
1682 |
|
|
hppa1.1-hp-hpux
|
1683 |
|
|
% sh config.sub sun4
|
1684 |
|
|
sparc-sun-sunos4.1.1
|
1685 |
|
|
% sh config.sub sun3
|
1686 |
|
|
m68k-sun-sunos4.1.1
|
1687 |
|
|
% sh config.sub i986v
|
1688 |
|
|
Invalid configuration `i986v': machine `i986v' not recognized
|
1689 |
|
|
|
1690 |
|
|
`config.sub' is also distributed in the GDB source directory
|
1691 |
|
|
(`gdb-7.1', for version 7.1).
|
1692 |
|
|
|
1693 |
|
|
|
1694 |
|
|
File: gdb.info, Node: Configure Options, Next: System-wide configuration, Prev: Config Names, Up: Installing GDB
|
1695 |
|
|
|
1696 |
|
|
B.5 `configure' Options
|
1697 |
|
|
=======================
|
1698 |
|
|
|
1699 |
|
|
Here is a summary of the `configure' options and arguments that are
|
1700 |
|
|
most often useful for building GDB. `configure' also has several other
|
1701 |
|
|
options not listed here. *note (configure.info)What Configure Does::,
|
1702 |
|
|
for a full explanation of `configure'.
|
1703 |
|
|
|
1704 |
|
|
configure [--help]
|
1705 |
|
|
[--prefix=DIR]
|
1706 |
|
|
[--exec-prefix=DIR]
|
1707 |
|
|
[--srcdir=DIRNAME]
|
1708 |
|
|
[--norecursion] [--rm]
|
1709 |
|
|
[--target=TARGET]
|
1710 |
|
|
HOST
|
1711 |
|
|
|
1712 |
|
|
You may introduce options with a single `-' rather than `--' if you
|
1713 |
|
|
prefer; but you may abbreviate option names if you use `--'.
|
1714 |
|
|
|
1715 |
|
|
`--help'
|
1716 |
|
|
Display a quick summary of how to invoke `configure'.
|
1717 |
|
|
|
1718 |
|
|
`--prefix=DIR'
|
1719 |
|
|
Configure the source to install programs and files under directory
|
1720 |
|
|
`DIR'.
|
1721 |
|
|
|
1722 |
|
|
`--exec-prefix=DIR'
|
1723 |
|
|
Configure the source to install programs under directory `DIR'.
|
1724 |
|
|
|
1725 |
|
|
`--srcdir=DIRNAME'
|
1726 |
|
|
*Warning: using this option requires GNU `make', or another `make'
|
1727 |
|
|
that implements the `VPATH' feature.*
|
1728 |
|
|
Use this option to make configurations in directories separate
|
1729 |
|
|
from the GDB source directories. Among other things, you can use
|
1730 |
|
|
this to build (or maintain) several configurations simultaneously,
|
1731 |
|
|
in separate directories. `configure' writes
|
1732 |
|
|
configuration-specific files in the current directory, but
|
1733 |
|
|
arranges for them to use the source in the directory DIRNAME.
|
1734 |
|
|
`configure' creates directories under the working directory in
|
1735 |
|
|
parallel to the source directories below DIRNAME.
|
1736 |
|
|
|
1737 |
|
|
`--norecursion'
|
1738 |
|
|
Configure only the directory level where `configure' is executed;
|
1739 |
|
|
do not propagate configuration to subdirectories.
|
1740 |
|
|
|
1741 |
|
|
`--target=TARGET'
|
1742 |
|
|
Configure GDB for cross-debugging programs running on the specified
|
1743 |
|
|
TARGET. Without this option, GDB is configured to debug programs
|
1744 |
|
|
that run on the same machine (HOST) as GDB itself.
|
1745 |
|
|
|
1746 |
|
|
There is no convenient way to generate a list of all available
|
1747 |
|
|
targets.
|
1748 |
|
|
|
1749 |
|
|
`HOST ...'
|
1750 |
|
|
Configure GDB to run on the specified HOST.
|
1751 |
|
|
|
1752 |
|
|
There is no convenient way to generate a list of all available
|
1753 |
|
|
hosts.
|
1754 |
|
|
|
1755 |
|
|
There are many other options available as well, but they are
|
1756 |
|
|
generally needed for special purposes only.
|
1757 |
|
|
|
1758 |
|
|
|
1759 |
|
|
File: gdb.info, Node: System-wide configuration, Prev: Configure Options, Up: Installing GDB
|
1760 |
|
|
|
1761 |
|
|
B.6 System-wide configuration and settings
|
1762 |
|
|
==========================================
|
1763 |
|
|
|
1764 |
|
|
GDB can be configured to have a system-wide init file; this file will
|
1765 |
|
|
be read and executed at startup (*note What GDB does during startup:
|
1766 |
|
|
Startup.).
|
1767 |
|
|
|
1768 |
|
|
Here is the corresponding configure option:
|
1769 |
|
|
|
1770 |
|
|
`--with-system-gdbinit=FILE'
|
1771 |
|
|
Specify that the default location of the system-wide init file is
|
1772 |
|
|
FILE.
|
1773 |
|
|
|
1774 |
|
|
If GDB has been configured with the option `--prefix=$prefix', it
|
1775 |
|
|
may be subject to relocation. Two possible cases:
|
1776 |
|
|
|
1777 |
|
|
* If the default location of this init file contains `$prefix', it
|
1778 |
|
|
will be subject to relocation. Suppose that the configure options
|
1779 |
|
|
are `--prefix=$prefix --with-system-gdbinit=$prefix/etc/gdbinit';
|
1780 |
|
|
if GDB is moved from `$prefix' to `$install', the system init file
|
1781 |
|
|
is looked for as `$install/etc/gdbinit' instead of
|
1782 |
|
|
`$prefix/etc/gdbinit'.
|
1783 |
|
|
|
1784 |
|
|
* By contrast, if the default location does not contain the prefix,
|
1785 |
|
|
it will not be relocated. E.g. if GDB has been configured with
|
1786 |
|
|
`--prefix=/usr/local --with-system-gdbinit=/usr/share/gdb/gdbinit',
|
1787 |
|
|
then GDB will always look for `/usr/share/gdb/gdbinit', wherever
|
1788 |
|
|
GDB is installed.
|
1789 |
|
|
|
1790 |
|
|
|
1791 |
|
|
File: gdb.info, Node: Maintenance Commands, Next: Remote Protocol, Prev: Installing GDB, Up: Top
|
1792 |
|
|
|
1793 |
|
|
Appendix C Maintenance Commands
|
1794 |
|
|
*******************************
|
1795 |
|
|
|
1796 |
|
|
In addition to commands intended for GDB users, GDB includes a number
|
1797 |
|
|
of commands intended for GDB developers, that are not documented
|
1798 |
|
|
elsewhere in this manual. These commands are provided here for
|
1799 |
|
|
reference. (For commands that turn on debugging messages, see *Note
|
1800 |
|
|
Debugging Output::.)
|
1801 |
|
|
|
1802 |
|
|
`maint agent EXPRESSION'
|
1803 |
|
|
`maint agent-eval EXPRESSION'
|
1804 |
|
|
Translate the given EXPRESSION into remote agent bytecodes. This
|
1805 |
|
|
command is useful for debugging the Agent Expression mechanism
|
1806 |
|
|
(*note Agent Expressions::). The `agent' version produces an
|
1807 |
|
|
expression useful for data collection, such as by tracepoints,
|
1808 |
|
|
while `maint agent-eval' produces an expression that evaluates
|
1809 |
|
|
directly to a result. For instance, a collection expression for
|
1810 |
|
|
`globa + globb' will include bytecodes to record four bytes of
|
1811 |
|
|
memory at each of the addresses of `globa' and `globb', while
|
1812 |
|
|
discarding the result of the addition, while an evaluation
|
1813 |
|
|
expression will do the addition and return the sum.
|
1814 |
|
|
|
1815 |
|
|
`maint info breakpoints'
|
1816 |
|
|
Using the same format as `info breakpoints', display both the
|
1817 |
|
|
breakpoints you've set explicitly, and those GDB is using for
|
1818 |
|
|
internal purposes. Internal breakpoints are shown with negative
|
1819 |
|
|
breakpoint numbers. The type column identifies what kind of
|
1820 |
|
|
breakpoint is shown:
|
1821 |
|
|
|
1822 |
|
|
`breakpoint'
|
1823 |
|
|
Normal, explicitly set breakpoint.
|
1824 |
|
|
|
1825 |
|
|
`watchpoint'
|
1826 |
|
|
Normal, explicitly set watchpoint.
|
1827 |
|
|
|
1828 |
|
|
`longjmp'
|
1829 |
|
|
Internal breakpoint, used to handle correctly stepping through
|
1830 |
|
|
`longjmp' calls.
|
1831 |
|
|
|
1832 |
|
|
`longjmp resume'
|
1833 |
|
|
Internal breakpoint at the target of a `longjmp'.
|
1834 |
|
|
|
1835 |
|
|
`until'
|
1836 |
|
|
Temporary internal breakpoint used by the GDB `until' command.
|
1837 |
|
|
|
1838 |
|
|
`finish'
|
1839 |
|
|
Temporary internal breakpoint used by the GDB `finish'
|
1840 |
|
|
command.
|
1841 |
|
|
|
1842 |
|
|
`shlib events'
|
1843 |
|
|
Shared library events.
|
1844 |
|
|
|
1845 |
|
|
|
1846 |
|
|
`set displaced-stepping'
|
1847 |
|
|
`show displaced-stepping'
|
1848 |
|
|
Control whether or not GDB will do "displaced stepping" if the
|
1849 |
|
|
target supports it. Displaced stepping is a way to single-step
|
1850 |
|
|
over breakpoints without removing them from the inferior, by
|
1851 |
|
|
executing an out-of-line copy of the instruction that was
|
1852 |
|
|
originally at the breakpoint location. It is also known as
|
1853 |
|
|
out-of-line single-stepping.
|
1854 |
|
|
|
1855 |
|
|
`set displaced-stepping on'
|
1856 |
|
|
If the target architecture supports it, GDB will use
|
1857 |
|
|
displaced stepping to step over breakpoints.
|
1858 |
|
|
|
1859 |
|
|
`set displaced-stepping off'
|
1860 |
|
|
GDB will not use displaced stepping to step over breakpoints,
|
1861 |
|
|
even if such is supported by the target architecture.
|
1862 |
|
|
|
1863 |
|
|
`set displaced-stepping auto'
|
1864 |
|
|
This is the default mode. GDB will use displaced stepping
|
1865 |
|
|
only if non-stop mode is active (*note Non-Stop Mode::) and
|
1866 |
|
|
the target architecture supports displaced stepping.
|
1867 |
|
|
|
1868 |
|
|
`maint check-symtabs'
|
1869 |
|
|
Check the consistency of psymtabs and symtabs.
|
1870 |
|
|
|
1871 |
|
|
`maint cplus first_component NAME'
|
1872 |
|
|
Print the first C++ class/namespace component of NAME.
|
1873 |
|
|
|
1874 |
|
|
`maint cplus namespace'
|
1875 |
|
|
Print the list of possible C++ namespaces.
|
1876 |
|
|
|
1877 |
|
|
`maint demangle NAME'
|
1878 |
|
|
Demangle a C++ or Objective-C mangled NAME.
|
1879 |
|
|
|
1880 |
|
|
`maint deprecate COMMAND [REPLACEMENT]'
|
1881 |
|
|
`maint undeprecate COMMAND'
|
1882 |
|
|
Deprecate or undeprecate the named COMMAND. Deprecated commands
|
1883 |
|
|
cause GDB to issue a warning when you use them. The optional
|
1884 |
|
|
argument REPLACEMENT says which newer command should be used in
|
1885 |
|
|
favor of the deprecated one; if it is given, GDB will mention the
|
1886 |
|
|
replacement as part of the warning.
|
1887 |
|
|
|
1888 |
|
|
`maint dump-me'
|
1889 |
|
|
Cause a fatal signal in the debugger and force it to dump its core.
|
1890 |
|
|
This is supported only on systems which support aborting a program
|
1891 |
|
|
with the `SIGQUIT' signal.
|
1892 |
|
|
|
1893 |
|
|
`maint internal-error [MESSAGE-TEXT]'
|
1894 |
|
|
`maint internal-warning [MESSAGE-TEXT]'
|
1895 |
|
|
Cause GDB to call the internal function `internal_error' or
|
1896 |
|
|
`internal_warning' and hence behave as though an internal error or
|
1897 |
|
|
internal warning has been detected. In addition to reporting the
|
1898 |
|
|
internal problem, these functions give the user the opportunity to
|
1899 |
|
|
either quit GDB or create a core file of the current GDB session.
|
1900 |
|
|
|
1901 |
|
|
These commands take an optional parameter MESSAGE-TEXT that is
|
1902 |
|
|
used as the text of the error or warning message.
|
1903 |
|
|
|
1904 |
|
|
Here's an example of using `internal-error':
|
1905 |
|
|
|
1906 |
|
|
(gdb) maint internal-error testing, 1, 2
|
1907 |
|
|
.../maint.c:121: internal-error: testing, 1, 2
|
1908 |
|
|
A problem internal to GDB has been detected. Further
|
1909 |
|
|
debugging may prove unreliable.
|
1910 |
|
|
Quit this debugging session? (y or n) n
|
1911 |
|
|
Create a core file? (y or n) n
|
1912 |
|
|
(gdb)
|
1913 |
|
|
|
1914 |
|
|
`maint set internal-error ACTION [ask|yes|no]'
|
1915 |
|
|
`maint show internal-error ACTION'
|
1916 |
|
|
`maint set internal-warning ACTION [ask|yes|no]'
|
1917 |
|
|
`maint show internal-warning ACTION'
|
1918 |
|
|
When GDB reports an internal problem (error or warning) it gives
|
1919 |
|
|
the user the opportunity to both quit GDB and create a core file
|
1920 |
|
|
of the current GDB session. These commands let you override the
|
1921 |
|
|
default behaviour for each particular ACTION, described in the
|
1922 |
|
|
table below.
|
1923 |
|
|
|
1924 |
|
|
`quit'
|
1925 |
|
|
You can specify that GDB should always (yes) or never (no)
|
1926 |
|
|
quit. The default is to ask the user what to do.
|
1927 |
|
|
|
1928 |
|
|
`corefile'
|
1929 |
|
|
You can specify that GDB should always (yes) or never (no)
|
1930 |
|
|
create a core file. The default is to ask the user what to
|
1931 |
|
|
do.
|
1932 |
|
|
|
1933 |
|
|
`maint packet TEXT'
|
1934 |
|
|
If GDB is talking to an inferior via the serial protocol, then
|
1935 |
|
|
this command sends the string TEXT to the inferior, and displays
|
1936 |
|
|
the response packet. GDB supplies the initial `$' character, the
|
1937 |
|
|
terminating `#' character, and the checksum.
|
1938 |
|
|
|
1939 |
|
|
`maint print architecture [FILE]'
|
1940 |
|
|
Print the entire architecture configuration. The optional argument
|
1941 |
|
|
FILE names the file where the output goes.
|
1942 |
|
|
|
1943 |
|
|
`maint print c-tdesc'
|
1944 |
|
|
Print the current target description (*note Target Descriptions::)
|
1945 |
|
|
as a C source file. The created source file can be used in GDB
|
1946 |
|
|
when an XML parser is not available to parse the description.
|
1947 |
|
|
|
1948 |
|
|
`maint print dummy-frames'
|
1949 |
|
|
Prints the contents of GDB's internal dummy-frame stack.
|
1950 |
|
|
|
1951 |
|
|
(gdb) b add
|
1952 |
|
|
...
|
1953 |
|
|
(gdb) print add(2,3)
|
1954 |
|
|
Breakpoint 2, add (a=2, b=3) at ...
|
1955 |
|
|
58 return (a + b);
|
1956 |
|
|
The program being debugged stopped while in a function called from GDB.
|
1957 |
|
|
...
|
1958 |
|
|
(gdb) maint print dummy-frames
|
1959 |
|
|
0x1a57c80: pc=0x01014068 fp=0x0200bddc sp=0x0200bdd6
|
1960 |
|
|
top=0x0200bdd4 id={stack=0x200bddc,code=0x101405c}
|
1961 |
|
|
call_lo=0x01014000 call_hi=0x01014001
|
1962 |
|
|
(gdb)
|
1963 |
|
|
|
1964 |
|
|
Takes an optional file parameter.
|
1965 |
|
|
|
1966 |
|
|
`maint print registers [FILE]'
|
1967 |
|
|
`maint print raw-registers [FILE]'
|
1968 |
|
|
`maint print cooked-registers [FILE]'
|
1969 |
|
|
`maint print register-groups [FILE]'
|
1970 |
|
|
Print GDB's internal register data structures.
|
1971 |
|
|
|
1972 |
|
|
The command `maint print raw-registers' includes the contents of
|
1973 |
|
|
the raw register cache; the command `maint print cooked-registers'
|
1974 |
|
|
includes the (cooked) value of all registers; and the command
|
1975 |
|
|
`maint print register-groups' includes the groups that each
|
1976 |
|
|
register is a member of. *Note Registers: (gdbint)Registers.
|
1977 |
|
|
|
1978 |
|
|
These commands take an optional parameter, a file name to which to
|
1979 |
|
|
write the information.
|
1980 |
|
|
|
1981 |
|
|
`maint print reggroups [FILE]'
|
1982 |
|
|
Print GDB's internal register group data structures. The optional
|
1983 |
|
|
argument FILE tells to what file to write the information.
|
1984 |
|
|
|
1985 |
|
|
The register groups info looks like this:
|
1986 |
|
|
|
1987 |
|
|
(gdb) maint print reggroups
|
1988 |
|
|
Group Type
|
1989 |
|
|
general user
|
1990 |
|
|
float user
|
1991 |
|
|
all user
|
1992 |
|
|
vector user
|
1993 |
|
|
system user
|
1994 |
|
|
save internal
|
1995 |
|
|
restore internal
|
1996 |
|
|
|
1997 |
|
|
`flushregs'
|
1998 |
|
|
This command forces GDB to flush its internal register cache.
|
1999 |
|
|
|
2000 |
|
|
`maint print objfiles'
|
2001 |
|
|
Print a dump of all known object files. For each object file, this
|
2002 |
|
|
command prints its name, address in memory, and all of its psymtabs
|
2003 |
|
|
and symtabs.
|
2004 |
|
|
|
2005 |
|
|
`maint print statistics'
|
2006 |
|
|
This command prints, for each object file in the program, various
|
2007 |
|
|
data about that object file followed by the byte cache ("bcache")
|
2008 |
|
|
statistics for the object file. The objfile data includes the
|
2009 |
|
|
number of minimal, partial, full, and stabs symbols, the number of
|
2010 |
|
|
types defined by the objfile, the number of as yet unexpanded psym
|
2011 |
|
|
tables, the number of line tables and string tables, and the
|
2012 |
|
|
amount of memory used by the various tables. The bcache
|
2013 |
|
|
statistics include the counts, sizes, and counts of duplicates of
|
2014 |
|
|
all and unique objects, max, average, and median entry size, total
|
2015 |
|
|
memory used and its overhead and savings, and various measures of
|
2016 |
|
|
the hash table size and chain lengths.
|
2017 |
|
|
|
2018 |
|
|
`maint print target-stack'
|
2019 |
|
|
A "target" is an interface between the debugger and a particular
|
2020 |
|
|
kind of file or process. Targets can be stacked in "strata", so
|
2021 |
|
|
that more than one target can potentially respond to a request.
|
2022 |
|
|
In particular, memory accesses will walk down the stack of targets
|
2023 |
|
|
until they find a target that is interested in handling that
|
2024 |
|
|
particular address.
|
2025 |
|
|
|
2026 |
|
|
This command prints a short description of each layer that was
|
2027 |
|
|
pushed on the "target stack", starting from the top layer down to
|
2028 |
|
|
the bottom one.
|
2029 |
|
|
|
2030 |
|
|
`maint print type EXPR'
|
2031 |
|
|
Print the type chain for a type specified by EXPR. The argument
|
2032 |
|
|
can be either a type name or a symbol. If it is a symbol, the
|
2033 |
|
|
type of that symbol is described. The type chain produced by this
|
2034 |
|
|
command is a recursive definition of the data type as stored in
|
2035 |
|
|
GDB's data structures, including its flags and contained types.
|
2036 |
|
|
|
2037 |
|
|
`maint set dwarf2 max-cache-age'
|
2038 |
|
|
`maint show dwarf2 max-cache-age'
|
2039 |
|
|
Control the DWARF 2 compilation unit cache.
|
2040 |
|
|
|
2041 |
|
|
In object files with inter-compilation-unit references, such as
|
2042 |
|
|
those produced by the GCC option `-feliminate-dwarf2-dups', the
|
2043 |
|
|
DWARF 2 reader needs to frequently refer to previously read
|
2044 |
|
|
compilation units. This setting controls how long a compilation
|
2045 |
|
|
unit will remain in the cache if it is not referenced. A higher
|
2046 |
|
|
limit means that cached compilation units will be stored in memory
|
2047 |
|
|
longer, and more total memory will be used. Setting it to zero
|
2048 |
|
|
disables caching, which will slow down GDB startup, but reduce
|
2049 |
|
|
memory consumption.
|
2050 |
|
|
|
2051 |
|
|
`maint set profile'
|
2052 |
|
|
`maint show profile'
|
2053 |
|
|
Control profiling of GDB.
|
2054 |
|
|
|
2055 |
|
|
Profiling will be disabled until you use the `maint set profile'
|
2056 |
|
|
command to enable it. When you enable profiling, the system will
|
2057 |
|
|
begin collecting timing and execution count data; when you disable
|
2058 |
|
|
profiling or exit GDB, the results will be written to a log file.
|
2059 |
|
|
Remember that if you use profiling, GDB will overwrite the
|
2060 |
|
|
profiling log file (often called `gmon.out'). If you have a
|
2061 |
|
|
record of important profiling data in a `gmon.out' file, be sure
|
2062 |
|
|
to move it to a safe location.
|
2063 |
|
|
|
2064 |
|
|
Configuring with `--enable-profiling' arranges for GDB to be
|
2065 |
|
|
compiled with the `-pg' compiler option.
|
2066 |
|
|
|
2067 |
|
|
`maint set show-debug-regs'
|
2068 |
|
|
`maint show show-debug-regs'
|
2069 |
|
|
Control whether to show variables that mirror the hardware debug
|
2070 |
|
|
registers. Use `ON' to enable, `OFF' to disable. If enabled, the
|
2071 |
|
|
debug registers values are shown when GDB inserts or removes a
|
2072 |
|
|
hardware breakpoint or watchpoint, and when the inferior triggers
|
2073 |
|
|
a hardware-assisted breakpoint or watchpoint.
|
2074 |
|
|
|
2075 |
|
|
`maint space'
|
2076 |
|
|
Control whether to display memory usage for each command. If set
|
2077 |
|
|
to a nonzero value, GDB will display how much memory each command
|
2078 |
|
|
took, following the command's own output. This can also be
|
2079 |
|
|
requested by invoking GDB with the `--statistics' command-line
|
2080 |
|
|
switch (*note Mode Options::).
|
2081 |
|
|
|
2082 |
|
|
`maint time'
|
2083 |
|
|
Control whether to display the execution time for each command. If
|
2084 |
|
|
set to a nonzero value, GDB will display how much time it took to
|
2085 |
|
|
execute each command, following the command's own output. The
|
2086 |
|
|
time is not printed for the commands that run the target, since
|
2087 |
|
|
there's no mechanism currently to compute how much time was spend
|
2088 |
|
|
by GDB and how much time was spend by the program been debugged.
|
2089 |
|
|
it's not possibly currently This can also be requested by invoking
|
2090 |
|
|
GDB with the `--statistics' command-line switch (*note Mode
|
2091 |
|
|
Options::).
|
2092 |
|
|
|
2093 |
|
|
`maint translate-address [SECTION] ADDR'
|
2094 |
|
|
Find the symbol stored at the location specified by the address
|
2095 |
|
|
ADDR and an optional section name SECTION. If found, GDB prints
|
2096 |
|
|
the name of the closest symbol and an offset from the symbol's
|
2097 |
|
|
location to the specified address. This is similar to the `info
|
2098 |
|
|
address' command (*note Symbols::), except that this command also
|
2099 |
|
|
allows to find symbols in other sections.
|
2100 |
|
|
|
2101 |
|
|
If section was not specified, the section in which the symbol was
|
2102 |
|
|
found is also printed. For dynamically linked executables, the
|
2103 |
|
|
name of executable or shared library containing the symbol is
|
2104 |
|
|
printed as well.
|
2105 |
|
|
|
2106 |
|
|
|
2107 |
|
|
The following command is useful for non-interactive invocations of
|
2108 |
|
|
GDB, such as in the test suite.
|
2109 |
|
|
|
2110 |
|
|
`set watchdog NSEC'
|
2111 |
|
|
Set the maximum number of seconds GDB will wait for the target
|
2112 |
|
|
operation to finish. If this time expires, GDB reports and error
|
2113 |
|
|
and the command is aborted.
|
2114 |
|
|
|
2115 |
|
|
`show watchdog'
|
2116 |
|
|
Show the current setting of the target wait timeout.
|
2117 |
|
|
|
2118 |
|
|
|
2119 |
|
|
File: gdb.info, Node: Remote Protocol, Next: Agent Expressions, Prev: Maintenance Commands, Up: Top
|
2120 |
|
|
|
2121 |
|
|
Appendix D GDB Remote Serial Protocol
|
2122 |
|
|
*************************************
|
2123 |
|
|
|
2124 |
|
|
* Menu:
|
2125 |
|
|
|
2126 |
|
|
* Overview::
|
2127 |
|
|
* Packets::
|
2128 |
|
|
* Stop Reply Packets::
|
2129 |
|
|
* General Query Packets::
|
2130 |
|
|
* Architecture-Specific Protocol Details::
|
2131 |
|
|
* Tracepoint Packets::
|
2132 |
|
|
* Host I/O Packets::
|
2133 |
|
|
* Interrupts::
|
2134 |
|
|
* Notification Packets::
|
2135 |
|
|
* Remote Non-Stop::
|
2136 |
|
|
* Packet Acknowledgment::
|
2137 |
|
|
* Examples::
|
2138 |
|
|
* File-I/O Remote Protocol Extension::
|
2139 |
|
|
* Library List Format::
|
2140 |
|
|
* Memory Map Format::
|
2141 |
|
|
* Thread List Format::
|
2142 |
|
|
|
2143 |
|
|
|
2144 |
|
|
File: gdb.info, Node: Overview, Next: Packets, Up: Remote Protocol
|
2145 |
|
|
|
2146 |
|
|
D.1 Overview
|
2147 |
|
|
============
|
2148 |
|
|
|
2149 |
|
|
There may be occasions when you need to know something about the
|
2150 |
|
|
protocol--for example, if there is only one serial port to your target
|
2151 |
|
|
machine, you might want your program to do something special if it
|
2152 |
|
|
recognizes a packet meant for GDB.
|
2153 |
|
|
|
2154 |
|
|
In the examples below, `->' and `<-' are used to indicate
|
2155 |
|
|
transmitted and received data, respectively.
|
2156 |
|
|
|
2157 |
|
|
All GDB commands and responses (other than acknowledgments and
|
2158 |
|
|
notifications, see *Note Notification Packets::) are sent as a PACKET.
|
2159 |
|
|
A PACKET is introduced with the character `$', the actual PACKET-DATA,
|
2160 |
|
|
and the terminating character `#' followed by a two-digit CHECKSUM:
|
2161 |
|
|
|
2162 |
|
|
`$'PACKET-DATA`#'CHECKSUM
|
2163 |
|
|
The two-digit CHECKSUM is computed as the modulo 256 sum of all
|
2164 |
|
|
characters between the leading `$' and the trailing `#' (an eight bit
|
2165 |
|
|
unsigned checksum).
|
2166 |
|
|
|
2167 |
|
|
Implementors should note that prior to GDB 5.0 the protocol
|
2168 |
|
|
specification also included an optional two-digit SEQUENCE-ID:
|
2169 |
|
|
|
2170 |
|
|
`$'SEQUENCE-ID`:'PACKET-DATA`#'CHECKSUM
|
2171 |
|
|
|
2172 |
|
|
That SEQUENCE-ID was appended to the acknowledgment. GDB has never
|
2173 |
|
|
output SEQUENCE-IDs. Stubs that handle packets added since GDB 5.0
|
2174 |
|
|
must not accept SEQUENCE-ID.
|
2175 |
|
|
|
2176 |
|
|
When either the host or the target machine receives a packet, the
|
2177 |
|
|
first response expected is an acknowledgment: either `+' (to indicate
|
2178 |
|
|
the package was received correctly) or `-' (to request retransmission):
|
2179 |
|
|
|
2180 |
|
|
-> `$'PACKET-DATA`#'CHECKSUM
|
2181 |
|
|
<- `+'
|
2182 |
|
|
The `+'/`-' acknowledgments can be disabled once a connection is
|
2183 |
|
|
established. *Note Packet Acknowledgment::, for details.
|
2184 |
|
|
|
2185 |
|
|
The host (GDB) sends COMMANDs, and the target (the debugging stub
|
2186 |
|
|
incorporated in your program) sends a RESPONSE. In the case of step
|
2187 |
|
|
and continue COMMANDs, the response is only sent when the operation has
|
2188 |
|
|
completed, and the target has again stopped all threads in all attached
|
2189 |
|
|
processes. This is the default all-stop mode behavior, but the remote
|
2190 |
|
|
protocol also supports GDB's non-stop execution mode; see *Note Remote
|
2191 |
|
|
Non-Stop::, for details.
|
2192 |
|
|
|
2193 |
|
|
PACKET-DATA consists of a sequence of characters with the exception
|
2194 |
|
|
of `#' and `$' (see `X' packet for additional exceptions).
|
2195 |
|
|
|
2196 |
|
|
Fields within the packet should be separated using `,' `;' or `:'.
|
2197 |
|
|
Except where otherwise noted all numbers are represented in HEX with
|
2198 |
|
|
leading zeros suppressed.
|
2199 |
|
|
|
2200 |
|
|
Implementors should note that prior to GDB 5.0, the character `:'
|
2201 |
|
|
could not appear as the third character in a packet (as it would
|
2202 |
|
|
potentially conflict with the SEQUENCE-ID).
|
2203 |
|
|
|
2204 |
|
|
Binary data in most packets is encoded either as two hexadecimal
|
2205 |
|
|
digits per byte of binary data. This allowed the traditional remote
|
2206 |
|
|
protocol to work over connections which were only seven-bit clean.
|
2207 |
|
|
Some packets designed more recently assume an eight-bit clean
|
2208 |
|
|
connection, and use a more efficient encoding to send and receive
|
2209 |
|
|
binary data.
|
2210 |
|
|
|
2211 |
|
|
The binary data representation uses `7d' (ASCII `}') as an escape
|
2212 |
|
|
character. Any escaped byte is transmitted as the escape character
|
2213 |
|
|
followed by the original character XORed with `0x20'. For example, the
|
2214 |
|
|
byte `0x7d' would be transmitted as the two bytes `0x7d 0x5d'. The
|
2215 |
|
|
bytes `0x23' (ASCII `#'), `0x24' (ASCII `$'), and `0x7d' (ASCII `}')
|
2216 |
|
|
must always be escaped. Responses sent by the stub must also escape
|
2217 |
|
|
`0x2a' (ASCII `*'), so that it is not interpreted as the start of a
|
2218 |
|
|
run-length encoded sequence (described next).
|
2219 |
|
|
|
2220 |
|
|
Response DATA can be run-length encoded to save space. Run-length
|
2221 |
|
|
encoding replaces runs of identical characters with one instance of the
|
2222 |
|
|
repeated character, followed by a `*' and a repeat count. The repeat
|
2223 |
|
|
count is itself sent encoded, to avoid binary characters in DATA: a
|
2224 |
|
|
value of N is sent as `N+29'. For a repeat count greater or equal to
|
2225 |
|
|
3, this produces a printable ASCII character, e.g. a space (ASCII code
|
2226 |
|
|
32) for a repeat count of 3. (This is because run-length encoding
|
2227 |
|
|
starts to win for counts 3 or more.) Thus, for example, `0* ' is a
|
2228 |
|
|
run-length encoding of "0000": the space character after `*' means
|
2229 |
|
|
repeat the leading `0' `32 - 29 = 3' more times.
|
2230 |
|
|
|
2231 |
|
|
The printable characters `#' and `$' or with a numeric value greater
|
2232 |
|
|
than 126 must not be used. Runs of six repeats (`#') or seven repeats
|
2233 |
|
|
(`$') can be expanded using a repeat count of only five (`"'). For
|
2234 |
|
|
example, `00000000' can be encoded as `0*"00'.
|
2235 |
|
|
|
2236 |
|
|
The error response returned for some packets includes a two character
|
2237 |
|
|
error number. That number is not well defined.
|
2238 |
|
|
|
2239 |
|
|
For any COMMAND not supported by the stub, an empty response
|
2240 |
|
|
(`$#00') should be returned. That way it is possible to extend the
|
2241 |
|
|
protocol. A newer GDB can tell if a packet is supported based on that
|
2242 |
|
|
response.
|
2243 |
|
|
|
2244 |
|
|
A stub is required to support the `g', `G', `m', `M', `c', and `s'
|
2245 |
|
|
COMMANDs. All other COMMANDs are optional.
|
2246 |
|
|
|
2247 |
|
|
|
2248 |
|
|
File: gdb.info, Node: Packets, Next: Stop Reply Packets, Prev: Overview, Up: Remote Protocol
|
2249 |
|
|
|
2250 |
|
|
D.2 Packets
|
2251 |
|
|
===========
|
2252 |
|
|
|
2253 |
|
|
The following table provides a complete list of all currently defined
|
2254 |
|
|
COMMANDs and their corresponding response DATA. *Note File-I/O Remote
|
2255 |
|
|
Protocol Extension::, for details about the File I/O extension of the
|
2256 |
|
|
remote protocol.
|
2257 |
|
|
|
2258 |
|
|
Each packet's description has a template showing the packet's overall
|
2259 |
|
|
syntax, followed by an explanation of the packet's meaning. We include
|
2260 |
|
|
spaces in some of the templates for clarity; these are not part of the
|
2261 |
|
|
packet's syntax. No GDB packet uses spaces to separate its components.
|
2262 |
|
|
For example, a template like `foo BAR BAZ' describes a packet
|
2263 |
|
|
beginning with the three ASCII bytes `foo', followed by a BAR, followed
|
2264 |
|
|
directly by a BAZ. GDB does not transmit a space character between the
|
2265 |
|
|
`foo' and the BAR, or between the BAR and the BAZ.
|
2266 |
|
|
|
2267 |
|
|
Several packets and replies include a THREAD-ID field to identify a
|
2268 |
|
|
thread. Normally these are positive numbers with a target-specific
|
2269 |
|
|
interpretation, formatted as big-endian hex strings. A THREAD-ID can
|
2270 |
|
|
also be a literal `-1' to indicate all threads, or `0' to pick any
|
2271 |
|
|
thread.
|
2272 |
|
|
|
2273 |
|
|
In addition, the remote protocol supports a multiprocess feature in
|
2274 |
|
|
which the THREAD-ID syntax is extended to optionally include both
|
2275 |
|
|
process and thread ID fields, as `pPID.TID'. The PID (process) and TID
|
2276 |
|
|
(thread) components each have the format described above: a positive
|
2277 |
|
|
number with target-specific interpretation formatted as a big-endian
|
2278 |
|
|
hex string, literal `-1' to indicate all processes or threads
|
2279 |
|
|
(respectively), or `0' to indicate an arbitrary process or thread.
|
2280 |
|
|
Specifying just a process, as `pPID', is equivalent to `pPID.-1'. It
|
2281 |
|
|
is an error to specify all processes but a specific thread, such as
|
2282 |
|
|
`p-1.TID'. Note that the `p' prefix is _not_ used for those packets
|
2283 |
|
|
and replies explicitly documented to include a process ID, rather than
|
2284 |
|
|
a THREAD-ID.
|
2285 |
|
|
|
2286 |
|
|
The multiprocess THREAD-ID syntax extensions are only used if both
|
2287 |
|
|
GDB and the stub report support for the `multiprocess' feature using
|
2288 |
|
|
`qSupported'. *Note multiprocess extensions::, for more information.
|
2289 |
|
|
|
2290 |
|
|
Note that all packet forms beginning with an upper- or lower-case
|
2291 |
|
|
letter, other than those described here, are reserved for future use.
|
2292 |
|
|
|
2293 |
|
|
Here are the packet descriptions.
|
2294 |
|
|
|
2295 |
|
|
`!'
|
2296 |
|
|
Enable extended mode. In extended mode, the remote server is made
|
2297 |
|
|
persistent. The `R' packet is used to restart the program being
|
2298 |
|
|
debugged.
|
2299 |
|
|
|
2300 |
|
|
Reply:
|
2301 |
|
|
`OK'
|
2302 |
|
|
The remote target both supports and has enabled extended mode.
|
2303 |
|
|
|
2304 |
|
|
`?'
|
2305 |
|
|
Indicate the reason the target halted. The reply is the same as
|
2306 |
|
|
for step and continue. This packet has a special interpretation
|
2307 |
|
|
when the target is in non-stop mode; see *Note Remote Non-Stop::.
|
2308 |
|
|
|
2309 |
|
|
Reply: *Note Stop Reply Packets::, for the reply specifications.
|
2310 |
|
|
|
2311 |
|
|
`A ARGLEN,ARGNUM,ARG,...'
|
2312 |
|
|
Initialized `argv[]' array passed into program. ARGLEN specifies
|
2313 |
|
|
the number of bytes in the hex encoded byte stream ARG. See
|
2314 |
|
|
`gdbserver' for more details.
|
2315 |
|
|
|
2316 |
|
|
Reply:
|
2317 |
|
|
`OK'
|
2318 |
|
|
The arguments were set.
|
2319 |
|
|
|
2320 |
|
|
`E NN'
|
2321 |
|
|
An error occurred.
|
2322 |
|
|
|
2323 |
|
|
`b BAUD'
|
2324 |
|
|
(Don't use this packet; its behavior is not well-defined.) Change
|
2325 |
|
|
the serial line speed to BAUD.
|
2326 |
|
|
|
2327 |
|
|
JTC: _When does the transport layer state change? When it's
|
2328 |
|
|
received, or after the ACK is transmitted. In either case, there
|
2329 |
|
|
are problems if the command or the acknowledgment packet is
|
2330 |
|
|
dropped._
|
2331 |
|
|
|
2332 |
|
|
Stan: _If people really wanted to add something like this, and get
|
2333 |
|
|
it working for the first time, they ought to modify ser-unix.c to
|
2334 |
|
|
send some kind of out-of-band message to a specially-setup stub
|
2335 |
|
|
and have the switch happen "in between" packets, so that from
|
2336 |
|
|
remote protocol's point of view, nothing actually happened._
|
2337 |
|
|
|
2338 |
|
|
`B ADDR,MODE'
|
2339 |
|
|
Set (MODE is `S') or clear (MODE is `C') a breakpoint at ADDR.
|
2340 |
|
|
|
2341 |
|
|
Don't use this packet. Use the `Z' and `z' packets instead (*note
|
2342 |
|
|
insert breakpoint or watchpoint packet::).
|
2343 |
|
|
|
2344 |
|
|
`bc'
|
2345 |
|
|
Backward continue. Execute the target system in reverse. No
|
2346 |
|
|
parameter. *Note Reverse Execution::, for more information.
|
2347 |
|
|
|
2348 |
|
|
Reply: *Note Stop Reply Packets::, for the reply specifications.
|
2349 |
|
|
|
2350 |
|
|
`bs'
|
2351 |
|
|
Backward single step. Execute one instruction in reverse. No
|
2352 |
|
|
parameter. *Note Reverse Execution::, for more information.
|
2353 |
|
|
|
2354 |
|
|
Reply: *Note Stop Reply Packets::, for the reply specifications.
|
2355 |
|
|
|
2356 |
|
|
`c [ADDR]'
|
2357 |
|
|
Continue. ADDR is address to resume. If ADDR is omitted, resume
|
2358 |
|
|
at current address.
|
2359 |
|
|
|
2360 |
|
|
Reply: *Note Stop Reply Packets::, for the reply specifications.
|
2361 |
|
|
|
2362 |
|
|
`C SIG[;ADDR]'
|
2363 |
|
|
Continue with signal SIG (hex signal number). If `;ADDR' is
|
2364 |
|
|
omitted, resume at same address.
|
2365 |
|
|
|
2366 |
|
|
Reply: *Note Stop Reply Packets::, for the reply specifications.
|
2367 |
|
|
|
2368 |
|
|
`d'
|
2369 |
|
|
Toggle debug flag.
|
2370 |
|
|
|
2371 |
|
|
Don't use this packet; instead, define a general set packet (*note
|
2372 |
|
|
General Query Packets::).
|
2373 |
|
|
|
2374 |
|
|
`D'
|
2375 |
|
|
`D;PID'
|
2376 |
|
|
The first form of the packet is used to detach GDB from the remote
|
2377 |
|
|
system. It is sent to the remote target before GDB disconnects
|
2378 |
|
|
via the `detach' command.
|
2379 |
|
|
|
2380 |
|
|
The second form, including a process ID, is used when multiprocess
|
2381 |
|
|
protocol extensions are enabled (*note multiprocess extensions::),
|
2382 |
|
|
to detach only a specific process. The PID is specified as a
|
2383 |
|
|
big-endian hex string.
|
2384 |
|
|
|
2385 |
|
|
Reply:
|
2386 |
|
|
`OK'
|
2387 |
|
|
for success
|
2388 |
|
|
|
2389 |
|
|
`E NN'
|
2390 |
|
|
for an error
|
2391 |
|
|
|
2392 |
|
|
`F RC,EE,CF;XX'
|
2393 |
|
|
A reply from GDB to an `F' packet sent by the target. This is
|
2394 |
|
|
part of the File-I/O protocol extension. *Note File-I/O Remote
|
2395 |
|
|
Protocol Extension::, for the specification.
|
2396 |
|
|
|
2397 |
|
|
`g'
|
2398 |
|
|
Read general registers.
|
2399 |
|
|
|
2400 |
|
|
Reply:
|
2401 |
|
|
`XX...'
|
2402 |
|
|
Each byte of register data is described by two hex digits.
|
2403 |
|
|
The bytes with the register are transmitted in target byte
|
2404 |
|
|
order. The size of each register and their position within
|
2405 |
|
|
the `g' packet are determined by the GDB internal gdbarch
|
2406 |
|
|
functions `DEPRECATED_REGISTER_RAW_SIZE' and
|
2407 |
|
|
`gdbarch_register_name'. The specification of several
|
2408 |
|
|
standard `g' packets is specified below.
|
2409 |
|
|
|
2410 |
|
|
`E NN'
|
2411 |
|
|
for an error.
|
2412 |
|
|
|
2413 |
|
|
`G XX...'
|
2414 |
|
|
Write general registers. *Note read registers packet::, for a
|
2415 |
|
|
description of the XX... data.
|
2416 |
|
|
|
2417 |
|
|
Reply:
|
2418 |
|
|
`OK'
|
2419 |
|
|
for success
|
2420 |
|
|
|
2421 |
|
|
`E NN'
|
2422 |
|
|
for an error
|
2423 |
|
|
|
2424 |
|
|
`H C THREAD-ID'
|
2425 |
|
|
Set thread for subsequent operations (`m', `M', `g', `G', et.al.).
|
2426 |
|
|
C depends on the operation to be performed: it should be `c' for
|
2427 |
|
|
step and continue operations, `g' for other operations. The
|
2428 |
|
|
thread designator THREAD-ID has the format and interpretation
|
2429 |
|
|
described in *Note thread-id syntax::.
|
2430 |
|
|
|
2431 |
|
|
Reply:
|
2432 |
|
|
`OK'
|
2433 |
|
|
for success
|
2434 |
|
|
|
2435 |
|
|
`E NN'
|
2436 |
|
|
for an error
|
2437 |
|
|
|
2438 |
|
|
`i [ADDR[,NNN]]'
|
2439 |
|
|
Step the remote target by a single clock cycle. If `,NNN' is
|
2440 |
|
|
present, cycle step NNN cycles. If ADDR is present, cycle step
|
2441 |
|
|
starting at that address.
|
2442 |
|
|
|
2443 |
|
|
`I'
|
2444 |
|
|
Signal, then cycle step. *Note step with signal packet::. *Note
|
2445 |
|
|
cycle step packet::.
|
2446 |
|
|
|
2447 |
|
|
`k'
|
2448 |
|
|
Kill request.
|
2449 |
|
|
|
2450 |
|
|
FIXME: _There is no description of how to operate when a specific
|
2451 |
|
|
thread context has been selected (i.e. does 'k' kill only that
|
2452 |
|
|
thread?)_.
|
2453 |
|
|
|
2454 |
|
|
`m ADDR,LENGTH'
|
2455 |
|
|
Read LENGTH bytes of memory starting at address ADDR. Note that
|
2456 |
|
|
ADDR may not be aligned to any particular boundary.
|
2457 |
|
|
|
2458 |
|
|
The stub need not use any particular size or alignment when
|
2459 |
|
|
gathering data from memory for the response; even if ADDR is
|
2460 |
|
|
word-aligned and LENGTH is a multiple of the word size, the stub
|
2461 |
|
|
is free to use byte accesses, or not. For this reason, this
|
2462 |
|
|
packet may not be suitable for accessing memory-mapped I/O devices.
|
2463 |
|
|
|
2464 |
|
|
Reply:
|
2465 |
|
|
`XX...'
|
2466 |
|
|
Memory contents; each byte is transmitted as a two-digit
|
2467 |
|
|
hexadecimal number. The reply may contain fewer bytes than
|
2468 |
|
|
requested if the server was able to read only part of the
|
2469 |
|
|
region of memory.
|
2470 |
|
|
|
2471 |
|
|
`E NN'
|
2472 |
|
|
NN is errno
|
2473 |
|
|
|
2474 |
|
|
`M ADDR,LENGTH:XX...'
|
2475 |
|
|
Write LENGTH bytes of memory starting at address ADDR. XX... is
|
2476 |
|
|
the data; each byte is transmitted as a two-digit hexadecimal
|
2477 |
|
|
number.
|
2478 |
|
|
|
2479 |
|
|
Reply:
|
2480 |
|
|
`OK'
|
2481 |
|
|
for success
|
2482 |
|
|
|
2483 |
|
|
`E NN'
|
2484 |
|
|
for an error (this includes the case where only part of the
|
2485 |
|
|
data was written).
|
2486 |
|
|
|
2487 |
|
|
`p N'
|
2488 |
|
|
Read the value of register N; N is in hex. *Note read registers
|
2489 |
|
|
packet::, for a description of how the returned register value is
|
2490 |
|
|
encoded.
|
2491 |
|
|
|
2492 |
|
|
Reply:
|
2493 |
|
|
`XX...'
|
2494 |
|
|
the register's value
|
2495 |
|
|
|
2496 |
|
|
`E NN'
|
2497 |
|
|
for an error
|
2498 |
|
|
|
2499 |
|
|
`'
|
2500 |
|
|
Indicating an unrecognized QUERY.
|
2501 |
|
|
|
2502 |
|
|
`P N...=R...'
|
2503 |
|
|
Write register N... with value R.... The register number N is in
|
2504 |
|
|
hexadecimal, and R... contains two hex digits for each byte in the
|
2505 |
|
|
register (target byte order).
|
2506 |
|
|
|
2507 |
|
|
Reply:
|
2508 |
|
|
`OK'
|
2509 |
|
|
for success
|
2510 |
|
|
|
2511 |
|
|
`E NN'
|
2512 |
|
|
for an error
|
2513 |
|
|
|
2514 |
|
|
`q NAME PARAMS...'
|
2515 |
|
|
`Q NAME PARAMS...'
|
2516 |
|
|
General query (`q') and set (`Q'). These packets are described
|
2517 |
|
|
fully in *Note General Query Packets::.
|
2518 |
|
|
|
2519 |
|
|
`r'
|
2520 |
|
|
Reset the entire system.
|
2521 |
|
|
|
2522 |
|
|
Don't use this packet; use the `R' packet instead.
|
2523 |
|
|
|
2524 |
|
|
`R XX'
|
2525 |
|
|
Restart the program being debugged. XX, while needed, is ignored.
|
2526 |
|
|
This packet is only available in extended mode (*note extended
|
2527 |
|
|
mode::).
|
2528 |
|
|
|
2529 |
|
|
The `R' packet has no reply.
|
2530 |
|
|
|
2531 |
|
|
`s [ADDR]'
|
2532 |
|
|
Single step. ADDR is the address at which to resume. If ADDR is
|
2533 |
|
|
omitted, resume at same address.
|
2534 |
|
|
|
2535 |
|
|
Reply: *Note Stop Reply Packets::, for the reply specifications.
|
2536 |
|
|
|
2537 |
|
|
`S SIG[;ADDR]'
|
2538 |
|
|
Step with signal. This is analogous to the `C' packet, but
|
2539 |
|
|
requests a single-step, rather than a normal resumption of
|
2540 |
|
|
execution.
|
2541 |
|
|
|
2542 |
|
|
Reply: *Note Stop Reply Packets::, for the reply specifications.
|
2543 |
|
|
|
2544 |
|
|
`t ADDR:PP,MM'
|
2545 |
|
|
Search backwards starting at address ADDR for a match with pattern
|
2546 |
|
|
PP and mask MM. PP and MM are 4 bytes. ADDR must be at least 3
|
2547 |
|
|
digits.
|
2548 |
|
|
|
2549 |
|
|
`T THREAD-ID'
|
2550 |
|
|
Find out if the thread THREAD-ID is alive. *Note thread-id
|
2551 |
|
|
syntax::.
|
2552 |
|
|
|
2553 |
|
|
Reply:
|
2554 |
|
|
`OK'
|
2555 |
|
|
thread is still alive
|
2556 |
|
|
|
2557 |
|
|
`E NN'
|
2558 |
|
|
thread is dead
|
2559 |
|
|
|
2560 |
|
|
`v'
|
2561 |
|
|
Packets starting with `v' are identified by a multi-letter name,
|
2562 |
|
|
up to the first `;' or `?' (or the end of the packet).
|
2563 |
|
|
|
2564 |
|
|
`vAttach;PID'
|
2565 |
|
|
Attach to a new process with the specified process ID PID. The
|
2566 |
|
|
process ID is a hexadecimal integer identifying the process. In
|
2567 |
|
|
all-stop mode, all threads in the attached process are stopped; in
|
2568 |
|
|
non-stop mode, it may be attached without being stopped if that is
|
2569 |
|
|
supported by the target.
|
2570 |
|
|
|
2571 |
|
|
This packet is only available in extended mode (*note extended
|
2572 |
|
|
mode::).
|
2573 |
|
|
|
2574 |
|
|
Reply:
|
2575 |
|
|
`E NN'
|
2576 |
|
|
for an error
|
2577 |
|
|
|
2578 |
|
|
`Any stop packet'
|
2579 |
|
|
for success in all-stop mode (*note Stop Reply Packets::)
|
2580 |
|
|
|
2581 |
|
|
`OK'
|
2582 |
|
|
for success in non-stop mode (*note Remote Non-Stop::)
|
2583 |
|
|
|
2584 |
|
|
`vCont[;ACTION[:THREAD-ID]]...'
|
2585 |
|
|
Resume the inferior, specifying different actions for each thread.
|
2586 |
|
|
If an action is specified with no THREAD-ID, then it is applied to
|
2587 |
|
|
any threads that don't have a specific action specified; if no
|
2588 |
|
|
default action is specified then other threads should remain
|
2589 |
|
|
stopped in all-stop mode and in their current state in non-stop
|
2590 |
|
|
mode. Specifying multiple default actions is an error; specifying
|
2591 |
|
|
no actions is also an error. Thread IDs are specified using the
|
2592 |
|
|
syntax described in *Note thread-id syntax::.
|
2593 |
|
|
|
2594 |
|
|
Currently supported actions are:
|
2595 |
|
|
|
2596 |
|
|
`c'
|
2597 |
|
|
Continue.
|
2598 |
|
|
|
2599 |
|
|
`C SIG'
|
2600 |
|
|
Continue with signal SIG. The signal SIG should be two hex
|
2601 |
|
|
digits.
|
2602 |
|
|
|
2603 |
|
|
`s'
|
2604 |
|
|
Step.
|
2605 |
|
|
|
2606 |
|
|
`S SIG'
|
2607 |
|
|
Step with signal SIG. The signal SIG should be two hex
|
2608 |
|
|
digits.
|
2609 |
|
|
|
2610 |
|
|
`t'
|
2611 |
|
|
Stop.
|
2612 |
|
|
|
2613 |
|
|
The optional argument ADDR normally associated with the `c', `C',
|
2614 |
|
|
`s', and `S' packets is not supported in `vCont'.
|
2615 |
|
|
|
2616 |
|
|
The `t' action is only relevant in non-stop mode (*note Remote
|
2617 |
|
|
Non-Stop::) and may be ignored by the stub otherwise. A stop
|
2618 |
|
|
reply should be generated for any affected thread not already
|
2619 |
|
|
stopped. When a thread is stopped by means of a `t' action, the
|
2620 |
|
|
corresponding stop reply should indicate that the thread has
|
2621 |
|
|
stopped with signal `0', regardless of whether the target uses
|
2622 |
|
|
some other signal as an implementation detail.
|
2623 |
|
|
|
2624 |
|
|
Reply: *Note Stop Reply Packets::, for the reply specifications.
|
2625 |
|
|
|
2626 |
|
|
`vCont?'
|
2627 |
|
|
Request a list of actions supported by the `vCont' packet.
|
2628 |
|
|
|
2629 |
|
|
Reply:
|
2630 |
|
|
`vCont[;ACTION...]'
|
2631 |
|
|
The `vCont' packet is supported. Each ACTION is a supported
|
2632 |
|
|
command in the `vCont' packet.
|
2633 |
|
|
|
2634 |
|
|
`'
|
2635 |
|
|
The `vCont' packet is not supported.
|
2636 |
|
|
|
2637 |
|
|
`vFile:OPERATION:PARAMETER...'
|
2638 |
|
|
Perform a file operation on the target system. For details, see
|
2639 |
|
|
*Note Host I/O Packets::.
|
2640 |
|
|
|
2641 |
|
|
`vFlashErase:ADDR,LENGTH'
|
2642 |
|
|
Direct the stub to erase LENGTH bytes of flash starting at ADDR.
|
2643 |
|
|
The region may enclose any number of flash blocks, but its start
|
2644 |
|
|
and end must fall on block boundaries, as indicated by the flash
|
2645 |
|
|
block size appearing in the memory map (*note Memory Map
|
2646 |
|
|
Format::). GDB groups flash memory programming operations
|
2647 |
|
|
together, and sends a `vFlashDone' request after each group; the
|
2648 |
|
|
stub is allowed to delay erase operation until the `vFlashDone'
|
2649 |
|
|
packet is received.
|
2650 |
|
|
|
2651 |
|
|
The stub must support `vCont' if it reports support for
|
2652 |
|
|
multiprocess extensions (*note multiprocess extensions::). Note
|
2653 |
|
|
that in this case `vCont' actions can be specified to apply to all
|
2654 |
|
|
threads in a process by using the `pPID.-1' form of the THREAD-ID.
|
2655 |
|
|
|
2656 |
|
|
Reply:
|
2657 |
|
|
`OK'
|
2658 |
|
|
for success
|
2659 |
|
|
|
2660 |
|
|
`E NN'
|
2661 |
|
|
for an error
|
2662 |
|
|
|
2663 |
|
|
`vFlashWrite:ADDR:XX...'
|
2664 |
|
|
Direct the stub to write data to flash address ADDR. The data is
|
2665 |
|
|
passed in binary form using the same encoding as for the `X'
|
2666 |
|
|
packet (*note Binary Data::). The memory ranges specified by
|
2667 |
|
|
`vFlashWrite' packets preceding a `vFlashDone' packet must not
|
2668 |
|
|
overlap, and must appear in order of increasing addresses
|
2669 |
|
|
(although `vFlashErase' packets for higher addresses may already
|
2670 |
|
|
have been received; the ordering is guaranteed only between
|
2671 |
|
|
`vFlashWrite' packets). If a packet writes to an address that was
|
2672 |
|
|
neither erased by a preceding `vFlashErase' packet nor by some
|
2673 |
|
|
other target-specific method, the results are unpredictable.
|
2674 |
|
|
|
2675 |
|
|
Reply:
|
2676 |
|
|
`OK'
|
2677 |
|
|
for success
|
2678 |
|
|
|
2679 |
|
|
`E.memtype'
|
2680 |
|
|
for vFlashWrite addressing non-flash memory
|
2681 |
|
|
|
2682 |
|
|
`E NN'
|
2683 |
|
|
for an error
|
2684 |
|
|
|
2685 |
|
|
`vFlashDone'
|
2686 |
|
|
Indicate to the stub that flash programming operation is finished.
|
2687 |
|
|
The stub is permitted to delay or batch the effects of a group of
|
2688 |
|
|
`vFlashErase' and `vFlashWrite' packets until a `vFlashDone'
|
2689 |
|
|
packet is received. The contents of the affected regions of flash
|
2690 |
|
|
memory are unpredictable until the `vFlashDone' request is
|
2691 |
|
|
completed.
|
2692 |
|
|
|
2693 |
|
|
`vKill;PID'
|
2694 |
|
|
Kill the process with the specified process ID. PID is a
|
2695 |
|
|
hexadecimal integer identifying the process. This packet is used
|
2696 |
|
|
in preference to `k' when multiprocess protocol extensions are
|
2697 |
|
|
supported; see *Note multiprocess extensions::.
|
2698 |
|
|
|
2699 |
|
|
Reply:
|
2700 |
|
|
`E NN'
|
2701 |
|
|
for an error
|
2702 |
|
|
|
2703 |
|
|
`OK'
|
2704 |
|
|
for success
|
2705 |
|
|
|
2706 |
|
|
`vRun;FILENAME[;ARGUMENT]...'
|
2707 |
|
|
Run the program FILENAME, passing it each ARGUMENT on its command
|
2708 |
|
|
line. The file and arguments are hex-encoded strings. If
|
2709 |
|
|
FILENAME is an empty string, the stub may use a default program
|
2710 |
|
|
(e.g. the last program run). The program is created in the stopped
|
2711 |
|
|
state.
|
2712 |
|
|
|
2713 |
|
|
This packet is only available in extended mode (*note extended
|
2714 |
|
|
mode::).
|
2715 |
|
|
|
2716 |
|
|
Reply:
|
2717 |
|
|
`E NN'
|
2718 |
|
|
for an error
|
2719 |
|
|
|
2720 |
|
|
`Any stop packet'
|
2721 |
|
|
for success (*note Stop Reply Packets::)
|
2722 |
|
|
|
2723 |
|
|
`vStopped'
|
2724 |
|
|
In non-stop mode (*note Remote Non-Stop::), acknowledge a previous
|
2725 |
|
|
stop reply and prompt for the stub to report another one.
|
2726 |
|
|
|
2727 |
|
|
Reply:
|
2728 |
|
|
`Any stop packet'
|
2729 |
|
|
if there is another unreported stop event (*note Stop Reply
|
2730 |
|
|
Packets::)
|
2731 |
|
|
|
2732 |
|
|
`OK'
|
2733 |
|
|
if there are no unreported stop events
|
2734 |
|
|
|
2735 |
|
|
`X ADDR,LENGTH:XX...'
|
2736 |
|
|
Write data to memory, where the data is transmitted in binary.
|
2737 |
|
|
ADDR is address, LENGTH is number of bytes, `XX...' is binary data
|
2738 |
|
|
(*note Binary Data::).
|
2739 |
|
|
|
2740 |
|
|
Reply:
|
2741 |
|
|
`OK'
|
2742 |
|
|
for success
|
2743 |
|
|
|
2744 |
|
|
`E NN'
|
2745 |
|
|
for an error
|
2746 |
|
|
|
2747 |
|
|
`z TYPE,ADDR,KIND'
|
2748 |
|
|
`Z TYPE,ADDR,KIND'
|
2749 |
|
|
Insert (`Z') or remove (`z') a TYPE breakpoint or watchpoint
|
2750 |
|
|
starting at address ADDRESS of kind KIND.
|
2751 |
|
|
|
2752 |
|
|
Each breakpoint and watchpoint packet TYPE is documented
|
2753 |
|
|
separately.
|
2754 |
|
|
|
2755 |
|
|
_Implementation notes: A remote target shall return an empty string
|
2756 |
|
|
for an unrecognized breakpoint or watchpoint packet TYPE. A
|
2757 |
|
|
remote target shall support either both or neither of a given
|
2758 |
|
|
`ZTYPE...' and `zTYPE...' packet pair. To avoid potential
|
2759 |
|
|
problems with duplicate packets, the operations should be
|
2760 |
|
|
implemented in an idempotent way._
|
2761 |
|
|
|
2762 |
|
|
`z0,ADDR,KIND'
|
2763 |
|
|
`Z0,ADDR,KIND'
|
2764 |
|
|
Insert (`Z0') or remove (`z0') a memory breakpoint at address ADDR
|
2765 |
|
|
of type KIND.
|
2766 |
|
|
|
2767 |
|
|
A memory breakpoint is implemented by replacing the instruction at
|
2768 |
|
|
ADDR with a software breakpoint or trap instruction. The KIND is
|
2769 |
|
|
target-specific and typically indicates the size of the breakpoint
|
2770 |
|
|
in bytes that should be inserted. E.g., the ARM and MIPS can
|
2771 |
|
|
insert either a 2 or 4 byte breakpoint. Some architectures have
|
2772 |
|
|
additional meanings for KIND; see *Note Architecture-Specific
|
2773 |
|
|
Protocol Details::.
|
2774 |
|
|
|
2775 |
|
|
_Implementation note: It is possible for a target to copy or move
|
2776 |
|
|
code that contains memory breakpoints (e.g., when implementing
|
2777 |
|
|
overlays). The behavior of this packet, in the presence of such a
|
2778 |
|
|
target, is not defined._
|
2779 |
|
|
|
2780 |
|
|
Reply:
|
2781 |
|
|
`OK'
|
2782 |
|
|
success
|
2783 |
|
|
|
2784 |
|
|
`'
|
2785 |
|
|
not supported
|
2786 |
|
|
|
2787 |
|
|
`E NN'
|
2788 |
|
|
for an error
|
2789 |
|
|
|
2790 |
|
|
`z1,ADDR,KIND'
|
2791 |
|
|
`Z1,ADDR,KIND'
|
2792 |
|
|
Insert (`Z1') or remove (`z1') a hardware breakpoint at address
|
2793 |
|
|
ADDR.
|
2794 |
|
|
|
2795 |
|
|
A hardware breakpoint is implemented using a mechanism that is not
|
2796 |
|
|
dependant on being able to modify the target's memory. KIND has
|
2797 |
|
|
the same meaning as in `Z0' packets.
|
2798 |
|
|
|
2799 |
|
|
_Implementation note: A hardware breakpoint is not affected by code
|
2800 |
|
|
movement._
|
2801 |
|
|
|
2802 |
|
|
Reply:
|
2803 |
|
|
`OK'
|
2804 |
|
|
success
|
2805 |
|
|
|
2806 |
|
|
`'
|
2807 |
|
|
not supported
|
2808 |
|
|
|
2809 |
|
|
`E NN'
|
2810 |
|
|
for an error
|
2811 |
|
|
|
2812 |
|
|
`z2,ADDR,KIND'
|
2813 |
|
|
`Z2,ADDR,KIND'
|
2814 |
|
|
Insert (`Z2') or remove (`z2') a write watchpoint at ADDR. KIND
|
2815 |
|
|
is interpreted as the number of bytes to watch.
|
2816 |
|
|
|
2817 |
|
|
Reply:
|
2818 |
|
|
`OK'
|
2819 |
|
|
success
|
2820 |
|
|
|
2821 |
|
|
`'
|
2822 |
|
|
not supported
|
2823 |
|
|
|
2824 |
|
|
`E NN'
|
2825 |
|
|
for an error
|
2826 |
|
|
|
2827 |
|
|
`z3,ADDR,KIND'
|
2828 |
|
|
`Z3,ADDR,KIND'
|
2829 |
|
|
Insert (`Z3') or remove (`z3') a read watchpoint at ADDR. KIND is
|
2830 |
|
|
interpreted as the number of bytes to watch.
|
2831 |
|
|
|
2832 |
|
|
Reply:
|
2833 |
|
|
`OK'
|
2834 |
|
|
success
|
2835 |
|
|
|
2836 |
|
|
`'
|
2837 |
|
|
not supported
|
2838 |
|
|
|
2839 |
|
|
`E NN'
|
2840 |
|
|
for an error
|
2841 |
|
|
|
2842 |
|
|
`z4,ADDR,KIND'
|
2843 |
|
|
`Z4,ADDR,KIND'
|
2844 |
|
|
Insert (`Z4') or remove (`z4') an access watchpoint at ADDR. KIND
|
2845 |
|
|
is interpreted as the number of bytes to watch.
|
2846 |
|
|
|
2847 |
|
|
Reply:
|
2848 |
|
|
`OK'
|
2849 |
|
|
success
|
2850 |
|
|
|
2851 |
|
|
`'
|
2852 |
|
|
not supported
|
2853 |
|
|
|
2854 |
|
|
`E NN'
|
2855 |
|
|
for an error
|
2856 |
|
|
|
2857 |
|
|
|
2858 |
|
|
|
2859 |
|
|
File: gdb.info, Node: Stop Reply Packets, Next: General Query Packets, Prev: Packets, Up: Remote Protocol
|
2860 |
|
|
|
2861 |
|
|
D.3 Stop Reply Packets
|
2862 |
|
|
======================
|
2863 |
|
|
|
2864 |
|
|
The `C', `c', `S', `s', `vCont', `vAttach', `vRun', `vStopped', and `?'
|
2865 |
|
|
packets can receive any of the below as a reply. Except for `?' and
|
2866 |
|
|
`vStopped', that reply is only returned when the target halts. In the
|
2867 |
|
|
below the exact meaning of "signal number" is defined by the header
|
2868 |
|
|
`include/gdb/signals.h' in the GDB source code.
|
2869 |
|
|
|
2870 |
|
|
As in the description of request packets, we include spaces in the
|
2871 |
|
|
reply templates for clarity; these are not part of the reply packet's
|
2872 |
|
|
syntax. No GDB stop reply packet uses spaces to separate its
|
2873 |
|
|
components.
|
2874 |
|
|
|
2875 |
|
|
`S AA'
|
2876 |
|
|
The program received signal number AA (a two-digit hexadecimal
|
2877 |
|
|
number). This is equivalent to a `T' response with no N:R pairs.
|
2878 |
|
|
|
2879 |
|
|
`T AA N1:R1;N2:R2;...'
|
2880 |
|
|
The program received signal number AA (a two-digit hexadecimal
|
2881 |
|
|
number). This is equivalent to an `S' response, except that the
|
2882 |
|
|
`N:R' pairs can carry values of important registers and other
|
2883 |
|
|
information directly in the stop reply packet, reducing round-trip
|
2884 |
|
|
latency. Single-step and breakpoint traps are reported this way.
|
2885 |
|
|
Each `N:R' pair is interpreted as follows:
|
2886 |
|
|
|
2887 |
|
|
* If N is a hexadecimal number, it is a register number, and the
|
2888 |
|
|
corresponding R gives that register's value. R is a series
|
2889 |
|
|
of bytes in target byte order, with each byte given by a
|
2890 |
|
|
two-digit hex number.
|
2891 |
|
|
|
2892 |
|
|
* If N is `thread', then R is the THREAD-ID of the stopped
|
2893 |
|
|
thread, as specified in *Note thread-id syntax::.
|
2894 |
|
|
|
2895 |
|
|
* If N is `core', then R is the hexadecimal number of the core
|
2896 |
|
|
on which the stop event was detected.
|
2897 |
|
|
|
2898 |
|
|
* If N is a recognized "stop reason", it describes a more
|
2899 |
|
|
specific event that stopped the target. The currently
|
2900 |
|
|
defined stop reasons are listed below. AA should be `05',
|
2901 |
|
|
the trap signal. At most one stop reason should be present.
|
2902 |
|
|
|
2903 |
|
|
* Otherwise, GDB should ignore this `N:R' pair and go on to the
|
2904 |
|
|
next; this allows us to extend the protocol in the future.
|
2905 |
|
|
|
2906 |
|
|
The currently defined stop reasons are:
|
2907 |
|
|
|
2908 |
|
|
`watch'
|
2909 |
|
|
`rwatch'
|
2910 |
|
|
`awatch'
|
2911 |
|
|
The packet indicates a watchpoint hit, and R is the data
|
2912 |
|
|
address, in hex.
|
2913 |
|
|
|
2914 |
|
|
`library'
|
2915 |
|
|
The packet indicates that the loaded libraries have changed.
|
2916 |
|
|
GDB should use `qXfer:libraries:read' to fetch a new list of
|
2917 |
|
|
loaded libraries. R is ignored.
|
2918 |
|
|
|
2919 |
|
|
`replaylog'
|
2920 |
|
|
The packet indicates that the target cannot continue replaying
|
2921 |
|
|
logged execution events, because it has reached the end (or
|
2922 |
|
|
the beginning when executing backward) of the log. The value
|
2923 |
|
|
of R will be either `begin' or `end'. *Note Reverse
|
2924 |
|
|
Execution::, for more information.
|
2925 |
|
|
|
2926 |
|
|
`W AA'
|
2927 |
|
|
`W AA ; process:PID'
|
2928 |
|
|
The process exited, and AA is the exit status. This is only
|
2929 |
|
|
applicable to certain targets.
|
2930 |
|
|
|
2931 |
|
|
The second form of the response, including the process ID of the
|
2932 |
|
|
exited process, can be used only when GDB has reported support for
|
2933 |
|
|
multiprocess protocol extensions; see *Note multiprocess
|
2934 |
|
|
extensions::. The PID is formatted as a big-endian hex string.
|
2935 |
|
|
|
2936 |
|
|
`X AA'
|
2937 |
|
|
`X AA ; process:PID'
|
2938 |
|
|
The process terminated with signal AA.
|
2939 |
|
|
|
2940 |
|
|
The second form of the response, including the process ID of the
|
2941 |
|
|
terminated process, can be used only when GDB has reported support
|
2942 |
|
|
for multiprocess protocol extensions; see *Note multiprocess
|
2943 |
|
|
extensions::. The PID is formatted as a big-endian hex string.
|
2944 |
|
|
|
2945 |
|
|
`O XX...'
|
2946 |
|
|
`XX...' is hex encoding of ASCII data, to be written as the
|
2947 |
|
|
program's console output. This can happen at any time while the
|
2948 |
|
|
program is running and the debugger should continue to wait for
|
2949 |
|
|
`W', `T', etc. This reply is not permitted in non-stop mode.
|
2950 |
|
|
|
2951 |
|
|
`F CALL-ID,PARAMETER...'
|
2952 |
|
|
CALL-ID is the identifier which says which host system call should
|
2953 |
|
|
be called. This is just the name of the function. Translation
|
2954 |
|
|
into the correct system call is only applicable as it's defined in
|
2955 |
|
|
GDB. *Note File-I/O Remote Protocol Extension::, for a list of
|
2956 |
|
|
implemented system calls.
|
2957 |
|
|
|
2958 |
|
|
`PARAMETER...' is a list of parameters as defined for this very
|
2959 |
|
|
system call.
|
2960 |
|
|
|
2961 |
|
|
The target replies with this packet when it expects GDB to call a
|
2962 |
|
|
host system call on behalf of the target. GDB replies with an
|
2963 |
|
|
appropriate `F' packet and keeps up waiting for the next reply
|
2964 |
|
|
packet from the target. The latest `C', `c', `S' or `s' action is
|
2965 |
|
|
expected to be continued. *Note File-I/O Remote Protocol
|
2966 |
|
|
Extension::, for more details.
|
2967 |
|
|
|
2968 |
|
|
|
2969 |
|
|
|
2970 |
|
|
File: gdb.info, Node: General Query Packets, Next: Architecture-Specific Protocol Details, Prev: Stop Reply Packets, Up: Remote Protocol
|
2971 |
|
|
|
2972 |
|
|
D.4 General Query Packets
|
2973 |
|
|
=========================
|
2974 |
|
|
|
2975 |
|
|
Packets starting with `q' are "general query packets"; packets starting
|
2976 |
|
|
with `Q' are "general set packets". General query and set packets are
|
2977 |
|
|
a semi-unified form for retrieving and sending information to and from
|
2978 |
|
|
the stub.
|
2979 |
|
|
|
2980 |
|
|
The initial letter of a query or set packet is followed by a name
|
2981 |
|
|
indicating what sort of thing the packet applies to. For example, GDB
|
2982 |
|
|
may use a `qSymbol' packet to exchange symbol definitions with the
|
2983 |
|
|
stub. These packet names follow some conventions:
|
2984 |
|
|
|
2985 |
|
|
* The name must not contain commas, colons or semicolons.
|
2986 |
|
|
|
2987 |
|
|
* Most GDB query and set packets have a leading upper case letter.
|
2988 |
|
|
|
2989 |
|
|
* The names of custom vendor packets should use a company prefix, in
|
2990 |
|
|
lower case, followed by a period. For example, packets designed at
|
2991 |
|
|
the Acme Corporation might begin with `qacme.foo' (for querying
|
2992 |
|
|
foos) or `Qacme.bar' (for setting bars).
|
2993 |
|
|
|
2994 |
|
|
The name of a query or set packet should be separated from any
|
2995 |
|
|
parameters by a `:'; the parameters themselves should be separated by
|
2996 |
|
|
`,' or `;'. Stubs must be careful to match the full packet name, and
|
2997 |
|
|
check for a separator or the end of the packet, in case two packet
|
2998 |
|
|
names share a common prefix. New packets should not begin with `qC',
|
2999 |
|
|
`qP', or `qL'(1).
|
3000 |
|
|
|
3001 |
|
|
Like the descriptions of the other packets, each description here
|
3002 |
|
|
has a template showing the packet's overall syntax, followed by an
|
3003 |
|
|
explanation of the packet's meaning. We include spaces in some of the
|
3004 |
|
|
templates for clarity; these are not part of the packet's syntax. No
|
3005 |
|
|
GDB packet uses spaces to separate its components.
|
3006 |
|
|
|
3007 |
|
|
Here are the currently defined query and set packets:
|
3008 |
|
|
|
3009 |
|
|
`qC'
|
3010 |
|
|
Return the current thread ID.
|
3011 |
|
|
|
3012 |
|
|
Reply:
|
3013 |
|
|
`QC THREAD-ID'
|
3014 |
|
|
Where THREAD-ID is a thread ID as documented in *Note
|
3015 |
|
|
thread-id syntax::.
|
3016 |
|
|
|
3017 |
|
|
`(anything else)'
|
3018 |
|
|
Any other reply implies the old thread ID.
|
3019 |
|
|
|
3020 |
|
|
`qCRC:ADDR,LENGTH'
|
3021 |
|
|
Compute the CRC checksum of a block of memory using CRC-32 defined
|
3022 |
|
|
in IEEE 802.3. The CRC is computed byte at a time, taking the most
|
3023 |
|
|
significant bit of each byte first. The initial pattern code
|
3024 |
|
|
`0xffffffff' is used to ensure leading zeros affect the CRC.
|
3025 |
|
|
|
3026 |
|
|
_Note:_ This is the same CRC used in validating separate debug
|
3027 |
|
|
files (*note Debugging Information in Separate Files: Separate
|
3028 |
|
|
Debug Files.). However the algorithm is slightly different. When
|
3029 |
|
|
validating separate debug files, the CRC is computed taking the
|
3030 |
|
|
_least_ significant bit of each byte first, and the final result
|
3031 |
|
|
is inverted to detect trailing zeros.
|
3032 |
|
|
|
3033 |
|
|
Reply:
|
3034 |
|
|
`E NN'
|
3035 |
|
|
An error (such as memory fault)
|
3036 |
|
|
|
3037 |
|
|
`C CRC32'
|
3038 |
|
|
The specified memory region's checksum is CRC32.
|
3039 |
|
|
|
3040 |
|
|
`qfThreadInfo'
|
3041 |
|
|
`qsThreadInfo'
|
3042 |
|
|
Obtain a list of all active thread IDs from the target (OS).
|
3043 |
|
|
Since there may be too many active threads to fit into one reply
|
3044 |
|
|
packet, this query works iteratively: it may require more than one
|
3045 |
|
|
query/reply sequence to obtain the entire list of threads. The
|
3046 |
|
|
first query of the sequence will be the `qfThreadInfo' query;
|
3047 |
|
|
subsequent queries in the sequence will be the `qsThreadInfo'
|
3048 |
|
|
query.
|
3049 |
|
|
|
3050 |
|
|
NOTE: This packet replaces the `qL' query (see below).
|
3051 |
|
|
|
3052 |
|
|
Reply:
|
3053 |
|
|
`m THREAD-ID'
|
3054 |
|
|
A single thread ID
|
3055 |
|
|
|
3056 |
|
|
`m THREAD-ID,THREAD-ID...'
|
3057 |
|
|
a comma-separated list of thread IDs
|
3058 |
|
|
|
3059 |
|
|
`l'
|
3060 |
|
|
(lower case letter `L') denotes end of list.
|
3061 |
|
|
|
3062 |
|
|
In response to each query, the target will reply with a list of
|
3063 |
|
|
one or more thread IDs, separated by commas. GDB will respond to
|
3064 |
|
|
each reply with a request for more thread ids (using the `qs' form
|
3065 |
|
|
of the query), until the target responds with `l' (lower-case el,
|
3066 |
|
|
for "last"). Refer to *Note thread-id syntax::, for the format of
|
3067 |
|
|
the THREAD-ID fields.
|
3068 |
|
|
|
3069 |
|
|
`qGetTLSAddr:THREAD-ID,OFFSET,LM'
|
3070 |
|
|
Fetch the address associated with thread local storage specified
|
3071 |
|
|
by THREAD-ID, OFFSET, and LM.
|
3072 |
|
|
|
3073 |
|
|
THREAD-ID is the thread ID associated with the thread for which to
|
3074 |
|
|
fetch the TLS address. *Note thread-id syntax::.
|
3075 |
|
|
|
3076 |
|
|
OFFSET is the (big endian, hex encoded) offset associated with the
|
3077 |
|
|
thread local variable. (This offset is obtained from the debug
|
3078 |
|
|
information associated with the variable.)
|
3079 |
|
|
|
3080 |
|
|
LM is the (big endian, hex encoded) OS/ABI-specific encoding of the
|
3081 |
|
|
the load module associated with the thread local storage. For
|
3082 |
|
|
example, a GNU/Linux system will pass the link map address of the
|
3083 |
|
|
shared object associated with the thread local storage under
|
3084 |
|
|
consideration. Other operating environments may choose to
|
3085 |
|
|
represent the load module differently, so the precise meaning of
|
3086 |
|
|
this parameter will vary.
|
3087 |
|
|
|
3088 |
|
|
Reply:
|
3089 |
|
|
`XX...'
|
3090 |
|
|
Hex encoded (big endian) bytes representing the address of
|
3091 |
|
|
the thread local storage requested.
|
3092 |
|
|
|
3093 |
|
|
`E NN'
|
3094 |
|
|
An error occurred. NN are hex digits.
|
3095 |
|
|
|
3096 |
|
|
`'
|
3097 |
|
|
An empty reply indicates that `qGetTLSAddr' is not supported
|
3098 |
|
|
by the stub.
|
3099 |
|
|
|
3100 |
|
|
`qL STARTFLAG THREADCOUNT NEXTTHREAD'
|
3101 |
|
|
Obtain thread information from RTOS. Where: STARTFLAG (one hex
|
3102 |
|
|
digit) is one to indicate the first query and zero to indicate a
|
3103 |
|
|
subsequent query; THREADCOUNT (two hex digits) is the maximum
|
3104 |
|
|
number of threads the response packet can contain; and NEXTTHREAD
|
3105 |
|
|
(eight hex digits), for subsequent queries (STARTFLAG is zero), is
|
3106 |
|
|
returned in the response as ARGTHREAD.
|
3107 |
|
|
|
3108 |
|
|
Don't use this packet; use the `qfThreadInfo' query instead (see
|
3109 |
|
|
above).
|
3110 |
|
|
|
3111 |
|
|
Reply:
|
3112 |
|
|
`qM COUNT DONE ARGTHREAD THREAD...'
|
3113 |
|
|
Where: COUNT (two hex digits) is the number of threads being
|
3114 |
|
|
returned; DONE (one hex digit) is zero to indicate more
|
3115 |
|
|
threads and one indicates no further threads; ARGTHREADID
|
3116 |
|
|
(eight hex digits) is NEXTTHREAD from the request packet;
|
3117 |
|
|
THREAD... is a sequence of thread IDs from the target.
|
3118 |
|
|
THREADID (eight hex digits). See
|
3119 |
|
|
`remote.c:parse_threadlist_response()'.
|
3120 |
|
|
|
3121 |
|
|
`qOffsets'
|
3122 |
|
|
Get section offsets that the target used when relocating the
|
3123 |
|
|
downloaded image.
|
3124 |
|
|
|
3125 |
|
|
Reply:
|
3126 |
|
|
`Text=XXX;Data=YYY[;Bss=ZZZ]'
|
3127 |
|
|
Relocate the `Text' section by XXX from its original address.
|
3128 |
|
|
Relocate the `Data' section by YYY from its original address.
|
3129 |
|
|
If the object file format provides segment information (e.g.
|
3130 |
|
|
ELF `PT_LOAD' program headers), GDB will relocate entire
|
3131 |
|
|
segments by the supplied offsets.
|
3132 |
|
|
|
3133 |
|
|
_Note: while a `Bss' offset may be included in the response,
|
3134 |
|
|
GDB ignores this and instead applies the `Data' offset to the
|
3135 |
|
|
`Bss' section._
|
3136 |
|
|
|
3137 |
|
|
`TextSeg=XXX[;DataSeg=YYY]'
|
3138 |
|
|
Relocate the first segment of the object file, which
|
3139 |
|
|
conventionally contains program code, to a starting address
|
3140 |
|
|
of XXX. If `DataSeg' is specified, relocate the second
|
3141 |
|
|
segment, which conventionally contains modifiable data, to a
|
3142 |
|
|
starting address of YYY. GDB will report an error if the
|
3143 |
|
|
object file does not contain segment information, or does not
|
3144 |
|
|
contain at least as many segments as mentioned in the reply.
|
3145 |
|
|
Extra segments are kept at fixed offsets relative to the last
|
3146 |
|
|
relocated segment.
|
3147 |
|
|
|
3148 |
|
|
`qP MODE THREAD-ID'
|
3149 |
|
|
Returns information on THREAD-ID. Where: MODE is a hex encoded 32
|
3150 |
|
|
bit mode; THREAD-ID is a thread ID (*note thread-id syntax::).
|
3151 |
|
|
|
3152 |
|
|
Don't use this packet; use the `qThreadExtraInfo' query instead
|
3153 |
|
|
(see below).
|
3154 |
|
|
|
3155 |
|
|
Reply: see `remote.c:remote_unpack_thread_info_response()'.
|
3156 |
|
|
|
3157 |
|
|
`QNonStop:1'
|
3158 |
|
|
|
3159 |
|
|
`QNonStop:0'
|
3160 |
|
|
Enter non-stop (`QNonStop:1') or all-stop (`QNonStop:0') mode.
|
3161 |
|
|
*Note Remote Non-Stop::, for more information.
|
3162 |
|
|
|
3163 |
|
|
Reply:
|
3164 |
|
|
`OK'
|
3165 |
|
|
The request succeeded.
|
3166 |
|
|
|
3167 |
|
|
`E NN'
|
3168 |
|
|
An error occurred. NN are hex digits.
|
3169 |
|
|
|
3170 |
|
|
`'
|
3171 |
|
|
An empty reply indicates that `QNonStop' is not supported by
|
3172 |
|
|
the stub.
|
3173 |
|
|
|
3174 |
|
|
This packet is not probed by default; the remote stub must request
|
3175 |
|
|
it, by supplying an appropriate `qSupported' response (*note
|
3176 |
|
|
qSupported::). Use of this packet is controlled by the `set
|
3177 |
|
|
non-stop' command; *note Non-Stop Mode::.
|
3178 |
|
|
|
3179 |
|
|
`QPassSignals: SIGNAL [;SIGNAL]...'
|
3180 |
|
|
Each listed SIGNAL should be passed directly to the inferior
|
3181 |
|
|
process. Signals are numbered identically to continue packets and
|
3182 |
|
|
stop replies (*note Stop Reply Packets::). Each SIGNAL list item
|
3183 |
|
|
should be strictly greater than the previous item. These signals
|
3184 |
|
|
do not need to stop the inferior, or be reported to GDB. All
|
3185 |
|
|
other signals should be reported to GDB. Multiple `QPassSignals'
|
3186 |
|
|
packets do not combine; any earlier `QPassSignals' list is
|
3187 |
|
|
completely replaced by the new list. This packet improves
|
3188 |
|
|
performance when using `handle SIGNAL nostop noprint pass'.
|
3189 |
|
|
|
3190 |
|
|
Reply:
|
3191 |
|
|
`OK'
|
3192 |
|
|
The request succeeded.
|
3193 |
|
|
|
3194 |
|
|
`E NN'
|
3195 |
|
|
An error occurred. NN are hex digits.
|
3196 |
|
|
|
3197 |
|
|
`'
|
3198 |
|
|
An empty reply indicates that `QPassSignals' is not supported
|
3199 |
|
|
by the stub.
|
3200 |
|
|
|
3201 |
|
|
Use of this packet is controlled by the `set remote pass-signals'
|
3202 |
|
|
command (*note set remote pass-signals: Remote Configuration.).
|
3203 |
|
|
This packet is not probed by default; the remote stub must request
|
3204 |
|
|
it, by supplying an appropriate `qSupported' response (*note
|
3205 |
|
|
qSupported::).
|
3206 |
|
|
|
3207 |
|
|
`qRcmd,COMMAND'
|
3208 |
|
|
COMMAND (hex encoded) is passed to the local interpreter for
|
3209 |
|
|
execution. Invalid commands should be reported using the output
|
3210 |
|
|
string. Before the final result packet, the target may also
|
3211 |
|
|
respond with a number of intermediate `OOUTPUT' console output
|
3212 |
|
|
packets. _Implementors should note that providing access to a
|
3213 |
|
|
stubs's interpreter may have security implications_.
|
3214 |
|
|
|
3215 |
|
|
Reply:
|
3216 |
|
|
`OK'
|
3217 |
|
|
A command response with no output.
|
3218 |
|
|
|
3219 |
|
|
`OUTPUT'
|
3220 |
|
|
A command response with the hex encoded output string OUTPUT.
|
3221 |
|
|
|
3222 |
|
|
`E NN'
|
3223 |
|
|
Indicate a badly formed request.
|
3224 |
|
|
|
3225 |
|
|
`'
|
3226 |
|
|
An empty reply indicates that `qRcmd' is not recognized.
|
3227 |
|
|
|
3228 |
|
|
(Note that the `qRcmd' packet's name is separated from the command
|
3229 |
|
|
by a `,', not a `:', contrary to the naming conventions above.
|
3230 |
|
|
Please don't use this packet as a model for new packets.)
|
3231 |
|
|
|
3232 |
|
|
`qSearch:memory:ADDRESS;LENGTH;SEARCH-PATTERN'
|
3233 |
|
|
Search LENGTH bytes at ADDRESS for SEARCH-PATTERN. ADDRESS and
|
3234 |
|
|
LENGTH are encoded in hex. SEARCH-PATTERN is a sequence of bytes,
|
3235 |
|
|
hex encoded.
|
3236 |
|
|
|
3237 |
|
|
Reply:
|
3238 |
|
|
`0'
|
3239 |
|
|
The pattern was not found.
|
3240 |
|
|
|
3241 |
|
|
`1,address'
|
3242 |
|
|
The pattern was found at ADDRESS.
|
3243 |
|
|
|
3244 |
|
|
`E NN'
|
3245 |
|
|
A badly formed request or an error was encountered while
|
3246 |
|
|
searching memory.
|
3247 |
|
|
|
3248 |
|
|
`'
|
3249 |
|
|
An empty reply indicates that `qSearch:memory' is not
|
3250 |
|
|
recognized.
|
3251 |
|
|
|
3252 |
|
|
`QStartNoAckMode'
|
3253 |
|
|
Request that the remote stub disable the normal `+'/`-' protocol
|
3254 |
|
|
acknowledgments (*note Packet Acknowledgment::).
|
3255 |
|
|
|
3256 |
|
|
Reply:
|
3257 |
|
|
`OK'
|
3258 |
|
|
The stub has switched to no-acknowledgment mode. GDB
|
3259 |
|
|
acknowledges this reponse, but neither the stub nor GDB shall
|
3260 |
|
|
send or expect further `+'/`-' acknowledgments in the current
|
3261 |
|
|
connection.
|
3262 |
|
|
|
3263 |
|
|
`'
|
3264 |
|
|
An empty reply indicates that the stub does not support
|
3265 |
|
|
no-acknowledgment mode.
|
3266 |
|
|
|
3267 |
|
|
`qSupported [:GDBFEATURE [;GDBFEATURE]... ]'
|
3268 |
|
|
Tell the remote stub about features supported by GDB, and query
|
3269 |
|
|
the stub for features it supports. This packet allows GDB and the
|
3270 |
|
|
remote stub to take advantage of each others' features.
|
3271 |
|
|
`qSupported' also consolidates multiple feature probes at startup,
|
3272 |
|
|
to improve GDB performance--a single larger packet performs better
|
3273 |
|
|
than multiple smaller probe packets on high-latency links. Some
|
3274 |
|
|
features may enable behavior which must not be on by default, e.g.
|
3275 |
|
|
because it would confuse older clients or stubs. Other features
|
3276 |
|
|
may describe packets which could be automatically probed for, but
|
3277 |
|
|
are not. These features must be reported before GDB will use
|
3278 |
|
|
them. This "default unsupported" behavior is not appropriate for
|
3279 |
|
|
all packets, but it helps to keep the initial connection time
|
3280 |
|
|
under control with new versions of GDB which support increasing
|
3281 |
|
|
numbers of packets.
|
3282 |
|
|
|
3283 |
|
|
Reply:
|
3284 |
|
|
`STUBFEATURE [;STUBFEATURE]...'
|
3285 |
|
|
The stub supports or does not support each returned
|
3286 |
|
|
STUBFEATURE, depending on the form of each STUBFEATURE (see
|
3287 |
|
|
below for the possible forms).
|
3288 |
|
|
|
3289 |
|
|
`'
|
3290 |
|
|
An empty reply indicates that `qSupported' is not recognized,
|
3291 |
|
|
or that no features needed to be reported to GDB.
|
3292 |
|
|
|
3293 |
|
|
The allowed forms for each feature (either a GDBFEATURE in the
|
3294 |
|
|
`qSupported' packet, or a STUBFEATURE in the response) are:
|
3295 |
|
|
|
3296 |
|
|
`NAME=VALUE'
|
3297 |
|
|
The remote protocol feature NAME is supported, and associated
|
3298 |
|
|
with the specified VALUE. The format of VALUE depends on the
|
3299 |
|
|
feature, but it must not include a semicolon.
|
3300 |
|
|
|
3301 |
|
|
`NAME+'
|
3302 |
|
|
The remote protocol feature NAME is supported, and does not
|
3303 |
|
|
need an associated value.
|
3304 |
|
|
|
3305 |
|
|
`NAME-'
|
3306 |
|
|
The remote protocol feature NAME is not supported.
|
3307 |
|
|
|
3308 |
|
|
`NAME?'
|
3309 |
|
|
The remote protocol feature NAME may be supported, and GDB
|
3310 |
|
|
should auto-detect support in some other way when it is
|
3311 |
|
|
needed. This form will not be used for GDBFEATURE
|
3312 |
|
|
notifications, but may be used for STUBFEATURE responses.
|
3313 |
|
|
|
3314 |
|
|
Whenever the stub receives a `qSupported' request, the supplied
|
3315 |
|
|
set of GDB features should override any previous request. This
|
3316 |
|
|
allows GDB to put the stub in a known state, even if the stub had
|
3317 |
|
|
previously been communicating with a different version of GDB.
|
3318 |
|
|
|
3319 |
|
|
The following values of GDBFEATURE (for the packet sent by GDB)
|
3320 |
|
|
are defined:
|
3321 |
|
|
|
3322 |
|
|
`multiprocess'
|
3323 |
|
|
This feature indicates whether GDB supports multiprocess
|
3324 |
|
|
extensions to the remote protocol. GDB does not use such
|
3325 |
|
|
extensions unless the stub also reports that it supports them
|
3326 |
|
|
by including `multiprocess+' in its `qSupported' reply.
|
3327 |
|
|
*Note multiprocess extensions::, for details.
|
3328 |
|
|
|
3329 |
|
|
Stubs should ignore any unknown values for GDBFEATURE. Any GDB
|
3330 |
|
|
which sends a `qSupported' packet supports receiving packets of
|
3331 |
|
|
unlimited length (earlier versions of GDB may reject overly long
|
3332 |
|
|
responses). Additional values for GDBFEATURE may be defined in
|
3333 |
|
|
the future to let the stub take advantage of new features in GDB,
|
3334 |
|
|
e.g. incompatible improvements in the remote protocol--the
|
3335 |
|
|
`multiprocess' feature is an example of such a feature. The
|
3336 |
|
|
stub's reply should be independent of the GDBFEATURE entries sent
|
3337 |
|
|
by GDB; first GDB describes all the features it supports, and then
|
3338 |
|
|
the stub replies with all the features it supports.
|
3339 |
|
|
|
3340 |
|
|
Similarly, GDB will silently ignore unrecognized stub feature
|
3341 |
|
|
responses, as long as each response uses one of the standard forms.
|
3342 |
|
|
|
3343 |
|
|
Some features are flags. A stub which supports a flag feature
|
3344 |
|
|
should respond with a `+' form response. Other features require
|
3345 |
|
|
values, and the stub should respond with an `=' form response.
|
3346 |
|
|
|
3347 |
|
|
Each feature has a default value, which GDB will use if
|
3348 |
|
|
`qSupported' is not available or if the feature is not mentioned
|
3349 |
|
|
in the `qSupported' response. The default values are fixed; a
|
3350 |
|
|
stub is free to omit any feature responses that match the defaults.
|
3351 |
|
|
|
3352 |
|
|
Not all features can be probed, but for those which can, the
|
3353 |
|
|
probing mechanism is useful: in some cases, a stub's internal
|
3354 |
|
|
architecture may not allow the protocol layer to know some
|
3355 |
|
|
information about the underlying target in advance. This is
|
3356 |
|
|
especially common in stubs which may be configured for multiple
|
3357 |
|
|
targets.
|
3358 |
|
|
|
3359 |
|
|
These are the currently defined stub features and their properties:
|
3360 |
|
|
|
3361 |
|
|
Feature Name Value Default Probe Allowed
|
3362 |
|
|
Required
|
3363 |
|
|
`PacketSize' Yes `-' No
|
3364 |
|
|
`qXfer:auxv:read' No `-' Yes
|
3365 |
|
|
`qXfer:features:read' No `-' Yes
|
3366 |
|
|
`qXfer:libraries:read' No `-' Yes
|
3367 |
|
|
`qXfer:memory-map:read' No `-' Yes
|
3368 |
|
|
`qXfer:spu:read' No `-' Yes
|
3369 |
|
|
`qXfer:spu:write' No `-' Yes
|
3370 |
|
|
`qXfer:siginfo:read' No `-' Yes
|
3371 |
|
|
`qXfer:siginfo:write' No `-' Yes
|
3372 |
|
|
`qXfer:threads:read' No `-' Yes
|
3373 |
|
|
`QNonStop' No `-' Yes
|
3374 |
|
|
`QPassSignals' No `-' Yes
|
3375 |
|
|
`QStartNoAckMode' No `-' Yes
|
3376 |
|
|
`multiprocess' No `-' No
|
3377 |
|
|
`ConditionalTracepoints'No `-' No
|
3378 |
|
|
`ReverseContinue' No `-' No
|
3379 |
|
|
`ReverseStep' No `-' No
|
3380 |
|
|
|
3381 |
|
|
These are the currently defined stub features, in more detail:
|
3382 |
|
|
|
3383 |
|
|
`PacketSize=BYTES'
|
3384 |
|
|
The remote stub can accept packets up to at least BYTES in
|
3385 |
|
|
length. GDB will send packets up to this size for bulk
|
3386 |
|
|
transfers, and will never send larger packets. This is a
|
3387 |
|
|
limit on the data characters in the packet, including the
|
3388 |
|
|
frame and checksum. There is no trailing NUL byte in a
|
3389 |
|
|
remote protocol packet; if the stub stores packets in a
|
3390 |
|
|
NUL-terminated format, it should allow an extra byte in its
|
3391 |
|
|
buffer for the NUL. If this stub feature is not supported,
|
3392 |
|
|
GDB guesses based on the size of the `g' packet response.
|
3393 |
|
|
|
3394 |
|
|
`qXfer:auxv:read'
|
3395 |
|
|
The remote stub understands the `qXfer:auxv:read' packet
|
3396 |
|
|
(*note qXfer auxiliary vector read::).
|
3397 |
|
|
|
3398 |
|
|
`qXfer:features:read'
|
3399 |
|
|
The remote stub understands the `qXfer:features:read' packet
|
3400 |
|
|
(*note qXfer target description read::).
|
3401 |
|
|
|
3402 |
|
|
`qXfer:libraries:read'
|
3403 |
|
|
The remote stub understands the `qXfer:libraries:read' packet
|
3404 |
|
|
(*note qXfer library list read::).
|
3405 |
|
|
|
3406 |
|
|
`qXfer:memory-map:read'
|
3407 |
|
|
The remote stub understands the `qXfer:memory-map:read' packet
|
3408 |
|
|
(*note qXfer memory map read::).
|
3409 |
|
|
|
3410 |
|
|
`qXfer:spu:read'
|
3411 |
|
|
The remote stub understands the `qXfer:spu:read' packet
|
3412 |
|
|
(*note qXfer spu read::).
|
3413 |
|
|
|
3414 |
|
|
`qXfer:spu:write'
|
3415 |
|
|
The remote stub understands the `qXfer:spu:write' packet
|
3416 |
|
|
(*note qXfer spu write::).
|
3417 |
|
|
|
3418 |
|
|
`qXfer:siginfo:read'
|
3419 |
|
|
The remote stub understands the `qXfer:siginfo:read' packet
|
3420 |
|
|
(*note qXfer siginfo read::).
|
3421 |
|
|
|
3422 |
|
|
`qXfer:siginfo:write'
|
3423 |
|
|
The remote stub understands the `qXfer:siginfo:write' packet
|
3424 |
|
|
(*note qXfer siginfo write::).
|
3425 |
|
|
|
3426 |
|
|
`qXfer:threads:read'
|
3427 |
|
|
The remote stub understands the `qXfer:threads:read' packet
|
3428 |
|
|
(*note qXfer threads read::).
|
3429 |
|
|
|
3430 |
|
|
`QNonStop'
|
3431 |
|
|
The remote stub understands the `QNonStop' packet (*note
|
3432 |
|
|
QNonStop::).
|
3433 |
|
|
|
3434 |
|
|
`QPassSignals'
|
3435 |
|
|
The remote stub understands the `QPassSignals' packet (*note
|
3436 |
|
|
QPassSignals::).
|
3437 |
|
|
|
3438 |
|
|
`QStartNoAckMode'
|
3439 |
|
|
The remote stub understands the `QStartNoAckMode' packet and
|
3440 |
|
|
prefers to operate in no-acknowledgment mode. *Note Packet
|
3441 |
|
|
Acknowledgment::.
|
3442 |
|
|
|
3443 |
|
|
`multiprocess'
|
3444 |
|
|
The remote stub understands the multiprocess extensions to
|
3445 |
|
|
the remote protocol syntax. The multiprocess extensions
|
3446 |
|
|
affect the syntax of thread IDs in both packets and replies
|
3447 |
|
|
(*note thread-id syntax::), and add process IDs to the `D'
|
3448 |
|
|
packet and `W' and `X' replies. Note that reporting this
|
3449 |
|
|
feature indicates support for the syntactic extensions only,
|
3450 |
|
|
not that the stub necessarily supports debugging of more than
|
3451 |
|
|
one process at a time. The stub must not use multiprocess
|
3452 |
|
|
extensions in packet replies unless GDB has also indicated it
|
3453 |
|
|
supports them in its `qSupported' request.
|
3454 |
|
|
|
3455 |
|
|
`qXfer:osdata:read'
|
3456 |
|
|
The remote stub understands the `qXfer:osdata:read' packet
|
3457 |
|
|
((*note qXfer osdata read::).
|
3458 |
|
|
|
3459 |
|
|
`ConditionalTracepoints'
|
3460 |
|
|
The remote stub accepts and implements conditional
|
3461 |
|
|
expressions defined for tracepoints (*note Tracepoint
|
3462 |
|
|
Conditions::).
|
3463 |
|
|
|
3464 |
|
|
`ReverseContinue'
|
3465 |
|
|
The remote stub accepts and implements the reverse continue
|
3466 |
|
|
packet (*note bc::).
|
3467 |
|
|
|
3468 |
|
|
`ReverseStep'
|
3469 |
|
|
The remote stub accepts and implements the reverse step packet
|
3470 |
|
|
(*note bs::).
|
3471 |
|
|
|
3472 |
|
|
|
3473 |
|
|
`qSymbol::'
|
3474 |
|
|
Notify the target that GDB is prepared to serve symbol lookup
|
3475 |
|
|
requests. Accept requests from the target for the values of
|
3476 |
|
|
symbols.
|
3477 |
|
|
|
3478 |
|
|
Reply:
|
3479 |
|
|
`OK'
|
3480 |
|
|
The target does not need to look up any (more) symbols.
|
3481 |
|
|
|
3482 |
|
|
`qSymbol:SYM_NAME'
|
3483 |
|
|
The target requests the value of symbol SYM_NAME (hex
|
3484 |
|
|
encoded). GDB may provide the value by using the
|
3485 |
|
|
`qSymbol:SYM_VALUE:SYM_NAME' message, described below.
|
3486 |
|
|
|
3487 |
|
|
`qSymbol:SYM_VALUE:SYM_NAME'
|
3488 |
|
|
Set the value of SYM_NAME to SYM_VALUE.
|
3489 |
|
|
|
3490 |
|
|
SYM_NAME (hex encoded) is the name of a symbol whose value the
|
3491 |
|
|
target has previously requested.
|
3492 |
|
|
|
3493 |
|
|
SYM_VALUE (hex) is the value for symbol SYM_NAME. If GDB cannot
|
3494 |
|
|
supply a value for SYM_NAME, then this field will be empty.
|
3495 |
|
|
|
3496 |
|
|
Reply:
|
3497 |
|
|
`OK'
|
3498 |
|
|
The target does not need to look up any (more) symbols.
|
3499 |
|
|
|
3500 |
|
|
`qSymbol:SYM_NAME'
|
3501 |
|
|
The target requests the value of a new symbol SYM_NAME (hex
|
3502 |
|
|
encoded). GDB will continue to supply the values of symbols
|
3503 |
|
|
(if available), until the target ceases to request them.
|
3504 |
|
|
|
3505 |
|
|
`qTBuffer'
|
3506 |
|
|
|
3507 |
|
|
`QTDisconnected'
|
3508 |
|
|
`QTDP'
|
3509 |
|
|
`QTDV'
|
3510 |
|
|
`qTfP'
|
3511 |
|
|
`qTfV'
|
3512 |
|
|
`QTFrame'
|
3513 |
|
|
*Note Tracepoint Packets::.
|
3514 |
|
|
|
3515 |
|
|
`qThreadExtraInfo,THREAD-ID'
|
3516 |
|
|
Obtain a printable string description of a thread's attributes from
|
3517 |
|
|
the target OS. THREAD-ID is a thread ID; see *Note thread-id
|
3518 |
|
|
syntax::. This string may contain anything that the target OS
|
3519 |
|
|
thinks is interesting for GDB to tell the user about the thread.
|
3520 |
|
|
The string is displayed in GDB's `info threads' display. Some
|
3521 |
|
|
examples of possible thread extra info strings are `Runnable', or
|
3522 |
|
|
`Blocked on Mutex'.
|
3523 |
|
|
|
3524 |
|
|
Reply:
|
3525 |
|
|
`XX...'
|
3526 |
|
|
Where `XX...' is a hex encoding of ASCII data, comprising the
|
3527 |
|
|
printable string containing the extra information about the
|
3528 |
|
|
thread's attributes.
|
3529 |
|
|
|
3530 |
|
|
(Note that the `qThreadExtraInfo' packet's name is separated from
|
3531 |
|
|
the command by a `,', not a `:', contrary to the naming
|
3532 |
|
|
conventions above. Please don't use this packet as a model for new
|
3533 |
|
|
packets.)
|
3534 |
|
|
|
3535 |
|
|
`QTSave'
|
3536 |
|
|
|
3537 |
|
|
`qTsP'
|
3538 |
|
|
|
3539 |
|
|
`qTsV'
|
3540 |
|
|
`QTStart'
|
3541 |
|
|
`QTStop'
|
3542 |
|
|
`QTinit'
|
3543 |
|
|
`QTro'
|
3544 |
|
|
`qTStatus'
|
3545 |
|
|
`qTV'
|
3546 |
|
|
*Note Tracepoint Packets::.
|
3547 |
|
|
|
3548 |
|
|
`qXfer:OBJECT:read:ANNEX:OFFSET,LENGTH'
|
3549 |
|
|
Read uninterpreted bytes from the target's special data area
|
3550 |
|
|
identified by the keyword OBJECT. Request LENGTH bytes starting
|
3551 |
|
|
at OFFSET bytes into the data. The content and encoding of ANNEX
|
3552 |
|
|
is specific to OBJECT; it can supply additional details about what
|
3553 |
|
|
data to access.
|
3554 |
|
|
|
3555 |
|
|
Here are the specific requests of this form defined so far. All
|
3556 |
|
|
`qXfer:OBJECT:read:...' requests use the same reply formats,
|
3557 |
|
|
listed below.
|
3558 |
|
|
|
3559 |
|
|
`qXfer:auxv:read::OFFSET,LENGTH'
|
3560 |
|
|
Access the target's "auxiliary vector". *Note auxiliary
|
3561 |
|
|
vector: OS Information. Note ANNEX must be empty.
|
3562 |
|
|
|
3563 |
|
|
This packet is not probed by default; the remote stub must
|
3564 |
|
|
request it, by supplying an appropriate `qSupported' response
|
3565 |
|
|
(*note qSupported::).
|
3566 |
|
|
|
3567 |
|
|
`qXfer:features:read:ANNEX:OFFSET,LENGTH'
|
3568 |
|
|
Access the "target description". *Note Target
|
3569 |
|
|
Descriptions::. The annex specifies which XML document to
|
3570 |
|
|
access. The main description is always loaded from the
|
3571 |
|
|
`target.xml' annex.
|
3572 |
|
|
|
3573 |
|
|
This packet is not probed by default; the remote stub must
|
3574 |
|
|
request it, by supplying an appropriate `qSupported' response
|
3575 |
|
|
(*note qSupported::).
|
3576 |
|
|
|
3577 |
|
|
`qXfer:libraries:read:ANNEX:OFFSET,LENGTH'
|
3578 |
|
|
Access the target's list of loaded libraries. *Note Library
|
3579 |
|
|
List Format::. The annex part of the generic `qXfer' packet
|
3580 |
|
|
must be empty (*note qXfer read::).
|
3581 |
|
|
|
3582 |
|
|
Targets which maintain a list of libraries in the program's
|
3583 |
|
|
memory do not need to implement this packet; it is designed
|
3584 |
|
|
for platforms where the operating system manages the list of
|
3585 |
|
|
loaded libraries.
|
3586 |
|
|
|
3587 |
|
|
This packet is not probed by default; the remote stub must
|
3588 |
|
|
request it, by supplying an appropriate `qSupported' response
|
3589 |
|
|
(*note qSupported::).
|
3590 |
|
|
|
3591 |
|
|
`qXfer:memory-map:read::OFFSET,LENGTH'
|
3592 |
|
|
Access the target's "memory-map". *Note Memory Map Format::.
|
3593 |
|
|
The annex part of the generic `qXfer' packet must be empty
|
3594 |
|
|
(*note qXfer read::).
|
3595 |
|
|
|
3596 |
|
|
This packet is not probed by default; the remote stub must
|
3597 |
|
|
request it, by supplying an appropriate `qSupported' response
|
3598 |
|
|
(*note qSupported::).
|
3599 |
|
|
|
3600 |
|
|
`qXfer:siginfo:read::OFFSET,LENGTH'
|
3601 |
|
|
Read contents of the extra signal information on the target
|
3602 |
|
|
system. The annex part of the generic `qXfer' packet must be
|
3603 |
|
|
empty (*note qXfer read::).
|
3604 |
|
|
|
3605 |
|
|
This packet is not probed by default; the remote stub must
|
3606 |
|
|
request it, by supplying an appropriate `qSupported' response
|
3607 |
|
|
(*note qSupported::).
|
3608 |
|
|
|
3609 |
|
|
`qXfer:spu:read:ANNEX:OFFSET,LENGTH'
|
3610 |
|
|
Read contents of an `spufs' file on the target system. The
|
3611 |
|
|
annex specifies which file to read; it must be of the form
|
3612 |
|
|
`ID/NAME', where ID specifies an SPU context ID in the target
|
3613 |
|
|
process, and NAME identifes the `spufs' file in that context
|
3614 |
|
|
to be accessed.
|
3615 |
|
|
|
3616 |
|
|
This packet is not probed by default; the remote stub must
|
3617 |
|
|
request it, by supplying an appropriate `qSupported' response
|
3618 |
|
|
(*note qSupported::).
|
3619 |
|
|
|
3620 |
|
|
`qXfer:threads:read::OFFSET,LENGTH'
|
3621 |
|
|
Access the list of threads on target. *Note Thread List
|
3622 |
|
|
Format::. The annex part of the generic `qXfer' packet must
|
3623 |
|
|
be empty (*note qXfer read::).
|
3624 |
|
|
|
3625 |
|
|
This packet is not probed by default; the remote stub must
|
3626 |
|
|
request it, by supplying an appropriate `qSupported' response
|
3627 |
|
|
(*note qSupported::).
|
3628 |
|
|
|
3629 |
|
|
`qXfer:osdata:read::OFFSET,LENGTH'
|
3630 |
|
|
Access the target's "operating system information". *Note
|
3631 |
|
|
Operating System Information::.
|
3632 |
|
|
|
3633 |
|
|
|
3634 |
|
|
Reply:
|
3635 |
|
|
`m DATA'
|
3636 |
|
|
Data DATA (*note Binary Data::) has been read from the
|
3637 |
|
|
target. There may be more data at a higher address (although
|
3638 |
|
|
it is permitted to return `m' even for the last valid block
|
3639 |
|
|
of data, as long as at least one byte of data was read).
|
3640 |
|
|
DATA may have fewer bytes than the LENGTH in the request.
|
3641 |
|
|
|
3642 |
|
|
`l DATA'
|
3643 |
|
|
Data DATA (*note Binary Data::) has been read from the target.
|
3644 |
|
|
There is no more data to be read. DATA may have fewer bytes
|
3645 |
|
|
than the LENGTH in the request.
|
3646 |
|
|
|
3647 |
|
|
`l'
|
3648 |
|
|
The OFFSET in the request is at the end of the data. There
|
3649 |
|
|
is no more data to be read.
|
3650 |
|
|
|
3651 |
|
|
`E00'
|
3652 |
|
|
The request was malformed, or ANNEX was invalid.
|
3653 |
|
|
|
3654 |
|
|
`E NN'
|
3655 |
|
|
The offset was invalid, or there was an error encountered
|
3656 |
|
|
reading the data. NN is a hex-encoded `errno' value.
|
3657 |
|
|
|
3658 |
|
|
`'
|
3659 |
|
|
An empty reply indicates the OBJECT string was not recognized
|
3660 |
|
|
by the stub, or that the object does not support reading.
|
3661 |
|
|
|
3662 |
|
|
`qXfer:OBJECT:write:ANNEX:OFFSET:DATA...'
|
3663 |
|
|
Write uninterpreted bytes into the target's special data area
|
3664 |
|
|
identified by the keyword OBJECT, starting at OFFSET bytes into
|
3665 |
|
|
the data. DATA... is the binary-encoded data (*note Binary
|
3666 |
|
|
Data::) to be written. The content and encoding of ANNEX is
|
3667 |
|
|
specific to OBJECT; it can supply additional details about what
|
3668 |
|
|
data to access.
|
3669 |
|
|
|
3670 |
|
|
Here are the specific requests of this form defined so far. All
|
3671 |
|
|
`qXfer:OBJECT:write:...' requests use the same reply formats,
|
3672 |
|
|
listed below.
|
3673 |
|
|
|
3674 |
|
|
`qXfer:siginfo:write::OFFSET:DATA...'
|
3675 |
|
|
Write DATA to the extra signal information on the target
|
3676 |
|
|
system. The annex part of the generic `qXfer' packet must be
|
3677 |
|
|
empty (*note qXfer write::).
|
3678 |
|
|
|
3679 |
|
|
This packet is not probed by default; the remote stub must
|
3680 |
|
|
request it, by supplying an appropriate `qSupported' response
|
3681 |
|
|
(*note qSupported::).
|
3682 |
|
|
|
3683 |
|
|
`qXfer:spu:write:ANNEX:OFFSET:DATA...'
|
3684 |
|
|
Write DATA to an `spufs' file on the target system. The
|
3685 |
|
|
annex specifies which file to write; it must be of the form
|
3686 |
|
|
`ID/NAME', where ID specifies an SPU context ID in the target
|
3687 |
|
|
process, and NAME identifes the `spufs' file in that context
|
3688 |
|
|
to be accessed.
|
3689 |
|
|
|
3690 |
|
|
This packet is not probed by default; the remote stub must
|
3691 |
|
|
request it, by supplying an appropriate `qSupported' response
|
3692 |
|
|
(*note qSupported::).
|
3693 |
|
|
|
3694 |
|
|
Reply:
|
3695 |
|
|
`NN'
|
3696 |
|
|
NN (hex encoded) is the number of bytes written. This may be
|
3697 |
|
|
fewer bytes than supplied in the request.
|
3698 |
|
|
|
3699 |
|
|
`E00'
|
3700 |
|
|
The request was malformed, or ANNEX was invalid.
|
3701 |
|
|
|
3702 |
|
|
`E NN'
|
3703 |
|
|
The offset was invalid, or there was an error encountered
|
3704 |
|
|
writing the data. NN is a hex-encoded `errno' value.
|
3705 |
|
|
|
3706 |
|
|
`'
|
3707 |
|
|
An empty reply indicates the OBJECT string was not recognized
|
3708 |
|
|
by the stub, or that the object does not support writing.
|
3709 |
|
|
|
3710 |
|
|
`qXfer:OBJECT:OPERATION:...'
|
3711 |
|
|
Requests of this form may be added in the future. When a stub does
|
3712 |
|
|
not recognize the OBJECT keyword, or its support for OBJECT does
|
3713 |
|
|
not recognize the OPERATION keyword, the stub must respond with an
|
3714 |
|
|
empty packet.
|
3715 |
|
|
|
3716 |
|
|
`qAttached:PID'
|
3717 |
|
|
Return an indication of whether the remote server attached to an
|
3718 |
|
|
existing process or created a new process. When the multiprocess
|
3719 |
|
|
protocol extensions are supported (*note multiprocess
|
3720 |
|
|
extensions::), PID is an integer in hexadecimal format identifying
|
3721 |
|
|
the target process. Otherwise, GDB will omit the PID field and
|
3722 |
|
|
the query packet will be simplified as `qAttached'.
|
3723 |
|
|
|
3724 |
|
|
This query is used, for example, to know whether the remote process
|
3725 |
|
|
should be detached or killed when a GDB session is ended with the
|
3726 |
|
|
`quit' command.
|
3727 |
|
|
|
3728 |
|
|
Reply:
|
3729 |
|
|
`1'
|
3730 |
|
|
The remote server attached to an existing process.
|
3731 |
|
|
|
3732 |
|
|
`0'
|
3733 |
|
|
The remote server created a new process.
|
3734 |
|
|
|
3735 |
|
|
`E NN'
|
3736 |
|
|
A badly formed request or an error was encountered.
|
3737 |
|
|
|
3738 |
|
|
|
3739 |
|
|
---------- Footnotes ----------
|
3740 |
|
|
|
3741 |
|
|
(1) The `qP' and `qL' packets predate these conventions, and have
|
3742 |
|
|
arguments without any terminator for the packet name; we suspect they
|
3743 |
|
|
are in widespread use in places that are difficult to upgrade. The
|
3744 |
|
|
`qC' packet has no arguments, but some existing stubs (e.g. RedBoot)
|
3745 |
|
|
are known to not check for the end of the packet.
|
3746 |
|
|
|
3747 |
|
|
|
3748 |
|
|
File: gdb.info, Node: Architecture-Specific Protocol Details, Next: Tracepoint Packets, Prev: General Query Packets, Up: Remote Protocol
|
3749 |
|
|
|
3750 |
|
|
D.5 Architecture-Specific Protocol Details
|
3751 |
|
|
==========================================
|
3752 |
|
|
|
3753 |
|
|
This section describes how the remote protocol is applied to specific
|
3754 |
|
|
target architectures. Also see *Note Standard Target Features::, for
|
3755 |
|
|
details of XML target descriptions for each architecture.
|
3756 |
|
|
|
3757 |
|
|
D.5.1 ARM
|
3758 |
|
|
---------
|
3759 |
|
|
|
3760 |
|
|
D.5.1.1 Breakpoint Kinds
|
3761 |
|
|
........................
|
3762 |
|
|
|
3763 |
|
|
These breakpoint kinds are defined for the `Z0' and `Z1' packets.
|
3764 |
|
|
|
3765 |
|
|
2
|
3766 |
|
|
16-bit Thumb mode breakpoint.
|
3767 |
|
|
|
3768 |
|
|
3
|
3769 |
|
|
32-bit Thumb mode (Thumb-2) breakpoint.
|
3770 |
|
|
|
3771 |
|
|
4
|
3772 |
|
|
32-bit ARM mode breakpoint.
|
3773 |
|
|
|
3774 |
|
|
|
3775 |
|
|
D.5.2 MIPS
|
3776 |
|
|
----------
|
3777 |
|
|
|
3778 |
|
|
D.5.2.1 Register Packet Format
|
3779 |
|
|
..............................
|
3780 |
|
|
|
3781 |
|
|
The following `g'/`G' packets have previously been defined. In the
|
3782 |
|
|
below, some thirty-two bit registers are transferred as sixty-four
|
3783 |
|
|
bits. Those registers should be zero/sign extended (which?) to fill
|
3784 |
|
|
the space allocated. Register bytes are transferred in target byte
|
3785 |
|
|
order. The two nibbles within a register byte are transferred
|
3786 |
|
|
most-significant - least-significant.
|
3787 |
|
|
|
3788 |
|
|
MIPS32
|
3789 |
|
|
All registers are transferred as thirty-two bit quantities in the
|
3790 |
|
|
order: 32 general-purpose; sr; lo; hi; bad; cause; pc; 32
|
3791 |
|
|
floating-point registers; fsr; fir; fp.
|
3792 |
|
|
|
3793 |
|
|
MIPS64
|
3794 |
|
|
All registers are transferred as sixty-four bit quantities
|
3795 |
|
|
(including thirty-two bit registers such as `sr'). The ordering
|
3796 |
|
|
is the same as `MIPS32'.
|
3797 |
|
|
|
3798 |
|
|
|
3799 |
|
|
|
3800 |
|
|
File: gdb.info, Node: Tracepoint Packets, Next: Host I/O Packets, Prev: Architecture-Specific Protocol Details, Up: Remote Protocol
|
3801 |
|
|
|
3802 |
|
|
D.6 Tracepoint Packets
|
3803 |
|
|
======================
|
3804 |
|
|
|
3805 |
|
|
Here we describe the packets GDB uses to implement tracepoints (*note
|
3806 |
|
|
Tracepoints::).
|
3807 |
|
|
|
3808 |
|
|
`QTDP:N:ADDR:ENA:STEP:PASS[:FFLEN][:XLEN,BYTES][-]'
|
3809 |
|
|
Create a new tracepoint, number N, at ADDR. If ENA is `E', then
|
3810 |
|
|
the tracepoint is enabled; if it is `D', then the tracepoint is
|
3811 |
|
|
disabled. STEP is the tracepoint's step count, and PASS is its
|
3812 |
|
|
pass count. If an `F' is present, then the tracepoint is to be a
|
3813 |
|
|
fast tracepoint, and the FLEN is the number of bytes that the
|
3814 |
|
|
target should copy elsewhere to make room for the tracepoint. If
|
3815 |
|
|
an `X' is present, it introduces a tracepoint condition, which
|
3816 |
|
|
consists of a hexadecimal length, followed by a comma and
|
3817 |
|
|
hex-encoded bytes, in a manner similar to action encodings as
|
3818 |
|
|
described below. If the trailing `-' is present, further `QTDP'
|
3819 |
|
|
packets will follow to specify this tracepoint's actions.
|
3820 |
|
|
|
3821 |
|
|
Replies:
|
3822 |
|
|
`OK'
|
3823 |
|
|
The packet was understood and carried out.
|
3824 |
|
|
|
3825 |
|
|
`'
|
3826 |
|
|
The packet was not recognized.
|
3827 |
|
|
|
3828 |
|
|
`QTDP:-N:ADDR:[S]ACTION...[-]'
|
3829 |
|
|
Define actions to be taken when a tracepoint is hit. N and ADDR
|
3830 |
|
|
must be the same as in the initial `QTDP' packet for this
|
3831 |
|
|
tracepoint. This packet may only be sent immediately after
|
3832 |
|
|
another `QTDP' packet that ended with a `-'. If the trailing `-'
|
3833 |
|
|
is present, further `QTDP' packets will follow, specifying more
|
3834 |
|
|
actions for this tracepoint.
|
3835 |
|
|
|
3836 |
|
|
In the series of action packets for a given tracepoint, at most one
|
3837 |
|
|
can have an `S' before its first ACTION. If such a packet is
|
3838 |
|
|
sent, it and the following packets define "while-stepping"
|
3839 |
|
|
actions. Any prior packets define ordinary actions -- that is,
|
3840 |
|
|
those taken when the tracepoint is first hit. If no action packet
|
3841 |
|
|
has an `S', then all the packets in the series specify ordinary
|
3842 |
|
|
tracepoint actions.
|
3843 |
|
|
|
3844 |
|
|
The `ACTION...' portion of the packet is a series of actions,
|
3845 |
|
|
concatenated without separators. Each action has one of the
|
3846 |
|
|
following forms:
|
3847 |
|
|
|
3848 |
|
|
`R MASK'
|
3849 |
|
|
Collect the registers whose bits are set in MASK. MASK is a
|
3850 |
|
|
hexadecimal number whose I'th bit is set if register number I
|
3851 |
|
|
should be collected. (The least significant bit is numbered
|
3852 |
|
|
zero.) Note that MASK may be any number of digits long; it
|
3853 |
|
|
may not fit in a 32-bit word.
|
3854 |
|
|
|
3855 |
|
|
`M BASEREG,OFFSET,LEN'
|
3856 |
|
|
Collect LEN bytes of memory starting at the address in
|
3857 |
|
|
register number BASEREG, plus OFFSET. If BASEREG is `-1',
|
3858 |
|
|
then the range has a fixed address: OFFSET is the address of
|
3859 |
|
|
the lowest byte to collect. The BASEREG, OFFSET, and LEN
|
3860 |
|
|
parameters are all unsigned hexadecimal values (the `-1'
|
3861 |
|
|
value for BASEREG is a special case).
|
3862 |
|
|
|
3863 |
|
|
`X LEN,EXPR'
|
3864 |
|
|
Evaluate EXPR, whose length is LEN, and collect memory as it
|
3865 |
|
|
directs. EXPR is an agent expression, as described in *Note
|
3866 |
|
|
Agent Expressions::. Each byte of the expression is encoded
|
3867 |
|
|
as a two-digit hex number in the packet; LEN is the number of
|
3868 |
|
|
bytes in the expression (and thus one-half the number of hex
|
3869 |
|
|
digits in the packet).
|
3870 |
|
|
|
3871 |
|
|
|
3872 |
|
|
Any number of actions may be packed together in a single `QTDP'
|
3873 |
|
|
packet, as long as the packet does not exceed the maximum packet
|
3874 |
|
|
length (400 bytes, for many stubs). There may be only one `R'
|
3875 |
|
|
action per tracepoint, and it must precede any `M' or `X' actions.
|
3876 |
|
|
Any registers referred to by `M' and `X' actions must be
|
3877 |
|
|
collected by a preceding `R' action. (The "while-stepping"
|
3878 |
|
|
actions are treated as if they were attached to a separate
|
3879 |
|
|
tracepoint, as far as these restrictions are concerned.)
|
3880 |
|
|
|
3881 |
|
|
Replies:
|
3882 |
|
|
`OK'
|
3883 |
|
|
The packet was understood and carried out.
|
3884 |
|
|
|
3885 |
|
|
`'
|
3886 |
|
|
The packet was not recognized.
|
3887 |
|
|
|
3888 |
|
|
`QTDV:N:VALUE'
|
3889 |
|
|
Create a new trace state variable, number N, with an initial value
|
3890 |
|
|
of VALUE, which is a 64-bit signed integer. Both N and VALUE are
|
3891 |
|
|
encoded as hexadecimal values. GDB has the option of not using
|
3892 |
|
|
this packet for initial values of zero; the target should simply
|
3893 |
|
|
create the trace state variables as they are mentioned in
|
3894 |
|
|
expressions.
|
3895 |
|
|
|
3896 |
|
|
`QTFrame:N'
|
3897 |
|
|
Select the N'th tracepoint frame from the buffer, and use the
|
3898 |
|
|
register and memory contents recorded there to answer subsequent
|
3899 |
|
|
request packets from GDB.
|
3900 |
|
|
|
3901 |
|
|
A successful reply from the stub indicates that the stub has found
|
3902 |
|
|
the requested frame. The response is a series of parts,
|
3903 |
|
|
concatenated without separators, describing the frame we selected.
|
3904 |
|
|
Each part has one of the following forms:
|
3905 |
|
|
|
3906 |
|
|
`F F'
|
3907 |
|
|
The selected frame is number N in the trace frame buffer; F
|
3908 |
|
|
is a hexadecimal number. If F is `-1', then there was no
|
3909 |
|
|
frame matching the criteria in the request packet.
|
3910 |
|
|
|
3911 |
|
|
`T T'
|
3912 |
|
|
The selected trace frame records a hit of tracepoint number T;
|
3913 |
|
|
T is a hexadecimal number.
|
3914 |
|
|
|
3915 |
|
|
|
3916 |
|
|
`QTFrame:pc:ADDR'
|
3917 |
|
|
Like `QTFrame:N', but select the first tracepoint frame after the
|
3918 |
|
|
currently selected frame whose PC is ADDR; ADDR is a hexadecimal
|
3919 |
|
|
number.
|
3920 |
|
|
|
3921 |
|
|
`QTFrame:tdp:T'
|
3922 |
|
|
Like `QTFrame:N', but select the first tracepoint frame after the
|
3923 |
|
|
currently selected frame that is a hit of tracepoint T; T is a
|
3924 |
|
|
hexadecimal number.
|
3925 |
|
|
|
3926 |
|
|
`QTFrame:range:START:END'
|
3927 |
|
|
Like `QTFrame:N', but select the first tracepoint frame after the
|
3928 |
|
|
currently selected frame whose PC is between START (inclusive) and
|
3929 |
|
|
END (inclusive); START and END are hexadecimal numbers.
|
3930 |
|
|
|
3931 |
|
|
`QTFrame:outside:START:END'
|
3932 |
|
|
Like `QTFrame:range:START:END', but select the first frame
|
3933 |
|
|
_outside_ the given range of addresses (exclusive).
|
3934 |
|
|
|
3935 |
|
|
`QTStart'
|
3936 |
|
|
Begin the tracepoint experiment. Begin collecting data from
|
3937 |
|
|
tracepoint hits in the trace frame buffer.
|
3938 |
|
|
|
3939 |
|
|
`QTStop'
|
3940 |
|
|
End the tracepoint experiment. Stop collecting trace frames.
|
3941 |
|
|
|
3942 |
|
|
`QTinit'
|
3943 |
|
|
Clear the table of tracepoints, and empty the trace frame buffer.
|
3944 |
|
|
|
3945 |
|
|
`QTro:START1,END1:START2,END2:...'
|
3946 |
|
|
Establish the given ranges of memory as "transparent". The stub
|
3947 |
|
|
will answer requests for these ranges from memory's current
|
3948 |
|
|
contents, if they were not collected as part of the tracepoint hit.
|
3949 |
|
|
|
3950 |
|
|
GDB uses this to mark read-only regions of memory, like those
|
3951 |
|
|
containing program code. Since these areas never change, they
|
3952 |
|
|
should still have the same contents they did when the tracepoint
|
3953 |
|
|
was hit, so there's no reason for the stub to refuse to provide
|
3954 |
|
|
their contents.
|
3955 |
|
|
|
3956 |
|
|
`QTDisconnected:VALUE'
|
3957 |
|
|
Set the choice to what to do with the tracing run when GDB
|
3958 |
|
|
disconnects from the target. A VALUE of 1 directs the target to
|
3959 |
|
|
continue the tracing run, while 0 tells the target to stop tracing
|
3960 |
|
|
if GDB is no longer in the picture.
|
3961 |
|
|
|
3962 |
|
|
`qTStatus'
|
3963 |
|
|
Ask the stub if there is a trace experiment running right now.
|
3964 |
|
|
|
3965 |
|
|
Replies:
|
3966 |
|
|
`T0'
|
3967 |
|
|
There is no trace experiment running.
|
3968 |
|
|
|
3969 |
|
|
`T1'
|
3970 |
|
|
There is a trace experiment running.
|
3971 |
|
|
|
3972 |
|
|
`qTV:VAR'
|
3973 |
|
|
Ask the stub for the value of the trace state variable number VAR.
|
3974 |
|
|
|
3975 |
|
|
Replies:
|
3976 |
|
|
`VVALUE'
|
3977 |
|
|
The value of the variable is VALUE. This will be the current
|
3978 |
|
|
value of the variable if the user is examining a running
|
3979 |
|
|
target, or a saved value if the variable was collected in the
|
3980 |
|
|
trace frame that the user is looking at. Note that multiple
|
3981 |
|
|
requests may result in different reply values, such as when
|
3982 |
|
|
requesting values while the program is running.
|
3983 |
|
|
|
3984 |
|
|
`U'
|
3985 |
|
|
The value of the variable is unknown. This would occur, for
|
3986 |
|
|
example, if the user is examining a trace frame in which the
|
3987 |
|
|
requested variable was not collected.
|
3988 |
|
|
|
3989 |
|
|
`qTfP'
|
3990 |
|
|
`qTsP'
|
3991 |
|
|
These packets request data about tracepoints that are being used by
|
3992 |
|
|
the target. GDB sends `qTfP' to get the first piece of data, and
|
3993 |
|
|
multiple `qTsP' to get additional pieces. Replies to these
|
3994 |
|
|
packets generally take the form of the `QTDP' packets that define
|
3995 |
|
|
tracepoints. (FIXME add detailed syntax)
|
3996 |
|
|
|
3997 |
|
|
`qTfV'
|
3998 |
|
|
`qTsV'
|
3999 |
|
|
These packets request data about trace state variables that are on
|
4000 |
|
|
the target. GDB sends `qTfV' to get the first vari of data, and
|
4001 |
|
|
multiple `qTsV' to get additional variables. Replies to these
|
4002 |
|
|
packets follow the syntax of the `QTDV' packets that define trace
|
4003 |
|
|
state variables.
|
4004 |
|
|
|
4005 |
|
|
`QTSave:FILENAME'
|
4006 |
|
|
This packet directs the target to save trace data to the file name
|
4007 |
|
|
FILENAME in the target's filesystem. FILENAME is encoded as a hex
|
4008 |
|
|
string; the interpretation of the file name (relative vs absolute,
|
4009 |
|
|
wild cards, etc) is up to the target.
|
4010 |
|
|
|
4011 |
|
|
`qTBuffer:OFFSET,LEN'
|
4012 |
|
|
Return up to LEN bytes of the current contents of trace buffer,
|
4013 |
|
|
starting at OFFSET. The trace buffer is treated as if it were a
|
4014 |
|
|
contiguous collection of traceframes, as per the trace file format.
|
4015 |
|
|
The reply consists as many hex-encoded bytes as the target can
|
4016 |
|
|
deliver in a packet; it is not an error to return fewer than were
|
4017 |
|
|
asked for. A reply consisting of just `l' indicates that no bytes
|
4018 |
|
|
are available.
|
4019 |
|
|
|
4020 |
|
|
|
4021 |
|
|
|
4022 |
|
|
File: gdb.info, Node: Host I/O Packets, Next: Interrupts, Prev: Tracepoint Packets, Up: Remote Protocol
|
4023 |
|
|
|
4024 |
|
|
D.7 Host I/O Packets
|
4025 |
|
|
====================
|
4026 |
|
|
|
4027 |
|
|
The "Host I/O" packets allow GDB to perform I/O operations on the far
|
4028 |
|
|
side of a remote link. For example, Host I/O is used to upload and
|
4029 |
|
|
download files to a remote target with its own filesystem. Host I/O
|
4030 |
|
|
uses the same constant values and data structure layout as the
|
4031 |
|
|
target-initiated File-I/O protocol. However, the Host I/O packets are
|
4032 |
|
|
structured differently. The target-initiated protocol relies on target
|
4033 |
|
|
memory to store parameters and buffers. Host I/O requests are
|
4034 |
|
|
initiated by GDB, and the target's memory is not involved. *Note
|
4035 |
|
|
File-I/O Remote Protocol Extension::, for more details on the
|
4036 |
|
|
target-initiated protocol.
|
4037 |
|
|
|
4038 |
|
|
The Host I/O request packets all encode a single operation along with
|
4039 |
|
|
its arguments. They have this format:
|
4040 |
|
|
|
4041 |
|
|
`vFile:OPERATION: PARAMETER...'
|
4042 |
|
|
OPERATION is the name of the particular request; the target should
|
4043 |
|
|
compare the entire packet name up to the second colon when checking
|
4044 |
|
|
for a supported operation. The format of PARAMETER depends on the
|
4045 |
|
|
operation. Numbers are always passed in hexadecimal. Negative
|
4046 |
|
|
numbers have an explicit minus sign (i.e. two's complement is not
|
4047 |
|
|
used). Strings (e.g. filenames) are encoded as a series of
|
4048 |
|
|
hexadecimal bytes. The last argument to a system call may be a
|
4049 |
|
|
buffer of escaped binary data (*note Binary Data::).
|
4050 |
|
|
|
4051 |
|
|
|
4052 |
|
|
The valid responses to Host I/O packets are:
|
4053 |
|
|
|
4054 |
|
|
`F RESULT [, ERRNO] [; ATTACHMENT]'
|
4055 |
|
|
RESULT is the integer value returned by this operation, usually
|
4056 |
|
|
non-negative for success and -1 for errors. If an error has
|
4057 |
|
|
occured, ERRNO will be included in the result. ERRNO will have a
|
4058 |
|
|
value defined by the File-I/O protocol (*note Errno Values::). For
|
4059 |
|
|
operations which return data, ATTACHMENT supplies the data as a
|
4060 |
|
|
binary buffer. Binary buffers in response packets are escaped in
|
4061 |
|
|
the normal way (*note Binary Data::). See the individual packet
|
4062 |
|
|
documentation for the interpretation of RESULT and ATTACHMENT.
|
4063 |
|
|
|
4064 |
|
|
`'
|
4065 |
|
|
An empty response indicates that this operation is not recognized.
|
4066 |
|
|
|
4067 |
|
|
|
4068 |
|
|
These are the supported Host I/O operations:
|
4069 |
|
|
|
4070 |
|
|
`vFile:open: PATHNAME, FLAGS, MODE'
|
4071 |
|
|
Open a file at PATHNAME and return a file descriptor for it, or
|
4072 |
|
|
return -1 if an error occurs. PATHNAME is a string, FLAGS is an
|
4073 |
|
|
integer indicating a mask of open flags (*note Open Flags::), and
|
4074 |
|
|
MODE is an integer indicating a mask of mode bits to use if the
|
4075 |
|
|
file is created (*note mode_t Values::). *Note open::, for
|
4076 |
|
|
details of the open flags and mode values.
|
4077 |
|
|
|
4078 |
|
|
`vFile:close: FD'
|
4079 |
|
|
Close the open file corresponding to FD and return 0, or -1 if an
|
4080 |
|
|
error occurs.
|
4081 |
|
|
|
4082 |
|
|
`vFile:pread: FD, COUNT, OFFSET'
|
4083 |
|
|
Read data from the open file corresponding to FD. Up to COUNT
|
4084 |
|
|
bytes will be read from the file, starting at OFFSET relative to
|
4085 |
|
|
the start of the file. The target may read fewer bytes; common
|
4086 |
|
|
reasons include packet size limits and an end-of-file condition.
|
4087 |
|
|
The number of bytes read is returned. Zero should only be
|
4088 |
|
|
returned for a successful read at the end of the file, or if COUNT
|
4089 |
|
|
was zero.
|
4090 |
|
|
|
4091 |
|
|
The data read should be returned as a binary attachment on success.
|
4092 |
|
|
If zero bytes were read, the response should include an empty
|
4093 |
|
|
binary attachment (i.e. a trailing semicolon). The return value
|
4094 |
|
|
is the number of target bytes read; the binary attachment may be
|
4095 |
|
|
longer if some characters were escaped.
|
4096 |
|
|
|
4097 |
|
|
`vFile:pwrite: FD, OFFSET, DATA'
|
4098 |
|
|
Write DATA (a binary buffer) to the open file corresponding to FD.
|
4099 |
|
|
Start the write at OFFSET from the start of the file. Unlike
|
4100 |
|
|
many `write' system calls, there is no separate COUNT argument;
|
4101 |
|
|
the length of DATA in the packet is used. `vFile:write' returns
|
4102 |
|
|
the number of bytes written, which may be shorter than the length
|
4103 |
|
|
of DATA, or -1 if an error occurred.
|
4104 |
|
|
|
4105 |
|
|
`vFile:unlink: PATHNAME'
|
4106 |
|
|
Delete the file at PATHNAME on the target. Return 0, or -1 if an
|
4107 |
|
|
error occurs. PATHNAME is a string.
|
4108 |
|
|
|
4109 |
|
|
|
4110 |
|
|
|
4111 |
|
|
File: gdb.info, Node: Interrupts, Next: Notification Packets, Prev: Host I/O Packets, Up: Remote Protocol
|
4112 |
|
|
|
4113 |
|
|
D.8 Interrupts
|
4114 |
|
|
==============
|
4115 |
|
|
|
4116 |
|
|
When a program on the remote target is running, GDB may attempt to
|
4117 |
|
|
interrupt it by sending a `Ctrl-C', `BREAK' or a `BREAK' followed by
|
4118 |
|
|
`g', control of which is specified via GDB's `interrupt-sequence'.
|
4119 |
|
|
|
4120 |
|
|
The precise meaning of `BREAK' is defined by the transport mechanism
|
4121 |
|
|
and may, in fact, be undefined. GDB does not currently define a
|
4122 |
|
|
`BREAK' mechanism for any of the network interfaces except for TCP, in
|
4123 |
|
|
which case GDB sends the `telnet' BREAK sequence.
|
4124 |
|
|
|
4125 |
|
|
`Ctrl-C', on the other hand, is defined and implemented for all
|
4126 |
|
|
transport mechanisms. It is represented by sending the single byte
|
4127 |
|
|
`0x03' without any of the usual packet overhead described in the
|
4128 |
|
|
Overview section (*note Overview::). When a `0x03' byte is transmitted
|
4129 |
|
|
as part of a packet, it is considered to be packet data and does _not_
|
4130 |
|
|
represent an interrupt. E.g., an `X' packet (*note X packet::), used
|
4131 |
|
|
for binary downloads, may include an unescaped `0x03' as part of its
|
4132 |
|
|
packet.
|
4133 |
|
|
|
4134 |
|
|
`BREAK' followed by `g' is also known as Magic SysRq g. When Linux
|
4135 |
|
|
kernel receives this sequence from serial port, it stops execution and
|
4136 |
|
|
connects to gdb.
|
4137 |
|
|
|
4138 |
|
|
Stubs are not required to recognize these interrupt mechanisms and
|
4139 |
|
|
the precise meaning associated with receipt of the interrupt is
|
4140 |
|
|
implementation defined. If the target supports debugging of multiple
|
4141 |
|
|
threads and/or processes, it should attempt to interrupt all
|
4142 |
|
|
currently-executing threads and processes. If the stub is successful
|
4143 |
|
|
at interrupting the running program, it should send one of the stop
|
4144 |
|
|
reply packets (*note Stop Reply Packets::) to GDB as a result of
|
4145 |
|
|
successfully stopping the program in all-stop mode, and a stop reply
|
4146 |
|
|
for each stopped thread in non-stop mode. Interrupts received while the
|
4147 |
|
|
program is stopped are discarded.
|
4148 |
|
|
|
4149 |
|
|
|
4150 |
|
|
File: gdb.info, Node: Notification Packets, Next: Remote Non-Stop, Prev: Interrupts, Up: Remote Protocol
|
4151 |
|
|
|
4152 |
|
|
D.9 Notification Packets
|
4153 |
|
|
========================
|
4154 |
|
|
|
4155 |
|
|
The GDB remote serial protocol includes "notifications", packets that
|
4156 |
|
|
require no acknowledgment. Both the GDB and the stub may send
|
4157 |
|
|
notifications (although the only notifications defined at present are
|
4158 |
|
|
sent by the stub). Notifications carry information without incurring
|
4159 |
|
|
the round-trip latency of an acknowledgment, and so are useful for
|
4160 |
|
|
low-impact communications where occasional packet loss is not a problem.
|
4161 |
|
|
|
4162 |
|
|
A notification packet has the form `% DATA # CHECKSUM', where DATA
|
4163 |
|
|
is the content of the notification, and CHECKSUM is a checksum of DATA,
|
4164 |
|
|
computed and formatted as for ordinary GDB packets. A notification's
|
4165 |
|
|
DATA never contains `$', `%' or `#' characters. Upon receiving a
|
4166 |
|
|
notification, the recipient sends no `+' or `-' to acknowledge the
|
4167 |
|
|
notification's receipt or to report its corruption.
|
4168 |
|
|
|
4169 |
|
|
Every notification's DATA begins with a name, which contains no
|
4170 |
|
|
colon characters, followed by a colon character.
|
4171 |
|
|
|
4172 |
|
|
Recipients should silently ignore corrupted notifications and
|
4173 |
|
|
notifications they do not understand. Recipients should restart
|
4174 |
|
|
timeout periods on receipt of a well-formed notification, whether or
|
4175 |
|
|
not they understand it.
|
4176 |
|
|
|
4177 |
|
|
Senders should only send the notifications described here when this
|
4178 |
|
|
protocol description specifies that they are permitted. In the future,
|
4179 |
|
|
we may extend the protocol to permit existing notifications in new
|
4180 |
|
|
contexts; this rule helps older senders avoid confusing newer
|
4181 |
|
|
recipients.
|
4182 |
|
|
|
4183 |
|
|
(Older versions of GDB ignore bytes received until they see the `$'
|
4184 |
|
|
byte that begins an ordinary packet, so new stubs may transmit
|
4185 |
|
|
notifications without fear of confusing older clients. There are no
|
4186 |
|
|
notifications defined for GDB to send at the moment, but we assume that
|
4187 |
|
|
most older stubs would ignore them, as well.)
|
4188 |
|
|
|
4189 |
|
|
The following notification packets from the stub to GDB are defined:
|
4190 |
|
|
|
4191 |
|
|
`Stop: REPLY'
|
4192 |
|
|
Report an asynchronous stop event in non-stop mode. The REPLY has
|
4193 |
|
|
the form of a stop reply, as described in *Note Stop Reply
|
4194 |
|
|
Packets::. Refer to *Note Remote Non-Stop::, for information on
|
4195 |
|
|
how these notifications are acknowledged by GDB.
|
4196 |
|
|
|
4197 |
|
|
|
4198 |
|
|
File: gdb.info, Node: Remote Non-Stop, Next: Packet Acknowledgment, Prev: Notification Packets, Up: Remote Protocol
|
4199 |
|
|
|
4200 |
|
|
D.10 Remote Protocol Support for Non-Stop Mode
|
4201 |
|
|
==============================================
|
4202 |
|
|
|
4203 |
|
|
GDB's remote protocol supports non-stop debugging of multi-threaded
|
4204 |
|
|
programs, as described in *Note Non-Stop Mode::. If the stub supports
|
4205 |
|
|
non-stop mode, it should report that to GDB by including `QNonStop+' in
|
4206 |
|
|
its `qSupported' response (*note qSupported::).
|
4207 |
|
|
|
4208 |
|
|
GDB typically sends a `QNonStop' packet only when establishing a new
|
4209 |
|
|
connection with the stub. Entering non-stop mode does not alter the
|
4210 |
|
|
state of any currently-running threads, but targets must stop all
|
4211 |
|
|
threads in any already-attached processes when entering all-stop mode.
|
4212 |
|
|
GDB uses the `?' packet as necessary to probe the target state after a
|
4213 |
|
|
mode change.
|
4214 |
|
|
|
4215 |
|
|
In non-stop mode, when an attached process encounters an event that
|
4216 |
|
|
would otherwise be reported with a stop reply, it uses the asynchronous
|
4217 |
|
|
notification mechanism (*note Notification Packets::) to inform GDB.
|
4218 |
|
|
In contrast to all-stop mode, where all threads in all processes are
|
4219 |
|
|
stopped when a stop reply is sent, in non-stop mode only the thread
|
4220 |
|
|
reporting the stop event is stopped. That is, when reporting a `S' or
|
4221 |
|
|
`T' response to indicate completion of a step operation, hitting a
|
4222 |
|
|
breakpoint, or a fault, only the affected thread is stopped; any other
|
4223 |
|
|
still-running threads continue to run. When reporting a `W' or `X'
|
4224 |
|
|
response, all running threads belonging to other attached processes
|
4225 |
|
|
continue to run.
|
4226 |
|
|
|
4227 |
|
|
Only one stop reply notification at a time may be pending; if
|
4228 |
|
|
additional stop events occur before GDB has acknowledged the previous
|
4229 |
|
|
notification, they must be queued by the stub for later synchronous
|
4230 |
|
|
transmission in response to `vStopped' packets from GDB. Because the
|
4231 |
|
|
notification mechanism is unreliable, the stub is permitted to resend a
|
4232 |
|
|
stop reply notification if it believes GDB may not have received it.
|
4233 |
|
|
GDB ignores additional stop reply notifications received before it has
|
4234 |
|
|
finished processing a previous notification and the stub has completed
|
4235 |
|
|
sending any queued stop events.
|
4236 |
|
|
|
4237 |
|
|
Otherwise, GDB must be prepared to receive a stop reply notification
|
4238 |
|
|
at any time. Specifically, they may appear when GDB is not otherwise
|
4239 |
|
|
reading input from the stub, or when GDB is expecting to read a normal
|
4240 |
|
|
synchronous response or a `+'/`-' acknowledgment to a packet it has
|
4241 |
|
|
sent. Notification packets are distinct from any other communication
|
4242 |
|
|
from the stub so there is no ambiguity.
|
4243 |
|
|
|
4244 |
|
|
After receiving a stop reply notification, GDB shall acknowledge it
|
4245 |
|
|
by sending a `vStopped' packet (*note vStopped packet::) as a regular,
|
4246 |
|
|
synchronous request to the stub. Such acknowledgment is not required
|
4247 |
|
|
to happen immediately, as GDB is permitted to send other, unrelated
|
4248 |
|
|
packets to the stub first, which the stub should process normally.
|
4249 |
|
|
|
4250 |
|
|
Upon receiving a `vStopped' packet, if the stub has other queued
|
4251 |
|
|
stop events to report to GDB, it shall respond by sending a normal stop
|
4252 |
|
|
reply response. GDB shall then send another `vStopped' packet to
|
4253 |
|
|
solicit further responses; again, it is permitted to send other,
|
4254 |
|
|
unrelated packets as well which the stub should process normally.
|
4255 |
|
|
|
4256 |
|
|
If the stub receives a `vStopped' packet and there are no additional
|
4257 |
|
|
stop events to report, the stub shall return an `OK' response. At this
|
4258 |
|
|
point, if further stop events occur, the stub shall send a new stop
|
4259 |
|
|
reply notification, GDB shall accept the notification, and the process
|
4260 |
|
|
shall be repeated.
|
4261 |
|
|
|
4262 |
|
|
In non-stop mode, the target shall respond to the `?' packet as
|
4263 |
|
|
follows. First, any incomplete stop reply notification/`vStopped'
|
4264 |
|
|
sequence in progress is abandoned. The target must begin a new
|
4265 |
|
|
sequence reporting stop events for all stopped threads, whether or not
|
4266 |
|
|
it has previously reported those events to GDB. The first stop reply
|
4267 |
|
|
is sent as a synchronous reply to the `?' packet, and subsequent stop
|
4268 |
|
|
replies are sent as responses to `vStopped' packets using the mechanism
|
4269 |
|
|
described above. The target must not send asynchronous stop reply
|
4270 |
|
|
notifications until the sequence is complete. If all threads are
|
4271 |
|
|
running when the target receives the `?' packet, or if the target is
|
4272 |
|
|
not attached to any process, it shall respond `OK'.
|
4273 |
|
|
|
4274 |
|
|
|
4275 |
|
|
File: gdb.info, Node: Packet Acknowledgment, Next: Examples, Prev: Remote Non-Stop, Up: Remote Protocol
|
4276 |
|
|
|
4277 |
|
|
D.11 Packet Acknowledgment
|
4278 |
|
|
==========================
|
4279 |
|
|
|
4280 |
|
|
By default, when either the host or the target machine receives a
|
4281 |
|
|
packet, the first response expected is an acknowledgment: either `+'
|
4282 |
|
|
(to indicate the package was received correctly) or `-' (to request
|
4283 |
|
|
retransmission). This mechanism allows the GDB remote protocol to
|
4284 |
|
|
operate over unreliable transport mechanisms, such as a serial line.
|
4285 |
|
|
|
4286 |
|
|
In cases where the transport mechanism is itself reliable (such as a
|
4287 |
|
|
pipe or TCP connection), the `+'/`-' acknowledgments are redundant. It
|
4288 |
|
|
may be desirable to disable them in that case to reduce communication
|
4289 |
|
|
overhead, or for other reasons. This can be accomplished by means of
|
4290 |
|
|
the `QStartNoAckMode' packet; *note QStartNoAckMode::.
|
4291 |
|
|
|
4292 |
|
|
When in no-acknowledgment mode, neither the stub nor GDB shall send
|
4293 |
|
|
or expect `+'/`-' protocol acknowledgments. The packet and response
|
4294 |
|
|
format still includes the normal checksum, as described in *Note
|
4295 |
|
|
Overview::, but the checksum may be ignored by the receiver.
|
4296 |
|
|
|
4297 |
|
|
If the stub supports `QStartNoAckMode' and prefers to operate in
|
4298 |
|
|
no-acknowledgment mode, it should report that to GDB by including
|
4299 |
|
|
`QStartNoAckMode+' in its response to `qSupported'; *note qSupported::.
|
4300 |
|
|
If GDB also supports `QStartNoAckMode' and it has not been disabled via
|
4301 |
|
|
the `set remote noack-packet off' command (*note Remote
|
4302 |
|
|
Configuration::), GDB may then send a `QStartNoAckMode' packet to the
|
4303 |
|
|
stub. Only then may the stub actually turn off packet acknowledgments.
|
4304 |
|
|
GDB sends a final `+' acknowledgment of the stub's `OK' response, which
|
4305 |
|
|
can be safely ignored by the stub.
|
4306 |
|
|
|
4307 |
|
|
Note that `set remote noack-packet' command only affects negotiation
|
4308 |
|
|
between GDB and the stub when subsequent connections are made; it does
|
4309 |
|
|
not affect the protocol acknowledgment state for any current connection.
|
4310 |
|
|
Since `+'/`-' acknowledgments are enabled by default when a new
|
4311 |
|
|
connection is established, there is also no protocol request to
|
4312 |
|
|
re-enable the acknowledgments for the current connection, once disabled.
|
4313 |
|
|
|
4314 |
|
|
|
4315 |
|
|
File: gdb.info, Node: Examples, Next: File-I/O Remote Protocol Extension, Prev: Packet Acknowledgment, Up: Remote Protocol
|
4316 |
|
|
|
4317 |
|
|
D.12 Examples
|
4318 |
|
|
=============
|
4319 |
|
|
|
4320 |
|
|
Example sequence of a target being re-started. Notice how the restart
|
4321 |
|
|
does not get any direct output:
|
4322 |
|
|
|
4323 |
|
|
-> `R00'
|
4324 |
|
|
<- `+'
|
4325 |
|
|
_target restarts_
|
4326 |
|
|
-> `?'
|
4327 |
|
|
<- `+'
|
4328 |
|
|
<- `T001:1234123412341234'
|
4329 |
|
|
-> `+'
|
4330 |
|
|
|
4331 |
|
|
Example sequence of a target being stepped by a single instruction:
|
4332 |
|
|
|
4333 |
|
|
-> `G1445...'
|
4334 |
|
|
<- `+'
|
4335 |
|
|
-> `s'
|
4336 |
|
|
<- `+'
|
4337 |
|
|
_time passes_
|
4338 |
|
|
<- `T001:1234123412341234'
|
4339 |
|
|
-> `+'
|
4340 |
|
|
-> `g'
|
4341 |
|
|
<- `+'
|
4342 |
|
|
<- `1455...'
|
4343 |
|
|
-> `+'
|
4344 |
|
|
|
4345 |
|
|
|
4346 |
|
|
File: gdb.info, Node: File-I/O Remote Protocol Extension, Next: Library List Format, Prev: Examples, Up: Remote Protocol
|
4347 |
|
|
|
4348 |
|
|
D.13 File-I/O Remote Protocol Extension
|
4349 |
|
|
=======================================
|
4350 |
|
|
|
4351 |
|
|
* Menu:
|
4352 |
|
|
|
4353 |
|
|
* File-I/O Overview::
|
4354 |
|
|
* Protocol Basics::
|
4355 |
|
|
* The F Request Packet::
|
4356 |
|
|
* The F Reply Packet::
|
4357 |
|
|
* The Ctrl-C Message::
|
4358 |
|
|
* Console I/O::
|
4359 |
|
|
* List of Supported Calls::
|
4360 |
|
|
* Protocol-specific Representation of Datatypes::
|
4361 |
|
|
* Constants::
|
4362 |
|
|
* File-I/O Examples::
|
4363 |
|
|
|
4364 |
|
|
|
4365 |
|
|
File: gdb.info, Node: File-I/O Overview, Next: Protocol Basics, Up: File-I/O Remote Protocol Extension
|
4366 |
|
|
|
4367 |
|
|
D.13.1 File-I/O Overview
|
4368 |
|
|
------------------------
|
4369 |
|
|
|
4370 |
|
|
The "File I/O remote protocol extension" (short: File-I/O) allows the
|
4371 |
|
|
target to use the host's file system and console I/O to perform various
|
4372 |
|
|
system calls. System calls on the target system are translated into a
|
4373 |
|
|
remote protocol packet to the host system, which then performs the
|
4374 |
|
|
needed actions and returns a response packet to the target system.
|
4375 |
|
|
This simulates file system operations even on targets that lack file
|
4376 |
|
|
systems.
|
4377 |
|
|
|
4378 |
|
|
The protocol is defined to be independent of both the host and
|
4379 |
|
|
target systems. It uses its own internal representation of datatypes
|
4380 |
|
|
and values. Both GDB and the target's GDB stub are responsible for
|
4381 |
|
|
translating the system-dependent value representations into the internal
|
4382 |
|
|
protocol representations when data is transmitted.
|
4383 |
|
|
|
4384 |
|
|
The communication is synchronous. A system call is possible only
|
4385 |
|
|
when GDB is waiting for a response from the `C', `c', `S' or `s'
|
4386 |
|
|
packets. While GDB handles the request for a system call, the target
|
4387 |
|
|
is stopped to allow deterministic access to the target's memory.
|
4388 |
|
|
Therefore File-I/O is not interruptible by target signals. On the
|
4389 |
|
|
other hand, it is possible to interrupt File-I/O by a user interrupt
|
4390 |
|
|
(`Ctrl-C') within GDB.
|
4391 |
|
|
|
4392 |
|
|
The target's request to perform a host system call does not finish
|
4393 |
|
|
the latest `C', `c', `S' or `s' action. That means, after finishing
|
4394 |
|
|
the system call, the target returns to continuing the previous activity
|
4395 |
|
|
(continue, step). No additional continue or step request from GDB is
|
4396 |
|
|
required.
|
4397 |
|
|
|
4398 |
|
|
(gdb) continue
|
4399 |
|
|
<- target requests 'system call X'
|
4400 |
|
|
target is stopped, GDB executes system call
|
4401 |
|
|
-> GDB returns result
|
4402 |
|
|
... target continues, GDB returns to wait for the target
|
4403 |
|
|
<- target hits breakpoint and sends a Txx packet
|
4404 |
|
|
|
4405 |
|
|
The protocol only supports I/O on the console and to regular files on
|
4406 |
|
|
the host file system. Character or block special devices, pipes, named
|
4407 |
|
|
pipes, sockets or any other communication method on the host system are
|
4408 |
|
|
not supported by this protocol.
|
4409 |
|
|
|
4410 |
|
|
File I/O is not supported in non-stop mode.
|
4411 |
|
|
|
4412 |
|
|
|
4413 |
|
|
File: gdb.info, Node: Protocol Basics, Next: The F Request Packet, Prev: File-I/O Overview, Up: File-I/O Remote Protocol Extension
|
4414 |
|
|
|
4415 |
|
|
D.13.2 Protocol Basics
|
4416 |
|
|
----------------------
|
4417 |
|
|
|
4418 |
|
|
The File-I/O protocol uses the `F' packet as the request as well as
|
4419 |
|
|
reply packet. Since a File-I/O system call can only occur when GDB is
|
4420 |
|
|
waiting for a response from the continuing or stepping target, the
|
4421 |
|
|
File-I/O request is a reply that GDB has to expect as a result of a
|
4422 |
|
|
previous `C', `c', `S' or `s' packet. This `F' packet contains all
|
4423 |
|
|
information needed to allow GDB to call the appropriate host system
|
4424 |
|
|
call:
|
4425 |
|
|
|
4426 |
|
|
* A unique identifier for the requested system call.
|
4427 |
|
|
|
4428 |
|
|
* All parameters to the system call. Pointers are given as addresses
|
4429 |
|
|
in the target memory address space. Pointers to strings are given
|
4430 |
|
|
as pointer/length pair. Numerical values are given as they are.
|
4431 |
|
|
Numerical control flags are given in a protocol-specific
|
4432 |
|
|
representation.
|
4433 |
|
|
|
4434 |
|
|
|
4435 |
|
|
At this point, GDB has to perform the following actions.
|
4436 |
|
|
|
4437 |
|
|
* If the parameters include pointer values to data needed as input
|
4438 |
|
|
to a system call, GDB requests this data from the target with a
|
4439 |
|
|
standard `m' packet request. This additional communication has to
|
4440 |
|
|
be expected by the target implementation and is handled as any
|
4441 |
|
|
other `m' packet.
|
4442 |
|
|
|
4443 |
|
|
* GDB translates all value from protocol representation to host
|
4444 |
|
|
representation as needed. Datatypes are coerced into the host
|
4445 |
|
|
types.
|
4446 |
|
|
|
4447 |
|
|
* GDB calls the system call.
|
4448 |
|
|
|
4449 |
|
|
* It then coerces datatypes back to protocol representation.
|
4450 |
|
|
|
4451 |
|
|
* If the system call is expected to return data in buffer space
|
4452 |
|
|
specified by pointer parameters to the call, the data is
|
4453 |
|
|
transmitted to the target using a `M' or `X' packet. This packet
|
4454 |
|
|
has to be expected by the target implementation and is handled as
|
4455 |
|
|
any other `M' or `X' packet.
|
4456 |
|
|
|
4457 |
|
|
|
4458 |
|
|
Eventually GDB replies with another `F' packet which contains all
|
4459 |
|
|
necessary information for the target to continue. This at least
|
4460 |
|
|
contains
|
4461 |
|
|
|
4462 |
|
|
* Return value.
|
4463 |
|
|
|
4464 |
|
|
* `errno', if has been changed by the system call.
|
4465 |
|
|
|
4466 |
|
|
* "Ctrl-C" flag.
|
4467 |
|
|
|
4468 |
|
|
|
4469 |
|
|
After having done the needed type and value coercion, the target
|
4470 |
|
|
continues the latest continue or step action.
|
4471 |
|
|
|
4472 |
|
|
|
4473 |
|
|
File: gdb.info, Node: The F Request Packet, Next: The F Reply Packet, Prev: Protocol Basics, Up: File-I/O Remote Protocol Extension
|
4474 |
|
|
|
4475 |
|
|
D.13.3 The `F' Request Packet
|
4476 |
|
|
-----------------------------
|
4477 |
|
|
|
4478 |
|
|
The `F' request packet has the following format:
|
4479 |
|
|
|
4480 |
|
|
`FCALL-ID,PARAMETER...'
|
4481 |
|
|
CALL-ID is the identifier to indicate the host system call to be
|
4482 |
|
|
called. This is just the name of the function.
|
4483 |
|
|
|
4484 |
|
|
PARAMETER... are the parameters to the system call. Parameters
|
4485 |
|
|
are hexadecimal integer values, either the actual values in case
|
4486 |
|
|
of scalar datatypes, pointers to target buffer space in case of
|
4487 |
|
|
compound datatypes and unspecified memory areas, or pointer/length
|
4488 |
|
|
pairs in case of string parameters. These are appended to the
|
4489 |
|
|
CALL-ID as a comma-delimited list. All values are transmitted in
|
4490 |
|
|
ASCII string representation, pointer/length pairs separated by a
|
4491 |
|
|
slash.
|
4492 |
|
|
|
4493 |
|
|
|
4494 |
|
|
|
4495 |
|
|
File: gdb.info, Node: The F Reply Packet, Next: The Ctrl-C Message, Prev: The F Request Packet, Up: File-I/O Remote Protocol Extension
|
4496 |
|
|
|
4497 |
|
|
D.13.4 The `F' Reply Packet
|
4498 |
|
|
---------------------------
|
4499 |
|
|
|
4500 |
|
|
The `F' reply packet has the following format:
|
4501 |
|
|
|
4502 |
|
|
`FRETCODE,ERRNO,CTRL-C FLAG;CALL-SPECIFIC ATTACHMENT'
|
4503 |
|
|
RETCODE is the return code of the system call as hexadecimal value.
|
4504 |
|
|
|
4505 |
|
|
ERRNO is the `errno' set by the call, in protocol-specific
|
4506 |
|
|
representation. This parameter can be omitted if the call was
|
4507 |
|
|
successful.
|
4508 |
|
|
|
4509 |
|
|
CTRL-C FLAG is only sent if the user requested a break. In this
|
4510 |
|
|
case, ERRNO must be sent as well, even if the call was successful.
|
4511 |
|
|
The CTRL-C FLAG itself consists of the character `C':
|
4512 |
|
|
|
4513 |
|
|
F0,0,C
|
4514 |
|
|
|
4515 |
|
|
or, if the call was interrupted before the host call has been
|
4516 |
|
|
performed:
|
4517 |
|
|
|
4518 |
|
|
F-1,4,C
|
4519 |
|
|
|
4520 |
|
|
assuming 4 is the protocol-specific representation of `EINTR'.
|
4521 |
|
|
|
4522 |
|
|
|
4523 |
|
|
|
4524 |
|
|
File: gdb.info, Node: The Ctrl-C Message, Next: Console I/O, Prev: The F Reply Packet, Up: File-I/O Remote Protocol Extension
|
4525 |
|
|
|
4526 |
|
|
D.13.5 The `Ctrl-C' Message
|
4527 |
|
|
---------------------------
|
4528 |
|
|
|
4529 |
|
|
If the `Ctrl-C' flag is set in the GDB reply packet (*note The F Reply
|
4530 |
|
|
Packet::), the target should behave as if it had gotten a break
|
4531 |
|
|
message. The meaning for the target is "system call interrupted by
|
4532 |
|
|
`SIGINT'". Consequentially, the target should actually stop (as with a
|
4533 |
|
|
break message) and return to GDB with a `T02' packet.
|
4534 |
|
|
|
4535 |
|
|
It's important for the target to know in which state the system call
|
4536 |
|
|
was interrupted. There are two possible cases:
|
4537 |
|
|
|
4538 |
|
|
* The system call hasn't been performed on the host yet.
|
4539 |
|
|
|
4540 |
|
|
* The system call on the host has been finished.
|
4541 |
|
|
|
4542 |
|
|
|
4543 |
|
|
These two states can be distinguished by the target by the value of
|
4544 |
|
|
the returned `errno'. If it's the protocol representation of `EINTR',
|
4545 |
|
|
the system call hasn't been performed. This is equivalent to the
|
4546 |
|
|
`EINTR' handling on POSIX systems. In any other case, the target may
|
4547 |
|
|
presume that the system call has been finished -- successfully or not
|
4548 |
|
|
-- and should behave as if the break message arrived right after the
|
4549 |
|
|
system call.
|
4550 |
|
|
|
4551 |
|
|
GDB must behave reliably. If the system call has not been called
|
4552 |
|
|
yet, GDB may send the `F' reply immediately, setting `EINTR' as `errno'
|
4553 |
|
|
in the packet. If the system call on the host has been finished before
|
4554 |
|
|
the user requests a break, the full action must be finished by GDB.
|
4555 |
|
|
This requires sending `M' or `X' packets as necessary. The `F' packet
|
4556 |
|
|
may only be sent when either nothing has happened or the full action
|
4557 |
|
|
has been completed.
|
4558 |
|
|
|
4559 |
|
|
|
4560 |
|
|
File: gdb.info, Node: Console I/O, Next: List of Supported Calls, Prev: The Ctrl-C Message, Up: File-I/O Remote Protocol Extension
|
4561 |
|
|
|
4562 |
|
|
D.13.6 Console I/O
|
4563 |
|
|
------------------
|
4564 |
|
|
|
4565 |
|
|
By default and if not explicitly closed by the target system, the file
|
4566 |
|
|
descriptors 0, 1 and 2 are connected to the GDB console. Output on the
|
4567 |
|
|
GDB console is handled as any other file output operation (`write(1,
|
4568 |
|
|
...)' or `write(2, ...)'). Console input is handled by GDB so that
|
4569 |
|
|
after the target read request from file descriptor 0 all following
|
4570 |
|
|
typing is buffered until either one of the following conditions is met:
|
4571 |
|
|
|
4572 |
|
|
* The user types `Ctrl-c'. The behaviour is as explained above, and
|
4573 |
|
|
the `read' system call is treated as finished.
|
4574 |
|
|
|
4575 |
|
|
* The user presses . This is treated as end of input with a
|
4576 |
|
|
trailing newline.
|
4577 |
|
|
|
4578 |
|
|
* The user types `Ctrl-d'. This is treated as end of input. No
|
4579 |
|
|
trailing character (neither newline nor `Ctrl-D') is appended to
|
4580 |
|
|
the input.
|
4581 |
|
|
|
4582 |
|
|
|
4583 |
|
|
If the user has typed more characters than fit in the buffer given to
|
4584 |
|
|
the `read' call, the trailing characters are buffered in GDB until
|
4585 |
|
|
either another `read(0, ...)' is requested by the target, or debugging
|
4586 |
|
|
is stopped at the user's request.
|
4587 |
|
|
|
4588 |
|
|
|
4589 |
|
|
File: gdb.info, Node: List of Supported Calls, Next: Protocol-specific Representation of Datatypes, Prev: Console I/O, Up: File-I/O Remote Protocol Extension
|
4590 |
|
|
|
4591 |
|
|
D.13.7 List of Supported Calls
|
4592 |
|
|
------------------------------
|
4593 |
|
|
|
4594 |
|
|
* Menu:
|
4595 |
|
|
|
4596 |
|
|
* open::
|
4597 |
|
|
* close::
|
4598 |
|
|
* read::
|
4599 |
|
|
* write::
|
4600 |
|
|
* lseek::
|
4601 |
|
|
* rename::
|
4602 |
|
|
* unlink::
|
4603 |
|
|
* stat/fstat::
|
4604 |
|
|
* gettimeofday::
|
4605 |
|
|
* isatty::
|
4606 |
|
|
* system::
|
4607 |
|
|
|
4608 |
|
|
|
4609 |
|
|
File: gdb.info, Node: open, Next: close, Up: List of Supported Calls
|
4610 |
|
|
|
4611 |
|
|
open
|
4612 |
|
|
....
|
4613 |
|
|
|
4614 |
|
|
Synopsis:
|
4615 |
|
|
int open(const char *pathname, int flags);
|
4616 |
|
|
int open(const char *pathname, int flags, mode_t mode);
|
4617 |
|
|
|
4618 |
|
|
Request:
|
4619 |
|
|
`Fopen,PATHPTR/LEN,FLAGS,MODE'
|
4620 |
|
|
|
4621 |
|
|
FLAGS is the bitwise `OR' of the following values:
|
4622 |
|
|
|
4623 |
|
|
`O_CREAT'
|
4624 |
|
|
If the file does not exist it will be created. The host
|
4625 |
|
|
rules apply as far as file ownership and time stamps are
|
4626 |
|
|
concerned.
|
4627 |
|
|
|
4628 |
|
|
`O_EXCL'
|
4629 |
|
|
When used with `O_CREAT', if the file already exists it is an
|
4630 |
|
|
error and open() fails.
|
4631 |
|
|
|
4632 |
|
|
`O_TRUNC'
|
4633 |
|
|
If the file already exists and the open mode allows writing
|
4634 |
|
|
(`O_RDWR' or `O_WRONLY' is given) it will be truncated to
|
4635 |
|
|
zero length.
|
4636 |
|
|
|
4637 |
|
|
`O_APPEND'
|
4638 |
|
|
The file is opened in append mode.
|
4639 |
|
|
|
4640 |
|
|
`O_RDONLY'
|
4641 |
|
|
The file is opened for reading only.
|
4642 |
|
|
|
4643 |
|
|
`O_WRONLY'
|
4644 |
|
|
The file is opened for writing only.
|
4645 |
|
|
|
4646 |
|
|
`O_RDWR'
|
4647 |
|
|
The file is opened for reading and writing.
|
4648 |
|
|
|
4649 |
|
|
Other bits are silently ignored.
|
4650 |
|
|
|
4651 |
|
|
MODE is the bitwise `OR' of the following values:
|
4652 |
|
|
|
4653 |
|
|
`S_IRUSR'
|
4654 |
|
|
User has read permission.
|
4655 |
|
|
|
4656 |
|
|
`S_IWUSR'
|
4657 |
|
|
User has write permission.
|
4658 |
|
|
|
4659 |
|
|
`S_IRGRP'
|
4660 |
|
|
Group has read permission.
|
4661 |
|
|
|
4662 |
|
|
`S_IWGRP'
|
4663 |
|
|
Group has write permission.
|
4664 |
|
|
|
4665 |
|
|
`S_IROTH'
|
4666 |
|
|
Others have read permission.
|
4667 |
|
|
|
4668 |
|
|
`S_IWOTH'
|
4669 |
|
|
Others have write permission.
|
4670 |
|
|
|
4671 |
|
|
Other bits are silently ignored.
|
4672 |
|
|
|
4673 |
|
|
Return value:
|
4674 |
|
|
`open' returns the new file descriptor or -1 if an error occurred.
|
4675 |
|
|
|
4676 |
|
|
Errors:
|
4677 |
|
|
|
4678 |
|
|
`EEXIST'
|
4679 |
|
|
PATHNAME already exists and `O_CREAT' and `O_EXCL' were used.
|
4680 |
|
|
|
4681 |
|
|
`EISDIR'
|
4682 |
|
|
PATHNAME refers to a directory.
|
4683 |
|
|
|
4684 |
|
|
`EACCES'
|
4685 |
|
|
The requested access is not allowed.
|
4686 |
|
|
|
4687 |
|
|
`ENAMETOOLONG'
|
4688 |
|
|
PATHNAME was too long.
|
4689 |
|
|
|
4690 |
|
|
`ENOENT'
|
4691 |
|
|
A directory component in PATHNAME does not exist.
|
4692 |
|
|
|
4693 |
|
|
`ENODEV'
|
4694 |
|
|
PATHNAME refers to a device, pipe, named pipe or socket.
|
4695 |
|
|
|
4696 |
|
|
`EROFS'
|
4697 |
|
|
PATHNAME refers to a file on a read-only filesystem and write
|
4698 |
|
|
access was requested.
|
4699 |
|
|
|
4700 |
|
|
`EFAULT'
|
4701 |
|
|
PATHNAME is an invalid pointer value.
|
4702 |
|
|
|
4703 |
|
|
`ENOSPC'
|
4704 |
|
|
No space on device to create the file.
|
4705 |
|
|
|
4706 |
|
|
`EMFILE'
|
4707 |
|
|
The process already has the maximum number of files open.
|
4708 |
|
|
|
4709 |
|
|
`ENFILE'
|
4710 |
|
|
The limit on the total number of files open on the system has
|
4711 |
|
|
been reached.
|
4712 |
|
|
|
4713 |
|
|
`EINTR'
|
4714 |
|
|
The call was interrupted by the user.
|
4715 |
|
|
|
4716 |
|
|
|
4717 |
|
|
|
4718 |
|
|
File: gdb.info, Node: close, Next: read, Prev: open, Up: List of Supported Calls
|
4719 |
|
|
|
4720 |
|
|
close
|
4721 |
|
|
.....
|
4722 |
|
|
|
4723 |
|
|
Synopsis:
|
4724 |
|
|
int close(int fd);
|
4725 |
|
|
|
4726 |
|
|
Request:
|
4727 |
|
|
`Fclose,FD'
|
4728 |
|
|
|
4729 |
|
|
Return value:
|
4730 |
|
|
`close' returns zero on success, or -1 if an error occurred.
|
4731 |
|
|
|
4732 |
|
|
Errors:
|
4733 |
|
|
|
4734 |
|
|
`EBADF'
|
4735 |
|
|
FD isn't a valid open file descriptor.
|
4736 |
|
|
|
4737 |
|
|
`EINTR'
|
4738 |
|
|
The call was interrupted by the user.
|
4739 |
|
|
|
4740 |
|
|
|
4741 |
|
|
|
4742 |
|
|
File: gdb.info, Node: read, Next: write, Prev: close, Up: List of Supported Calls
|
4743 |
|
|
|
4744 |
|
|
read
|
4745 |
|
|
....
|
4746 |
|
|
|
4747 |
|
|
Synopsis:
|
4748 |
|
|
int read(int fd, void *buf, unsigned int count);
|
4749 |
|
|
|
4750 |
|
|
Request:
|
4751 |
|
|
`Fread,FD,BUFPTR,COUNT'
|
4752 |
|
|
|
4753 |
|
|
Return value:
|
4754 |
|
|
On success, the number of bytes read is returned. Zero indicates
|
4755 |
|
|
end of file. If count is zero, read returns zero as well. On
|
4756 |
|
|
error, -1 is returned.
|
4757 |
|
|
|
4758 |
|
|
Errors:
|
4759 |
|
|
|
4760 |
|
|
`EBADF'
|
4761 |
|
|
FD is not a valid file descriptor or is not open for reading.
|
4762 |
|
|
|
4763 |
|
|
`EFAULT'
|
4764 |
|
|
BUFPTR is an invalid pointer value.
|
4765 |
|
|
|
4766 |
|
|
`EINTR'
|
4767 |
|
|
The call was interrupted by the user.
|
4768 |
|
|
|
4769 |
|
|
|
4770 |
|
|
|
4771 |
|
|
File: gdb.info, Node: write, Next: lseek, Prev: read, Up: List of Supported Calls
|
4772 |
|
|
|
4773 |
|
|
write
|
4774 |
|
|
.....
|
4775 |
|
|
|
4776 |
|
|
Synopsis:
|
4777 |
|
|
int write(int fd, const void *buf, unsigned int count);
|
4778 |
|
|
|
4779 |
|
|
Request:
|
4780 |
|
|
`Fwrite,FD,BUFPTR,COUNT'
|
4781 |
|
|
|
4782 |
|
|
Return value:
|
4783 |
|
|
On success, the number of bytes written are returned. Zero
|
4784 |
|
|
indicates nothing was written. On error, -1 is returned.
|
4785 |
|
|
|
4786 |
|
|
Errors:
|
4787 |
|
|
|
4788 |
|
|
`EBADF'
|
4789 |
|
|
FD is not a valid file descriptor or is not open for writing.
|
4790 |
|
|
|
4791 |
|
|
`EFAULT'
|
4792 |
|
|
BUFPTR is an invalid pointer value.
|
4793 |
|
|
|
4794 |
|
|
`EFBIG'
|
4795 |
|
|
An attempt was made to write a file that exceeds the
|
4796 |
|
|
host-specific maximum file size allowed.
|
4797 |
|
|
|
4798 |
|
|
`ENOSPC'
|
4799 |
|
|
No space on device to write the data.
|
4800 |
|
|
|
4801 |
|
|
`EINTR'
|
4802 |
|
|
The call was interrupted by the user.
|
4803 |
|
|
|
4804 |
|
|
|
4805 |
|
|
|
4806 |
|
|
File: gdb.info, Node: lseek, Next: rename, Prev: write, Up: List of Supported Calls
|
4807 |
|
|
|
4808 |
|
|
lseek
|
4809 |
|
|
.....
|
4810 |
|
|
|
4811 |
|
|
Synopsis:
|
4812 |
|
|
long lseek (int fd, long offset, int flag);
|
4813 |
|
|
|
4814 |
|
|
Request:
|
4815 |
|
|
`Flseek,FD,OFFSET,FLAG'
|
4816 |
|
|
|
4817 |
|
|
FLAG is one of:
|
4818 |
|
|
|
4819 |
|
|
`SEEK_SET'
|
4820 |
|
|
The offset is set to OFFSET bytes.
|
4821 |
|
|
|
4822 |
|
|
`SEEK_CUR'
|
4823 |
|
|
The offset is set to its current location plus OFFSET bytes.
|
4824 |
|
|
|
4825 |
|
|
`SEEK_END'
|
4826 |
|
|
The offset is set to the size of the file plus OFFSET bytes.
|
4827 |
|
|
|
4828 |
|
|
Return value:
|
4829 |
|
|
On success, the resulting unsigned offset in bytes from the
|
4830 |
|
|
beginning of the file is returned. Otherwise, a value of -1 is
|
4831 |
|
|
returned.
|
4832 |
|
|
|
4833 |
|
|
Errors:
|
4834 |
|
|
|
4835 |
|
|
`EBADF'
|
4836 |
|
|
FD is not a valid open file descriptor.
|
4837 |
|
|
|
4838 |
|
|
`ESPIPE'
|
4839 |
|
|
FD is associated with the GDB console.
|
4840 |
|
|
|
4841 |
|
|
`EINVAL'
|
4842 |
|
|
FLAG is not a proper value.
|
4843 |
|
|
|
4844 |
|
|
`EINTR'
|
4845 |
|
|
The call was interrupted by the user.
|
4846 |
|
|
|
4847 |
|
|
|
4848 |
|
|
|
4849 |
|
|
File: gdb.info, Node: rename, Next: unlink, Prev: lseek, Up: List of Supported Calls
|
4850 |
|
|
|
4851 |
|
|
rename
|
4852 |
|
|
......
|
4853 |
|
|
|
4854 |
|
|
Synopsis:
|
4855 |
|
|
int rename(const char *oldpath, const char *newpath);
|
4856 |
|
|
|
4857 |
|
|
Request:
|
4858 |
|
|
`Frename,OLDPATHPTR/LEN,NEWPATHPTR/LEN'
|
4859 |
|
|
|
4860 |
|
|
Return value:
|
4861 |
|
|
On success, zero is returned. On error, -1 is returned.
|
4862 |
|
|
|
4863 |
|
|
Errors:
|
4864 |
|
|
|
4865 |
|
|
`EISDIR'
|
4866 |
|
|
NEWPATH is an existing directory, but OLDPATH is not a
|
4867 |
|
|
directory.
|
4868 |
|
|
|
4869 |
|
|
`EEXIST'
|
4870 |
|
|
NEWPATH is a non-empty directory.
|
4871 |
|
|
|
4872 |
|
|
`EBUSY'
|
4873 |
|
|
OLDPATH or NEWPATH is a directory that is in use by some
|
4874 |
|
|
process.
|
4875 |
|
|
|
4876 |
|
|
`EINVAL'
|
4877 |
|
|
An attempt was made to make a directory a subdirectory of
|
4878 |
|
|
itself.
|
4879 |
|
|
|
4880 |
|
|
`ENOTDIR'
|
4881 |
|
|
A component used as a directory in OLDPATH or new path is
|
4882 |
|
|
not a directory. Or OLDPATH is a directory and NEWPATH
|
4883 |
|
|
exists but is not a directory.
|
4884 |
|
|
|
4885 |
|
|
`EFAULT'
|
4886 |
|
|
OLDPATHPTR or NEWPATHPTR are invalid pointer values.
|
4887 |
|
|
|
4888 |
|
|
`EACCES'
|
4889 |
|
|
No access to the file or the path of the file.
|
4890 |
|
|
|
4891 |
|
|
`ENAMETOOLONG'
|
4892 |
|
|
OLDPATH or NEWPATH was too long.
|
4893 |
|
|
|
4894 |
|
|
`ENOENT'
|
4895 |
|
|
A directory component in OLDPATH or NEWPATH does not exist.
|
4896 |
|
|
|
4897 |
|
|
`EROFS'
|
4898 |
|
|
The file is on a read-only filesystem.
|
4899 |
|
|
|
4900 |
|
|
`ENOSPC'
|
4901 |
|
|
The device containing the file has no room for the new
|
4902 |
|
|
directory entry.
|
4903 |
|
|
|
4904 |
|
|
`EINTR'
|
4905 |
|
|
The call was interrupted by the user.
|
4906 |
|
|
|
4907 |
|
|
|
4908 |
|
|
|
4909 |
|
|
File: gdb.info, Node: unlink, Next: stat/fstat, Prev: rename, Up: List of Supported Calls
|
4910 |
|
|
|
4911 |
|
|
unlink
|
4912 |
|
|
......
|
4913 |
|
|
|
4914 |
|
|
Synopsis:
|
4915 |
|
|
int unlink(const char *pathname);
|
4916 |
|
|
|
4917 |
|
|
Request:
|
4918 |
|
|
`Funlink,PATHNAMEPTR/LEN'
|
4919 |
|
|
|
4920 |
|
|
Return value:
|
4921 |
|
|
On success, zero is returned. On error, -1 is returned.
|
4922 |
|
|
|
4923 |
|
|
Errors:
|
4924 |
|
|
|
4925 |
|
|
`EACCES'
|
4926 |
|
|
No access to the file or the path of the file.
|
4927 |
|
|
|
4928 |
|
|
`EPERM'
|
4929 |
|
|
The system does not allow unlinking of directories.
|
4930 |
|
|
|
4931 |
|
|
`EBUSY'
|
4932 |
|
|
The file PATHNAME cannot be unlinked because it's being used
|
4933 |
|
|
by another process.
|
4934 |
|
|
|
4935 |
|
|
`EFAULT'
|
4936 |
|
|
PATHNAMEPTR is an invalid pointer value.
|
4937 |
|
|
|
4938 |
|
|
`ENAMETOOLONG'
|
4939 |
|
|
PATHNAME was too long.
|
4940 |
|
|
|
4941 |
|
|
`ENOENT'
|
4942 |
|
|
A directory component in PATHNAME does not exist.
|
4943 |
|
|
|
4944 |
|
|
`ENOTDIR'
|
4945 |
|
|
A component of the path is not a directory.
|
4946 |
|
|
|
4947 |
|
|
`EROFS'
|
4948 |
|
|
The file is on a read-only filesystem.
|
4949 |
|
|
|
4950 |
|
|
`EINTR'
|
4951 |
|
|
The call was interrupted by the user.
|
4952 |
|
|
|
4953 |
|
|
|
4954 |
|
|
|
4955 |
|
|
File: gdb.info, Node: stat/fstat, Next: gettimeofday, Prev: unlink, Up: List of Supported Calls
|
4956 |
|
|
|
4957 |
|
|
stat/fstat
|
4958 |
|
|
..........
|
4959 |
|
|
|
4960 |
|
|
Synopsis:
|
4961 |
|
|
int stat(const char *pathname, struct stat *buf);
|
4962 |
|
|
int fstat(int fd, struct stat *buf);
|
4963 |
|
|
|
4964 |
|
|
Request:
|
4965 |
|
|
`Fstat,PATHNAMEPTR/LEN,BUFPTR'
|
4966 |
|
|
`Ffstat,FD,BUFPTR'
|
4967 |
|
|
|
4968 |
|
|
Return value:
|
4969 |
|
|
On success, zero is returned. On error, -1 is returned.
|
4970 |
|
|
|
4971 |
|
|
Errors:
|
4972 |
|
|
|
4973 |
|
|
`EBADF'
|
4974 |
|
|
FD is not a valid open file.
|
4975 |
|
|
|
4976 |
|
|
`ENOENT'
|
4977 |
|
|
A directory component in PATHNAME does not exist or the path
|
4978 |
|
|
is an empty string.
|
4979 |
|
|
|
4980 |
|
|
`ENOTDIR'
|
4981 |
|
|
A component of the path is not a directory.
|
4982 |
|
|
|
4983 |
|
|
`EFAULT'
|
4984 |
|
|
PATHNAMEPTR is an invalid pointer value.
|
4985 |
|
|
|
4986 |
|
|
`EACCES'
|
4987 |
|
|
No access to the file or the path of the file.
|
4988 |
|
|
|
4989 |
|
|
`ENAMETOOLONG'
|
4990 |
|
|
PATHNAME was too long.
|
4991 |
|
|
|
4992 |
|
|
`EINTR'
|
4993 |
|
|
The call was interrupted by the user.
|
4994 |
|
|
|
4995 |
|
|
|
4996 |
|
|
|
4997 |
|
|
File: gdb.info, Node: gettimeofday, Next: isatty, Prev: stat/fstat, Up: List of Supported Calls
|
4998 |
|
|
|
4999 |
|
|
gettimeofday
|
5000 |
|
|
............
|
5001 |
|
|
|
5002 |
|
|
Synopsis:
|
5003 |
|
|
int gettimeofday(struct timeval *tv, void *tz);
|
5004 |
|
|
|
5005 |
|
|
Request:
|
5006 |
|
|
`Fgettimeofday,TVPTR,TZPTR'
|
5007 |
|
|
|
5008 |
|
|
Return value:
|
5009 |
|
|
On success, 0 is returned, -1 otherwise.
|
5010 |
|
|
|
5011 |
|
|
Errors:
|
5012 |
|
|
|
5013 |
|
|
`EINVAL'
|
5014 |
|
|
TZ is a non-NULL pointer.
|
5015 |
|
|
|
5016 |
|
|
`EFAULT'
|
5017 |
|
|
TVPTR and/or TZPTR is an invalid pointer value.
|
5018 |
|
|
|
5019 |
|
|
|
5020 |
|
|
|
5021 |
|
|
File: gdb.info, Node: isatty, Next: system, Prev: gettimeofday, Up: List of Supported Calls
|
5022 |
|
|
|
5023 |
|
|
isatty
|
5024 |
|
|
......
|
5025 |
|
|
|
5026 |
|
|
Synopsis:
|
5027 |
|
|
int isatty(int fd);
|
5028 |
|
|
|
5029 |
|
|
Request:
|
5030 |
|
|
`Fisatty,FD'
|
5031 |
|
|
|
5032 |
|
|
Return value:
|
5033 |
|
|
Returns 1 if FD refers to the GDB console, 0 otherwise.
|
5034 |
|
|
|
5035 |
|
|
Errors:
|
5036 |
|
|
|
5037 |
|
|
`EINTR'
|
5038 |
|
|
The call was interrupted by the user.
|
5039 |
|
|
|
5040 |
|
|
|
5041 |
|
|
Note that the `isatty' call is treated as a special case: it returns
|
5042 |
|
|
1 to the target if the file descriptor is attached to the GDB console,
|
5043 |
|
|
|
5044 |
|
|
implementing `ioctl' and would be more complex than needed.
|
5045 |
|
|
|
5046 |
|
|
|
5047 |
|
|
File: gdb.info, Node: system, Prev: isatty, Up: List of Supported Calls
|
5048 |
|
|
|
5049 |
|
|
system
|
5050 |
|
|
......
|
5051 |
|
|
|
5052 |
|
|
Synopsis:
|
5053 |
|
|
int system(const char *command);
|
5054 |
|
|
|
5055 |
|
|
Request:
|
5056 |
|
|
`Fsystem,COMMANDPTR/LEN'
|
5057 |
|
|
|
5058 |
|
|
Return value:
|
5059 |
|
|
If LEN is zero, the return value indicates whether a shell is
|
5060 |
|
|
available. A zero return value indicates a shell is not available.
|
5061 |
|
|
For non-zero LEN, the value returned is -1 on error and the return
|
5062 |
|
|
status of the command otherwise. Only the exit status of the
|
5063 |
|
|
command is returned, which is extracted from the host's `system'
|
5064 |
|
|
return value by calling `WEXITSTATUS(retval)'. In case `/bin/sh'
|
5065 |
|
|
could not be executed, 127 is returned.
|
5066 |
|
|
|
5067 |
|
|
Errors:
|
5068 |
|
|
|
5069 |
|
|
`EINTR'
|
5070 |
|
|
The call was interrupted by the user.
|
5071 |
|
|
|
5072 |
|
|
|
5073 |
|
|
GDB takes over the full task of calling the necessary host calls to
|
5074 |
|
|
perform the `system' call. The return value of `system' on the host is
|
5075 |
|
|
simplified before it's returned to the target. Any termination signal
|
5076 |
|
|
information from the child process is discarded, and the return value
|
5077 |
|
|
consists entirely of the exit status of the called command.
|
5078 |
|
|
|
5079 |
|
|
Due to security concerns, the `system' call is by default refused by
|
5080 |
|
|
GDB. The user has to allow this call explicitly with the `set remote
|
5081 |
|
|
system-call-allowed 1' command.
|
5082 |
|
|
|
5083 |
|
|
`set remote system-call-allowed'
|
5084 |
|
|
Control whether to allow the `system' calls in the File I/O
|
5085 |
|
|
protocol for the remote target. The default is zero (disabled).
|
5086 |
|
|
|
5087 |
|
|
`show remote system-call-allowed'
|
5088 |
|
|
Show whether the `system' calls are allowed in the File I/O
|
5089 |
|
|
protocol.
|
5090 |
|
|
|
5091 |
|
|
|
5092 |
|
|
File: gdb.info, Node: Protocol-specific Representation of Datatypes, Next: Constants, Prev: List of Supported Calls, Up: File-I/O Remote Protocol Extension
|
5093 |
|
|
|
5094 |
|
|
D.13.8 Protocol-specific Representation of Datatypes
|
5095 |
|
|
----------------------------------------------------
|
5096 |
|
|
|
5097 |
|
|
* Menu:
|
5098 |
|
|
|
5099 |
|
|
* Integral Datatypes::
|
5100 |
|
|
* Pointer Values::
|
5101 |
|
|
* Memory Transfer::
|
5102 |
|
|
* struct stat::
|
5103 |
|
|
* struct timeval::
|
5104 |
|
|
|
5105 |
|
|
|
5106 |
|
|
File: gdb.info, Node: Integral Datatypes, Next: Pointer Values, Up: Protocol-specific Representation of Datatypes
|
5107 |
|
|
|
5108 |
|
|
Integral Datatypes
|
5109 |
|
|
..................
|
5110 |
|
|
|
5111 |
|
|
The integral datatypes used in the system calls are `int', `unsigned
|
5112 |
|
|
int', `long', `unsigned long', `mode_t', and `time_t'.
|
5113 |
|
|
|
5114 |
|
|
`int', `unsigned int', `mode_t' and `time_t' are implemented as 32
|
5115 |
|
|
bit values in this protocol.
|
5116 |
|
|
|
5117 |
|
|
`long' and `unsigned long' are implemented as 64 bit types.
|
5118 |
|
|
|
5119 |
|
|
*Note Limits::, for corresponding MIN and MAX values (similar to
|
5120 |
|
|
those in `limits.h') to allow range checking on host and target.
|
5121 |
|
|
|
5122 |
|
|
`time_t' datatypes are defined as seconds since the Epoch.
|
5123 |
|
|
|
5124 |
|
|
All integral datatypes transferred as part of a memory read or write
|
5125 |
|
|
of a structured datatype e.g. a `struct stat' have to be given in big
|
5126 |
|
|
endian byte order.
|
5127 |
|
|
|
5128 |
|
|
|
5129 |
|
|
File: gdb.info, Node: Pointer Values, Next: Memory Transfer, Prev: Integral Datatypes, Up: Protocol-specific Representation of Datatypes
|
5130 |
|
|
|
5131 |
|
|
Pointer Values
|
5132 |
|
|
..............
|
5133 |
|
|
|
5134 |
|
|
Pointers to target data are transmitted as they are. An exception is
|
5135 |
|
|
made for pointers to buffers for which the length isn't transmitted as
|
5136 |
|
|
part of the function call, namely strings. Strings are transmitted as
|
5137 |
|
|
a pointer/length pair, both as hex values, e.g.
|
5138 |
|
|
|
5139 |
|
|
`1aaf/12'
|
5140 |
|
|
|
5141 |
|
|
which is a pointer to data of length 18 bytes at position 0x1aaf. The
|
5142 |
|
|
length is defined as the full string length in bytes, including the
|
5143 |
|
|
trailing null byte. For example, the string `"hello world"' at address
|
5144 |
|
|
0x123456 is transmitted as
|
5145 |
|
|
|
5146 |
|
|
`123456/d'
|
5147 |
|
|
|
5148 |
|
|
|
5149 |
|
|
File: gdb.info, Node: Memory Transfer, Next: struct stat, Prev: Pointer Values, Up: Protocol-specific Representation of Datatypes
|
5150 |
|
|
|
5151 |
|
|
Memory Transfer
|
5152 |
|
|
...............
|
5153 |
|
|
|
5154 |
|
|
Structured data which is transferred using a memory read or write (for
|
5155 |
|
|
example, a `struct stat') is expected to be in a protocol-specific
|
5156 |
|
|
format with all scalar multibyte datatypes being big endian.
|
5157 |
|
|
Translation to this representation needs to be done both by the target
|
5158 |
|
|
before the `F' packet is sent, and by GDB before it transfers memory to
|
5159 |
|
|
the target. Transferred pointers to structured data should point to
|
5160 |
|
|
the already-coerced data at any time.
|
5161 |
|
|
|
5162 |
|
|
|
5163 |
|
|
File: gdb.info, Node: struct stat, Next: struct timeval, Prev: Memory Transfer, Up: Protocol-specific Representation of Datatypes
|
5164 |
|
|
|
5165 |
|
|
struct stat
|
5166 |
|
|
...........
|
5167 |
|
|
|
5168 |
|
|
The buffer of type `struct stat' used by the target and GDB is defined
|
5169 |
|
|
as follows:
|
5170 |
|
|
|
5171 |
|
|
struct stat {
|
5172 |
|
|
unsigned int st_dev; /* device */
|
5173 |
|
|
unsigned int st_ino; /* inode */
|
5174 |
|
|
mode_t st_mode; /* protection */
|
5175 |
|
|
unsigned int st_nlink; /* number of hard links */
|
5176 |
|
|
unsigned int st_uid; /* user ID of owner */
|
5177 |
|
|
unsigned int st_gid; /* group ID of owner */
|
5178 |
|
|
unsigned int st_rdev; /* device type (if inode device) */
|
5179 |
|
|
unsigned long st_size; /* total size, in bytes */
|
5180 |
|
|
unsigned long st_blksize; /* blocksize for filesystem I/O */
|
5181 |
|
|
unsigned long st_blocks; /* number of blocks allocated */
|
5182 |
|
|
time_t st_atime; /* time of last access */
|
5183 |
|
|
time_t st_mtime; /* time of last modification */
|
5184 |
|
|
time_t st_ctime; /* time of last change */
|
5185 |
|
|
};
|
5186 |
|
|
|
5187 |
|
|
The integral datatypes conform to the definitions given in the
|
5188 |
|
|
appropriate section (see *Note Integral Datatypes::, for details) so
|
5189 |
|
|
this structure is of size 64 bytes.
|
5190 |
|
|
|
5191 |
|
|
The values of several fields have a restricted meaning and/or range
|
5192 |
|
|
of values.
|
5193 |
|
|
|
5194 |
|
|
`st_dev'
|
5195 |
|
|
A value of 0 represents a file, 1 the console.
|
5196 |
|
|
|
5197 |
|
|
`st_ino'
|
5198 |
|
|
No valid meaning for the target. Transmitted unchanged.
|
5199 |
|
|
|
5200 |
|
|
`st_mode'
|
5201 |
|
|
Valid mode bits are described in *Note Constants::. Any other
|
5202 |
|
|
bits have currently no meaning for the target.
|
5203 |
|
|
|
5204 |
|
|
`st_uid'
|
5205 |
|
|
`st_gid'
|
5206 |
|
|
`st_rdev'
|
5207 |
|
|
No valid meaning for the target. Transmitted unchanged.
|
5208 |
|
|
|
5209 |
|
|
`st_atime'
|
5210 |
|
|
`st_mtime'
|
5211 |
|
|
`st_ctime'
|
5212 |
|
|
These values have a host and file system dependent accuracy.
|
5213 |
|
|
Especially on Windows hosts, the file system may not support exact
|
5214 |
|
|
timing values.
|
5215 |
|
|
|
5216 |
|
|
The target gets a `struct stat' of the above representation and is
|
5217 |
|
|
responsible for coercing it to the target representation before
|
5218 |
|
|
continuing.
|
5219 |
|
|
|
5220 |
|
|
Note that due to size differences between the host, target, and
|
5221 |
|
|
protocol representations of `struct stat' members, these members could
|
5222 |
|
|
eventually get truncated on the target.
|
5223 |
|
|
|
5224 |
|
|
|
5225 |
|
|
File: gdb.info, Node: struct timeval, Prev: struct stat, Up: Protocol-specific Representation of Datatypes
|
5226 |
|
|
|
5227 |
|
|
struct timeval
|
5228 |
|
|
..............
|
5229 |
|
|
|
5230 |
|
|
The buffer of type `struct timeval' used by the File-I/O protocol is
|
5231 |
|
|
defined as follows:
|
5232 |
|
|
|
5233 |
|
|
struct timeval {
|
5234 |
|
|
time_t tv_sec; /* second */
|
5235 |
|
|
long tv_usec; /* microsecond */
|
5236 |
|
|
};
|
5237 |
|
|
|
5238 |
|
|
The integral datatypes conform to the definitions given in the
|
5239 |
|
|
appropriate section (see *Note Integral Datatypes::, for details) so
|
5240 |
|
|
this structure is of size 8 bytes.
|
5241 |
|
|
|
5242 |
|
|
|
5243 |
|
|
File: gdb.info, Node: Constants, Next: File-I/O Examples, Prev: Protocol-specific Representation of Datatypes, Up: File-I/O Remote Protocol Extension
|
5244 |
|
|
|
5245 |
|
|
D.13.9 Constants
|
5246 |
|
|
----------------
|
5247 |
|
|
|
5248 |
|
|
The following values are used for the constants inside of the protocol.
|
5249 |
|
|
GDB and target are responsible for translating these values before and
|
5250 |
|
|
after the call as needed.
|
5251 |
|
|
|
5252 |
|
|
* Menu:
|
5253 |
|
|
|
5254 |
|
|
* Open Flags::
|
5255 |
|
|
* mode_t Values::
|
5256 |
|
|
* Errno Values::
|
5257 |
|
|
* Lseek Flags::
|
5258 |
|
|
* Limits::
|
5259 |
|
|
|
5260 |
|
|
|
5261 |
|
|
File: gdb.info, Node: Open Flags, Next: mode_t Values, Up: Constants
|
5262 |
|
|
|
5263 |
|
|
Open Flags
|
5264 |
|
|
..........
|
5265 |
|
|
|
5266 |
|
|
All values are given in hexadecimal representation.
|
5267 |
|
|
|
5268 |
|
|
O_RDONLY 0x0
|
5269 |
|
|
O_WRONLY 0x1
|
5270 |
|
|
O_RDWR 0x2
|
5271 |
|
|
O_APPEND 0x8
|
5272 |
|
|
O_CREAT 0x200
|
5273 |
|
|
O_TRUNC 0x400
|
5274 |
|
|
O_EXCL 0x800
|
5275 |
|
|
|
5276 |
|
|
|
5277 |
|
|
File: gdb.info, Node: mode_t Values, Next: Errno Values, Prev: Open Flags, Up: Constants
|
5278 |
|
|
|
5279 |
|
|
mode_t Values
|
5280 |
|
|
.............
|
5281 |
|
|
|
5282 |
|
|
All values are given in octal representation.
|
5283 |
|
|
|
5284 |
|
|
S_IFREG 0100000
|
5285 |
|
|
S_IFDIR 040000
|
5286 |
|
|
S_IRUSR 0400
|
5287 |
|
|
S_IWUSR 0200
|
5288 |
|
|
S_IXUSR 0100
|
5289 |
|
|
S_IRGRP 040
|
5290 |
|
|
S_IWGRP 020
|
5291 |
|
|
S_IXGRP 010
|
5292 |
|
|
S_IROTH 04
|
5293 |
|
|
S_IWOTH 02
|
5294 |
|
|
S_IXOTH 01
|
5295 |
|
|
|
5296 |
|
|
|
5297 |
|
|
File: gdb.info, Node: Errno Values, Next: Lseek Flags, Prev: mode_t Values, Up: Constants
|
5298 |
|
|
|
5299 |
|
|
Errno Values
|
5300 |
|
|
............
|
5301 |
|
|
|
5302 |
|
|
All values are given in decimal representation.
|
5303 |
|
|
|
5304 |
|
|
EPERM 1
|
5305 |
|
|
ENOENT 2
|
5306 |
|
|
EINTR 4
|
5307 |
|
|
EBADF 9
|
5308 |
|
|
EACCES 13
|
5309 |
|
|
EFAULT 14
|
5310 |
|
|
EBUSY 16
|
5311 |
|
|
EEXIST 17
|
5312 |
|
|
ENODEV 19
|
5313 |
|
|
ENOTDIR 20
|
5314 |
|
|
EISDIR 21
|
5315 |
|
|
EINVAL 22
|
5316 |
|
|
ENFILE 23
|
5317 |
|
|
EMFILE 24
|
5318 |
|
|
EFBIG 27
|
5319 |
|
|
ENOSPC 28
|
5320 |
|
|
ESPIPE 29
|
5321 |
|
|
EROFS 30
|
5322 |
|
|
ENAMETOOLONG 91
|
5323 |
|
|
EUNKNOWN 9999
|
5324 |
|
|
|
5325 |
|
|
`EUNKNOWN' is used as a fallback error value if a host system returns
|
5326 |
|
|
any error value not in the list of supported error numbers.
|
5327 |
|
|
|
5328 |
|
|
|
5329 |
|
|
File: gdb.info, Node: Lseek Flags, Next: Limits, Prev: Errno Values, Up: Constants
|
5330 |
|
|
|
5331 |
|
|
Lseek Flags
|
5332 |
|
|
...........
|
5333 |
|
|
|
5334 |
|
|
SEEK_SET 0
|
5335 |
|
|
SEEK_CUR 1
|
5336 |
|
|
SEEK_END 2
|
5337 |
|
|
|
5338 |
|
|
|
5339 |
|
|
File: gdb.info, Node: Limits, Prev: Lseek Flags, Up: Constants
|
5340 |
|
|
|
5341 |
|
|
Limits
|
5342 |
|
|
......
|
5343 |
|
|
|
5344 |
|
|
All values are given in decimal representation.
|
5345 |
|
|
|
5346 |
|
|
INT_MIN -2147483648
|
5347 |
|
|
INT_MAX 2147483647
|
5348 |
|
|
UINT_MAX 4294967295
|
5349 |
|
|
LONG_MIN -9223372036854775808
|
5350 |
|
|
LONG_MAX 9223372036854775807
|
5351 |
|
|
ULONG_MAX 18446744073709551615
|
5352 |
|
|
|
5353 |
|
|
|
5354 |
|
|
File: gdb.info, Node: File-I/O Examples, Prev: Constants, Up: File-I/O Remote Protocol Extension
|
5355 |
|
|
|
5356 |
|
|
D.13.10 File-I/O Examples
|
5357 |
|
|
-------------------------
|
5358 |
|
|
|
5359 |
|
|
Example sequence of a write call, file descriptor 3, buffer is at target
|
5360 |
|
|
address 0x1234, 6 bytes should be written:
|
5361 |
|
|
|
5362 |
|
|
<- `Fwrite,3,1234,6'
|
5363 |
|
|
_request memory read from target_
|
5364 |
|
|
-> `m1234,6'
|
5365 |
|
|
<- XXXXXX
|
5366 |
|
|
_return "6 bytes written"_
|
5367 |
|
|
-> `F6'
|
5368 |
|
|
|
5369 |
|
|
Example sequence of a read call, file descriptor 3, buffer is at
|
5370 |
|
|
target address 0x1234, 6 bytes should be read:
|
5371 |
|
|
|
5372 |
|
|
<- `Fread,3,1234,6'
|
5373 |
|
|
_request memory write to target_
|
5374 |
|
|
-> `X1234,6:XXXXXX'
|
5375 |
|
|
_return "6 bytes read"_
|
5376 |
|
|
-> `F6'
|
5377 |
|
|
|
5378 |
|
|
Example sequence of a read call, call fails on the host due to
|
5379 |
|
|
invalid file descriptor (`EBADF'):
|
5380 |
|
|
|
5381 |
|
|
<- `Fread,3,1234,6'
|
5382 |
|
|
-> `F-1,9'
|
5383 |
|
|
|
5384 |
|
|
Example sequence of a read call, user presses `Ctrl-c' before
|
5385 |
|
|
syscall on host is called:
|
5386 |
|
|
|
5387 |
|
|
<- `Fread,3,1234,6'
|
5388 |
|
|
-> `F-1,4,C'
|
5389 |
|
|
<- `T02'
|
5390 |
|
|
|
5391 |
|
|
Example sequence of a read call, user presses `Ctrl-c' after syscall
|
5392 |
|
|
on host is called:
|
5393 |
|
|
|
5394 |
|
|
<- `Fread,3,1234,6'
|
5395 |
|
|
-> `X1234,6:XXXXXX'
|
5396 |
|
|
<- `T02'
|
5397 |
|
|
|
5398 |
|
|
|
5399 |
|
|
File: gdb.info, Node: Library List Format, Next: Memory Map Format, Prev: File-I/O Remote Protocol Extension, Up: Remote Protocol
|
5400 |
|
|
|
5401 |
|
|
D.14 Library List Format
|
5402 |
|
|
========================
|
5403 |
|
|
|
5404 |
|
|
On some platforms, a dynamic loader (e.g. `ld.so') runs in the same
|
5405 |
|
|
process as your application to manage libraries. In this case, GDB can
|
5406 |
|
|
use the loader's symbol table and normal memory operations to maintain
|
5407 |
|
|
a list of shared libraries. On other platforms, the operating system
|
5408 |
|
|
manages loaded libraries. GDB can not retrieve the list of currently
|
5409 |
|
|
loaded libraries through memory operations, so it uses the
|
5410 |
|
|
`qXfer:libraries:read' packet (*note qXfer library list read::)
|
5411 |
|
|
instead. The remote stub queries the target's operating system and
|
5412 |
|
|
reports which libraries are loaded.
|
5413 |
|
|
|
5414 |
|
|
The `qXfer:libraries:read' packet returns an XML document which
|
5415 |
|
|
lists loaded libraries and their offsets. Each library has an
|
5416 |
|
|
associated name and one or more segment or section base addresses,
|
5417 |
|
|
which report where the library was loaded in memory.
|
5418 |
|
|
|
5419 |
|
|
For the common case of libraries that are fully linked binaries, the
|
5420 |
|
|
library should have a list of segments. If the target supports dynamic
|
5421 |
|
|
linking of a relocatable object file, its library XML element should
|
5422 |
|
|
instead include a list of allocated sections. The segment or section
|
5423 |
|
|
bases are start addresses, not relocation offsets; they do not depend
|
5424 |
|
|
on the library's link-time base addresses.
|
5425 |
|
|
|
5426 |
|
|
GDB must be linked with the Expat library to support XML library
|
5427 |
|
|
lists. *Note Expat::.
|
5428 |
|
|
|
5429 |
|
|
A simple memory map, with one loaded library relocated by a single
|
5430 |
|
|
offset, looks like this:
|
5431 |
|
|
|
5432 |
|
|
|
5433 |
|
|
|
5434 |
|
|
|
5435 |
|
|
|
5436 |
|
|
|
5437 |
|
|
|
5438 |
|
|
Another simple memory map, with one loaded library with three
|
5439 |
|
|
allocated sections (.text, .data, .bss), looks like this:
|
5440 |
|
|
|
5441 |
|
|
|
5442 |
|
|
|
5443 |
|
|
|
5444 |
|
|
|
5445 |
|
|
|
5446 |
|
|
|
5447 |
|
|
|
5448 |
|
|
|
5449 |
|
|
The format of a library list is described by this DTD:
|
5450 |
|
|
|
5451 |
|
|
|
5452 |
|
|
|
5453 |
|
|
|
5454 |
|
|
|
5455 |
|
|
|
5456 |
|
|
|
5457 |
|
|
|
5458 |
|
|
|
5459 |
|
|
|
5460 |
|
|
|
5461 |
|
|
In addition, segments and section descriptors cannot be mixed within
|
5462 |
|
|
a single library element, and you must supply at least one segment or
|
5463 |
|
|
section for each library.
|
5464 |
|
|
|
5465 |
|
|
|
5466 |
|
|
File: gdb.info, Node: Memory Map Format, Next: Thread List Format, Prev: Library List Format, Up: Remote Protocol
|
5467 |
|
|
|
5468 |
|
|
D.15 Memory Map Format
|
5469 |
|
|
======================
|
5470 |
|
|
|
5471 |
|
|
To be able to write into flash memory, GDB needs to obtain a memory map
|
5472 |
|
|
from the target. This section describes the format of the memory map.
|
5473 |
|
|
|
5474 |
|
|
The memory map is obtained using the `qXfer:memory-map:read' (*note
|
5475 |
|
|
qXfer memory map read::) packet and is an XML document that lists
|
5476 |
|
|
memory regions.
|
5477 |
|
|
|
5478 |
|
|
GDB must be linked with the Expat library to support XML memory
|
5479 |
|
|
maps. *Note Expat::.
|
5480 |
|
|
|
5481 |
|
|
The top-level structure of the document is shown below:
|
5482 |
|
|
|
5483 |
|
|
|
5484 |
|
|
|
5485 |
|
|
PUBLIC "+//IDN gnu.org//DTD GDB Memory Map V1.0//EN"
|
5486 |
|
|
"http://sourceware.org/gdb/gdb-memory-map.dtd">
|
5487 |
|
|
|
5488 |
|
|
region...
|
5489 |
|
|
|
5490 |
|
|
|
5491 |
|
|
Each region can be either:
|
5492 |
|
|
|
5493 |
|
|
* A region of RAM starting at ADDR and extending for LENGTH bytes
|
5494 |
|
|
from there:
|
5495 |
|
|
|
5496 |
|
|
|
5497 |
|
|
|
5498 |
|
|
* A region of read-only memory:
|
5499 |
|
|
|
5500 |
|
|
|
5501 |
|
|
|
5502 |
|
|
* A region of flash memory, with erasure blocks BLOCKSIZE bytes in
|
5503 |
|
|
length:
|
5504 |
|
|
|
5505 |
|
|
|
5506 |
|
|
BLOCKSIZE
|
5507 |
|
|
|
5508 |
|
|
|
5509 |
|
|
|
5510 |
|
|
Regions must not overlap. GDB assumes that areas of memory not
|
5511 |
|
|
covered by the memory map are RAM, and uses the ordinary `M' and `X'
|
5512 |
|
|
packets to write to addresses in such ranges.
|
5513 |
|
|
|
5514 |
|
|
The formal DTD for memory map format is given below:
|
5515 |
|
|
|
5516 |
|
|
|
5517 |
|
|
|
5518 |
|
|
|
5519 |
|
|
|
5520 |
|
|
|
5521 |
|
|
|
5522 |
|
|
|
5523 |
|
|
|
5524 |
|
|
|
5525 |
|
|
|
5527 |
|
|
|
5528 |
|
|
start CDATA #REQUIRED
|
5529 |
|
|
length CDATA #REQUIRED
|
5530 |
|
|
device CDATA #IMPLIED>
|
5531 |
|
|
|
5532 |
|
|
|
5533 |
|
|
|
5534 |
|
|
|
5535 |
|
|
|
5536 |
|
|
File: gdb.info, Node: Thread List Format, Prev: Memory Map Format, Up: Remote Protocol
|
5537 |
|
|
|
5538 |
|
|
D.16 Thread List Format
|
5539 |
|
|
=======================
|
5540 |
|
|
|
5541 |
|
|
To efficiently update the list of threads and their attributes, GDB
|
5542 |
|
|
issues the `qXfer:threads:read' packet (*note qXfer threads read::) and
|
5543 |
|
|
obtains the XML document with the following structure:
|
5544 |
|
|
|
5545 |
|
|
|
5546 |
|
|
|
5547 |
|
|
|
5548 |
|
|
... description ...
|
5549 |
|
|
|
5550 |
|
|
|
5551 |
|
|
|
5552 |
|
|
Each `thread' element must have the `id' attribute that identifies
|
5553 |
|
|
the thread (*note thread-id syntax::). The `core' attribute, if
|
5554 |
|
|
present, specifies which processor core the thread was last executing
|
5555 |
|
|
on. The content of the of `thread' element is interpreted as
|
5556 |
|
|
human-readable auxilliary information.
|
5557 |
|
|
|
5558 |
|
|
|
5559 |
|
|
File: gdb.info, Node: Agent Expressions, Next: Target Descriptions, Prev: Remote Protocol, Up: Top
|
5560 |
|
|
|
5561 |
|
|
Appendix E The GDB Agent Expression Mechanism
|
5562 |
|
|
*********************************************
|
5563 |
|
|
|
5564 |
|
|
In some applications, it is not feasible for the debugger to interrupt
|
5565 |
|
|
the program's execution long enough for the developer to learn anything
|
5566 |
|
|
helpful about its behavior. If the program's correctness depends on its
|
5567 |
|
|
real-time behavior, delays introduced by a debugger might cause the
|
5568 |
|
|
program to fail, even when the code itself is correct. It is useful to
|
5569 |
|
|
be able to observe the program's behavior without interrupting it.
|
5570 |
|
|
|
5571 |
|
|
Using GDB's `trace' and `collect' commands, the user can specify
|
5572 |
|
|
locations in the program, and arbitrary expressions to evaluate when
|
5573 |
|
|
those locations are reached. Later, using the `tfind' command, she can
|
5574 |
|
|
examine the values those expressions had when the program hit the trace
|
5575 |
|
|
points. The expressions may also denote objects in memory --
|
5576 |
|
|
structures or arrays, for example -- whose values GDB should record;
|
5577 |
|
|
while visiting a particular tracepoint, the user may inspect those
|
5578 |
|
|
objects as if they were in memory at that moment. However, because GDB
|
5579 |
|
|
records these values without interacting with the user, it can do so
|
5580 |
|
|
quickly and unobtrusively, hopefully not disturbing the program's
|
5581 |
|
|
behavior.
|
5582 |
|
|
|
5583 |
|
|
When GDB is debugging a remote target, the GDB "agent" code running
|
5584 |
|
|
on the target computes the values of the expressions itself. To avoid
|
5585 |
|
|
having a full symbolic expression evaluator on the agent, GDB translates
|
5586 |
|
|
expressions in the source language into a simpler bytecode language, and
|
5587 |
|
|
then sends the bytecode to the agent; the agent then executes the
|
5588 |
|
|
bytecode, and records the values for GDB to retrieve later.
|
5589 |
|
|
|
5590 |
|
|
The bytecode language is simple; there are forty-odd opcodes, the
|
5591 |
|
|
bulk of which are the usual vocabulary of C operands (addition,
|
5592 |
|
|
subtraction, shifts, and so on) and various sizes of literals and
|
5593 |
|
|
memory reference operations. The bytecode interpreter operates
|
5594 |
|
|
strictly on machine-level values -- various sizes of integers and
|
5595 |
|
|
floating point numbers -- and requires no information about types or
|
5596 |
|
|
symbols; thus, the interpreter's internal data structures are simple,
|
5597 |
|
|
and each bytecode requires only a few native machine instructions to
|
5598 |
|
|
implement it. The interpreter is small, and strict limits on the
|
5599 |
|
|
memory and time required to evaluate an expression are easy to
|
5600 |
|
|
determine, making it suitable for use by the debugging agent in
|
5601 |
|
|
real-time applications.
|
5602 |
|
|
|
5603 |
|
|
* Menu:
|
5604 |
|
|
|
5605 |
|
|
* General Bytecode Design:: Overview of the interpreter.
|
5606 |
|
|
* Bytecode Descriptions:: What each one does.
|
5607 |
|
|
* Using Agent Expressions:: How agent expressions fit into the big picture.
|
5608 |
|
|
* Varying Target Capabilities:: How to discover what the target can do.
|
5609 |
|
|
* Rationale:: Why we did it this way.
|
5610 |
|
|
|
5611 |
|
|
|
5612 |
|
|
File: gdb.info, Node: General Bytecode Design, Next: Bytecode Descriptions, Up: Agent Expressions
|
5613 |
|
|
|
5614 |
|
|
E.1 General Bytecode Design
|
5615 |
|
|
===========================
|
5616 |
|
|
|
5617 |
|
|
The agent represents bytecode expressions as an array of bytes. Each
|
5618 |
|
|
instruction is one byte long (thus the term "bytecode"). Some
|
5619 |
|
|
instructions are followed by operand bytes; for example, the `goto'
|
5620 |
|
|
instruction is followed by a destination for the jump.
|
5621 |
|
|
|
5622 |
|
|
The bytecode interpreter is a stack-based machine; most instructions
|
5623 |
|
|
pop their operands off the stack, perform some operation, and push the
|
5624 |
|
|
result back on the stack for the next instruction to consume. Each
|
5625 |
|
|
element of the stack may contain either a integer or a floating point
|
5626 |
|
|
value; these values are as many bits wide as the largest integer that
|
5627 |
|
|
can be directly manipulated in the source language. Stack elements
|
5628 |
|
|
carry no record of their type; bytecode could push a value as an
|
5629 |
|
|
integer, then pop it as a floating point value. However, GDB will not
|
5630 |
|
|
generate code which does this. In C, one might define the type of a
|
5631 |
|
|
stack element as follows:
|
5632 |
|
|
union agent_val {
|
5633 |
|
|
LONGEST l;
|
5634 |
|
|
DOUBLEST d;
|
5635 |
|
|
};
|
5636 |
|
|
where `LONGEST' and `DOUBLEST' are `typedef' names for the largest
|
5637 |
|
|
integer and floating point types on the machine.
|
5638 |
|
|
|
5639 |
|
|
By the time the bytecode interpreter reaches the end of the
|
5640 |
|
|
expression, the value of the expression should be the only value left
|
5641 |
|
|
on the stack. For tracing applications, `trace' bytecodes in the
|
5642 |
|
|
expression will have recorded the necessary data, and the value on the
|
5643 |
|
|
stack may be discarded. For other applications, like conditional
|
5644 |
|
|
breakpoints, the value may be useful.
|
5645 |
|
|
|
5646 |
|
|
Separate from the stack, the interpreter has two registers:
|
5647 |
|
|
`pc'
|
5648 |
|
|
The address of the next bytecode to execute.
|
5649 |
|
|
|
5650 |
|
|
`start'
|
5651 |
|
|
The address of the start of the bytecode expression, necessary for
|
5652 |
|
|
interpreting the `goto' and `if_goto' instructions.
|
5653 |
|
|
|
5654 |
|
|
Neither of these registers is directly visible to the bytecode
|
5655 |
|
|
language itself, but they are useful for defining the meanings of the
|
5656 |
|
|
bytecode operations.
|
5657 |
|
|
|
5658 |
|
|
There are no instructions to perform side effects on the running
|
5659 |
|
|
program, or call the program's functions; we assume that these
|
5660 |
|
|
expressions are only used for unobtrusive debugging, not for patching
|
5661 |
|
|
the running code.
|
5662 |
|
|
|
5663 |
|
|
Most bytecode instructions do not distinguish between the various
|
5664 |
|
|
sizes of values, and operate on full-width values; the upper bits of the
|
5665 |
|
|
values are simply ignored, since they do not usually make a difference
|
5666 |
|
|
to the value computed. The exceptions to this rule are:
|
5667 |
|
|
memory reference instructions (`ref'N)
|
5668 |
|
|
There are distinct instructions to fetch different word sizes from
|
5669 |
|
|
memory. Once on the stack, however, the values are treated as
|
5670 |
|
|
full-size integers. They may need to be sign-extended; the `ext'
|
5671 |
|
|
instruction exists for this purpose.
|
5672 |
|
|
|
5673 |
|
|
the sign-extension instruction (`ext' N)
|
5674 |
|
|
These clearly need to know which portion of their operand is to be
|
5675 |
|
|
extended to occupy the full length of the word.
|
5676 |
|
|
|
5677 |
|
|
|
5678 |
|
|
If the interpreter is unable to evaluate an expression completely for
|
5679 |
|
|
some reason (a memory location is inaccessible, or a divisor is zero,
|
5680 |
|
|
for example), we say that interpretation "terminates with an error".
|
5681 |
|
|
This means that the problem is reported back to the interpreter's caller
|
5682 |
|
|
in some helpful way. In general, code using agent expressions should
|
5683 |
|
|
assume that they may attempt to divide by zero, fetch arbitrary memory
|
5684 |
|
|
locations, and misbehave in other ways.
|
5685 |
|
|
|
5686 |
|
|
Even complicated C expressions compile to a few bytecode
|
5687 |
|
|
instructions; for example, the expression `x + y * z' would typically
|
5688 |
|
|
produce code like the following, assuming that `x' and `y' live in
|
5689 |
|
|
registers, and `z' is a global variable holding a 32-bit `int':
|
5690 |
|
|
reg 1
|
5691 |
|
|
reg 2
|
5692 |
|
|
const32 address of z
|
5693 |
|
|
ref32
|
5694 |
|
|
ext 32
|
5695 |
|
|
mul
|
5696 |
|
|
add
|
5697 |
|
|
end
|
5698 |
|
|
|
5699 |
|
|
In detail, these mean:
|
5700 |
|
|
`reg 1'
|
5701 |
|
|
Push the value of register 1 (presumably holding `x') onto the
|
5702 |
|
|
stack.
|
5703 |
|
|
|
5704 |
|
|
`reg 2'
|
5705 |
|
|
Push the value of register 2 (holding `y').
|
5706 |
|
|
|
5707 |
|
|
`const32 address of z'
|
5708 |
|
|
Push the address of `z' onto the stack.
|
5709 |
|
|
|
5710 |
|
|
`ref32'
|
5711 |
|
|
Fetch a 32-bit word from the address at the top of the stack;
|
5712 |
|
|
replace the address on the stack with the value. Thus, we replace
|
5713 |
|
|
the address of `z' with `z''s value.
|
5714 |
|
|
|
5715 |
|
|
`ext 32'
|
5716 |
|
|
Sign-extend the value on the top of the stack from 32 bits to full
|
5717 |
|
|
length. This is necessary because `z' is a signed integer.
|
5718 |
|
|
|
5719 |
|
|
`mul'
|
5720 |
|
|
Pop the top two numbers on the stack, multiply them, and push their
|
5721 |
|
|
product. Now the top of the stack contains the value of the
|
5722 |
|
|
expression `y * z'.
|
5723 |
|
|
|
5724 |
|
|
`add'
|
5725 |
|
|
Pop the top two numbers, add them, and push the sum. Now the top
|
5726 |
|
|
of the stack contains the value of `x + y * z'.
|
5727 |
|
|
|
5728 |
|
|
`end'
|
5729 |
|
|
Stop executing; the value left on the stack top is the value to be
|
5730 |
|
|
recorded.
|
5731 |
|
|
|
5732 |
|
|
|
5733 |
|
|
|
5734 |
|
|
File: gdb.info, Node: Bytecode Descriptions, Next: Using Agent Expressions, Prev: General Bytecode Design, Up: Agent Expressions
|
5735 |
|
|
|
5736 |
|
|
E.2 Bytecode Descriptions
|
5737 |
|
|
=========================
|
5738 |
|
|
|
5739 |
|
|
Each bytecode description has the following form:
|
5740 |
|
|
|
5741 |
|
|
`add' (0x02): A B => A+B
|
5742 |
|
|
Pop the top two stack items, A and B, as integers; push their sum,
|
5743 |
|
|
as an integer.
|
5744 |
|
|
|
5745 |
|
|
|
5746 |
|
|
In this example, `add' is the name of the bytecode, and `(0x02)' is
|
5747 |
|
|
the one-byte value used to encode the bytecode, in hexadecimal. The
|
5748 |
|
|
phrase "A B => A+B" shows the stack before and after the bytecode
|
5749 |
|
|
executes. Beforehand, the stack must contain at least two values, A
|
5750 |
|
|
and B; since the top of the stack is to the right, B is on the top of
|
5751 |
|
|
the stack, and A is underneath it. After execution, the bytecode will
|
5752 |
|
|
have popped A and B from the stack, and replaced them with a single
|
5753 |
|
|
value, A+B. There may be other values on the stack below those shown,
|
5754 |
|
|
but the bytecode affects only those shown.
|
5755 |
|
|
|
5756 |
|
|
Here is another example:
|
5757 |
|
|
|
5758 |
|
|
`const8' (0x22) N: => N
|
5759 |
|
|
Push the 8-bit integer constant N on the stack, without sign
|
5760 |
|
|
extension.
|
5761 |
|
|
|
5762 |
|
|
|
5763 |
|
|
In this example, the bytecode `const8' takes an operand N directly
|
5764 |
|
|
from the bytecode stream; the operand follows the `const8' bytecode
|
5765 |
|
|
itself. We write any such operands immediately after the name of the
|
5766 |
|
|
bytecode, before the colon, and describe the exact encoding of the
|
5767 |
|
|
operand in the bytecode stream in the body of the bytecode description.
|
5768 |
|
|
|
5769 |
|
|
For the `const8' bytecode, there are no stack items given before the
|
5770 |
|
|
=>; this simply means that the bytecode consumes no values from the
|
5771 |
|
|
stack. If a bytecode consumes no values, or produces no values, the
|
5772 |
|
|
list on either side of the => may be empty.
|
5773 |
|
|
|
5774 |
|
|
If a value is written as A, B, or N, then the bytecode treats it as
|
5775 |
|
|
an integer. If a value is written is ADDR, then the bytecode treats it
|
5776 |
|
|
as an address.
|
5777 |
|
|
|
5778 |
|
|
We do not fully describe the floating point operations here; although
|
5779 |
|
|
this design can be extended in a clean way to handle floating point
|
5780 |
|
|
values, they are not of immediate interest to the customer, so we avoid
|
5781 |
|
|
describing them, to save time.
|
5782 |
|
|
|
5783 |
|
|
`float' (0x01): =>
|
5784 |
|
|
Prefix for floating-point bytecodes. Not implemented yet.
|
5785 |
|
|
|
5786 |
|
|
`add' (0x02): A B => A+B
|
5787 |
|
|
Pop two integers from the stack, and push their sum, as an integer.
|
5788 |
|
|
|
5789 |
|
|
`sub' (0x03): A B => A-B
|
5790 |
|
|
Pop two integers from the stack, subtract the top value from the
|
5791 |
|
|
next-to-top value, and push the difference.
|
5792 |
|
|
|
5793 |
|
|
`mul' (0x04): A B => A*B
|
5794 |
|
|
Pop two integers from the stack, multiply them, and push the
|
5795 |
|
|
product on the stack. Note that, when one multiplies two N-bit
|
5796 |
|
|
numbers yielding another N-bit number, it is irrelevant whether the
|
5797 |
|
|
numbers are signed or not; the results are the same.
|
5798 |
|
|
|
5799 |
|
|
`div_signed' (0x05): A B => A/B
|
5800 |
|
|
Pop two signed integers from the stack; divide the next-to-top
|
5801 |
|
|
value by the top value, and push the quotient. If the divisor is
|
5802 |
|
|
zero, terminate with an error.
|
5803 |
|
|
|
5804 |
|
|
`div_unsigned' (0x06): A B => A/B
|
5805 |
|
|
Pop two unsigned integers from the stack; divide the next-to-top
|
5806 |
|
|
value by the top value, and push the quotient. If the divisor is
|
5807 |
|
|
zero, terminate with an error.
|
5808 |
|
|
|
5809 |
|
|
`rem_signed' (0x07): A B => A MODULO B
|
5810 |
|
|
Pop two signed integers from the stack; divide the next-to-top
|
5811 |
|
|
value by the top value, and push the remainder. If the divisor is
|
5812 |
|
|
zero, terminate with an error.
|
5813 |
|
|
|
5814 |
|
|
`rem_unsigned' (0x08): A B => A MODULO B
|
5815 |
|
|
Pop two unsigned integers from the stack; divide the next-to-top
|
5816 |
|
|
value by the top value, and push the remainder. If the divisor is
|
5817 |
|
|
zero, terminate with an error.
|
5818 |
|
|
|
5819 |
|
|
`lsh' (0x09): A B => A<
|
5820 |
|
|
Pop two integers from the stack; let A be the next-to-top value,
|
5821 |
|
|
and B be the top value. Shift A left by B bits, and push the
|
5822 |
|
|
result.
|
5823 |
|
|
|
5824 |
|
|
`rsh_signed' (0x0a): A B => `(signed)'A>>B
|
5825 |
|
|
Pop two integers from the stack; let A be the next-to-top value,
|
5826 |
|
|
and B be the top value. Shift A right by B bits, inserting copies
|
5827 |
|
|
of the top bit at the high end, and push the result.
|
5828 |
|
|
|
5829 |
|
|
`rsh_unsigned' (0x0b): A B => A>>B
|
5830 |
|
|
Pop two integers from the stack; let A be the next-to-top value,
|
5831 |
|
|
and B be the top value. Shift A right by B bits, inserting zero
|
5832 |
|
|
bits at the high end, and push the result.
|
5833 |
|
|
|
5834 |
|
|
`log_not' (0x0e): A => !A
|
5835 |
|
|
Pop an integer from the stack; if it is zero, push the value one;
|
5836 |
|
|
otherwise, push the value zero.
|
5837 |
|
|
|
5838 |
|
|
`bit_and' (0x0f): A B => A&B
|
5839 |
|
|
Pop two integers from the stack, and push their bitwise `and'.
|
5840 |
|
|
|
5841 |
|
|
`bit_or' (0x10): A B => A|B
|
5842 |
|
|
Pop two integers from the stack, and push their bitwise `or'.
|
5843 |
|
|
|
5844 |
|
|
`bit_xor' (0x11): A B => A^B
|
5845 |
|
|
Pop two integers from the stack, and push their bitwise
|
5846 |
|
|
exclusive-`or'.
|
5847 |
|
|
|
5848 |
|
|
`bit_not' (0x12): A => ~A
|
5849 |
|
|
Pop an integer from the stack, and push its bitwise complement.
|
5850 |
|
|
|
5851 |
|
|
`equal' (0x13): A B => A=B
|
5852 |
|
|
Pop two integers from the stack; if they are equal, push the value
|
5853 |
|
|
one; otherwise, push the value zero.
|
5854 |
|
|
|
5855 |
|
|
`less_signed' (0x14): A B => A
|
5856 |
|
|
Pop two signed integers from the stack; if the next-to-top value
|
5857 |
|
|
is less than the top value, push the value one; otherwise, push
|
5858 |
|
|
the value zero.
|
5859 |
|
|
|
5860 |
|
|
`less_unsigned' (0x15): A B => A
|
5861 |
|
|
Pop two unsigned integers from the stack; if the next-to-top value
|
5862 |
|
|
is less than the top value, push the value one; otherwise, push
|
5863 |
|
|
the value zero.
|
5864 |
|
|
|
5865 |
|
|
`ext' (0x16) N: A => A, sign-extended from N bits
|
5866 |
|
|
Pop an unsigned value from the stack; treating it as an N-bit
|
5867 |
|
|
twos-complement value, extend it to full length. This means that
|
5868 |
|
|
all bits to the left of bit N-1 (where the least significant bit
|
5869 |
|
|
is bit 0) are set to the value of bit N-1. Note that N may be
|
5870 |
|
|
larger than or equal to the width of the stack elements of the
|
5871 |
|
|
bytecode engine; in this case, the bytecode should have no effect.
|
5872 |
|
|
|
5873 |
|
|
The number of source bits to preserve, N, is encoded as a single
|
5874 |
|
|
byte unsigned integer following the `ext' bytecode.
|
5875 |
|
|
|
5876 |
|
|
`zero_ext' (0x2a) N: A => A, zero-extended from N bits
|
5877 |
|
|
Pop an unsigned value from the stack; zero all but the bottom N
|
5878 |
|
|
bits. This means that all bits to the left of bit N-1 (where the
|
5879 |
|
|
least significant bit is bit 0) are set to the value of bit N-1.
|
5880 |
|
|
|
5881 |
|
|
The number of source bits to preserve, N, is encoded as a single
|
5882 |
|
|
byte unsigned integer following the `zero_ext' bytecode.
|
5883 |
|
|
|
5884 |
|
|
`ref8' (0x17): ADDR => A
|
5885 |
|
|
`ref16' (0x18): ADDR => A
|
5886 |
|
|
`ref32' (0x19): ADDR => A
|
5887 |
|
|
`ref64' (0x1a): ADDR => A
|
5888 |
|
|
Pop an address ADDR from the stack. For bytecode `ref'N, fetch an
|
5889 |
|
|
N-bit value from ADDR, using the natural target endianness. Push
|
5890 |
|
|
the fetched value as an unsigned integer.
|
5891 |
|
|
|
5892 |
|
|
Note that ADDR may not be aligned in any particular way; the
|
5893 |
|
|
`refN' bytecodes should operate correctly for any address.
|
5894 |
|
|
|
5895 |
|
|
If attempting to access memory at ADDR would cause a processor
|
5896 |
|
|
exception of some sort, terminate with an error.
|
5897 |
|
|
|
5898 |
|
|
`ref_float' (0x1b): ADDR => D
|
5899 |
|
|
`ref_double' (0x1c): ADDR => D
|
5900 |
|
|
`ref_long_double' (0x1d): ADDR => D
|
5901 |
|
|
`l_to_d' (0x1e): A => D
|
5902 |
|
|
`d_to_l' (0x1f): D => A
|
5903 |
|
|
Not implemented yet.
|
5904 |
|
|
|
5905 |
|
|
`dup' (0x28): A => A A
|
5906 |
|
|
Push another copy of the stack's top element.
|
5907 |
|
|
|
5908 |
|
|
`swap' (0x2b): A B => B A
|
5909 |
|
|
Exchange the top two items on the stack.
|
5910 |
|
|
|
5911 |
|
|
`pop' (0x29): A =>
|
5912 |
|
|
Discard the top value on the stack.
|
5913 |
|
|
|
5914 |
|
|
`if_goto' (0x20) OFFSET: A =>
|
5915 |
|
|
Pop an integer off the stack; if it is non-zero, branch to the
|
5916 |
|
|
given offset in the bytecode string. Otherwise, continue to the
|
5917 |
|
|
next instruction in the bytecode stream. In other words, if A is
|
5918 |
|
|
non-zero, set the `pc' register to `start' + OFFSET. Thus, an
|
5919 |
|
|
offset of zero denotes the beginning of the expression.
|
5920 |
|
|
|
5921 |
|
|
The OFFSET is stored as a sixteen-bit unsigned value, stored
|
5922 |
|
|
immediately following the `if_goto' bytecode. It is always stored
|
5923 |
|
|
most significant byte first, regardless of the target's normal
|
5924 |
|
|
endianness. The offset is not guaranteed to fall at any particular
|
5925 |
|
|
alignment within the bytecode stream; thus, on machines where
|
5926 |
|
|
fetching a 16-bit on an unaligned address raises an exception, you
|
5927 |
|
|
should fetch the offset one byte at a time.
|
5928 |
|
|
|
5929 |
|
|
`goto' (0x21) OFFSET: =>
|
5930 |
|
|
Branch unconditionally to OFFSET; in other words, set the `pc'
|
5931 |
|
|
register to `start' + OFFSET.
|
5932 |
|
|
|
5933 |
|
|
The offset is stored in the same way as for the `if_goto' bytecode.
|
5934 |
|
|
|
5935 |
|
|
`const8' (0x22) N: => N
|
5936 |
|
|
`const16' (0x23) N: => N
|
5937 |
|
|
`const32' (0x24) N: => N
|
5938 |
|
|
`const64' (0x25) N: => N
|
5939 |
|
|
Push the integer constant N on the stack, without sign extension.
|
5940 |
|
|
To produce a small negative value, push a small twos-complement
|
5941 |
|
|
value, and then sign-extend it using the `ext' bytecode.
|
5942 |
|
|
|
5943 |
|
|
The constant N is stored in the appropriate number of bytes
|
5944 |
|
|
following the `const'B bytecode. The constant N is always stored
|
5945 |
|
|
most significant byte first, regardless of the target's normal
|
5946 |
|
|
endianness. The constant is not guaranteed to fall at any
|
5947 |
|
|
particular alignment within the bytecode stream; thus, on machines
|
5948 |
|
|
where fetching a 16-bit on an unaligned address raises an
|
5949 |
|
|
exception, you should fetch N one byte at a time.
|
5950 |
|
|
|
5951 |
|
|
`reg' (0x26) N: => A
|
5952 |
|
|
Push the value of register number N, without sign extension. The
|
5953 |
|
|
registers are numbered following GDB's conventions.
|
5954 |
|
|
|
5955 |
|
|
The register number N is encoded as a 16-bit unsigned integer
|
5956 |
|
|
immediately following the `reg' bytecode. It is always stored most
|
5957 |
|
|
significant byte first, regardless of the target's normal
|
5958 |
|
|
endianness. The register number is not guaranteed to fall at any
|
5959 |
|
|
particular alignment within the bytecode stream; thus, on machines
|
5960 |
|
|
where fetching a 16-bit on an unaligned address raises an
|
5961 |
|
|
exception, you should fetch the register number one byte at a time.
|
5962 |
|
|
|
5963 |
|
|
`getv' (0x2c) N: => V
|
5964 |
|
|
Push the value of trace state variable number N, without sign
|
5965 |
|
|
extension.
|
5966 |
|
|
|
5967 |
|
|
The variable number N is encoded as a 16-bit unsigned integer
|
5968 |
|
|
immediately following the `getv' bytecode. It is always stored
|
5969 |
|
|
most significant byte first, regardless of the target's normal
|
5970 |
|
|
endianness. The variable number is not guaranteed to fall at any
|
5971 |
|
|
particular alignment within the bytecode stream; thus, on machines
|
5972 |
|
|
where fetching a 16-bit on an unaligned address raises an
|
5973 |
|
|
exception, you should fetch the register number one byte at a time.
|
5974 |
|
|
|
5975 |
|
|
`setv' (0x2d) N: => V
|
5976 |
|
|
Set trace state variable number N to the value found on the top of
|
5977 |
|
|
the stack. The stack is unchanged, so that the value is readily
|
5978 |
|
|
available if the assignment is part of a larger expression. The
|
5979 |
|
|
handling of N is as described for `getv'.
|
5980 |
|
|
|
5981 |
|
|
`trace' (0x0c): ADDR SIZE =>
|
5982 |
|
|
Record the contents of the SIZE bytes at ADDR in a trace buffer,
|
5983 |
|
|
for later retrieval by GDB.
|
5984 |
|
|
|
5985 |
|
|
`trace_quick' (0x0d) SIZE: ADDR => ADDR
|
5986 |
|
|
Record the contents of the SIZE bytes at ADDR in a trace buffer,
|
5987 |
|
|
for later retrieval by GDB. SIZE is a single byte unsigned
|
5988 |
|
|
integer following the `trace' opcode.
|
5989 |
|
|
|
5990 |
|
|
This bytecode is equivalent to the sequence `dup const8 SIZE
|
5991 |
|
|
trace', but we provide it anyway to save space in bytecode strings.
|
5992 |
|
|
|
5993 |
|
|
`trace16' (0x30) SIZE: ADDR => ADDR
|
5994 |
|
|
Identical to trace_quick, except that SIZE is a 16-bit big-endian
|
5995 |
|
|
unsigned integer, not a single byte. This should probably have
|
5996 |
|
|
been named `trace_quick16', for consistency.
|
5997 |
|
|
|
5998 |
|
|
`tracev' (0x2e) N: => A
|
5999 |
|
|
Record the value of trace state variable number N in the trace
|
6000 |
|
|
buffer. The handling of N is as described for `getv'.
|
6001 |
|
|
|
6002 |
|
|
`end' (0x27): =>
|
6003 |
|
|
Stop executing bytecode; the result should be the top element of
|
6004 |
|
|
the stack. If the purpose of the expression was to compute an
|
6005 |
|
|
lvalue or a range of memory, then the next-to-top of the stack is
|
6006 |
|
|
the lvalue's address, and the top of the stack is the lvalue's
|
6007 |
|
|
size, in bytes.
|
6008 |
|
|
|
6009 |
|
|
|
6010 |
|
|
|
6011 |
|
|
File: gdb.info, Node: Using Agent Expressions, Next: Varying Target Capabilities, Prev: Bytecode Descriptions, Up: Agent Expressions
|
6012 |
|
|
|
6013 |
|
|
E.3 Using Agent Expressions
|
6014 |
|
|
===========================
|
6015 |
|
|
|
6016 |
|
|
Agent expressions can be used in several different ways by GDB, and the
|
6017 |
|
|
debugger can generate different bytecode sequences as appropriate.
|
6018 |
|
|
|
6019 |
|
|
One possibility is to do expression evaluation on the target rather
|
6020 |
|
|
than the host, such as for the conditional of a conditional tracepoint.
|
6021 |
|
|
In such a case, GDB compiles the source expression into a bytecode
|
6022 |
|
|
sequence that simply gets values from registers or memory, does
|
6023 |
|
|
arithmetic, and returns a result.
|
6024 |
|
|
|
6025 |
|
|
Another way to use agent expressions is for tracepoint data
|
6026 |
|
|
collection. GDB generates a different bytecode sequence for
|
6027 |
|
|
collection; in addition to bytecodes that do the calculation, GDB adds
|
6028 |
|
|
`trace' bytecodes to save the pieces of memory that were used.
|
6029 |
|
|
|
6030 |
|
|
* The user selects trace points in the program's code at which GDB
|
6031 |
|
|
should collect data.
|
6032 |
|
|
|
6033 |
|
|
* The user specifies expressions to evaluate at each trace point.
|
6034 |
|
|
These expressions may denote objects in memory, in which case
|
6035 |
|
|
those objects' contents are recorded as the program runs, or
|
6036 |
|
|
computed values, in which case the values themselves are recorded.
|
6037 |
|
|
|
6038 |
|
|
* GDB transmits the tracepoints and their associated expressions to
|
6039 |
|
|
the GDB agent, running on the debugging target.
|
6040 |
|
|
|
6041 |
|
|
* The agent arranges to be notified when a trace point is hit.
|
6042 |
|
|
|
6043 |
|
|
* When execution on the target reaches a trace point, the agent
|
6044 |
|
|
evaluates the expressions associated with that trace point, and
|
6045 |
|
|
records the resulting values and memory ranges.
|
6046 |
|
|
|
6047 |
|
|
* Later, when the user selects a given trace event and inspects the
|
6048 |
|
|
objects and expression values recorded, GDB talks to the agent to
|
6049 |
|
|
retrieve recorded data as necessary to meet the user's requests.
|
6050 |
|
|
If the user asks to see an object whose contents have not been
|
6051 |
|
|
recorded, GDB reports an error.
|
6052 |
|
|
|
6053 |
|
|
|
6054 |
|
|
|
6055 |
|
|
File: gdb.info, Node: Varying Target Capabilities, Next: Rationale, Prev: Using Agent Expressions, Up: Agent Expressions
|
6056 |
|
|
|
6057 |
|
|
E.4 Varying Target Capabilities
|
6058 |
|
|
===============================
|
6059 |
|
|
|
6060 |
|
|
Some targets don't support floating-point, and some would rather not
|
6061 |
|
|
have to deal with `long long' operations. Also, different targets will
|
6062 |
|
|
have different stack sizes, and different bytecode buffer lengths.
|
6063 |
|
|
|
6064 |
|
|
Thus, GDB needs a way to ask the target about itself. We haven't
|
6065 |
|
|
worked out the details yet, but in general, GDB should be able to send
|
6066 |
|
|
the target a packet asking it to describe itself. The reply should be a
|
6067 |
|
|
packet whose length is explicit, so we can add new information to the
|
6068 |
|
|
packet in future revisions of the agent, without confusing old versions
|
6069 |
|
|
of GDB, and it should contain a version number. It should contain at
|
6070 |
|
|
least the following information:
|
6071 |
|
|
|
6072 |
|
|
* whether floating point is supported
|
6073 |
|
|
|
6074 |
|
|
* whether `long long' is supported
|
6075 |
|
|
|
6076 |
|
|
* maximum acceptable size of bytecode stack
|
6077 |
|
|
|
6078 |
|
|
* maximum acceptable length of bytecode expressions
|
6079 |
|
|
|
6080 |
|
|
* which registers are actually available for collection
|
6081 |
|
|
|
6082 |
|
|
* whether the target supports disabled tracepoints
|
6083 |
|
|
|
6084 |
|
|
|
6085 |
|
|
|
6086 |
|
|
File: gdb.info, Node: Rationale, Prev: Varying Target Capabilities, Up: Agent Expressions
|
6087 |
|
|
|
6088 |
|
|
E.5 Rationale
|
6089 |
|
|
=============
|
6090 |
|
|
|
6091 |
|
|
Some of the design decisions apparent above are arguable.
|
6092 |
|
|
|
6093 |
|
|
What about stack overflow/underflow?
|
6094 |
|
|
GDB should be able to query the target to discover its stack size.
|
6095 |
|
|
Given that information, GDB can determine at translation time
|
6096 |
|
|
whether a given expression will overflow the stack. But this spec
|
6097 |
|
|
isn't about what kinds of error-checking GDB ought to do.
|
6098 |
|
|
|
6099 |
|
|
Why are you doing everything in LONGEST?
|
6100 |
|
|
Speed isn't important, but agent code size is; using LONGEST
|
6101 |
|
|
brings in a bunch of support code to do things like division, etc.
|
6102 |
|
|
So this is a serious concern.
|
6103 |
|
|
|
6104 |
|
|
First, note that you don't need different bytecodes for different
|
6105 |
|
|
operand sizes. You can generate code without _knowing_ how big the
|
6106 |
|
|
stack elements actually are on the target. If the target only
|
6107 |
|
|
supports 32-bit ints, and you don't send any 64-bit bytecodes,
|
6108 |
|
|
everything just works. The observation here is that the MIPS and
|
6109 |
|
|
the Alpha have only fixed-size registers, and you can still get
|
6110 |
|
|
C's semantics even though most instructions only operate on
|
6111 |
|
|
full-sized words. You just need to make sure everything is
|
6112 |
|
|
properly sign-extended at the right times. So there is no need
|
6113 |
|
|
for 32- and 64-bit variants of the bytecodes. Just implement
|
6114 |
|
|
everything using the largest size you support.
|
6115 |
|
|
|
6116 |
|
|
GDB should certainly check to see what sizes the target supports,
|
6117 |
|
|
so the user can get an error earlier, rather than later. But this
|
6118 |
|
|
information is not necessary for correctness.
|
6119 |
|
|
|
6120 |
|
|
Why don't you have `>' or `<=' operators?
|
6121 |
|
|
I want to keep the interpreter small, and we don't need them. We
|
6122 |
|
|
can combine the `less_' opcodes with `log_not', and swap the order
|
6123 |
|
|
of the operands, yielding all four asymmetrical comparison
|
6124 |
|
|
operators. For example, `(x <= y)' is `! (x > y)', which is `! (y
|
6125 |
|
|
< x)'.
|
6126 |
|
|
|
6127 |
|
|
Why do you have `log_not'?
|
6128 |
|
|
Why do you have `ext'?
|
6129 |
|
|
Why do you have `zero_ext'?
|
6130 |
|
|
These are all easily synthesized from other instructions, but I
|
6131 |
|
|
expect them to be used frequently, and they're simple, so I
|
6132 |
|
|
include them to keep bytecode strings short.
|
6133 |
|
|
|
6134 |
|
|
`log_not' is equivalent to `const8 0 equal'; it's used in half the
|
6135 |
|
|
relational operators.
|
6136 |
|
|
|
6137 |
|
|
`ext N' is equivalent to `const8 S-N lsh const8 S-N rsh_signed',
|
6138 |
|
|
where S is the size of the stack elements; it follows `refM' and
|
6139 |
|
|
REG bytecodes when the value should be signed. See the next
|
6140 |
|
|
bulleted item.
|
6141 |
|
|
|
6142 |
|
|
`zero_ext N' is equivalent to `constM MASK log_and'; it's used
|
6143 |
|
|
whenever we push the value of a register, because we can't assume
|
6144 |
|
|
the upper bits of the register aren't garbage.
|
6145 |
|
|
|
6146 |
|
|
Why not have sign-extending variants of the `ref' operators?
|
6147 |
|
|
Because that would double the number of `ref' operators, and we
|
6148 |
|
|
need the `ext' bytecode anyway for accessing bitfields.
|
6149 |
|
|
|
6150 |
|
|
Why not have constant-address variants of the `ref' operators?
|
6151 |
|
|
Because that would double the number of `ref' operators again, and
|
6152 |
|
|
`const32 ADDRESS ref32' is only one byte longer.
|
6153 |
|
|
|
6154 |
|
|
Why do the `refN' operators have to support unaligned fetches?
|
6155 |
|
|
GDB will generate bytecode that fetches multi-byte values at
|
6156 |
|
|
unaligned addresses whenever the executable's debugging
|
6157 |
|
|
information tells it to. Furthermore, GDB does not know the value
|
6158 |
|
|
the pointer will have when GDB generates the bytecode, so it
|
6159 |
|
|
cannot determine whether a particular fetch will be aligned or not.
|
6160 |
|
|
|
6161 |
|
|
In particular, structure bitfields may be several bytes long, but
|
6162 |
|
|
follow no alignment rules; members of packed structures are not
|
6163 |
|
|
necessarily aligned either.
|
6164 |
|
|
|
6165 |
|
|
In general, there are many cases where unaligned references occur
|
6166 |
|
|
in correct C code, either at the programmer's explicit request, or
|
6167 |
|
|
at the compiler's discretion. Thus, it is simpler to make the GDB
|
6168 |
|
|
agent bytecodes work correctly in all circumstances than to make
|
6169 |
|
|
GDB guess in each case whether the compiler did the usual thing.
|
6170 |
|
|
|
6171 |
|
|
Why are there no side-effecting operators?
|
6172 |
|
|
Because our current client doesn't want them? That's a cheap
|
6173 |
|
|
answer. I think the real answer is that I'm afraid of
|
6174 |
|
|
implementing function calls. We should re-visit this issue after
|
6175 |
|
|
the present contract is delivered.
|
6176 |
|
|
|
6177 |
|
|
Why aren't the `goto' ops PC-relative?
|
6178 |
|
|
The interpreter has the base address around anyway for PC bounds
|
6179 |
|
|
checking, and it seemed simpler.
|
6180 |
|
|
|
6181 |
|
|
Why is there only one offset size for the `goto' ops?
|
6182 |
|
|
Offsets are currently sixteen bits. I'm not happy with this
|
6183 |
|
|
situation either:
|
6184 |
|
|
|
6185 |
|
|
Suppose we have multiple branch ops with different offset sizes.
|
6186 |
|
|
As I generate code left-to-right, all my jumps are forward jumps
|
6187 |
|
|
(there are no loops in expressions), so I never know the target
|
6188 |
|
|
when I emit the jump opcode. Thus, I have to either always assume
|
6189 |
|
|
the largest offset size, or do jump relaxation on the code after I
|
6190 |
|
|
generate it, which seems like a big waste of time.
|
6191 |
|
|
|
6192 |
|
|
I can imagine a reasonable expression being longer than 256 bytes.
|
6193 |
|
|
I can't imagine one being longer than 64k. Thus, we need 16-bit
|
6194 |
|
|
offsets. This kind of reasoning is so bogus, but relaxation is
|
6195 |
|
|
pathetic.
|
6196 |
|
|
|
6197 |
|
|
The other approach would be to generate code right-to-left. Then
|
6198 |
|
|
I'd always know my offset size. That might be fun.
|
6199 |
|
|
|
6200 |
|
|
Where is the function call bytecode?
|
6201 |
|
|
When we add side-effects, we should add this.
|
6202 |
|
|
|
6203 |
|
|
Why does the `reg' bytecode take a 16-bit register number?
|
6204 |
|
|
Intel's IA-64 architecture has 128 general-purpose registers, and
|
6205 |
|
|
128 floating-point registers, and I'm sure it has some random
|
6206 |
|
|
control registers.
|
6207 |
|
|
|
6208 |
|
|
Why do we need `trace' and `trace_quick'?
|
6209 |
|
|
Because GDB needs to record all the memory contents and registers
|
6210 |
|
|
an expression touches. If the user wants to evaluate an expression
|
6211 |
|
|
`x->y->z', the agent must record the values of `x' and `x->y' as
|
6212 |
|
|
well as the value of `x->y->z'.
|
6213 |
|
|
|
6214 |
|
|
Don't the `trace' bytecodes make the interpreter less general?
|
6215 |
|
|
They do mean that the interpreter contains special-purpose code,
|
6216 |
|
|
but that doesn't mean the interpreter can only be used for that
|
6217 |
|
|
purpose. If an expression doesn't use the `trace' bytecodes, they
|
6218 |
|
|
don't get in its way.
|
6219 |
|
|
|
6220 |
|
|
Why doesn't `trace_quick' consume its arguments the way everything else does?
|
6221 |
|
|
In general, you do want your operators to consume their arguments;
|
6222 |
|
|
it's consistent, and generally reduces the amount of stack
|
6223 |
|
|
rearrangement necessary. However, `trace_quick' is a kludge to
|
6224 |
|
|
save space; it only exists so we needn't write `dup const8 SIZE
|
6225 |
|
|
trace' before every memory reference. Therefore, it's okay for it
|
6226 |
|
|
not to consume its arguments; it's meant for a specific context in
|
6227 |
|
|
which we know exactly what it should do with the stack. If we're
|
6228 |
|
|
going to have a kludge, it should be an effective kludge.
|
6229 |
|
|
|
6230 |
|
|
Why does `trace16' exist?
|
6231 |
|
|
That opcode was added by the customer that contracted Cygnus for
|
6232 |
|
|
the data tracing work. I personally think it is unnecessary;
|
6233 |
|
|
objects that large will be quite rare, so it is okay to use `dup
|
6234 |
|
|
const16 SIZE trace' in those cases.
|
6235 |
|
|
|
6236 |
|
|
Whatever we decide to do with `trace16', we should at least leave
|
6237 |
|
|
opcode 0x30 reserved, to remain compatible with the customer who
|
6238 |
|
|
added it.
|
6239 |
|
|
|
6240 |
|
|
|
6241 |
|
|
|
6242 |
|
|
File: gdb.info, Node: Trace File Format, Next: Copying, Prev: Operating System Information, Up: Top
|
6243 |
|
|
|
6244 |
|
|
Appendix F Trace File Format
|
6245 |
|
|
****************************
|
6246 |
|
|
|
6247 |
|
|
The trace file comes in three parts: a header, a textual description
|
6248 |
|
|
section, and a trace frame section with binary data.
|
6249 |
|
|
|
6250 |
|
|
The header has the form `\x7fTRACE0\n'. The first byte is `0x7f' so
|
6251 |
|
|
as to indicate that the file contains binary data, while the `0' is a
|
6252 |
|
|
version number that may have different values in the future.
|
6253 |
|
|
|
6254 |
|
|
The description section consists of multiple lines of ASCII text
|
6255 |
|
|
separated by newline characters (`0xa'). The lines may include a
|
6256 |
|
|
variety of optional descriptive or context-setting information, such as
|
6257 |
|
|
tracepoint definitions or register set size. GDB will ignore any line
|
6258 |
|
|
that it does not recognize. An empty line marks the end of this
|
6259 |
|
|
section.
|
6260 |
|
|
|
6261 |
|
|
The trace frame section consists of a number of consecutive frames.
|
6262 |
|
|
Each frame begins with a two-byte tracepoint number, followed by a
|
6263 |
|
|
four-byte size giving the amount of data in the frame. The data in the
|
6264 |
|
|
frame consists of a number of blocks, each introduced by a character
|
6265 |
|
|
indicating its type (at least register, memory, and trace state
|
6266 |
|
|
variable). The data in this section is raw binary, not a hexadecimal
|
6267 |
|
|
or other encoding; its endianness matches the target's endianness.
|
6268 |
|
|
|
6269 |
|
|
`R BYTES'
|
6270 |
|
|
Register block. The number and ordering of bytes matches that of a
|
6271 |
|
|
`g' packet in the remote protocol. Note that these are the actual
|
6272 |
|
|
bytes, in target order and GDB register order, not a hexadecimal
|
6273 |
|
|
encoding.
|
6274 |
|
|
|
6275 |
|
|
`M ADDRESS LENGTH BYTES...'
|
6276 |
|
|
Memory block. This is a contiguous block of memory, at the 8-byte
|
6277 |
|
|
address ADDRESS, with a 2-byte length LENGTH, followed by LENGTH
|
6278 |
|
|
bytes.
|
6279 |
|
|
|
6280 |
|
|
`V NUMBER VALUE'
|
6281 |
|
|
Trace state variable block. This records the 8-byte signed value
|
6282 |
|
|
VALUE of trace state variable numbered NUMBER.
|
6283 |
|
|
|
6284 |
|
|
|
6285 |
|
|
Future enhancements of the trace file format may include additional
|
6286 |
|
|
types of blocks.
|
6287 |
|
|
|
6288 |
|
|
|
6289 |
|
|
File: gdb.info, Node: Target Descriptions, Next: Operating System Information, Prev: Agent Expressions, Up: Top
|
6290 |
|
|
|
6291 |
|
|
Appendix G Target Descriptions
|
6292 |
|
|
******************************
|
6293 |
|
|
|
6294 |
|
|
*Warning:* target descriptions are still under active development, and
|
6295 |
|
|
the contents and format may change between GDB releases. The format is
|
6296 |
|
|
expected to stabilize in the future.
|
6297 |
|
|
|
6298 |
|
|
One of the challenges of using GDB to debug embedded systems is that
|
6299 |
|
|
there are so many minor variants of each processor architecture in use.
|
6300 |
|
|
It is common practice for vendors to start with a standard processor
|
6301 |
|
|
core -- ARM, PowerPC, or MIPS, for example -- and then make changes to
|
6302 |
|
|
adapt it to a particular market niche. Some architectures have
|
6303 |
|
|
hundreds of variants, available from dozens of vendors. This leads to
|
6304 |
|
|
a number of problems:
|
6305 |
|
|
|
6306 |
|
|
* With so many different customized processors, it is difficult for
|
6307 |
|
|
the GDB maintainers to keep up with the changes.
|
6308 |
|
|
|
6309 |
|
|
* Since individual variants may have short lifetimes or limited
|
6310 |
|
|
audiences, it may not be worthwhile to carry information about
|
6311 |
|
|
every variant in the GDB source tree.
|
6312 |
|
|
|
6313 |
|
|
* When GDB does support the architecture of the embedded system at
|
6314 |
|
|
hand, the task of finding the correct architecture name to give the
|
6315 |
|
|
`set architecture' command can be error-prone.
|
6316 |
|
|
|
6317 |
|
|
To address these problems, the GDB remote protocol allows a target
|
6318 |
|
|
system to not only identify itself to GDB, but to actually describe its
|
6319 |
|
|
own features. This lets GDB support processor variants it has never
|
6320 |
|
|
seen before -- to the extent that the descriptions are accurate, and
|
6321 |
|
|
that GDB understands them.
|
6322 |
|
|
|
6323 |
|
|
GDB must be linked with the Expat library to support XML target
|
6324 |
|
|
descriptions. *Note Expat::.
|
6325 |
|
|
|
6326 |
|
|
* Menu:
|
6327 |
|
|
|
6328 |
|
|
* Retrieving Descriptions:: How descriptions are fetched from a target.
|
6329 |
|
|
* Target Description Format:: The contents of a target description.
|
6330 |
|
|
* Predefined Target Types:: Standard types available for target
|
6331 |
|
|
descriptions.
|
6332 |
|
|
* Standard Target Features:: Features GDB knows about.
|
6333 |
|
|
|
6334 |
|
|
|
6335 |
|
|
File: gdb.info, Node: Retrieving Descriptions, Next: Target Description Format, Up: Target Descriptions
|
6336 |
|
|
|
6337 |
|
|
G.1 Retrieving Descriptions
|
6338 |
|
|
===========================
|
6339 |
|
|
|
6340 |
|
|
Target descriptions can be read from the target automatically, or
|
6341 |
|
|
specified by the user manually. The default behavior is to read the
|
6342 |
|
|
description from the target. GDB retrieves it via the remote protocol
|
6343 |
|
|
using `qXfer' requests (*note qXfer: General Query Packets.). The
|
6344 |
|
|
ANNEX in the `qXfer' packet will be `target.xml'. The contents of the
|
6345 |
|
|
`target.xml' annex are an XML document, of the form described in *Note
|
6346 |
|
|
Target Description Format::.
|
6347 |
|
|
|
6348 |
|
|
Alternatively, you can specify a file to read for the target
|
6349 |
|
|
description. If a file is set, the target will not be queried. The
|
6350 |
|
|
commands to specify a file are:
|
6351 |
|
|
|
6352 |
|
|
`set tdesc filename PATH'
|
6353 |
|
|
Read the target description from PATH.
|
6354 |
|
|
|
6355 |
|
|
`unset tdesc filename'
|
6356 |
|
|
Do not read the XML target description from a file. GDB will use
|
6357 |
|
|
the description supplied by the current target.
|
6358 |
|
|
|
6359 |
|
|
`show tdesc filename'
|
6360 |
|
|
Show the filename to read for a target description, if any.
|
6361 |
|
|
|
6362 |
|
|
|
6363 |
|
|
File: gdb.info, Node: Target Description Format, Next: Predefined Target Types, Prev: Retrieving Descriptions, Up: Target Descriptions
|
6364 |
|
|
|
6365 |
|
|
G.2 Target Description Format
|
6366 |
|
|
=============================
|
6367 |
|
|
|
6368 |
|
|
A target description annex is an XML (http://www.w3.org/XML/) document
|
6369 |
|
|
which complies with the Document Type Definition provided in the GDB
|
6370 |
|
|
sources in `gdb/features/gdb-target.dtd'. This means you can use
|
6371 |
|
|
generally available tools like `xmllint' to check that your feature
|
6372 |
|
|
descriptions are well-formed and valid. However, to help people
|
6373 |
|
|
unfamiliar with XML write descriptions for their targets, we also
|
6374 |
|
|
describe the grammar here.
|
6375 |
|
|
|
6376 |
|
|
Target descriptions can identify the architecture of the remote
|
6377 |
|
|
target and (for some architectures) provide information about custom
|
6378 |
|
|
register sets. They can also identify the OS ABI of the remote target.
|
6379 |
|
|
GDB can use this information to autoconfigure for your target, or to
|
6380 |
|
|
warn you if you connect to an unsupported target.
|
6381 |
|
|
|
6382 |
|
|
Here is a simple target description:
|
6383 |
|
|
|
6384 |
|
|
|
6385 |
|
|
i386:x86-64
|
6386 |
|
|
|
6387 |
|
|
|
6388 |
|
|
This minimal description only says that the target uses the x86-64
|
6389 |
|
|
architecture.
|
6390 |
|
|
|
6391 |
|
|
A target description has the following overall form, with [ ] marking
|
6392 |
|
|
optional elements and ... marking repeatable elements. The elements
|
6393 |
|
|
are explained further below.
|
6394 |
|
|
|
6395 |
|
|
|
6396 |
|
|
|
6397 |
|
|
|
6398 |
|
|
[ARCHITECTURE]
|
6399 |
|
|
[OSABI]
|
6400 |
|
|
[COMPATIBLE]
|
6401 |
|
|
[FEATURE...]
|
6402 |
|
|
|
6403 |
|
|
|
6404 |
|
|
The description is generally insensitive to whitespace and line breaks,
|
6405 |
|
|
under the usual common-sense rules. The XML version declaration and
|
6406 |
|
|
document type declaration can generally be omitted (GDB does not
|
6407 |
|
|
require them), but specifying them may be useful for XML validation
|
6408 |
|
|
tools. The `version' attribute for `' may also be omitted, but
|
6409 |
|
|
we recommend including it; if future versions of GDB use an incompatible
|
6410 |
|
|
revision of `gdb-target.dtd', they will detect and report the version
|
6411 |
|
|
mismatch.
|
6412 |
|
|
|
6413 |
|
|
G.2.1 Inclusion
|
6414 |
|
|
---------------
|
6415 |
|
|
|
6416 |
|
|
It can sometimes be valuable to split a target description up into
|
6417 |
|
|
several different annexes, either for organizational purposes, or to
|
6418 |
|
|
share files between different possible target descriptions. You can
|
6419 |
|
|
divide a description into multiple files by replacing any element of
|
6420 |
|
|
the target description with an inclusion directive of the form:
|
6421 |
|
|
|
6422 |
|
|
|
6423 |
|
|
|
6424 |
|
|
When GDB encounters an element of this form, it will retrieve the named
|
6425 |
|
|
XML DOCUMENT, and replace the inclusion directive with the contents of
|
6426 |
|
|
that document. If the current description was read using `qXfer', then
|
6427 |
|
|
so will be the included document; DOCUMENT will be interpreted as the
|
6428 |
|
|
name of an annex. If the current description was read from a file, GDB
|
6429 |
|
|
will look for DOCUMENT as a file in the same directory where it found
|
6430 |
|
|
the original description.
|
6431 |
|
|
|
6432 |
|
|
G.2.2 Architecture
|
6433 |
|
|
------------------
|
6434 |
|
|
|
6435 |
|
|
An `' element has this form:
|
6436 |
|
|
|
6437 |
|
|
ARCH
|
6438 |
|
|
|
6439 |
|
|
ARCH is one of the architectures from the set accepted by `set
|
6440 |
|
|
architecture' (*note Specifying a Debugging Target: Targets.).
|
6441 |
|
|
|
6442 |
|
|
G.2.3 OS ABI
|
6443 |
|
|
------------
|
6444 |
|
|
|
6445 |
|
|
This optional field was introduced in GDB version 7.0. Previous
|
6446 |
|
|
versions of GDB ignore it.
|
6447 |
|
|
|
6448 |
|
|
An `' element has this form:
|
6449 |
|
|
|
6450 |
|
|
ABI-NAME
|
6451 |
|
|
|
6452 |
|
|
ABI-NAME is an OS ABI name from the same selection accepted by
|
6453 |
|
|
`set osabi' (*note Configuring the Current ABI: ABI.).
|
6454 |
|
|
|
6455 |
|
|
G.2.4 Compatible Architecture
|
6456 |
|
|
-----------------------------
|
6457 |
|
|
|
6458 |
|
|
This optional field was introduced in GDB version 7.0. Previous
|
6459 |
|
|
versions of GDB ignore it.
|
6460 |
|
|
|
6461 |
|
|
A `' element has this form:
|
6462 |
|
|
|
6463 |
|
|
ARCH
|
6464 |
|
|
|
6465 |
|
|
ARCH is one of the architectures from the set accepted by `set
|
6466 |
|
|
architecture' (*note Specifying a Debugging Target: Targets.).
|
6467 |
|
|
|
6468 |
|
|
A `' element is used to specify that the target is able
|
6469 |
|
|
to run binaries in some other than the main target architecture given
|
6470 |
|
|
by the `' element. For example, on the Cell Broadband
|
6471 |
|
|
Engine, the main architecture is `powerpc:common' or
|
6472 |
|
|
`powerpc:common64', but the system is able to run binaries in the `spu'
|
6473 |
|
|
architecture as well. The way to describe this capability with
|
6474 |
|
|
`' is as follows:
|
6475 |
|
|
|
6476 |
|
|
powerpc:common
|
6477 |
|
|
spu
|
6478 |
|
|
|
6479 |
|
|
G.2.5 Features
|
6480 |
|
|
--------------
|
6481 |
|
|
|
6482 |
|
|
Each `' describes some logical portion of the target system.
|
6483 |
|
|
Features are currently used to describe available CPU registers and the
|
6484 |
|
|
types of their contents. A `' element has this form:
|
6485 |
|
|
|
6486 |
|
|
|
6487 |
|
|
[TYPE...]
|
6488 |
|
|
REG...
|
6489 |
|
|
|
6490 |
|
|
|
6491 |
|
|
Each feature's name should be unique within the description. The name
|
6492 |
|
|
of a feature does not matter unless GDB has some special knowledge of
|
6493 |
|
|
the contents of that feature; if it does, the feature should have its
|
6494 |
|
|
standard name. *Note Standard Target Features::.
|
6495 |
|
|
|
6496 |
|
|
G.2.6 Types
|
6497 |
|
|
-----------
|
6498 |
|
|
|
6499 |
|
|
Any register's value is a collection of bits which GDB must interpret.
|
6500 |
|
|
The default interpretation is a two's complement integer, but other
|
6501 |
|
|
types can be requested by name in the register description. Some
|
6502 |
|
|
predefined types are provided by GDB (*note Predefined Target Types::),
|
6503 |
|
|
and the description can define additional composite types.
|
6504 |
|
|
|
6505 |
|
|
Each type element must have an `id' attribute, which gives a unique
|
6506 |
|
|
(within the containing `') name to the type. Types must be
|
6507 |
|
|
defined before they are used.
|
6508 |
|
|
|
6509 |
|
|
Some targets offer vector registers, which can be treated as arrays
|
6510 |
|
|
of scalar elements. These types are written as `' elements,
|
6511 |
|
|
specifying the array element type, TYPE, and the number of elements,
|
6512 |
|
|
COUNT:
|
6513 |
|
|
|
6514 |
|
|
|
6515 |
|
|
|
6516 |
|
|
If a register's value is usefully viewed in multiple ways, define it
|
6517 |
|
|
with a union type containing the useful representations. The `'
|
6518 |
|
|
element contains one or more `' elements, each of which has a
|
6519 |
|
|
NAME and a TYPE:
|
6520 |
|
|
|
6521 |
|
|
|
6522 |
|
|
|
6523 |
|
|
...
|
6524 |
|
|
|
6525 |
|
|
|
6526 |
|
|
G.2.7 Registers
|
6527 |
|
|
---------------
|
6528 |
|
|
|
6529 |
|
|
Each register is represented as an element with this form:
|
6530 |
|
|
|
6531 |
|
|
|
6532 |
|
|
bitsize="SIZE"
|
6533 |
|
|
[regnum="NUM"]
|
6534 |
|
|
[save-restore="SAVE-RESTORE"]
|
6535 |
|
|
[type="TYPE"]
|
6536 |
|
|
[group="GROUP"]/>
|
6537 |
|
|
|
6538 |
|
|
The components are as follows:
|
6539 |
|
|
|
6540 |
|
|
NAME
|
6541 |
|
|
The register's name; it must be unique within the target
|
6542 |
|
|
description.
|
6543 |
|
|
|
6544 |
|
|
BITSIZE
|
6545 |
|
|
The register's size, in bits.
|
6546 |
|
|
|
6547 |
|
|
REGNUM
|
6548 |
|
|
The register's number. If omitted, a register's number is one
|
6549 |
|
|
greater than that of the previous register (either in the current
|
6550 |
|
|
feature or in a preceeding feature); the first register in the
|
6551 |
|
|
target description defaults to zero. This register number is used
|
6552 |
|
|
to read or write the register; e.g. it is used in the remote `p'
|
6553 |
|
|
and `P' packets, and registers appear in the `g' and `G' packets
|
6554 |
|
|
in order of increasing register number.
|
6555 |
|
|
|
6556 |
|
|
SAVE-RESTORE
|
6557 |
|
|
Whether the register should be preserved across inferior function
|
6558 |
|
|
calls; this must be either `yes' or `no'. The default is `yes',
|
6559 |
|
|
which is appropriate for most registers except for some system
|
6560 |
|
|
control registers; this is not related to the target's ABI.
|
6561 |
|
|
|
6562 |
|
|
TYPE
|
6563 |
|
|
The type of the register. TYPE may be a predefined type, a type
|
6564 |
|
|
defined in the current feature, or one of the special types `int'
|
6565 |
|
|
and `float'. `int' is an integer type of the correct size for
|
6566 |
|
|
BITSIZE, and `float' is a floating point type (in the
|
6567 |
|
|
architecture's normal floating point format) of the correct size
|
6568 |
|
|
for BITSIZE. The default is `int'.
|
6569 |
|
|
|
6570 |
|
|
GROUP
|
6571 |
|
|
The register group to which this register belongs. GROUP must be
|
6572 |
|
|
either `general', `float', or `vector'. If no GROUP is specified,
|
6573 |
|
|
GDB will not display the register in `info registers'.
|
6574 |
|
|
|
6575 |
|
|
|
6576 |
|
|
|
6577 |
|
|
File: gdb.info, Node: Predefined Target Types, Next: Standard Target Features, Prev: Target Description Format, Up: Target Descriptions
|
6578 |
|
|
|
6579 |
|
|
G.3 Predefined Target Types
|
6580 |
|
|
===========================
|
6581 |
|
|
|
6582 |
|
|
Type definitions in the self-description can build up composite types
|
6583 |
|
|
from basic building blocks, but can not define fundamental types.
|
6584 |
|
|
Instead, standard identifiers are provided by GDB for the fundamental
|
6585 |
|
|
types. The currently supported types are:
|
6586 |
|
|
|
6587 |
|
|
`int8'
|
6588 |
|
|
`int16'
|
6589 |
|
|
`int32'
|
6590 |
|
|
`int64'
|
6591 |
|
|
`int128'
|
6592 |
|
|
Signed integer types holding the specified number of bits.
|
6593 |
|
|
|
6594 |
|
|
`uint8'
|
6595 |
|
|
`uint16'
|
6596 |
|
|
`uint32'
|
6597 |
|
|
`uint64'
|
6598 |
|
|
`uint128'
|
6599 |
|
|
Unsigned integer types holding the specified number of bits.
|
6600 |
|
|
|
6601 |
|
|
`code_ptr'
|
6602 |
|
|
`data_ptr'
|
6603 |
|
|
Pointers to unspecified code and data. The program counter and
|
6604 |
|
|
any dedicated return address register may be marked as code
|
6605 |
|
|
pointers; printing a code pointer converts it into a symbolic
|
6606 |
|
|
address. The stack pointer and any dedicated address registers
|
6607 |
|
|
may be marked as data pointers.
|
6608 |
|
|
|
6609 |
|
|
`ieee_single'
|
6610 |
|
|
Single precision IEEE floating point.
|
6611 |
|
|
|
6612 |
|
|
`ieee_double'
|
6613 |
|
|
Double precision IEEE floating point.
|
6614 |
|
|
|
6615 |
|
|
`arm_fpa_ext'
|
6616 |
|
|
The 12-byte extended precision format used by ARM FPA registers.
|
6617 |
|
|
|
6618 |
|
|
`i387_ext'
|
6619 |
|
|
The 10-byte extended precision format used by x87 registers.
|
6620 |
|
|
|
6621 |
|
|
`i386_eflags'
|
6622 |
|
|
32bit EFLAGS register used by x86.
|
6623 |
|
|
|
6624 |
|
|
`i386_mxcsr'
|
6625 |
|
|
32bit MXCSR register used by x86.
|
6626 |
|
|
|
6627 |
|
|
|
6628 |
|
|
|
6629 |
|
|
File: gdb.info, Node: Standard Target Features, Prev: Predefined Target Types, Up: Target Descriptions
|
6630 |
|
|
|
6631 |
|
|
G.4 Standard Target Features
|
6632 |
|
|
============================
|
6633 |
|
|
|
6634 |
|
|
A target description must contain either no registers or all the
|
6635 |
|
|
target's registers. If the description contains no registers, then GDB
|
6636 |
|
|
will assume a default register layout, selected based on the
|
6637 |
|
|
architecture. If the description contains any registers, the default
|
6638 |
|
|
layout will not be used; the standard registers must be described in
|
6639 |
|
|
the target description, in such a way that GDB can recognize them.
|
6640 |
|
|
|
6641 |
|
|
This is accomplished by giving specific names to feature elements
|
6642 |
|
|
which contain standard registers. GDB will look for features with
|
6643 |
|
|
those names and verify that they contain the expected registers; if any
|
6644 |
|
|
known feature is missing required registers, or if any required feature
|
6645 |
|
|
is missing, GDB will reject the target description. You can add
|
6646 |
|
|
additional registers to any of the standard features -- GDB will
|
6647 |
|
|
display them just as if they were added to an unrecognized feature.
|
6648 |
|
|
|
6649 |
|
|
This section lists the known features and their expected contents.
|
6650 |
|
|
Sample XML documents for these features are included in the GDB source
|
6651 |
|
|
tree, in the directory `gdb/features'.
|
6652 |
|
|
|
6653 |
|
|
Names recognized by GDB should include the name of the company or
|
6654 |
|
|
organization which selected the name, and the overall architecture to
|
6655 |
|
|
which the feature applies; so e.g. the feature containing ARM core
|
6656 |
|
|
registers is named `org.gnu.gdb.arm.core'.
|
6657 |
|
|
|
6658 |
|
|
The names of registers are not case sensitive for the purpose of
|
6659 |
|
|
recognizing standard features, but GDB will only display registers
|
6660 |
|
|
using the capitalization used in the description.
|
6661 |
|
|
|
6662 |
|
|
* Menu:
|
6663 |
|
|
|
6664 |
|
|
* ARM Features::
|
6665 |
|
|
* i386 Features::
|
6666 |
|
|
* MIPS Features::
|
6667 |
|
|
* M68K Features::
|
6668 |
|
|
* PowerPC Features::
|
6669 |
|
|
|
6670 |
|
|
|
6671 |
|
|
File: gdb.info, Node: ARM Features, Next: i386 Features, Up: Standard Target Features
|
6672 |
|
|
|
6673 |
|
|
G.4.1 ARM Features
|
6674 |
|
|
------------------
|
6675 |
|
|
|
6676 |
|
|
The `org.gnu.gdb.arm.core' feature is required for ARM targets. It
|
6677 |
|
|
should contain registers `r0' through `r13', `sp', `lr', `pc', and
|
6678 |
|
|
`cpsr'.
|
6679 |
|
|
|
6680 |
|
|
The `org.gnu.gdb.arm.fpa' feature is optional. If present, it
|
6681 |
|
|
should contain registers `f0' through `f7' and `fps'.
|
6682 |
|
|
|
6683 |
|
|
The `org.gnu.gdb.xscale.iwmmxt' feature is optional. If present, it
|
6684 |
|
|
should contain at least registers `wR0' through `wR15' and `wCGR0'
|
6685 |
|
|
through `wCGR3'. The `wCID', `wCon', `wCSSF', and `wCASF' registers
|
6686 |
|
|
are optional.
|
6687 |
|
|
|
6688 |
|
|
The `org.gnu.gdb.arm.vfp' feature is optional. If present, it
|
6689 |
|
|
should contain at least registers `d0' through `d15'. If they are
|
6690 |
|
|
present, `d16' through `d31' should also be included. GDB will
|
6691 |
|
|
synthesize the single-precision registers from halves of the
|
6692 |
|
|
double-precision registers.
|
6693 |
|
|
|
6694 |
|
|
The `org.gnu.gdb.arm.neon' feature is optional. It does not need to
|
6695 |
|
|
contain registers; it instructs GDB to display the VFP double-precision
|
6696 |
|
|
registers as vectors and to synthesize the quad-precision registers
|
6697 |
|
|
from pairs of double-precision registers. If this feature is present,
|
6698 |
|
|
`org.gnu.gdb.arm.vfp' must also be present and include 32
|
6699 |
|
|
double-precision registers.
|
6700 |
|
|
|
6701 |
|
|
|
6702 |
|
|
File: gdb.info, Node: i386 Features, Next: MIPS Features, Prev: ARM Features, Up: Standard Target Features
|
6703 |
|
|
|
6704 |
|
|
G.4.2 i386 Features
|
6705 |
|
|
-------------------
|
6706 |
|
|
|
6707 |
|
|
The `org.gnu.gdb.i386.core' feature is required for i386/amd64 targets.
|
6708 |
|
|
It should describe the following registers:
|
6709 |
|
|
|
6710 |
|
|
- `eax' through `edi' plus `eip' for i386
|
6711 |
|
|
|
6712 |
|
|
- `rax' through `r15' plus `rip' for amd64
|
6713 |
|
|
|
6714 |
|
|
- `eflags', `cs', `ss', `ds', `es', `fs', `gs'
|
6715 |
|
|
|
6716 |
|
|
- `st0' through `st7'
|
6717 |
|
|
|
6718 |
|
|
- `fctrl', `fstat', `ftag', `fiseg', `fioff', `foseg', `fooff' and
|
6719 |
|
|
`fop'
|
6720 |
|
|
|
6721 |
|
|
The register sets may be different, depending on the target.
|
6722 |
|
|
|
6723 |
|
|
The `org.gnu.gdb.i386.sse' feature is required. It should describe
|
6724 |
|
|
registers:
|
6725 |
|
|
|
6726 |
|
|
- `xmm0' through `xmm7' for i386
|
6727 |
|
|
|
6728 |
|
|
- `xmm0' through `xmm15' for amd64
|
6729 |
|
|
|
6730 |
|
|
- `mxcsr'
|
6731 |
|
|
|
6732 |
|
|
The `org.gnu.gdb.i386.linux' feature is optional. It should
|
6733 |
|
|
describe a single register, `orig_eax'.
|
6734 |
|
|
|
6735 |
|
|
|
6736 |
|
|
File: gdb.info, Node: MIPS Features, Next: M68K Features, Prev: i386 Features, Up: Standard Target Features
|
6737 |
|
|
|
6738 |
|
|
G.4.3 MIPS Features
|
6739 |
|
|
-------------------
|
6740 |
|
|
|
6741 |
|
|
The `org.gnu.gdb.mips.cpu' feature is required for MIPS targets. It
|
6742 |
|
|
should contain registers `r0' through `r31', `lo', `hi', and `pc'.
|
6743 |
|
|
They may be 32-bit or 64-bit depending on the target.
|
6744 |
|
|
|
6745 |
|
|
The `org.gnu.gdb.mips.cp0' feature is also required. It should
|
6746 |
|
|
contain at least the `status', `badvaddr', and `cause' registers. They
|
6747 |
|
|
may be 32-bit or 64-bit depending on the target.
|
6748 |
|
|
|
6749 |
|
|
The `org.gnu.gdb.mips.fpu' feature is currently required, though it
|
6750 |
|
|
may be optional in a future version of GDB. It should contain
|
6751 |
|
|
registers `f0' through `f31', `fcsr', and `fir'. They may be 32-bit or
|
6752 |
|
|
64-bit depending on the target.
|
6753 |
|
|
|
6754 |
|
|
The `org.gnu.gdb.mips.linux' feature is optional. It should contain
|
6755 |
|
|
a single register, `restart', which is used by the Linux kernel to
|
6756 |
|
|
control restartable syscalls.
|
6757 |
|
|
|
6758 |
|
|
|
6759 |
|
|
File: gdb.info, Node: M68K Features, Next: PowerPC Features, Prev: MIPS Features, Up: Standard Target Features
|
6760 |
|
|
|
6761 |
|
|
G.4.4 M68K Features
|
6762 |
|
|
-------------------
|
6763 |
|
|
|
6764 |
|
|
``org.gnu.gdb.m68k.core''
|
6765 |
|
|
``org.gnu.gdb.coldfire.core''
|
6766 |
|
|
``org.gnu.gdb.fido.core''
|
6767 |
|
|
One of those features must be always present. The feature that is
|
6768 |
|
|
present determines which flavor of m68k is used. The feature that
|
6769 |
|
|
is present should contain registers `d0' through `d7', `a0'
|
6770 |
|
|
through `a5', `fp', `sp', `ps' and `pc'.
|
6771 |
|
|
|
6772 |
|
|
``org.gnu.gdb.coldfire.fp''
|
6773 |
|
|
This feature is optional. If present, it should contain registers
|
6774 |
|
|
`fp0' through `fp7', `fpcontrol', `fpstatus' and `fpiaddr'.
|
6775 |
|
|
|
6776 |
|
|
|
6777 |
|
|
File: gdb.info, Node: PowerPC Features, Prev: M68K Features, Up: Standard Target Features
|
6778 |
|
|
|
6779 |
|
|
G.4.5 PowerPC Features
|
6780 |
|
|
----------------------
|
6781 |
|
|
|
6782 |
|
|
The `org.gnu.gdb.power.core' feature is required for PowerPC targets.
|
6783 |
|
|
It should contain registers `r0' through `r31', `pc', `msr', `cr',
|
6784 |
|
|
`lr', `ctr', and `xer'. They may be 32-bit or 64-bit depending on the
|
6785 |
|
|
target.
|
6786 |
|
|
|
6787 |
|
|
The `org.gnu.gdb.power.fpu' feature is optional. It should contain
|
6788 |
|
|
registers `f0' through `f31' and `fpscr'.
|
6789 |
|
|
|
6790 |
|
|
The `org.gnu.gdb.power.altivec' feature is optional. It should
|
6791 |
|
|
contain registers `vr0' through `vr31', `vscr', and `vrsave'.
|
6792 |
|
|
|
6793 |
|
|
The `org.gnu.gdb.power.vsx' feature is optional. It should contain
|
6794 |
|
|
registers `vs0h' through `vs31h'. GDB will combine these registers
|
6795 |
|
|
with the floating point registers (`f0' through `f31') and the altivec
|
6796 |
|
|
registers (`vr0' through `vr31') to present the 128-bit wide registers
|
6797 |
|
|
`vs0' through `vs63', the set of vector registers for POWER7.
|
6798 |
|
|
|
6799 |
|
|
The `org.gnu.gdb.power.spe' feature is optional. It should contain
|
6800 |
|
|
registers `ev0h' through `ev31h', `acc', and `spefscr'. SPE targets
|
6801 |
|
|
should provide 32-bit registers in `org.gnu.gdb.power.core' and provide
|
6802 |
|
|
the upper halves in `ev0h' through `ev31h'. GDB will combine these to
|
6803 |
|
|
present registers `ev0' through `ev31' to the user.
|
6804 |
|
|
|
6805 |
|
|
|
6806 |
|
|
File: gdb.info, Node: Operating System Information, Next: Trace File Format, Prev: Target Descriptions, Up: Top
|
6807 |
|
|
|
6808 |
|
|
Appendix H Operating System Information
|
6809 |
|
|
***************************************
|
6810 |
|
|
|
6811 |
|
|
* Menu:
|
6812 |
|
|
|
6813 |
|
|
* Process list::
|
6814 |
|
|
|
6815 |
|
|
Users of GDB often wish to obtain information about the state of the
|
6816 |
|
|
operating system running on the target--for example the list of
|
6817 |
|
|
processes, or the list of open files. This section describes the
|
6818 |
|
|
mechanism that makes it possible. This mechanism is similar to the
|
6819 |
|
|
target features mechanism (*note Target Descriptions::), but focuses on
|
6820 |
|
|
a different aspect of target.
|
6821 |
|
|
|
6822 |
|
|
Operating system information is retrived from the target via the
|
6823 |
|
|
remote protocol, using `qXfer' requests (*note qXfer osdata read::).
|
6824 |
|
|
The object name in the request should be `osdata', and the ANNEX
|
6825 |
|
|
identifies the data to be fetched.
|
6826 |
|
|
|
6827 |
|
|
|
6828 |
|
|
File: gdb.info, Node: Process list, Up: Operating System Information
|
6829 |
|
|
|
6830 |
|
|
H.1 Process list
|
6831 |
|
|
================
|
6832 |
|
|
|
6833 |
|
|
When requesting the process list, the ANNEX field in the `qXfer'
|
6834 |
|
|
request should be `processes'. The returned data is an XML document.
|
6835 |
|
|
The formal syntax of this document is defined in
|
6836 |
|
|
`gdb/features/osdata.dtd'.
|
6837 |
|
|
|
6838 |
|
|
An example document is:
|
6839 |
|
|
|
6840 |
|
|
|
6841 |
|
|
|
6842 |
|
|
|
6843 |
|
|
|
6844 |
|
|
1
|
6845 |
|
|
root
|
6846 |
|
|
/sbin/init
|
6847 |
|
|
1,2,3
|
6848 |
|
|
|
6849 |
|
|
|
6850 |
|
|
|
6851 |
|
|
Each item should include a column whose name is `pid'. The value of
|
6852 |
|
|
that column should identify the process on the target. The `user' and
|
6853 |
|
|
`command' columns are optional, and will be displayed by GDB. The
|
6854 |
|
|
`cores' column, if present, should contain a comma-separated list of
|
6855 |
|
|
cores that this process is running on. Target may provide additional
|
6856 |
|
|
columns, which GDB currently ignores.
|
6857 |
|
|
|
6858 |
|
|
|
6859 |
|
|
File: gdb.info, Node: Copying, Next: GNU Free Documentation License, Prev: Trace File Format, Up: Top
|
6860 |
|
|
|
6861 |
|
|
Appendix I GNU GENERAL PUBLIC LICENSE
|
6862 |
|
|
*************************************
|
6863 |
|
|
|
6864 |
|
|
Version 3, 29 June 2007
|
6865 |
|
|
|
6866 |
|
|
Copyright (C) 2007 Free Software Foundation, Inc. `http://fsf.org/'
|
6867 |
|
|
|
6868 |
|
|
Everyone is permitted to copy and distribute verbatim copies of this
|
6869 |
|
|
license document, but changing it is not allowed.
|
6870 |
|
|
|
6871 |
|
|
Preamble
|
6872 |
|
|
========
|
6873 |
|
|
|
6874 |
|
|
The GNU General Public License is a free, copyleft license for software
|
6875 |
|
|
and other kinds of works.
|
6876 |
|
|
|
6877 |
|
|
The licenses for most software and other practical works are designed
|
6878 |
|
|
to take away your freedom to share and change the works. By contrast,
|
6879 |
|
|
the GNU General Public License is intended to guarantee your freedom to
|
6880 |
|
|
share and change all versions of a program--to make sure it remains
|
6881 |
|
|
free software for all its users. We, the Free Software Foundation, use
|
6882 |
|
|
the GNU General Public License for most of our software; it applies
|
6883 |
|
|
also to any other work released this way by its authors. You can apply
|
6884 |
|
|
it to your programs, too.
|
6885 |
|
|
|
6886 |
|
|
When we speak of free software, we are referring to freedom, not
|
6887 |
|
|
price. Our General Public Licenses are designed to make sure that you
|
6888 |
|
|
have the freedom to distribute copies of free software (and charge for
|
6889 |
|
|
them if you wish), that you receive source code or can get it if you
|
6890 |
|
|
want it, that you can change the software or use pieces of it in new
|
6891 |
|
|
free programs, and that you know you can do these things.
|
6892 |
|
|
|
6893 |
|
|
To protect your rights, we need to prevent others from denying you
|
6894 |
|
|
these rights or asking you to surrender the rights. Therefore, you
|
6895 |
|
|
have certain responsibilities if you distribute copies of the software,
|
6896 |
|
|
or if you modify it: responsibilities to respect the freedom of others.
|
6897 |
|
|
|
6898 |
|
|
For example, if you distribute copies of such a program, whether
|
6899 |
|
|
gratis or for a fee, you must pass on to the recipients the same
|
6900 |
|
|
freedoms that you received. You must make sure that they, too, receive
|
6901 |
|
|
or can get the source code. And you must show them these terms so they
|
6902 |
|
|
know their rights.
|
6903 |
|
|
|
6904 |
|
|
Developers that use the GNU GPL protect your rights with two steps:
|
6905 |
|
|
(1) assert copyright on the software, and (2) offer you this License
|
6906 |
|
|
giving you legal permission to copy, distribute and/or modify it.
|
6907 |
|
|
|
6908 |
|
|
For the developers' and authors' protection, the GPL clearly explains
|
6909 |
|
|
that there is no warranty for this free software. For both users' and
|
6910 |
|
|
authors' sake, the GPL requires that modified versions be marked as
|
6911 |
|
|
changed, so that their problems will not be attributed erroneously to
|
6912 |
|
|
authors of previous versions.
|
6913 |
|
|
|
6914 |
|
|
Some devices are designed to deny users access to install or run
|
6915 |
|
|
modified versions of the software inside them, although the
|
6916 |
|
|
manufacturer can do so. This is fundamentally incompatible with the
|
6917 |
|
|
aim of protecting users' freedom to change the software. The
|
6918 |
|
|
systematic pattern of such abuse occurs in the area of products for
|
6919 |
|
|
individuals to use, which is precisely where it is most unacceptable.
|
6920 |
|
|
Therefore, we have designed this version of the GPL to prohibit the
|
6921 |
|
|
practice for those products. If such problems arise substantially in
|
6922 |
|
|
other domains, we stand ready to extend this provision to those domains
|
6923 |
|
|
in future versions of the GPL, as needed to protect the freedom of
|
6924 |
|
|
users.
|
6925 |
|
|
|
6926 |
|
|
Finally, every program is threatened constantly by software patents.
|
6927 |
|
|
States should not allow patents to restrict development and use of
|
6928 |
|
|
software on general-purpose computers, but in those that do, we wish to
|
6929 |
|
|
avoid the special danger that patents applied to a free program could
|
6930 |
|
|
make it effectively proprietary. To prevent this, the GPL assures that
|
6931 |
|
|
patents cannot be used to render the program non-free.
|
6932 |
|
|
|
6933 |
|
|
The precise terms and conditions for copying, distribution and
|
6934 |
|
|
modification follow.
|
6935 |
|
|
|
6936 |
|
|
TERMS AND CONDITIONS
|
6937 |
|
|
====================
|
6938 |
|
|
|
6939 |
|
|
0. Definitions.
|
6940 |
|
|
|
6941 |
|
|
"This License" refers to version 3 of the GNU General Public
|
6942 |
|
|
License.
|
6943 |
|
|
|
6944 |
|
|
"Copyright" also means copyright-like laws that apply to other
|
6945 |
|
|
kinds of works, such as semiconductor masks.
|
6946 |
|
|
|
6947 |
|
|
"The Program" refers to any copyrightable work licensed under this
|
6948 |
|
|
License. Each licensee is addressed as "you". "Licensees" and
|
6949 |
|
|
"recipients" may be individuals or organizations.
|
6950 |
|
|
|
6951 |
|
|
To "modify" a work means to copy from or adapt all or part of the
|
6952 |
|
|
work in a fashion requiring copyright permission, other than the
|
6953 |
|
|
making of an exact copy. The resulting work is called a "modified
|
6954 |
|
|
version" of the earlier work or a work "based on" the earlier work.
|
6955 |
|
|
|
6956 |
|
|
A "covered work" means either the unmodified Program or a work
|
6957 |
|
|
based on the Program.
|
6958 |
|
|
|
6959 |
|
|
To "propagate" a work means to do anything with it that, without
|
6960 |
|
|
permission, would make you directly or secondarily liable for
|
6961 |
|
|
infringement under applicable copyright law, except executing it
|
6962 |
|
|
on a computer or modifying a private copy. Propagation includes
|
6963 |
|
|
copying, distribution (with or without modification), making
|
6964 |
|
|
available to the public, and in some countries other activities as
|
6965 |
|
|
well.
|
6966 |
|
|
|
6967 |
|
|
To "convey" a work means any kind of propagation that enables other
|
6968 |
|
|
parties to make or receive copies. Mere interaction with a user
|
6969 |
|
|
through a computer network, with no transfer of a copy, is not
|
6970 |
|
|
conveying.
|
6971 |
|
|
|
6972 |
|
|
An interactive user interface displays "Appropriate Legal Notices"
|
6973 |
|
|
to the extent that it includes a convenient and prominently visible
|
6974 |
|
|
feature that (1) displays an appropriate copyright notice, and (2)
|
6975 |
|
|
tells the user that there is no warranty for the work (except to
|
6976 |
|
|
the extent that warranties are provided), that licensees may
|
6977 |
|
|
convey the work under this License, and how to view a copy of this
|
6978 |
|
|
License. If the interface presents a list of user commands or
|
6979 |
|
|
options, such as a menu, a prominent item in the list meets this
|
6980 |
|
|
criterion.
|
6981 |
|
|
|
6982 |
|
|
1. Source Code.
|
6983 |
|
|
|
6984 |
|
|
The "source code" for a work means the preferred form of the work
|
6985 |
|
|
for making modifications to it. "Object code" means any
|
6986 |
|
|
non-source form of a work.
|
6987 |
|
|
|
6988 |
|
|
A "Standard Interface" means an interface that either is an
|
6989 |
|
|
official standard defined by a recognized standards body, or, in
|
6990 |
|
|
the case of interfaces specified for a particular programming
|
6991 |
|
|
language, one that is widely used among developers working in that
|
6992 |
|
|
language.
|
6993 |
|
|
|
6994 |
|
|
The "System Libraries" of an executable work include anything,
|
6995 |
|
|
other than the work as a whole, that (a) is included in the normal
|
6996 |
|
|
form of packaging a Major Component, but which is not part of that
|
6997 |
|
|
Major Component, and (b) serves only to enable use of the work
|
6998 |
|
|
with that Major Component, or to implement a Standard Interface
|
6999 |
|
|
for which an implementation is available to the public in source
|
7000 |
|
|
code form. A "Major Component", in this context, means a major
|
7001 |
|
|
essential component (kernel, window system, and so on) of the
|
7002 |
|
|
specific operating system (if any) on which the executable work
|
7003 |
|
|
runs, or a compiler used to produce the work, or an object code
|
7004 |
|
|
interpreter used to run it.
|
7005 |
|
|
|
7006 |
|
|
The "Corresponding Source" for a work in object code form means all
|
7007 |
|
|
the source code needed to generate, install, and (for an executable
|
7008 |
|
|
work) run the object code and to modify the work, including
|
7009 |
|
|
scripts to control those activities. However, it does not include
|
7010 |
|
|
the work's System Libraries, or general-purpose tools or generally
|
7011 |
|
|
available free programs which are used unmodified in performing
|
7012 |
|
|
those activities but which are not part of the work. For example,
|
7013 |
|
|
Corresponding Source includes interface definition files
|
7014 |
|
|
associated with source files for the work, and the source code for
|
7015 |
|
|
shared libraries and dynamically linked subprograms that the work
|
7016 |
|
|
is specifically designed to require, such as by intimate data
|
7017 |
|
|
communication or control flow between those subprograms and other
|
7018 |
|
|
parts of the work.
|
7019 |
|
|
|
7020 |
|
|
The Corresponding Source need not include anything that users can
|
7021 |
|
|
regenerate automatically from other parts of the Corresponding
|
7022 |
|
|
Source.
|
7023 |
|
|
|
7024 |
|
|
The Corresponding Source for a work in source code form is that
|
7025 |
|
|
same work.
|
7026 |
|
|
|
7027 |
|
|
2. Basic Permissions.
|
7028 |
|
|
|
7029 |
|
|
All rights granted under this License are granted for the term of
|
7030 |
|
|
copyright on the Program, and are irrevocable provided the stated
|
7031 |
|
|
conditions are met. This License explicitly affirms your unlimited
|
7032 |
|
|
permission to run the unmodified Program. The output from running
|
7033 |
|
|
a covered work is covered by this License only if the output,
|
7034 |
|
|
given its content, constitutes a covered work. This License
|
7035 |
|
|
acknowledges your rights of fair use or other equivalent, as
|
7036 |
|
|
provided by copyright law.
|
7037 |
|
|
|
7038 |
|
|
You may make, run and propagate covered works that you do not
|
7039 |
|
|
convey, without conditions so long as your license otherwise
|
7040 |
|
|
remains in force. You may convey covered works to others for the
|
7041 |
|
|
sole purpose of having them make modifications exclusively for
|
7042 |
|
|
you, or provide you with facilities for running those works,
|
7043 |
|
|
provided that you comply with the terms of this License in
|
7044 |
|
|
conveying all material for which you do not control copyright.
|
7045 |
|
|
Those thus making or running the covered works for you must do so
|
7046 |
|
|
exclusively on your behalf, under your direction and control, on
|
7047 |
|
|
terms that prohibit them from making any copies of your
|
7048 |
|
|
copyrighted material outside their relationship with you.
|
7049 |
|
|
|
7050 |
|
|
Conveying under any other circumstances is permitted solely under
|
7051 |
|
|
the conditions stated below. Sublicensing is not allowed; section
|
7052 |
|
|
10 makes it unnecessary.
|
7053 |
|
|
|
7054 |
|
|
3. Protecting Users' Legal Rights From Anti-Circumvention Law.
|
7055 |
|
|
|
7056 |
|
|
No covered work shall be deemed part of an effective technological
|
7057 |
|
|
measure under any applicable law fulfilling obligations under
|
7058 |
|
|
article 11 of the WIPO copyright treaty adopted on 20 December
|
7059 |
|
|
1996, or similar laws prohibiting or restricting circumvention of
|
7060 |
|
|
such measures.
|
7061 |
|
|
|
7062 |
|
|
When you convey a covered work, you waive any legal power to forbid
|
7063 |
|
|
circumvention of technological measures to the extent such
|
7064 |
|
|
circumvention is effected by exercising rights under this License
|
7065 |
|
|
with respect to the covered work, and you disclaim any intention
|
7066 |
|
|
to limit operation or modification of the work as a means of
|
7067 |
|
|
enforcing, against the work's users, your or third parties' legal
|
7068 |
|
|
rights to forbid circumvention of technological measures.
|
7069 |
|
|
|
7070 |
|
|
4. Conveying Verbatim Copies.
|
7071 |
|
|
|
7072 |
|
|
You may convey verbatim copies of the Program's source code as you
|
7073 |
|
|
receive it, in any medium, provided that you conspicuously and
|
7074 |
|
|
appropriately publish on each copy an appropriate copyright notice;
|
7075 |
|
|
keep intact all notices stating that this License and any
|
7076 |
|
|
non-permissive terms added in accord with section 7 apply to the
|
7077 |
|
|
code; keep intact all notices of the absence of any warranty; and
|
7078 |
|
|
give all recipients a copy of this License along with the Program.
|
7079 |
|
|
|
7080 |
|
|
You may charge any price or no price for each copy that you convey,
|
7081 |
|
|
and you may offer support or warranty protection for a fee.
|
7082 |
|
|
|
7083 |
|
|
5. Conveying Modified Source Versions.
|
7084 |
|
|
|
7085 |
|
|
You may convey a work based on the Program, or the modifications to
|
7086 |
|
|
produce it from the Program, in the form of source code under the
|
7087 |
|
|
terms of section 4, provided that you also meet all of these
|
7088 |
|
|
conditions:
|
7089 |
|
|
|
7090 |
|
|
a. The work must carry prominent notices stating that you
|
7091 |
|
|
modified it, and giving a relevant date.
|
7092 |
|
|
|
7093 |
|
|
b. The work must carry prominent notices stating that it is
|
7094 |
|
|
released under this License and any conditions added under
|
7095 |
|
|
section 7. This requirement modifies the requirement in
|
7096 |
|
|
section 4 to "keep intact all notices".
|
7097 |
|
|
|
7098 |
|
|
c. You must license the entire work, as a whole, under this
|
7099 |
|
|
License to anyone who comes into possession of a copy. This
|
7100 |
|
|
License will therefore apply, along with any applicable
|
7101 |
|
|
section 7 additional terms, to the whole of the work, and all
|
7102 |
|
|
its parts, regardless of how they are packaged. This License
|
7103 |
|
|
gives no permission to license the work in any other way, but
|
7104 |
|
|
it does not invalidate such permission if you have separately
|
7105 |
|
|
received it.
|
7106 |
|
|
|
7107 |
|
|
d. If the work has interactive user interfaces, each must display
|
7108 |
|
|
Appropriate Legal Notices; however, if the Program has
|
7109 |
|
|
interactive interfaces that do not display Appropriate Legal
|
7110 |
|
|
Notices, your work need not make them do so.
|
7111 |
|
|
|
7112 |
|
|
A compilation of a covered work with other separate and independent
|
7113 |
|
|
works, which are not by their nature extensions of the covered
|
7114 |
|
|
work, and which are not combined with it such as to form a larger
|
7115 |
|
|
program, in or on a volume of a storage or distribution medium, is
|
7116 |
|
|
called an "aggregate" if the compilation and its resulting
|
7117 |
|
|
copyright are not used to limit the access or legal rights of the
|
7118 |
|
|
compilation's users beyond what the individual works permit.
|
7119 |
|
|
Inclusion of a covered work in an aggregate does not cause this
|
7120 |
|
|
License to apply to the other parts of the aggregate.
|
7121 |
|
|
|
7122 |
|
|
6. Conveying Non-Source Forms.
|
7123 |
|
|
|
7124 |
|
|
You may convey a covered work in object code form under the terms
|
7125 |
|
|
of sections 4 and 5, provided that you also convey the
|
7126 |
|
|
machine-readable Corresponding Source under the terms of this
|
7127 |
|
|
License, in one of these ways:
|
7128 |
|
|
|
7129 |
|
|
a. Convey the object code in, or embodied in, a physical product
|
7130 |
|
|
(including a physical distribution medium), accompanied by the
|
7131 |
|
|
Corresponding Source fixed on a durable physical medium
|
7132 |
|
|
customarily used for software interchange.
|
7133 |
|
|
|
7134 |
|
|
b. Convey the object code in, or embodied in, a physical product
|
7135 |
|
|
(including a physical distribution medium), accompanied by a
|
7136 |
|
|
written offer, valid for at least three years and valid for
|
7137 |
|
|
as long as you offer spare parts or customer support for that
|
7138 |
|
|
product model, to give anyone who possesses the object code
|
7139 |
|
|
either (1) a copy of the Corresponding Source for all the
|
7140 |
|
|
software in the product that is covered by this License, on a
|
7141 |
|
|
durable physical medium customarily used for software
|
7142 |
|
|
interchange, for a price no more than your reasonable cost of
|
7143 |
|
|
physically performing this conveying of source, or (2) access
|
7144 |
|
|
to copy the Corresponding Source from a network server at no
|
7145 |
|
|
charge.
|
7146 |
|
|
|
7147 |
|
|
c. Convey individual copies of the object code with a copy of
|
7148 |
|
|
the written offer to provide the Corresponding Source. This
|
7149 |
|
|
alternative is allowed only occasionally and noncommercially,
|
7150 |
|
|
and only if you received the object code with such an offer,
|
7151 |
|
|
in accord with subsection 6b.
|
7152 |
|
|
|
7153 |
|
|
d. Convey the object code by offering access from a designated
|
7154 |
|
|
place (gratis or for a charge), and offer equivalent access
|
7155 |
|
|
to the Corresponding Source in the same way through the same
|
7156 |
|
|
place at no further charge. You need not require recipients
|
7157 |
|
|
to copy the Corresponding Source along with the object code.
|
7158 |
|
|
If the place to copy the object code is a network server, the
|
7159 |
|
|
Corresponding Source may be on a different server (operated
|
7160 |
|
|
by you or a third party) that supports equivalent copying
|
7161 |
|
|
facilities, provided you maintain clear directions next to
|
7162 |
|
|
the object code saying where to find the Corresponding Source.
|
7163 |
|
|
Regardless of what server hosts the Corresponding Source, you
|
7164 |
|
|
remain obligated to ensure that it is available for as long
|
7165 |
|
|
as needed to satisfy these requirements.
|
7166 |
|
|
|
7167 |
|
|
e. Convey the object code using peer-to-peer transmission,
|
7168 |
|
|
provided you inform other peers where the object code and
|
7169 |
|
|
Corresponding Source of the work are being offered to the
|
7170 |
|
|
general public at no charge under subsection 6d.
|
7171 |
|
|
|
7172 |
|
|
|
7173 |
|
|
A separable portion of the object code, whose source code is
|
7174 |
|
|
excluded from the Corresponding Source as a System Library, need
|
7175 |
|
|
not be included in conveying the object code work.
|
7176 |
|
|
|
7177 |
|
|
A "User Product" is either (1) a "consumer product", which means
|
7178 |
|
|
any tangible personal property which is normally used for personal,
|
7179 |
|
|
family, or household purposes, or (2) anything designed or sold for
|
7180 |
|
|
incorporation into a dwelling. In determining whether a product
|
7181 |
|
|
is a consumer product, doubtful cases shall be resolved in favor of
|
7182 |
|
|
coverage. For a particular product received by a particular user,
|
7183 |
|
|
"normally used" refers to a typical or common use of that class of
|
7184 |
|
|
product, regardless of the status of the particular user or of the
|
7185 |
|
|
way in which the particular user actually uses, or expects or is
|
7186 |
|
|
expected to use, the product. A product is a consumer product
|
7187 |
|
|
regardless of whether the product has substantial commercial,
|
7188 |
|
|
industrial or non-consumer uses, unless such uses represent the
|
7189 |
|
|
only significant mode of use of the product.
|
7190 |
|
|
|
7191 |
|
|
"Installation Information" for a User Product means any methods,
|
7192 |
|
|
procedures, authorization keys, or other information required to
|
7193 |
|
|
install and execute modified versions of a covered work in that
|
7194 |
|
|
User Product from a modified version of its Corresponding Source.
|
7195 |
|
|
The information must suffice to ensure that the continued
|
7196 |
|
|
functioning of the modified object code is in no case prevented or
|
7197 |
|
|
interfered with solely because modification has been made.
|
7198 |
|
|
|
7199 |
|
|
If you convey an object code work under this section in, or with,
|
7200 |
|
|
or specifically for use in, a User Product, and the conveying
|
7201 |
|
|
occurs as part of a transaction in which the right of possession
|
7202 |
|
|
and use of the User Product is transferred to the recipient in
|
7203 |
|
|
perpetuity or for a fixed term (regardless of how the transaction
|
7204 |
|
|
is characterized), the Corresponding Source conveyed under this
|
7205 |
|
|
section must be accompanied by the Installation Information. But
|
7206 |
|
|
this requirement does not apply if neither you nor any third party
|
7207 |
|
|
retains the ability to install modified object code on the User
|
7208 |
|
|
Product (for example, the work has been installed in ROM).
|
7209 |
|
|
|
7210 |
|
|
The requirement to provide Installation Information does not
|
7211 |
|
|
include a requirement to continue to provide support service,
|
7212 |
|
|
warranty, or updates for a work that has been modified or
|
7213 |
|
|
installed by the recipient, or for the User Product in which it
|
7214 |
|
|
has been modified or installed. Access to a network may be denied
|
7215 |
|
|
when the modification itself materially and adversely affects the
|
7216 |
|
|
operation of the network or violates the rules and protocols for
|
7217 |
|
|
communication across the network.
|
7218 |
|
|
|
7219 |
|
|
Corresponding Source conveyed, and Installation Information
|
7220 |
|
|
provided, in accord with this section must be in a format that is
|
7221 |
|
|
publicly documented (and with an implementation available to the
|
7222 |
|
|
public in source code form), and must require no special password
|
7223 |
|
|
or key for unpacking, reading or copying.
|
7224 |
|
|
|
7225 |
|
|
7. Additional Terms.
|
7226 |
|
|
|
7227 |
|
|
"Additional permissions" are terms that supplement the terms of
|
7228 |
|
|
this License by making exceptions from one or more of its
|
7229 |
|
|
conditions. Additional permissions that are applicable to the
|
7230 |
|
|
entire Program shall be treated as though they were included in
|
7231 |
|
|
this License, to the extent that they are valid under applicable
|
7232 |
|
|
law. If additional permissions apply only to part of the Program,
|
7233 |
|
|
that part may be used separately under those permissions, but the
|
7234 |
|
|
entire Program remains governed by this License without regard to
|
7235 |
|
|
the additional permissions.
|
7236 |
|
|
|
7237 |
|
|
When you convey a copy of a covered work, you may at your option
|
7238 |
|
|
remove any additional permissions from that copy, or from any part
|
7239 |
|
|
of it. (Additional permissions may be written to require their own
|
7240 |
|
|
removal in certain cases when you modify the work.) You may place
|
7241 |
|
|
additional permissions on material, added by you to a covered work,
|
7242 |
|
|
for which you have or can give appropriate copyright permission.
|
7243 |
|
|
|
7244 |
|
|
Notwithstanding any other provision of this License, for material
|
7245 |
|
|
you add to a covered work, you may (if authorized by the copyright
|
7246 |
|
|
holders of that material) supplement the terms of this License
|
7247 |
|
|
with terms:
|
7248 |
|
|
|
7249 |
|
|
a. Disclaiming warranty or limiting liability differently from
|
7250 |
|
|
the terms of sections 15 and 16 of this License; or
|
7251 |
|
|
|
7252 |
|
|
b. Requiring preservation of specified reasonable legal notices
|
7253 |
|
|
or author attributions in that material or in the Appropriate
|
7254 |
|
|
Legal Notices displayed by works containing it; or
|
7255 |
|
|
|
7256 |
|
|
c. Prohibiting misrepresentation of the origin of that material,
|
7257 |
|
|
or requiring that modified versions of such material be
|
7258 |
|
|
marked in reasonable ways as different from the original
|
7259 |
|
|
version; or
|
7260 |
|
|
|
7261 |
|
|
d. Limiting the use for publicity purposes of names of licensors
|
7262 |
|
|
or authors of the material; or
|
7263 |
|
|
|
7264 |
|
|
e. Declining to grant rights under trademark law for use of some
|
7265 |
|
|
trade names, trademarks, or service marks; or
|
7266 |
|
|
|
7267 |
|
|
f. Requiring indemnification of licensors and authors of that
|
7268 |
|
|
material by anyone who conveys the material (or modified
|
7269 |
|
|
versions of it) with contractual assumptions of liability to
|
7270 |
|
|
the recipient, for any liability that these contractual
|
7271 |
|
|
assumptions directly impose on those licensors and authors.
|
7272 |
|
|
|
7273 |
|
|
All other non-permissive additional terms are considered "further
|
7274 |
|
|
restrictions" within the meaning of section 10. If the Program as
|
7275 |
|
|
you received it, or any part of it, contains a notice stating that
|
7276 |
|
|
it is governed by this License along with a term that is a further
|
7277 |
|
|
restriction, you may remove that term. If a license document
|
7278 |
|
|
contains a further restriction but permits relicensing or
|
7279 |
|
|
conveying under this License, you may add to a covered work
|
7280 |
|
|
material governed by the terms of that license document, provided
|
7281 |
|
|
that the further restriction does not survive such relicensing or
|
7282 |
|
|
conveying.
|
7283 |
|
|
|
7284 |
|
|
If you add terms to a covered work in accord with this section, you
|
7285 |
|
|
must place, in the relevant source files, a statement of the
|
7286 |
|
|
additional terms that apply to those files, or a notice indicating
|
7287 |
|
|
where to find the applicable terms.
|
7288 |
|
|
|
7289 |
|
|
Additional terms, permissive or non-permissive, may be stated in
|
7290 |
|
|
the form of a separately written license, or stated as exceptions;
|
7291 |
|
|
the above requirements apply either way.
|
7292 |
|
|
|
7293 |
|
|
8. Termination.
|
7294 |
|
|
|
7295 |
|
|
You may not propagate or modify a covered work except as expressly
|
7296 |
|
|
provided under this License. Any attempt otherwise to propagate or
|
7297 |
|
|
modify it is void, and will automatically terminate your rights
|
7298 |
|
|
under this License (including any patent licenses granted under
|
7299 |
|
|
the third paragraph of section 11).
|
7300 |
|
|
|
7301 |
|
|
However, if you cease all violation of this License, then your
|
7302 |
|
|
license from a particular copyright holder is reinstated (a)
|
7303 |
|
|
provisionally, unless and until the copyright holder explicitly
|
7304 |
|
|
and finally terminates your license, and (b) permanently, if the
|
7305 |
|
|
copyright holder fails to notify you of the violation by some
|
7306 |
|
|
reasonable means prior to 60 days after the cessation.
|
7307 |
|
|
|
7308 |
|
|
Moreover, your license from a particular copyright holder is
|
7309 |
|
|
reinstated permanently if the copyright holder notifies you of the
|
7310 |
|
|
violation by some reasonable means, this is the first time you have
|
7311 |
|
|
received notice of violation of this License (for any work) from
|
7312 |
|
|
that copyright holder, and you cure the violation prior to 30 days
|
7313 |
|
|
after your receipt of the notice.
|
7314 |
|
|
|
7315 |
|
|
Termination of your rights under this section does not terminate
|
7316 |
|
|
the licenses of parties who have received copies or rights from
|
7317 |
|
|
you under this License. If your rights have been terminated and
|
7318 |
|
|
not permanently reinstated, you do not qualify to receive new
|
7319 |
|
|
licenses for the same material under section 10.
|
7320 |
|
|
|
7321 |
|
|
9. Acceptance Not Required for Having Copies.
|
7322 |
|
|
|
7323 |
|
|
You are not required to accept this License in order to receive or
|
7324 |
|
|
run a copy of the Program. Ancillary propagation of a covered work
|
7325 |
|
|
occurring solely as a consequence of using peer-to-peer
|
7326 |
|
|
transmission to receive a copy likewise does not require
|
7327 |
|
|
acceptance. However, nothing other than this License grants you
|
7328 |
|
|
permission to propagate or modify any covered work. These actions
|
7329 |
|
|
infringe copyright if you do not accept this License. Therefore,
|
7330 |
|
|
by modifying or propagating a covered work, you indicate your
|
7331 |
|
|
acceptance of this License to do so.
|
7332 |
|
|
|
7333 |
|
|
10. Automatic Licensing of Downstream Recipients.
|
7334 |
|
|
|
7335 |
|
|
Each time you convey a covered work, the recipient automatically
|
7336 |
|
|
receives a license from the original licensors, to run, modify and
|
7337 |
|
|
propagate that work, subject to this License. You are not
|
7338 |
|
|
responsible for enforcing compliance by third parties with this
|
7339 |
|
|
License.
|
7340 |
|
|
|
7341 |
|
|
An "entity transaction" is a transaction transferring control of an
|
7342 |
|
|
organization, or substantially all assets of one, or subdividing an
|
7343 |
|
|
organization, or merging organizations. If propagation of a
|
7344 |
|
|
covered work results from an entity transaction, each party to that
|
7345 |
|
|
transaction who receives a copy of the work also receives whatever
|
7346 |
|
|
licenses to the work the party's predecessor in interest had or
|
7347 |
|
|
could give under the previous paragraph, plus a right to
|
7348 |
|
|
possession of the Corresponding Source of the work from the
|
7349 |
|
|
predecessor in interest, if the predecessor has it or can get it
|
7350 |
|
|
with reasonable efforts.
|
7351 |
|
|
|
7352 |
|
|
You may not impose any further restrictions on the exercise of the
|
7353 |
|
|
rights granted or affirmed under this License. For example, you
|
7354 |
|
|
may not impose a license fee, royalty, or other charge for
|
7355 |
|
|
exercise of rights granted under this License, and you may not
|
7356 |
|
|
initiate litigation (including a cross-claim or counterclaim in a
|
7357 |
|
|
lawsuit) alleging that any patent claim is infringed by making,
|
7358 |
|
|
using, selling, offering for sale, or importing the Program or any
|
7359 |
|
|
portion of it.
|
7360 |
|
|
|
7361 |
|
|
11. Patents.
|
7362 |
|
|
|
7363 |
|
|
A "contributor" is a copyright holder who authorizes use under this
|
7364 |
|
|
License of the Program or a work on which the Program is based.
|
7365 |
|
|
The work thus licensed is called the contributor's "contributor
|
7366 |
|
|
version".
|
7367 |
|
|
|
7368 |
|
|
A contributor's "essential patent claims" are all patent claims
|
7369 |
|
|
owned or controlled by the contributor, whether already acquired or
|
7370 |
|
|
hereafter acquired, that would be infringed by some manner,
|
7371 |
|
|
permitted by this License, of making, using, or selling its
|
7372 |
|
|
contributor version, but do not include claims that would be
|
7373 |
|
|
infringed only as a consequence of further modification of the
|
7374 |
|
|
contributor version. For purposes of this definition, "control"
|
7375 |
|
|
includes the right to grant patent sublicenses in a manner
|
7376 |
|
|
consistent with the requirements of this License.
|
7377 |
|
|
|
7378 |
|
|
Each contributor grants you a non-exclusive, worldwide,
|
7379 |
|
|
royalty-free patent license under the contributor's essential
|
7380 |
|
|
patent claims, to make, use, sell, offer for sale, import and
|
7381 |
|
|
otherwise run, modify and propagate the contents of its
|
7382 |
|
|
contributor version.
|
7383 |
|
|
|
7384 |
|
|
In the following three paragraphs, a "patent license" is any
|
7385 |
|
|
express agreement or commitment, however denominated, not to
|
7386 |
|
|
enforce a patent (such as an express permission to practice a
|
7387 |
|
|
patent or covenant not to sue for patent infringement). To
|
7388 |
|
|
"grant" such a patent license to a party means to make such an
|
7389 |
|
|
agreement or commitment not to enforce a patent against the party.
|
7390 |
|
|
|
7391 |
|
|
If you convey a covered work, knowingly relying on a patent
|
7392 |
|
|
license, and the Corresponding Source of the work is not available
|
7393 |
|
|
for anyone to copy, free of charge and under the terms of this
|
7394 |
|
|
License, through a publicly available network server or other
|
7395 |
|
|
readily accessible means, then you must either (1) cause the
|
7396 |
|
|
Corresponding Source to be so available, or (2) arrange to deprive
|
7397 |
|
|
yourself of the benefit of the patent license for this particular
|
7398 |
|
|
work, or (3) arrange, in a manner consistent with the requirements
|
7399 |
|
|
of this License, to extend the patent license to downstream
|
7400 |
|
|
recipients. "Knowingly relying" means you have actual knowledge
|
7401 |
|
|
that, but for the patent license, your conveying the covered work
|
7402 |
|
|
in a country, or your recipient's use of the covered work in a
|
7403 |
|
|
country, would infringe one or more identifiable patents in that
|
7404 |
|
|
country that you have reason to believe are valid.
|
7405 |
|
|
|
7406 |
|
|
If, pursuant to or in connection with a single transaction or
|
7407 |
|
|
arrangement, you convey, or propagate by procuring conveyance of, a
|
7408 |
|
|
covered work, and grant a patent license to some of the parties
|
7409 |
|
|
receiving the covered work authorizing them to use, propagate,
|
7410 |
|
|
modify or convey a specific copy of the covered work, then the
|
7411 |
|
|
patent license you grant is automatically extended to all
|
7412 |
|
|
recipients of the covered work and works based on it.
|
7413 |
|
|
|
7414 |
|
|
A patent license is "discriminatory" if it does not include within
|
7415 |
|
|
the scope of its coverage, prohibits the exercise of, or is
|
7416 |
|
|
conditioned on the non-exercise of one or more of the rights that
|
7417 |
|
|
are specifically granted under this License. You may not convey a
|
7418 |
|
|
covered work if you are a party to an arrangement with a third
|
7419 |
|
|
party that is in the business of distributing software, under
|
7420 |
|
|
which you make payment to the third party based on the extent of
|
7421 |
|
|
your activity of conveying the work, and under which the third
|
7422 |
|
|
party grants, to any of the parties who would receive the covered
|
7423 |
|
|
work from you, a discriminatory patent license (a) in connection
|
7424 |
|
|
with copies of the covered work conveyed by you (or copies made
|
7425 |
|
|
from those copies), or (b) primarily for and in connection with
|
7426 |
|
|
specific products or compilations that contain the covered work,
|
7427 |
|
|
unless you entered into that arrangement, or that patent license
|
7428 |
|
|
was granted, prior to 28 March 2007.
|
7429 |
|
|
|
7430 |
|
|
Nothing in this License shall be construed as excluding or limiting
|
7431 |
|
|
any implied license or other defenses to infringement that may
|
7432 |
|
|
otherwise be available to you under applicable patent law.
|
7433 |
|
|
|
7434 |
|
|
12. No Surrender of Others' Freedom.
|
7435 |
|
|
|
7436 |
|
|
If conditions are imposed on you (whether by court order,
|
7437 |
|
|
agreement or otherwise) that contradict the conditions of this
|
7438 |
|
|
License, they do not excuse you from the conditions of this
|
7439 |
|
|
License. If you cannot convey a covered work so as to satisfy
|
7440 |
|
|
simultaneously your obligations under this License and any other
|
7441 |
|
|
pertinent obligations, then as a consequence you may not convey it
|
7442 |
|
|
at all. For example, if you agree to terms that obligate you to
|
7443 |
|
|
collect a royalty for further conveying from those to whom you
|
7444 |
|
|
convey the Program, the only way you could satisfy both those
|
7445 |
|
|
terms and this License would be to refrain entirely from conveying
|
7446 |
|
|
the Program.
|
7447 |
|
|
|
7448 |
|
|
13. Use with the GNU Affero General Public License.
|
7449 |
|
|
|
7450 |
|
|
Notwithstanding any other provision of this License, you have
|
7451 |
|
|
permission to link or combine any covered work with a work licensed
|
7452 |
|
|
under version 3 of the GNU Affero General Public License into a
|
7453 |
|
|
single combined work, and to convey the resulting work. The terms
|
7454 |
|
|
of this License will continue to apply to the part which is the
|
7455 |
|
|
covered work, but the special requirements of the GNU Affero
|
7456 |
|
|
General Public License, section 13, concerning interaction through
|
7457 |
|
|
a network will apply to the combination as such.
|
7458 |
|
|
|
7459 |
|
|
14. Revised Versions of this License.
|
7460 |
|
|
|
7461 |
|
|
The Free Software Foundation may publish revised and/or new
|
7462 |
|
|
versions of the GNU General Public License from time to time.
|
7463 |
|
|
Such new versions will be similar in spirit to the present
|
7464 |
|
|
version, but may differ in detail to address new problems or
|
7465 |
|
|
concerns.
|
7466 |
|
|
|
7467 |
|
|
Each version is given a distinguishing version number. If the
|
7468 |
|
|
Program specifies that a certain numbered version of the GNU
|
7469 |
|
|
General Public License "or any later version" applies to it, you
|
7470 |
|
|
have the option of following the terms and conditions either of
|
7471 |
|
|
that numbered version or of any later version published by the
|
7472 |
|
|
Free Software Foundation. If the Program does not specify a
|
7473 |
|
|
version number of the GNU General Public License, you may choose
|
7474 |
|
|
any version ever published by the Free Software Foundation.
|
7475 |
|
|
|
7476 |
|
|
If the Program specifies that a proxy can decide which future
|
7477 |
|
|
versions of the GNU General Public License can be used, that
|
7478 |
|
|
proxy's public statement of acceptance of a version permanently
|
7479 |
|
|
authorizes you to choose that version for the Program.
|
7480 |
|
|
|
7481 |
|
|
Later license versions may give you additional or different
|
7482 |
|
|
permissions. However, no additional obligations are imposed on any
|
7483 |
|
|
author or copyright holder as a result of your choosing to follow a
|
7484 |
|
|
later version.
|
7485 |
|
|
|
7486 |
|
|
15. Disclaimer of Warranty.
|
7487 |
|
|
|
7488 |
|
|
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
|
7489 |
|
|
APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE
|
7490 |
|
|
COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS"
|
7491 |
|
|
WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED,
|
7492 |
|
|
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
7493 |
|
|
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE
|
7494 |
|
|
RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU.
|
7495 |
|
|
SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL
|
7496 |
|
|
NECESSARY SERVICING, REPAIR OR CORRECTION.
|
7497 |
|
|
|
7498 |
|
|
16. Limitation of Liability.
|
7499 |
|
|
|
7500 |
|
|
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN
|
7501 |
|
|
WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES
|
7502 |
|
|
AND/OR CONVEYS THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU
|
7503 |
|
|
FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR
|
7504 |
|
|
CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE
|
7505 |
|
|
THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA
|
7506 |
|
|
BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
|
7507 |
|
|
PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
|
7508 |
|
|
PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF
|
7509 |
|
|
THE POSSIBILITY OF SUCH DAMAGES.
|
7510 |
|
|
|
7511 |
|
|
17. Interpretation of Sections 15 and 16.
|
7512 |
|
|
|
7513 |
|
|
If the disclaimer of warranty and limitation of liability provided
|
7514 |
|
|
above cannot be given local legal effect according to their terms,
|
7515 |
|
|
reviewing courts shall apply local law that most closely
|
7516 |
|
|
approximates an absolute waiver of all civil liability in
|
7517 |
|
|
connection with the Program, unless a warranty or assumption of
|
7518 |
|
|
liability accompanies a copy of the Program in return for a fee.
|
7519 |
|
|
|
7520 |
|
|
|
7521 |
|
|
END OF TERMS AND CONDITIONS
|
7522 |
|
|
===========================
|
7523 |
|
|
|
7524 |
|
|
How to Apply These Terms to Your New Programs
|
7525 |
|
|
=============================================
|
7526 |
|
|
|
7527 |
|
|
If you develop a new program, and you want it to be of the greatest
|
7528 |
|
|
possible use to the public, the best way to achieve this is to make it
|
7529 |
|
|
free software which everyone can redistribute and change under these
|
7530 |
|
|
terms.
|
7531 |
|
|
|
7532 |
|
|
To do so, attach the following notices to the program. It is safest
|
7533 |
|
|
to attach them to the start of each source file to most effectively
|
7534 |
|
|
state the exclusion of warranty; and each file should have at least the
|
7535 |
|
|
"copyright" line and a pointer to where the full notice is found.
|
7536 |
|
|
|
7537 |
|
|
ONE LINE TO GIVE THE PROGRAM'S NAME AND A BRIEF IDEA OF WHAT IT DOES.
|
7538 |
|
|
Copyright (C) YEAR NAME OF AUTHOR
|
7539 |
|
|
|
7540 |
|
|
This program is free software: you can redistribute it and/or modify
|
7541 |
|
|
it under the terms of the GNU General Public License as published by
|
7542 |
|
|
the Free Software Foundation, either version 3 of the License, or (at
|
7543 |
|
|
your option) any later version.
|
7544 |
|
|
|
7545 |
|
|
This program is distributed in the hope that it will be useful, but
|
7546 |
|
|
WITHOUT ANY WARRANTY; without even the implied warranty of
|
7547 |
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
7548 |
|
|
General Public License for more details.
|
7549 |
|
|
|
7550 |
|
|
You should have received a copy of the GNU General Public License
|
7551 |
|
|
along with this program. If not, see `http://www.gnu.org/licenses/'.
|
7552 |
|
|
|
7553 |
|
|
Also add information on how to contact you by electronic and paper
|
7554 |
|
|
mail.
|
7555 |
|
|
|
7556 |
|
|
If the program does terminal interaction, make it output a short
|
7557 |
|
|
notice like this when it starts in an interactive mode:
|
7558 |
|
|
|
7559 |
|
|
PROGRAM Copyright (C) YEAR NAME OF AUTHOR
|
7560 |
|
|
This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
|
7561 |
|
|
This is free software, and you are welcome to redistribute it
|
7562 |
|
|
under certain conditions; type `show c' for details.
|
7563 |
|
|
|
7564 |
|
|
The hypothetical commands `show w' and `show c' should show the
|
7565 |
|
|
appropriate parts of the General Public License. Of course, your
|
7566 |
|
|
program's commands might be different; for a GUI interface, you would
|
7567 |
|
|
use an "about box".
|
7568 |
|
|
|
7569 |
|
|
You should also get your employer (if you work as a programmer) or
|
7570 |
|
|
school, if any, to sign a "copyright disclaimer" for the program, if
|
7571 |
|
|
necessary. For more information on this, and how to apply and follow
|
7572 |
|
|
the GNU GPL, see `http://www.gnu.org/licenses/'.
|
7573 |
|
|
|
7574 |
|
|
The GNU General Public License does not permit incorporating your
|
7575 |
|
|
program into proprietary programs. If your program is a subroutine
|
7576 |
|
|
library, you may consider it more useful to permit linking proprietary
|
7577 |
|
|
applications with the library. If this is what you want to do, use the
|
7578 |
|
|
GNU Lesser General Public License instead of this License. But first,
|
7579 |
|
|
please read `http://www.gnu.org/philosophy/why-not-lgpl.html'.
|
7580 |
|
|
|