OpenCores
URL https://opencores.org/ocsvn/openrisc/openrisc/trunk

Subversion Repositories openrisc

[/] [openrisc/] [trunk/] [gnu-old/] [gdb-7.1/] [gdb/] [doc/] [gdb.info-4] - Diff between revs 227 and 816

Go to most recent revision | Only display areas with differences | Details | Blame | View Log

Rev 227 Rev 816
This is gdb.info, produced by makeinfo version 4.8 from ./gdb.texinfo.
This is gdb.info, produced by makeinfo version 4.8 from ./gdb.texinfo.
INFO-DIR-SECTION Software development
INFO-DIR-SECTION Software development
START-INFO-DIR-ENTRY
START-INFO-DIR-ENTRY
* Gdb: (gdb).                     The GNU debugger.
* Gdb: (gdb).                     The GNU debugger.
END-INFO-DIR-ENTRY
END-INFO-DIR-ENTRY
   Copyright (C) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996,
   Copyright (C) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996,
1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009,
1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009,
2010 Free Software Foundation, Inc.
2010 Free Software Foundation, Inc.
   Permission is granted to copy, distribute and/or modify this document
   Permission is granted to copy, distribute and/or modify this document
under the terms of the GNU Free Documentation License, Version 1.1 or
under the terms of the GNU Free Documentation License, Version 1.1 or
any later version published by the Free Software Foundation; with the
any later version published by the Free Software Foundation; with the
Invariant Sections being "Free Software" and "Free Software Needs Free
Invariant Sections being "Free Software" and "Free Software Needs Free
Documentation", with the Front-Cover Texts being "A GNU Manual," and
Documentation", with the Front-Cover Texts being "A GNU Manual," and
with the Back-Cover Texts as in (a) below.
with the Back-Cover Texts as in (a) below.
   (a) The FSF's Back-Cover Text is: "You are free to copy and modify
   (a) The FSF's Back-Cover Text is: "You are free to copy and modify
this GNU Manual.  Buying copies from GNU Press supports the FSF in
this GNU Manual.  Buying copies from GNU Press supports the FSF in
developing GNU and promoting software freedom."
developing GNU and promoting software freedom."
   This file documents the GNU debugger GDB.
   This file documents the GNU debugger GDB.
   This is the Ninth Edition, of `Debugging with GDB: the GNU
   This is the Ninth Edition, of `Debugging with GDB: the GNU
Source-Level Debugger' for GDB (GDB) Version 7.1.
Source-Level Debugger' for GDB (GDB) Version 7.1.
   Copyright (C) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996,
   Copyright (C) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996,
1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009,
1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009,
2010 Free Software Foundation, Inc.
2010 Free Software Foundation, Inc.
   Permission is granted to copy, distribute and/or modify this document
   Permission is granted to copy, distribute and/or modify this document
under the terms of the GNU Free Documentation License, Version 1.1 or
under the terms of the GNU Free Documentation License, Version 1.1 or
any later version published by the Free Software Foundation; with the
any later version published by the Free Software Foundation; with the
Invariant Sections being "Free Software" and "Free Software Needs Free
Invariant Sections being "Free Software" and "Free Software Needs Free
Documentation", with the Front-Cover Texts being "A GNU Manual," and
Documentation", with the Front-Cover Texts being "A GNU Manual," and
with the Back-Cover Texts as in (a) below.
with the Back-Cover Texts as in (a) below.
   (a) The FSF's Back-Cover Text is: "You are free to copy and modify
   (a) The FSF's Back-Cover Text is: "You are free to copy and modify
this GNU Manual.  Buying copies from GNU Press supports the FSF in
this GNU Manual.  Buying copies from GNU Press supports the FSF in
developing GNU and promoting software freedom."
developing GNU and promoting software freedom."


File: gdb.info,  Node: Readline Movement Commands,  Next: Readline Killing Commands,  Prev: Readline Bare Essentials,  Up: Readline Interaction
File: gdb.info,  Node: Readline Movement Commands,  Next: Readline Killing Commands,  Prev: Readline Bare Essentials,  Up: Readline Interaction
31.2.2 Readline Movement Commands
31.2.2 Readline Movement Commands
---------------------------------
---------------------------------
The above table describes the most basic keystrokes that you need in
The above table describes the most basic keystrokes that you need in
order to do editing of the input line.  For your convenience, many
order to do editing of the input line.  For your convenience, many
other commands have been added in addition to `C-b', `C-f', `C-d', and
other commands have been added in addition to `C-b', `C-f', `C-d', and
.  Here are some commands for moving more rapidly about the line.
.  Here are some commands for moving more rapidly about the line.
`C-a'
`C-a'
     Move to the start of the line.
     Move to the start of the line.
`C-e'
`C-e'
     Move to the end of the line.
     Move to the end of the line.
`M-f'
`M-f'
     Move forward a word, where a word is composed of letters and
     Move forward a word, where a word is composed of letters and
     digits.
     digits.
`M-b'
`M-b'
     Move backward a word.
     Move backward a word.
`C-l'
`C-l'
     Clear the screen, reprinting the current line at the top.
     Clear the screen, reprinting the current line at the top.
   Notice how `C-f' moves forward a character, while `M-f' moves
   Notice how `C-f' moves forward a character, while `M-f' moves
forward a word.  It is a loose convention that control keystrokes
forward a word.  It is a loose convention that control keystrokes
operate on characters while meta keystrokes operate on words.
operate on characters while meta keystrokes operate on words.


File: gdb.info,  Node: Readline Killing Commands,  Next: Readline Arguments,  Prev: Readline Movement Commands,  Up: Readline Interaction
File: gdb.info,  Node: Readline Killing Commands,  Next: Readline Arguments,  Prev: Readline Movement Commands,  Up: Readline Interaction
31.2.3 Readline Killing Commands
31.2.3 Readline Killing Commands
--------------------------------
--------------------------------
"Killing" text means to delete the text from the line, but to save it
"Killing" text means to delete the text from the line, but to save it
away for later use, usually by "yanking" (re-inserting) it back into
away for later use, usually by "yanking" (re-inserting) it back into
the line.  (`Cut' and `paste' are more recent jargon for `kill' and
the line.  (`Cut' and `paste' are more recent jargon for `kill' and
`yank'.)
`yank'.)
   If the description for a command says that it `kills' text, then you
   If the description for a command says that it `kills' text, then you
can be sure that you can get the text back in a different (or the same)
can be sure that you can get the text back in a different (or the same)
place later.
place later.
   When you use a kill command, the text is saved in a "kill-ring".
   When you use a kill command, the text is saved in a "kill-ring".
Any number of consecutive kills save all of the killed text together, so
Any number of consecutive kills save all of the killed text together, so
that when you yank it back, you get it all.  The kill ring is not line
that when you yank it back, you get it all.  The kill ring is not line
specific; the text that you killed on a previously typed line is
specific; the text that you killed on a previously typed line is
available to be yanked back later, when you are typing another line.
available to be yanked back later, when you are typing another line.
   Here is the list of commands for killing text.
   Here is the list of commands for killing text.
`C-k'
`C-k'
     Kill the text from the current cursor position to the end of the
     Kill the text from the current cursor position to the end of the
     line.
     line.
`M-d'
`M-d'
     Kill from the cursor to the end of the current word, or, if between
     Kill from the cursor to the end of the current word, or, if between
     words, to the end of the next word.  Word boundaries are the same
     words, to the end of the next word.  Word boundaries are the same
     as those used by `M-f'.
     as those used by `M-f'.
`M-'
`M-'
     Kill from the cursor the start of the current word, or, if between
     Kill from the cursor the start of the current word, or, if between
     words, to the start of the previous word.  Word boundaries are the
     words, to the start of the previous word.  Word boundaries are the
     same as those used by `M-b'.
     same as those used by `M-b'.
`C-w'
`C-w'
     Kill from the cursor to the previous whitespace.  This is
     Kill from the cursor to the previous whitespace.  This is
     different than `M-' because the word boundaries differ.
     different than `M-' because the word boundaries differ.
   Here is how to "yank" the text back into the line.  Yanking means to
   Here is how to "yank" the text back into the line.  Yanking means to
copy the most-recently-killed text from the kill buffer.
copy the most-recently-killed text from the kill buffer.
`C-y'
`C-y'
     Yank the most recently killed text back into the buffer at the
     Yank the most recently killed text back into the buffer at the
     cursor.
     cursor.
`M-y'
`M-y'
     Rotate the kill-ring, and yank the new top.  You can only do this
     Rotate the kill-ring, and yank the new top.  You can only do this
     if the prior command is `C-y' or `M-y'.
     if the prior command is `C-y' or `M-y'.


File: gdb.info,  Node: Readline Arguments,  Next: Searching,  Prev: Readline Killing Commands,  Up: Readline Interaction
File: gdb.info,  Node: Readline Arguments,  Next: Searching,  Prev: Readline Killing Commands,  Up: Readline Interaction
31.2.4 Readline Arguments
31.2.4 Readline Arguments
-------------------------
-------------------------
You can pass numeric arguments to Readline commands.  Sometimes the
You can pass numeric arguments to Readline commands.  Sometimes the
argument acts as a repeat count, other times it is the sign of the
argument acts as a repeat count, other times it is the sign of the
argument that is significant.  If you pass a negative argument to a
argument that is significant.  If you pass a negative argument to a
command which normally acts in a forward direction, that command will
command which normally acts in a forward direction, that command will
act in a backward direction.  For example, to kill text back to the
act in a backward direction.  For example, to kill text back to the
start of the line, you might type `M-- C-k'.
start of the line, you might type `M-- C-k'.
   The general way to pass numeric arguments to a command is to type
   The general way to pass numeric arguments to a command is to type
meta digits before the command.  If the first `digit' typed is a minus
meta digits before the command.  If the first `digit' typed is a minus
sign (`-'), then the sign of the argument will be negative.  Once you
sign (`-'), then the sign of the argument will be negative.  Once you
have typed one meta digit to get the argument started, you can type the
have typed one meta digit to get the argument started, you can type the
remainder of the digits, and then the command.  For example, to give
remainder of the digits, and then the command.  For example, to give
the `C-d' command an argument of 10, you could type `M-1 0 C-d', which
the `C-d' command an argument of 10, you could type `M-1 0 C-d', which
will delete the next ten characters on the input line.
will delete the next ten characters on the input line.


File: gdb.info,  Node: Searching,  Prev: Readline Arguments,  Up: Readline Interaction
File: gdb.info,  Node: Searching,  Prev: Readline Arguments,  Up: Readline Interaction
31.2.5 Searching for Commands in the History
31.2.5 Searching for Commands in the History
--------------------------------------------
--------------------------------------------
Readline provides commands for searching through the command history
Readline provides commands for searching through the command history
for lines containing a specified string.  There are two search modes:
for lines containing a specified string.  There are two search modes:
"incremental" and "non-incremental".
"incremental" and "non-incremental".
   Incremental searches begin before the user has finished typing the
   Incremental searches begin before the user has finished typing the
search string.  As each character of the search string is typed,
search string.  As each character of the search string is typed,
Readline displays the next entry from the history matching the string
Readline displays the next entry from the history matching the string
typed so far.  An incremental search requires only as many characters
typed so far.  An incremental search requires only as many characters
as needed to find the desired history entry.  To search backward in the
as needed to find the desired history entry.  To search backward in the
history for a particular string, type `C-r'.  Typing `C-s' searches
history for a particular string, type `C-r'.  Typing `C-s' searches
forward through the history.  The characters present in the value of
forward through the history.  The characters present in the value of
the `isearch-terminators' variable are used to terminate an incremental
the `isearch-terminators' variable are used to terminate an incremental
search.  If that variable has not been assigned a value, the  and
search.  If that variable has not been assigned a value, the  and
`C-J' characters will terminate an incremental search.  `C-g' will
`C-J' characters will terminate an incremental search.  `C-g' will
abort an incremental search and restore the original line.  When the
abort an incremental search and restore the original line.  When the
search is terminated, the history entry containing the search string
search is terminated, the history entry containing the search string
becomes the current line.
becomes the current line.
   To find other matching entries in the history list, type `C-r' or
   To find other matching entries in the history list, type `C-r' or
`C-s' as appropriate.  This will search backward or forward in the
`C-s' as appropriate.  This will search backward or forward in the
history for the next entry matching the search string typed so far.
history for the next entry matching the search string typed so far.
Any other key sequence bound to a Readline command will terminate the
Any other key sequence bound to a Readline command will terminate the
search and execute that command.  For instance, a  will terminate
search and execute that command.  For instance, a  will terminate
the search and accept the line, thereby executing the command from the
the search and accept the line, thereby executing the command from the
history list.  A movement command will terminate the search, make the
history list.  A movement command will terminate the search, make the
last line found the current line, and begin editing.
last line found the current line, and begin editing.
   Readline remembers the last incremental search string.  If two
   Readline remembers the last incremental search string.  If two
`C-r's are typed without any intervening characters defining a new
`C-r's are typed without any intervening characters defining a new
search string, any remembered search string is used.
search string, any remembered search string is used.
   Non-incremental searches read the entire search string before
   Non-incremental searches read the entire search string before
starting to search for matching history lines.  The search string may be
starting to search for matching history lines.  The search string may be
typed by the user or be part of the contents of the current line.
typed by the user or be part of the contents of the current line.


File: gdb.info,  Node: Readline Init File,  Next: Bindable Readline Commands,  Prev: Readline Interaction,  Up: Command Line Editing
File: gdb.info,  Node: Readline Init File,  Next: Bindable Readline Commands,  Prev: Readline Interaction,  Up: Command Line Editing
31.3 Readline Init File
31.3 Readline Init File
=======================
=======================
Although the Readline library comes with a set of Emacs-like
Although the Readline library comes with a set of Emacs-like
keybindings installed by default, it is possible to use a different set
keybindings installed by default, it is possible to use a different set
of keybindings.  Any user can customize programs that use Readline by
of keybindings.  Any user can customize programs that use Readline by
putting commands in an "inputrc" file, conventionally in his home
putting commands in an "inputrc" file, conventionally in his home
directory.  The name of this file is taken from the value of the
directory.  The name of this file is taken from the value of the
environment variable `INPUTRC'.  If that variable is unset, the default
environment variable `INPUTRC'.  If that variable is unset, the default
is `~/.inputrc'.
is `~/.inputrc'.
   When a program which uses the Readline library starts up, the init
   When a program which uses the Readline library starts up, the init
file is read, and the key bindings are set.
file is read, and the key bindings are set.
   In addition, the `C-x C-r' command re-reads this init file, thus
   In addition, the `C-x C-r' command re-reads this init file, thus
incorporating any changes that you might have made to it.
incorporating any changes that you might have made to it.
* Menu:
* Menu:
* Readline Init File Syntax::   Syntax for the commands in the inputrc file.
* Readline Init File Syntax::   Syntax for the commands in the inputrc file.
* Conditional Init Constructs:: Conditional key bindings in the inputrc file.
* Conditional Init Constructs:: Conditional key bindings in the inputrc file.
* Sample Init File::            An example inputrc file.
* Sample Init File::            An example inputrc file.


File: gdb.info,  Node: Readline Init File Syntax,  Next: Conditional Init Constructs,  Up: Readline Init File
File: gdb.info,  Node: Readline Init File Syntax,  Next: Conditional Init Constructs,  Up: Readline Init File
31.3.1 Readline Init File Syntax
31.3.1 Readline Init File Syntax
--------------------------------
--------------------------------
There are only a few basic constructs allowed in the Readline init
There are only a few basic constructs allowed in the Readline init
file.  Blank lines are ignored.  Lines beginning with a `#' are
file.  Blank lines are ignored.  Lines beginning with a `#' are
comments.  Lines beginning with a `$' indicate conditional constructs
comments.  Lines beginning with a `$' indicate conditional constructs
(*note Conditional Init Constructs::).  Other lines denote variable
(*note Conditional Init Constructs::).  Other lines denote variable
settings and key bindings.
settings and key bindings.
Variable Settings
Variable Settings
     You can modify the run-time behavior of Readline by altering the
     You can modify the run-time behavior of Readline by altering the
     values of variables in Readline using the `set' command within the
     values of variables in Readline using the `set' command within the
     init file.  The syntax is simple:
     init file.  The syntax is simple:
          set VARIABLE VALUE
          set VARIABLE VALUE
     Here, for example, is how to change from the default Emacs-like
     Here, for example, is how to change from the default Emacs-like
     key binding to use `vi' line editing commands:
     key binding to use `vi' line editing commands:
          set editing-mode vi
          set editing-mode vi
     Variable names and values, where appropriate, are recognized
     Variable names and values, where appropriate, are recognized
     without regard to case.  Unrecognized variable names are ignored.
     without regard to case.  Unrecognized variable names are ignored.
     Boolean variables (those that can be set to on or off) are set to
     Boolean variables (those that can be set to on or off) are set to
     on if the value is null or empty, ON (case-insensitive), or 1.
     on if the value is null or empty, ON (case-insensitive), or 1.
     Any other value results in the variable being set to off.
     Any other value results in the variable being set to off.
     A great deal of run-time behavior is changeable with the following
     A great deal of run-time behavior is changeable with the following
     variables.
     variables.
    `bell-style'
    `bell-style'
          Controls what happens when Readline wants to ring the
          Controls what happens when Readline wants to ring the
          terminal bell.  If set to `none', Readline never rings the
          terminal bell.  If set to `none', Readline never rings the
          bell.  If set to `visible', Readline uses a visible bell if
          bell.  If set to `visible', Readline uses a visible bell if
          one is available.  If set to `audible' (the default),
          one is available.  If set to `audible' (the default),
          Readline attempts to ring the terminal's bell.
          Readline attempts to ring the terminal's bell.
    `bind-tty-special-chars'
    `bind-tty-special-chars'
          If set to `on', Readline attempts to bind the control
          If set to `on', Readline attempts to bind the control
          characters treated specially by the kernel's terminal driver
          characters treated specially by the kernel's terminal driver
          to their Readline equivalents.
          to their Readline equivalents.
    `comment-begin'
    `comment-begin'
          The string to insert at the beginning of the line when the
          The string to insert at the beginning of the line when the
          `insert-comment' command is executed.  The default value is
          `insert-comment' command is executed.  The default value is
          `"#"'.
          `"#"'.
    `completion-ignore-case'
    `completion-ignore-case'
          If set to `on', Readline performs filename matching and
          If set to `on', Readline performs filename matching and
          completion in a case-insensitive fashion.  The default value
          completion in a case-insensitive fashion.  The default value
          is `off'.
          is `off'.
    `completion-query-items'
    `completion-query-items'
          The number of possible completions that determines when the
          The number of possible completions that determines when the
          user is asked whether the list of possibilities should be
          user is asked whether the list of possibilities should be
          displayed.  If the number of possible completions is greater
          displayed.  If the number of possible completions is greater
          than this value, Readline will ask the user whether or not he
          than this value, Readline will ask the user whether or not he
          wishes to view them; otherwise, they are simply listed.  This
          wishes to view them; otherwise, they are simply listed.  This
          variable must be set to an integer value greater than or
          variable must be set to an integer value greater than or
          equal to 0.  A negative value means Readline should never ask.
          equal to 0.  A negative value means Readline should never ask.
          The default limit is `100'.
          The default limit is `100'.
    `convert-meta'
    `convert-meta'
          If set to `on', Readline will convert characters with the
          If set to `on', Readline will convert characters with the
          eighth bit set to an ASCII key sequence by stripping the
          eighth bit set to an ASCII key sequence by stripping the
          eighth bit and prefixing an  character, converting them
          eighth bit and prefixing an  character, converting them
          to a meta-prefixed key sequence.  The default value is `on'.
          to a meta-prefixed key sequence.  The default value is `on'.
    `disable-completion'
    `disable-completion'
          If set to `On', Readline will inhibit word completion.
          If set to `On', Readline will inhibit word completion.
          Completion  characters will be inserted into the line as if
          Completion  characters will be inserted into the line as if
          they had been mapped to `self-insert'.  The default is `off'.
          they had been mapped to `self-insert'.  The default is `off'.
    `editing-mode'
    `editing-mode'
          The `editing-mode' variable controls which default set of key
          The `editing-mode' variable controls which default set of key
          bindings is used.  By default, Readline starts up in Emacs
          bindings is used.  By default, Readline starts up in Emacs
          editing mode, where the keystrokes are most similar to Emacs.
          editing mode, where the keystrokes are most similar to Emacs.
          This variable can be set to either `emacs' or `vi'.
          This variable can be set to either `emacs' or `vi'.
    `enable-keypad'
    `enable-keypad'
          When set to `on', Readline will try to enable the application
          When set to `on', Readline will try to enable the application
          keypad when it is called.  Some systems need this to enable
          keypad when it is called.  Some systems need this to enable
          the arrow keys.  The default is `off'.
          the arrow keys.  The default is `off'.
    `expand-tilde'
    `expand-tilde'
          If set to `on', tilde expansion is performed when Readline
          If set to `on', tilde expansion is performed when Readline
          attempts word completion.  The default is `off'.
          attempts word completion.  The default is `off'.
    `history-preserve-point'
    `history-preserve-point'
          If set to `on', the history code attempts to place point at
          If set to `on', the history code attempts to place point at
          the same location on each history line retrieved with
          the same location on each history line retrieved with
          `previous-history' or `next-history'.  The default is `off'.
          `previous-history' or `next-history'.  The default is `off'.
    `horizontal-scroll-mode'
    `horizontal-scroll-mode'
          This variable can be set to either `on' or `off'.  Setting it
          This variable can be set to either `on' or `off'.  Setting it
          to `on' means that the text of the lines being edited will
          to `on' means that the text of the lines being edited will
          scroll horizontally on a single screen line when they are
          scroll horizontally on a single screen line when they are
          longer than the width of the screen, instead of wrapping onto
          longer than the width of the screen, instead of wrapping onto
          a new screen line.  By default, this variable is set to `off'.
          a new screen line.  By default, this variable is set to `off'.
    `input-meta'
    `input-meta'
          If set to `on', Readline will enable eight-bit input (it will
          If set to `on', Readline will enable eight-bit input (it will
          not clear the eighth bit in the characters it reads),
          not clear the eighth bit in the characters it reads),
          regardless of what the terminal claims it can support.  The
          regardless of what the terminal claims it can support.  The
          default value is `off'.  The name `meta-flag' is a synonym
          default value is `off'.  The name `meta-flag' is a synonym
          for this variable.
          for this variable.
    `isearch-terminators'
    `isearch-terminators'
          The string of characters that should terminate an incremental
          The string of characters that should terminate an incremental
          search without subsequently executing the character as a
          search without subsequently executing the character as a
          command (*note Searching::).  If this variable has not been
          command (*note Searching::).  If this variable has not been
          given a value, the characters  and `C-J' will terminate
          given a value, the characters  and `C-J' will terminate
          an incremental search.
          an incremental search.
    `keymap'
    `keymap'
          Sets Readline's idea of the current keymap for key binding
          Sets Readline's idea of the current keymap for key binding
          commands.  Acceptable `keymap' names are `emacs',
          commands.  Acceptable `keymap' names are `emacs',
          `emacs-standard', `emacs-meta', `emacs-ctlx', `vi', `vi-move',
          `emacs-standard', `emacs-meta', `emacs-ctlx', `vi', `vi-move',
          `vi-command', and `vi-insert'.  `vi' is equivalent to
          `vi-command', and `vi-insert'.  `vi' is equivalent to
          `vi-command'; `emacs' is equivalent to `emacs-standard'.  The
          `vi-command'; `emacs' is equivalent to `emacs-standard'.  The
          default value is `emacs'.  The value of the `editing-mode'
          default value is `emacs'.  The value of the `editing-mode'
          variable also affects the default keymap.
          variable also affects the default keymap.
    `mark-directories'
    `mark-directories'
          If set to `on', completed directory names have a slash
          If set to `on', completed directory names have a slash
          appended.  The default is `on'.
          appended.  The default is `on'.
    `mark-modified-lines'
    `mark-modified-lines'
          This variable, when set to `on', causes Readline to display an
          This variable, when set to `on', causes Readline to display an
          asterisk (`*') at the start of history lines which have been
          asterisk (`*') at the start of history lines which have been
          modified.  This variable is `off' by default.
          modified.  This variable is `off' by default.
    `mark-symlinked-directories'
    `mark-symlinked-directories'
          If set to `on', completed names which are symbolic links to
          If set to `on', completed names which are symbolic links to
          directories have a slash appended (subject to the value of
          directories have a slash appended (subject to the value of
          `mark-directories').  The default is `off'.
          `mark-directories').  The default is `off'.
    `match-hidden-files'
    `match-hidden-files'
          This variable, when set to `on', causes Readline to match
          This variable, when set to `on', causes Readline to match
          files whose names begin with a `.' (hidden files) when
          files whose names begin with a `.' (hidden files) when
          performing filename completion, unless the leading `.' is
          performing filename completion, unless the leading `.' is
          supplied by the user in the filename to be completed.  This
          supplied by the user in the filename to be completed.  This
          variable is `on' by default.
          variable is `on' by default.
    `output-meta'
    `output-meta'
          If set to `on', Readline will display characters with the
          If set to `on', Readline will display characters with the
          eighth bit set directly rather than as a meta-prefixed escape
          eighth bit set directly rather than as a meta-prefixed escape
          sequence.  The default is `off'.
          sequence.  The default is `off'.
    `page-completions'
    `page-completions'
          If set to `on', Readline uses an internal `more'-like pager
          If set to `on', Readline uses an internal `more'-like pager
          to display a screenful of possible completions at a time.
          to display a screenful of possible completions at a time.
          This variable is `on' by default.
          This variable is `on' by default.
    `print-completions-horizontally'
    `print-completions-horizontally'
          If set to `on', Readline will display completions with matches
          If set to `on', Readline will display completions with matches
          sorted horizontally in alphabetical order, rather than down
          sorted horizontally in alphabetical order, rather than down
          the screen.  The default is `off'.
          the screen.  The default is `off'.
    `show-all-if-ambiguous'
    `show-all-if-ambiguous'
          This alters the default behavior of the completion functions.
          This alters the default behavior of the completion functions.
          If set to `on', words which have more than one possible
          If set to `on', words which have more than one possible
          completion cause the matches to be listed immediately instead
          completion cause the matches to be listed immediately instead
          of ringing the bell.  The default value is `off'.
          of ringing the bell.  The default value is `off'.
    `show-all-if-unmodified'
    `show-all-if-unmodified'
          This alters the default behavior of the completion functions
          This alters the default behavior of the completion functions
          in a fashion similar to SHOW-ALL-IF-AMBIGUOUS.  If set to
          in a fashion similar to SHOW-ALL-IF-AMBIGUOUS.  If set to
          `on', words which have more than one possible completion
          `on', words which have more than one possible completion
          without any possible partial completion (the possible
          without any possible partial completion (the possible
          completions don't share a common prefix) cause the matches to
          completions don't share a common prefix) cause the matches to
          be listed immediately instead of ringing the bell.  The
          be listed immediately instead of ringing the bell.  The
          default value is `off'.
          default value is `off'.
    `visible-stats'
    `visible-stats'
          If set to `on', a character denoting a file's type is
          If set to `on', a character denoting a file's type is
          appended to the filename when listing possible completions.
          appended to the filename when listing possible completions.
          The default is `off'.
          The default is `off'.
Key Bindings
Key Bindings
     The syntax for controlling key bindings in the init file is
     The syntax for controlling key bindings in the init file is
     simple.  First you need to find the name of the command that you
     simple.  First you need to find the name of the command that you
     want to change.  The following sections contain tables of the
     want to change.  The following sections contain tables of the
     command name, the default keybinding, if any, and a short
     command name, the default keybinding, if any, and a short
     description of what the command does.
     description of what the command does.
     Once you know the name of the command, simply place on a line in
     Once you know the name of the command, simply place on a line in
     the init file the name of the key you wish to bind the command to,
     the init file the name of the key you wish to bind the command to,
     a colon, and then the name of the command.  The name of the key
     a colon, and then the name of the command.  The name of the key
     can be expressed in different ways, depending on what you find most
     can be expressed in different ways, depending on what you find most
     comfortable.
     comfortable.
     In addition to command names, readline allows keys to be bound to
     In addition to command names, readline allows keys to be bound to
     a string that is inserted when the key is pressed (a MACRO).
     a string that is inserted when the key is pressed (a MACRO).
    KEYNAME: FUNCTION-NAME or MACRO
    KEYNAME: FUNCTION-NAME or MACRO
          KEYNAME is the name of a key spelled out in English.  For
          KEYNAME is the name of a key spelled out in English.  For
          example:
          example:
               Control-u: universal-argument
               Control-u: universal-argument
               Meta-Rubout: backward-kill-word
               Meta-Rubout: backward-kill-word
               Control-o: "> output"
               Control-o: "> output"
          In the above example, `C-u' is bound to the function
          In the above example, `C-u' is bound to the function
          `universal-argument', `M-DEL' is bound to the function
          `universal-argument', `M-DEL' is bound to the function
          `backward-kill-word', and `C-o' is bound to run the macro
          `backward-kill-word', and `C-o' is bound to run the macro
          expressed on the right hand side (that is, to insert the text
          expressed on the right hand side (that is, to insert the text
          `> output' into the line).
          `> output' into the line).
          A number of symbolic character names are recognized while
          A number of symbolic character names are recognized while
          processing this key binding syntax: DEL, ESC, ESCAPE, LFD,
          processing this key binding syntax: DEL, ESC, ESCAPE, LFD,
          NEWLINE, RET, RETURN, RUBOUT, SPACE, SPC, and TAB.
          NEWLINE, RET, RETURN, RUBOUT, SPACE, SPC, and TAB.
    "KEYSEQ": FUNCTION-NAME or MACRO
    "KEYSEQ": FUNCTION-NAME or MACRO
          KEYSEQ differs from KEYNAME above in that strings denoting an
          KEYSEQ differs from KEYNAME above in that strings denoting an
          entire key sequence can be specified, by placing the key
          entire key sequence can be specified, by placing the key
          sequence in double quotes.  Some GNU Emacs style key escapes
          sequence in double quotes.  Some GNU Emacs style key escapes
          can be used, as in the following example, but the special
          can be used, as in the following example, but the special
          character names are not recognized.
          character names are not recognized.
               "\C-u": universal-argument
               "\C-u": universal-argument
               "\C-x\C-r": re-read-init-file
               "\C-x\C-r": re-read-init-file
               "\e[11~": "Function Key 1"
               "\e[11~": "Function Key 1"
          In the above example, `C-u' is again bound to the function
          In the above example, `C-u' is again bound to the function
          `universal-argument' (just as it was in the first example),
          `universal-argument' (just as it was in the first example),
          `C-x C-r' is bound to the function `re-read-init-file', and
          `C-x C-r' is bound to the function `re-read-init-file', and
          ` <[> <1> <1> <~>' is bound to insert the text `Function
          ` <[> <1> <1> <~>' is bound to insert the text `Function
          Key 1'.
          Key 1'.
     The following GNU Emacs style escape sequences are available when
     The following GNU Emacs style escape sequences are available when
     specifying key sequences:
     specifying key sequences:
    `\C-'
    `\C-'
          control prefix
          control prefix
    `\M-'
    `\M-'
          meta prefix
          meta prefix
    `\e'
    `\e'
          an escape character
          an escape character
    `\\'
    `\\'
          backslash
          backslash
    `\"'
    `\"'
          <">, a double quotation mark
          <">, a double quotation mark
    `\''
    `\''
          <'>, a single quote or apostrophe
          <'>, a single quote or apostrophe
     In addition to the GNU Emacs style escape sequences, a second set
     In addition to the GNU Emacs style escape sequences, a second set
     of backslash escapes is available:
     of backslash escapes is available:
    `\a'
    `\a'
          alert (bell)
          alert (bell)
    `\b'
    `\b'
          backspace
          backspace
    `\d'
    `\d'
          delete
          delete
    `\f'
    `\f'
          form feed
          form feed
    `\n'
    `\n'
          newline
          newline
    `\r'
    `\r'
          carriage return
          carriage return
    `\t'
    `\t'
          horizontal tab
          horizontal tab
    `\v'
    `\v'
          vertical tab
          vertical tab
    `\NNN'
    `\NNN'
          the eight-bit character whose value is the octal value NNN
          the eight-bit character whose value is the octal value NNN
          (one to three digits)
          (one to three digits)
    `\xHH'
    `\xHH'
          the eight-bit character whose value is the hexadecimal value
          the eight-bit character whose value is the hexadecimal value
          HH (one or two hex digits)
          HH (one or two hex digits)
     When entering the text of a macro, single or double quotes must be
     When entering the text of a macro, single or double quotes must be
     used to indicate a macro definition.  Unquoted text is assumed to
     used to indicate a macro definition.  Unquoted text is assumed to
     be a function name.  In the macro body, the backslash escapes
     be a function name.  In the macro body, the backslash escapes
     described above are expanded.  Backslash will quote any other
     described above are expanded.  Backslash will quote any other
     character in the macro text, including `"' and `''.  For example,
     character in the macro text, including `"' and `''.  For example,
     the following binding will make `C-x \' insert a single `\' into
     the following binding will make `C-x \' insert a single `\' into
     the line:
     the line:
          "\C-x\\": "\\"
          "\C-x\\": "\\"


File: gdb.info,  Node: Conditional Init Constructs,  Next: Sample Init File,  Prev: Readline Init File Syntax,  Up: Readline Init File
File: gdb.info,  Node: Conditional Init Constructs,  Next: Sample Init File,  Prev: Readline Init File Syntax,  Up: Readline Init File
31.3.2 Conditional Init Constructs
31.3.2 Conditional Init Constructs
----------------------------------
----------------------------------
Readline implements a facility similar in spirit to the conditional
Readline implements a facility similar in spirit to the conditional
compilation features of the C preprocessor which allows key bindings
compilation features of the C preprocessor which allows key bindings
and variable settings to be performed as the result of tests.  There
and variable settings to be performed as the result of tests.  There
are four parser directives used.
are four parser directives used.
`$if'
`$if'
     The `$if' construct allows bindings to be made based on the
     The `$if' construct allows bindings to be made based on the
     editing mode, the terminal being used, or the application using
     editing mode, the terminal being used, or the application using
     Readline.  The text of the test extends to the end of the line; no
     Readline.  The text of the test extends to the end of the line; no
     characters are required to isolate it.
     characters are required to isolate it.
    `mode'
    `mode'
          The `mode=' form of the `$if' directive is used to test
          The `mode=' form of the `$if' directive is used to test
          whether Readline is in `emacs' or `vi' mode.  This may be
          whether Readline is in `emacs' or `vi' mode.  This may be
          used in conjunction with the `set keymap' command, for
          used in conjunction with the `set keymap' command, for
          instance, to set bindings in the `emacs-standard' and
          instance, to set bindings in the `emacs-standard' and
          `emacs-ctlx' keymaps only if Readline is starting out in
          `emacs-ctlx' keymaps only if Readline is starting out in
          `emacs' mode.
          `emacs' mode.
    `term'
    `term'
          The `term=' form may be used to include terminal-specific key
          The `term=' form may be used to include terminal-specific key
          bindings, perhaps to bind the key sequences output by the
          bindings, perhaps to bind the key sequences output by the
          terminal's function keys.  The word on the right side of the
          terminal's function keys.  The word on the right side of the
          `=' is tested against both the full name of the terminal and
          `=' is tested against both the full name of the terminal and
          the portion of the terminal name before the first `-'.  This
          the portion of the terminal name before the first `-'.  This
          allows `sun' to match both `sun' and `sun-cmd', for instance.
          allows `sun' to match both `sun' and `sun-cmd', for instance.
    `application'
    `application'
          The APPLICATION construct is used to include
          The APPLICATION construct is used to include
          application-specific settings.  Each program using the
          application-specific settings.  Each program using the
          Readline library sets the APPLICATION NAME, and you can test
          Readline library sets the APPLICATION NAME, and you can test
          for a particular value.  This could be used to bind key
          for a particular value.  This could be used to bind key
          sequences to functions useful for a specific program.  For
          sequences to functions useful for a specific program.  For
          instance, the following command adds a key sequence that
          instance, the following command adds a key sequence that
          quotes the current or previous word in Bash:
          quotes the current or previous word in Bash:
               $if Bash
               $if Bash
               # Quote the current or previous word
               # Quote the current or previous word
               "\C-xq": "\eb\"\ef\""
               "\C-xq": "\eb\"\ef\""
               $endif
               $endif
`$endif'
`$endif'
     This command, as seen in the previous example, terminates an `$if'
     This command, as seen in the previous example, terminates an `$if'
     command.
     command.
`$else'
`$else'
     Commands in this branch of the `$if' directive are executed if the
     Commands in this branch of the `$if' directive are executed if the
     test fails.
     test fails.
`$include'
`$include'
     This directive takes a single filename as an argument and reads
     This directive takes a single filename as an argument and reads
     commands and bindings from that file.  For example, the following
     commands and bindings from that file.  For example, the following
     directive reads from `/etc/inputrc':
     directive reads from `/etc/inputrc':
          $include /etc/inputrc
          $include /etc/inputrc


File: gdb.info,  Node: Sample Init File,  Prev: Conditional Init Constructs,  Up: Readline Init File
File: gdb.info,  Node: Sample Init File,  Prev: Conditional Init Constructs,  Up: Readline Init File
31.3.3 Sample Init File
31.3.3 Sample Init File
-----------------------
-----------------------
Here is an example of an INPUTRC file.  This illustrates key binding,
Here is an example of an INPUTRC file.  This illustrates key binding,
variable assignment, and conditional syntax.
variable assignment, and conditional syntax.
     # This file controls the behaviour of line input editing for
     # This file controls the behaviour of line input editing for
     # programs that use the GNU Readline library.  Existing
     # programs that use the GNU Readline library.  Existing
     # programs include FTP, Bash, and GDB.
     # programs include FTP, Bash, and GDB.
     #
     #
     # You can re-read the inputrc file with C-x C-r.
     # You can re-read the inputrc file with C-x C-r.
     # Lines beginning with '#' are comments.
     # Lines beginning with '#' are comments.
     #
     #
     # First, include any systemwide bindings and variable
     # First, include any systemwide bindings and variable
     # assignments from /etc/Inputrc
     # assignments from /etc/Inputrc
     $include /etc/Inputrc
     $include /etc/Inputrc
     #
     #
     # Set various bindings for emacs mode.
     # Set various bindings for emacs mode.
     set editing-mode emacs
     set editing-mode emacs
     $if mode=emacs
     $if mode=emacs
     Meta-Control-h:    backward-kill-word      Text after the function name is ignored
     Meta-Control-h:    backward-kill-word      Text after the function name is ignored
     #
     #
     # Arrow keys in keypad mode
     # Arrow keys in keypad mode
     #
     #
     #"\M-OD":        backward-char
     #"\M-OD":        backward-char
     #"\M-OC":        forward-char
     #"\M-OC":        forward-char
     #"\M-OA":        previous-history
     #"\M-OA":        previous-history
     #"\M-OB":        next-history
     #"\M-OB":        next-history
     #
     #
     # Arrow keys in ANSI mode
     # Arrow keys in ANSI mode
     #
     #
     "\M-[D":        backward-char
     "\M-[D":        backward-char
     "\M-[C":        forward-char
     "\M-[C":        forward-char
     "\M-[A":        previous-history
     "\M-[A":        previous-history
     "\M-[B":        next-history
     "\M-[B":        next-history
     #
     #
     # Arrow keys in 8 bit keypad mode
     # Arrow keys in 8 bit keypad mode
     #
     #
     #"\M-\C-OD":       backward-char
     #"\M-\C-OD":       backward-char
     #"\M-\C-OC":       forward-char
     #"\M-\C-OC":       forward-char
     #"\M-\C-OA":       previous-history
     #"\M-\C-OA":       previous-history
     #"\M-\C-OB":       next-history
     #"\M-\C-OB":       next-history
     #
     #
     # Arrow keys in 8 bit ANSI mode
     # Arrow keys in 8 bit ANSI mode
     #
     #
     #"\M-\C-[D":       backward-char
     #"\M-\C-[D":       backward-char
     #"\M-\C-[C":       forward-char
     #"\M-\C-[C":       forward-char
     #"\M-\C-[A":       previous-history
     #"\M-\C-[A":       previous-history
     #"\M-\C-[B":       next-history
     #"\M-\C-[B":       next-history
     C-q: quoted-insert
     C-q: quoted-insert
     $endif
     $endif
     # An old-style binding.  This happens to be the default.
     # An old-style binding.  This happens to be the default.
     TAB: complete
     TAB: complete
     # Macros that are convenient for shell interaction
     # Macros that are convenient for shell interaction
     $if Bash
     $if Bash
     # edit the path
     # edit the path
     "\C-xp": "PATH=${PATH}\e\C-e\C-a\ef\C-f"
     "\C-xp": "PATH=${PATH}\e\C-e\C-a\ef\C-f"
     # prepare to type a quoted word --
     # prepare to type a quoted word --
     # insert open and close double quotes
     # insert open and close double quotes
     # and move to just after the open quote
     # and move to just after the open quote
     "\C-x\"": "\"\"\C-b"
     "\C-x\"": "\"\"\C-b"
     # insert a backslash (testing backslash escapes
     # insert a backslash (testing backslash escapes
     # in sequences and macros)
     # in sequences and macros)
     "\C-x\\": "\\"
     "\C-x\\": "\\"
     # Quote the current or previous word
     # Quote the current or previous word
     "\C-xq": "\eb\"\ef\""
     "\C-xq": "\eb\"\ef\""
     # Add a binding to refresh the line, which is unbound
     # Add a binding to refresh the line, which is unbound
     "\C-xr": redraw-current-line
     "\C-xr": redraw-current-line
     # Edit variable on current line.
     # Edit variable on current line.
     "\M-\C-v": "\C-a\C-k$\C-y\M-\C-e\C-a\C-y="
     "\M-\C-v": "\C-a\C-k$\C-y\M-\C-e\C-a\C-y="
     $endif
     $endif
     # use a visible bell if one is available
     # use a visible bell if one is available
     set bell-style visible
     set bell-style visible
     # don't strip characters to 7 bits when reading
     # don't strip characters to 7 bits when reading
     set input-meta on
     set input-meta on
     # allow iso-latin1 characters to be inserted rather
     # allow iso-latin1 characters to be inserted rather
     # than converted to prefix-meta sequences
     # than converted to prefix-meta sequences
     set convert-meta off
     set convert-meta off
     # display characters with the eighth bit set directly
     # display characters with the eighth bit set directly
     # rather than as meta-prefixed characters
     # rather than as meta-prefixed characters
     set output-meta on
     set output-meta on
     # if there are more than 150 possible completions for
     # if there are more than 150 possible completions for
     # a word, ask the user if he wants to see all of them
     # a word, ask the user if he wants to see all of them
     set completion-query-items 150
     set completion-query-items 150
     # For FTP
     # For FTP
     $if Ftp
     $if Ftp
     "\C-xg": "get \M-?"
     "\C-xg": "get \M-?"
     "\C-xt": "put \M-?"
     "\C-xt": "put \M-?"
     "\M-.": yank-last-arg
     "\M-.": yank-last-arg
     $endif
     $endif


File: gdb.info,  Node: Bindable Readline Commands,  Next: Readline vi Mode,  Prev: Readline Init File,  Up: Command Line Editing
File: gdb.info,  Node: Bindable Readline Commands,  Next: Readline vi Mode,  Prev: Readline Init File,  Up: Command Line Editing
31.4 Bindable Readline Commands
31.4 Bindable Readline Commands
===============================
===============================
* Menu:
* Menu:
* Commands For Moving::         Moving about the line.
* Commands For Moving::         Moving about the line.
* Commands For History::        Getting at previous lines.
* Commands For History::        Getting at previous lines.
* Commands For Text::           Commands for changing text.
* Commands For Text::           Commands for changing text.
* Commands For Killing::        Commands for killing and yanking.
* Commands For Killing::        Commands for killing and yanking.
* Numeric Arguments::           Specifying numeric arguments, repeat counts.
* Numeric Arguments::           Specifying numeric arguments, repeat counts.
* Commands For Completion::     Getting Readline to do the typing for you.
* Commands For Completion::     Getting Readline to do the typing for you.
* Keyboard Macros::             Saving and re-executing typed characters
* Keyboard Macros::             Saving and re-executing typed characters
* Miscellaneous Commands::      Other miscellaneous commands.
* Miscellaneous Commands::      Other miscellaneous commands.
   This section describes Readline commands that may be bound to key
   This section describes Readline commands that may be bound to key
sequences.  Command names without an accompanying key sequence are
sequences.  Command names without an accompanying key sequence are
unbound by default.
unbound by default.
   In the following descriptions, "point" refers to the current cursor
   In the following descriptions, "point" refers to the current cursor
position, and "mark" refers to a cursor position saved by the
position, and "mark" refers to a cursor position saved by the
`set-mark' command.  The text between the point and mark is referred to
`set-mark' command.  The text between the point and mark is referred to
as the "region".
as the "region".


File: gdb.info,  Node: Commands For Moving,  Next: Commands For History,  Up: Bindable Readline Commands
File: gdb.info,  Node: Commands For Moving,  Next: Commands For History,  Up: Bindable Readline Commands
31.4.1 Commands For Moving
31.4.1 Commands For Moving
--------------------------
--------------------------
`beginning-of-line (C-a)'
`beginning-of-line (C-a)'
     Move to the start of the current line.
     Move to the start of the current line.
`end-of-line (C-e)'
`end-of-line (C-e)'
     Move to the end of the line.
     Move to the end of the line.
`forward-char (C-f)'
`forward-char (C-f)'
     Move forward a character.
     Move forward a character.
`backward-char (C-b)'
`backward-char (C-b)'
     Move back a character.
     Move back a character.
`forward-word (M-f)'
`forward-word (M-f)'
     Move forward to the end of the next word.  Words are composed of
     Move forward to the end of the next word.  Words are composed of
     letters and digits.
     letters and digits.
`backward-word (M-b)'
`backward-word (M-b)'
     Move back to the start of the current or previous word.  Words are
     Move back to the start of the current or previous word.  Words are
     composed of letters and digits.
     composed of letters and digits.
`clear-screen (C-l)'
`clear-screen (C-l)'
     Clear the screen and redraw the current line, leaving the current
     Clear the screen and redraw the current line, leaving the current
     line at the top of the screen.
     line at the top of the screen.
`redraw-current-line ()'
`redraw-current-line ()'
     Refresh the current line.  By default, this is unbound.
     Refresh the current line.  By default, this is unbound.


File: gdb.info,  Node: Commands For History,  Next: Commands For Text,  Prev: Commands For Moving,  Up: Bindable Readline Commands
File: gdb.info,  Node: Commands For History,  Next: Commands For Text,  Prev: Commands For Moving,  Up: Bindable Readline Commands
31.4.2 Commands For Manipulating The History
31.4.2 Commands For Manipulating The History
--------------------------------------------
--------------------------------------------
`accept-line (Newline or Return)'
`accept-line (Newline or Return)'
     Accept the line regardless of where the cursor is.  If this line is
     Accept the line regardless of where the cursor is.  If this line is
     non-empty, it may be added to the history list for future recall
     non-empty, it may be added to the history list for future recall
     with `add_history()'.  If this line is a modified history line,
     with `add_history()'.  If this line is a modified history line,
     the history line is restored to its original state.
     the history line is restored to its original state.
`previous-history (C-p)'
`previous-history (C-p)'
     Move `back' through the history list, fetching the previous
     Move `back' through the history list, fetching the previous
     command.
     command.
`next-history (C-n)'
`next-history (C-n)'
     Move `forward' through the history list, fetching the next command.
     Move `forward' through the history list, fetching the next command.
`beginning-of-history (M-<)'
`beginning-of-history (M-<)'
     Move to the first line in the history.
     Move to the first line in the history.
`end-of-history (M->)'
`end-of-history (M->)'
     Move to the end of the input history, i.e., the line currently
     Move to the end of the input history, i.e., the line currently
     being entered.
     being entered.
`reverse-search-history (C-r)'
`reverse-search-history (C-r)'
     Search backward starting at the current line and moving `up'
     Search backward starting at the current line and moving `up'
     through the history as necessary.  This is an incremental search.
     through the history as necessary.  This is an incremental search.
`forward-search-history (C-s)'
`forward-search-history (C-s)'
     Search forward starting at the current line and moving `down'
     Search forward starting at the current line and moving `down'
     through the the history as necessary.  This is an incremental
     through the the history as necessary.  This is an incremental
     search.
     search.
`non-incremental-reverse-search-history (M-p)'
`non-incremental-reverse-search-history (M-p)'
     Search backward starting at the current line and moving `up'
     Search backward starting at the current line and moving `up'
     through the history as necessary using a non-incremental search
     through the history as necessary using a non-incremental search
     for a string supplied by the user.
     for a string supplied by the user.
`non-incremental-forward-search-history (M-n)'
`non-incremental-forward-search-history (M-n)'
     Search forward starting at the current line and moving `down'
     Search forward starting at the current line and moving `down'
     through the the history as necessary using a non-incremental search
     through the the history as necessary using a non-incremental search
     for a string supplied by the user.
     for a string supplied by the user.
`history-search-forward ()'
`history-search-forward ()'
     Search forward through the history for the string of characters
     Search forward through the history for the string of characters
     between the start of the current line and the point.  This is a
     between the start of the current line and the point.  This is a
     non-incremental search.  By default, this command is unbound.
     non-incremental search.  By default, this command is unbound.
`history-search-backward ()'
`history-search-backward ()'
     Search backward through the history for the string of characters
     Search backward through the history for the string of characters
     between the start of the current line and the point.  This is a
     between the start of the current line and the point.  This is a
     non-incremental search.  By default, this command is unbound.
     non-incremental search.  By default, this command is unbound.
`yank-nth-arg (M-C-y)'
`yank-nth-arg (M-C-y)'
     Insert the first argument to the previous command (usually the
     Insert the first argument to the previous command (usually the
     second word on the previous line) at point.  With an argument N,
     second word on the previous line) at point.  With an argument N,
     insert the Nth word from the previous command (the words in the
     insert the Nth word from the previous command (the words in the
     previous command begin with word 0).  A negative argument inserts
     previous command begin with word 0).  A negative argument inserts
     the Nth word from the end of the previous command.  Once the
     the Nth word from the end of the previous command.  Once the
     argument N is computed, the argument is extracted as if the `!N'
     argument N is computed, the argument is extracted as if the `!N'
     history expansion had been specified.
     history expansion had been specified.
`yank-last-arg (M-. or M-_)'
`yank-last-arg (M-. or M-_)'
     Insert last argument to the previous command (the last word of the
     Insert last argument to the previous command (the last word of the
     previous history entry).  With an argument, behave exactly like
     previous history entry).  With an argument, behave exactly like
     `yank-nth-arg'.  Successive calls to `yank-last-arg' move back
     `yank-nth-arg'.  Successive calls to `yank-last-arg' move back
     through the history list, inserting the last argument of each line
     through the history list, inserting the last argument of each line
     in turn.  The history expansion facilities are used to extract the
     in turn.  The history expansion facilities are used to extract the
     last argument, as if the `!$' history expansion had been specified.
     last argument, as if the `!$' history expansion had been specified.


File: gdb.info,  Node: Commands For Text,  Next: Commands For Killing,  Prev: Commands For History,  Up: Bindable Readline Commands
File: gdb.info,  Node: Commands For Text,  Next: Commands For Killing,  Prev: Commands For History,  Up: Bindable Readline Commands
31.4.3 Commands For Changing Text
31.4.3 Commands For Changing Text
---------------------------------
---------------------------------
`delete-char (C-d)'
`delete-char (C-d)'
     Delete the character at point.  If point is at the beginning of
     Delete the character at point.  If point is at the beginning of
     the line, there are no characters in the line, and the last
     the line, there are no characters in the line, and the last
     character typed was not bound to `delete-char', then return EOF.
     character typed was not bound to `delete-char', then return EOF.
`backward-delete-char (Rubout)'
`backward-delete-char (Rubout)'
     Delete the character behind the cursor.  A numeric argument means
     Delete the character behind the cursor.  A numeric argument means
     to kill the characters instead of deleting them.
     to kill the characters instead of deleting them.
`forward-backward-delete-char ()'
`forward-backward-delete-char ()'
     Delete the character under the cursor, unless the cursor is at the
     Delete the character under the cursor, unless the cursor is at the
     end of the line, in which case the character behind the cursor is
     end of the line, in which case the character behind the cursor is
     deleted.  By default, this is not bound to a key.
     deleted.  By default, this is not bound to a key.
`quoted-insert (C-q or C-v)'
`quoted-insert (C-q or C-v)'
     Add the next character typed to the line verbatim.  This is how to
     Add the next character typed to the line verbatim.  This is how to
     insert key sequences like `C-q', for example.
     insert key sequences like `C-q', for example.
`tab-insert (M-)'
`tab-insert (M-)'
     Insert a tab character.
     Insert a tab character.
`self-insert (a, b, A, 1, !, ...)'
`self-insert (a, b, A, 1, !, ...)'
     Insert yourself.
     Insert yourself.
`transpose-chars (C-t)'
`transpose-chars (C-t)'
     Drag the character before the cursor forward over the character at
     Drag the character before the cursor forward over the character at
     the cursor, moving the cursor forward as well.  If the insertion
     the cursor, moving the cursor forward as well.  If the insertion
     point is at the end of the line, then this transposes the last two
     point is at the end of the line, then this transposes the last two
     characters of the line.  Negative arguments have no effect.
     characters of the line.  Negative arguments have no effect.
`transpose-words (M-t)'
`transpose-words (M-t)'
     Drag the word before point past the word after point, moving point
     Drag the word before point past the word after point, moving point
     past that word as well.  If the insertion point is at the end of
     past that word as well.  If the insertion point is at the end of
     the line, this transposes the last two words on the line.
     the line, this transposes the last two words on the line.
`upcase-word (M-u)'
`upcase-word (M-u)'
     Uppercase the current (or following) word.  With a negative
     Uppercase the current (or following) word.  With a negative
     argument, uppercase the previous word, but do not move the cursor.
     argument, uppercase the previous word, but do not move the cursor.
`downcase-word (M-l)'
`downcase-word (M-l)'
     Lowercase the current (or following) word.  With a negative
     Lowercase the current (or following) word.  With a negative
     argument, lowercase the previous word, but do not move the cursor.
     argument, lowercase the previous word, but do not move the cursor.
`capitalize-word (M-c)'
`capitalize-word (M-c)'
     Capitalize the current (or following) word.  With a negative
     Capitalize the current (or following) word.  With a negative
     argument, capitalize the previous word, but do not move the cursor.
     argument, capitalize the previous word, but do not move the cursor.
`overwrite-mode ()'
`overwrite-mode ()'
     Toggle overwrite mode.  With an explicit positive numeric argument,
     Toggle overwrite mode.  With an explicit positive numeric argument,
     switches to overwrite mode.  With an explicit non-positive numeric
     switches to overwrite mode.  With an explicit non-positive numeric
     argument, switches to insert mode.  This command affects only
     argument, switches to insert mode.  This command affects only
     `emacs' mode; `vi' mode does overwrite differently.  Each call to
     `emacs' mode; `vi' mode does overwrite differently.  Each call to
     `readline()' starts in insert mode.
     `readline()' starts in insert mode.
     In overwrite mode, characters bound to `self-insert' replace the
     In overwrite mode, characters bound to `self-insert' replace the
     text at point rather than pushing the text to the right.
     text at point rather than pushing the text to the right.
     Characters bound to `backward-delete-char' replace the character
     Characters bound to `backward-delete-char' replace the character
     before point with a space.
     before point with a space.
     By default, this command is unbound.
     By default, this command is unbound.


File: gdb.info,  Node: Commands For Killing,  Next: Numeric Arguments,  Prev: Commands For Text,  Up: Bindable Readline Commands
File: gdb.info,  Node: Commands For Killing,  Next: Numeric Arguments,  Prev: Commands For Text,  Up: Bindable Readline Commands
31.4.4 Killing And Yanking
31.4.4 Killing And Yanking
--------------------------
--------------------------
`kill-line (C-k)'
`kill-line (C-k)'
     Kill the text from point to the end of the line.
     Kill the text from point to the end of the line.
`backward-kill-line (C-x Rubout)'
`backward-kill-line (C-x Rubout)'
     Kill backward to the beginning of the line.
     Kill backward to the beginning of the line.
`unix-line-discard (C-u)'
`unix-line-discard (C-u)'
     Kill backward from the cursor to the beginning of the current line.
     Kill backward from the cursor to the beginning of the current line.
`kill-whole-line ()'
`kill-whole-line ()'
     Kill all characters on the current line, no matter where point is.
     Kill all characters on the current line, no matter where point is.
     By default, this is unbound.
     By default, this is unbound.
`kill-word (M-d)'
`kill-word (M-d)'
     Kill from point to the end of the current word, or if between
     Kill from point to the end of the current word, or if between
     words, to the end of the next word.  Word boundaries are the same
     words, to the end of the next word.  Word boundaries are the same
     as `forward-word'.
     as `forward-word'.
`backward-kill-word (M-)'
`backward-kill-word (M-)'
     Kill the word behind point.  Word boundaries are the same as
     Kill the word behind point.  Word boundaries are the same as
     `backward-word'.
     `backward-word'.
`unix-word-rubout (C-w)'
`unix-word-rubout (C-w)'
     Kill the word behind point, using white space as a word boundary.
     Kill the word behind point, using white space as a word boundary.
     The killed text is saved on the kill-ring.
     The killed text is saved on the kill-ring.
`unix-filename-rubout ()'
`unix-filename-rubout ()'
     Kill the word behind point, using white space and the slash
     Kill the word behind point, using white space and the slash
     character as the word boundaries.  The killed text is saved on the
     character as the word boundaries.  The killed text is saved on the
     kill-ring.
     kill-ring.
`delete-horizontal-space ()'
`delete-horizontal-space ()'
     Delete all spaces and tabs around point.  By default, this is
     Delete all spaces and tabs around point.  By default, this is
     unbound.
     unbound.
`kill-region ()'
`kill-region ()'
     Kill the text in the current region.  By default, this command is
     Kill the text in the current region.  By default, this command is
     unbound.
     unbound.
`copy-region-as-kill ()'
`copy-region-as-kill ()'
     Copy the text in the region to the kill buffer, so it can be yanked
     Copy the text in the region to the kill buffer, so it can be yanked
     right away.  By default, this command is unbound.
     right away.  By default, this command is unbound.
`copy-backward-word ()'
`copy-backward-word ()'
     Copy the word before point to the kill buffer.  The word
     Copy the word before point to the kill buffer.  The word
     boundaries are the same as `backward-word'.  By default, this
     boundaries are the same as `backward-word'.  By default, this
     command is unbound.
     command is unbound.
`copy-forward-word ()'
`copy-forward-word ()'
     Copy the word following point to the kill buffer.  The word
     Copy the word following point to the kill buffer.  The word
     boundaries are the same as `forward-word'.  By default, this
     boundaries are the same as `forward-word'.  By default, this
     command is unbound.
     command is unbound.
`yank (C-y)'
`yank (C-y)'
     Yank the top of the kill ring into the buffer at point.
     Yank the top of the kill ring into the buffer at point.
`yank-pop (M-y)'
`yank-pop (M-y)'
     Rotate the kill-ring, and yank the new top.  You can only do this
     Rotate the kill-ring, and yank the new top.  You can only do this
     if the prior command is `yank' or `yank-pop'.
     if the prior command is `yank' or `yank-pop'.


File: gdb.info,  Node: Numeric Arguments,  Next: Commands For Completion,  Prev: Commands For Killing,  Up: Bindable Readline Commands
File: gdb.info,  Node: Numeric Arguments,  Next: Commands For Completion,  Prev: Commands For Killing,  Up: Bindable Readline Commands
31.4.5 Specifying Numeric Arguments
31.4.5 Specifying Numeric Arguments
-----------------------------------
-----------------------------------
`digit-argument (M-0, M-1, ... M--)'
`digit-argument (M-0, M-1, ... M--)'
     Add this digit to the argument already accumulating, or start a new
     Add this digit to the argument already accumulating, or start a new
     argument.  `M--' starts a negative argument.
     argument.  `M--' starts a negative argument.
`universal-argument ()'
`universal-argument ()'
     This is another way to specify an argument.  If this command is
     This is another way to specify an argument.  If this command is
     followed by one or more digits, optionally with a leading minus
     followed by one or more digits, optionally with a leading minus
     sign, those digits define the argument.  If the command is
     sign, those digits define the argument.  If the command is
     followed by digits, executing `universal-argument' again ends the
     followed by digits, executing `universal-argument' again ends the
     numeric argument, but is otherwise ignored.  As a special case, if
     numeric argument, but is otherwise ignored.  As a special case, if
     this command is immediately followed by a character that is
     this command is immediately followed by a character that is
     neither a digit or minus sign, the argument count for the next
     neither a digit or minus sign, the argument count for the next
     command is multiplied by four.  The argument count is initially
     command is multiplied by four.  The argument count is initially
     one, so executing this function the first time makes the argument
     one, so executing this function the first time makes the argument
     count four, a second time makes the argument count sixteen, and so
     count four, a second time makes the argument count sixteen, and so
     on.  By default, this is not bound to a key.
     on.  By default, this is not bound to a key.


File: gdb.info,  Node: Commands For Completion,  Next: Keyboard Macros,  Prev: Numeric Arguments,  Up: Bindable Readline Commands
File: gdb.info,  Node: Commands For Completion,  Next: Keyboard Macros,  Prev: Numeric Arguments,  Up: Bindable Readline Commands
31.4.6 Letting Readline Type For You
31.4.6 Letting Readline Type For You
------------------------------------
------------------------------------
`complete ()'
`complete ()'
     Attempt to perform completion on the text before point.  The
     Attempt to perform completion on the text before point.  The
     actual completion performed is application-specific.  The default
     actual completion performed is application-specific.  The default
     is filename completion.
     is filename completion.
`possible-completions (M-?)'
`possible-completions (M-?)'
     List the possible completions of the text before point.
     List the possible completions of the text before point.
`insert-completions (M-*)'
`insert-completions (M-*)'
     Insert all completions of the text before point that would have
     Insert all completions of the text before point that would have
     been generated by `possible-completions'.
     been generated by `possible-completions'.
`menu-complete ()'
`menu-complete ()'
     Similar to `complete', but replaces the word to be completed with
     Similar to `complete', but replaces the word to be completed with
     a single match from the list of possible completions.  Repeated
     a single match from the list of possible completions.  Repeated
     execution of `menu-complete' steps through the list of possible
     execution of `menu-complete' steps through the list of possible
     completions, inserting each match in turn.  At the end of the list
     completions, inserting each match in turn.  At the end of the list
     of completions, the bell is rung (subject to the setting of
     of completions, the bell is rung (subject to the setting of
     `bell-style') and the original text is restored.  An argument of N
     `bell-style') and the original text is restored.  An argument of N
     moves N positions forward in the list of matches; a negative
     moves N positions forward in the list of matches; a negative
     argument may be used to move backward through the list.  This
     argument may be used to move backward through the list.  This
     command is intended to be bound to , but is unbound by
     command is intended to be bound to , but is unbound by
     default.
     default.
`delete-char-or-list ()'
`delete-char-or-list ()'
     Deletes the character under the cursor if not at the beginning or
     Deletes the character under the cursor if not at the beginning or
     end of the line (like `delete-char').  If at the end of the line,
     end of the line (like `delete-char').  If at the end of the line,
     behaves identically to `possible-completions'.  This command is
     behaves identically to `possible-completions'.  This command is
     unbound by default.
     unbound by default.


File: gdb.info,  Node: Keyboard Macros,  Next: Miscellaneous Commands,  Prev: Commands For Completion,  Up: Bindable Readline Commands
File: gdb.info,  Node: Keyboard Macros,  Next: Miscellaneous Commands,  Prev: Commands For Completion,  Up: Bindable Readline Commands
31.4.7 Keyboard Macros
31.4.7 Keyboard Macros
----------------------
----------------------
`start-kbd-macro (C-x ()'
`start-kbd-macro (C-x ()'
     Begin saving the characters typed into the current keyboard macro.
     Begin saving the characters typed into the current keyboard macro.
`end-kbd-macro (C-x ))'
`end-kbd-macro (C-x ))'
     Stop saving the characters typed into the current keyboard macro
     Stop saving the characters typed into the current keyboard macro
     and save the definition.
     and save the definition.
`call-last-kbd-macro (C-x e)'
`call-last-kbd-macro (C-x e)'
     Re-execute the last keyboard macro defined, by making the
     Re-execute the last keyboard macro defined, by making the
     characters in the macro appear as if typed at the keyboard.
     characters in the macro appear as if typed at the keyboard.


File: gdb.info,  Node: Miscellaneous Commands,  Prev: Keyboard Macros,  Up: Bindable Readline Commands
File: gdb.info,  Node: Miscellaneous Commands,  Prev: Keyboard Macros,  Up: Bindable Readline Commands
31.4.8 Some Miscellaneous Commands
31.4.8 Some Miscellaneous Commands
----------------------------------
----------------------------------
`re-read-init-file (C-x C-r)'
`re-read-init-file (C-x C-r)'
     Read in the contents of the INPUTRC file, and incorporate any
     Read in the contents of the INPUTRC file, and incorporate any
     bindings or variable assignments found there.
     bindings or variable assignments found there.
`abort (C-g)'
`abort (C-g)'
     Abort the current editing command and ring the terminal's bell
     Abort the current editing command and ring the terminal's bell
     (subject to the setting of `bell-style').
     (subject to the setting of `bell-style').
`do-uppercase-version (M-a, M-b, M-X, ...)'
`do-uppercase-version (M-a, M-b, M-X, ...)'
     If the metafied character X is lowercase, run the command that is
     If the metafied character X is lowercase, run the command that is
     bound to the corresponding uppercase character.
     bound to the corresponding uppercase character.
`prefix-meta ()'
`prefix-meta ()'
     Metafy the next character typed.  This is for keyboards without a
     Metafy the next character typed.  This is for keyboards without a
     meta key.  Typing ` f' is equivalent to typing `M-f'.
     meta key.  Typing ` f' is equivalent to typing `M-f'.
`undo (C-_ or C-x C-u)'
`undo (C-_ or C-x C-u)'
     Incremental undo, separately remembered for each line.
     Incremental undo, separately remembered for each line.
`revert-line (M-r)'
`revert-line (M-r)'
     Undo all changes made to this line.  This is like executing the
     Undo all changes made to this line.  This is like executing the
     `undo' command enough times to get back to the beginning.
     `undo' command enough times to get back to the beginning.
`tilde-expand (M-~)'
`tilde-expand (M-~)'
     Perform tilde expansion on the current word.
     Perform tilde expansion on the current word.
`set-mark (C-@)'
`set-mark (C-@)'
     Set the mark to the point.  If a numeric argument is supplied, the
     Set the mark to the point.  If a numeric argument is supplied, the
     mark is set to that position.
     mark is set to that position.
`exchange-point-and-mark (C-x C-x)'
`exchange-point-and-mark (C-x C-x)'
     Swap the point with the mark.  The current cursor position is set
     Swap the point with the mark.  The current cursor position is set
     to the saved position, and the old cursor position is saved as the
     to the saved position, and the old cursor position is saved as the
     mark.
     mark.
`character-search (C-])'
`character-search (C-])'
     A character is read and point is moved to the next occurrence of
     A character is read and point is moved to the next occurrence of
     that character.  A negative count searches for previous
     that character.  A negative count searches for previous
     occurrences.
     occurrences.
`character-search-backward (M-C-])'
`character-search-backward (M-C-])'
     A character is read and point is moved to the previous occurrence
     A character is read and point is moved to the previous occurrence
     of that character.  A negative count searches for subsequent
     of that character.  A negative count searches for subsequent
     occurrences.
     occurrences.
`insert-comment (M-#)'
`insert-comment (M-#)'
     Without a numeric argument, the value of the `comment-begin'
     Without a numeric argument, the value of the `comment-begin'
     variable is inserted at the beginning of the current line.  If a
     variable is inserted at the beginning of the current line.  If a
     numeric argument is supplied, this command acts as a toggle:  if
     numeric argument is supplied, this command acts as a toggle:  if
     the characters at the beginning of the line do not match the value
     the characters at the beginning of the line do not match the value
     of `comment-begin', the value is inserted, otherwise the
     of `comment-begin', the value is inserted, otherwise the
     characters in `comment-begin' are deleted from the beginning of
     characters in `comment-begin' are deleted from the beginning of
     the line.  In either case, the line is accepted as if a newline
     the line.  In either case, the line is accepted as if a newline
     had been typed.
     had been typed.
`dump-functions ()'
`dump-functions ()'
     Print all of the functions and their key bindings to the Readline
     Print all of the functions and their key bindings to the Readline
     output stream.  If a numeric argument is supplied, the output is
     output stream.  If a numeric argument is supplied, the output is
     formatted in such a way that it can be made part of an INPUTRC
     formatted in such a way that it can be made part of an INPUTRC
     file.  This command is unbound by default.
     file.  This command is unbound by default.
`dump-variables ()'
`dump-variables ()'
     Print all of the settable variables and their values to the
     Print all of the settable variables and their values to the
     Readline output stream.  If a numeric argument is supplied, the
     Readline output stream.  If a numeric argument is supplied, the
     output is formatted in such a way that it can be made part of an
     output is formatted in such a way that it can be made part of an
     INPUTRC file.  This command is unbound by default.
     INPUTRC file.  This command is unbound by default.
`dump-macros ()'
`dump-macros ()'
     Print all of the Readline key sequences bound to macros and the
     Print all of the Readline key sequences bound to macros and the
     strings they output.  If a numeric argument is supplied, the
     strings they output.  If a numeric argument is supplied, the
     output is formatted in such a way that it can be made part of an
     output is formatted in such a way that it can be made part of an
     INPUTRC file.  This command is unbound by default.
     INPUTRC file.  This command is unbound by default.
`emacs-editing-mode (C-e)'
`emacs-editing-mode (C-e)'
     When in `vi' command mode, this causes a switch to `emacs' editing
     When in `vi' command mode, this causes a switch to `emacs' editing
     mode.
     mode.
`vi-editing-mode (M-C-j)'
`vi-editing-mode (M-C-j)'
     When in `emacs' editing mode, this causes a switch to `vi' editing
     When in `emacs' editing mode, this causes a switch to `vi' editing
     mode.
     mode.


File: gdb.info,  Node: Readline vi Mode,  Prev: Bindable Readline Commands,  Up: Command Line Editing
File: gdb.info,  Node: Readline vi Mode,  Prev: Bindable Readline Commands,  Up: Command Line Editing
31.5 Readline vi Mode
31.5 Readline vi Mode
=====================
=====================
While the Readline library does not have a full set of `vi' editing
While the Readline library does not have a full set of `vi' editing
functions, it does contain enough to allow simple editing of the line.
functions, it does contain enough to allow simple editing of the line.
The Readline `vi' mode behaves as specified in the POSIX 1003.2
The Readline `vi' mode behaves as specified in the POSIX 1003.2
standard.
standard.
   In order to switch interactively between `emacs' and `vi' editing
   In order to switch interactively between `emacs' and `vi' editing
modes, use the command `M-C-j' (bound to emacs-editing-mode when in
modes, use the command `M-C-j' (bound to emacs-editing-mode when in
`vi' mode and to vi-editing-mode in `emacs' mode).  The Readline
`vi' mode and to vi-editing-mode in `emacs' mode).  The Readline
default is `emacs' mode.
default is `emacs' mode.
   When you enter a line in `vi' mode, you are already placed in
   When you enter a line in `vi' mode, you are already placed in
`insertion' mode, as if you had typed an `i'.  Pressing  switches
`insertion' mode, as if you had typed an `i'.  Pressing  switches
you into `command' mode, where you can edit the text of the line with
you into `command' mode, where you can edit the text of the line with
the standard `vi' movement keys, move to previous history lines with
the standard `vi' movement keys, move to previous history lines with
`k' and subsequent lines with `j', and so forth.
`k' and subsequent lines with `j', and so forth.


File: gdb.info,  Node: Using History Interactively,  Next: Formatting Documentation,  Prev: Command Line Editing,  Up: Top
File: gdb.info,  Node: Using History Interactively,  Next: Formatting Documentation,  Prev: Command Line Editing,  Up: Top
32 Using History Interactively
32 Using History Interactively
******************************
******************************
This chapter describes how to use the GNU History Library interactively,
This chapter describes how to use the GNU History Library interactively,
from a user's standpoint.  It should be considered a user's guide.  For
from a user's standpoint.  It should be considered a user's guide.  For
information on using the GNU History Library in other programs, see the
information on using the GNU History Library in other programs, see the
GNU Readline Library Manual.
GNU Readline Library Manual.
* Menu:
* Menu:
* History Interaction::         What it feels like using History as a user.
* History Interaction::         What it feels like using History as a user.


File: gdb.info,  Node: History Interaction,  Up: Using History Interactively
File: gdb.info,  Node: History Interaction,  Up: Using History Interactively
32.1 History Expansion
32.1 History Expansion
======================
======================
The History library provides a history expansion feature that is similar
The History library provides a history expansion feature that is similar
to the history expansion provided by `csh'.  This section describes the
to the history expansion provided by `csh'.  This section describes the
syntax used to manipulate the history information.
syntax used to manipulate the history information.
   History expansions introduce words from the history list into the
   History expansions introduce words from the history list into the
input stream, making it easy to repeat commands, insert the arguments
input stream, making it easy to repeat commands, insert the arguments
to a previous command into the current input line, or fix errors in
to a previous command into the current input line, or fix errors in
previous commands quickly.
previous commands quickly.
   History expansion takes place in two parts.  The first is to
   History expansion takes place in two parts.  The first is to
determine which line from the history list should be used during
determine which line from the history list should be used during
substitution.  The second is to select portions of that line for
substitution.  The second is to select portions of that line for
inclusion into the current one.  The line selected from the history is
inclusion into the current one.  The line selected from the history is
called the "event", and the portions of that line that are acted upon
called the "event", and the portions of that line that are acted upon
are called "words".  Various "modifiers" are available to manipulate
are called "words".  Various "modifiers" are available to manipulate
the selected words.  The line is broken into words in the same fashion
the selected words.  The line is broken into words in the same fashion
that Bash does, so that several words surrounded by quotes are
that Bash does, so that several words surrounded by quotes are
considered one word.  History expansions are introduced by the
considered one word.  History expansions are introduced by the
appearance of the history expansion character, which is `!' by default.
appearance of the history expansion character, which is `!' by default.
* Menu:
* Menu:
* Event Designators::   How to specify which history line to use.
* Event Designators::   How to specify which history line to use.
* Word Designators::    Specifying which words are of interest.
* Word Designators::    Specifying which words are of interest.
* Modifiers::           Modifying the results of substitution.
* Modifiers::           Modifying the results of substitution.


File: gdb.info,  Node: Event Designators,  Next: Word Designators,  Up: History Interaction
File: gdb.info,  Node: Event Designators,  Next: Word Designators,  Up: History Interaction
32.1.1 Event Designators
32.1.1 Event Designators
------------------------
------------------------
An event designator is a reference to a command line entry in the
An event designator is a reference to a command line entry in the
history list.
history list.
`!'
`!'
     Start a history substitution, except when followed by a space, tab,
     Start a history substitution, except when followed by a space, tab,
     the end of the line, or `='.
     the end of the line, or `='.
`!N'
`!N'
     Refer to command line N.
     Refer to command line N.
`!-N'
`!-N'
     Refer to the command N lines back.
     Refer to the command N lines back.
`!!'
`!!'
     Refer to the previous command.  This is a synonym for `!-1'.
     Refer to the previous command.  This is a synonym for `!-1'.
`!STRING'
`!STRING'
     Refer to the most recent command starting with STRING.
     Refer to the most recent command starting with STRING.
`!?STRING[?]'
`!?STRING[?]'
     Refer to the most recent command containing STRING.  The trailing
     Refer to the most recent command containing STRING.  The trailing
     `?' may be omitted if the STRING is followed immediately by a
     `?' may be omitted if the STRING is followed immediately by a
     newline.
     newline.
`^STRING1^STRING2^'
`^STRING1^STRING2^'
     Quick Substitution.  Repeat the last command, replacing STRING1
     Quick Substitution.  Repeat the last command, replacing STRING1
     with STRING2.  Equivalent to `!!:s/STRING1/STRING2/'.
     with STRING2.  Equivalent to `!!:s/STRING1/STRING2/'.
`!#'
`!#'
     The entire command line typed so far.
     The entire command line typed so far.


File: gdb.info,  Node: Word Designators,  Next: Modifiers,  Prev: Event Designators,  Up: History Interaction
File: gdb.info,  Node: Word Designators,  Next: Modifiers,  Prev: Event Designators,  Up: History Interaction
32.1.2 Word Designators
32.1.2 Word Designators
-----------------------
-----------------------
Word designators are used to select desired words from the event.  A
Word designators are used to select desired words from the event.  A
`:' separates the event specification from the word designator.  It may
`:' separates the event specification from the word designator.  It may
be omitted if the word designator begins with a `^', `$', `*', `-', or
be omitted if the word designator begins with a `^', `$', `*', `-', or
`%'.  Words are numbered from the beginning of the line, with the first
`%'.  Words are numbered from the beginning of the line, with the first
word being denoted by 0 (zero).  Words are inserted into the current
word being denoted by 0 (zero).  Words are inserted into the current
line separated by single spaces.
line separated by single spaces.
   For example,
   For example,
`!!'
`!!'
     designates the preceding command.  When you type this, the
     designates the preceding command.  When you type this, the
     preceding command is repeated in toto.
     preceding command is repeated in toto.
`!!:$'
`!!:$'
     designates the last argument of the preceding command.  This may be
     designates the last argument of the preceding command.  This may be
     shortened to `!$'.
     shortened to `!$'.
`!fi:2'
`!fi:2'
     designates the second argument of the most recent command starting
     designates the second argument of the most recent command starting
     with the letters `fi'.
     with the letters `fi'.
   Here are the word designators:
   Here are the word designators:
`0 (zero)'
`0 (zero)'
     The `0'th word.  For many applications, this is the command word.
     The `0'th word.  For many applications, this is the command word.
`N'
`N'
     The Nth word.
     The Nth word.
`^'
`^'
     The first argument; that is, word 1.
     The first argument; that is, word 1.
`$'
`$'
     The last argument.
     The last argument.
`%'
`%'
     The word matched by the most recent `?STRING?' search.
     The word matched by the most recent `?STRING?' search.
`X-Y'
`X-Y'
     A range of words; `-Y' abbreviates `0-Y'.
     A range of words; `-Y' abbreviates `0-Y'.
`*'
`*'
     All of the words, except the `0'th.  This is a synonym for `1-$'.
     All of the words, except the `0'th.  This is a synonym for `1-$'.
     It is not an error to use `*' if there is just one word in the
     It is not an error to use `*' if there is just one word in the
     event; the empty string is returned in that case.
     event; the empty string is returned in that case.
`X*'
`X*'
     Abbreviates `X-$'
     Abbreviates `X-$'
`X-'
`X-'
     Abbreviates `X-$' like `X*', but omits the last word.
     Abbreviates `X-$' like `X*', but omits the last word.
   If a word designator is supplied without an event specification, the
   If a word designator is supplied without an event specification, the
previous command is used as the event.
previous command is used as the event.


File: gdb.info,  Node: Modifiers,  Prev: Word Designators,  Up: History Interaction
File: gdb.info,  Node: Modifiers,  Prev: Word Designators,  Up: History Interaction
32.1.3 Modifiers
32.1.3 Modifiers
----------------
----------------
After the optional word designator, you can add a sequence of one or
After the optional word designator, you can add a sequence of one or
more of the following modifiers, each preceded by a `:'.
more of the following modifiers, each preceded by a `:'.
`h'
`h'
     Remove a trailing pathname component, leaving only the head.
     Remove a trailing pathname component, leaving only the head.
`t'
`t'
     Remove all leading  pathname  components, leaving the tail.
     Remove all leading  pathname  components, leaving the tail.
`r'
`r'
     Remove a trailing suffix of the form `.SUFFIX', leaving the
     Remove a trailing suffix of the form `.SUFFIX', leaving the
     basename.
     basename.
`e'
`e'
     Remove all but the trailing suffix.
     Remove all but the trailing suffix.
`p'
`p'
     Print the new command but do not execute it.
     Print the new command but do not execute it.
`s/OLD/NEW/'
`s/OLD/NEW/'
     Substitute NEW for the first occurrence of OLD in the event line.
     Substitute NEW for the first occurrence of OLD in the event line.
     Any delimiter may be used in place of `/'.  The delimiter may be
     Any delimiter may be used in place of `/'.  The delimiter may be
     quoted in OLD and NEW with a single backslash.  If `&' appears in
     quoted in OLD and NEW with a single backslash.  If `&' appears in
     NEW, it is replaced by OLD.  A single backslash will quote the
     NEW, it is replaced by OLD.  A single backslash will quote the
     `&'.  The final delimiter is optional if it is the last character
     `&'.  The final delimiter is optional if it is the last character
     on the input line.
     on the input line.
`&'
`&'
     Repeat the previous substitution.
     Repeat the previous substitution.
`g'
`g'
`a'
`a'
     Cause changes to be applied over the entire event line.  Used in
     Cause changes to be applied over the entire event line.  Used in
     conjunction with `s', as in `gs/OLD/NEW/', or with `&'.
     conjunction with `s', as in `gs/OLD/NEW/', or with `&'.
`G'
`G'
     Apply the following `s' modifier once to each word in the event.
     Apply the following `s' modifier once to each word in the event.


File: gdb.info,  Node: Formatting Documentation,  Next: Installing GDB,  Prev: Using History Interactively,  Up: Top
File: gdb.info,  Node: Formatting Documentation,  Next: Installing GDB,  Prev: Using History Interactively,  Up: Top
Appendix A Formatting Documentation
Appendix A Formatting Documentation
***********************************
***********************************
The GDB 4 release includes an already-formatted reference card, ready
The GDB 4 release includes an already-formatted reference card, ready
for printing with PostScript or Ghostscript, in the `gdb' subdirectory
for printing with PostScript or Ghostscript, in the `gdb' subdirectory
of the main source directory(1).  If you can use PostScript or
of the main source directory(1).  If you can use PostScript or
Ghostscript with your printer, you can print the reference card
Ghostscript with your printer, you can print the reference card
immediately with `refcard.ps'.
immediately with `refcard.ps'.
   The release also includes the source for the reference card.  You
   The release also includes the source for the reference card.  You
can format it, using TeX, by typing:
can format it, using TeX, by typing:
     make refcard.dvi
     make refcard.dvi
   The GDB reference card is designed to print in "landscape" mode on
   The GDB reference card is designed to print in "landscape" mode on
US "letter" size paper; that is, on a sheet 11 inches wide by 8.5 inches
US "letter" size paper; that is, on a sheet 11 inches wide by 8.5 inches
high.  You will need to specify this form of printing as an option to
high.  You will need to specify this form of printing as an option to
your DVI output program.
your DVI output program.
   All the documentation for GDB comes as part of the machine-readable
   All the documentation for GDB comes as part of the machine-readable
distribution.  The documentation is written in Texinfo format, which is
distribution.  The documentation is written in Texinfo format, which is
a documentation system that uses a single source file to produce both
a documentation system that uses a single source file to produce both
on-line information and a printed manual.  You can use one of the Info
on-line information and a printed manual.  You can use one of the Info
formatting commands to create the on-line version of the documentation
formatting commands to create the on-line version of the documentation
and TeX (or `texi2roff') to typeset the printed version.
and TeX (or `texi2roff') to typeset the printed version.
   GDB includes an already formatted copy of the on-line Info version
   GDB includes an already formatted copy of the on-line Info version
of this manual in the `gdb' subdirectory.  The main Info file is
of this manual in the `gdb' subdirectory.  The main Info file is
`gdb-7.1/gdb/gdb.info', and it refers to subordinate files matching
`gdb-7.1/gdb/gdb.info', and it refers to subordinate files matching
`gdb.info*' in the same directory.  If necessary, you can print out
`gdb.info*' in the same directory.  If necessary, you can print out
these files, or read them with any editor; but they are easier to read
these files, or read them with any editor; but they are easier to read
using the `info' subsystem in GNU Emacs or the standalone `info'
using the `info' subsystem in GNU Emacs or the standalone `info'
program, available as part of the GNU Texinfo distribution.
program, available as part of the GNU Texinfo distribution.
   If you want to format these Info files yourself, you need one of the
   If you want to format these Info files yourself, you need one of the
Info formatting programs, such as `texinfo-format-buffer' or `makeinfo'.
Info formatting programs, such as `texinfo-format-buffer' or `makeinfo'.
   If you have `makeinfo' installed, and are in the top level GDB
   If you have `makeinfo' installed, and are in the top level GDB
source directory (`gdb-7.1', in the case of version 7.1), you can make
source directory (`gdb-7.1', in the case of version 7.1), you can make
the Info file by typing:
the Info file by typing:
     cd gdb
     cd gdb
     make gdb.info
     make gdb.info
   If you want to typeset and print copies of this manual, you need TeX,
   If you want to typeset and print copies of this manual, you need TeX,
a program to print its DVI output files, and `texinfo.tex', the Texinfo
a program to print its DVI output files, and `texinfo.tex', the Texinfo
definitions file.
definitions file.
   TeX is a typesetting program; it does not print files directly, but
   TeX is a typesetting program; it does not print files directly, but
produces output files called DVI files.  To print a typeset document,
produces output files called DVI files.  To print a typeset document,
you need a program to print DVI files.  If your system has TeX
you need a program to print DVI files.  If your system has TeX
installed, chances are it has such a program.  The precise command to
installed, chances are it has such a program.  The precise command to
use depends on your system; `lpr -d' is common; another (for PostScript
use depends on your system; `lpr -d' is common; another (for PostScript
devices) is `dvips'.  The DVI print command may require a file name
devices) is `dvips'.  The DVI print command may require a file name
without any extension or a `.dvi' extension.
without any extension or a `.dvi' extension.
   TeX also requires a macro definitions file called `texinfo.tex'.
   TeX also requires a macro definitions file called `texinfo.tex'.
This file tells TeX how to typeset a document written in Texinfo
This file tells TeX how to typeset a document written in Texinfo
format.  On its own, TeX cannot either read or typeset a Texinfo file.
format.  On its own, TeX cannot either read or typeset a Texinfo file.
`texinfo.tex' is distributed with GDB and is located in the
`texinfo.tex' is distributed with GDB and is located in the
`gdb-VERSION-NUMBER/texinfo' directory.
`gdb-VERSION-NUMBER/texinfo' directory.
   If you have TeX and a DVI printer program installed, you can typeset
   If you have TeX and a DVI printer program installed, you can typeset
and print this manual.  First switch to the `gdb' subdirectory of the
and print this manual.  First switch to the `gdb' subdirectory of the
main source directory (for example, to `gdb-7.1/gdb') and type:
main source directory (for example, to `gdb-7.1/gdb') and type:
     make gdb.dvi
     make gdb.dvi
   Then give `gdb.dvi' to your DVI printing program.
   Then give `gdb.dvi' to your DVI printing program.
   ---------- Footnotes ----------
   ---------- Footnotes ----------
   (1) In `gdb-7.1/gdb/refcard.ps' of the version 7.1 release.
   (1) In `gdb-7.1/gdb/refcard.ps' of the version 7.1 release.


File: gdb.info,  Node: Installing GDB,  Next: Maintenance Commands,  Prev: Formatting Documentation,  Up: Top
File: gdb.info,  Node: Installing GDB,  Next: Maintenance Commands,  Prev: Formatting Documentation,  Up: Top
Appendix B Installing GDB
Appendix B Installing GDB
*************************
*************************
* Menu:
* Menu:
* Requirements::                Requirements for building GDB
* Requirements::                Requirements for building GDB
* Running Configure::           Invoking the GDB `configure' script
* Running Configure::           Invoking the GDB `configure' script
* Separate Objdir::             Compiling GDB in another directory
* Separate Objdir::             Compiling GDB in another directory
* Config Names::                Specifying names for hosts and targets
* Config Names::                Specifying names for hosts and targets
* Configure Options::           Summary of options for configure
* Configure Options::           Summary of options for configure
* System-wide configuration::   Having a system-wide init file
* System-wide configuration::   Having a system-wide init file


File: gdb.info,  Node: Requirements,  Next: Running Configure,  Up: Installing GDB
File: gdb.info,  Node: Requirements,  Next: Running Configure,  Up: Installing GDB
B.1 Requirements for Building GDB
B.1 Requirements for Building GDB
=================================
=================================
Building GDB requires various tools and packages to be available.
Building GDB requires various tools and packages to be available.
Other packages will be used only if they are found.
Other packages will be used only if they are found.
Tools/Packages Necessary for Building GDB
Tools/Packages Necessary for Building GDB
=========================================
=========================================
ISO C90 compiler
ISO C90 compiler
     GDB is written in ISO C90.  It should be buildable with any
     GDB is written in ISO C90.  It should be buildable with any
     working C90 compiler, e.g. GCC.
     working C90 compiler, e.g. GCC.
Tools/Packages Optional for Building GDB
Tools/Packages Optional for Building GDB
========================================
========================================
Expat
Expat
     GDB can use the Expat XML parsing library.  This library may be
     GDB can use the Expat XML parsing library.  This library may be
     included with your operating system distribution; if it is not, you
     included with your operating system distribution; if it is not, you
     can get the latest version from `http://expat.sourceforge.net'.
     can get the latest version from `http://expat.sourceforge.net'.
     The `configure' script will search for this library in several
     The `configure' script will search for this library in several
     standard locations; if it is installed in an unusual path, you can
     standard locations; if it is installed in an unusual path, you can
     use the `--with-libexpat-prefix' option to specify its location.
     use the `--with-libexpat-prefix' option to specify its location.
     Expat is used for:
     Expat is used for:
        * Remote protocol memory maps (*note Memory Map Format::)
        * Remote protocol memory maps (*note Memory Map Format::)
        * Target descriptions (*note Target Descriptions::)
        * Target descriptions (*note Target Descriptions::)
        * Remote shared library lists (*note Library List Format::)
        * Remote shared library lists (*note Library List Format::)
        * MS-Windows shared libraries (*note Shared Libraries::)
        * MS-Windows shared libraries (*note Shared Libraries::)
zlib
zlib
     GDB will use the `zlib' library, if available, to read compressed
     GDB will use the `zlib' library, if available, to read compressed
     debug sections.  Some linkers, such as GNU gold, are capable of
     debug sections.  Some linkers, such as GNU gold, are capable of
     producing binaries with compressed debug sections.  If GDB is
     producing binaries with compressed debug sections.  If GDB is
     compiled with `zlib', it will be able to read the debug
     compiled with `zlib', it will be able to read the debug
     information in such binaries.
     information in such binaries.
     The `zlib' library is likely included with your operating system
     The `zlib' library is likely included with your operating system
     distribution; if it is not, you can get the latest version from
     distribution; if it is not, you can get the latest version from
     `http://zlib.net'.
     `http://zlib.net'.
iconv
iconv
     GDB's features related to character sets (*note Character Sets::)
     GDB's features related to character sets (*note Character Sets::)
     require a functioning `iconv' implementation.  If you are on a GNU
     require a functioning `iconv' implementation.  If you are on a GNU
     system, then this is provided by the GNU C Library.  Some other
     system, then this is provided by the GNU C Library.  Some other
     systems also provide a working `iconv'.
     systems also provide a working `iconv'.
     On systems with `iconv', you can install GNU Libiconv.  If you
     On systems with `iconv', you can install GNU Libiconv.  If you
     have previously installed Libiconv, you can use the
     have previously installed Libiconv, you can use the
     `--with-libiconv-prefix' option to configure.
     `--with-libiconv-prefix' option to configure.
     GDB's top-level `configure' and `Makefile' will arrange to build
     GDB's top-level `configure' and `Makefile' will arrange to build
     Libiconv if a directory named `libiconv' appears in the top-most
     Libiconv if a directory named `libiconv' appears in the top-most
     source directory.  If Libiconv is built this way, and if the
     source directory.  If Libiconv is built this way, and if the
     operating system does not provide a suitable `iconv'
     operating system does not provide a suitable `iconv'
     implementation, then the just-built library will automatically be
     implementation, then the just-built library will automatically be
     used by GDB.  One easy way to set this up is to download GNU
     used by GDB.  One easy way to set this up is to download GNU
     Libiconv, unpack it, and then rename the directory holding the
     Libiconv, unpack it, and then rename the directory holding the
     Libiconv source code to `libiconv'.
     Libiconv source code to `libiconv'.


File: gdb.info,  Node: Running Configure,  Next: Separate Objdir,  Prev: Requirements,  Up: Installing GDB
File: gdb.info,  Node: Running Configure,  Next: Separate Objdir,  Prev: Requirements,  Up: Installing GDB
B.2 Invoking the GDB `configure' Script
B.2 Invoking the GDB `configure' Script
=======================================
=======================================
GDB comes with a `configure' script that automates the process of
GDB comes with a `configure' script that automates the process of
preparing GDB for installation; you can then use `make' to build the
preparing GDB for installation; you can then use `make' to build the
`gdb' program.
`gdb' program.
   The GDB distribution includes all the source code you need for GDB
   The GDB distribution includes all the source code you need for GDB
in a single directory, whose name is usually composed by appending the
in a single directory, whose name is usually composed by appending the
version number to `gdb'.
version number to `gdb'.
   For example, the GDB version 7.1 distribution is in the `gdb-7.1'
   For example, the GDB version 7.1 distribution is in the `gdb-7.1'
directory.  That directory contains:
directory.  That directory contains:
`gdb-7.1/configure (and supporting files)'
`gdb-7.1/configure (and supporting files)'
     script for configuring GDB and all its supporting libraries
     script for configuring GDB and all its supporting libraries
`gdb-7.1/gdb'
`gdb-7.1/gdb'
     the source specific to GDB itself
     the source specific to GDB itself
`gdb-7.1/bfd'
`gdb-7.1/bfd'
     source for the Binary File Descriptor library
     source for the Binary File Descriptor library
`gdb-7.1/include'
`gdb-7.1/include'
     GNU include files
     GNU include files
`gdb-7.1/libiberty'
`gdb-7.1/libiberty'
     source for the `-liberty' free software library
     source for the `-liberty' free software library
`gdb-7.1/opcodes'
`gdb-7.1/opcodes'
     source for the library of opcode tables and disassemblers
     source for the library of opcode tables and disassemblers
`gdb-7.1/readline'
`gdb-7.1/readline'
     source for the GNU command-line interface
     source for the GNU command-line interface
`gdb-7.1/glob'
`gdb-7.1/glob'
     source for the GNU filename pattern-matching subroutine
     source for the GNU filename pattern-matching subroutine
`gdb-7.1/mmalloc'
`gdb-7.1/mmalloc'
     source for the GNU memory-mapped malloc package
     source for the GNU memory-mapped malloc package
   The simplest way to configure and build GDB is to run `configure'
   The simplest way to configure and build GDB is to run `configure'
from the `gdb-VERSION-NUMBER' source directory, which in this example
from the `gdb-VERSION-NUMBER' source directory, which in this example
is the `gdb-7.1' directory.
is the `gdb-7.1' directory.
   First switch to the `gdb-VERSION-NUMBER' source directory if you are
   First switch to the `gdb-VERSION-NUMBER' source directory if you are
not already in it; then run `configure'.  Pass the identifier for the
not already in it; then run `configure'.  Pass the identifier for the
platform on which GDB will run as an argument.
platform on which GDB will run as an argument.
   For example:
   For example:
     cd gdb-7.1
     cd gdb-7.1
     ./configure HOST
     ./configure HOST
     make
     make
where HOST is an identifier such as `sun4' or `decstation', that
where HOST is an identifier such as `sun4' or `decstation', that
identifies the platform where GDB will run.  (You can often leave off
identifies the platform where GDB will run.  (You can often leave off
HOST; `configure' tries to guess the correct value by examining your
HOST; `configure' tries to guess the correct value by examining your
system.)
system.)
   Running `configure HOST' and then running `make' builds the `bfd',
   Running `configure HOST' and then running `make' builds the `bfd',
`readline', `mmalloc', and `libiberty' libraries, then `gdb' itself.
`readline', `mmalloc', and `libiberty' libraries, then `gdb' itself.
The configured source files, and the binaries, are left in the
The configured source files, and the binaries, are left in the
corresponding source directories.
corresponding source directories.
   `configure' is a Bourne-shell (`/bin/sh') script; if your system
   `configure' is a Bourne-shell (`/bin/sh') script; if your system
does not recognize this automatically when you run a different shell,
does not recognize this automatically when you run a different shell,
you may need to run `sh' on it explicitly:
you may need to run `sh' on it explicitly:
     sh configure HOST
     sh configure HOST
   If you run `configure' from a directory that contains source
   If you run `configure' from a directory that contains source
directories for multiple libraries or programs, such as the `gdb-7.1'
directories for multiple libraries or programs, such as the `gdb-7.1'
source directory for version 7.1, `configure' creates configuration
source directory for version 7.1, `configure' creates configuration
files for every directory level underneath (unless you tell it not to,
files for every directory level underneath (unless you tell it not to,
with the `--norecursion' option).
with the `--norecursion' option).
   You should run the `configure' script from the top directory in the
   You should run the `configure' script from the top directory in the
source tree, the `gdb-VERSION-NUMBER' directory.  If you run
source tree, the `gdb-VERSION-NUMBER' directory.  If you run
`configure' from one of the subdirectories, you will configure only
`configure' from one of the subdirectories, you will configure only
that subdirectory.  That is usually not what you want.  In particular,
that subdirectory.  That is usually not what you want.  In particular,
if you run the first `configure' from the `gdb' subdirectory of the
if you run the first `configure' from the `gdb' subdirectory of the
`gdb-VERSION-NUMBER' directory, you will omit the configuration of
`gdb-VERSION-NUMBER' directory, you will omit the configuration of
`bfd', `readline', and other sibling directories of the `gdb'
`bfd', `readline', and other sibling directories of the `gdb'
subdirectory.  This leads to build errors about missing include files
subdirectory.  This leads to build errors about missing include files
such as `bfd/bfd.h'.
such as `bfd/bfd.h'.
   You can install `gdb' anywhere; it has no hardwired paths.  However,
   You can install `gdb' anywhere; it has no hardwired paths.  However,
you should make sure that the shell on your path (named by the `SHELL'
you should make sure that the shell on your path (named by the `SHELL'
environment variable) is publicly readable.  Remember that GDB uses the
environment variable) is publicly readable.  Remember that GDB uses the
shell to start your program--some systems refuse to let GDB debug child
shell to start your program--some systems refuse to let GDB debug child
processes whose programs are not readable.
processes whose programs are not readable.


File: gdb.info,  Node: Separate Objdir,  Next: Config Names,  Prev: Running Configure,  Up: Installing GDB
File: gdb.info,  Node: Separate Objdir,  Next: Config Names,  Prev: Running Configure,  Up: Installing GDB
B.3 Compiling GDB in Another Directory
B.3 Compiling GDB in Another Directory
======================================
======================================
If you want to run GDB versions for several host or target machines,
If you want to run GDB versions for several host or target machines,
you need a different `gdb' compiled for each combination of host and
you need a different `gdb' compiled for each combination of host and
target.  `configure' is designed to make this easy by allowing you to
target.  `configure' is designed to make this easy by allowing you to
generate each configuration in a separate subdirectory, rather than in
generate each configuration in a separate subdirectory, rather than in
the source directory.  If your `make' program handles the `VPATH'
the source directory.  If your `make' program handles the `VPATH'
feature (GNU `make' does), running `make' in each of these directories
feature (GNU `make' does), running `make' in each of these directories
builds the `gdb' program specified there.
builds the `gdb' program specified there.
   To build `gdb' in a separate directory, run `configure' with the
   To build `gdb' in a separate directory, run `configure' with the
`--srcdir' option to specify where to find the source.  (You also need
`--srcdir' option to specify where to find the source.  (You also need
to specify a path to find `configure' itself from your working
to specify a path to find `configure' itself from your working
directory.  If the path to `configure' would be the same as the
directory.  If the path to `configure' would be the same as the
argument to `--srcdir', you can leave out the `--srcdir' option; it is
argument to `--srcdir', you can leave out the `--srcdir' option; it is
assumed.)
assumed.)
   For example, with version 7.1, you can build GDB in a separate
   For example, with version 7.1, you can build GDB in a separate
directory for a Sun 4 like this:
directory for a Sun 4 like this:
     cd gdb-7.1
     cd gdb-7.1
     mkdir ../gdb-sun4
     mkdir ../gdb-sun4
     cd ../gdb-sun4
     cd ../gdb-sun4
     ../gdb-7.1/configure sun4
     ../gdb-7.1/configure sun4
     make
     make
   When `configure' builds a configuration using a remote source
   When `configure' builds a configuration using a remote source
directory, it creates a tree for the binaries with the same structure
directory, it creates a tree for the binaries with the same structure
(and using the same names) as the tree under the source directory.  In
(and using the same names) as the tree under the source directory.  In
the example, you'd find the Sun 4 library `libiberty.a' in the
the example, you'd find the Sun 4 library `libiberty.a' in the
directory `gdb-sun4/libiberty', and GDB itself in `gdb-sun4/gdb'.
directory `gdb-sun4/libiberty', and GDB itself in `gdb-sun4/gdb'.
   Make sure that your path to the `configure' script has just one
   Make sure that your path to the `configure' script has just one
instance of `gdb' in it.  If your path to `configure' looks like
instance of `gdb' in it.  If your path to `configure' looks like
`../gdb-7.1/gdb/configure', you are configuring only one subdirectory
`../gdb-7.1/gdb/configure', you are configuring only one subdirectory
of GDB, not the whole package.  This leads to build errors about
of GDB, not the whole package.  This leads to build errors about
missing include files such as `bfd/bfd.h'.
missing include files such as `bfd/bfd.h'.
   One popular reason to build several GDB configurations in separate
   One popular reason to build several GDB configurations in separate
directories is to configure GDB for cross-compiling (where GDB runs on
directories is to configure GDB for cross-compiling (where GDB runs on
one machine--the "host"--while debugging programs that run on another
one machine--the "host"--while debugging programs that run on another
machine--the "target").  You specify a cross-debugging target by giving
machine--the "target").  You specify a cross-debugging target by giving
the `--target=TARGET' option to `configure'.
the `--target=TARGET' option to `configure'.
   When you run `make' to build a program or library, you must run it
   When you run `make' to build a program or library, you must run it
in a configured directory--whatever directory you were in when you
in a configured directory--whatever directory you were in when you
called `configure' (or one of its subdirectories).
called `configure' (or one of its subdirectories).
   The `Makefile' that `configure' generates in each source directory
   The `Makefile' that `configure' generates in each source directory
also runs recursively.  If you type `make' in a source directory such
also runs recursively.  If you type `make' in a source directory such
as `gdb-7.1' (or in a separate configured directory configured with
as `gdb-7.1' (or in a separate configured directory configured with
`--srcdir=DIRNAME/gdb-7.1'), you will build all the required libraries,
`--srcdir=DIRNAME/gdb-7.1'), you will build all the required libraries,
and then build GDB.
and then build GDB.
   When you have multiple hosts or targets configured in separate
   When you have multiple hosts or targets configured in separate
directories, you can run `make' on them in parallel (for example, if
directories, you can run `make' on them in parallel (for example, if
they are NFS-mounted on each of the hosts); they will not interfere
they are NFS-mounted on each of the hosts); they will not interfere
with each other.
with each other.


File: gdb.info,  Node: Config Names,  Next: Configure Options,  Prev: Separate Objdir,  Up: Installing GDB
File: gdb.info,  Node: Config Names,  Next: Configure Options,  Prev: Separate Objdir,  Up: Installing GDB
B.4 Specifying Names for Hosts and Targets
B.4 Specifying Names for Hosts and Targets
==========================================
==========================================
The specifications used for hosts and targets in the `configure' script
The specifications used for hosts and targets in the `configure' script
are based on a three-part naming scheme, but some short predefined
are based on a three-part naming scheme, but some short predefined
aliases are also supported.  The full naming scheme encodes three pieces
aliases are also supported.  The full naming scheme encodes three pieces
of information in the following pattern:
of information in the following pattern:
     ARCHITECTURE-VENDOR-OS
     ARCHITECTURE-VENDOR-OS
   For example, you can use the alias `sun4' as a HOST argument, or as
   For example, you can use the alias `sun4' as a HOST argument, or as
the value for TARGET in a `--target=TARGET' option.  The equivalent
the value for TARGET in a `--target=TARGET' option.  The equivalent
full name is `sparc-sun-sunos4'.
full name is `sparc-sun-sunos4'.
   The `configure' script accompanying GDB does not provide any query
   The `configure' script accompanying GDB does not provide any query
facility to list all supported host and target names or aliases.
facility to list all supported host and target names or aliases.
`configure' calls the Bourne shell script `config.sub' to map
`configure' calls the Bourne shell script `config.sub' to map
abbreviations to full names; you can read the script, if you wish, or
abbreviations to full names; you can read the script, if you wish, or
you can use it to test your guesses on abbreviations--for example:
you can use it to test your guesses on abbreviations--for example:
     % sh config.sub i386-linux
     % sh config.sub i386-linux
     i386-pc-linux-gnu
     i386-pc-linux-gnu
     % sh config.sub alpha-linux
     % sh config.sub alpha-linux
     alpha-unknown-linux-gnu
     alpha-unknown-linux-gnu
     % sh config.sub hp9k700
     % sh config.sub hp9k700
     hppa1.1-hp-hpux
     hppa1.1-hp-hpux
     % sh config.sub sun4
     % sh config.sub sun4
     sparc-sun-sunos4.1.1
     sparc-sun-sunos4.1.1
     % sh config.sub sun3
     % sh config.sub sun3
     m68k-sun-sunos4.1.1
     m68k-sun-sunos4.1.1
     % sh config.sub i986v
     % sh config.sub i986v
     Invalid configuration `i986v': machine `i986v' not recognized
     Invalid configuration `i986v': machine `i986v' not recognized
`config.sub' is also distributed in the GDB source directory
`config.sub' is also distributed in the GDB source directory
(`gdb-7.1', for version 7.1).
(`gdb-7.1', for version 7.1).


File: gdb.info,  Node: Configure Options,  Next: System-wide configuration,  Prev: Config Names,  Up: Installing GDB
File: gdb.info,  Node: Configure Options,  Next: System-wide configuration,  Prev: Config Names,  Up: Installing GDB
B.5 `configure' Options
B.5 `configure' Options
=======================
=======================
Here is a summary of the `configure' options and arguments that are
Here is a summary of the `configure' options and arguments that are
most often useful for building GDB.  `configure' also has several other
most often useful for building GDB.  `configure' also has several other
options not listed here.  *note (configure.info)What Configure Does::,
options not listed here.  *note (configure.info)What Configure Does::,
for a full explanation of `configure'.
for a full explanation of `configure'.
     configure [--help]
     configure [--help]
               [--prefix=DIR]
               [--prefix=DIR]
               [--exec-prefix=DIR]
               [--exec-prefix=DIR]
               [--srcdir=DIRNAME]
               [--srcdir=DIRNAME]
               [--norecursion] [--rm]
               [--norecursion] [--rm]
               [--target=TARGET]
               [--target=TARGET]
               HOST
               HOST
You may introduce options with a single `-' rather than `--' if you
You may introduce options with a single `-' rather than `--' if you
prefer; but you may abbreviate option names if you use `--'.
prefer; but you may abbreviate option names if you use `--'.
`--help'
`--help'
     Display a quick summary of how to invoke `configure'.
     Display a quick summary of how to invoke `configure'.
`--prefix=DIR'
`--prefix=DIR'
     Configure the source to install programs and files under directory
     Configure the source to install programs and files under directory
     `DIR'.
     `DIR'.
`--exec-prefix=DIR'
`--exec-prefix=DIR'
     Configure the source to install programs under directory `DIR'.
     Configure the source to install programs under directory `DIR'.
`--srcdir=DIRNAME'
`--srcdir=DIRNAME'
     *Warning: using this option requires GNU `make', or another `make'
     *Warning: using this option requires GNU `make', or another `make'
     that implements the `VPATH' feature.*
     that implements the `VPATH' feature.*
     Use this option to make configurations in directories separate
     Use this option to make configurations in directories separate
     from the GDB source directories.  Among other things, you can use
     from the GDB source directories.  Among other things, you can use
     this to build (or maintain) several configurations simultaneously,
     this to build (or maintain) several configurations simultaneously,
     in separate directories.  `configure' writes
     in separate directories.  `configure' writes
     configuration-specific files in the current directory, but
     configuration-specific files in the current directory, but
     arranges for them to use the source in the directory DIRNAME.
     arranges for them to use the source in the directory DIRNAME.
     `configure' creates directories under the working directory in
     `configure' creates directories under the working directory in
     parallel to the source directories below DIRNAME.
     parallel to the source directories below DIRNAME.
`--norecursion'
`--norecursion'
     Configure only the directory level where `configure' is executed;
     Configure only the directory level where `configure' is executed;
     do not propagate configuration to subdirectories.
     do not propagate configuration to subdirectories.
`--target=TARGET'
`--target=TARGET'
     Configure GDB for cross-debugging programs running on the specified
     Configure GDB for cross-debugging programs running on the specified
     TARGET.  Without this option, GDB is configured to debug programs
     TARGET.  Without this option, GDB is configured to debug programs
     that run on the same machine (HOST) as GDB itself.
     that run on the same machine (HOST) as GDB itself.
     There is no convenient way to generate a list of all available
     There is no convenient way to generate a list of all available
     targets.
     targets.
`HOST ...'
`HOST ...'
     Configure GDB to run on the specified HOST.
     Configure GDB to run on the specified HOST.
     There is no convenient way to generate a list of all available
     There is no convenient way to generate a list of all available
     hosts.
     hosts.
   There are many other options available as well, but they are
   There are many other options available as well, but they are
generally needed for special purposes only.
generally needed for special purposes only.


File: gdb.info,  Node: System-wide configuration,  Prev: Configure Options,  Up: Installing GDB
File: gdb.info,  Node: System-wide configuration,  Prev: Configure Options,  Up: Installing GDB
B.6 System-wide configuration and settings
B.6 System-wide configuration and settings
==========================================
==========================================
GDB can be configured to have a system-wide init file; this file will
GDB can be configured to have a system-wide init file; this file will
be read and executed at startup (*note What GDB does during startup:
be read and executed at startup (*note What GDB does during startup:
Startup.).
Startup.).
   Here is the corresponding configure option:
   Here is the corresponding configure option:
`--with-system-gdbinit=FILE'
`--with-system-gdbinit=FILE'
     Specify that the default location of the system-wide init file is
     Specify that the default location of the system-wide init file is
     FILE.
     FILE.
   If GDB has been configured with the option `--prefix=$prefix', it
   If GDB has been configured with the option `--prefix=$prefix', it
may be subject to relocation.  Two possible cases:
may be subject to relocation.  Two possible cases:
   * If the default location of this init file contains `$prefix', it
   * If the default location of this init file contains `$prefix', it
     will be subject to relocation.  Suppose that the configure options
     will be subject to relocation.  Suppose that the configure options
     are `--prefix=$prefix --with-system-gdbinit=$prefix/etc/gdbinit';
     are `--prefix=$prefix --with-system-gdbinit=$prefix/etc/gdbinit';
     if GDB is moved from `$prefix' to `$install', the system init file
     if GDB is moved from `$prefix' to `$install', the system init file
     is looked for as `$install/etc/gdbinit' instead of
     is looked for as `$install/etc/gdbinit' instead of
     `$prefix/etc/gdbinit'.
     `$prefix/etc/gdbinit'.
   * By contrast, if the default location does not contain the prefix,
   * By contrast, if the default location does not contain the prefix,
     it will not be relocated.  E.g. if GDB has been configured with
     it will not be relocated.  E.g. if GDB has been configured with
     `--prefix=/usr/local --with-system-gdbinit=/usr/share/gdb/gdbinit',
     `--prefix=/usr/local --with-system-gdbinit=/usr/share/gdb/gdbinit',
     then GDB will always look for `/usr/share/gdb/gdbinit', wherever
     then GDB will always look for `/usr/share/gdb/gdbinit', wherever
     GDB is installed.
     GDB is installed.


File: gdb.info,  Node: Maintenance Commands,  Next: Remote Protocol,  Prev: Installing GDB,  Up: Top
File: gdb.info,  Node: Maintenance Commands,  Next: Remote Protocol,  Prev: Installing GDB,  Up: Top
Appendix C Maintenance Commands
Appendix C Maintenance Commands
*******************************
*******************************
In addition to commands intended for GDB users, GDB includes a number
In addition to commands intended for GDB users, GDB includes a number
of commands intended for GDB developers, that are not documented
of commands intended for GDB developers, that are not documented
elsewhere in this manual.  These commands are provided here for
elsewhere in this manual.  These commands are provided here for
reference.  (For commands that turn on debugging messages, see *Note
reference.  (For commands that turn on debugging messages, see *Note
Debugging Output::.)
Debugging Output::.)
`maint agent EXPRESSION'
`maint agent EXPRESSION'
`maint agent-eval EXPRESSION'
`maint agent-eval EXPRESSION'
     Translate the given EXPRESSION into remote agent bytecodes.  This
     Translate the given EXPRESSION into remote agent bytecodes.  This
     command is useful for debugging the Agent Expression mechanism
     command is useful for debugging the Agent Expression mechanism
     (*note Agent Expressions::).  The `agent' version produces an
     (*note Agent Expressions::).  The `agent' version produces an
     expression useful for data collection, such as by tracepoints,
     expression useful for data collection, such as by tracepoints,
     while `maint agent-eval' produces an expression that evaluates
     while `maint agent-eval' produces an expression that evaluates
     directly to a result.  For instance, a collection expression for
     directly to a result.  For instance, a collection expression for
     `globa + globb' will include bytecodes to record four bytes of
     `globa + globb' will include bytecodes to record four bytes of
     memory at each of the addresses of `globa' and `globb', while
     memory at each of the addresses of `globa' and `globb', while
     discarding the result of the addition, while an evaluation
     discarding the result of the addition, while an evaluation
     expression will do the addition and return the sum.
     expression will do the addition and return the sum.
`maint info breakpoints'
`maint info breakpoints'
     Using the same format as `info breakpoints', display both the
     Using the same format as `info breakpoints', display both the
     breakpoints you've set explicitly, and those GDB is using for
     breakpoints you've set explicitly, and those GDB is using for
     internal purposes.  Internal breakpoints are shown with negative
     internal purposes.  Internal breakpoints are shown with negative
     breakpoint numbers.  The type column identifies what kind of
     breakpoint numbers.  The type column identifies what kind of
     breakpoint is shown:
     breakpoint is shown:
    `breakpoint'
    `breakpoint'
          Normal, explicitly set breakpoint.
          Normal, explicitly set breakpoint.
    `watchpoint'
    `watchpoint'
          Normal, explicitly set watchpoint.
          Normal, explicitly set watchpoint.
    `longjmp'
    `longjmp'
          Internal breakpoint, used to handle correctly stepping through
          Internal breakpoint, used to handle correctly stepping through
          `longjmp' calls.
          `longjmp' calls.
    `longjmp resume'
    `longjmp resume'
          Internal breakpoint at the target of a `longjmp'.
          Internal breakpoint at the target of a `longjmp'.
    `until'
    `until'
          Temporary internal breakpoint used by the GDB `until' command.
          Temporary internal breakpoint used by the GDB `until' command.
    `finish'
    `finish'
          Temporary internal breakpoint used by the GDB `finish'
          Temporary internal breakpoint used by the GDB `finish'
          command.
          command.
    `shlib events'
    `shlib events'
          Shared library events.
          Shared library events.
`set displaced-stepping'
`set displaced-stepping'
`show displaced-stepping'
`show displaced-stepping'
     Control whether or not GDB will do "displaced stepping" if the
     Control whether or not GDB will do "displaced stepping" if the
     target supports it.  Displaced stepping is a way to single-step
     target supports it.  Displaced stepping is a way to single-step
     over breakpoints without removing them from the inferior, by
     over breakpoints without removing them from the inferior, by
     executing an out-of-line copy of the instruction that was
     executing an out-of-line copy of the instruction that was
     originally at the breakpoint location.  It is also known as
     originally at the breakpoint location.  It is also known as
     out-of-line single-stepping.
     out-of-line single-stepping.
    `set displaced-stepping on'
    `set displaced-stepping on'
          If the target architecture supports it, GDB will use
          If the target architecture supports it, GDB will use
          displaced stepping to step over breakpoints.
          displaced stepping to step over breakpoints.
    `set displaced-stepping off'
    `set displaced-stepping off'
          GDB will not use displaced stepping to step over breakpoints,
          GDB will not use displaced stepping to step over breakpoints,
          even if such is supported by the target architecture.
          even if such is supported by the target architecture.
    `set displaced-stepping auto'
    `set displaced-stepping auto'
          This is the default mode.  GDB will use displaced stepping
          This is the default mode.  GDB will use displaced stepping
          only if non-stop mode is active (*note Non-Stop Mode::) and
          only if non-stop mode is active (*note Non-Stop Mode::) and
          the target architecture supports displaced stepping.
          the target architecture supports displaced stepping.
`maint check-symtabs'
`maint check-symtabs'
     Check the consistency of psymtabs and symtabs.
     Check the consistency of psymtabs and symtabs.
`maint cplus first_component NAME'
`maint cplus first_component NAME'
     Print the first C++ class/namespace component of NAME.
     Print the first C++ class/namespace component of NAME.
`maint cplus namespace'
`maint cplus namespace'
     Print the list of possible C++ namespaces.
     Print the list of possible C++ namespaces.
`maint demangle NAME'
`maint demangle NAME'
     Demangle a C++ or Objective-C mangled NAME.
     Demangle a C++ or Objective-C mangled NAME.
`maint deprecate COMMAND [REPLACEMENT]'
`maint deprecate COMMAND [REPLACEMENT]'
`maint undeprecate COMMAND'
`maint undeprecate COMMAND'
     Deprecate or undeprecate the named COMMAND.  Deprecated commands
     Deprecate or undeprecate the named COMMAND.  Deprecated commands
     cause GDB to issue a warning when you use them.  The optional
     cause GDB to issue a warning when you use them.  The optional
     argument REPLACEMENT says which newer command should be used in
     argument REPLACEMENT says which newer command should be used in
     favor of the deprecated one; if it is given, GDB will mention the
     favor of the deprecated one; if it is given, GDB will mention the
     replacement as part of the warning.
     replacement as part of the warning.
`maint dump-me'
`maint dump-me'
     Cause a fatal signal in the debugger and force it to dump its core.
     Cause a fatal signal in the debugger and force it to dump its core.
     This is supported only on systems which support aborting a program
     This is supported only on systems which support aborting a program
     with the `SIGQUIT' signal.
     with the `SIGQUIT' signal.
`maint internal-error [MESSAGE-TEXT]'
`maint internal-error [MESSAGE-TEXT]'
`maint internal-warning [MESSAGE-TEXT]'
`maint internal-warning [MESSAGE-TEXT]'
     Cause GDB to call the internal function `internal_error' or
     Cause GDB to call the internal function `internal_error' or
     `internal_warning' and hence behave as though an internal error or
     `internal_warning' and hence behave as though an internal error or
     internal warning has been detected.  In addition to reporting the
     internal warning has been detected.  In addition to reporting the
     internal problem, these functions give the user the opportunity to
     internal problem, these functions give the user the opportunity to
     either quit GDB or create a core file of the current GDB session.
     either quit GDB or create a core file of the current GDB session.
     These commands take an optional parameter MESSAGE-TEXT that is
     These commands take an optional parameter MESSAGE-TEXT that is
     used as the text of the error or warning message.
     used as the text of the error or warning message.
     Here's an example of using `internal-error':
     Here's an example of using `internal-error':
          (gdb) maint internal-error testing, 1, 2
          (gdb) maint internal-error testing, 1, 2
          .../maint.c:121: internal-error: testing, 1, 2
          .../maint.c:121: internal-error: testing, 1, 2
          A problem internal to GDB has been detected.  Further
          A problem internal to GDB has been detected.  Further
          debugging may prove unreliable.
          debugging may prove unreliable.
          Quit this debugging session? (y or n) n
          Quit this debugging session? (y or n) n
          Create a core file? (y or n) n
          Create a core file? (y or n) n
          (gdb)
          (gdb)
`maint set internal-error ACTION [ask|yes|no]'
`maint set internal-error ACTION [ask|yes|no]'
`maint show internal-error ACTION'
`maint show internal-error ACTION'
`maint set internal-warning ACTION [ask|yes|no]'
`maint set internal-warning ACTION [ask|yes|no]'
`maint show internal-warning ACTION'
`maint show internal-warning ACTION'
     When GDB reports an internal problem (error or warning) it gives
     When GDB reports an internal problem (error or warning) it gives
     the user the opportunity to both quit GDB and create a core file
     the user the opportunity to both quit GDB and create a core file
     of the current GDB session.  These commands let you override the
     of the current GDB session.  These commands let you override the
     default behaviour for each particular ACTION, described in the
     default behaviour for each particular ACTION, described in the
     table below.
     table below.
    `quit'
    `quit'
          You can specify that GDB should always (yes) or never (no)
          You can specify that GDB should always (yes) or never (no)
          quit.  The default is to ask the user what to do.
          quit.  The default is to ask the user what to do.
    `corefile'
    `corefile'
          You can specify that GDB should always (yes) or never (no)
          You can specify that GDB should always (yes) or never (no)
          create a core file.  The default is to ask the user what to
          create a core file.  The default is to ask the user what to
          do.
          do.
`maint packet TEXT'
`maint packet TEXT'
     If GDB is talking to an inferior via the serial protocol, then
     If GDB is talking to an inferior via the serial protocol, then
     this command sends the string TEXT to the inferior, and displays
     this command sends the string TEXT to the inferior, and displays
     the response packet.  GDB supplies the initial `$' character, the
     the response packet.  GDB supplies the initial `$' character, the
     terminating `#' character, and the checksum.
     terminating `#' character, and the checksum.
`maint print architecture [FILE]'
`maint print architecture [FILE]'
     Print the entire architecture configuration.  The optional argument
     Print the entire architecture configuration.  The optional argument
     FILE names the file where the output goes.
     FILE names the file where the output goes.
`maint print c-tdesc'
`maint print c-tdesc'
     Print the current target description (*note Target Descriptions::)
     Print the current target description (*note Target Descriptions::)
     as a C source file.  The created source file can be used in GDB
     as a C source file.  The created source file can be used in GDB
     when an XML parser is not available to parse the description.
     when an XML parser is not available to parse the description.
`maint print dummy-frames'
`maint print dummy-frames'
     Prints the contents of GDB's internal dummy-frame stack.
     Prints the contents of GDB's internal dummy-frame stack.
          (gdb) b add
          (gdb) b add
          ...
          ...
          (gdb) print add(2,3)
          (gdb) print add(2,3)
          Breakpoint 2, add (a=2, b=3) at ...
          Breakpoint 2, add (a=2, b=3) at ...
          58      return (a + b);
          58      return (a + b);
          The program being debugged stopped while in a function called from GDB.
          The program being debugged stopped while in a function called from GDB.
          ...
          ...
          (gdb) maint print dummy-frames
          (gdb) maint print dummy-frames
          0x1a57c80: pc=0x01014068 fp=0x0200bddc sp=0x0200bdd6
          0x1a57c80: pc=0x01014068 fp=0x0200bddc sp=0x0200bdd6
           top=0x0200bdd4 id={stack=0x200bddc,code=0x101405c}
           top=0x0200bdd4 id={stack=0x200bddc,code=0x101405c}
           call_lo=0x01014000 call_hi=0x01014001
           call_lo=0x01014000 call_hi=0x01014001
          (gdb)
          (gdb)
     Takes an optional file parameter.
     Takes an optional file parameter.
`maint print registers [FILE]'
`maint print registers [FILE]'
`maint print raw-registers [FILE]'
`maint print raw-registers [FILE]'
`maint print cooked-registers [FILE]'
`maint print cooked-registers [FILE]'
`maint print register-groups [FILE]'
`maint print register-groups [FILE]'
     Print GDB's internal register data structures.
     Print GDB's internal register data structures.
     The command `maint print raw-registers' includes the contents of
     The command `maint print raw-registers' includes the contents of
     the raw register cache; the command `maint print cooked-registers'
     the raw register cache; the command `maint print cooked-registers'
     includes the (cooked) value of all registers; and the command
     includes the (cooked) value of all registers; and the command
     `maint print register-groups' includes the groups that each
     `maint print register-groups' includes the groups that each
     register is a member of.  *Note Registers: (gdbint)Registers.
     register is a member of.  *Note Registers: (gdbint)Registers.
     These commands take an optional parameter, a file name to which to
     These commands take an optional parameter, a file name to which to
     write the information.
     write the information.
`maint print reggroups [FILE]'
`maint print reggroups [FILE]'
     Print GDB's internal register group data structures.  The optional
     Print GDB's internal register group data structures.  The optional
     argument FILE tells to what file to write the information.
     argument FILE tells to what file to write the information.
     The register groups info looks like this:
     The register groups info looks like this:
          (gdb) maint print reggroups
          (gdb) maint print reggroups
           Group      Type
           Group      Type
           general    user
           general    user
           float      user
           float      user
           all        user
           all        user
           vector     user
           vector     user
           system     user
           system     user
           save       internal
           save       internal
           restore    internal
           restore    internal
`flushregs'
`flushregs'
     This command forces GDB to flush its internal register cache.
     This command forces GDB to flush its internal register cache.
`maint print objfiles'
`maint print objfiles'
     Print a dump of all known object files.  For each object file, this
     Print a dump of all known object files.  For each object file, this
     command prints its name, address in memory, and all of its psymtabs
     command prints its name, address in memory, and all of its psymtabs
     and symtabs.
     and symtabs.
`maint print statistics'
`maint print statistics'
     This command prints, for each object file in the program, various
     This command prints, for each object file in the program, various
     data about that object file followed by the byte cache ("bcache")
     data about that object file followed by the byte cache ("bcache")
     statistics for the object file.  The objfile data includes the
     statistics for the object file.  The objfile data includes the
     number of minimal, partial, full, and stabs symbols, the number of
     number of minimal, partial, full, and stabs symbols, the number of
     types defined by the objfile, the number of as yet unexpanded psym
     types defined by the objfile, the number of as yet unexpanded psym
     tables, the number of line tables and string tables, and the
     tables, the number of line tables and string tables, and the
     amount of memory used by the various tables.  The bcache
     amount of memory used by the various tables.  The bcache
     statistics include the counts, sizes, and counts of duplicates of
     statistics include the counts, sizes, and counts of duplicates of
     all and unique objects, max, average, and median entry size, total
     all and unique objects, max, average, and median entry size, total
     memory used and its overhead and savings, and various measures of
     memory used and its overhead and savings, and various measures of
     the hash table size and chain lengths.
     the hash table size and chain lengths.
`maint print target-stack'
`maint print target-stack'
     A "target" is an interface between the debugger and a particular
     A "target" is an interface between the debugger and a particular
     kind of file or process.  Targets can be stacked in "strata", so
     kind of file or process.  Targets can be stacked in "strata", so
     that more than one target can potentially respond to a request.
     that more than one target can potentially respond to a request.
     In particular, memory accesses will walk down the stack of targets
     In particular, memory accesses will walk down the stack of targets
     until they find a target that is interested in handling that
     until they find a target that is interested in handling that
     particular address.
     particular address.
     This command prints a short description of each layer that was
     This command prints a short description of each layer that was
     pushed on the "target stack", starting from the top layer down to
     pushed on the "target stack", starting from the top layer down to
     the bottom one.
     the bottom one.
`maint print type EXPR'
`maint print type EXPR'
     Print the type chain for a type specified by EXPR.  The argument
     Print the type chain for a type specified by EXPR.  The argument
     can be either a type name or a symbol.  If it is a symbol, the
     can be either a type name or a symbol.  If it is a symbol, the
     type of that symbol is described.  The type chain produced by this
     type of that symbol is described.  The type chain produced by this
     command is a recursive definition of the data type as stored in
     command is a recursive definition of the data type as stored in
     GDB's data structures, including its flags and contained types.
     GDB's data structures, including its flags and contained types.
`maint set dwarf2 max-cache-age'
`maint set dwarf2 max-cache-age'
`maint show dwarf2 max-cache-age'
`maint show dwarf2 max-cache-age'
     Control the DWARF 2 compilation unit cache.
     Control the DWARF 2 compilation unit cache.
     In object files with inter-compilation-unit references, such as
     In object files with inter-compilation-unit references, such as
     those produced by the GCC option `-feliminate-dwarf2-dups', the
     those produced by the GCC option `-feliminate-dwarf2-dups', the
     DWARF 2 reader needs to frequently refer to previously read
     DWARF 2 reader needs to frequently refer to previously read
     compilation units.  This setting controls how long a compilation
     compilation units.  This setting controls how long a compilation
     unit will remain in the cache if it is not referenced.  A higher
     unit will remain in the cache if it is not referenced.  A higher
     limit means that cached compilation units will be stored in memory
     limit means that cached compilation units will be stored in memory
     longer, and more total memory will be used.  Setting it to zero
     longer, and more total memory will be used.  Setting it to zero
     disables caching, which will slow down GDB startup, but reduce
     disables caching, which will slow down GDB startup, but reduce
     memory consumption.
     memory consumption.
`maint set profile'
`maint set profile'
`maint show profile'
`maint show profile'
     Control profiling of GDB.
     Control profiling of GDB.
     Profiling will be disabled until you use the `maint set profile'
     Profiling will be disabled until you use the `maint set profile'
     command to enable it.  When you enable profiling, the system will
     command to enable it.  When you enable profiling, the system will
     begin collecting timing and execution count data; when you disable
     begin collecting timing and execution count data; when you disable
     profiling or exit GDB, the results will be written to a log file.
     profiling or exit GDB, the results will be written to a log file.
     Remember that if you use profiling, GDB will overwrite the
     Remember that if you use profiling, GDB will overwrite the
     profiling log file (often called `gmon.out').  If you have a
     profiling log file (often called `gmon.out').  If you have a
     record of important profiling data in a `gmon.out' file, be sure
     record of important profiling data in a `gmon.out' file, be sure
     to move it to a safe location.
     to move it to a safe location.
     Configuring with `--enable-profiling' arranges for GDB to be
     Configuring with `--enable-profiling' arranges for GDB to be
     compiled with the `-pg' compiler option.
     compiled with the `-pg' compiler option.
`maint set show-debug-regs'
`maint set show-debug-regs'
`maint show show-debug-regs'
`maint show show-debug-regs'
     Control whether to show variables that mirror the hardware debug
     Control whether to show variables that mirror the hardware debug
     registers.  Use `ON' to enable, `OFF' to disable.  If enabled, the
     registers.  Use `ON' to enable, `OFF' to disable.  If enabled, the
     debug registers values are shown when GDB inserts or removes a
     debug registers values are shown when GDB inserts or removes a
     hardware breakpoint or watchpoint, and when the inferior triggers
     hardware breakpoint or watchpoint, and when the inferior triggers
     a hardware-assisted breakpoint or watchpoint.
     a hardware-assisted breakpoint or watchpoint.
`maint space'
`maint space'
     Control whether to display memory usage for each command.  If set
     Control whether to display memory usage for each command.  If set
     to a nonzero value, GDB will display how much memory each command
     to a nonzero value, GDB will display how much memory each command
     took, following the command's own output.  This can also be
     took, following the command's own output.  This can also be
     requested by invoking GDB with the `--statistics' command-line
     requested by invoking GDB with the `--statistics' command-line
     switch (*note Mode Options::).
     switch (*note Mode Options::).
`maint time'
`maint time'
     Control whether to display the execution time for each command.  If
     Control whether to display the execution time for each command.  If
     set to a nonzero value, GDB will display how much time it took to
     set to a nonzero value, GDB will display how much time it took to
     execute each command, following the command's own output.  The
     execute each command, following the command's own output.  The
     time is not printed for the commands that run the target, since
     time is not printed for the commands that run the target, since
     there's no mechanism currently to compute how much time was spend
     there's no mechanism currently to compute how much time was spend
     by GDB and how much time was spend by the program been debugged.
     by GDB and how much time was spend by the program been debugged.
     it's not possibly currently This can also be requested by invoking
     it's not possibly currently This can also be requested by invoking
     GDB with the `--statistics' command-line switch (*note Mode
     GDB with the `--statistics' command-line switch (*note Mode
     Options::).
     Options::).
`maint translate-address [SECTION] ADDR'
`maint translate-address [SECTION] ADDR'
     Find the symbol stored at the location specified by the address
     Find the symbol stored at the location specified by the address
     ADDR and an optional section name SECTION.  If found, GDB prints
     ADDR and an optional section name SECTION.  If found, GDB prints
     the name of the closest symbol and an offset from the symbol's
     the name of the closest symbol and an offset from the symbol's
     location to the specified address.  This is similar to the `info
     location to the specified address.  This is similar to the `info
     address' command (*note Symbols::), except that this command also
     address' command (*note Symbols::), except that this command also
     allows to find symbols in other sections.
     allows to find symbols in other sections.
     If section was not specified, the section in which the symbol was
     If section was not specified, the section in which the symbol was
     found is also printed.  For dynamically linked executables, the
     found is also printed.  For dynamically linked executables, the
     name of executable or shared library containing the symbol is
     name of executable or shared library containing the symbol is
     printed as well.
     printed as well.
   The following command is useful for non-interactive invocations of
   The following command is useful for non-interactive invocations of
GDB, such as in the test suite.
GDB, such as in the test suite.
`set watchdog NSEC'
`set watchdog NSEC'
     Set the maximum number of seconds GDB will wait for the target
     Set the maximum number of seconds GDB will wait for the target
     operation to finish.  If this time expires, GDB reports and error
     operation to finish.  If this time expires, GDB reports and error
     and the command is aborted.
     and the command is aborted.
`show watchdog'
`show watchdog'
     Show the current setting of the target wait timeout.
     Show the current setting of the target wait timeout.


File: gdb.info,  Node: Remote Protocol,  Next: Agent Expressions,  Prev: Maintenance Commands,  Up: Top
File: gdb.info,  Node: Remote Protocol,  Next: Agent Expressions,  Prev: Maintenance Commands,  Up: Top
Appendix D GDB Remote Serial Protocol
Appendix D GDB Remote Serial Protocol
*************************************
*************************************
* Menu:
* Menu:
* Overview::
* Overview::
* Packets::
* Packets::
* Stop Reply Packets::
* Stop Reply Packets::
* General Query Packets::
* General Query Packets::
* Architecture-Specific Protocol Details::
* Architecture-Specific Protocol Details::
* Tracepoint Packets::
* Tracepoint Packets::
* Host I/O Packets::
* Host I/O Packets::
* Interrupts::
* Interrupts::
* Notification Packets::
* Notification Packets::
* Remote Non-Stop::
* Remote Non-Stop::
* Packet Acknowledgment::
* Packet Acknowledgment::
* Examples::
* Examples::
* File-I/O Remote Protocol Extension::
* File-I/O Remote Protocol Extension::
* Library List Format::
* Library List Format::
* Memory Map Format::
* Memory Map Format::
* Thread List Format::
* Thread List Format::


File: gdb.info,  Node: Overview,  Next: Packets,  Up: Remote Protocol
File: gdb.info,  Node: Overview,  Next: Packets,  Up: Remote Protocol
D.1 Overview
D.1 Overview
============
============
There may be occasions when you need to know something about the
There may be occasions when you need to know something about the
protocol--for example, if there is only one serial port to your target
protocol--for example, if there is only one serial port to your target
machine, you might want your program to do something special if it
machine, you might want your program to do something special if it
recognizes a packet meant for GDB.
recognizes a packet meant for GDB.
   In the examples below, `->' and `<-' are used to indicate
   In the examples below, `->' and `<-' are used to indicate
transmitted and received data, respectively.
transmitted and received data, respectively.
   All GDB commands and responses (other than acknowledgments and
   All GDB commands and responses (other than acknowledgments and
notifications, see *Note Notification Packets::) are sent as a PACKET.
notifications, see *Note Notification Packets::) are sent as a PACKET.
A PACKET is introduced with the character `$', the actual PACKET-DATA,
A PACKET is introduced with the character `$', the actual PACKET-DATA,
and the terminating character `#' followed by a two-digit CHECKSUM:
and the terminating character `#' followed by a two-digit CHECKSUM:
     `$'PACKET-DATA`#'CHECKSUM
     `$'PACKET-DATA`#'CHECKSUM
   The two-digit CHECKSUM is computed as the modulo 256 sum of all
   The two-digit CHECKSUM is computed as the modulo 256 sum of all
characters between the leading `$' and the trailing `#' (an eight bit
characters between the leading `$' and the trailing `#' (an eight bit
unsigned checksum).
unsigned checksum).
   Implementors should note that prior to GDB 5.0 the protocol
   Implementors should note that prior to GDB 5.0 the protocol
specification also included an optional two-digit SEQUENCE-ID:
specification also included an optional two-digit SEQUENCE-ID:
     `$'SEQUENCE-ID`:'PACKET-DATA`#'CHECKSUM
     `$'SEQUENCE-ID`:'PACKET-DATA`#'CHECKSUM
That SEQUENCE-ID was appended to the acknowledgment.  GDB has never
That SEQUENCE-ID was appended to the acknowledgment.  GDB has never
output SEQUENCE-IDs.  Stubs that handle packets added since GDB 5.0
output SEQUENCE-IDs.  Stubs that handle packets added since GDB 5.0
must not accept SEQUENCE-ID.
must not accept SEQUENCE-ID.
   When either the host or the target machine receives a packet, the
   When either the host or the target machine receives a packet, the
first response expected is an acknowledgment: either `+' (to indicate
first response expected is an acknowledgment: either `+' (to indicate
the package was received correctly) or `-' (to request retransmission):
the package was received correctly) or `-' (to request retransmission):
     -> `$'PACKET-DATA`#'CHECKSUM
     -> `$'PACKET-DATA`#'CHECKSUM
     <- `+'
     <- `+'
   The `+'/`-' acknowledgments can be disabled once a connection is
   The `+'/`-' acknowledgments can be disabled once a connection is
established.  *Note Packet Acknowledgment::, for details.
established.  *Note Packet Acknowledgment::, for details.
   The host (GDB) sends COMMANDs, and the target (the debugging stub
   The host (GDB) sends COMMANDs, and the target (the debugging stub
incorporated in your program) sends a RESPONSE.  In the case of step
incorporated in your program) sends a RESPONSE.  In the case of step
and continue COMMANDs, the response is only sent when the operation has
and continue COMMANDs, the response is only sent when the operation has
completed, and the target has again stopped all threads in all attached
completed, and the target has again stopped all threads in all attached
processes.  This is the default all-stop mode behavior, but the remote
processes.  This is the default all-stop mode behavior, but the remote
protocol also supports GDB's non-stop execution mode; see *Note Remote
protocol also supports GDB's non-stop execution mode; see *Note Remote
Non-Stop::, for details.
Non-Stop::, for details.
   PACKET-DATA consists of a sequence of characters with the exception
   PACKET-DATA consists of a sequence of characters with the exception
of `#' and `$' (see `X' packet for additional exceptions).
of `#' and `$' (see `X' packet for additional exceptions).
   Fields within the packet should be separated using `,' `;' or `:'.
   Fields within the packet should be separated using `,' `;' or `:'.
Except where otherwise noted all numbers are represented in HEX with
Except where otherwise noted all numbers are represented in HEX with
leading zeros suppressed.
leading zeros suppressed.
   Implementors should note that prior to GDB 5.0, the character `:'
   Implementors should note that prior to GDB 5.0, the character `:'
could not appear as the third character in a packet (as it would
could not appear as the third character in a packet (as it would
potentially conflict with the SEQUENCE-ID).
potentially conflict with the SEQUENCE-ID).
   Binary data in most packets is encoded either as two hexadecimal
   Binary data in most packets is encoded either as two hexadecimal
digits per byte of binary data.  This allowed the traditional remote
digits per byte of binary data.  This allowed the traditional remote
protocol to work over connections which were only seven-bit clean.
protocol to work over connections which were only seven-bit clean.
Some packets designed more recently assume an eight-bit clean
Some packets designed more recently assume an eight-bit clean
connection, and use a more efficient encoding to send and receive
connection, and use a more efficient encoding to send and receive
binary data.
binary data.
   The binary data representation uses `7d' (ASCII `}') as an escape
   The binary data representation uses `7d' (ASCII `}') as an escape
character.  Any escaped byte is transmitted as the escape character
character.  Any escaped byte is transmitted as the escape character
followed by the original character XORed with `0x20'.  For example, the
followed by the original character XORed with `0x20'.  For example, the
byte `0x7d' would be transmitted as the two bytes `0x7d 0x5d'.  The
byte `0x7d' would be transmitted as the two bytes `0x7d 0x5d'.  The
bytes `0x23' (ASCII `#'), `0x24' (ASCII `$'), and `0x7d' (ASCII `}')
bytes `0x23' (ASCII `#'), `0x24' (ASCII `$'), and `0x7d' (ASCII `}')
must always be escaped.  Responses sent by the stub must also escape
must always be escaped.  Responses sent by the stub must also escape
`0x2a' (ASCII `*'), so that it is not interpreted as the start of a
`0x2a' (ASCII `*'), so that it is not interpreted as the start of a
run-length encoded sequence (described next).
run-length encoded sequence (described next).
   Response DATA can be run-length encoded to save space.  Run-length
   Response DATA can be run-length encoded to save space.  Run-length
encoding replaces runs of identical characters with one instance of the
encoding replaces runs of identical characters with one instance of the
repeated character, followed by a `*' and a repeat count.  The repeat
repeated character, followed by a `*' and a repeat count.  The repeat
count is itself sent encoded, to avoid binary characters in DATA: a
count is itself sent encoded, to avoid binary characters in DATA: a
value of N is sent as `N+29'.  For a repeat count greater or equal to
value of N is sent as `N+29'.  For a repeat count greater or equal to
3, this produces a printable ASCII character, e.g. a space (ASCII code
3, this produces a printable ASCII character, e.g. a space (ASCII code
32) for a repeat count of 3.  (This is because run-length encoding
32) for a repeat count of 3.  (This is because run-length encoding
starts to win for counts 3 or more.)  Thus, for example, `0* ' is a
starts to win for counts 3 or more.)  Thus, for example, `0* ' is a
run-length encoding of "0000": the space character after `*' means
run-length encoding of "0000": the space character after `*' means
repeat the leading `0' `32 - 29 = 3' more times.
repeat the leading `0' `32 - 29 = 3' more times.
   The printable characters `#' and `$' or with a numeric value greater
   The printable characters `#' and `$' or with a numeric value greater
than 126 must not be used.  Runs of six repeats (`#') or seven repeats
than 126 must not be used.  Runs of six repeats (`#') or seven repeats
(`$') can be expanded using a repeat count of only five (`"').  For
(`$') can be expanded using a repeat count of only five (`"').  For
example, `00000000' can be encoded as `0*"00'.
example, `00000000' can be encoded as `0*"00'.
   The error response returned for some packets includes a two character
   The error response returned for some packets includes a two character
error number.  That number is not well defined.
error number.  That number is not well defined.
   For any COMMAND not supported by the stub, an empty response
   For any COMMAND not supported by the stub, an empty response
(`$#00') should be returned.  That way it is possible to extend the
(`$#00') should be returned.  That way it is possible to extend the
protocol.  A newer GDB can tell if a packet is supported based on that
protocol.  A newer GDB can tell if a packet is supported based on that
response.
response.
   A stub is required to support the `g', `G', `m', `M', `c', and `s'
   A stub is required to support the `g', `G', `m', `M', `c', and `s'
COMMANDs.  All other COMMANDs are optional.
COMMANDs.  All other COMMANDs are optional.


File: gdb.info,  Node: Packets,  Next: Stop Reply Packets,  Prev: Overview,  Up: Remote Protocol
File: gdb.info,  Node: Packets,  Next: Stop Reply Packets,  Prev: Overview,  Up: Remote Protocol
D.2 Packets
D.2 Packets
===========
===========
The following table provides a complete list of all currently defined
The following table provides a complete list of all currently defined
COMMANDs and their corresponding response DATA.  *Note File-I/O Remote
COMMANDs and their corresponding response DATA.  *Note File-I/O Remote
Protocol Extension::, for details about the File I/O extension of the
Protocol Extension::, for details about the File I/O extension of the
remote protocol.
remote protocol.
   Each packet's description has a template showing the packet's overall
   Each packet's description has a template showing the packet's overall
syntax, followed by an explanation of the packet's meaning.  We include
syntax, followed by an explanation of the packet's meaning.  We include
spaces in some of the templates for clarity; these are not part of the
spaces in some of the templates for clarity; these are not part of the
packet's syntax.  No GDB packet uses spaces to separate its components.
packet's syntax.  No GDB packet uses spaces to separate its components.
For example, a template like `foo BAR BAZ' describes a packet
For example, a template like `foo BAR BAZ' describes a packet
beginning with the three ASCII bytes `foo', followed by a BAR, followed
beginning with the three ASCII bytes `foo', followed by a BAR, followed
directly by a BAZ.  GDB does not transmit a space character between the
directly by a BAZ.  GDB does not transmit a space character between the
`foo' and the BAR, or between the BAR and the BAZ.
`foo' and the BAR, or between the BAR and the BAZ.
   Several packets and replies include a THREAD-ID field to identify a
   Several packets and replies include a THREAD-ID field to identify a
thread.  Normally these are positive numbers with a target-specific
thread.  Normally these are positive numbers with a target-specific
interpretation, formatted as big-endian hex strings.  A THREAD-ID can
interpretation, formatted as big-endian hex strings.  A THREAD-ID can
also be a literal `-1' to indicate all threads, or `0' to pick any
also be a literal `-1' to indicate all threads, or `0' to pick any
thread.
thread.
   In addition, the remote protocol supports a multiprocess feature in
   In addition, the remote protocol supports a multiprocess feature in
which the THREAD-ID syntax is extended to optionally include both
which the THREAD-ID syntax is extended to optionally include both
process and thread ID fields, as `pPID.TID'.  The PID (process) and TID
process and thread ID fields, as `pPID.TID'.  The PID (process) and TID
(thread) components each have the format described above: a positive
(thread) components each have the format described above: a positive
number with target-specific interpretation formatted as a big-endian
number with target-specific interpretation formatted as a big-endian
hex string, literal `-1' to indicate all processes or threads
hex string, literal `-1' to indicate all processes or threads
(respectively), or `0' to indicate an arbitrary process or thread.
(respectively), or `0' to indicate an arbitrary process or thread.
Specifying just a process, as `pPID', is equivalent to `pPID.-1'.  It
Specifying just a process, as `pPID', is equivalent to `pPID.-1'.  It
is an error to specify all processes but a specific thread, such as
is an error to specify all processes but a specific thread, such as
`p-1.TID'.  Note that the `p' prefix is _not_ used for those packets
`p-1.TID'.  Note that the `p' prefix is _not_ used for those packets
and replies explicitly documented to include a process ID, rather than
and replies explicitly documented to include a process ID, rather than
a THREAD-ID.
a THREAD-ID.
   The multiprocess THREAD-ID syntax extensions are only used if both
   The multiprocess THREAD-ID syntax extensions are only used if both
GDB and the stub report support for the `multiprocess' feature using
GDB and the stub report support for the `multiprocess' feature using
`qSupported'.  *Note multiprocess extensions::, for more information.
`qSupported'.  *Note multiprocess extensions::, for more information.
   Note that all packet forms beginning with an upper- or lower-case
   Note that all packet forms beginning with an upper- or lower-case
letter, other than those described here, are reserved for future use.
letter, other than those described here, are reserved for future use.
   Here are the packet descriptions.
   Here are the packet descriptions.
`!'
`!'
     Enable extended mode.  In extended mode, the remote server is made
     Enable extended mode.  In extended mode, the remote server is made
     persistent.  The `R' packet is used to restart the program being
     persistent.  The `R' packet is used to restart the program being
     debugged.
     debugged.
     Reply:
     Reply:
    `OK'
    `OK'
          The remote target both supports and has enabled extended mode.
          The remote target both supports and has enabled extended mode.
`?'
`?'
     Indicate the reason the target halted.  The reply is the same as
     Indicate the reason the target halted.  The reply is the same as
     for step and continue.  This packet has a special interpretation
     for step and continue.  This packet has a special interpretation
     when the target is in non-stop mode; see *Note Remote Non-Stop::.
     when the target is in non-stop mode; see *Note Remote Non-Stop::.
     Reply: *Note Stop Reply Packets::, for the reply specifications.
     Reply: *Note Stop Reply Packets::, for the reply specifications.
`A ARGLEN,ARGNUM,ARG,...'
`A ARGLEN,ARGNUM,ARG,...'
     Initialized `argv[]' array passed into program. ARGLEN specifies
     Initialized `argv[]' array passed into program. ARGLEN specifies
     the number of bytes in the hex encoded byte stream ARG.  See
     the number of bytes in the hex encoded byte stream ARG.  See
     `gdbserver' for more details.
     `gdbserver' for more details.
     Reply:
     Reply:
    `OK'
    `OK'
          The arguments were set.
          The arguments were set.
    `E NN'
    `E NN'
          An error occurred.
          An error occurred.
`b BAUD'
`b BAUD'
     (Don't use this packet; its behavior is not well-defined.)  Change
     (Don't use this packet; its behavior is not well-defined.)  Change
     the serial line speed to BAUD.
     the serial line speed to BAUD.
     JTC: _When does the transport layer state change?  When it's
     JTC: _When does the transport layer state change?  When it's
     received, or after the ACK is transmitted.  In either case, there
     received, or after the ACK is transmitted.  In either case, there
     are problems if the command or the acknowledgment packet is
     are problems if the command or the acknowledgment packet is
     dropped._
     dropped._
     Stan: _If people really wanted to add something like this, and get
     Stan: _If people really wanted to add something like this, and get
     it working for the first time, they ought to modify ser-unix.c to
     it working for the first time, they ought to modify ser-unix.c to
     send some kind of out-of-band message to a specially-setup stub
     send some kind of out-of-band message to a specially-setup stub
     and have the switch happen "in between" packets, so that from
     and have the switch happen "in between" packets, so that from
     remote protocol's point of view, nothing actually happened._
     remote protocol's point of view, nothing actually happened._
`B ADDR,MODE'
`B ADDR,MODE'
     Set (MODE is `S') or clear (MODE is `C') a breakpoint at ADDR.
     Set (MODE is `S') or clear (MODE is `C') a breakpoint at ADDR.
     Don't use this packet.  Use the `Z' and `z' packets instead (*note
     Don't use this packet.  Use the `Z' and `z' packets instead (*note
     insert breakpoint or watchpoint packet::).
     insert breakpoint or watchpoint packet::).
`bc'
`bc'
     Backward continue.  Execute the target system in reverse.  No
     Backward continue.  Execute the target system in reverse.  No
     parameter.  *Note Reverse Execution::, for more information.
     parameter.  *Note Reverse Execution::, for more information.
     Reply: *Note Stop Reply Packets::, for the reply specifications.
     Reply: *Note Stop Reply Packets::, for the reply specifications.
`bs'
`bs'
     Backward single step.  Execute one instruction in reverse.  No
     Backward single step.  Execute one instruction in reverse.  No
     parameter.  *Note Reverse Execution::, for more information.
     parameter.  *Note Reverse Execution::, for more information.
     Reply: *Note Stop Reply Packets::, for the reply specifications.
     Reply: *Note Stop Reply Packets::, for the reply specifications.
`c [ADDR]'
`c [ADDR]'
     Continue.  ADDR is address to resume.  If ADDR is omitted, resume
     Continue.  ADDR is address to resume.  If ADDR is omitted, resume
     at current address.
     at current address.
     Reply: *Note Stop Reply Packets::, for the reply specifications.
     Reply: *Note Stop Reply Packets::, for the reply specifications.
`C SIG[;ADDR]'
`C SIG[;ADDR]'
     Continue with signal SIG (hex signal number).  If `;ADDR' is
     Continue with signal SIG (hex signal number).  If `;ADDR' is
     omitted, resume at same address.
     omitted, resume at same address.
     Reply: *Note Stop Reply Packets::, for the reply specifications.
     Reply: *Note Stop Reply Packets::, for the reply specifications.
`d'
`d'
     Toggle debug flag.
     Toggle debug flag.
     Don't use this packet; instead, define a general set packet (*note
     Don't use this packet; instead, define a general set packet (*note
     General Query Packets::).
     General Query Packets::).
`D'
`D'
`D;PID'
`D;PID'
     The first form of the packet is used to detach GDB from the remote
     The first form of the packet is used to detach GDB from the remote
     system.  It is sent to the remote target before GDB disconnects
     system.  It is sent to the remote target before GDB disconnects
     via the `detach' command.
     via the `detach' command.
     The second form, including a process ID, is used when multiprocess
     The second form, including a process ID, is used when multiprocess
     protocol extensions are enabled (*note multiprocess extensions::),
     protocol extensions are enabled (*note multiprocess extensions::),
     to detach only a specific process.  The PID is specified as a
     to detach only a specific process.  The PID is specified as a
     big-endian hex string.
     big-endian hex string.
     Reply:
     Reply:
    `OK'
    `OK'
          for success
          for success
    `E NN'
    `E NN'
          for an error
          for an error
`F RC,EE,CF;XX'
`F RC,EE,CF;XX'
     A reply from GDB to an `F' packet sent by the target.  This is
     A reply from GDB to an `F' packet sent by the target.  This is
     part of the File-I/O protocol extension.  *Note File-I/O Remote
     part of the File-I/O protocol extension.  *Note File-I/O Remote
     Protocol Extension::, for the specification.
     Protocol Extension::, for the specification.
`g'
`g'
     Read general registers.
     Read general registers.
     Reply:
     Reply:
    `XX...'
    `XX...'
          Each byte of register data is described by two hex digits.
          Each byte of register data is described by two hex digits.
          The bytes with the register are transmitted in target byte
          The bytes with the register are transmitted in target byte
          order.  The size of each register and their position within
          order.  The size of each register and their position within
          the `g' packet are determined by the GDB internal gdbarch
          the `g' packet are determined by the GDB internal gdbarch
          functions `DEPRECATED_REGISTER_RAW_SIZE' and
          functions `DEPRECATED_REGISTER_RAW_SIZE' and
          `gdbarch_register_name'.  The specification of several
          `gdbarch_register_name'.  The specification of several
          standard `g' packets is specified below.
          standard `g' packets is specified below.
    `E NN'
    `E NN'
          for an error.
          for an error.
`G XX...'
`G XX...'
     Write general registers.  *Note read registers packet::, for a
     Write general registers.  *Note read registers packet::, for a
     description of the XX... data.
     description of the XX... data.
     Reply:
     Reply:
    `OK'
    `OK'
          for success
          for success
    `E NN'
    `E NN'
          for an error
          for an error
`H C THREAD-ID'
`H C THREAD-ID'
     Set thread for subsequent operations (`m', `M', `g', `G', et.al.).
     Set thread for subsequent operations (`m', `M', `g', `G', et.al.).
     C depends on the operation to be performed: it should be `c' for
     C depends on the operation to be performed: it should be `c' for
     step and continue operations, `g' for other operations.  The
     step and continue operations, `g' for other operations.  The
     thread designator THREAD-ID has the format and interpretation
     thread designator THREAD-ID has the format and interpretation
     described in *Note thread-id syntax::.
     described in *Note thread-id syntax::.
     Reply:
     Reply:
    `OK'
    `OK'
          for success
          for success
    `E NN'
    `E NN'
          for an error
          for an error
`i [ADDR[,NNN]]'
`i [ADDR[,NNN]]'
     Step the remote target by a single clock cycle.  If `,NNN' is
     Step the remote target by a single clock cycle.  If `,NNN' is
     present, cycle step NNN cycles.  If ADDR is present, cycle step
     present, cycle step NNN cycles.  If ADDR is present, cycle step
     starting at that address.
     starting at that address.
`I'
`I'
     Signal, then cycle step.  *Note step with signal packet::.  *Note
     Signal, then cycle step.  *Note step with signal packet::.  *Note
     cycle step packet::.
     cycle step packet::.
`k'
`k'
     Kill request.
     Kill request.
     FIXME: _There is no description of how to operate when a specific
     FIXME: _There is no description of how to operate when a specific
     thread context has been selected (i.e. does 'k' kill only that
     thread context has been selected (i.e. does 'k' kill only that
     thread?)_.
     thread?)_.
`m ADDR,LENGTH'
`m ADDR,LENGTH'
     Read LENGTH bytes of memory starting at address ADDR.  Note that
     Read LENGTH bytes of memory starting at address ADDR.  Note that
     ADDR may not be aligned to any particular boundary.
     ADDR may not be aligned to any particular boundary.
     The stub need not use any particular size or alignment when
     The stub need not use any particular size or alignment when
     gathering data from memory for the response; even if ADDR is
     gathering data from memory for the response; even if ADDR is
     word-aligned and LENGTH is a multiple of the word size, the stub
     word-aligned and LENGTH is a multiple of the word size, the stub
     is free to use byte accesses, or not.  For this reason, this
     is free to use byte accesses, or not.  For this reason, this
     packet may not be suitable for accessing memory-mapped I/O devices.
     packet may not be suitable for accessing memory-mapped I/O devices.
     Reply:
     Reply:
    `XX...'
    `XX...'
          Memory contents; each byte is transmitted as a two-digit
          Memory contents; each byte is transmitted as a two-digit
          hexadecimal number.  The reply may contain fewer bytes than
          hexadecimal number.  The reply may contain fewer bytes than
          requested if the server was able to read only part of the
          requested if the server was able to read only part of the
          region of memory.
          region of memory.
    `E NN'
    `E NN'
          NN is errno
          NN is errno
`M ADDR,LENGTH:XX...'
`M ADDR,LENGTH:XX...'
     Write LENGTH bytes of memory starting at address ADDR.  XX... is
     Write LENGTH bytes of memory starting at address ADDR.  XX... is
     the data; each byte is transmitted as a two-digit hexadecimal
     the data; each byte is transmitted as a two-digit hexadecimal
     number.
     number.
     Reply:
     Reply:
    `OK'
    `OK'
          for success
          for success
    `E NN'
    `E NN'
          for an error (this includes the case where only part of the
          for an error (this includes the case where only part of the
          data was written).
          data was written).
`p N'
`p N'
     Read the value of register N; N is in hex.  *Note read registers
     Read the value of register N; N is in hex.  *Note read registers
     packet::, for a description of how the returned register value is
     packet::, for a description of how the returned register value is
     encoded.
     encoded.
     Reply:
     Reply:
    `XX...'
    `XX...'
          the register's value
          the register's value
    `E NN'
    `E NN'
          for an error
          for an error
    `'
    `'
          Indicating an unrecognized QUERY.
          Indicating an unrecognized QUERY.
`P N...=R...'
`P N...=R...'
     Write register N... with value R....  The register number N is in
     Write register N... with value R....  The register number N is in
     hexadecimal, and R... contains two hex digits for each byte in the
     hexadecimal, and R... contains two hex digits for each byte in the
     register (target byte order).
     register (target byte order).
     Reply:
     Reply:
    `OK'
    `OK'
          for success
          for success
    `E NN'
    `E NN'
          for an error
          for an error
`q NAME PARAMS...'
`q NAME PARAMS...'
`Q NAME PARAMS...'
`Q NAME PARAMS...'
     General query (`q') and set (`Q').  These packets are described
     General query (`q') and set (`Q').  These packets are described
     fully in *Note General Query Packets::.
     fully in *Note General Query Packets::.
`r'
`r'
     Reset the entire system.
     Reset the entire system.
     Don't use this packet; use the `R' packet instead.
     Don't use this packet; use the `R' packet instead.
`R XX'
`R XX'
     Restart the program being debugged.  XX, while needed, is ignored.
     Restart the program being debugged.  XX, while needed, is ignored.
     This packet is only available in extended mode (*note extended
     This packet is only available in extended mode (*note extended
     mode::).
     mode::).
     The `R' packet has no reply.
     The `R' packet has no reply.
`s [ADDR]'
`s [ADDR]'
     Single step.  ADDR is the address at which to resume.  If ADDR is
     Single step.  ADDR is the address at which to resume.  If ADDR is
     omitted, resume at same address.
     omitted, resume at same address.
     Reply: *Note Stop Reply Packets::, for the reply specifications.
     Reply: *Note Stop Reply Packets::, for the reply specifications.
`S SIG[;ADDR]'
`S SIG[;ADDR]'
     Step with signal.  This is analogous to the `C' packet, but
     Step with signal.  This is analogous to the `C' packet, but
     requests a single-step, rather than a normal resumption of
     requests a single-step, rather than a normal resumption of
     execution.
     execution.
     Reply: *Note Stop Reply Packets::, for the reply specifications.
     Reply: *Note Stop Reply Packets::, for the reply specifications.
`t ADDR:PP,MM'
`t ADDR:PP,MM'
     Search backwards starting at address ADDR for a match with pattern
     Search backwards starting at address ADDR for a match with pattern
     PP and mask MM.  PP and MM are 4 bytes.  ADDR must be at least 3
     PP and mask MM.  PP and MM are 4 bytes.  ADDR must be at least 3
     digits.
     digits.
`T THREAD-ID'
`T THREAD-ID'
     Find out if the thread THREAD-ID is alive.  *Note thread-id
     Find out if the thread THREAD-ID is alive.  *Note thread-id
     syntax::.
     syntax::.
     Reply:
     Reply:
    `OK'
    `OK'
          thread is still alive
          thread is still alive
    `E NN'
    `E NN'
          thread is dead
          thread is dead
`v'
`v'
     Packets starting with `v' are identified by a multi-letter name,
     Packets starting with `v' are identified by a multi-letter name,
     up to the first `;' or `?' (or the end of the packet).
     up to the first `;' or `?' (or the end of the packet).
`vAttach;PID'
`vAttach;PID'
     Attach to a new process with the specified process ID PID.  The
     Attach to a new process with the specified process ID PID.  The
     process ID is a hexadecimal integer identifying the process.  In
     process ID is a hexadecimal integer identifying the process.  In
     all-stop mode, all threads in the attached process are stopped; in
     all-stop mode, all threads in the attached process are stopped; in
     non-stop mode, it may be attached without being stopped if that is
     non-stop mode, it may be attached without being stopped if that is
     supported by the target.
     supported by the target.
     This packet is only available in extended mode (*note extended
     This packet is only available in extended mode (*note extended
     mode::).
     mode::).
     Reply:
     Reply:
    `E NN'
    `E NN'
          for an error
          for an error
    `Any stop packet'
    `Any stop packet'
          for success in all-stop mode (*note Stop Reply Packets::)
          for success in all-stop mode (*note Stop Reply Packets::)
    `OK'
    `OK'
          for success in non-stop mode (*note Remote Non-Stop::)
          for success in non-stop mode (*note Remote Non-Stop::)
`vCont[;ACTION[:THREAD-ID]]...'
`vCont[;ACTION[:THREAD-ID]]...'
     Resume the inferior, specifying different actions for each thread.
     Resume the inferior, specifying different actions for each thread.
     If an action is specified with no THREAD-ID, then it is applied to
     If an action is specified with no THREAD-ID, then it is applied to
     any threads that don't have a specific action specified; if no
     any threads that don't have a specific action specified; if no
     default action is specified then other threads should remain
     default action is specified then other threads should remain
     stopped in all-stop mode and in their current state in non-stop
     stopped in all-stop mode and in their current state in non-stop
     mode.  Specifying multiple default actions is an error; specifying
     mode.  Specifying multiple default actions is an error; specifying
     no actions is also an error.  Thread IDs are specified using the
     no actions is also an error.  Thread IDs are specified using the
     syntax described in *Note thread-id syntax::.
     syntax described in *Note thread-id syntax::.
     Currently supported actions are:
     Currently supported actions are:
    `c'
    `c'
          Continue.
          Continue.
    `C SIG'
    `C SIG'
          Continue with signal SIG.  The signal SIG should be two hex
          Continue with signal SIG.  The signal SIG should be two hex
          digits.
          digits.
    `s'
    `s'
          Step.
          Step.
    `S SIG'
    `S SIG'
          Step with signal SIG.  The signal SIG should be two hex
          Step with signal SIG.  The signal SIG should be two hex
          digits.
          digits.
    `t'
    `t'
          Stop.
          Stop.
     The optional argument ADDR normally associated with the `c', `C',
     The optional argument ADDR normally associated with the `c', `C',
     `s', and `S' packets is not supported in `vCont'.
     `s', and `S' packets is not supported in `vCont'.
     The `t' action is only relevant in non-stop mode (*note Remote
     The `t' action is only relevant in non-stop mode (*note Remote
     Non-Stop::) and may be ignored by the stub otherwise.  A stop
     Non-Stop::) and may be ignored by the stub otherwise.  A stop
     reply should be generated for any affected thread not already
     reply should be generated for any affected thread not already
     stopped.  When a thread is stopped by means of a `t' action, the
     stopped.  When a thread is stopped by means of a `t' action, the
     corresponding stop reply should indicate that the thread has
     corresponding stop reply should indicate that the thread has
     stopped with signal `0', regardless of whether the target uses
     stopped with signal `0', regardless of whether the target uses
     some other signal as an implementation detail.
     some other signal as an implementation detail.
     Reply: *Note Stop Reply Packets::, for the reply specifications.
     Reply: *Note Stop Reply Packets::, for the reply specifications.
`vCont?'
`vCont?'
     Request a list of actions supported by the `vCont' packet.
     Request a list of actions supported by the `vCont' packet.
     Reply:
     Reply:
    `vCont[;ACTION...]'
    `vCont[;ACTION...]'
          The `vCont' packet is supported.  Each ACTION is a supported
          The `vCont' packet is supported.  Each ACTION is a supported
          command in the `vCont' packet.
          command in the `vCont' packet.
    `'
    `'
          The `vCont' packet is not supported.
          The `vCont' packet is not supported.
`vFile:OPERATION:PARAMETER...'
`vFile:OPERATION:PARAMETER...'
     Perform a file operation on the target system.  For details, see
     Perform a file operation on the target system.  For details, see
     *Note Host I/O Packets::.
     *Note Host I/O Packets::.
`vFlashErase:ADDR,LENGTH'
`vFlashErase:ADDR,LENGTH'
     Direct the stub to erase LENGTH bytes of flash starting at ADDR.
     Direct the stub to erase LENGTH bytes of flash starting at ADDR.
     The region may enclose any number of flash blocks, but its start
     The region may enclose any number of flash blocks, but its start
     and end must fall on block boundaries, as indicated by the flash
     and end must fall on block boundaries, as indicated by the flash
     block size appearing in the memory map (*note Memory Map
     block size appearing in the memory map (*note Memory Map
     Format::).  GDB groups flash memory programming operations
     Format::).  GDB groups flash memory programming operations
     together, and sends a `vFlashDone' request after each group; the
     together, and sends a `vFlashDone' request after each group; the
     stub is allowed to delay erase operation until the `vFlashDone'
     stub is allowed to delay erase operation until the `vFlashDone'
     packet is received.
     packet is received.
     The stub must support `vCont' if it reports support for
     The stub must support `vCont' if it reports support for
     multiprocess extensions (*note multiprocess extensions::).  Note
     multiprocess extensions (*note multiprocess extensions::).  Note
     that in this case `vCont' actions can be specified to apply to all
     that in this case `vCont' actions can be specified to apply to all
     threads in a process by using the `pPID.-1' form of the THREAD-ID.
     threads in a process by using the `pPID.-1' form of the THREAD-ID.
     Reply:
     Reply:
    `OK'
    `OK'
          for success
          for success
    `E NN'
    `E NN'
          for an error
          for an error
`vFlashWrite:ADDR:XX...'
`vFlashWrite:ADDR:XX...'
     Direct the stub to write data to flash address ADDR.  The data is
     Direct the stub to write data to flash address ADDR.  The data is
     passed in binary form using the same encoding as for the `X'
     passed in binary form using the same encoding as for the `X'
     packet (*note Binary Data::).  The memory ranges specified by
     packet (*note Binary Data::).  The memory ranges specified by
     `vFlashWrite' packets preceding a `vFlashDone' packet must not
     `vFlashWrite' packets preceding a `vFlashDone' packet must not
     overlap, and must appear in order of increasing addresses
     overlap, and must appear in order of increasing addresses
     (although `vFlashErase' packets for higher addresses may already
     (although `vFlashErase' packets for higher addresses may already
     have been received; the ordering is guaranteed only between
     have been received; the ordering is guaranteed only between
     `vFlashWrite' packets).  If a packet writes to an address that was
     `vFlashWrite' packets).  If a packet writes to an address that was
     neither erased by a preceding `vFlashErase' packet nor by some
     neither erased by a preceding `vFlashErase' packet nor by some
     other target-specific method, the results are unpredictable.
     other target-specific method, the results are unpredictable.
     Reply:
     Reply:
    `OK'
    `OK'
          for success
          for success
    `E.memtype'
    `E.memtype'
          for vFlashWrite addressing non-flash memory
          for vFlashWrite addressing non-flash memory
    `E NN'
    `E NN'
          for an error
          for an error
`vFlashDone'
`vFlashDone'
     Indicate to the stub that flash programming operation is finished.
     Indicate to the stub that flash programming operation is finished.
     The stub is permitted to delay or batch the effects of a group of
     The stub is permitted to delay or batch the effects of a group of
     `vFlashErase' and `vFlashWrite' packets until a `vFlashDone'
     `vFlashErase' and `vFlashWrite' packets until a `vFlashDone'
     packet is received.  The contents of the affected regions of flash
     packet is received.  The contents of the affected regions of flash
     memory are unpredictable until the `vFlashDone' request is
     memory are unpredictable until the `vFlashDone' request is
     completed.
     completed.
`vKill;PID'
`vKill;PID'
     Kill the process with the specified process ID.  PID is a
     Kill the process with the specified process ID.  PID is a
     hexadecimal integer identifying the process.  This packet is used
     hexadecimal integer identifying the process.  This packet is used
     in preference to `k' when multiprocess protocol extensions are
     in preference to `k' when multiprocess protocol extensions are
     supported; see *Note multiprocess extensions::.
     supported; see *Note multiprocess extensions::.
     Reply:
     Reply:
    `E NN'
    `E NN'
          for an error
          for an error
    `OK'
    `OK'
          for success
          for success
`vRun;FILENAME[;ARGUMENT]...'
`vRun;FILENAME[;ARGUMENT]...'
     Run the program FILENAME, passing it each ARGUMENT on its command
     Run the program FILENAME, passing it each ARGUMENT on its command
     line.  The file and arguments are hex-encoded strings.  If
     line.  The file and arguments are hex-encoded strings.  If
     FILENAME is an empty string, the stub may use a default program
     FILENAME is an empty string, the stub may use a default program
     (e.g. the last program run).  The program is created in the stopped
     (e.g. the last program run).  The program is created in the stopped
     state.
     state.
     This packet is only available in extended mode (*note extended
     This packet is only available in extended mode (*note extended
     mode::).
     mode::).
     Reply:
     Reply:
    `E NN'
    `E NN'
          for an error
          for an error
    `Any stop packet'
    `Any stop packet'
          for success (*note Stop Reply Packets::)
          for success (*note Stop Reply Packets::)
`vStopped'
`vStopped'
     In non-stop mode (*note Remote Non-Stop::), acknowledge a previous
     In non-stop mode (*note Remote Non-Stop::), acknowledge a previous
     stop reply and prompt for the stub to report another one.
     stop reply and prompt for the stub to report another one.
     Reply:
     Reply:
    `Any stop packet'
    `Any stop packet'
          if there is another unreported stop event (*note Stop Reply
          if there is another unreported stop event (*note Stop Reply
          Packets::)
          Packets::)
    `OK'
    `OK'
          if there are no unreported stop events
          if there are no unreported stop events
`X ADDR,LENGTH:XX...'
`X ADDR,LENGTH:XX...'
     Write data to memory, where the data is transmitted in binary.
     Write data to memory, where the data is transmitted in binary.
     ADDR is address, LENGTH is number of bytes, `XX...' is binary data
     ADDR is address, LENGTH is number of bytes, `XX...' is binary data
     (*note Binary Data::).
     (*note Binary Data::).
     Reply:
     Reply:
    `OK'
    `OK'
          for success
          for success
    `E NN'
    `E NN'
          for an error
          for an error
`z TYPE,ADDR,KIND'
`z TYPE,ADDR,KIND'
`Z TYPE,ADDR,KIND'
`Z TYPE,ADDR,KIND'
     Insert (`Z') or remove (`z') a TYPE breakpoint or watchpoint
     Insert (`Z') or remove (`z') a TYPE breakpoint or watchpoint
     starting at address ADDRESS of kind KIND.
     starting at address ADDRESS of kind KIND.
     Each breakpoint and watchpoint packet TYPE is documented
     Each breakpoint and watchpoint packet TYPE is documented
     separately.
     separately.
     _Implementation notes: A remote target shall return an empty string
     _Implementation notes: A remote target shall return an empty string
     for an unrecognized breakpoint or watchpoint packet TYPE.  A
     for an unrecognized breakpoint or watchpoint packet TYPE.  A
     remote target shall support either both or neither of a given
     remote target shall support either both or neither of a given
     `ZTYPE...' and `zTYPE...' packet pair.  To avoid potential
     `ZTYPE...' and `zTYPE...' packet pair.  To avoid potential
     problems with duplicate packets, the operations should be
     problems with duplicate packets, the operations should be
     implemented in an idempotent way._
     implemented in an idempotent way._
`z0,ADDR,KIND'
`z0,ADDR,KIND'
`Z0,ADDR,KIND'
`Z0,ADDR,KIND'
     Insert (`Z0') or remove (`z0') a memory breakpoint at address ADDR
     Insert (`Z0') or remove (`z0') a memory breakpoint at address ADDR
     of type KIND.
     of type KIND.
     A memory breakpoint is implemented by replacing the instruction at
     A memory breakpoint is implemented by replacing the instruction at
     ADDR with a software breakpoint or trap instruction.  The KIND is
     ADDR with a software breakpoint or trap instruction.  The KIND is
     target-specific and typically indicates the size of the breakpoint
     target-specific and typically indicates the size of the breakpoint
     in bytes that should be inserted.  E.g., the ARM and MIPS can
     in bytes that should be inserted.  E.g., the ARM and MIPS can
     insert either a 2 or 4 byte breakpoint.  Some architectures have
     insert either a 2 or 4 byte breakpoint.  Some architectures have
     additional meanings for KIND; see *Note Architecture-Specific
     additional meanings for KIND; see *Note Architecture-Specific
     Protocol Details::.
     Protocol Details::.
     _Implementation note: It is possible for a target to copy or move
     _Implementation note: It is possible for a target to copy or move
     code that contains memory breakpoints (e.g., when implementing
     code that contains memory breakpoints (e.g., when implementing
     overlays).  The behavior of this packet, in the presence of such a
     overlays).  The behavior of this packet, in the presence of such a
     target, is not defined._
     target, is not defined._
     Reply:
     Reply:
    `OK'
    `OK'
          success
          success
    `'
    `'
          not supported
          not supported
    `E NN'
    `E NN'
          for an error
          for an error
`z1,ADDR,KIND'
`z1,ADDR,KIND'
`Z1,ADDR,KIND'
`Z1,ADDR,KIND'
     Insert (`Z1') or remove (`z1') a hardware breakpoint at address
     Insert (`Z1') or remove (`z1') a hardware breakpoint at address
     ADDR.
     ADDR.
     A hardware breakpoint is implemented using a mechanism that is not
     A hardware breakpoint is implemented using a mechanism that is not
     dependant on being able to modify the target's memory.  KIND has
     dependant on being able to modify the target's memory.  KIND has
     the same meaning as in `Z0' packets.
     the same meaning as in `Z0' packets.
     _Implementation note: A hardware breakpoint is not affected by code
     _Implementation note: A hardware breakpoint is not affected by code
     movement._
     movement._
     Reply:
     Reply:
    `OK'
    `OK'
          success
          success
    `'
    `'
          not supported
          not supported
    `E NN'
    `E NN'
          for an error
          for an error
`z2,ADDR,KIND'
`z2,ADDR,KIND'
`Z2,ADDR,KIND'
`Z2,ADDR,KIND'
     Insert (`Z2') or remove (`z2') a write watchpoint at ADDR.  KIND
     Insert (`Z2') or remove (`z2') a write watchpoint at ADDR.  KIND
     is interpreted as the number of bytes to watch.
     is interpreted as the number of bytes to watch.
     Reply:
     Reply:
    `OK'
    `OK'
          success
          success
    `'
    `'
          not supported
          not supported
    `E NN'
    `E NN'
          for an error
          for an error
`z3,ADDR,KIND'
`z3,ADDR,KIND'
`Z3,ADDR,KIND'
`Z3,ADDR,KIND'
     Insert (`Z3') or remove (`z3') a read watchpoint at ADDR.  KIND is
     Insert (`Z3') or remove (`z3') a read watchpoint at ADDR.  KIND is
     interpreted as the number of bytes to watch.
     interpreted as the number of bytes to watch.
     Reply:
     Reply:
    `OK'
    `OK'
          success
          success
    `'
    `'
          not supported
          not supported
    `E NN'
    `E NN'
          for an error
          for an error
`z4,ADDR,KIND'
`z4,ADDR,KIND'
`Z4,ADDR,KIND'
`Z4,ADDR,KIND'
     Insert (`Z4') or remove (`z4') an access watchpoint at ADDR.  KIND
     Insert (`Z4') or remove (`z4') an access watchpoint at ADDR.  KIND
     is interpreted as the number of bytes to watch.
     is interpreted as the number of bytes to watch.
     Reply:
     Reply:
    `OK'
    `OK'
          success
          success
    `'
    `'
          not supported
          not supported
    `E NN'
    `E NN'
          for an error
          for an error


File: gdb.info,  Node: Stop Reply Packets,  Next: General Query Packets,  Prev: Packets,  Up: Remote Protocol
File: gdb.info,  Node: Stop Reply Packets,  Next: General Query Packets,  Prev: Packets,  Up: Remote Protocol
D.3 Stop Reply Packets
D.3 Stop Reply Packets
======================
======================
The `C', `c', `S', `s', `vCont', `vAttach', `vRun', `vStopped', and `?'
The `C', `c', `S', `s', `vCont', `vAttach', `vRun', `vStopped', and `?'
packets can receive any of the below as a reply.  Except for `?' and
packets can receive any of the below as a reply.  Except for `?' and
`vStopped', that reply is only returned when the target halts.  In the
`vStopped', that reply is only returned when the target halts.  In the
below the exact meaning of "signal number" is defined by the header
below the exact meaning of "signal number" is defined by the header
`include/gdb/signals.h' in the GDB source code.
`include/gdb/signals.h' in the GDB source code.
   As in the description of request packets, we include spaces in the
   As in the description of request packets, we include spaces in the
reply templates for clarity; these are not part of the reply packet's
reply templates for clarity; these are not part of the reply packet's
syntax.  No GDB stop reply packet uses spaces to separate its
syntax.  No GDB stop reply packet uses spaces to separate its
components.
components.
`S AA'
`S AA'
     The program received signal number AA (a two-digit hexadecimal
     The program received signal number AA (a two-digit hexadecimal
     number).  This is equivalent to a `T' response with no N:R pairs.
     number).  This is equivalent to a `T' response with no N:R pairs.
`T AA N1:R1;N2:R2;...'
`T AA N1:R1;N2:R2;...'
     The program received signal number AA (a two-digit hexadecimal
     The program received signal number AA (a two-digit hexadecimal
     number).  This is equivalent to an `S' response, except that the
     number).  This is equivalent to an `S' response, except that the
     `N:R' pairs can carry values of important registers and other
     `N:R' pairs can carry values of important registers and other
     information directly in the stop reply packet, reducing round-trip
     information directly in the stop reply packet, reducing round-trip
     latency.  Single-step and breakpoint traps are reported this way.
     latency.  Single-step and breakpoint traps are reported this way.
     Each `N:R' pair is interpreted as follows:
     Each `N:R' pair is interpreted as follows:
        * If N is a hexadecimal number, it is a register number, and the
        * If N is a hexadecimal number, it is a register number, and the
          corresponding R gives that register's value.  R is a series
          corresponding R gives that register's value.  R is a series
          of bytes in target byte order, with each byte given by a
          of bytes in target byte order, with each byte given by a
          two-digit hex number.
          two-digit hex number.
        * If N is `thread', then R is the THREAD-ID of the stopped
        * If N is `thread', then R is the THREAD-ID of the stopped
          thread, as specified in *Note thread-id syntax::.
          thread, as specified in *Note thread-id syntax::.
        * If N is `core', then R is the hexadecimal number of the core
        * If N is `core', then R is the hexadecimal number of the core
          on which the stop event was detected.
          on which the stop event was detected.
        * If N is a recognized "stop reason", it describes a more
        * If N is a recognized "stop reason", it describes a more
          specific event that stopped the target.  The currently
          specific event that stopped the target.  The currently
          defined stop reasons are listed below.  AA should be `05',
          defined stop reasons are listed below.  AA should be `05',
          the trap signal.  At most one stop reason should be present.
          the trap signal.  At most one stop reason should be present.
        * Otherwise, GDB should ignore this `N:R' pair and go on to the
        * Otherwise, GDB should ignore this `N:R' pair and go on to the
          next; this allows us to extend the protocol in the future.
          next; this allows us to extend the protocol in the future.
     The currently defined stop reasons are:
     The currently defined stop reasons are:
    `watch'
    `watch'
    `rwatch'
    `rwatch'
    `awatch'
    `awatch'
          The packet indicates a watchpoint hit, and R is the data
          The packet indicates a watchpoint hit, and R is the data
          address, in hex.
          address, in hex.
    `library'
    `library'
          The packet indicates that the loaded libraries have changed.
          The packet indicates that the loaded libraries have changed.
          GDB should use `qXfer:libraries:read' to fetch a new list of
          GDB should use `qXfer:libraries:read' to fetch a new list of
          loaded libraries.  R is ignored.
          loaded libraries.  R is ignored.
    `replaylog'
    `replaylog'
          The packet indicates that the target cannot continue replaying
          The packet indicates that the target cannot continue replaying
          logged execution events, because it has reached the end (or
          logged execution events, because it has reached the end (or
          the beginning when executing backward) of the log.  The value
          the beginning when executing backward) of the log.  The value
          of R will be either `begin' or `end'.  *Note Reverse
          of R will be either `begin' or `end'.  *Note Reverse
          Execution::, for more information.
          Execution::, for more information.
`W AA'
`W AA'
`W AA ; process:PID'
`W AA ; process:PID'
     The process exited, and AA is the exit status.  This is only
     The process exited, and AA is the exit status.  This is only
     applicable to certain targets.
     applicable to certain targets.
     The second form of the response, including the process ID of the
     The second form of the response, including the process ID of the
     exited process, can be used only when GDB has reported support for
     exited process, can be used only when GDB has reported support for
     multiprocess protocol extensions; see *Note multiprocess
     multiprocess protocol extensions; see *Note multiprocess
     extensions::.  The PID is formatted as a big-endian hex string.
     extensions::.  The PID is formatted as a big-endian hex string.
`X AA'
`X AA'
`X AA ; process:PID'
`X AA ; process:PID'
     The process terminated with signal AA.
     The process terminated with signal AA.
     The second form of the response, including the process ID of the
     The second form of the response, including the process ID of the
     terminated process, can be used only when GDB has reported support
     terminated process, can be used only when GDB has reported support
     for multiprocess protocol extensions; see *Note multiprocess
     for multiprocess protocol extensions; see *Note multiprocess
     extensions::.  The PID is formatted as a big-endian hex string.
     extensions::.  The PID is formatted as a big-endian hex string.
`O XX...'
`O XX...'
     `XX...' is hex encoding of ASCII data, to be written as the
     `XX...' is hex encoding of ASCII data, to be written as the
     program's console output.  This can happen at any time while the
     program's console output.  This can happen at any time while the
     program is running and the debugger should continue to wait for
     program is running and the debugger should continue to wait for
     `W', `T', etc.  This reply is not permitted in non-stop mode.
     `W', `T', etc.  This reply is not permitted in non-stop mode.
`F CALL-ID,PARAMETER...'
`F CALL-ID,PARAMETER...'
     CALL-ID is the identifier which says which host system call should
     CALL-ID is the identifier which says which host system call should
     be called.  This is just the name of the function.  Translation
     be called.  This is just the name of the function.  Translation
     into the correct system call is only applicable as it's defined in
     into the correct system call is only applicable as it's defined in
     GDB.  *Note File-I/O Remote Protocol Extension::, for a list of
     GDB.  *Note File-I/O Remote Protocol Extension::, for a list of
     implemented system calls.
     implemented system calls.
     `PARAMETER...' is a list of parameters as defined for this very
     `PARAMETER...' is a list of parameters as defined for this very
     system call.
     system call.
     The target replies with this packet when it expects GDB to call a
     The target replies with this packet when it expects GDB to call a
     host system call on behalf of the target.  GDB replies with an
     host system call on behalf of the target.  GDB replies with an
     appropriate `F' packet and keeps up waiting for the next reply
     appropriate `F' packet and keeps up waiting for the next reply
     packet from the target.  The latest `C', `c', `S' or `s' action is
     packet from the target.  The latest `C', `c', `S' or `s' action is
     expected to be continued.  *Note File-I/O Remote Protocol
     expected to be continued.  *Note File-I/O Remote Protocol
     Extension::, for more details.
     Extension::, for more details.


File: gdb.info,  Node: General Query Packets,  Next: Architecture-Specific Protocol Details,  Prev: Stop Reply Packets,  Up: Remote Protocol
File: gdb.info,  Node: General Query Packets,  Next: Architecture-Specific Protocol Details,  Prev: Stop Reply Packets,  Up: Remote Protocol
D.4 General Query Packets
D.4 General Query Packets
=========================
=========================
Packets starting with `q' are "general query packets"; packets starting
Packets starting with `q' are "general query packets"; packets starting
with `Q' are "general set packets".  General query and set packets are
with `Q' are "general set packets".  General query and set packets are
a semi-unified form for retrieving and sending information to and from
a semi-unified form for retrieving and sending information to and from
the stub.
the stub.
   The initial letter of a query or set packet is followed by a name
   The initial letter of a query or set packet is followed by a name
indicating what sort of thing the packet applies to.  For example, GDB
indicating what sort of thing the packet applies to.  For example, GDB
may use a `qSymbol' packet to exchange symbol definitions with the
may use a `qSymbol' packet to exchange symbol definitions with the
stub.  These packet names follow some conventions:
stub.  These packet names follow some conventions:
   * The name must not contain commas, colons or semicolons.
   * The name must not contain commas, colons or semicolons.
   * Most GDB query and set packets have a leading upper case letter.
   * Most GDB query and set packets have a leading upper case letter.
   * The names of custom vendor packets should use a company prefix, in
   * The names of custom vendor packets should use a company prefix, in
     lower case, followed by a period.  For example, packets designed at
     lower case, followed by a period.  For example, packets designed at
     the Acme Corporation might begin with `qacme.foo' (for querying
     the Acme Corporation might begin with `qacme.foo' (for querying
     foos) or `Qacme.bar' (for setting bars).
     foos) or `Qacme.bar' (for setting bars).
   The name of a query or set packet should be separated from any
   The name of a query or set packet should be separated from any
parameters by a `:'; the parameters themselves should be separated by
parameters by a `:'; the parameters themselves should be separated by
`,' or `;'.  Stubs must be careful to match the full packet name, and
`,' or `;'.  Stubs must be careful to match the full packet name, and
check for a separator or the end of the packet, in case two packet
check for a separator or the end of the packet, in case two packet
names share a common prefix.  New packets should not begin with `qC',
names share a common prefix.  New packets should not begin with `qC',
`qP', or `qL'(1).
`qP', or `qL'(1).
   Like the descriptions of the other packets, each description here
   Like the descriptions of the other packets, each description here
has a template showing the packet's overall syntax, followed by an
has a template showing the packet's overall syntax, followed by an
explanation of the packet's meaning.  We include spaces in some of the
explanation of the packet's meaning.  We include spaces in some of the
templates for clarity; these are not part of the packet's syntax.  No
templates for clarity; these are not part of the packet's syntax.  No
GDB packet uses spaces to separate its components.
GDB packet uses spaces to separate its components.
   Here are the currently defined query and set packets:
   Here are the currently defined query and set packets:
`qC'
`qC'
     Return the current thread ID.
     Return the current thread ID.
     Reply:
     Reply:
    `QC THREAD-ID'
    `QC THREAD-ID'
          Where THREAD-ID is a thread ID as documented in *Note
          Where THREAD-ID is a thread ID as documented in *Note
          thread-id syntax::.
          thread-id syntax::.
    `(anything else)'
    `(anything else)'
          Any other reply implies the old thread ID.
          Any other reply implies the old thread ID.
`qCRC:ADDR,LENGTH'
`qCRC:ADDR,LENGTH'
     Compute the CRC checksum of a block of memory using CRC-32 defined
     Compute the CRC checksum of a block of memory using CRC-32 defined
     in IEEE 802.3.  The CRC is computed byte at a time, taking the most
     in IEEE 802.3.  The CRC is computed byte at a time, taking the most
     significant bit of each byte first.  The initial pattern code
     significant bit of each byte first.  The initial pattern code
     `0xffffffff' is used to ensure leading zeros affect the CRC.
     `0xffffffff' is used to ensure leading zeros affect the CRC.
     _Note:_ This is the same CRC used in validating separate debug
     _Note:_ This is the same CRC used in validating separate debug
     files (*note Debugging Information in Separate Files: Separate
     files (*note Debugging Information in Separate Files: Separate
     Debug Files.).  However the algorithm is slightly different.  When
     Debug Files.).  However the algorithm is slightly different.  When
     validating separate debug files, the CRC is computed taking the
     validating separate debug files, the CRC is computed taking the
     _least_ significant bit of each byte first, and the final result
     _least_ significant bit of each byte first, and the final result
     is inverted to detect trailing zeros.
     is inverted to detect trailing zeros.
     Reply:
     Reply:
    `E NN'
    `E NN'
          An error (such as memory fault)
          An error (such as memory fault)
    `C CRC32'
    `C CRC32'
          The specified memory region's checksum is CRC32.
          The specified memory region's checksum is CRC32.
`qfThreadInfo'
`qfThreadInfo'
`qsThreadInfo'
`qsThreadInfo'
     Obtain a list of all active thread IDs from the target (OS).
     Obtain a list of all active thread IDs from the target (OS).
     Since there may be too many active threads to fit into one reply
     Since there may be too many active threads to fit into one reply
     packet, this query works iteratively: it may require more than one
     packet, this query works iteratively: it may require more than one
     query/reply sequence to obtain the entire list of threads.  The
     query/reply sequence to obtain the entire list of threads.  The
     first query of the sequence will be the `qfThreadInfo' query;
     first query of the sequence will be the `qfThreadInfo' query;
     subsequent queries in the sequence will be the `qsThreadInfo'
     subsequent queries in the sequence will be the `qsThreadInfo'
     query.
     query.
     NOTE: This packet replaces the `qL' query (see below).
     NOTE: This packet replaces the `qL' query (see below).
     Reply:
     Reply:
    `m THREAD-ID'
    `m THREAD-ID'
          A single thread ID
          A single thread ID
    `m THREAD-ID,THREAD-ID...'
    `m THREAD-ID,THREAD-ID...'
          a comma-separated list of thread IDs
          a comma-separated list of thread IDs
    `l'
    `l'
          (lower case letter `L') denotes end of list.
          (lower case letter `L') denotes end of list.
     In response to each query, the target will reply with a list of
     In response to each query, the target will reply with a list of
     one or more thread IDs, separated by commas.  GDB will respond to
     one or more thread IDs, separated by commas.  GDB will respond to
     each reply with a request for more thread ids (using the `qs' form
     each reply with a request for more thread ids (using the `qs' form
     of the query), until the target responds with `l' (lower-case el,
     of the query), until the target responds with `l' (lower-case el,
     for "last").  Refer to *Note thread-id syntax::, for the format of
     for "last").  Refer to *Note thread-id syntax::, for the format of
     the THREAD-ID fields.
     the THREAD-ID fields.
`qGetTLSAddr:THREAD-ID,OFFSET,LM'
`qGetTLSAddr:THREAD-ID,OFFSET,LM'
     Fetch the address associated with thread local storage specified
     Fetch the address associated with thread local storage specified
     by THREAD-ID, OFFSET, and LM.
     by THREAD-ID, OFFSET, and LM.
     THREAD-ID is the thread ID associated with the thread for which to
     THREAD-ID is the thread ID associated with the thread for which to
     fetch the TLS address.  *Note thread-id syntax::.
     fetch the TLS address.  *Note thread-id syntax::.
     OFFSET is the (big endian, hex encoded) offset associated with the
     OFFSET is the (big endian, hex encoded) offset associated with the
     thread local variable.  (This offset is obtained from the debug
     thread local variable.  (This offset is obtained from the debug
     information associated with the variable.)
     information associated with the variable.)
     LM is the (big endian, hex encoded) OS/ABI-specific encoding of the
     LM is the (big endian, hex encoded) OS/ABI-specific encoding of the
     the load module associated with the thread local storage.  For
     the load module associated with the thread local storage.  For
     example, a GNU/Linux system will pass the link map address of the
     example, a GNU/Linux system will pass the link map address of the
     shared object associated with the thread local storage under
     shared object associated with the thread local storage under
     consideration.  Other operating environments may choose to
     consideration.  Other operating environments may choose to
     represent the load module differently, so the precise meaning of
     represent the load module differently, so the precise meaning of
     this parameter will vary.
     this parameter will vary.
     Reply:
     Reply:
    `XX...'
    `XX...'
          Hex encoded (big endian) bytes representing the address of
          Hex encoded (big endian) bytes representing the address of
          the thread local storage requested.
          the thread local storage requested.
    `E NN'
    `E NN'
          An error occurred.  NN are hex digits.
          An error occurred.  NN are hex digits.
    `'
    `'
          An empty reply indicates that `qGetTLSAddr' is not supported
          An empty reply indicates that `qGetTLSAddr' is not supported
          by the stub.
          by the stub.
`qL STARTFLAG THREADCOUNT NEXTTHREAD'
`qL STARTFLAG THREADCOUNT NEXTTHREAD'
     Obtain thread information from RTOS.  Where: STARTFLAG (one hex
     Obtain thread information from RTOS.  Where: STARTFLAG (one hex
     digit) is one to indicate the first query and zero to indicate a
     digit) is one to indicate the first query and zero to indicate a
     subsequent query; THREADCOUNT (two hex digits) is the maximum
     subsequent query; THREADCOUNT (two hex digits) is the maximum
     number of threads the response packet can contain; and NEXTTHREAD
     number of threads the response packet can contain; and NEXTTHREAD
     (eight hex digits), for subsequent queries (STARTFLAG is zero), is
     (eight hex digits), for subsequent queries (STARTFLAG is zero), is
     returned in the response as ARGTHREAD.
     returned in the response as ARGTHREAD.
     Don't use this packet; use the `qfThreadInfo' query instead (see
     Don't use this packet; use the `qfThreadInfo' query instead (see
     above).
     above).
     Reply:
     Reply:
    `qM COUNT DONE ARGTHREAD THREAD...'
    `qM COUNT DONE ARGTHREAD THREAD...'
          Where: COUNT (two hex digits) is the number of threads being
          Where: COUNT (two hex digits) is the number of threads being
          returned; DONE (one hex digit) is zero to indicate more
          returned; DONE (one hex digit) is zero to indicate more
          threads and one indicates no further threads; ARGTHREADID
          threads and one indicates no further threads; ARGTHREADID
          (eight hex digits) is NEXTTHREAD from the request packet;
          (eight hex digits) is NEXTTHREAD from the request packet;
          THREAD...  is a sequence of thread IDs from the target.
          THREAD...  is a sequence of thread IDs from the target.
          THREADID (eight hex digits).  See
          THREADID (eight hex digits).  See
          `remote.c:parse_threadlist_response()'.
          `remote.c:parse_threadlist_response()'.
`qOffsets'
`qOffsets'
     Get section offsets that the target used when relocating the
     Get section offsets that the target used when relocating the
     downloaded image.
     downloaded image.
     Reply:
     Reply:
    `Text=XXX;Data=YYY[;Bss=ZZZ]'
    `Text=XXX;Data=YYY[;Bss=ZZZ]'
          Relocate the `Text' section by XXX from its original address.
          Relocate the `Text' section by XXX from its original address.
          Relocate the `Data' section by YYY from its original address.
          Relocate the `Data' section by YYY from its original address.
          If the object file format provides segment information (e.g.
          If the object file format provides segment information (e.g.
          ELF `PT_LOAD' program headers), GDB will relocate entire
          ELF `PT_LOAD' program headers), GDB will relocate entire
          segments by the supplied offsets.
          segments by the supplied offsets.
          _Note: while a `Bss' offset may be included in the response,
          _Note: while a `Bss' offset may be included in the response,
          GDB ignores this and instead applies the `Data' offset to the
          GDB ignores this and instead applies the `Data' offset to the
          `Bss' section._
          `Bss' section._
    `TextSeg=XXX[;DataSeg=YYY]'
    `TextSeg=XXX[;DataSeg=YYY]'
          Relocate the first segment of the object file, which
          Relocate the first segment of the object file, which
          conventionally contains program code, to a starting address
          conventionally contains program code, to a starting address
          of XXX.  If `DataSeg' is specified, relocate the second
          of XXX.  If `DataSeg' is specified, relocate the second
          segment, which conventionally contains modifiable data, to a
          segment, which conventionally contains modifiable data, to a
          starting address of YYY.  GDB will report an error if the
          starting address of YYY.  GDB will report an error if the
          object file does not contain segment information, or does not
          object file does not contain segment information, or does not
          contain at least as many segments as mentioned in the reply.
          contain at least as many segments as mentioned in the reply.
          Extra segments are kept at fixed offsets relative to the last
          Extra segments are kept at fixed offsets relative to the last
          relocated segment.
          relocated segment.
`qP MODE THREAD-ID'
`qP MODE THREAD-ID'
     Returns information on THREAD-ID.  Where: MODE is a hex encoded 32
     Returns information on THREAD-ID.  Where: MODE is a hex encoded 32
     bit mode; THREAD-ID is a thread ID (*note thread-id syntax::).
     bit mode; THREAD-ID is a thread ID (*note thread-id syntax::).
     Don't use this packet; use the `qThreadExtraInfo' query instead
     Don't use this packet; use the `qThreadExtraInfo' query instead
     (see below).
     (see below).
     Reply: see `remote.c:remote_unpack_thread_info_response()'.
     Reply: see `remote.c:remote_unpack_thread_info_response()'.
`QNonStop:1'
`QNonStop:1'
`QNonStop:0'
`QNonStop:0'
     Enter non-stop (`QNonStop:1') or all-stop (`QNonStop:0') mode.
     Enter non-stop (`QNonStop:1') or all-stop (`QNonStop:0') mode.
     *Note Remote Non-Stop::, for more information.
     *Note Remote Non-Stop::, for more information.
     Reply:
     Reply:
    `OK'
    `OK'
          The request succeeded.
          The request succeeded.
    `E NN'
    `E NN'
          An error occurred.  NN are hex digits.
          An error occurred.  NN are hex digits.
    `'
    `'
          An empty reply indicates that `QNonStop' is not supported by
          An empty reply indicates that `QNonStop' is not supported by
          the stub.
          the stub.
     This packet is not probed by default; the remote stub must request
     This packet is not probed by default; the remote stub must request
     it, by supplying an appropriate `qSupported' response (*note
     it, by supplying an appropriate `qSupported' response (*note
     qSupported::).  Use of this packet is controlled by the `set
     qSupported::).  Use of this packet is controlled by the `set
     non-stop' command; *note Non-Stop Mode::.
     non-stop' command; *note Non-Stop Mode::.
`QPassSignals: SIGNAL [;SIGNAL]...'
`QPassSignals: SIGNAL [;SIGNAL]...'
     Each listed SIGNAL should be passed directly to the inferior
     Each listed SIGNAL should be passed directly to the inferior
     process.  Signals are numbered identically to continue packets and
     process.  Signals are numbered identically to continue packets and
     stop replies (*note Stop Reply Packets::).  Each SIGNAL list item
     stop replies (*note Stop Reply Packets::).  Each SIGNAL list item
     should be strictly greater than the previous item.  These signals
     should be strictly greater than the previous item.  These signals
     do not need to stop the inferior, or be reported to GDB.  All
     do not need to stop the inferior, or be reported to GDB.  All
     other signals should be reported to GDB.  Multiple `QPassSignals'
     other signals should be reported to GDB.  Multiple `QPassSignals'
     packets do not combine; any earlier `QPassSignals' list is
     packets do not combine; any earlier `QPassSignals' list is
     completely replaced by the new list.  This packet improves
     completely replaced by the new list.  This packet improves
     performance when using `handle SIGNAL nostop noprint pass'.
     performance when using `handle SIGNAL nostop noprint pass'.
     Reply:
     Reply:
    `OK'
    `OK'
          The request succeeded.
          The request succeeded.
    `E NN'
    `E NN'
          An error occurred.  NN are hex digits.
          An error occurred.  NN are hex digits.
    `'
    `'
          An empty reply indicates that `QPassSignals' is not supported
          An empty reply indicates that `QPassSignals' is not supported
          by the stub.
          by the stub.
     Use of this packet is controlled by the `set remote pass-signals'
     Use of this packet is controlled by the `set remote pass-signals'
     command (*note set remote pass-signals: Remote Configuration.).
     command (*note set remote pass-signals: Remote Configuration.).
     This packet is not probed by default; the remote stub must request
     This packet is not probed by default; the remote stub must request
     it, by supplying an appropriate `qSupported' response (*note
     it, by supplying an appropriate `qSupported' response (*note
     qSupported::).
     qSupported::).
`qRcmd,COMMAND'
`qRcmd,COMMAND'
     COMMAND (hex encoded) is passed to the local interpreter for
     COMMAND (hex encoded) is passed to the local interpreter for
     execution.  Invalid commands should be reported using the output
     execution.  Invalid commands should be reported using the output
     string.  Before the final result packet, the target may also
     string.  Before the final result packet, the target may also
     respond with a number of intermediate `OOUTPUT' console output
     respond with a number of intermediate `OOUTPUT' console output
     packets.  _Implementors should note that providing access to a
     packets.  _Implementors should note that providing access to a
     stubs's interpreter may have security implications_.
     stubs's interpreter may have security implications_.
     Reply:
     Reply:
    `OK'
    `OK'
          A command response with no output.
          A command response with no output.
    `OUTPUT'
    `OUTPUT'
          A command response with the hex encoded output string OUTPUT.
          A command response with the hex encoded output string OUTPUT.
    `E NN'
    `E NN'
          Indicate a badly formed request.
          Indicate a badly formed request.
    `'
    `'
          An empty reply indicates that `qRcmd' is not recognized.
          An empty reply indicates that `qRcmd' is not recognized.
     (Note that the `qRcmd' packet's name is separated from the command
     (Note that the `qRcmd' packet's name is separated from the command
     by a `,', not a `:', contrary to the naming conventions above.
     by a `,', not a `:', contrary to the naming conventions above.
     Please don't use this packet as a model for new packets.)
     Please don't use this packet as a model for new packets.)
`qSearch:memory:ADDRESS;LENGTH;SEARCH-PATTERN'
`qSearch:memory:ADDRESS;LENGTH;SEARCH-PATTERN'
     Search LENGTH bytes at ADDRESS for SEARCH-PATTERN.  ADDRESS and
     Search LENGTH bytes at ADDRESS for SEARCH-PATTERN.  ADDRESS and
     LENGTH are encoded in hex.  SEARCH-PATTERN is a sequence of bytes,
     LENGTH are encoded in hex.  SEARCH-PATTERN is a sequence of bytes,
     hex encoded.
     hex encoded.
     Reply:
     Reply:
    `0'
    `0'
          The pattern was not found.
          The pattern was not found.
    `1,address'
    `1,address'
          The pattern was found at ADDRESS.
          The pattern was found at ADDRESS.
    `E NN'
    `E NN'
          A badly formed request or an error was encountered while
          A badly formed request or an error was encountered while
          searching memory.
          searching memory.
    `'
    `'
          An empty reply indicates that `qSearch:memory' is not
          An empty reply indicates that `qSearch:memory' is not
          recognized.
          recognized.
`QStartNoAckMode'
`QStartNoAckMode'
     Request that the remote stub disable the normal `+'/`-' protocol
     Request that the remote stub disable the normal `+'/`-' protocol
     acknowledgments (*note Packet Acknowledgment::).
     acknowledgments (*note Packet Acknowledgment::).
     Reply:
     Reply:
    `OK'
    `OK'
          The stub has switched to no-acknowledgment mode.  GDB
          The stub has switched to no-acknowledgment mode.  GDB
          acknowledges this reponse, but neither the stub nor GDB shall
          acknowledges this reponse, but neither the stub nor GDB shall
          send or expect further `+'/`-' acknowledgments in the current
          send or expect further `+'/`-' acknowledgments in the current
          connection.
          connection.
    `'
    `'
          An empty reply indicates that the stub does not support
          An empty reply indicates that the stub does not support
          no-acknowledgment mode.
          no-acknowledgment mode.
`qSupported [:GDBFEATURE [;GDBFEATURE]... ]'
`qSupported [:GDBFEATURE [;GDBFEATURE]... ]'
     Tell the remote stub about features supported by GDB, and query
     Tell the remote stub about features supported by GDB, and query
     the stub for features it supports.  This packet allows GDB and the
     the stub for features it supports.  This packet allows GDB and the
     remote stub to take advantage of each others' features.
     remote stub to take advantage of each others' features.
     `qSupported' also consolidates multiple feature probes at startup,
     `qSupported' also consolidates multiple feature probes at startup,
     to improve GDB performance--a single larger packet performs better
     to improve GDB performance--a single larger packet performs better
     than multiple smaller probe packets on high-latency links.  Some
     than multiple smaller probe packets on high-latency links.  Some
     features may enable behavior which must not be on by default, e.g.
     features may enable behavior which must not be on by default, e.g.
     because it would confuse older clients or stubs.  Other features
     because it would confuse older clients or stubs.  Other features
     may describe packets which could be automatically probed for, but
     may describe packets which could be automatically probed for, but
     are not.  These features must be reported before GDB will use
     are not.  These features must be reported before GDB will use
     them.  This "default unsupported" behavior is not appropriate for
     them.  This "default unsupported" behavior is not appropriate for
     all packets, but it helps to keep the initial connection time
     all packets, but it helps to keep the initial connection time
     under control with new versions of GDB which support increasing
     under control with new versions of GDB which support increasing
     numbers of packets.
     numbers of packets.
     Reply:
     Reply:
    `STUBFEATURE [;STUBFEATURE]...'
    `STUBFEATURE [;STUBFEATURE]...'
          The stub supports or does not support each returned
          The stub supports or does not support each returned
          STUBFEATURE, depending on the form of each STUBFEATURE (see
          STUBFEATURE, depending on the form of each STUBFEATURE (see
          below for the possible forms).
          below for the possible forms).
    `'
    `'
          An empty reply indicates that `qSupported' is not recognized,
          An empty reply indicates that `qSupported' is not recognized,
          or that no features needed to be reported to GDB.
          or that no features needed to be reported to GDB.
     The allowed forms for each feature (either a GDBFEATURE in the
     The allowed forms for each feature (either a GDBFEATURE in the
     `qSupported' packet, or a STUBFEATURE in the response) are:
     `qSupported' packet, or a STUBFEATURE in the response) are:
    `NAME=VALUE'
    `NAME=VALUE'
          The remote protocol feature NAME is supported, and associated
          The remote protocol feature NAME is supported, and associated
          with the specified VALUE.  The format of VALUE depends on the
          with the specified VALUE.  The format of VALUE depends on the
          feature, but it must not include a semicolon.
          feature, but it must not include a semicolon.
    `NAME+'
    `NAME+'
          The remote protocol feature NAME is supported, and does not
          The remote protocol feature NAME is supported, and does not
          need an associated value.
          need an associated value.
    `NAME-'
    `NAME-'
          The remote protocol feature NAME is not supported.
          The remote protocol feature NAME is not supported.
    `NAME?'
    `NAME?'
          The remote protocol feature NAME may be supported, and GDB
          The remote protocol feature NAME may be supported, and GDB
          should auto-detect support in some other way when it is
          should auto-detect support in some other way when it is
          needed.  This form will not be used for GDBFEATURE
          needed.  This form will not be used for GDBFEATURE
          notifications, but may be used for STUBFEATURE responses.
          notifications, but may be used for STUBFEATURE responses.
     Whenever the stub receives a `qSupported' request, the supplied
     Whenever the stub receives a `qSupported' request, the supplied
     set of GDB features should override any previous request.  This
     set of GDB features should override any previous request.  This
     allows GDB to put the stub in a known state, even if the stub had
     allows GDB to put the stub in a known state, even if the stub had
     previously been communicating with a different version of GDB.
     previously been communicating with a different version of GDB.
     The following values of GDBFEATURE (for the packet sent by GDB)
     The following values of GDBFEATURE (for the packet sent by GDB)
     are defined:
     are defined:
    `multiprocess'
    `multiprocess'
          This feature indicates whether GDB supports multiprocess
          This feature indicates whether GDB supports multiprocess
          extensions to the remote protocol.  GDB does not use such
          extensions to the remote protocol.  GDB does not use such
          extensions unless the stub also reports that it supports them
          extensions unless the stub also reports that it supports them
          by including `multiprocess+' in its `qSupported' reply.
          by including `multiprocess+' in its `qSupported' reply.
          *Note multiprocess extensions::, for details.
          *Note multiprocess extensions::, for details.
     Stubs should ignore any unknown values for GDBFEATURE.  Any GDB
     Stubs should ignore any unknown values for GDBFEATURE.  Any GDB
     which sends a `qSupported' packet supports receiving packets of
     which sends a `qSupported' packet supports receiving packets of
     unlimited length (earlier versions of GDB may reject overly long
     unlimited length (earlier versions of GDB may reject overly long
     responses).  Additional values for GDBFEATURE may be defined in
     responses).  Additional values for GDBFEATURE may be defined in
     the future to let the stub take advantage of new features in GDB,
     the future to let the stub take advantage of new features in GDB,
     e.g. incompatible improvements in the remote protocol--the
     e.g. incompatible improvements in the remote protocol--the
     `multiprocess' feature is an example of such a feature.  The
     `multiprocess' feature is an example of such a feature.  The
     stub's reply should be independent of the GDBFEATURE entries sent
     stub's reply should be independent of the GDBFEATURE entries sent
     by GDB; first GDB describes all the features it supports, and then
     by GDB; first GDB describes all the features it supports, and then
     the stub replies with all the features it supports.
     the stub replies with all the features it supports.
     Similarly, GDB will silently ignore unrecognized stub feature
     Similarly, GDB will silently ignore unrecognized stub feature
     responses, as long as each response uses one of the standard forms.
     responses, as long as each response uses one of the standard forms.
     Some features are flags.  A stub which supports a flag feature
     Some features are flags.  A stub which supports a flag feature
     should respond with a `+' form response.  Other features require
     should respond with a `+' form response.  Other features require
     values, and the stub should respond with an `=' form response.
     values, and the stub should respond with an `=' form response.
     Each feature has a default value, which GDB will use if
     Each feature has a default value, which GDB will use if
     `qSupported' is not available or if the feature is not mentioned
     `qSupported' is not available or if the feature is not mentioned
     in the `qSupported' response.  The default values are fixed; a
     in the `qSupported' response.  The default values are fixed; a
     stub is free to omit any feature responses that match the defaults.
     stub is free to omit any feature responses that match the defaults.
     Not all features can be probed, but for those which can, the
     Not all features can be probed, but for those which can, the
     probing mechanism is useful: in some cases, a stub's internal
     probing mechanism is useful: in some cases, a stub's internal
     architecture may not allow the protocol layer to know some
     architecture may not allow the protocol layer to know some
     information about the underlying target in advance.  This is
     information about the underlying target in advance.  This is
     especially common in stubs which may be configured for multiple
     especially common in stubs which may be configured for multiple
     targets.
     targets.
     These are the currently defined stub features and their properties:
     These are the currently defined stub features and their properties:
     Feature Name            Value         Default  Probe Allowed
     Feature Name            Value         Default  Probe Allowed
                             Required
                             Required
     `PacketSize'            Yes           `-'      No
     `PacketSize'            Yes           `-'      No
     `qXfer:auxv:read'       No            `-'      Yes
     `qXfer:auxv:read'       No            `-'      Yes
     `qXfer:features:read'   No            `-'      Yes
     `qXfer:features:read'   No            `-'      Yes
     `qXfer:libraries:read'  No            `-'      Yes
     `qXfer:libraries:read'  No            `-'      Yes
     `qXfer:memory-map:read' No            `-'      Yes
     `qXfer:memory-map:read' No            `-'      Yes
     `qXfer:spu:read'        No            `-'      Yes
     `qXfer:spu:read'        No            `-'      Yes
     `qXfer:spu:write'       No            `-'      Yes
     `qXfer:spu:write'       No            `-'      Yes
     `qXfer:siginfo:read'    No            `-'      Yes
     `qXfer:siginfo:read'    No            `-'      Yes
     `qXfer:siginfo:write'   No            `-'      Yes
     `qXfer:siginfo:write'   No            `-'      Yes
     `qXfer:threads:read'    No            `-'      Yes
     `qXfer:threads:read'    No            `-'      Yes
     `QNonStop'              No            `-'      Yes
     `QNonStop'              No            `-'      Yes
     `QPassSignals'          No            `-'      Yes
     `QPassSignals'          No            `-'      Yes
     `QStartNoAckMode'       No            `-'      Yes
     `QStartNoAckMode'       No            `-'      Yes
     `multiprocess'          No            `-'      No
     `multiprocess'          No            `-'      No
     `ConditionalTracepoints'No            `-'      No
     `ConditionalTracepoints'No            `-'      No
     `ReverseContinue'       No            `-'      No
     `ReverseContinue'       No            `-'      No
     `ReverseStep'           No            `-'      No
     `ReverseStep'           No            `-'      No
     These are the currently defined stub features, in more detail:
     These are the currently defined stub features, in more detail:
    `PacketSize=BYTES'
    `PacketSize=BYTES'
          The remote stub can accept packets up to at least BYTES in
          The remote stub can accept packets up to at least BYTES in
          length.  GDB will send packets up to this size for bulk
          length.  GDB will send packets up to this size for bulk
          transfers, and will never send larger packets.  This is a
          transfers, and will never send larger packets.  This is a
          limit on the data characters in the packet, including the
          limit on the data characters in the packet, including the
          frame and checksum.  There is no trailing NUL byte in a
          frame and checksum.  There is no trailing NUL byte in a
          remote protocol packet; if the stub stores packets in a
          remote protocol packet; if the stub stores packets in a
          NUL-terminated format, it should allow an extra byte in its
          NUL-terminated format, it should allow an extra byte in its
          buffer for the NUL.  If this stub feature is not supported,
          buffer for the NUL.  If this stub feature is not supported,
          GDB guesses based on the size of the `g' packet response.
          GDB guesses based on the size of the `g' packet response.
    `qXfer:auxv:read'
    `qXfer:auxv:read'
          The remote stub understands the `qXfer:auxv:read' packet
          The remote stub understands the `qXfer:auxv:read' packet
          (*note qXfer auxiliary vector read::).
          (*note qXfer auxiliary vector read::).
    `qXfer:features:read'
    `qXfer:features:read'
          The remote stub understands the `qXfer:features:read' packet
          The remote stub understands the `qXfer:features:read' packet
          (*note qXfer target description read::).
          (*note qXfer target description read::).
    `qXfer:libraries:read'
    `qXfer:libraries:read'
          The remote stub understands the `qXfer:libraries:read' packet
          The remote stub understands the `qXfer:libraries:read' packet
          (*note qXfer library list read::).
          (*note qXfer library list read::).
    `qXfer:memory-map:read'
    `qXfer:memory-map:read'
          The remote stub understands the `qXfer:memory-map:read' packet
          The remote stub understands the `qXfer:memory-map:read' packet
          (*note qXfer memory map read::).
          (*note qXfer memory map read::).
    `qXfer:spu:read'
    `qXfer:spu:read'
          The remote stub understands the `qXfer:spu:read' packet
          The remote stub understands the `qXfer:spu:read' packet
          (*note qXfer spu read::).
          (*note qXfer spu read::).
    `qXfer:spu:write'
    `qXfer:spu:write'
          The remote stub understands the `qXfer:spu:write' packet
          The remote stub understands the `qXfer:spu:write' packet
          (*note qXfer spu write::).
          (*note qXfer spu write::).
    `qXfer:siginfo:read'
    `qXfer:siginfo:read'
          The remote stub understands the `qXfer:siginfo:read' packet
          The remote stub understands the `qXfer:siginfo:read' packet
          (*note qXfer siginfo read::).
          (*note qXfer siginfo read::).
    `qXfer:siginfo:write'
    `qXfer:siginfo:write'
          The remote stub understands the `qXfer:siginfo:write' packet
          The remote stub understands the `qXfer:siginfo:write' packet
          (*note qXfer siginfo write::).
          (*note qXfer siginfo write::).
    `qXfer:threads:read'
    `qXfer:threads:read'
          The remote stub understands the `qXfer:threads:read' packet
          The remote stub understands the `qXfer:threads:read' packet
          (*note qXfer threads read::).
          (*note qXfer threads read::).
    `QNonStop'
    `QNonStop'
          The remote stub understands the `QNonStop' packet (*note
          The remote stub understands the `QNonStop' packet (*note
          QNonStop::).
          QNonStop::).
    `QPassSignals'
    `QPassSignals'
          The remote stub understands the `QPassSignals' packet (*note
          The remote stub understands the `QPassSignals' packet (*note
          QPassSignals::).
          QPassSignals::).
    `QStartNoAckMode'
    `QStartNoAckMode'
          The remote stub understands the `QStartNoAckMode' packet and
          The remote stub understands the `QStartNoAckMode' packet and
          prefers to operate in no-acknowledgment mode.  *Note Packet
          prefers to operate in no-acknowledgment mode.  *Note Packet
          Acknowledgment::.
          Acknowledgment::.
    `multiprocess'
    `multiprocess'
          The remote stub understands the multiprocess extensions to
          The remote stub understands the multiprocess extensions to
          the remote protocol syntax.  The multiprocess extensions
          the remote protocol syntax.  The multiprocess extensions
          affect the syntax of thread IDs in both packets and replies
          affect the syntax of thread IDs in both packets and replies
          (*note thread-id syntax::), and add process IDs to the `D'
          (*note thread-id syntax::), and add process IDs to the `D'
          packet and `W' and `X' replies.  Note that reporting this
          packet and `W' and `X' replies.  Note that reporting this
          feature indicates support for the syntactic extensions only,
          feature indicates support for the syntactic extensions only,
          not that the stub necessarily supports debugging of more than
          not that the stub necessarily supports debugging of more than
          one process at a time.  The stub must not use multiprocess
          one process at a time.  The stub must not use multiprocess
          extensions in packet replies unless GDB has also indicated it
          extensions in packet replies unless GDB has also indicated it
          supports them in its `qSupported' request.
          supports them in its `qSupported' request.
    `qXfer:osdata:read'
    `qXfer:osdata:read'
          The remote stub understands the `qXfer:osdata:read' packet
          The remote stub understands the `qXfer:osdata:read' packet
          ((*note qXfer osdata read::).
          ((*note qXfer osdata read::).
    `ConditionalTracepoints'
    `ConditionalTracepoints'
          The remote stub accepts and implements conditional
          The remote stub accepts and implements conditional
          expressions defined for tracepoints (*note Tracepoint
          expressions defined for tracepoints (*note Tracepoint
          Conditions::).
          Conditions::).
    `ReverseContinue'
    `ReverseContinue'
          The remote stub accepts and implements the reverse continue
          The remote stub accepts and implements the reverse continue
          packet (*note bc::).
          packet (*note bc::).
    `ReverseStep'
    `ReverseStep'
          The remote stub accepts and implements the reverse step packet
          The remote stub accepts and implements the reverse step packet
          (*note bs::).
          (*note bs::).
`qSymbol::'
`qSymbol::'
     Notify the target that GDB is prepared to serve symbol lookup
     Notify the target that GDB is prepared to serve symbol lookup
     requests.  Accept requests from the target for the values of
     requests.  Accept requests from the target for the values of
     symbols.
     symbols.
     Reply:
     Reply:
    `OK'
    `OK'
          The target does not need to look up any (more) symbols.
          The target does not need to look up any (more) symbols.
    `qSymbol:SYM_NAME'
    `qSymbol:SYM_NAME'
          The target requests the value of symbol SYM_NAME (hex
          The target requests the value of symbol SYM_NAME (hex
          encoded).  GDB may provide the value by using the
          encoded).  GDB may provide the value by using the
          `qSymbol:SYM_VALUE:SYM_NAME' message, described below.
          `qSymbol:SYM_VALUE:SYM_NAME' message, described below.
`qSymbol:SYM_VALUE:SYM_NAME'
`qSymbol:SYM_VALUE:SYM_NAME'
     Set the value of SYM_NAME to SYM_VALUE.
     Set the value of SYM_NAME to SYM_VALUE.
     SYM_NAME (hex encoded) is the name of a symbol whose value the
     SYM_NAME (hex encoded) is the name of a symbol whose value the
     target has previously requested.
     target has previously requested.
     SYM_VALUE (hex) is the value for symbol SYM_NAME.  If GDB cannot
     SYM_VALUE (hex) is the value for symbol SYM_NAME.  If GDB cannot
     supply a value for SYM_NAME, then this field will be empty.
     supply a value for SYM_NAME, then this field will be empty.
     Reply:
     Reply:
    `OK'
    `OK'
          The target does not need to look up any (more) symbols.
          The target does not need to look up any (more) symbols.
    `qSymbol:SYM_NAME'
    `qSymbol:SYM_NAME'
          The target requests the value of a new symbol SYM_NAME (hex
          The target requests the value of a new symbol SYM_NAME (hex
          encoded).  GDB will continue to supply the values of symbols
          encoded).  GDB will continue to supply the values of symbols
          (if available), until the target ceases to request them.
          (if available), until the target ceases to request them.
`qTBuffer'
`qTBuffer'
`QTDisconnected'
`QTDisconnected'
`QTDP'
`QTDP'
`QTDV'
`QTDV'
`qTfP'
`qTfP'
`qTfV'
`qTfV'
`QTFrame'
`QTFrame'
     *Note Tracepoint Packets::.
     *Note Tracepoint Packets::.
`qThreadExtraInfo,THREAD-ID'
`qThreadExtraInfo,THREAD-ID'
     Obtain a printable string description of a thread's attributes from
     Obtain a printable string description of a thread's attributes from
     the target OS.  THREAD-ID is a thread ID; see *Note thread-id
     the target OS.  THREAD-ID is a thread ID; see *Note thread-id
     syntax::.  This string may contain anything that the target OS
     syntax::.  This string may contain anything that the target OS
     thinks is interesting for GDB to tell the user about the thread.
     thinks is interesting for GDB to tell the user about the thread.
     The string is displayed in GDB's `info threads' display.  Some
     The string is displayed in GDB's `info threads' display.  Some
     examples of possible thread extra info strings are `Runnable', or
     examples of possible thread extra info strings are `Runnable', or
     `Blocked on Mutex'.
     `Blocked on Mutex'.
     Reply:
     Reply:
    `XX...'
    `XX...'
          Where `XX...' is a hex encoding of ASCII data, comprising the
          Where `XX...' is a hex encoding of ASCII data, comprising the
          printable string containing the extra information about the
          printable string containing the extra information about the
          thread's attributes.
          thread's attributes.
     (Note that the `qThreadExtraInfo' packet's name is separated from
     (Note that the `qThreadExtraInfo' packet's name is separated from
     the command by a `,', not a `:', contrary to the naming
     the command by a `,', not a `:', contrary to the naming
     conventions above.  Please don't use this packet as a model for new
     conventions above.  Please don't use this packet as a model for new
     packets.)
     packets.)
`QTSave'
`QTSave'
`qTsP'
`qTsP'
`qTsV'
`qTsV'
`QTStart'
`QTStart'
`QTStop'
`QTStop'
`QTinit'
`QTinit'
`QTro'
`QTro'
`qTStatus'
`qTStatus'
`qTV'
`qTV'
     *Note Tracepoint Packets::.
     *Note Tracepoint Packets::.
`qXfer:OBJECT:read:ANNEX:OFFSET,LENGTH'
`qXfer:OBJECT:read:ANNEX:OFFSET,LENGTH'
     Read uninterpreted bytes from the target's special data area
     Read uninterpreted bytes from the target's special data area
     identified by the keyword OBJECT.  Request LENGTH bytes starting
     identified by the keyword OBJECT.  Request LENGTH bytes starting
     at OFFSET bytes into the data.  The content and encoding of ANNEX
     at OFFSET bytes into the data.  The content and encoding of ANNEX
     is specific to OBJECT; it can supply additional details about what
     is specific to OBJECT; it can supply additional details about what
     data to access.
     data to access.
     Here are the specific requests of this form defined so far.  All
     Here are the specific requests of this form defined so far.  All
     `qXfer:OBJECT:read:...' requests use the same reply formats,
     `qXfer:OBJECT:read:...' requests use the same reply formats,
     listed below.
     listed below.
    `qXfer:auxv:read::OFFSET,LENGTH'
    `qXfer:auxv:read::OFFSET,LENGTH'
          Access the target's "auxiliary vector".  *Note auxiliary
          Access the target's "auxiliary vector".  *Note auxiliary
          vector: OS Information.  Note ANNEX must be empty.
          vector: OS Information.  Note ANNEX must be empty.
          This packet is not probed by default; the remote stub must
          This packet is not probed by default; the remote stub must
          request it, by supplying an appropriate `qSupported' response
          request it, by supplying an appropriate `qSupported' response
          (*note qSupported::).
          (*note qSupported::).
    `qXfer:features:read:ANNEX:OFFSET,LENGTH'
    `qXfer:features:read:ANNEX:OFFSET,LENGTH'
          Access the "target description".  *Note Target
          Access the "target description".  *Note Target
          Descriptions::.  The annex specifies which XML document to
          Descriptions::.  The annex specifies which XML document to
          access.  The main description is always loaded from the
          access.  The main description is always loaded from the
          `target.xml' annex.
          `target.xml' annex.
          This packet is not probed by default; the remote stub must
          This packet is not probed by default; the remote stub must
          request it, by supplying an appropriate `qSupported' response
          request it, by supplying an appropriate `qSupported' response
          (*note qSupported::).
          (*note qSupported::).
    `qXfer:libraries:read:ANNEX:OFFSET,LENGTH'
    `qXfer:libraries:read:ANNEX:OFFSET,LENGTH'
          Access the target's list of loaded libraries.  *Note Library
          Access the target's list of loaded libraries.  *Note Library
          List Format::.  The annex part of the generic `qXfer' packet
          List Format::.  The annex part of the generic `qXfer' packet
          must be empty (*note qXfer read::).
          must be empty (*note qXfer read::).
          Targets which maintain a list of libraries in the program's
          Targets which maintain a list of libraries in the program's
          memory do not need to implement this packet; it is designed
          memory do not need to implement this packet; it is designed
          for platforms where the operating system manages the list of
          for platforms where the operating system manages the list of
          loaded libraries.
          loaded libraries.
          This packet is not probed by default; the remote stub must
          This packet is not probed by default; the remote stub must
          request it, by supplying an appropriate `qSupported' response
          request it, by supplying an appropriate `qSupported' response
          (*note qSupported::).
          (*note qSupported::).
    `qXfer:memory-map:read::OFFSET,LENGTH'
    `qXfer:memory-map:read::OFFSET,LENGTH'
          Access the target's "memory-map".  *Note Memory Map Format::.
          Access the target's "memory-map".  *Note Memory Map Format::.
          The annex part of the generic `qXfer' packet must be empty
          The annex part of the generic `qXfer' packet must be empty
          (*note qXfer read::).
          (*note qXfer read::).
          This packet is not probed by default; the remote stub must
          This packet is not probed by default; the remote stub must
          request it, by supplying an appropriate `qSupported' response
          request it, by supplying an appropriate `qSupported' response
          (*note qSupported::).
          (*note qSupported::).
    `qXfer:siginfo:read::OFFSET,LENGTH'
    `qXfer:siginfo:read::OFFSET,LENGTH'
          Read contents of the extra signal information on the target
          Read contents of the extra signal information on the target
          system.  The annex part of the generic `qXfer' packet must be
          system.  The annex part of the generic `qXfer' packet must be
          empty (*note qXfer read::).
          empty (*note qXfer read::).
          This packet is not probed by default; the remote stub must
          This packet is not probed by default; the remote stub must
          request it, by supplying an appropriate `qSupported' response
          request it, by supplying an appropriate `qSupported' response
          (*note qSupported::).
          (*note qSupported::).
    `qXfer:spu:read:ANNEX:OFFSET,LENGTH'
    `qXfer:spu:read:ANNEX:OFFSET,LENGTH'
          Read contents of an `spufs' file on the target system.  The
          Read contents of an `spufs' file on the target system.  The
          annex specifies which file to read; it must be of the form
          annex specifies which file to read; it must be of the form
          `ID/NAME', where ID specifies an SPU context ID in the target
          `ID/NAME', where ID specifies an SPU context ID in the target
          process, and NAME identifes the `spufs' file in that context
          process, and NAME identifes the `spufs' file in that context
          to be accessed.
          to be accessed.
          This packet is not probed by default; the remote stub must
          This packet is not probed by default; the remote stub must
          request it, by supplying an appropriate `qSupported' response
          request it, by supplying an appropriate `qSupported' response
          (*note qSupported::).
          (*note qSupported::).
    `qXfer:threads:read::OFFSET,LENGTH'
    `qXfer:threads:read::OFFSET,LENGTH'
          Access the list of threads on target.  *Note Thread List
          Access the list of threads on target.  *Note Thread List
          Format::.  The annex part of the generic `qXfer' packet must
          Format::.  The annex part of the generic `qXfer' packet must
          be empty (*note qXfer read::).
          be empty (*note qXfer read::).
          This packet is not probed by default; the remote stub must
          This packet is not probed by default; the remote stub must
          request it, by supplying an appropriate `qSupported' response
          request it, by supplying an appropriate `qSupported' response
          (*note qSupported::).
          (*note qSupported::).
    `qXfer:osdata:read::OFFSET,LENGTH'
    `qXfer:osdata:read::OFFSET,LENGTH'
          Access the target's "operating system information".  *Note
          Access the target's "operating system information".  *Note
          Operating System Information::.
          Operating System Information::.
     Reply:
     Reply:
    `m DATA'
    `m DATA'
          Data DATA (*note Binary Data::) has been read from the
          Data DATA (*note Binary Data::) has been read from the
          target.  There may be more data at a higher address (although
          target.  There may be more data at a higher address (although
          it is permitted to return `m' even for the last valid block
          it is permitted to return `m' even for the last valid block
          of data, as long as at least one byte of data was read).
          of data, as long as at least one byte of data was read).
          DATA may have fewer bytes than the LENGTH in the request.
          DATA may have fewer bytes than the LENGTH in the request.
    `l DATA'
    `l DATA'
          Data DATA (*note Binary Data::) has been read from the target.
          Data DATA (*note Binary Data::) has been read from the target.
          There is no more data to be read.  DATA may have fewer bytes
          There is no more data to be read.  DATA may have fewer bytes
          than the LENGTH in the request.
          than the LENGTH in the request.
    `l'
    `l'
          The OFFSET in the request is at the end of the data.  There
          The OFFSET in the request is at the end of the data.  There
          is no more data to be read.
          is no more data to be read.
    `E00'
    `E00'
          The request was malformed, or ANNEX was invalid.
          The request was malformed, or ANNEX was invalid.
    `E NN'
    `E NN'
          The offset was invalid, or there was an error encountered
          The offset was invalid, or there was an error encountered
          reading the data.  NN is a hex-encoded `errno' value.
          reading the data.  NN is a hex-encoded `errno' value.
    `'
    `'
          An empty reply indicates the OBJECT string was not recognized
          An empty reply indicates the OBJECT string was not recognized
          by the stub, or that the object does not support reading.
          by the stub, or that the object does not support reading.
`qXfer:OBJECT:write:ANNEX:OFFSET:DATA...'
`qXfer:OBJECT:write:ANNEX:OFFSET:DATA...'
     Write uninterpreted bytes into the target's special data area
     Write uninterpreted bytes into the target's special data area
     identified by the keyword OBJECT, starting at OFFSET bytes into
     identified by the keyword OBJECT, starting at OFFSET bytes into
     the data.  DATA... is the binary-encoded data (*note Binary
     the data.  DATA... is the binary-encoded data (*note Binary
     Data::) to be written.  The content and encoding of ANNEX is
     Data::) to be written.  The content and encoding of ANNEX is
     specific to OBJECT; it can supply additional details about what
     specific to OBJECT; it can supply additional details about what
     data to access.
     data to access.
     Here are the specific requests of this form defined so far.  All
     Here are the specific requests of this form defined so far.  All
     `qXfer:OBJECT:write:...' requests use the same reply formats,
     `qXfer:OBJECT:write:...' requests use the same reply formats,
     listed below.
     listed below.
    `qXfer:siginfo:write::OFFSET:DATA...'
    `qXfer:siginfo:write::OFFSET:DATA...'
          Write DATA to the extra signal information on the target
          Write DATA to the extra signal information on the target
          system.  The annex part of the generic `qXfer' packet must be
          system.  The annex part of the generic `qXfer' packet must be
          empty (*note qXfer write::).
          empty (*note qXfer write::).
          This packet is not probed by default; the remote stub must
          This packet is not probed by default; the remote stub must
          request it, by supplying an appropriate `qSupported' response
          request it, by supplying an appropriate `qSupported' response
          (*note qSupported::).
          (*note qSupported::).
    `qXfer:spu:write:ANNEX:OFFSET:DATA...'
    `qXfer:spu:write:ANNEX:OFFSET:DATA...'
          Write DATA to an `spufs' file on the target system.  The
          Write DATA to an `spufs' file on the target system.  The
          annex specifies which file to write; it must be of the form
          annex specifies which file to write; it must be of the form
          `ID/NAME', where ID specifies an SPU context ID in the target
          `ID/NAME', where ID specifies an SPU context ID in the target
          process, and NAME identifes the `spufs' file in that context
          process, and NAME identifes the `spufs' file in that context
          to be accessed.
          to be accessed.
          This packet is not probed by default; the remote stub must
          This packet is not probed by default; the remote stub must
          request it, by supplying an appropriate `qSupported' response
          request it, by supplying an appropriate `qSupported' response
          (*note qSupported::).
          (*note qSupported::).
     Reply:
     Reply:
    `NN'
    `NN'
          NN (hex encoded) is the number of bytes written.  This may be
          NN (hex encoded) is the number of bytes written.  This may be
          fewer bytes than supplied in the request.
          fewer bytes than supplied in the request.
    `E00'
    `E00'
          The request was malformed, or ANNEX was invalid.
          The request was malformed, or ANNEX was invalid.
    `E NN'
    `E NN'
          The offset was invalid, or there was an error encountered
          The offset was invalid, or there was an error encountered
          writing the data.  NN is a hex-encoded `errno' value.
          writing the data.  NN is a hex-encoded `errno' value.
    `'
    `'
          An empty reply indicates the OBJECT string was not recognized
          An empty reply indicates the OBJECT string was not recognized
          by the stub, or that the object does not support writing.
          by the stub, or that the object does not support writing.
`qXfer:OBJECT:OPERATION:...'
`qXfer:OBJECT:OPERATION:...'
     Requests of this form may be added in the future.  When a stub does
     Requests of this form may be added in the future.  When a stub does
     not recognize the OBJECT keyword, or its support for OBJECT does
     not recognize the OBJECT keyword, or its support for OBJECT does
     not recognize the OPERATION keyword, the stub must respond with an
     not recognize the OPERATION keyword, the stub must respond with an
     empty packet.
     empty packet.
`qAttached:PID'
`qAttached:PID'
     Return an indication of whether the remote server attached to an
     Return an indication of whether the remote server attached to an
     existing process or created a new process.  When the multiprocess
     existing process or created a new process.  When the multiprocess
     protocol extensions are supported (*note multiprocess
     protocol extensions are supported (*note multiprocess
     extensions::), PID is an integer in hexadecimal format identifying
     extensions::), PID is an integer in hexadecimal format identifying
     the target process.  Otherwise, GDB will omit the PID field and
     the target process.  Otherwise, GDB will omit the PID field and
     the query packet will be simplified as `qAttached'.
     the query packet will be simplified as `qAttached'.
     This query is used, for example, to know whether the remote process
     This query is used, for example, to know whether the remote process
     should be detached or killed when a GDB session is ended with the
     should be detached or killed when a GDB session is ended with the
     `quit' command.
     `quit' command.
     Reply:
     Reply:
    `1'
    `1'
          The remote server attached to an existing process.
          The remote server attached to an existing process.
    `0'
    `0'
          The remote server created a new process.
          The remote server created a new process.
    `E NN'
    `E NN'
          A badly formed request or an error was encountered.
          A badly formed request or an error was encountered.
   ---------- Footnotes ----------
   ---------- Footnotes ----------
   (1) The `qP' and `qL' packets predate these conventions, and have
   (1) The `qP' and `qL' packets predate these conventions, and have
arguments without any terminator for the packet name; we suspect they
arguments without any terminator for the packet name; we suspect they
are in widespread use in places that are difficult to upgrade.  The
are in widespread use in places that are difficult to upgrade.  The
`qC' packet has no arguments, but some existing stubs (e.g. RedBoot)
`qC' packet has no arguments, but some existing stubs (e.g. RedBoot)
are known to not check for the end of the packet.
are known to not check for the end of the packet.


File: gdb.info,  Node: Architecture-Specific Protocol Details,  Next: Tracepoint Packets,  Prev: General Query Packets,  Up: Remote Protocol
File: gdb.info,  Node: Architecture-Specific Protocol Details,  Next: Tracepoint Packets,  Prev: General Query Packets,  Up: Remote Protocol
D.5 Architecture-Specific Protocol Details
D.5 Architecture-Specific Protocol Details
==========================================
==========================================
This section describes how the remote protocol is applied to specific
This section describes how the remote protocol is applied to specific
target architectures.  Also see *Note Standard Target Features::, for
target architectures.  Also see *Note Standard Target Features::, for
details of XML target descriptions for each architecture.
details of XML target descriptions for each architecture.
D.5.1 ARM
D.5.1 ARM
---------
---------
D.5.1.1 Breakpoint Kinds
D.5.1.1 Breakpoint Kinds
........................
........................
These breakpoint kinds are defined for the `Z0' and `Z1' packets.
These breakpoint kinds are defined for the `Z0' and `Z1' packets.
2
2
     16-bit Thumb mode breakpoint.
     16-bit Thumb mode breakpoint.
3
3
     32-bit Thumb mode (Thumb-2) breakpoint.
     32-bit Thumb mode (Thumb-2) breakpoint.
4
4
     32-bit ARM mode breakpoint.
     32-bit ARM mode breakpoint.
D.5.2 MIPS
D.5.2 MIPS
----------
----------
D.5.2.1 Register Packet Format
D.5.2.1 Register Packet Format
..............................
..............................
The following `g'/`G' packets have previously been defined.  In the
The following `g'/`G' packets have previously been defined.  In the
below, some thirty-two bit registers are transferred as sixty-four
below, some thirty-two bit registers are transferred as sixty-four
bits.  Those registers should be zero/sign extended (which?)  to fill
bits.  Those registers should be zero/sign extended (which?)  to fill
the space allocated.  Register bytes are transferred in target byte
the space allocated.  Register bytes are transferred in target byte
order.  The two nibbles within a register byte are transferred
order.  The two nibbles within a register byte are transferred
most-significant - least-significant.
most-significant - least-significant.
MIPS32
MIPS32
     All registers are transferred as thirty-two bit quantities in the
     All registers are transferred as thirty-two bit quantities in the
     order: 32 general-purpose; sr; lo; hi; bad; cause; pc; 32
     order: 32 general-purpose; sr; lo; hi; bad; cause; pc; 32
     floating-point registers; fsr; fir; fp.
     floating-point registers; fsr; fir; fp.
MIPS64
MIPS64
     All registers are transferred as sixty-four bit quantities
     All registers are transferred as sixty-four bit quantities
     (including thirty-two bit registers such as `sr').  The ordering
     (including thirty-two bit registers such as `sr').  The ordering
     is the same as `MIPS32'.
     is the same as `MIPS32'.


File: gdb.info,  Node: Tracepoint Packets,  Next: Host I/O Packets,  Prev: Architecture-Specific Protocol Details,  Up: Remote Protocol
File: gdb.info,  Node: Tracepoint Packets,  Next: Host I/O Packets,  Prev: Architecture-Specific Protocol Details,  Up: Remote Protocol
D.6 Tracepoint Packets
D.6 Tracepoint Packets
======================
======================
Here we describe the packets GDB uses to implement tracepoints (*note
Here we describe the packets GDB uses to implement tracepoints (*note
Tracepoints::).
Tracepoints::).
`QTDP:N:ADDR:ENA:STEP:PASS[:FFLEN][:XLEN,BYTES][-]'
`QTDP:N:ADDR:ENA:STEP:PASS[:FFLEN][:XLEN,BYTES][-]'
     Create a new tracepoint, number N, at ADDR.  If ENA is `E', then
     Create a new tracepoint, number N, at ADDR.  If ENA is `E', then
     the tracepoint is enabled; if it is `D', then the tracepoint is
     the tracepoint is enabled; if it is `D', then the tracepoint is
     disabled.  STEP is the tracepoint's step count, and PASS is its
     disabled.  STEP is the tracepoint's step count, and PASS is its
     pass count.  If an `F' is present, then the tracepoint is to be a
     pass count.  If an `F' is present, then the tracepoint is to be a
     fast tracepoint, and the FLEN is the number of bytes that the
     fast tracepoint, and the FLEN is the number of bytes that the
     target should copy elsewhere to make room for the tracepoint.  If
     target should copy elsewhere to make room for the tracepoint.  If
     an `X' is present, it introduces a tracepoint condition, which
     an `X' is present, it introduces a tracepoint condition, which
     consists of a hexadecimal length, followed by a comma and
     consists of a hexadecimal length, followed by a comma and
     hex-encoded bytes, in a manner similar to action encodings as
     hex-encoded bytes, in a manner similar to action encodings as
     described below.  If the trailing `-' is present, further `QTDP'
     described below.  If the trailing `-' is present, further `QTDP'
     packets will follow to specify this tracepoint's actions.
     packets will follow to specify this tracepoint's actions.
     Replies:
     Replies:
    `OK'
    `OK'
          The packet was understood and carried out.
          The packet was understood and carried out.
    `'
    `'
          The packet was not recognized.
          The packet was not recognized.
`QTDP:-N:ADDR:[S]ACTION...[-]'
`QTDP:-N:ADDR:[S]ACTION...[-]'
     Define actions to be taken when a tracepoint is hit.  N and ADDR
     Define actions to be taken when a tracepoint is hit.  N and ADDR
     must be the same as in the initial `QTDP' packet for this
     must be the same as in the initial `QTDP' packet for this
     tracepoint.  This packet may only be sent immediately after
     tracepoint.  This packet may only be sent immediately after
     another `QTDP' packet that ended with a `-'.  If the trailing `-'
     another `QTDP' packet that ended with a `-'.  If the trailing `-'
     is present, further `QTDP' packets will follow, specifying more
     is present, further `QTDP' packets will follow, specifying more
     actions for this tracepoint.
     actions for this tracepoint.
     In the series of action packets for a given tracepoint, at most one
     In the series of action packets for a given tracepoint, at most one
     can have an `S' before its first ACTION.  If such a packet is
     can have an `S' before its first ACTION.  If such a packet is
     sent, it and the following packets define "while-stepping"
     sent, it and the following packets define "while-stepping"
     actions.  Any prior packets define ordinary actions -- that is,
     actions.  Any prior packets define ordinary actions -- that is,
     those taken when the tracepoint is first hit.  If no action packet
     those taken when the tracepoint is first hit.  If no action packet
     has an `S', then all the packets in the series specify ordinary
     has an `S', then all the packets in the series specify ordinary
     tracepoint actions.
     tracepoint actions.
     The `ACTION...' portion of the packet is a series of actions,
     The `ACTION...' portion of the packet is a series of actions,
     concatenated without separators.  Each action has one of the
     concatenated without separators.  Each action has one of the
     following forms:
     following forms:
    `R MASK'
    `R MASK'
          Collect the registers whose bits are set in MASK.  MASK is a
          Collect the registers whose bits are set in MASK.  MASK is a
          hexadecimal number whose I'th bit is set if register number I
          hexadecimal number whose I'th bit is set if register number I
          should be collected.  (The least significant bit is numbered
          should be collected.  (The least significant bit is numbered
          zero.)  Note that MASK may be any number of digits long; it
          zero.)  Note that MASK may be any number of digits long; it
          may not fit in a 32-bit word.
          may not fit in a 32-bit word.
    `M BASEREG,OFFSET,LEN'
    `M BASEREG,OFFSET,LEN'
          Collect LEN bytes of memory starting at the address in
          Collect LEN bytes of memory starting at the address in
          register number BASEREG, plus OFFSET.  If BASEREG is `-1',
          register number BASEREG, plus OFFSET.  If BASEREG is `-1',
          then the range has a fixed address: OFFSET is the address of
          then the range has a fixed address: OFFSET is the address of
          the lowest byte to collect.  The BASEREG, OFFSET, and LEN
          the lowest byte to collect.  The BASEREG, OFFSET, and LEN
          parameters are all unsigned hexadecimal values (the `-1'
          parameters are all unsigned hexadecimal values (the `-1'
          value for BASEREG is a special case).
          value for BASEREG is a special case).
    `X LEN,EXPR'
    `X LEN,EXPR'
          Evaluate EXPR, whose length is LEN, and collect memory as it
          Evaluate EXPR, whose length is LEN, and collect memory as it
          directs.  EXPR is an agent expression, as described in *Note
          directs.  EXPR is an agent expression, as described in *Note
          Agent Expressions::.  Each byte of the expression is encoded
          Agent Expressions::.  Each byte of the expression is encoded
          as a two-digit hex number in the packet; LEN is the number of
          as a two-digit hex number in the packet; LEN is the number of
          bytes in the expression (and thus one-half the number of hex
          bytes in the expression (and thus one-half the number of hex
          digits in the packet).
          digits in the packet).
     Any number of actions may be packed together in a single `QTDP'
     Any number of actions may be packed together in a single `QTDP'
     packet, as long as the packet does not exceed the maximum packet
     packet, as long as the packet does not exceed the maximum packet
     length (400 bytes, for many stubs).  There may be only one `R'
     length (400 bytes, for many stubs).  There may be only one `R'
     action per tracepoint, and it must precede any `M' or `X' actions.
     action per tracepoint, and it must precede any `M' or `X' actions.
     Any registers referred to by `M' and `X' actions must be
     Any registers referred to by `M' and `X' actions must be
     collected by a preceding `R' action.  (The "while-stepping"
     collected by a preceding `R' action.  (The "while-stepping"
     actions are treated as if they were attached to a separate
     actions are treated as if they were attached to a separate
     tracepoint, as far as these restrictions are concerned.)
     tracepoint, as far as these restrictions are concerned.)
     Replies:
     Replies:
    `OK'
    `OK'
          The packet was understood and carried out.
          The packet was understood and carried out.
    `'
    `'
          The packet was not recognized.
          The packet was not recognized.
`QTDV:N:VALUE'
`QTDV:N:VALUE'
     Create a new trace state variable, number N, with an initial value
     Create a new trace state variable, number N, with an initial value
     of VALUE, which is a 64-bit signed integer.  Both N and VALUE are
     of VALUE, which is a 64-bit signed integer.  Both N and VALUE are
     encoded as hexadecimal values. GDB has the option of not using
     encoded as hexadecimal values. GDB has the option of not using
     this packet for initial values of zero; the target should simply
     this packet for initial values of zero; the target should simply
     create the trace state variables as they are mentioned in
     create the trace state variables as they are mentioned in
     expressions.
     expressions.
`QTFrame:N'
`QTFrame:N'
     Select the N'th tracepoint frame from the buffer, and use the
     Select the N'th tracepoint frame from the buffer, and use the
     register and memory contents recorded there to answer subsequent
     register and memory contents recorded there to answer subsequent
     request packets from GDB.
     request packets from GDB.
     A successful reply from the stub indicates that the stub has found
     A successful reply from the stub indicates that the stub has found
     the requested frame.  The response is a series of parts,
     the requested frame.  The response is a series of parts,
     concatenated without separators, describing the frame we selected.
     concatenated without separators, describing the frame we selected.
     Each part has one of the following forms:
     Each part has one of the following forms:
    `F F'
    `F F'
          The selected frame is number N in the trace frame buffer; F
          The selected frame is number N in the trace frame buffer; F
          is a hexadecimal number.  If F is `-1', then there was no
          is a hexadecimal number.  If F is `-1', then there was no
          frame matching the criteria in the request packet.
          frame matching the criteria in the request packet.
    `T T'
    `T T'
          The selected trace frame records a hit of tracepoint number T;
          The selected trace frame records a hit of tracepoint number T;
          T is a hexadecimal number.
          T is a hexadecimal number.
`QTFrame:pc:ADDR'
`QTFrame:pc:ADDR'
     Like `QTFrame:N', but select the first tracepoint frame after the
     Like `QTFrame:N', but select the first tracepoint frame after the
     currently selected frame whose PC is ADDR; ADDR is a hexadecimal
     currently selected frame whose PC is ADDR; ADDR is a hexadecimal
     number.
     number.
`QTFrame:tdp:T'
`QTFrame:tdp:T'
     Like `QTFrame:N', but select the first tracepoint frame after the
     Like `QTFrame:N', but select the first tracepoint frame after the
     currently selected frame that is a hit of tracepoint T; T is a
     currently selected frame that is a hit of tracepoint T; T is a
     hexadecimal number.
     hexadecimal number.
`QTFrame:range:START:END'
`QTFrame:range:START:END'
     Like `QTFrame:N', but select the first tracepoint frame after the
     Like `QTFrame:N', but select the first tracepoint frame after the
     currently selected frame whose PC is between START (inclusive) and
     currently selected frame whose PC is between START (inclusive) and
     END (inclusive); START and END are hexadecimal numbers.
     END (inclusive); START and END are hexadecimal numbers.
`QTFrame:outside:START:END'
`QTFrame:outside:START:END'
     Like `QTFrame:range:START:END', but select the first frame
     Like `QTFrame:range:START:END', but select the first frame
     _outside_ the given range of addresses (exclusive).
     _outside_ the given range of addresses (exclusive).
`QTStart'
`QTStart'
     Begin the tracepoint experiment.  Begin collecting data from
     Begin the tracepoint experiment.  Begin collecting data from
     tracepoint hits in the trace frame buffer.
     tracepoint hits in the trace frame buffer.
`QTStop'
`QTStop'
     End the tracepoint experiment.  Stop collecting trace frames.
     End the tracepoint experiment.  Stop collecting trace frames.
`QTinit'
`QTinit'
     Clear the table of tracepoints, and empty the trace frame buffer.
     Clear the table of tracepoints, and empty the trace frame buffer.
`QTro:START1,END1:START2,END2:...'
`QTro:START1,END1:START2,END2:...'
     Establish the given ranges of memory as "transparent".  The stub
     Establish the given ranges of memory as "transparent".  The stub
     will answer requests for these ranges from memory's current
     will answer requests for these ranges from memory's current
     contents, if they were not collected as part of the tracepoint hit.
     contents, if they were not collected as part of the tracepoint hit.
     GDB uses this to mark read-only regions of memory, like those
     GDB uses this to mark read-only regions of memory, like those
     containing program code.  Since these areas never change, they
     containing program code.  Since these areas never change, they
     should still have the same contents they did when the tracepoint
     should still have the same contents they did when the tracepoint
     was hit, so there's no reason for the stub to refuse to provide
     was hit, so there's no reason for the stub to refuse to provide
     their contents.
     their contents.
`QTDisconnected:VALUE'
`QTDisconnected:VALUE'
     Set the choice to what to do with the tracing run when GDB
     Set the choice to what to do with the tracing run when GDB
     disconnects from the target.  A VALUE of 1 directs the target to
     disconnects from the target.  A VALUE of 1 directs the target to
     continue the tracing run, while 0 tells the target to stop tracing
     continue the tracing run, while 0 tells the target to stop tracing
     if GDB is no longer in the picture.
     if GDB is no longer in the picture.
`qTStatus'
`qTStatus'
     Ask the stub if there is a trace experiment running right now.
     Ask the stub if there is a trace experiment running right now.
     Replies:
     Replies:
    `T0'
    `T0'
          There is no trace experiment running.
          There is no trace experiment running.
    `T1'
    `T1'
          There is a trace experiment running.
          There is a trace experiment running.
`qTV:VAR'
`qTV:VAR'
     Ask the stub for the value of the trace state variable number VAR.
     Ask the stub for the value of the trace state variable number VAR.
     Replies:
     Replies:
    `VVALUE'
    `VVALUE'
          The value of the variable is VALUE.  This will be the current
          The value of the variable is VALUE.  This will be the current
          value of the variable if the user is examining a running
          value of the variable if the user is examining a running
          target, or a saved value if the variable was collected in the
          target, or a saved value if the variable was collected in the
          trace frame that the user is looking at.  Note that multiple
          trace frame that the user is looking at.  Note that multiple
          requests may result in different reply values, such as when
          requests may result in different reply values, such as when
          requesting values while the program is running.
          requesting values while the program is running.
    `U'
    `U'
          The value of the variable is unknown.  This would occur, for
          The value of the variable is unknown.  This would occur, for
          example, if the user is examining a trace frame in which the
          example, if the user is examining a trace frame in which the
          requested variable was not collected.
          requested variable was not collected.
`qTfP'
`qTfP'
`qTsP'
`qTsP'
     These packets request data about tracepoints that are being used by
     These packets request data about tracepoints that are being used by
     the target.  GDB sends `qTfP' to get the first piece of data, and
     the target.  GDB sends `qTfP' to get the first piece of data, and
     multiple `qTsP' to get additional pieces.  Replies to these
     multiple `qTsP' to get additional pieces.  Replies to these
     packets generally take the form of the `QTDP' packets that define
     packets generally take the form of the `QTDP' packets that define
     tracepoints. (FIXME add detailed syntax)
     tracepoints. (FIXME add detailed syntax)
`qTfV'
`qTfV'
`qTsV'
`qTsV'
     These packets request data about trace state variables that are on
     These packets request data about trace state variables that are on
     the target.  GDB sends `qTfV' to get the first vari of data, and
     the target.  GDB sends `qTfV' to get the first vari of data, and
     multiple `qTsV' to get additional variables.  Replies to these
     multiple `qTsV' to get additional variables.  Replies to these
     packets follow the syntax of the `QTDV' packets that define trace
     packets follow the syntax of the `QTDV' packets that define trace
     state variables.
     state variables.
`QTSave:FILENAME'
`QTSave:FILENAME'
     This packet directs the target to save trace data to the file name
     This packet directs the target to save trace data to the file name
     FILENAME in the target's filesystem.  FILENAME is encoded as a hex
     FILENAME in the target's filesystem.  FILENAME is encoded as a hex
     string; the interpretation of the file name (relative vs absolute,
     string; the interpretation of the file name (relative vs absolute,
     wild cards, etc) is up to the target.
     wild cards, etc) is up to the target.
`qTBuffer:OFFSET,LEN'
`qTBuffer:OFFSET,LEN'
     Return up to LEN bytes of the current contents of trace buffer,
     Return up to LEN bytes of the current contents of trace buffer,
     starting at OFFSET.  The trace buffer is treated as if it were a
     starting at OFFSET.  The trace buffer is treated as if it were a
     contiguous collection of traceframes, as per the trace file format.
     contiguous collection of traceframes, as per the trace file format.
     The reply consists as many hex-encoded bytes as the target can
     The reply consists as many hex-encoded bytes as the target can
     deliver in a packet; it is not an error to return fewer than were
     deliver in a packet; it is not an error to return fewer than were
     asked for.  A reply consisting of just `l' indicates that no bytes
     asked for.  A reply consisting of just `l' indicates that no bytes
     are available.
     are available.


File: gdb.info,  Node: Host I/O Packets,  Next: Interrupts,  Prev: Tracepoint Packets,  Up: Remote Protocol
File: gdb.info,  Node: Host I/O Packets,  Next: Interrupts,  Prev: Tracepoint Packets,  Up: Remote Protocol
D.7 Host I/O Packets
D.7 Host I/O Packets
====================
====================
The "Host I/O" packets allow GDB to perform I/O operations on the far
The "Host I/O" packets allow GDB to perform I/O operations on the far
side of a remote link.  For example, Host I/O is used to upload and
side of a remote link.  For example, Host I/O is used to upload and
download files to a remote target with its own filesystem.  Host I/O
download files to a remote target with its own filesystem.  Host I/O
uses the same constant values and data structure layout as the
uses the same constant values and data structure layout as the
target-initiated File-I/O protocol.  However, the Host I/O packets are
target-initiated File-I/O protocol.  However, the Host I/O packets are
structured differently.  The target-initiated protocol relies on target
structured differently.  The target-initiated protocol relies on target
memory to store parameters and buffers.  Host I/O requests are
memory to store parameters and buffers.  Host I/O requests are
initiated by GDB, and the target's memory is not involved.  *Note
initiated by GDB, and the target's memory is not involved.  *Note
File-I/O Remote Protocol Extension::, for more details on the
File-I/O Remote Protocol Extension::, for more details on the
target-initiated protocol.
target-initiated protocol.
   The Host I/O request packets all encode a single operation along with
   The Host I/O request packets all encode a single operation along with
its arguments.  They have this format:
its arguments.  They have this format:
`vFile:OPERATION: PARAMETER...'
`vFile:OPERATION: PARAMETER...'
     OPERATION is the name of the particular request; the target should
     OPERATION is the name of the particular request; the target should
     compare the entire packet name up to the second colon when checking
     compare the entire packet name up to the second colon when checking
     for a supported operation.  The format of PARAMETER depends on the
     for a supported operation.  The format of PARAMETER depends on the
     operation.  Numbers are always passed in hexadecimal.  Negative
     operation.  Numbers are always passed in hexadecimal.  Negative
     numbers have an explicit minus sign (i.e. two's complement is not
     numbers have an explicit minus sign (i.e. two's complement is not
     used).  Strings (e.g. filenames) are encoded as a series of
     used).  Strings (e.g. filenames) are encoded as a series of
     hexadecimal bytes.  The last argument to a system call may be a
     hexadecimal bytes.  The last argument to a system call may be a
     buffer of escaped binary data (*note Binary Data::).
     buffer of escaped binary data (*note Binary Data::).
   The valid responses to Host I/O packets are:
   The valid responses to Host I/O packets are:
`F RESULT [, ERRNO] [; ATTACHMENT]'
`F RESULT [, ERRNO] [; ATTACHMENT]'
     RESULT is the integer value returned by this operation, usually
     RESULT is the integer value returned by this operation, usually
     non-negative for success and -1 for errors.  If an error has
     non-negative for success and -1 for errors.  If an error has
     occured, ERRNO will be included in the result.  ERRNO will have a
     occured, ERRNO will be included in the result.  ERRNO will have a
     value defined by the File-I/O protocol (*note Errno Values::).  For
     value defined by the File-I/O protocol (*note Errno Values::).  For
     operations which return data, ATTACHMENT supplies the data as a
     operations which return data, ATTACHMENT supplies the data as a
     binary buffer.  Binary buffers in response packets are escaped in
     binary buffer.  Binary buffers in response packets are escaped in
     the normal way (*note Binary Data::).  See the individual packet
     the normal way (*note Binary Data::).  See the individual packet
     documentation for the interpretation of RESULT and ATTACHMENT.
     documentation for the interpretation of RESULT and ATTACHMENT.
`'
`'
     An empty response indicates that this operation is not recognized.
     An empty response indicates that this operation is not recognized.
   These are the supported Host I/O operations:
   These are the supported Host I/O operations:
`vFile:open: PATHNAME, FLAGS, MODE'
`vFile:open: PATHNAME, FLAGS, MODE'
     Open a file at PATHNAME and return a file descriptor for it, or
     Open a file at PATHNAME and return a file descriptor for it, or
     return -1 if an error occurs.  PATHNAME is a string, FLAGS is an
     return -1 if an error occurs.  PATHNAME is a string, FLAGS is an
     integer indicating a mask of open flags (*note Open Flags::), and
     integer indicating a mask of open flags (*note Open Flags::), and
     MODE is an integer indicating a mask of mode bits to use if the
     MODE is an integer indicating a mask of mode bits to use if the
     file is created (*note mode_t Values::).  *Note open::, for
     file is created (*note mode_t Values::).  *Note open::, for
     details of the open flags and mode values.
     details of the open flags and mode values.
`vFile:close: FD'
`vFile:close: FD'
     Close the open file corresponding to FD and return 0, or -1 if an
     Close the open file corresponding to FD and return 0, or -1 if an
     error occurs.
     error occurs.
`vFile:pread: FD, COUNT, OFFSET'
`vFile:pread: FD, COUNT, OFFSET'
     Read data from the open file corresponding to FD.  Up to COUNT
     Read data from the open file corresponding to FD.  Up to COUNT
     bytes will be read from the file, starting at OFFSET relative to
     bytes will be read from the file, starting at OFFSET relative to
     the start of the file.  The target may read fewer bytes; common
     the start of the file.  The target may read fewer bytes; common
     reasons include packet size limits and an end-of-file condition.
     reasons include packet size limits and an end-of-file condition.
     The number of bytes read is returned.  Zero should only be
     The number of bytes read is returned.  Zero should only be
     returned for a successful read at the end of the file, or if COUNT
     returned for a successful read at the end of the file, or if COUNT
     was zero.
     was zero.
     The data read should be returned as a binary attachment on success.
     The data read should be returned as a binary attachment on success.
     If zero bytes were read, the response should include an empty
     If zero bytes were read, the response should include an empty
     binary attachment (i.e. a trailing semicolon).  The return value
     binary attachment (i.e. a trailing semicolon).  The return value
     is the number of target bytes read; the binary attachment may be
     is the number of target bytes read; the binary attachment may be
     longer if some characters were escaped.
     longer if some characters were escaped.
`vFile:pwrite: FD, OFFSET, DATA'
`vFile:pwrite: FD, OFFSET, DATA'
     Write DATA (a binary buffer) to the open file corresponding to FD.
     Write DATA (a binary buffer) to the open file corresponding to FD.
     Start the write at OFFSET from the start of the file.  Unlike
     Start the write at OFFSET from the start of the file.  Unlike
     many `write' system calls, there is no separate COUNT argument;
     many `write' system calls, there is no separate COUNT argument;
     the length of DATA in the packet is used.  `vFile:write' returns
     the length of DATA in the packet is used.  `vFile:write' returns
     the number of bytes written, which may be shorter than the length
     the number of bytes written, which may be shorter than the length
     of DATA, or -1 if an error occurred.
     of DATA, or -1 if an error occurred.
`vFile:unlink: PATHNAME'
`vFile:unlink: PATHNAME'
     Delete the file at PATHNAME on the target.  Return 0, or -1 if an
     Delete the file at PATHNAME on the target.  Return 0, or -1 if an
     error occurs.  PATHNAME is a string.
     error occurs.  PATHNAME is a string.


File: gdb.info,  Node: Interrupts,  Next: Notification Packets,  Prev: Host I/O Packets,  Up: Remote Protocol
File: gdb.info,  Node: Interrupts,  Next: Notification Packets,  Prev: Host I/O Packets,  Up: Remote Protocol
D.8 Interrupts
D.8 Interrupts
==============
==============
When a program on the remote target is running, GDB may attempt to
When a program on the remote target is running, GDB may attempt to
interrupt it by sending a `Ctrl-C', `BREAK' or a `BREAK' followed by
interrupt it by sending a `Ctrl-C', `BREAK' or a `BREAK' followed by
`g', control of which is specified via GDB's `interrupt-sequence'.
`g', control of which is specified via GDB's `interrupt-sequence'.
   The precise meaning of `BREAK' is defined by the transport mechanism
   The precise meaning of `BREAK' is defined by the transport mechanism
and may, in fact, be undefined.  GDB does not currently define a
and may, in fact, be undefined.  GDB does not currently define a
`BREAK' mechanism for any of the network interfaces except for TCP, in
`BREAK' mechanism for any of the network interfaces except for TCP, in
which case GDB sends the `telnet' BREAK sequence.
which case GDB sends the `telnet' BREAK sequence.
   `Ctrl-C', on the other hand, is defined and implemented for all
   `Ctrl-C', on the other hand, is defined and implemented for all
transport mechanisms.  It is represented by sending the single byte
transport mechanisms.  It is represented by sending the single byte
`0x03' without any of the usual packet overhead described in the
`0x03' without any of the usual packet overhead described in the
Overview section (*note Overview::).  When a `0x03' byte is transmitted
Overview section (*note Overview::).  When a `0x03' byte is transmitted
as part of a packet, it is considered to be packet data and does _not_
as part of a packet, it is considered to be packet data and does _not_
represent an interrupt.  E.g., an `X' packet (*note X packet::), used
represent an interrupt.  E.g., an `X' packet (*note X packet::), used
for binary downloads, may include an unescaped `0x03' as part of its
for binary downloads, may include an unescaped `0x03' as part of its
packet.
packet.
   `BREAK' followed by `g' is also known as Magic SysRq g.  When Linux
   `BREAK' followed by `g' is also known as Magic SysRq g.  When Linux
kernel receives this sequence from serial port, it stops execution and
kernel receives this sequence from serial port, it stops execution and
connects to gdb.
connects to gdb.
   Stubs are not required to recognize these interrupt mechanisms and
   Stubs are not required to recognize these interrupt mechanisms and
the precise meaning associated with receipt of the interrupt is
the precise meaning associated with receipt of the interrupt is
implementation defined.  If the target supports debugging of multiple
implementation defined.  If the target supports debugging of multiple
threads and/or processes, it should attempt to interrupt all
threads and/or processes, it should attempt to interrupt all
currently-executing threads and processes.  If the stub is successful
currently-executing threads and processes.  If the stub is successful
at interrupting the running program, it should send one of the stop
at interrupting the running program, it should send one of the stop
reply packets (*note Stop Reply Packets::) to GDB as a result of
reply packets (*note Stop Reply Packets::) to GDB as a result of
successfully stopping the program in all-stop mode, and a stop reply
successfully stopping the program in all-stop mode, and a stop reply
for each stopped thread in non-stop mode.  Interrupts received while the
for each stopped thread in non-stop mode.  Interrupts received while the
program is stopped are discarded.
program is stopped are discarded.


File: gdb.info,  Node: Notification Packets,  Next: Remote Non-Stop,  Prev: Interrupts,  Up: Remote Protocol
File: gdb.info,  Node: Notification Packets,  Next: Remote Non-Stop,  Prev: Interrupts,  Up: Remote Protocol
D.9 Notification Packets
D.9 Notification Packets
========================
========================
The GDB remote serial protocol includes "notifications", packets that
The GDB remote serial protocol includes "notifications", packets that
require no acknowledgment.  Both the GDB and the stub may send
require no acknowledgment.  Both the GDB and the stub may send
notifications (although the only notifications defined at present are
notifications (although the only notifications defined at present are
sent by the stub).  Notifications carry information without incurring
sent by the stub).  Notifications carry information without incurring
the round-trip latency of an acknowledgment, and so are useful for
the round-trip latency of an acknowledgment, and so are useful for
low-impact communications where occasional packet loss is not a problem.
low-impact communications where occasional packet loss is not a problem.
   A notification packet has the form `% DATA # CHECKSUM', where DATA
   A notification packet has the form `% DATA # CHECKSUM', where DATA
is the content of the notification, and CHECKSUM is a checksum of DATA,
is the content of the notification, and CHECKSUM is a checksum of DATA,
computed and formatted as for ordinary GDB packets.  A notification's
computed and formatted as for ordinary GDB packets.  A notification's
DATA never contains `$', `%' or `#' characters.  Upon receiving a
DATA never contains `$', `%' or `#' characters.  Upon receiving a
notification, the recipient sends no `+' or `-' to acknowledge the
notification, the recipient sends no `+' or `-' to acknowledge the
notification's receipt or to report its corruption.
notification's receipt or to report its corruption.
   Every notification's DATA begins with a name, which contains no
   Every notification's DATA begins with a name, which contains no
colon characters, followed by a colon character.
colon characters, followed by a colon character.
   Recipients should silently ignore corrupted notifications and
   Recipients should silently ignore corrupted notifications and
notifications they do not understand.  Recipients should restart
notifications they do not understand.  Recipients should restart
timeout periods on receipt of a well-formed notification, whether or
timeout periods on receipt of a well-formed notification, whether or
not they understand it.
not they understand it.
   Senders should only send the notifications described here when this
   Senders should only send the notifications described here when this
protocol description specifies that they are permitted.  In the future,
protocol description specifies that they are permitted.  In the future,
we may extend the protocol to permit existing notifications in new
we may extend the protocol to permit existing notifications in new
contexts; this rule helps older senders avoid confusing newer
contexts; this rule helps older senders avoid confusing newer
recipients.
recipients.
   (Older versions of GDB ignore bytes received until they see the `$'
   (Older versions of GDB ignore bytes received until they see the `$'
byte that begins an ordinary packet, so new stubs may transmit
byte that begins an ordinary packet, so new stubs may transmit
notifications without fear of confusing older clients.  There are no
notifications without fear of confusing older clients.  There are no
notifications defined for GDB to send at the moment, but we assume that
notifications defined for GDB to send at the moment, but we assume that
most older stubs would ignore them, as well.)
most older stubs would ignore them, as well.)
   The following notification packets from the stub to GDB are defined:
   The following notification packets from the stub to GDB are defined:
`Stop: REPLY'
`Stop: REPLY'
     Report an asynchronous stop event in non-stop mode.  The REPLY has
     Report an asynchronous stop event in non-stop mode.  The REPLY has
     the form of a stop reply, as described in *Note Stop Reply
     the form of a stop reply, as described in *Note Stop Reply
     Packets::.  Refer to *Note Remote Non-Stop::, for information on
     Packets::.  Refer to *Note Remote Non-Stop::, for information on
     how these notifications are acknowledged by GDB.
     how these notifications are acknowledged by GDB.


File: gdb.info,  Node: Remote Non-Stop,  Next: Packet Acknowledgment,  Prev: Notification Packets,  Up: Remote Protocol
File: gdb.info,  Node: Remote Non-Stop,  Next: Packet Acknowledgment,  Prev: Notification Packets,  Up: Remote Protocol
D.10 Remote Protocol Support for Non-Stop Mode
D.10 Remote Protocol Support for Non-Stop Mode
==============================================
==============================================
GDB's remote protocol supports non-stop debugging of multi-threaded
GDB's remote protocol supports non-stop debugging of multi-threaded
programs, as described in *Note Non-Stop Mode::.  If the stub supports
programs, as described in *Note Non-Stop Mode::.  If the stub supports
non-stop mode, it should report that to GDB by including `QNonStop+' in
non-stop mode, it should report that to GDB by including `QNonStop+' in
its `qSupported' response (*note qSupported::).
its `qSupported' response (*note qSupported::).
   GDB typically sends a `QNonStop' packet only when establishing a new
   GDB typically sends a `QNonStop' packet only when establishing a new
connection with the stub.  Entering non-stop mode does not alter the
connection with the stub.  Entering non-stop mode does not alter the
state of any currently-running threads, but targets must stop all
state of any currently-running threads, but targets must stop all
threads in any already-attached processes when entering all-stop mode.
threads in any already-attached processes when entering all-stop mode.
GDB uses the `?' packet as necessary to probe the target state after a
GDB uses the `?' packet as necessary to probe the target state after a
mode change.
mode change.
   In non-stop mode, when an attached process encounters an event that
   In non-stop mode, when an attached process encounters an event that
would otherwise be reported with a stop reply, it uses the asynchronous
would otherwise be reported with a stop reply, it uses the asynchronous
notification mechanism (*note Notification Packets::) to inform GDB.
notification mechanism (*note Notification Packets::) to inform GDB.
In contrast to all-stop mode, where all threads in all processes are
In contrast to all-stop mode, where all threads in all processes are
stopped when a stop reply is sent, in non-stop mode only the thread
stopped when a stop reply is sent, in non-stop mode only the thread
reporting the stop event is stopped.  That is, when reporting a `S' or
reporting the stop event is stopped.  That is, when reporting a `S' or
`T' response to indicate completion of a step operation, hitting a
`T' response to indicate completion of a step operation, hitting a
breakpoint, or a fault, only the affected thread is stopped; any other
breakpoint, or a fault, only the affected thread is stopped; any other
still-running threads continue to run.  When reporting a `W' or `X'
still-running threads continue to run.  When reporting a `W' or `X'
response, all running threads belonging to other attached processes
response, all running threads belonging to other attached processes
continue to run.
continue to run.
   Only one stop reply notification at a time may be pending; if
   Only one stop reply notification at a time may be pending; if
additional stop events occur before GDB has acknowledged the previous
additional stop events occur before GDB has acknowledged the previous
notification, they must be queued by the stub for later synchronous
notification, they must be queued by the stub for later synchronous
transmission in response to `vStopped' packets from GDB.  Because the
transmission in response to `vStopped' packets from GDB.  Because the
notification mechanism is unreliable, the stub is permitted to resend a
notification mechanism is unreliable, the stub is permitted to resend a
stop reply notification if it believes GDB may not have received it.
stop reply notification if it believes GDB may not have received it.
GDB ignores additional stop reply notifications received before it has
GDB ignores additional stop reply notifications received before it has
finished processing a previous notification and the stub has completed
finished processing a previous notification and the stub has completed
sending any queued stop events.
sending any queued stop events.
   Otherwise, GDB must be prepared to receive a stop reply notification
   Otherwise, GDB must be prepared to receive a stop reply notification
at any time.  Specifically, they may appear when GDB is not otherwise
at any time.  Specifically, they may appear when GDB is not otherwise
reading input from the stub, or when GDB is expecting to read a normal
reading input from the stub, or when GDB is expecting to read a normal
synchronous response or a `+'/`-' acknowledgment to a packet it has
synchronous response or a `+'/`-' acknowledgment to a packet it has
sent.  Notification packets are distinct from any other communication
sent.  Notification packets are distinct from any other communication
from the stub so there is no ambiguity.
from the stub so there is no ambiguity.
   After receiving a stop reply notification, GDB shall acknowledge it
   After receiving a stop reply notification, GDB shall acknowledge it
by sending a `vStopped' packet (*note vStopped packet::) as a regular,
by sending a `vStopped' packet (*note vStopped packet::) as a regular,
synchronous request to the stub.  Such acknowledgment is not required
synchronous request to the stub.  Such acknowledgment is not required
to happen immediately, as GDB is permitted to send other, unrelated
to happen immediately, as GDB is permitted to send other, unrelated
packets to the stub first, which the stub should process normally.
packets to the stub first, which the stub should process normally.
   Upon receiving a `vStopped' packet, if the stub has other queued
   Upon receiving a `vStopped' packet, if the stub has other queued
stop events to report to GDB, it shall respond by sending a normal stop
stop events to report to GDB, it shall respond by sending a normal stop
reply response.  GDB shall then send another `vStopped' packet to
reply response.  GDB shall then send another `vStopped' packet to
solicit further responses; again, it is permitted to send other,
solicit further responses; again, it is permitted to send other,
unrelated packets as well which the stub should process normally.
unrelated packets as well which the stub should process normally.
   If the stub receives a `vStopped' packet and there are no additional
   If the stub receives a `vStopped' packet and there are no additional
stop events to report, the stub shall return an `OK' response.  At this
stop events to report, the stub shall return an `OK' response.  At this
point, if further stop events occur, the stub shall send a new stop
point, if further stop events occur, the stub shall send a new stop
reply notification, GDB shall accept the notification, and the process
reply notification, GDB shall accept the notification, and the process
shall be repeated.
shall be repeated.
   In non-stop mode, the target shall respond to the `?' packet as
   In non-stop mode, the target shall respond to the `?' packet as
follows.  First, any incomplete stop reply notification/`vStopped'
follows.  First, any incomplete stop reply notification/`vStopped'
sequence in progress is abandoned.  The target must begin a new
sequence in progress is abandoned.  The target must begin a new
sequence reporting stop events for all stopped threads, whether or not
sequence reporting stop events for all stopped threads, whether or not
it has previously reported those events to GDB.  The first stop reply
it has previously reported those events to GDB.  The first stop reply
is sent as a synchronous reply to the `?' packet, and subsequent stop
is sent as a synchronous reply to the `?' packet, and subsequent stop
replies are sent as responses to `vStopped' packets using the mechanism
replies are sent as responses to `vStopped' packets using the mechanism
described above.  The target must not send asynchronous stop reply
described above.  The target must not send asynchronous stop reply
notifications until the sequence is complete.  If all threads are
notifications until the sequence is complete.  If all threads are
running when the target receives the `?' packet, or if the target is
running when the target receives the `?' packet, or if the target is
not attached to any process, it shall respond `OK'.
not attached to any process, it shall respond `OK'.


File: gdb.info,  Node: Packet Acknowledgment,  Next: Examples,  Prev: Remote Non-Stop,  Up: Remote Protocol
File: gdb.info,  Node: Packet Acknowledgment,  Next: Examples,  Prev: Remote Non-Stop,  Up: Remote Protocol
D.11 Packet Acknowledgment
D.11 Packet Acknowledgment
==========================
==========================
By default, when either the host or the target machine receives a
By default, when either the host or the target machine receives a
packet, the first response expected is an acknowledgment: either `+'
packet, the first response expected is an acknowledgment: either `+'
(to indicate the package was received correctly) or `-' (to request
(to indicate the package was received correctly) or `-' (to request
retransmission).  This mechanism allows the GDB remote protocol to
retransmission).  This mechanism allows the GDB remote protocol to
operate over unreliable transport mechanisms, such as a serial line.
operate over unreliable transport mechanisms, such as a serial line.
   In cases where the transport mechanism is itself reliable (such as a
   In cases where the transport mechanism is itself reliable (such as a
pipe or TCP connection), the `+'/`-' acknowledgments are redundant.  It
pipe or TCP connection), the `+'/`-' acknowledgments are redundant.  It
may be desirable to disable them in that case to reduce communication
may be desirable to disable them in that case to reduce communication
overhead, or for other reasons.  This can be accomplished by means of
overhead, or for other reasons.  This can be accomplished by means of
the `QStartNoAckMode' packet; *note QStartNoAckMode::.
the `QStartNoAckMode' packet; *note QStartNoAckMode::.
   When in no-acknowledgment mode, neither the stub nor GDB shall send
   When in no-acknowledgment mode, neither the stub nor GDB shall send
or expect `+'/`-' protocol acknowledgments.  The packet and response
or expect `+'/`-' protocol acknowledgments.  The packet and response
format still includes the normal checksum, as described in *Note
format still includes the normal checksum, as described in *Note
Overview::, but the checksum may be ignored by the receiver.
Overview::, but the checksum may be ignored by the receiver.
   If the stub supports `QStartNoAckMode' and prefers to operate in
   If the stub supports `QStartNoAckMode' and prefers to operate in
no-acknowledgment mode, it should report that to GDB by including
no-acknowledgment mode, it should report that to GDB by including
`QStartNoAckMode+' in its response to `qSupported'; *note qSupported::.
`QStartNoAckMode+' in its response to `qSupported'; *note qSupported::.
If GDB also supports `QStartNoAckMode' and it has not been disabled via
If GDB also supports `QStartNoAckMode' and it has not been disabled via
the `set remote noack-packet off' command (*note Remote
the `set remote noack-packet off' command (*note Remote
Configuration::), GDB may then send a `QStartNoAckMode' packet to the
Configuration::), GDB may then send a `QStartNoAckMode' packet to the
stub.  Only then may the stub actually turn off packet acknowledgments.
stub.  Only then may the stub actually turn off packet acknowledgments.
GDB sends a final `+' acknowledgment of the stub's `OK' response, which
GDB sends a final `+' acknowledgment of the stub's `OK' response, which
can be safely ignored by the stub.
can be safely ignored by the stub.
   Note that `set remote noack-packet' command only affects negotiation
   Note that `set remote noack-packet' command only affects negotiation
between GDB and the stub when subsequent connections are made; it does
between GDB and the stub when subsequent connections are made; it does
not affect the protocol acknowledgment state for any current connection.
not affect the protocol acknowledgment state for any current connection.
Since `+'/`-' acknowledgments are enabled by default when a new
Since `+'/`-' acknowledgments are enabled by default when a new
connection is established, there is also no protocol request to
connection is established, there is also no protocol request to
re-enable the acknowledgments for the current connection, once disabled.
re-enable the acknowledgments for the current connection, once disabled.


File: gdb.info,  Node: Examples,  Next: File-I/O Remote Protocol Extension,  Prev: Packet Acknowledgment,  Up: Remote Protocol
File: gdb.info,  Node: Examples,  Next: File-I/O Remote Protocol Extension,  Prev: Packet Acknowledgment,  Up: Remote Protocol
D.12 Examples
D.12 Examples
=============
=============
Example sequence of a target being re-started.  Notice how the restart
Example sequence of a target being re-started.  Notice how the restart
does not get any direct output:
does not get any direct output:
     -> `R00'
     -> `R00'
     <- `+'
     <- `+'
     _target restarts_
     _target restarts_
     -> `?'
     -> `?'
     <- `+'
     <- `+'
     <- `T001:1234123412341234'
     <- `T001:1234123412341234'
     -> `+'
     -> `+'
   Example sequence of a target being stepped by a single instruction:
   Example sequence of a target being stepped by a single instruction:
     -> `G1445...'
     -> `G1445...'
     <- `+'
     <- `+'
     -> `s'
     -> `s'
     <- `+'
     <- `+'
     _time passes_
     _time passes_
     <- `T001:1234123412341234'
     <- `T001:1234123412341234'
     -> `+'
     -> `+'
     -> `g'
     -> `g'
     <- `+'
     <- `+'
     <- `1455...'
     <- `1455...'
     -> `+'
     -> `+'


File: gdb.info,  Node: File-I/O Remote Protocol Extension,  Next: Library List Format,  Prev: Examples,  Up: Remote Protocol
File: gdb.info,  Node: File-I/O Remote Protocol Extension,  Next: Library List Format,  Prev: Examples,  Up: Remote Protocol
D.13 File-I/O Remote Protocol Extension
D.13 File-I/O Remote Protocol Extension
=======================================
=======================================
* Menu:
* Menu:
* File-I/O Overview::
* File-I/O Overview::
* Protocol Basics::
* Protocol Basics::
* The F Request Packet::
* The F Request Packet::
* The F Reply Packet::
* The F Reply Packet::
* The Ctrl-C Message::
* The Ctrl-C Message::
* Console I/O::
* Console I/O::
* List of Supported Calls::
* List of Supported Calls::
* Protocol-specific Representation of Datatypes::
* Protocol-specific Representation of Datatypes::
* Constants::
* Constants::
* File-I/O Examples::
* File-I/O Examples::


File: gdb.info,  Node: File-I/O Overview,  Next: Protocol Basics,  Up: File-I/O Remote Protocol Extension
File: gdb.info,  Node: File-I/O Overview,  Next: Protocol Basics,  Up: File-I/O Remote Protocol Extension
D.13.1 File-I/O Overview
D.13.1 File-I/O Overview
------------------------
------------------------
The "File I/O remote protocol extension" (short: File-I/O) allows the
The "File I/O remote protocol extension" (short: File-I/O) allows the
target to use the host's file system and console I/O to perform various
target to use the host's file system and console I/O to perform various
system calls.  System calls on the target system are translated into a
system calls.  System calls on the target system are translated into a
remote protocol packet to the host system, which then performs the
remote protocol packet to the host system, which then performs the
needed actions and returns a response packet to the target system.
needed actions and returns a response packet to the target system.
This simulates file system operations even on targets that lack file
This simulates file system operations even on targets that lack file
systems.
systems.
   The protocol is defined to be independent of both the host and
   The protocol is defined to be independent of both the host and
target systems.  It uses its own internal representation of datatypes
target systems.  It uses its own internal representation of datatypes
and values.  Both GDB and the target's GDB stub are responsible for
and values.  Both GDB and the target's GDB stub are responsible for
translating the system-dependent value representations into the internal
translating the system-dependent value representations into the internal
protocol representations when data is transmitted.
protocol representations when data is transmitted.
   The communication is synchronous.  A system call is possible only
   The communication is synchronous.  A system call is possible only
when GDB is waiting for a response from the `C', `c', `S' or `s'
when GDB is waiting for a response from the `C', `c', `S' or `s'
packets.  While GDB handles the request for a system call, the target
packets.  While GDB handles the request for a system call, the target
is stopped to allow deterministic access to the target's memory.
is stopped to allow deterministic access to the target's memory.
Therefore File-I/O is not interruptible by target signals.  On the
Therefore File-I/O is not interruptible by target signals.  On the
other hand, it is possible to interrupt File-I/O by a user interrupt
other hand, it is possible to interrupt File-I/O by a user interrupt
(`Ctrl-C') within GDB.
(`Ctrl-C') within GDB.
   The target's request to perform a host system call does not finish
   The target's request to perform a host system call does not finish
the latest `C', `c', `S' or `s' action.  That means, after finishing
the latest `C', `c', `S' or `s' action.  That means, after finishing
the system call, the target returns to continuing the previous activity
the system call, the target returns to continuing the previous activity
(continue, step).  No additional continue or step request from GDB is
(continue, step).  No additional continue or step request from GDB is
required.
required.
     (gdb) continue
     (gdb) continue
       <- target requests 'system call X'
       <- target requests 'system call X'
       target is stopped, GDB executes system call
       target is stopped, GDB executes system call
       -> GDB returns result
       -> GDB returns result
       ... target continues, GDB returns to wait for the target
       ... target continues, GDB returns to wait for the target
       <- target hits breakpoint and sends a Txx packet
       <- target hits breakpoint and sends a Txx packet
   The protocol only supports I/O on the console and to regular files on
   The protocol only supports I/O on the console and to regular files on
the host file system.  Character or block special devices, pipes, named
the host file system.  Character or block special devices, pipes, named
pipes, sockets or any other communication method on the host system are
pipes, sockets or any other communication method on the host system are
not supported by this protocol.
not supported by this protocol.
   File I/O is not supported in non-stop mode.
   File I/O is not supported in non-stop mode.


File: gdb.info,  Node: Protocol Basics,  Next: The F Request Packet,  Prev: File-I/O Overview,  Up: File-I/O Remote Protocol Extension
File: gdb.info,  Node: Protocol Basics,  Next: The F Request Packet,  Prev: File-I/O Overview,  Up: File-I/O Remote Protocol Extension
D.13.2 Protocol Basics
D.13.2 Protocol Basics
----------------------
----------------------
The File-I/O protocol uses the `F' packet as the request as well as
The File-I/O protocol uses the `F' packet as the request as well as
reply packet.  Since a File-I/O system call can only occur when GDB is
reply packet.  Since a File-I/O system call can only occur when GDB is
waiting for a response from the continuing or stepping target, the
waiting for a response from the continuing or stepping target, the
File-I/O request is a reply that GDB has to expect as a result of a
File-I/O request is a reply that GDB has to expect as a result of a
previous `C', `c', `S' or `s' packet.  This `F' packet contains all
previous `C', `c', `S' or `s' packet.  This `F' packet contains all
information needed to allow GDB to call the appropriate host system
information needed to allow GDB to call the appropriate host system
call:
call:
   * A unique identifier for the requested system call.
   * A unique identifier for the requested system call.
   * All parameters to the system call.  Pointers are given as addresses
   * All parameters to the system call.  Pointers are given as addresses
     in the target memory address space.  Pointers to strings are given
     in the target memory address space.  Pointers to strings are given
     as pointer/length pair.  Numerical values are given as they are.
     as pointer/length pair.  Numerical values are given as they are.
     Numerical control flags are given in a protocol-specific
     Numerical control flags are given in a protocol-specific
     representation.
     representation.
   At this point, GDB has to perform the following actions.
   At this point, GDB has to perform the following actions.
   * If the parameters include pointer values to data needed as input
   * If the parameters include pointer values to data needed as input
     to a system call, GDB requests this data from the target with a
     to a system call, GDB requests this data from the target with a
     standard `m' packet request.  This additional communication has to
     standard `m' packet request.  This additional communication has to
     be expected by the target implementation and is handled as any
     be expected by the target implementation and is handled as any
     other `m' packet.
     other `m' packet.
   * GDB translates all value from protocol representation to host
   * GDB translates all value from protocol representation to host
     representation as needed.  Datatypes are coerced into the host
     representation as needed.  Datatypes are coerced into the host
     types.
     types.
   * GDB calls the system call.
   * GDB calls the system call.
   * It then coerces datatypes back to protocol representation.
   * It then coerces datatypes back to protocol representation.
   * If the system call is expected to return data in buffer space
   * If the system call is expected to return data in buffer space
     specified by pointer parameters to the call, the data is
     specified by pointer parameters to the call, the data is
     transmitted to the target using a `M' or `X' packet.  This packet
     transmitted to the target using a `M' or `X' packet.  This packet
     has to be expected by the target implementation and is handled as
     has to be expected by the target implementation and is handled as
     any other `M' or `X' packet.
     any other `M' or `X' packet.
   Eventually GDB replies with another `F' packet which contains all
   Eventually GDB replies with another `F' packet which contains all
necessary information for the target to continue.  This at least
necessary information for the target to continue.  This at least
contains
contains
   * Return value.
   * Return value.
   * `errno', if has been changed by the system call.
   * `errno', if has been changed by the system call.
   * "Ctrl-C" flag.
   * "Ctrl-C" flag.
   After having done the needed type and value coercion, the target
   After having done the needed type and value coercion, the target
continues the latest continue or step action.
continues the latest continue or step action.


File: gdb.info,  Node: The F Request Packet,  Next: The F Reply Packet,  Prev: Protocol Basics,  Up: File-I/O Remote Protocol Extension
File: gdb.info,  Node: The F Request Packet,  Next: The F Reply Packet,  Prev: Protocol Basics,  Up: File-I/O Remote Protocol Extension
D.13.3 The `F' Request Packet
D.13.3 The `F' Request Packet
-----------------------------
-----------------------------
The `F' request packet has the following format:
The `F' request packet has the following format:
`FCALL-ID,PARAMETER...'
`FCALL-ID,PARAMETER...'
     CALL-ID is the identifier to indicate the host system call to be
     CALL-ID is the identifier to indicate the host system call to be
     called.  This is just the name of the function.
     called.  This is just the name of the function.
     PARAMETER... are the parameters to the system call.  Parameters
     PARAMETER... are the parameters to the system call.  Parameters
     are hexadecimal integer values, either the actual values in case
     are hexadecimal integer values, either the actual values in case
     of scalar datatypes, pointers to target buffer space in case of
     of scalar datatypes, pointers to target buffer space in case of
     compound datatypes and unspecified memory areas, or pointer/length
     compound datatypes and unspecified memory areas, or pointer/length
     pairs in case of string parameters.  These are appended to the
     pairs in case of string parameters.  These are appended to the
     CALL-ID as a comma-delimited list.  All values are transmitted in
     CALL-ID as a comma-delimited list.  All values are transmitted in
     ASCII string representation, pointer/length pairs separated by a
     ASCII string representation, pointer/length pairs separated by a
     slash.
     slash.


File: gdb.info,  Node: The F Reply Packet,  Next: The Ctrl-C Message,  Prev: The F Request Packet,  Up: File-I/O Remote Protocol Extension
File: gdb.info,  Node: The F Reply Packet,  Next: The Ctrl-C Message,  Prev: The F Request Packet,  Up: File-I/O Remote Protocol Extension
D.13.4 The `F' Reply Packet
D.13.4 The `F' Reply Packet
---------------------------
---------------------------
The `F' reply packet has the following format:
The `F' reply packet has the following format:
`FRETCODE,ERRNO,CTRL-C FLAG;CALL-SPECIFIC ATTACHMENT'
`FRETCODE,ERRNO,CTRL-C FLAG;CALL-SPECIFIC ATTACHMENT'
     RETCODE is the return code of the system call as hexadecimal value.
     RETCODE is the return code of the system call as hexadecimal value.
     ERRNO is the `errno' set by the call, in protocol-specific
     ERRNO is the `errno' set by the call, in protocol-specific
     representation.  This parameter can be omitted if the call was
     representation.  This parameter can be omitted if the call was
     successful.
     successful.
     CTRL-C FLAG is only sent if the user requested a break.  In this
     CTRL-C FLAG is only sent if the user requested a break.  In this
     case, ERRNO must be sent as well, even if the call was successful.
     case, ERRNO must be sent as well, even if the call was successful.
     The CTRL-C FLAG itself consists of the character `C':
     The CTRL-C FLAG itself consists of the character `C':
          F0,0,C
          F0,0,C
     or, if the call was interrupted before the host call has been
     or, if the call was interrupted before the host call has been
     performed:
     performed:
          F-1,4,C
          F-1,4,C
     assuming 4 is the protocol-specific representation of `EINTR'.
     assuming 4 is the protocol-specific representation of `EINTR'.


File: gdb.info,  Node: The Ctrl-C Message,  Next: Console I/O,  Prev: The F Reply Packet,  Up: File-I/O Remote Protocol Extension
File: gdb.info,  Node: The Ctrl-C Message,  Next: Console I/O,  Prev: The F Reply Packet,  Up: File-I/O Remote Protocol Extension
D.13.5 The `Ctrl-C' Message
D.13.5 The `Ctrl-C' Message
---------------------------
---------------------------
If the `Ctrl-C' flag is set in the GDB reply packet (*note The F Reply
If the `Ctrl-C' flag is set in the GDB reply packet (*note The F Reply
Packet::), the target should behave as if it had gotten a break
Packet::), the target should behave as if it had gotten a break
message.  The meaning for the target is "system call interrupted by
message.  The meaning for the target is "system call interrupted by
`SIGINT'".  Consequentially, the target should actually stop (as with a
`SIGINT'".  Consequentially, the target should actually stop (as with a
break message) and return to GDB with a `T02' packet.
break message) and return to GDB with a `T02' packet.
   It's important for the target to know in which state the system call
   It's important for the target to know in which state the system call
was interrupted.  There are two possible cases:
was interrupted.  There are two possible cases:
   * The system call hasn't been performed on the host yet.
   * The system call hasn't been performed on the host yet.
   * The system call on the host has been finished.
   * The system call on the host has been finished.
   These two states can be distinguished by the target by the value of
   These two states can be distinguished by the target by the value of
the returned `errno'.  If it's the protocol representation of `EINTR',
the returned `errno'.  If it's the protocol representation of `EINTR',
the system call hasn't been performed.  This is equivalent to the
the system call hasn't been performed.  This is equivalent to the
`EINTR' handling on POSIX systems.  In any other case, the target may
`EINTR' handling on POSIX systems.  In any other case, the target may
presume that the system call has been finished -- successfully or not
presume that the system call has been finished -- successfully or not
-- and should behave as if the break message arrived right after the
-- and should behave as if the break message arrived right after the
system call.
system call.
   GDB must behave reliably.  If the system call has not been called
   GDB must behave reliably.  If the system call has not been called
yet, GDB may send the `F' reply immediately, setting `EINTR' as `errno'
yet, GDB may send the `F' reply immediately, setting `EINTR' as `errno'
in the packet.  If the system call on the host has been finished before
in the packet.  If the system call on the host has been finished before
the user requests a break, the full action must be finished by GDB.
the user requests a break, the full action must be finished by GDB.
This requires sending `M' or `X' packets as necessary.  The `F' packet
This requires sending `M' or `X' packets as necessary.  The `F' packet
may only be sent when either nothing has happened or the full action
may only be sent when either nothing has happened or the full action
has been completed.
has been completed.


File: gdb.info,  Node: Console I/O,  Next: List of Supported Calls,  Prev: The Ctrl-C Message,  Up: File-I/O Remote Protocol Extension
File: gdb.info,  Node: Console I/O,  Next: List of Supported Calls,  Prev: The Ctrl-C Message,  Up: File-I/O Remote Protocol Extension
D.13.6 Console I/O
D.13.6 Console I/O
------------------
------------------
By default and if not explicitly closed by the target system, the file
By default and if not explicitly closed by the target system, the file
descriptors 0, 1 and 2 are connected to the GDB console.  Output on the
descriptors 0, 1 and 2 are connected to the GDB console.  Output on the
GDB console is handled as any other file output operation (`write(1,
GDB console is handled as any other file output operation (`write(1,
...)' or `write(2, ...)').  Console input is handled by GDB so that
...)' or `write(2, ...)').  Console input is handled by GDB so that
after the target read request from file descriptor 0 all following
after the target read request from file descriptor 0 all following
typing is buffered until either one of the following conditions is met:
typing is buffered until either one of the following conditions is met:
   * The user types `Ctrl-c'.  The behaviour is as explained above, and
   * The user types `Ctrl-c'.  The behaviour is as explained above, and
     the `read' system call is treated as finished.
     the `read' system call is treated as finished.
   * The user presses .  This is treated as end of input with a
   * The user presses .  This is treated as end of input with a
     trailing newline.
     trailing newline.
   * The user types `Ctrl-d'.  This is treated as end of input.  No
   * The user types `Ctrl-d'.  This is treated as end of input.  No
     trailing character (neither newline nor `Ctrl-D') is appended to
     trailing character (neither newline nor `Ctrl-D') is appended to
     the input.
     the input.
   If the user has typed more characters than fit in the buffer given to
   If the user has typed more characters than fit in the buffer given to
the `read' call, the trailing characters are buffered in GDB until
the `read' call, the trailing characters are buffered in GDB until
either another `read(0, ...)' is requested by the target, or debugging
either another `read(0, ...)' is requested by the target, or debugging
is stopped at the user's request.
is stopped at the user's request.


File: gdb.info,  Node: List of Supported Calls,  Next: Protocol-specific Representation of Datatypes,  Prev: Console I/O,  Up: File-I/O Remote Protocol Extension
File: gdb.info,  Node: List of Supported Calls,  Next: Protocol-specific Representation of Datatypes,  Prev: Console I/O,  Up: File-I/O Remote Protocol Extension
D.13.7 List of Supported Calls
D.13.7 List of Supported Calls
------------------------------
------------------------------
* Menu:
* Menu:
* open::
* open::
* close::
* close::
* read::
* read::
* write::
* write::
* lseek::
* lseek::
* rename::
* rename::
* unlink::
* unlink::
* stat/fstat::
* stat/fstat::
* gettimeofday::
* gettimeofday::
* isatty::
* isatty::
* system::
* system::


File: gdb.info,  Node: open,  Next: close,  Up: List of Supported Calls
File: gdb.info,  Node: open,  Next: close,  Up: List of Supported Calls
open
open
....
....
Synopsis:
Synopsis:
          int open(const char *pathname, int flags);
          int open(const char *pathname, int flags);
          int open(const char *pathname, int flags, mode_t mode);
          int open(const char *pathname, int flags, mode_t mode);
Request:
Request:
     `Fopen,PATHPTR/LEN,FLAGS,MODE'
     `Fopen,PATHPTR/LEN,FLAGS,MODE'
     FLAGS is the bitwise `OR' of the following values:
     FLAGS is the bitwise `OR' of the following values:
    `O_CREAT'
    `O_CREAT'
          If the file does not exist it will be created.  The host
          If the file does not exist it will be created.  The host
          rules apply as far as file ownership and time stamps are
          rules apply as far as file ownership and time stamps are
          concerned.
          concerned.
    `O_EXCL'
    `O_EXCL'
          When used with `O_CREAT', if the file already exists it is an
          When used with `O_CREAT', if the file already exists it is an
          error and open() fails.
          error and open() fails.
    `O_TRUNC'
    `O_TRUNC'
          If the file already exists and the open mode allows writing
          If the file already exists and the open mode allows writing
          (`O_RDWR' or `O_WRONLY' is given) it will be truncated to
          (`O_RDWR' or `O_WRONLY' is given) it will be truncated to
          zero length.
          zero length.
    `O_APPEND'
    `O_APPEND'
          The file is opened in append mode.
          The file is opened in append mode.
    `O_RDONLY'
    `O_RDONLY'
          The file is opened for reading only.
          The file is opened for reading only.
    `O_WRONLY'
    `O_WRONLY'
          The file is opened for writing only.
          The file is opened for writing only.
    `O_RDWR'
    `O_RDWR'
          The file is opened for reading and writing.
          The file is opened for reading and writing.
     Other bits are silently ignored.
     Other bits are silently ignored.
     MODE is the bitwise `OR' of the following values:
     MODE is the bitwise `OR' of the following values:
    `S_IRUSR'
    `S_IRUSR'
          User has read permission.
          User has read permission.
    `S_IWUSR'
    `S_IWUSR'
          User has write permission.
          User has write permission.
    `S_IRGRP'
    `S_IRGRP'
          Group has read permission.
          Group has read permission.
    `S_IWGRP'
    `S_IWGRP'
          Group has write permission.
          Group has write permission.
    `S_IROTH'
    `S_IROTH'
          Others have read permission.
          Others have read permission.
    `S_IWOTH'
    `S_IWOTH'
          Others have write permission.
          Others have write permission.
     Other bits are silently ignored.
     Other bits are silently ignored.
Return value:
Return value:
     `open' returns the new file descriptor or -1 if an error occurred.
     `open' returns the new file descriptor or -1 if an error occurred.
Errors:
Errors:
    `EEXIST'
    `EEXIST'
          PATHNAME already exists and `O_CREAT' and `O_EXCL' were used.
          PATHNAME already exists and `O_CREAT' and `O_EXCL' were used.
    `EISDIR'
    `EISDIR'
          PATHNAME refers to a directory.
          PATHNAME refers to a directory.
    `EACCES'
    `EACCES'
          The requested access is not allowed.
          The requested access is not allowed.
    `ENAMETOOLONG'
    `ENAMETOOLONG'
          PATHNAME was too long.
          PATHNAME was too long.
    `ENOENT'
    `ENOENT'
          A directory component in PATHNAME does not exist.
          A directory component in PATHNAME does not exist.
    `ENODEV'
    `ENODEV'
          PATHNAME refers to a device, pipe, named pipe or socket.
          PATHNAME refers to a device, pipe, named pipe or socket.
    `EROFS'
    `EROFS'
          PATHNAME refers to a file on a read-only filesystem and write
          PATHNAME refers to a file on a read-only filesystem and write
          access was requested.
          access was requested.
    `EFAULT'
    `EFAULT'
          PATHNAME is an invalid pointer value.
          PATHNAME is an invalid pointer value.
    `ENOSPC'
    `ENOSPC'
          No space on device to create the file.
          No space on device to create the file.
    `EMFILE'
    `EMFILE'
          The process already has the maximum number of files open.
          The process already has the maximum number of files open.
    `ENFILE'
    `ENFILE'
          The limit on the total number of files open on the system has
          The limit on the total number of files open on the system has
          been reached.
          been reached.
    `EINTR'
    `EINTR'
          The call was interrupted by the user.
          The call was interrupted by the user.


File: gdb.info,  Node: close,  Next: read,  Prev: open,  Up: List of Supported Calls
File: gdb.info,  Node: close,  Next: read,  Prev: open,  Up: List of Supported Calls
close
close
.....
.....
Synopsis:
Synopsis:
          int close(int fd);
          int close(int fd);
Request:
Request:
     `Fclose,FD'
     `Fclose,FD'
Return value:
Return value:
     `close' returns zero on success, or -1 if an error occurred.
     `close' returns zero on success, or -1 if an error occurred.
Errors:
Errors:
    `EBADF'
    `EBADF'
          FD isn't a valid open file descriptor.
          FD isn't a valid open file descriptor.
    `EINTR'
    `EINTR'
          The call was interrupted by the user.
          The call was interrupted by the user.


File: gdb.info,  Node: read,  Next: write,  Prev: close,  Up: List of Supported Calls
File: gdb.info,  Node: read,  Next: write,  Prev: close,  Up: List of Supported Calls
read
read
....
....
Synopsis:
Synopsis:
          int read(int fd, void *buf, unsigned int count);
          int read(int fd, void *buf, unsigned int count);
Request:
Request:
     `Fread,FD,BUFPTR,COUNT'
     `Fread,FD,BUFPTR,COUNT'
Return value:
Return value:
     On success, the number of bytes read is returned.  Zero indicates
     On success, the number of bytes read is returned.  Zero indicates
     end of file.  If count is zero, read returns zero as well.  On
     end of file.  If count is zero, read returns zero as well.  On
     error, -1 is returned.
     error, -1 is returned.
Errors:
Errors:
    `EBADF'
    `EBADF'
          FD is not a valid file descriptor or is not open for reading.
          FD is not a valid file descriptor or is not open for reading.
    `EFAULT'
    `EFAULT'
          BUFPTR is an invalid pointer value.
          BUFPTR is an invalid pointer value.
    `EINTR'
    `EINTR'
          The call was interrupted by the user.
          The call was interrupted by the user.


File: gdb.info,  Node: write,  Next: lseek,  Prev: read,  Up: List of Supported Calls
File: gdb.info,  Node: write,  Next: lseek,  Prev: read,  Up: List of Supported Calls
write
write
.....
.....
Synopsis:
Synopsis:
          int write(int fd, const void *buf, unsigned int count);
          int write(int fd, const void *buf, unsigned int count);
Request:
Request:
     `Fwrite,FD,BUFPTR,COUNT'
     `Fwrite,FD,BUFPTR,COUNT'
Return value:
Return value:
     On success, the number of bytes written are returned.  Zero
     On success, the number of bytes written are returned.  Zero
     indicates nothing was written.  On error, -1 is returned.
     indicates nothing was written.  On error, -1 is returned.
Errors:
Errors:
    `EBADF'
    `EBADF'
          FD is not a valid file descriptor or is not open for writing.
          FD is not a valid file descriptor or is not open for writing.
    `EFAULT'
    `EFAULT'
          BUFPTR is an invalid pointer value.
          BUFPTR is an invalid pointer value.
    `EFBIG'
    `EFBIG'
          An attempt was made to write a file that exceeds the
          An attempt was made to write a file that exceeds the
          host-specific maximum file size allowed.
          host-specific maximum file size allowed.
    `ENOSPC'
    `ENOSPC'
          No space on device to write the data.
          No space on device to write the data.
    `EINTR'
    `EINTR'
          The call was interrupted by the user.
          The call was interrupted by the user.


File: gdb.info,  Node: lseek,  Next: rename,  Prev: write,  Up: List of Supported Calls
File: gdb.info,  Node: lseek,  Next: rename,  Prev: write,  Up: List of Supported Calls
lseek
lseek
.....
.....
Synopsis:
Synopsis:
          long lseek (int fd, long offset, int flag);
          long lseek (int fd, long offset, int flag);
Request:
Request:
     `Flseek,FD,OFFSET,FLAG'
     `Flseek,FD,OFFSET,FLAG'
     FLAG is one of:
     FLAG is one of:
    `SEEK_SET'
    `SEEK_SET'
          The offset is set to OFFSET bytes.
          The offset is set to OFFSET bytes.
    `SEEK_CUR'
    `SEEK_CUR'
          The offset is set to its current location plus OFFSET bytes.
          The offset is set to its current location plus OFFSET bytes.
    `SEEK_END'
    `SEEK_END'
          The offset is set to the size of the file plus OFFSET bytes.
          The offset is set to the size of the file plus OFFSET bytes.
Return value:
Return value:
     On success, the resulting unsigned offset in bytes from the
     On success, the resulting unsigned offset in bytes from the
     beginning of the file is returned.  Otherwise, a value of -1 is
     beginning of the file is returned.  Otherwise, a value of -1 is
     returned.
     returned.
Errors:
Errors:
    `EBADF'
    `EBADF'
          FD is not a valid open file descriptor.
          FD is not a valid open file descriptor.
    `ESPIPE'
    `ESPIPE'
          FD is associated with the GDB console.
          FD is associated with the GDB console.
    `EINVAL'
    `EINVAL'
          FLAG is not a proper value.
          FLAG is not a proper value.
    `EINTR'
    `EINTR'
          The call was interrupted by the user.
          The call was interrupted by the user.


File: gdb.info,  Node: rename,  Next: unlink,  Prev: lseek,  Up: List of Supported Calls
File: gdb.info,  Node: rename,  Next: unlink,  Prev: lseek,  Up: List of Supported Calls
rename
rename
......
......
Synopsis:
Synopsis:
          int rename(const char *oldpath, const char *newpath);
          int rename(const char *oldpath, const char *newpath);
Request:
Request:
     `Frename,OLDPATHPTR/LEN,NEWPATHPTR/LEN'
     `Frename,OLDPATHPTR/LEN,NEWPATHPTR/LEN'
Return value:
Return value:
     On success, zero is returned.  On error, -1 is returned.
     On success, zero is returned.  On error, -1 is returned.
Errors:
Errors:
    `EISDIR'
    `EISDIR'
          NEWPATH is an existing directory, but OLDPATH is not a
          NEWPATH is an existing directory, but OLDPATH is not a
          directory.
          directory.
    `EEXIST'
    `EEXIST'
          NEWPATH is a non-empty directory.
          NEWPATH is a non-empty directory.
    `EBUSY'
    `EBUSY'
          OLDPATH or NEWPATH is a directory that is in use by some
          OLDPATH or NEWPATH is a directory that is in use by some
          process.
          process.
    `EINVAL'
    `EINVAL'
          An attempt was made to make a directory a subdirectory of
          An attempt was made to make a directory a subdirectory of
          itself.
          itself.
    `ENOTDIR'
    `ENOTDIR'
          A  component used as a directory in OLDPATH or new path is
          A  component used as a directory in OLDPATH or new path is
          not a directory.  Or OLDPATH is a directory and NEWPATH
          not a directory.  Or OLDPATH is a directory and NEWPATH
          exists but is not a directory.
          exists but is not a directory.
    `EFAULT'
    `EFAULT'
          OLDPATHPTR or NEWPATHPTR are invalid pointer values.
          OLDPATHPTR or NEWPATHPTR are invalid pointer values.
    `EACCES'
    `EACCES'
          No access to the file or the path of the file.
          No access to the file or the path of the file.
    `ENAMETOOLONG'
    `ENAMETOOLONG'
          OLDPATH or NEWPATH was too long.
          OLDPATH or NEWPATH was too long.
    `ENOENT'
    `ENOENT'
          A directory component in OLDPATH or NEWPATH does not exist.
          A directory component in OLDPATH or NEWPATH does not exist.
    `EROFS'
    `EROFS'
          The file is on a read-only filesystem.
          The file is on a read-only filesystem.
    `ENOSPC'
    `ENOSPC'
          The device containing the file has no room for the new
          The device containing the file has no room for the new
          directory entry.
          directory entry.
    `EINTR'
    `EINTR'
          The call was interrupted by the user.
          The call was interrupted by the user.


File: gdb.info,  Node: unlink,  Next: stat/fstat,  Prev: rename,  Up: List of Supported Calls
File: gdb.info,  Node: unlink,  Next: stat/fstat,  Prev: rename,  Up: List of Supported Calls
unlink
unlink
......
......
Synopsis:
Synopsis:
          int unlink(const char *pathname);
          int unlink(const char *pathname);
Request:
Request:
     `Funlink,PATHNAMEPTR/LEN'
     `Funlink,PATHNAMEPTR/LEN'
Return value:
Return value:
     On success, zero is returned.  On error, -1 is returned.
     On success, zero is returned.  On error, -1 is returned.
Errors:
Errors:
    `EACCES'
    `EACCES'
          No access to the file or the path of the file.
          No access to the file or the path of the file.
    `EPERM'
    `EPERM'
          The system does not allow unlinking of directories.
          The system does not allow unlinking of directories.
    `EBUSY'
    `EBUSY'
          The file PATHNAME cannot be unlinked because it's being used
          The file PATHNAME cannot be unlinked because it's being used
          by another process.
          by another process.
    `EFAULT'
    `EFAULT'
          PATHNAMEPTR is an invalid pointer value.
          PATHNAMEPTR is an invalid pointer value.
    `ENAMETOOLONG'
    `ENAMETOOLONG'
          PATHNAME was too long.
          PATHNAME was too long.
    `ENOENT'
    `ENOENT'
          A directory component in PATHNAME does not exist.
          A directory component in PATHNAME does not exist.
    `ENOTDIR'
    `ENOTDIR'
          A component of the path is not a directory.
          A component of the path is not a directory.
    `EROFS'
    `EROFS'
          The file is on a read-only filesystem.
          The file is on a read-only filesystem.
    `EINTR'
    `EINTR'
          The call was interrupted by the user.
          The call was interrupted by the user.


File: gdb.info,  Node: stat/fstat,  Next: gettimeofday,  Prev: unlink,  Up: List of Supported Calls
File: gdb.info,  Node: stat/fstat,  Next: gettimeofday,  Prev: unlink,  Up: List of Supported Calls
stat/fstat
stat/fstat
..........
..........
Synopsis:
Synopsis:
          int stat(const char *pathname, struct stat *buf);
          int stat(const char *pathname, struct stat *buf);
          int fstat(int fd, struct stat *buf);
          int fstat(int fd, struct stat *buf);
Request:
Request:
     `Fstat,PATHNAMEPTR/LEN,BUFPTR'
     `Fstat,PATHNAMEPTR/LEN,BUFPTR'
     `Ffstat,FD,BUFPTR'
     `Ffstat,FD,BUFPTR'
Return value:
Return value:
     On success, zero is returned.  On error, -1 is returned.
     On success, zero is returned.  On error, -1 is returned.
Errors:
Errors:
    `EBADF'
    `EBADF'
          FD is not a valid open file.
          FD is not a valid open file.
    `ENOENT'
    `ENOENT'
          A directory component in PATHNAME does not exist or the path
          A directory component in PATHNAME does not exist or the path
          is an empty string.
          is an empty string.
    `ENOTDIR'
    `ENOTDIR'
          A component of the path is not a directory.
          A component of the path is not a directory.
    `EFAULT'
    `EFAULT'
          PATHNAMEPTR is an invalid pointer value.
          PATHNAMEPTR is an invalid pointer value.
    `EACCES'
    `EACCES'
          No access to the file or the path of the file.
          No access to the file or the path of the file.
    `ENAMETOOLONG'
    `ENAMETOOLONG'
          PATHNAME was too long.
          PATHNAME was too long.
    `EINTR'
    `EINTR'
          The call was interrupted by the user.
          The call was interrupted by the user.


File: gdb.info,  Node: gettimeofday,  Next: isatty,  Prev: stat/fstat,  Up: List of Supported Calls
File: gdb.info,  Node: gettimeofday,  Next: isatty,  Prev: stat/fstat,  Up: List of Supported Calls
gettimeofday
gettimeofday
............
............
Synopsis:
Synopsis:
          int gettimeofday(struct timeval *tv, void *tz);
          int gettimeofday(struct timeval *tv, void *tz);
Request:
Request:
     `Fgettimeofday,TVPTR,TZPTR'
     `Fgettimeofday,TVPTR,TZPTR'
Return value:
Return value:
     On success, 0 is returned, -1 otherwise.
     On success, 0 is returned, -1 otherwise.
Errors:
Errors:
    `EINVAL'
    `EINVAL'
          TZ is a non-NULL pointer.
          TZ is a non-NULL pointer.
    `EFAULT'
    `EFAULT'
          TVPTR and/or TZPTR is an invalid pointer value.
          TVPTR and/or TZPTR is an invalid pointer value.


File: gdb.info,  Node: isatty,  Next: system,  Prev: gettimeofday,  Up: List of Supported Calls
File: gdb.info,  Node: isatty,  Next: system,  Prev: gettimeofday,  Up: List of Supported Calls
isatty
isatty
......
......
Synopsis:
Synopsis:
          int isatty(int fd);
          int isatty(int fd);
Request:
Request:
     `Fisatty,FD'
     `Fisatty,FD'
Return value:
Return value:
     Returns 1 if FD refers to the GDB console, 0 otherwise.
     Returns 1 if FD refers to the GDB console, 0 otherwise.
Errors:
Errors:
    `EINTR'
    `EINTR'
          The call was interrupted by the user.
          The call was interrupted by the user.
   Note that the `isatty' call is treated as a special case: it returns
   Note that the `isatty' call is treated as a special case: it returns
1 to the target if the file descriptor is attached to the GDB console,
1 to the target if the file descriptor is attached to the GDB console,
0 otherwise.  Implementing through system calls would require
0 otherwise.  Implementing through system calls would require
implementing `ioctl' and would be more complex than needed.
implementing `ioctl' and would be more complex than needed.


File: gdb.info,  Node: system,  Prev: isatty,  Up: List of Supported Calls
File: gdb.info,  Node: system,  Prev: isatty,  Up: List of Supported Calls
system
system
......
......
Synopsis:
Synopsis:
          int system(const char *command);
          int system(const char *command);
Request:
Request:
     `Fsystem,COMMANDPTR/LEN'
     `Fsystem,COMMANDPTR/LEN'
Return value:
Return value:
     If LEN is zero, the return value indicates whether a shell is
     If LEN is zero, the return value indicates whether a shell is
     available.  A zero return value indicates a shell is not available.
     available.  A zero return value indicates a shell is not available.
     For non-zero LEN, the value returned is -1 on error and the return
     For non-zero LEN, the value returned is -1 on error and the return
     status of the command otherwise.  Only the exit status of the
     status of the command otherwise.  Only the exit status of the
     command is returned, which is extracted from the host's `system'
     command is returned, which is extracted from the host's `system'
     return value by calling `WEXITSTATUS(retval)'.  In case `/bin/sh'
     return value by calling `WEXITSTATUS(retval)'.  In case `/bin/sh'
     could not be executed, 127 is returned.
     could not be executed, 127 is returned.
Errors:
Errors:
    `EINTR'
    `EINTR'
          The call was interrupted by the user.
          The call was interrupted by the user.
   GDB takes over the full task of calling the necessary host calls to
   GDB takes over the full task of calling the necessary host calls to
perform the `system' call.  The return value of `system' on the host is
perform the `system' call.  The return value of `system' on the host is
simplified before it's returned to the target.  Any termination signal
simplified before it's returned to the target.  Any termination signal
information from the child process is discarded, and the return value
information from the child process is discarded, and the return value
consists entirely of the exit status of the called command.
consists entirely of the exit status of the called command.
   Due to security concerns, the `system' call is by default refused by
   Due to security concerns, the `system' call is by default refused by
GDB.  The user has to allow this call explicitly with the `set remote
GDB.  The user has to allow this call explicitly with the `set remote
system-call-allowed 1' command.
system-call-allowed 1' command.
`set remote system-call-allowed'
`set remote system-call-allowed'
     Control whether to allow the `system' calls in the File I/O
     Control whether to allow the `system' calls in the File I/O
     protocol for the remote target.  The default is zero (disabled).
     protocol for the remote target.  The default is zero (disabled).
`show remote system-call-allowed'
`show remote system-call-allowed'
     Show whether the `system' calls are allowed in the File I/O
     Show whether the `system' calls are allowed in the File I/O
     protocol.
     protocol.


File: gdb.info,  Node: Protocol-specific Representation of Datatypes,  Next: Constants,  Prev: List of Supported Calls,  Up: File-I/O Remote Protocol Extension
File: gdb.info,  Node: Protocol-specific Representation of Datatypes,  Next: Constants,  Prev: List of Supported Calls,  Up: File-I/O Remote Protocol Extension
D.13.8 Protocol-specific Representation of Datatypes
D.13.8 Protocol-specific Representation of Datatypes
----------------------------------------------------
----------------------------------------------------
* Menu:
* Menu:
* Integral Datatypes::
* Integral Datatypes::
* Pointer Values::
* Pointer Values::
* Memory Transfer::
* Memory Transfer::
* struct stat::
* struct stat::
* struct timeval::
* struct timeval::


File: gdb.info,  Node: Integral Datatypes,  Next: Pointer Values,  Up: Protocol-specific Representation of Datatypes
File: gdb.info,  Node: Integral Datatypes,  Next: Pointer Values,  Up: Protocol-specific Representation of Datatypes
Integral Datatypes
Integral Datatypes
..................
..................
The integral datatypes used in the system calls are `int', `unsigned
The integral datatypes used in the system calls are `int', `unsigned
int', `long', `unsigned long', `mode_t', and `time_t'.
int', `long', `unsigned long', `mode_t', and `time_t'.
   `int', `unsigned int', `mode_t' and `time_t' are implemented as 32
   `int', `unsigned int', `mode_t' and `time_t' are implemented as 32
bit values in this protocol.
bit values in this protocol.
   `long' and `unsigned long' are implemented as 64 bit types.
   `long' and `unsigned long' are implemented as 64 bit types.
   *Note Limits::, for corresponding MIN and MAX values (similar to
   *Note Limits::, for corresponding MIN and MAX values (similar to
those in `limits.h') to allow range checking on host and target.
those in `limits.h') to allow range checking on host and target.
   `time_t' datatypes are defined as seconds since the Epoch.
   `time_t' datatypes are defined as seconds since the Epoch.
   All integral datatypes transferred as part of a memory read or write
   All integral datatypes transferred as part of a memory read or write
of a structured datatype e.g. a `struct stat' have to be given in big
of a structured datatype e.g. a `struct stat' have to be given in big
endian byte order.
endian byte order.


File: gdb.info,  Node: Pointer Values,  Next: Memory Transfer,  Prev: Integral Datatypes,  Up: Protocol-specific Representation of Datatypes
File: gdb.info,  Node: Pointer Values,  Next: Memory Transfer,  Prev: Integral Datatypes,  Up: Protocol-specific Representation of Datatypes
Pointer Values
Pointer Values
..............
..............
Pointers to target data are transmitted as they are.  An exception is
Pointers to target data are transmitted as they are.  An exception is
made for pointers to buffers for which the length isn't transmitted as
made for pointers to buffers for which the length isn't transmitted as
part of the function call, namely strings.  Strings are transmitted as
part of the function call, namely strings.  Strings are transmitted as
a pointer/length pair, both as hex values, e.g.
a pointer/length pair, both as hex values, e.g.
     `1aaf/12'
     `1aaf/12'
which is a pointer to data of length 18 bytes at position 0x1aaf.  The
which is a pointer to data of length 18 bytes at position 0x1aaf.  The
length is defined as the full string length in bytes, including the
length is defined as the full string length in bytes, including the
trailing null byte.  For example, the string `"hello world"' at address
trailing null byte.  For example, the string `"hello world"' at address
0x123456 is transmitted as
0x123456 is transmitted as
     `123456/d'
     `123456/d'


File: gdb.info,  Node: Memory Transfer,  Next: struct stat,  Prev: Pointer Values,  Up: Protocol-specific Representation of Datatypes
File: gdb.info,  Node: Memory Transfer,  Next: struct stat,  Prev: Pointer Values,  Up: Protocol-specific Representation of Datatypes
Memory Transfer
Memory Transfer
...............
...............
Structured data which is transferred using a memory read or write (for
Structured data which is transferred using a memory read or write (for
example, a `struct stat') is expected to be in a protocol-specific
example, a `struct stat') is expected to be in a protocol-specific
format with all scalar multibyte datatypes being big endian.
format with all scalar multibyte datatypes being big endian.
Translation to this representation needs to be done both by the target
Translation to this representation needs to be done both by the target
before the `F' packet is sent, and by GDB before it transfers memory to
before the `F' packet is sent, and by GDB before it transfers memory to
the target.  Transferred pointers to structured data should point to
the target.  Transferred pointers to structured data should point to
the already-coerced data at any time.
the already-coerced data at any time.


File: gdb.info,  Node: struct stat,  Next: struct timeval,  Prev: Memory Transfer,  Up: Protocol-specific Representation of Datatypes
File: gdb.info,  Node: struct stat,  Next: struct timeval,  Prev: Memory Transfer,  Up: Protocol-specific Representation of Datatypes
struct stat
struct stat
...........
...........
The buffer of type `struct stat' used by the target and GDB is defined
The buffer of type `struct stat' used by the target and GDB is defined
as follows:
as follows:
     struct stat {
     struct stat {
         unsigned int  st_dev;      /* device */
         unsigned int  st_dev;      /* device */
         unsigned int  st_ino;      /* inode */
         unsigned int  st_ino;      /* inode */
         mode_t        st_mode;     /* protection */
         mode_t        st_mode;     /* protection */
         unsigned int  st_nlink;    /* number of hard links */
         unsigned int  st_nlink;    /* number of hard links */
         unsigned int  st_uid;      /* user ID of owner */
         unsigned int  st_uid;      /* user ID of owner */
         unsigned int  st_gid;      /* group ID of owner */
         unsigned int  st_gid;      /* group ID of owner */
         unsigned int  st_rdev;     /* device type (if inode device) */
         unsigned int  st_rdev;     /* device type (if inode device) */
         unsigned long st_size;     /* total size, in bytes */
         unsigned long st_size;     /* total size, in bytes */
         unsigned long st_blksize;  /* blocksize for filesystem I/O */
         unsigned long st_blksize;  /* blocksize for filesystem I/O */
         unsigned long st_blocks;   /* number of blocks allocated */
         unsigned long st_blocks;   /* number of blocks allocated */
         time_t        st_atime;    /* time of last access */
         time_t        st_atime;    /* time of last access */
         time_t        st_mtime;    /* time of last modification */
         time_t        st_mtime;    /* time of last modification */
         time_t        st_ctime;    /* time of last change */
         time_t        st_ctime;    /* time of last change */
     };
     };
   The integral datatypes conform to the definitions given in the
   The integral datatypes conform to the definitions given in the
appropriate section (see *Note Integral Datatypes::, for details) so
appropriate section (see *Note Integral Datatypes::, for details) so
this structure is of size 64 bytes.
this structure is of size 64 bytes.
   The values of several fields have a restricted meaning and/or range
   The values of several fields have a restricted meaning and/or range
of values.
of values.
`st_dev'
`st_dev'
     A value of 0 represents a file, 1 the console.
     A value of 0 represents a file, 1 the console.
`st_ino'
`st_ino'
     No valid meaning for the target.  Transmitted unchanged.
     No valid meaning for the target.  Transmitted unchanged.
`st_mode'
`st_mode'
     Valid mode bits are described in *Note Constants::.  Any other
     Valid mode bits are described in *Note Constants::.  Any other
     bits have currently no meaning for the target.
     bits have currently no meaning for the target.
`st_uid'
`st_uid'
`st_gid'
`st_gid'
`st_rdev'
`st_rdev'
     No valid meaning for the target.  Transmitted unchanged.
     No valid meaning for the target.  Transmitted unchanged.
`st_atime'
`st_atime'
`st_mtime'
`st_mtime'
`st_ctime'
`st_ctime'
     These values have a host and file system dependent accuracy.
     These values have a host and file system dependent accuracy.
     Especially on Windows hosts, the file system may not support exact
     Especially on Windows hosts, the file system may not support exact
     timing values.
     timing values.
   The target gets a `struct stat' of the above representation and is
   The target gets a `struct stat' of the above representation and is
responsible for coercing it to the target representation before
responsible for coercing it to the target representation before
continuing.
continuing.
   Note that due to size differences between the host, target, and
   Note that due to size differences between the host, target, and
protocol representations of `struct stat' members, these members could
protocol representations of `struct stat' members, these members could
eventually get truncated on the target.
eventually get truncated on the target.


File: gdb.info,  Node: struct timeval,  Prev: struct stat,  Up: Protocol-specific Representation of Datatypes
File: gdb.info,  Node: struct timeval,  Prev: struct stat,  Up: Protocol-specific Representation of Datatypes
struct timeval
struct timeval
..............
..............
The buffer of type `struct timeval' used by the File-I/O protocol is
The buffer of type `struct timeval' used by the File-I/O protocol is
defined as follows:
defined as follows:
     struct timeval {
     struct timeval {
         time_t tv_sec;  /* second */
         time_t tv_sec;  /* second */
         long   tv_usec; /* microsecond */
         long   tv_usec; /* microsecond */
     };
     };
   The integral datatypes conform to the definitions given in the
   The integral datatypes conform to the definitions given in the
appropriate section (see *Note Integral Datatypes::, for details) so
appropriate section (see *Note Integral Datatypes::, for details) so
this structure is of size 8 bytes.
this structure is of size 8 bytes.


File: gdb.info,  Node: Constants,  Next: File-I/O Examples,  Prev: Protocol-specific Representation of Datatypes,  Up: File-I/O Remote Protocol Extension
File: gdb.info,  Node: Constants,  Next: File-I/O Examples,  Prev: Protocol-specific Representation of Datatypes,  Up: File-I/O Remote Protocol Extension
D.13.9 Constants
D.13.9 Constants
----------------
----------------
The following values are used for the constants inside of the protocol.
The following values are used for the constants inside of the protocol.
GDB and target are responsible for translating these values before and
GDB and target are responsible for translating these values before and
after the call as needed.
after the call as needed.
* Menu:
* Menu:
* Open Flags::
* Open Flags::
* mode_t Values::
* mode_t Values::
* Errno Values::
* Errno Values::
* Lseek Flags::
* Lseek Flags::
* Limits::
* Limits::


File: gdb.info,  Node: Open Flags,  Next: mode_t Values,  Up: Constants
File: gdb.info,  Node: Open Flags,  Next: mode_t Values,  Up: Constants
Open Flags
Open Flags
..........
..........
All values are given in hexadecimal representation.
All values are given in hexadecimal representation.
       O_RDONLY        0x0
       O_RDONLY        0x0
       O_WRONLY        0x1
       O_WRONLY        0x1
       O_RDWR          0x2
       O_RDWR          0x2
       O_APPEND        0x8
       O_APPEND        0x8
       O_CREAT       0x200
       O_CREAT       0x200
       O_TRUNC       0x400
       O_TRUNC       0x400
       O_EXCL        0x800
       O_EXCL        0x800


File: gdb.info,  Node: mode_t Values,  Next: Errno Values,  Prev: Open Flags,  Up: Constants
File: gdb.info,  Node: mode_t Values,  Next: Errno Values,  Prev: Open Flags,  Up: Constants
mode_t Values
mode_t Values
.............
.............
All values are given in octal representation.
All values are given in octal representation.
       S_IFREG       0100000
       S_IFREG       0100000
       S_IFDIR        040000
       S_IFDIR        040000
       S_IRUSR          0400
       S_IRUSR          0400
       S_IWUSR          0200
       S_IWUSR          0200
       S_IXUSR          0100
       S_IXUSR          0100
       S_IRGRP           040
       S_IRGRP           040
       S_IWGRP           020
       S_IWGRP           020
       S_IXGRP           010
       S_IXGRP           010
       S_IROTH            04
       S_IROTH            04
       S_IWOTH            02
       S_IWOTH            02
       S_IXOTH            01
       S_IXOTH            01


File: gdb.info,  Node: Errno Values,  Next: Lseek Flags,  Prev: mode_t Values,  Up: Constants
File: gdb.info,  Node: Errno Values,  Next: Lseek Flags,  Prev: mode_t Values,  Up: Constants
Errno Values
Errno Values
............
............
All values are given in decimal representation.
All values are given in decimal representation.
       EPERM           1
       EPERM           1
       ENOENT          2
       ENOENT          2
       EINTR           4
       EINTR           4
       EBADF           9
       EBADF           9
       EACCES         13
       EACCES         13
       EFAULT         14
       EFAULT         14
       EBUSY          16
       EBUSY          16
       EEXIST         17
       EEXIST         17
       ENODEV         19
       ENODEV         19
       ENOTDIR        20
       ENOTDIR        20
       EISDIR         21
       EISDIR         21
       EINVAL         22
       EINVAL         22
       ENFILE         23
       ENFILE         23
       EMFILE         24
       EMFILE         24
       EFBIG          27
       EFBIG          27
       ENOSPC         28
       ENOSPC         28
       ESPIPE         29
       ESPIPE         29
       EROFS          30
       EROFS          30
       ENAMETOOLONG   91
       ENAMETOOLONG   91
       EUNKNOWN       9999
       EUNKNOWN       9999
   `EUNKNOWN' is used as a fallback error value if a host system returns
   `EUNKNOWN' is used as a fallback error value if a host system returns
 any error value not in the list of supported error numbers.
 any error value not in the list of supported error numbers.


File: gdb.info,  Node: Lseek Flags,  Next: Limits,  Prev: Errno Values,  Up: Constants
File: gdb.info,  Node: Lseek Flags,  Next: Limits,  Prev: Errno Values,  Up: Constants
Lseek Flags
Lseek Flags
...........
...........
       SEEK_SET      0
       SEEK_SET      0
       SEEK_CUR      1
       SEEK_CUR      1
       SEEK_END      2
       SEEK_END      2


File: gdb.info,  Node: Limits,  Prev: Lseek Flags,  Up: Constants
File: gdb.info,  Node: Limits,  Prev: Lseek Flags,  Up: Constants
Limits
Limits
......
......
All values are given in decimal representation.
All values are given in decimal representation.
       INT_MIN       -2147483648
       INT_MIN       -2147483648
       INT_MAX        2147483647
       INT_MAX        2147483647
       UINT_MAX       4294967295
       UINT_MAX       4294967295
       LONG_MIN      -9223372036854775808
       LONG_MIN      -9223372036854775808
       LONG_MAX       9223372036854775807
       LONG_MAX       9223372036854775807
       ULONG_MAX      18446744073709551615
       ULONG_MAX      18446744073709551615


File: gdb.info,  Node: File-I/O Examples,  Prev: Constants,  Up: File-I/O Remote Protocol Extension
File: gdb.info,  Node: File-I/O Examples,  Prev: Constants,  Up: File-I/O Remote Protocol Extension
D.13.10 File-I/O Examples
D.13.10 File-I/O Examples
-------------------------
-------------------------
Example sequence of a write call, file descriptor 3, buffer is at target
Example sequence of a write call, file descriptor 3, buffer is at target
address 0x1234, 6 bytes should be written:
address 0x1234, 6 bytes should be written:
     <- `Fwrite,3,1234,6'
     <- `Fwrite,3,1234,6'
     _request memory read from target_
     _request memory read from target_
     -> `m1234,6'
     -> `m1234,6'
     <- XXXXXX
     <- XXXXXX
     _return "6 bytes written"_
     _return "6 bytes written"_
     -> `F6'
     -> `F6'
   Example sequence of a read call, file descriptor 3, buffer is at
   Example sequence of a read call, file descriptor 3, buffer is at
target address 0x1234, 6 bytes should be read:
target address 0x1234, 6 bytes should be read:
     <- `Fread,3,1234,6'
     <- `Fread,3,1234,6'
     _request memory write to target_
     _request memory write to target_
     -> `X1234,6:XXXXXX'
     -> `X1234,6:XXXXXX'
     _return "6 bytes read"_
     _return "6 bytes read"_
     -> `F6'
     -> `F6'
   Example sequence of a read call, call fails on the host due to
   Example sequence of a read call, call fails on the host due to
invalid file descriptor (`EBADF'):
invalid file descriptor (`EBADF'):
     <- `Fread,3,1234,6'
     <- `Fread,3,1234,6'
     -> `F-1,9'
     -> `F-1,9'
   Example sequence of a read call, user presses `Ctrl-c' before
   Example sequence of a read call, user presses `Ctrl-c' before
syscall on host is called:
syscall on host is called:
     <- `Fread,3,1234,6'
     <- `Fread,3,1234,6'
     -> `F-1,4,C'
     -> `F-1,4,C'
     <- `T02'
     <- `T02'
   Example sequence of a read call, user presses `Ctrl-c' after syscall
   Example sequence of a read call, user presses `Ctrl-c' after syscall
on host is called:
on host is called:
     <- `Fread,3,1234,6'
     <- `Fread,3,1234,6'
     -> `X1234,6:XXXXXX'
     -> `X1234,6:XXXXXX'
     <- `T02'
     <- `T02'


File: gdb.info,  Node: Library List Format,  Next: Memory Map Format,  Prev: File-I/O Remote Protocol Extension,  Up: Remote Protocol
File: gdb.info,  Node: Library List Format,  Next: Memory Map Format,  Prev: File-I/O Remote Protocol Extension,  Up: Remote Protocol
D.14 Library List Format
D.14 Library List Format
========================
========================
On some platforms, a dynamic loader (e.g. `ld.so') runs in the same
On some platforms, a dynamic loader (e.g. `ld.so') runs in the same
process as your application to manage libraries.  In this case, GDB can
process as your application to manage libraries.  In this case, GDB can
use the loader's symbol table and normal memory operations to maintain
use the loader's symbol table and normal memory operations to maintain
a list of shared libraries.  On other platforms, the operating system
a list of shared libraries.  On other platforms, the operating system
manages loaded libraries.  GDB can not retrieve the list of currently
manages loaded libraries.  GDB can not retrieve the list of currently
loaded libraries through memory operations, so it uses the
loaded libraries through memory operations, so it uses the
`qXfer:libraries:read' packet (*note qXfer library list read::)
`qXfer:libraries:read' packet (*note qXfer library list read::)
instead.  The remote stub queries the target's operating system and
instead.  The remote stub queries the target's operating system and
reports which libraries are loaded.
reports which libraries are loaded.
   The `qXfer:libraries:read' packet returns an XML document which
   The `qXfer:libraries:read' packet returns an XML document which
lists loaded libraries and their offsets.  Each library has an
lists loaded libraries and their offsets.  Each library has an
associated name and one or more segment or section base addresses,
associated name and one or more segment or section base addresses,
which report where the library was loaded in memory.
which report where the library was loaded in memory.
   For the common case of libraries that are fully linked binaries, the
   For the common case of libraries that are fully linked binaries, the
library should have a list of segments.  If the target supports dynamic
library should have a list of segments.  If the target supports dynamic
linking of a relocatable object file, its library XML element should
linking of a relocatable object file, its library XML element should
instead include a list of allocated sections.  The segment or section
instead include a list of allocated sections.  The segment or section
bases are start addresses, not relocation offsets; they do not depend
bases are start addresses, not relocation offsets; they do not depend
on the library's link-time base addresses.
on the library's link-time base addresses.
   GDB must be linked with the Expat library to support XML library
   GDB must be linked with the Expat library to support XML library
lists.  *Note Expat::.
lists.  *Note Expat::.
   A simple memory map, with one loaded library relocated by a single
   A simple memory map, with one loaded library relocated by a single
offset, looks like this:
offset, looks like this:
     
     
       
       
         
         
       
       
     
     
   Another simple memory map, with one loaded library with three
   Another simple memory map, with one loaded library with three
allocated sections (.text, .data, .bss), looks like this:
allocated sections (.text, .data, .bss), looks like this:
     
     
       
       
         
         
         
         
         
         
       
       
     
     
   The format of a library list is described by this DTD:
   The format of a library list is described by this DTD:
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
   In addition, segments and section descriptors cannot be mixed within
   In addition, segments and section descriptors cannot be mixed within
a single library element, and you must supply at least one segment or
a single library element, and you must supply at least one segment or
section for each library.
section for each library.


File: gdb.info,  Node: Memory Map Format,  Next: Thread List Format,  Prev: Library List Format,  Up: Remote Protocol
File: gdb.info,  Node: Memory Map Format,  Next: Thread List Format,  Prev: Library List Format,  Up: Remote Protocol
D.15 Memory Map Format
D.15 Memory Map Format
======================
======================
To be able to write into flash memory, GDB needs to obtain a memory map
To be able to write into flash memory, GDB needs to obtain a memory map
from the target.  This section describes the format of the memory map.
from the target.  This section describes the format of the memory map.
   The memory map is obtained using the `qXfer:memory-map:read' (*note
   The memory map is obtained using the `qXfer:memory-map:read' (*note
qXfer memory map read::) packet and is an XML document that lists
qXfer memory map read::) packet and is an XML document that lists
memory regions.
memory regions.
   GDB must be linked with the Expat library to support XML memory
   GDB must be linked with the Expat library to support XML memory
maps.  *Note Expat::.
maps.  *Note Expat::.
   The top-level structure of the document is shown below:
   The top-level structure of the document is shown below:
     
     
     
     
               PUBLIC "+//IDN gnu.org//DTD GDB Memory Map V1.0//EN"
               PUBLIC "+//IDN gnu.org//DTD GDB Memory Map V1.0//EN"
                      "http://sourceware.org/gdb/gdb-memory-map.dtd">
                      "http://sourceware.org/gdb/gdb-memory-map.dtd">
     
     
         region...
         region...
     
     
   Each region can be either:
   Each region can be either:
   * A region of RAM starting at ADDR and extending for LENGTH bytes
   * A region of RAM starting at ADDR and extending for LENGTH bytes
     from there:
     from there:
          
          
   * A region of read-only memory:
   * A region of read-only memory:
          
          
   * A region of flash memory, with erasure blocks BLOCKSIZE bytes in
   * A region of flash memory, with erasure blocks BLOCKSIZE bytes in
     length:
     length:
          
          
            BLOCKSIZE
            BLOCKSIZE
          
          
   Regions must not overlap.  GDB assumes that areas of memory not
   Regions must not overlap.  GDB assumes that areas of memory not
covered by the memory map are RAM, and uses the ordinary `M' and `X'
covered by the memory map are RAM, and uses the ordinary `M' and `X'
packets to write to addresses in such ranges.
packets to write to addresses in such ranges.
   The formal DTD for memory map format is given below:
   The formal DTD for memory map format is given below:
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
                  and its type, or device. -->
     
     
                             start   CDATA   #REQUIRED
                             start   CDATA   #REQUIRED
                             length  CDATA   #REQUIRED
                             length  CDATA   #REQUIRED
                             device  CDATA   #IMPLIED>
                             device  CDATA   #IMPLIED>
     
     
     
     
     
     


File: gdb.info,  Node: Thread List Format,  Prev: Memory Map Format,  Up: Remote Protocol
File: gdb.info,  Node: Thread List Format,  Prev: Memory Map Format,  Up: Remote Protocol
D.16 Thread List Format
D.16 Thread List Format
=======================
=======================
To efficiently update the list of threads and their attributes, GDB
To efficiently update the list of threads and their attributes, GDB
issues the `qXfer:threads:read' packet (*note qXfer threads read::) and
issues the `qXfer:threads:read' packet (*note qXfer threads read::) and
obtains the XML document with the following structure:
obtains the XML document with the following structure:
     
     
     
     
         
         
         ... description ...
         ... description ...
         
         
     
     
   Each `thread' element must have the `id' attribute that identifies
   Each `thread' element must have the `id' attribute that identifies
the thread (*note thread-id syntax::).  The `core' attribute, if
the thread (*note thread-id syntax::).  The `core' attribute, if
present, specifies which processor core the thread was last executing
present, specifies which processor core the thread was last executing
on.  The content of the of `thread' element is interpreted as
on.  The content of the of `thread' element is interpreted as
human-readable auxilliary information.
human-readable auxilliary information.


File: gdb.info,  Node: Agent Expressions,  Next: Target Descriptions,  Prev: Remote Protocol,  Up: Top
File: gdb.info,  Node: Agent Expressions,  Next: Target Descriptions,  Prev: Remote Protocol,  Up: Top
Appendix E The GDB Agent Expression Mechanism
Appendix E The GDB Agent Expression Mechanism
*********************************************
*********************************************
In some applications, it is not feasible for the debugger to interrupt
In some applications, it is not feasible for the debugger to interrupt
the program's execution long enough for the developer to learn anything
the program's execution long enough for the developer to learn anything
helpful about its behavior.  If the program's correctness depends on its
helpful about its behavior.  If the program's correctness depends on its
real-time behavior, delays introduced by a debugger might cause the
real-time behavior, delays introduced by a debugger might cause the
program to fail, even when the code itself is correct.  It is useful to
program to fail, even when the code itself is correct.  It is useful to
be able to observe the program's behavior without interrupting it.
be able to observe the program's behavior without interrupting it.
   Using GDB's `trace' and `collect' commands, the user can specify
   Using GDB's `trace' and `collect' commands, the user can specify
locations in the program, and arbitrary expressions to evaluate when
locations in the program, and arbitrary expressions to evaluate when
those locations are reached.  Later, using the `tfind' command, she can
those locations are reached.  Later, using the `tfind' command, she can
examine the values those expressions had when the program hit the trace
examine the values those expressions had when the program hit the trace
points.  The expressions may also denote objects in memory --
points.  The expressions may also denote objects in memory --
structures or arrays, for example -- whose values GDB should record;
structures or arrays, for example -- whose values GDB should record;
while visiting a particular tracepoint, the user may inspect those
while visiting a particular tracepoint, the user may inspect those
objects as if they were in memory at that moment.  However, because GDB
objects as if they were in memory at that moment.  However, because GDB
records these values without interacting with the user, it can do so
records these values without interacting with the user, it can do so
quickly and unobtrusively, hopefully not disturbing the program's
quickly and unobtrusively, hopefully not disturbing the program's
behavior.
behavior.
   When GDB is debugging a remote target, the GDB "agent" code running
   When GDB is debugging a remote target, the GDB "agent" code running
on the target computes the values of the expressions itself.  To avoid
on the target computes the values of the expressions itself.  To avoid
having a full symbolic expression evaluator on the agent, GDB translates
having a full symbolic expression evaluator on the agent, GDB translates
expressions in the source language into a simpler bytecode language, and
expressions in the source language into a simpler bytecode language, and
then sends the bytecode to the agent; the agent then executes the
then sends the bytecode to the agent; the agent then executes the
bytecode, and records the values for GDB to retrieve later.
bytecode, and records the values for GDB to retrieve later.
   The bytecode language is simple; there are forty-odd opcodes, the
   The bytecode language is simple; there are forty-odd opcodes, the
bulk of which are the usual vocabulary of C operands (addition,
bulk of which are the usual vocabulary of C operands (addition,
subtraction, shifts, and so on) and various sizes of literals and
subtraction, shifts, and so on) and various sizes of literals and
memory reference operations.  The bytecode interpreter operates
memory reference operations.  The bytecode interpreter operates
strictly on machine-level values -- various sizes of integers and
strictly on machine-level values -- various sizes of integers and
floating point numbers -- and requires no information about types or
floating point numbers -- and requires no information about types or
symbols; thus, the interpreter's internal data structures are simple,
symbols; thus, the interpreter's internal data structures are simple,
and each bytecode requires only a few native machine instructions to
and each bytecode requires only a few native machine instructions to
implement it.  The interpreter is small, and strict limits on the
implement it.  The interpreter is small, and strict limits on the
memory and time required to evaluate an expression are easy to
memory and time required to evaluate an expression are easy to
determine, making it suitable for use by the debugging agent in
determine, making it suitable for use by the debugging agent in
real-time applications.
real-time applications.
* Menu:
* Menu:
* General Bytecode Design::     Overview of the interpreter.
* General Bytecode Design::     Overview of the interpreter.
* Bytecode Descriptions::       What each one does.
* Bytecode Descriptions::       What each one does.
* Using Agent Expressions::     How agent expressions fit into the big picture.
* Using Agent Expressions::     How agent expressions fit into the big picture.
* Varying Target Capabilities:: How to discover what the target can do.
* Varying Target Capabilities:: How to discover what the target can do.
* Rationale::                   Why we did it this way.
* Rationale::                   Why we did it this way.


File: gdb.info,  Node: General Bytecode Design,  Next: Bytecode Descriptions,  Up: Agent Expressions
File: gdb.info,  Node: General Bytecode Design,  Next: Bytecode Descriptions,  Up: Agent Expressions
E.1 General Bytecode Design
E.1 General Bytecode Design
===========================
===========================
The agent represents bytecode expressions as an array of bytes.  Each
The agent represents bytecode expressions as an array of bytes.  Each
instruction is one byte long (thus the term "bytecode").  Some
instruction is one byte long (thus the term "bytecode").  Some
instructions are followed by operand bytes; for example, the `goto'
instructions are followed by operand bytes; for example, the `goto'
instruction is followed by a destination for the jump.
instruction is followed by a destination for the jump.
   The bytecode interpreter is a stack-based machine; most instructions
   The bytecode interpreter is a stack-based machine; most instructions
pop their operands off the stack, perform some operation, and push the
pop their operands off the stack, perform some operation, and push the
result back on the stack for the next instruction to consume.  Each
result back on the stack for the next instruction to consume.  Each
element of the stack may contain either a integer or a floating point
element of the stack may contain either a integer or a floating point
value; these values are as many bits wide as the largest integer that
value; these values are as many bits wide as the largest integer that
can be directly manipulated in the source language.  Stack elements
can be directly manipulated in the source language.  Stack elements
carry no record of their type; bytecode could push a value as an
carry no record of their type; bytecode could push a value as an
integer, then pop it as a floating point value.  However, GDB will not
integer, then pop it as a floating point value.  However, GDB will not
generate code which does this.  In C, one might define the type of a
generate code which does this.  In C, one might define the type of a
stack element as follows:
stack element as follows:
     union agent_val {
     union agent_val {
       LONGEST l;
       LONGEST l;
       DOUBLEST d;
       DOUBLEST d;
     };
     };
   where `LONGEST' and `DOUBLEST' are `typedef' names for the largest
   where `LONGEST' and `DOUBLEST' are `typedef' names for the largest
integer and floating point types on the machine.
integer and floating point types on the machine.
   By the time the bytecode interpreter reaches the end of the
   By the time the bytecode interpreter reaches the end of the
expression, the value of the expression should be the only value left
expression, the value of the expression should be the only value left
on the stack.  For tracing applications, `trace' bytecodes in the
on the stack.  For tracing applications, `trace' bytecodes in the
expression will have recorded the necessary data, and the value on the
expression will have recorded the necessary data, and the value on the
stack may be discarded.  For other applications, like conditional
stack may be discarded.  For other applications, like conditional
breakpoints, the value may be useful.
breakpoints, the value may be useful.
   Separate from the stack, the interpreter has two registers:
   Separate from the stack, the interpreter has two registers:
`pc'
`pc'
     The address of the next bytecode to execute.
     The address of the next bytecode to execute.
`start'
`start'
     The address of the start of the bytecode expression, necessary for
     The address of the start of the bytecode expression, necessary for
     interpreting the `goto' and `if_goto' instructions.
     interpreting the `goto' and `if_goto' instructions.
   Neither of these registers is directly visible to the bytecode
   Neither of these registers is directly visible to the bytecode
language itself, but they are useful for defining the meanings of the
language itself, but they are useful for defining the meanings of the
bytecode operations.
bytecode operations.
   There are no instructions to perform side effects on the running
   There are no instructions to perform side effects on the running
program, or call the program's functions; we assume that these
program, or call the program's functions; we assume that these
expressions are only used for unobtrusive debugging, not for patching
expressions are only used for unobtrusive debugging, not for patching
the running code.
the running code.
   Most bytecode instructions do not distinguish between the various
   Most bytecode instructions do not distinguish between the various
sizes of values, and operate on full-width values; the upper bits of the
sizes of values, and operate on full-width values; the upper bits of the
values are simply ignored, since they do not usually make a difference
values are simply ignored, since they do not usually make a difference
to the value computed.  The exceptions to this rule are:
to the value computed.  The exceptions to this rule are:
memory reference instructions (`ref'N)
memory reference instructions (`ref'N)
     There are distinct instructions to fetch different word sizes from
     There are distinct instructions to fetch different word sizes from
     memory.  Once on the stack, however, the values are treated as
     memory.  Once on the stack, however, the values are treated as
     full-size integers.  They may need to be sign-extended; the `ext'
     full-size integers.  They may need to be sign-extended; the `ext'
     instruction exists for this purpose.
     instruction exists for this purpose.
the sign-extension instruction (`ext' N)
the sign-extension instruction (`ext' N)
     These clearly need to know which portion of their operand is to be
     These clearly need to know which portion of their operand is to be
     extended to occupy the full length of the word.
     extended to occupy the full length of the word.
   If the interpreter is unable to evaluate an expression completely for
   If the interpreter is unable to evaluate an expression completely for
some reason (a memory location is inaccessible, or a divisor is zero,
some reason (a memory location is inaccessible, or a divisor is zero,
for example), we say that interpretation "terminates with an error".
for example), we say that interpretation "terminates with an error".
This means that the problem is reported back to the interpreter's caller
This means that the problem is reported back to the interpreter's caller
in some helpful way.  In general, code using agent expressions should
in some helpful way.  In general, code using agent expressions should
assume that they may attempt to divide by zero, fetch arbitrary memory
assume that they may attempt to divide by zero, fetch arbitrary memory
locations, and misbehave in other ways.
locations, and misbehave in other ways.
   Even complicated C expressions compile to a few bytecode
   Even complicated C expressions compile to a few bytecode
instructions; for example, the expression `x + y * z' would typically
instructions; for example, the expression `x + y * z' would typically
produce code like the following, assuming that `x' and `y' live in
produce code like the following, assuming that `x' and `y' live in
registers, and `z' is a global variable holding a 32-bit `int':
registers, and `z' is a global variable holding a 32-bit `int':
     reg 1
     reg 1
     reg 2
     reg 2
     const32 address of z
     const32 address of z
     ref32
     ref32
     ext 32
     ext 32
     mul
     mul
     add
     add
     end
     end
   In detail, these mean:
   In detail, these mean:
`reg 1'
`reg 1'
     Push the value of register 1 (presumably holding `x') onto the
     Push the value of register 1 (presumably holding `x') onto the
     stack.
     stack.
`reg 2'
`reg 2'
     Push the value of register 2 (holding `y').
     Push the value of register 2 (holding `y').
`const32 address of z'
`const32 address of z'
     Push the address of `z' onto the stack.
     Push the address of `z' onto the stack.
`ref32'
`ref32'
     Fetch a 32-bit word from the address at the top of the stack;
     Fetch a 32-bit word from the address at the top of the stack;
     replace the address on the stack with the value.  Thus, we replace
     replace the address on the stack with the value.  Thus, we replace
     the address of `z' with `z''s value.
     the address of `z' with `z''s value.
`ext 32'
`ext 32'
     Sign-extend the value on the top of the stack from 32 bits to full
     Sign-extend the value on the top of the stack from 32 bits to full
     length.  This is necessary because `z' is a signed integer.
     length.  This is necessary because `z' is a signed integer.
`mul'
`mul'
     Pop the top two numbers on the stack, multiply them, and push their
     Pop the top two numbers on the stack, multiply them, and push their
     product.  Now the top of the stack contains the value of the
     product.  Now the top of the stack contains the value of the
     expression `y * z'.
     expression `y * z'.
`add'
`add'
     Pop the top two numbers, add them, and push the sum.  Now the top
     Pop the top two numbers, add them, and push the sum.  Now the top
     of the stack contains the value of `x + y * z'.
     of the stack contains the value of `x + y * z'.
`end'
`end'
     Stop executing; the value left on the stack top is the value to be
     Stop executing; the value left on the stack top is the value to be
     recorded.
     recorded.


File: gdb.info,  Node: Bytecode Descriptions,  Next: Using Agent Expressions,  Prev: General Bytecode Design,  Up: Agent Expressions
File: gdb.info,  Node: Bytecode Descriptions,  Next: Using Agent Expressions,  Prev: General Bytecode Design,  Up: Agent Expressions
E.2 Bytecode Descriptions
E.2 Bytecode Descriptions
=========================
=========================
Each bytecode description has the following form:
Each bytecode description has the following form:
`add' (0x02): A B => A+B
`add' (0x02): A B => A+B
     Pop the top two stack items, A and B, as integers; push their sum,
     Pop the top two stack items, A and B, as integers; push their sum,
     as an integer.
     as an integer.
   In this example, `add' is the name of the bytecode, and `(0x02)' is
   In this example, `add' is the name of the bytecode, and `(0x02)' is
the one-byte value used to encode the bytecode, in hexadecimal.  The
the one-byte value used to encode the bytecode, in hexadecimal.  The
phrase "A B => A+B" shows the stack before and after the bytecode
phrase "A B => A+B" shows the stack before and after the bytecode
executes.  Beforehand, the stack must contain at least two values, A
executes.  Beforehand, the stack must contain at least two values, A
and B; since the top of the stack is to the right, B is on the top of
and B; since the top of the stack is to the right, B is on the top of
the stack, and A is underneath it.  After execution, the bytecode will
the stack, and A is underneath it.  After execution, the bytecode will
have popped A and B from the stack, and replaced them with a single
have popped A and B from the stack, and replaced them with a single
value, A+B.  There may be other values on the stack below those shown,
value, A+B.  There may be other values on the stack below those shown,
but the bytecode affects only those shown.
but the bytecode affects only those shown.
   Here is another example:
   Here is another example:
`const8' (0x22) N: => N
`const8' (0x22) N: => N
     Push the 8-bit integer constant N on the stack, without sign
     Push the 8-bit integer constant N on the stack, without sign
     extension.
     extension.
   In this example, the bytecode `const8' takes an operand N directly
   In this example, the bytecode `const8' takes an operand N directly
from the bytecode stream; the operand follows the `const8' bytecode
from the bytecode stream; the operand follows the `const8' bytecode
itself.  We write any such operands immediately after the name of the
itself.  We write any such operands immediately after the name of the
bytecode, before the colon, and describe the exact encoding of the
bytecode, before the colon, and describe the exact encoding of the
operand in the bytecode stream in the body of the bytecode description.
operand in the bytecode stream in the body of the bytecode description.
   For the `const8' bytecode, there are no stack items given before the
   For the `const8' bytecode, there are no stack items given before the
=>; this simply means that the bytecode consumes no values from the
=>; this simply means that the bytecode consumes no values from the
stack.  If a bytecode consumes no values, or produces no values, the
stack.  If a bytecode consumes no values, or produces no values, the
list on either side of the => may be empty.
list on either side of the => may be empty.
   If a value is written as A, B, or N, then the bytecode treats it as
   If a value is written as A, B, or N, then the bytecode treats it as
an integer.  If a value is written is ADDR, then the bytecode treats it
an integer.  If a value is written is ADDR, then the bytecode treats it
as an address.
as an address.
   We do not fully describe the floating point operations here; although
   We do not fully describe the floating point operations here; although
this design can be extended in a clean way to handle floating point
this design can be extended in a clean way to handle floating point
values, they are not of immediate interest to the customer, so we avoid
values, they are not of immediate interest to the customer, so we avoid
describing them, to save time.
describing them, to save time.
`float' (0x01): =>
`float' (0x01): =>
     Prefix for floating-point bytecodes.  Not implemented yet.
     Prefix for floating-point bytecodes.  Not implemented yet.
`add' (0x02): A B => A+B
`add' (0x02): A B => A+B
     Pop two integers from the stack, and push their sum, as an integer.
     Pop two integers from the stack, and push their sum, as an integer.
`sub' (0x03): A B => A-B
`sub' (0x03): A B => A-B
     Pop two integers from the stack, subtract the top value from the
     Pop two integers from the stack, subtract the top value from the
     next-to-top value, and push the difference.
     next-to-top value, and push the difference.
`mul' (0x04): A B => A*B
`mul' (0x04): A B => A*B
     Pop two integers from the stack, multiply them, and push the
     Pop two integers from the stack, multiply them, and push the
     product on the stack.  Note that, when one multiplies two N-bit
     product on the stack.  Note that, when one multiplies two N-bit
     numbers yielding another N-bit number, it is irrelevant whether the
     numbers yielding another N-bit number, it is irrelevant whether the
     numbers are signed or not; the results are the same.
     numbers are signed or not; the results are the same.
`div_signed' (0x05): A B => A/B
`div_signed' (0x05): A B => A/B
     Pop two signed integers from the stack; divide the next-to-top
     Pop two signed integers from the stack; divide the next-to-top
     value by the top value, and push the quotient.  If the divisor is
     value by the top value, and push the quotient.  If the divisor is
     zero, terminate with an error.
     zero, terminate with an error.
`div_unsigned' (0x06): A B => A/B
`div_unsigned' (0x06): A B => A/B
     Pop two unsigned integers from the stack; divide the next-to-top
     Pop two unsigned integers from the stack; divide the next-to-top
     value by the top value, and push the quotient.  If the divisor is
     value by the top value, and push the quotient.  If the divisor is
     zero, terminate with an error.
     zero, terminate with an error.
`rem_signed' (0x07): A B => A MODULO B
`rem_signed' (0x07): A B => A MODULO B
     Pop two signed integers from the stack; divide the next-to-top
     Pop two signed integers from the stack; divide the next-to-top
     value by the top value, and push the remainder.  If the divisor is
     value by the top value, and push the remainder.  If the divisor is
     zero, terminate with an error.
     zero, terminate with an error.
`rem_unsigned' (0x08): A B => A MODULO B
`rem_unsigned' (0x08): A B => A MODULO B
     Pop two unsigned integers from the stack; divide the next-to-top
     Pop two unsigned integers from the stack; divide the next-to-top
     value by the top value, and push the remainder.  If the divisor is
     value by the top value, and push the remainder.  If the divisor is
     zero, terminate with an error.
     zero, terminate with an error.
`lsh' (0x09): A B => A<
`lsh' (0x09): A B => A<
     Pop two integers from the stack; let A be the next-to-top value,
     Pop two integers from the stack; let A be the next-to-top value,
     and B be the top value.  Shift A left by B bits, and push the
     and B be the top value.  Shift A left by B bits, and push the
     result.
     result.
`rsh_signed' (0x0a): A B => `(signed)'A>>B
`rsh_signed' (0x0a): A B => `(signed)'A>>B
     Pop two integers from the stack; let A be the next-to-top value,
     Pop two integers from the stack; let A be the next-to-top value,
     and B be the top value.  Shift A right by B bits, inserting copies
     and B be the top value.  Shift A right by B bits, inserting copies
     of the top bit at the high end, and push the result.
     of the top bit at the high end, and push the result.
`rsh_unsigned' (0x0b): A B => A>>B
`rsh_unsigned' (0x0b): A B => A>>B
     Pop two integers from the stack; let A be the next-to-top value,
     Pop two integers from the stack; let A be the next-to-top value,
     and B be the top value.  Shift A right by B bits, inserting zero
     and B be the top value.  Shift A right by B bits, inserting zero
     bits at the high end, and push the result.
     bits at the high end, and push the result.
`log_not' (0x0e): A => !A
`log_not' (0x0e): A => !A
     Pop an integer from the stack; if it is zero, push the value one;
     Pop an integer from the stack; if it is zero, push the value one;
     otherwise, push the value zero.
     otherwise, push the value zero.
`bit_and' (0x0f): A B => A&B
`bit_and' (0x0f): A B => A&B
     Pop two integers from the stack, and push their bitwise `and'.
     Pop two integers from the stack, and push their bitwise `and'.
`bit_or' (0x10): A B => A|B
`bit_or' (0x10): A B => A|B
     Pop two integers from the stack, and push their bitwise `or'.
     Pop two integers from the stack, and push their bitwise `or'.
`bit_xor' (0x11): A B => A^B
`bit_xor' (0x11): A B => A^B
     Pop two integers from the stack, and push their bitwise
     Pop two integers from the stack, and push their bitwise
     exclusive-`or'.
     exclusive-`or'.
`bit_not' (0x12): A => ~A
`bit_not' (0x12): A => ~A
     Pop an integer from the stack, and push its bitwise complement.
     Pop an integer from the stack, and push its bitwise complement.
`equal' (0x13): A B => A=B
`equal' (0x13): A B => A=B
     Pop two integers from the stack; if they are equal, push the value
     Pop two integers from the stack; if they are equal, push the value
     one; otherwise, push the value zero.
     one; otherwise, push the value zero.
`less_signed' (0x14): A B => A
`less_signed' (0x14): A B => A
     Pop two signed integers from the stack; if the next-to-top value
     Pop two signed integers from the stack; if the next-to-top value
     is less than the top value, push the value one; otherwise, push
     is less than the top value, push the value one; otherwise, push
     the value zero.
     the value zero.
`less_unsigned' (0x15): A B => A
`less_unsigned' (0x15): A B => A
     Pop two unsigned integers from the stack; if the next-to-top value
     Pop two unsigned integers from the stack; if the next-to-top value
     is less than the top value, push the value one; otherwise, push
     is less than the top value, push the value one; otherwise, push
     the value zero.
     the value zero.
`ext' (0x16) N: A => A, sign-extended from N bits
`ext' (0x16) N: A => A, sign-extended from N bits
     Pop an unsigned value from the stack; treating it as an N-bit
     Pop an unsigned value from the stack; treating it as an N-bit
     twos-complement value, extend it to full length.  This means that
     twos-complement value, extend it to full length.  This means that
     all bits to the left of bit N-1 (where the least significant bit
     all bits to the left of bit N-1 (where the least significant bit
     is bit 0) are set to the value of bit N-1.  Note that N may be
     is bit 0) are set to the value of bit N-1.  Note that N may be
     larger than or equal to the width of the stack elements of the
     larger than or equal to the width of the stack elements of the
     bytecode engine; in this case, the bytecode should have no effect.
     bytecode engine; in this case, the bytecode should have no effect.
     The number of source bits to preserve, N, is encoded as a single
     The number of source bits to preserve, N, is encoded as a single
     byte unsigned integer following the `ext' bytecode.
     byte unsigned integer following the `ext' bytecode.
`zero_ext' (0x2a) N: A => A, zero-extended from N bits
`zero_ext' (0x2a) N: A => A, zero-extended from N bits
     Pop an unsigned value from the stack; zero all but the bottom N
     Pop an unsigned value from the stack; zero all but the bottom N
     bits.  This means that all bits to the left of bit N-1 (where the
     bits.  This means that all bits to the left of bit N-1 (where the
     least significant bit is bit 0) are set to the value of bit N-1.
     least significant bit is bit 0) are set to the value of bit N-1.
     The number of source bits to preserve, N, is encoded as a single
     The number of source bits to preserve, N, is encoded as a single
     byte unsigned integer following the `zero_ext' bytecode.
     byte unsigned integer following the `zero_ext' bytecode.
`ref8' (0x17): ADDR => A
`ref8' (0x17): ADDR => A
`ref16' (0x18): ADDR => A
`ref16' (0x18): ADDR => A
`ref32' (0x19): ADDR => A
`ref32' (0x19): ADDR => A
`ref64' (0x1a): ADDR => A
`ref64' (0x1a): ADDR => A
     Pop an address ADDR from the stack.  For bytecode `ref'N, fetch an
     Pop an address ADDR from the stack.  For bytecode `ref'N, fetch an
     N-bit value from ADDR, using the natural target endianness.  Push
     N-bit value from ADDR, using the natural target endianness.  Push
     the fetched value as an unsigned integer.
     the fetched value as an unsigned integer.
     Note that ADDR may not be aligned in any particular way; the
     Note that ADDR may not be aligned in any particular way; the
     `refN' bytecodes should operate correctly for any address.
     `refN' bytecodes should operate correctly for any address.
     If attempting to access memory at ADDR would cause a processor
     If attempting to access memory at ADDR would cause a processor
     exception of some sort, terminate with an error.
     exception of some sort, terminate with an error.
`ref_float' (0x1b): ADDR => D
`ref_float' (0x1b): ADDR => D
`ref_double' (0x1c): ADDR => D
`ref_double' (0x1c): ADDR => D
`ref_long_double' (0x1d): ADDR => D
`ref_long_double' (0x1d): ADDR => D
`l_to_d' (0x1e): A => D
`l_to_d' (0x1e): A => D
`d_to_l' (0x1f): D => A
`d_to_l' (0x1f): D => A
     Not implemented yet.
     Not implemented yet.
`dup' (0x28): A => A A
`dup' (0x28): A => A A
     Push another copy of the stack's top element.
     Push another copy of the stack's top element.
`swap' (0x2b): A B => B A
`swap' (0x2b): A B => B A
     Exchange the top two items on the stack.
     Exchange the top two items on the stack.
`pop' (0x29): A =>
`pop' (0x29): A =>
     Discard the top value on the stack.
     Discard the top value on the stack.
`if_goto' (0x20) OFFSET: A =>
`if_goto' (0x20) OFFSET: A =>
     Pop an integer off the stack; if it is non-zero, branch to the
     Pop an integer off the stack; if it is non-zero, branch to the
     given offset in the bytecode string.  Otherwise, continue to the
     given offset in the bytecode string.  Otherwise, continue to the
     next instruction in the bytecode stream.  In other words, if A is
     next instruction in the bytecode stream.  In other words, if A is
     non-zero, set the `pc' register to `start' + OFFSET.  Thus, an
     non-zero, set the `pc' register to `start' + OFFSET.  Thus, an
     offset of zero denotes the beginning of the expression.
     offset of zero denotes the beginning of the expression.
     The OFFSET is stored as a sixteen-bit unsigned value, stored
     The OFFSET is stored as a sixteen-bit unsigned value, stored
     immediately following the `if_goto' bytecode.  It is always stored
     immediately following the `if_goto' bytecode.  It is always stored
     most significant byte first, regardless of the target's normal
     most significant byte first, regardless of the target's normal
     endianness.  The offset is not guaranteed to fall at any particular
     endianness.  The offset is not guaranteed to fall at any particular
     alignment within the bytecode stream; thus, on machines where
     alignment within the bytecode stream; thus, on machines where
     fetching a 16-bit on an unaligned address raises an exception, you
     fetching a 16-bit on an unaligned address raises an exception, you
     should fetch the offset one byte at a time.
     should fetch the offset one byte at a time.
`goto' (0x21) OFFSET: =>
`goto' (0x21) OFFSET: =>
     Branch unconditionally to OFFSET; in other words, set the `pc'
     Branch unconditionally to OFFSET; in other words, set the `pc'
     register to `start' + OFFSET.
     register to `start' + OFFSET.
     The offset is stored in the same way as for the `if_goto' bytecode.
     The offset is stored in the same way as for the `if_goto' bytecode.
`const8' (0x22) N: => N
`const8' (0x22) N: => N
`const16' (0x23) N: => N
`const16' (0x23) N: => N
`const32' (0x24) N: => N
`const32' (0x24) N: => N
`const64' (0x25) N: => N
`const64' (0x25) N: => N
     Push the integer constant N on the stack, without sign extension.
     Push the integer constant N on the stack, without sign extension.
     To produce a small negative value, push a small twos-complement
     To produce a small negative value, push a small twos-complement
     value, and then sign-extend it using the `ext' bytecode.
     value, and then sign-extend it using the `ext' bytecode.
     The constant N is stored in the appropriate number of bytes
     The constant N is stored in the appropriate number of bytes
     following the `const'B bytecode.  The constant N is always stored
     following the `const'B bytecode.  The constant N is always stored
     most significant byte first, regardless of the target's normal
     most significant byte first, regardless of the target's normal
     endianness.  The constant is not guaranteed to fall at any
     endianness.  The constant is not guaranteed to fall at any
     particular alignment within the bytecode stream; thus, on machines
     particular alignment within the bytecode stream; thus, on machines
     where fetching a 16-bit on an unaligned address raises an
     where fetching a 16-bit on an unaligned address raises an
     exception, you should fetch N one byte at a time.
     exception, you should fetch N one byte at a time.
`reg' (0x26) N: => A
`reg' (0x26) N: => A
     Push the value of register number N, without sign extension.  The
     Push the value of register number N, without sign extension.  The
     registers are numbered following GDB's conventions.
     registers are numbered following GDB's conventions.
     The register number N is encoded as a 16-bit unsigned integer
     The register number N is encoded as a 16-bit unsigned integer
     immediately following the `reg' bytecode.  It is always stored most
     immediately following the `reg' bytecode.  It is always stored most
     significant byte first, regardless of the target's normal
     significant byte first, regardless of the target's normal
     endianness.  The register number is not guaranteed to fall at any
     endianness.  The register number is not guaranteed to fall at any
     particular alignment within the bytecode stream; thus, on machines
     particular alignment within the bytecode stream; thus, on machines
     where fetching a 16-bit on an unaligned address raises an
     where fetching a 16-bit on an unaligned address raises an
     exception, you should fetch the register number one byte at a time.
     exception, you should fetch the register number one byte at a time.
`getv' (0x2c) N: => V
`getv' (0x2c) N: => V
     Push the value of trace state variable number N, without sign
     Push the value of trace state variable number N, without sign
     extension.
     extension.
     The variable number N is encoded as a 16-bit unsigned integer
     The variable number N is encoded as a 16-bit unsigned integer
     immediately following the `getv' bytecode.  It is always stored
     immediately following the `getv' bytecode.  It is always stored
     most significant byte first, regardless of the target's normal
     most significant byte first, regardless of the target's normal
     endianness.  The variable number is not guaranteed to fall at any
     endianness.  The variable number is not guaranteed to fall at any
     particular alignment within the bytecode stream; thus, on machines
     particular alignment within the bytecode stream; thus, on machines
     where fetching a 16-bit on an unaligned address raises an
     where fetching a 16-bit on an unaligned address raises an
     exception, you should fetch the register number one byte at a time.
     exception, you should fetch the register number one byte at a time.
`setv' (0x2d) N: => V
`setv' (0x2d) N: => V
     Set trace state variable number N to the value found on the top of
     Set trace state variable number N to the value found on the top of
     the stack.  The stack is unchanged, so that the value is readily
     the stack.  The stack is unchanged, so that the value is readily
     available if the assignment is part of a larger expression.  The
     available if the assignment is part of a larger expression.  The
     handling of N is as described for `getv'.
     handling of N is as described for `getv'.
`trace' (0x0c): ADDR SIZE =>
`trace' (0x0c): ADDR SIZE =>
     Record the contents of the SIZE bytes at ADDR in a trace buffer,
     Record the contents of the SIZE bytes at ADDR in a trace buffer,
     for later retrieval by GDB.
     for later retrieval by GDB.
`trace_quick' (0x0d) SIZE: ADDR => ADDR
`trace_quick' (0x0d) SIZE: ADDR => ADDR
     Record the contents of the SIZE bytes at ADDR in a trace buffer,
     Record the contents of the SIZE bytes at ADDR in a trace buffer,
     for later retrieval by GDB.  SIZE is a single byte unsigned
     for later retrieval by GDB.  SIZE is a single byte unsigned
     integer following the `trace' opcode.
     integer following the `trace' opcode.
     This bytecode is equivalent to the sequence `dup const8 SIZE
     This bytecode is equivalent to the sequence `dup const8 SIZE
     trace', but we provide it anyway to save space in bytecode strings.
     trace', but we provide it anyway to save space in bytecode strings.
`trace16' (0x30) SIZE: ADDR => ADDR
`trace16' (0x30) SIZE: ADDR => ADDR
     Identical to trace_quick, except that SIZE is a 16-bit big-endian
     Identical to trace_quick, except that SIZE is a 16-bit big-endian
     unsigned integer, not a single byte.  This should probably have
     unsigned integer, not a single byte.  This should probably have
     been named `trace_quick16', for consistency.
     been named `trace_quick16', for consistency.
`tracev' (0x2e) N: => A
`tracev' (0x2e) N: => A
     Record the value of trace state variable number N in the trace
     Record the value of trace state variable number N in the trace
     buffer.  The handling of N is as described for `getv'.
     buffer.  The handling of N is as described for `getv'.
`end' (0x27): =>
`end' (0x27): =>
     Stop executing bytecode; the result should be the top element of
     Stop executing bytecode; the result should be the top element of
     the stack.  If the purpose of the expression was to compute an
     the stack.  If the purpose of the expression was to compute an
     lvalue or a range of memory, then the next-to-top of the stack is
     lvalue or a range of memory, then the next-to-top of the stack is
     the lvalue's address, and the top of the stack is the lvalue's
     the lvalue's address, and the top of the stack is the lvalue's
     size, in bytes.
     size, in bytes.


File: gdb.info,  Node: Using Agent Expressions,  Next: Varying Target Capabilities,  Prev: Bytecode Descriptions,  Up: Agent Expressions
File: gdb.info,  Node: Using Agent Expressions,  Next: Varying Target Capabilities,  Prev: Bytecode Descriptions,  Up: Agent Expressions
E.3 Using Agent Expressions
E.3 Using Agent Expressions
===========================
===========================
Agent expressions can be used in several different ways by GDB, and the
Agent expressions can be used in several different ways by GDB, and the
debugger can generate different bytecode sequences as appropriate.
debugger can generate different bytecode sequences as appropriate.
   One possibility is to do expression evaluation on the target rather
   One possibility is to do expression evaluation on the target rather
than the host, such as for the conditional of a conditional tracepoint.
than the host, such as for the conditional of a conditional tracepoint.
In such a case, GDB compiles the source expression into a bytecode
In such a case, GDB compiles the source expression into a bytecode
sequence that simply gets values from registers or memory, does
sequence that simply gets values from registers or memory, does
arithmetic, and returns a result.
arithmetic, and returns a result.
   Another way to use agent expressions is for tracepoint data
   Another way to use agent expressions is for tracepoint data
collection.  GDB generates a different bytecode sequence for
collection.  GDB generates a different bytecode sequence for
collection; in addition to bytecodes that do the calculation, GDB adds
collection; in addition to bytecodes that do the calculation, GDB adds
`trace' bytecodes to save the pieces of memory that were used.
`trace' bytecodes to save the pieces of memory that were used.
   * The user selects trace points in the program's code at which GDB
   * The user selects trace points in the program's code at which GDB
     should collect data.
     should collect data.
   * The user specifies expressions to evaluate at each trace point.
   * The user specifies expressions to evaluate at each trace point.
     These expressions may denote objects in memory, in which case
     These expressions may denote objects in memory, in which case
     those objects' contents are recorded as the program runs, or
     those objects' contents are recorded as the program runs, or
     computed values, in which case the values themselves are recorded.
     computed values, in which case the values themselves are recorded.
   * GDB transmits the tracepoints and their associated expressions to
   * GDB transmits the tracepoints and their associated expressions to
     the GDB agent, running on the debugging target.
     the GDB agent, running on the debugging target.
   * The agent arranges to be notified when a trace point is hit.
   * The agent arranges to be notified when a trace point is hit.
   * When execution on the target reaches a trace point, the agent
   * When execution on the target reaches a trace point, the agent
     evaluates the expressions associated with that trace point, and
     evaluates the expressions associated with that trace point, and
     records the resulting values and memory ranges.
     records the resulting values and memory ranges.
   * Later, when the user selects a given trace event and inspects the
   * Later, when the user selects a given trace event and inspects the
     objects and expression values recorded, GDB talks to the agent to
     objects and expression values recorded, GDB talks to the agent to
     retrieve recorded data as necessary to meet the user's requests.
     retrieve recorded data as necessary to meet the user's requests.
     If the user asks to see an object whose contents have not been
     If the user asks to see an object whose contents have not been
     recorded, GDB reports an error.
     recorded, GDB reports an error.


File: gdb.info,  Node: Varying Target Capabilities,  Next: Rationale,  Prev: Using Agent Expressions,  Up: Agent Expressions
File: gdb.info,  Node: Varying Target Capabilities,  Next: Rationale,  Prev: Using Agent Expressions,  Up: Agent Expressions
E.4 Varying Target Capabilities
E.4 Varying Target Capabilities
===============================
===============================
Some targets don't support floating-point, and some would rather not
Some targets don't support floating-point, and some would rather not
have to deal with `long long' operations.  Also, different targets will
have to deal with `long long' operations.  Also, different targets will
have different stack sizes, and different bytecode buffer lengths.
have different stack sizes, and different bytecode buffer lengths.
   Thus, GDB needs a way to ask the target about itself.  We haven't
   Thus, GDB needs a way to ask the target about itself.  We haven't
worked out the details yet, but in general, GDB should be able to send
worked out the details yet, but in general, GDB should be able to send
the target a packet asking it to describe itself.  The reply should be a
the target a packet asking it to describe itself.  The reply should be a
packet whose length is explicit, so we can add new information to the
packet whose length is explicit, so we can add new information to the
packet in future revisions of the agent, without confusing old versions
packet in future revisions of the agent, without confusing old versions
of GDB, and it should contain a version number.  It should contain at
of GDB, and it should contain a version number.  It should contain at
least the following information:
least the following information:
   * whether floating point is supported
   * whether floating point is supported
   * whether `long long' is supported
   * whether `long long' is supported
   * maximum acceptable size of bytecode stack
   * maximum acceptable size of bytecode stack
   * maximum acceptable length of bytecode expressions
   * maximum acceptable length of bytecode expressions
   * which registers are actually available for collection
   * which registers are actually available for collection
   * whether the target supports disabled tracepoints
   * whether the target supports disabled tracepoints


File: gdb.info,  Node: Rationale,  Prev: Varying Target Capabilities,  Up: Agent Expressions
File: gdb.info,  Node: Rationale,  Prev: Varying Target Capabilities,  Up: Agent Expressions
E.5 Rationale
E.5 Rationale
=============
=============
Some of the design decisions apparent above are arguable.
Some of the design decisions apparent above are arguable.
What about stack overflow/underflow?
What about stack overflow/underflow?
     GDB should be able to query the target to discover its stack size.
     GDB should be able to query the target to discover its stack size.
     Given that information, GDB can determine at translation time
     Given that information, GDB can determine at translation time
     whether a given expression will overflow the stack.  But this spec
     whether a given expression will overflow the stack.  But this spec
     isn't about what kinds of error-checking GDB ought to do.
     isn't about what kinds of error-checking GDB ought to do.
Why are you doing everything in LONGEST?
Why are you doing everything in LONGEST?
     Speed isn't important, but agent code size is; using LONGEST
     Speed isn't important, but agent code size is; using LONGEST
     brings in a bunch of support code to do things like division, etc.
     brings in a bunch of support code to do things like division, etc.
     So this is a serious concern.
     So this is a serious concern.
     First, note that you don't need different bytecodes for different
     First, note that you don't need different bytecodes for different
     operand sizes.  You can generate code without _knowing_ how big the
     operand sizes.  You can generate code without _knowing_ how big the
     stack elements actually are on the target.  If the target only
     stack elements actually are on the target.  If the target only
     supports 32-bit ints, and you don't send any 64-bit bytecodes,
     supports 32-bit ints, and you don't send any 64-bit bytecodes,
     everything just works.  The observation here is that the MIPS and
     everything just works.  The observation here is that the MIPS and
     the Alpha have only fixed-size registers, and you can still get
     the Alpha have only fixed-size registers, and you can still get
     C's semantics even though most instructions only operate on
     C's semantics even though most instructions only operate on
     full-sized words.  You just need to make sure everything is
     full-sized words.  You just need to make sure everything is
     properly sign-extended at the right times.  So there is no need
     properly sign-extended at the right times.  So there is no need
     for 32- and 64-bit variants of the bytecodes.  Just implement
     for 32- and 64-bit variants of the bytecodes.  Just implement
     everything using the largest size you support.
     everything using the largest size you support.
     GDB should certainly check to see what sizes the target supports,
     GDB should certainly check to see what sizes the target supports,
     so the user can get an error earlier, rather than later.  But this
     so the user can get an error earlier, rather than later.  But this
     information is not necessary for correctness.
     information is not necessary for correctness.
Why don't you have `>' or `<=' operators?
Why don't you have `>' or `<=' operators?
     I want to keep the interpreter small, and we don't need them.  We
     I want to keep the interpreter small, and we don't need them.  We
     can combine the `less_' opcodes with `log_not', and swap the order
     can combine the `less_' opcodes with `log_not', and swap the order
     of the operands, yielding all four asymmetrical comparison
     of the operands, yielding all four asymmetrical comparison
     operators.  For example, `(x <= y)' is `! (x > y)', which is `! (y
     operators.  For example, `(x <= y)' is `! (x > y)', which is `! (y
     < x)'.
     < x)'.
Why do you have `log_not'?
Why do you have `log_not'?
Why do you have `ext'?
Why do you have `ext'?
Why do you have `zero_ext'?
Why do you have `zero_ext'?
     These are all easily synthesized from other instructions, but I
     These are all easily synthesized from other instructions, but I
     expect them to be used frequently, and they're simple, so I
     expect them to be used frequently, and they're simple, so I
     include them to keep bytecode strings short.
     include them to keep bytecode strings short.
     `log_not' is equivalent to `const8 0 equal'; it's used in half the
     `log_not' is equivalent to `const8 0 equal'; it's used in half the
     relational operators.
     relational operators.
     `ext N' is equivalent to `const8 S-N lsh const8 S-N rsh_signed',
     `ext N' is equivalent to `const8 S-N lsh const8 S-N rsh_signed',
     where S is the size of the stack elements; it follows `refM' and
     where S is the size of the stack elements; it follows `refM' and
     REG bytecodes when the value should be signed.  See the next
     REG bytecodes when the value should be signed.  See the next
     bulleted item.
     bulleted item.
     `zero_ext N' is equivalent to `constM MASK log_and'; it's used
     `zero_ext N' is equivalent to `constM MASK log_and'; it's used
     whenever we push the value of a register, because we can't assume
     whenever we push the value of a register, because we can't assume
     the upper bits of the register aren't garbage.
     the upper bits of the register aren't garbage.
Why not have sign-extending variants of the `ref' operators?
Why not have sign-extending variants of the `ref' operators?
     Because that would double the number of `ref' operators, and we
     Because that would double the number of `ref' operators, and we
     need the `ext' bytecode anyway for accessing bitfields.
     need the `ext' bytecode anyway for accessing bitfields.
Why not have constant-address variants of the `ref' operators?
Why not have constant-address variants of the `ref' operators?
     Because that would double the number of `ref' operators again, and
     Because that would double the number of `ref' operators again, and
     `const32 ADDRESS ref32' is only one byte longer.
     `const32 ADDRESS ref32' is only one byte longer.
Why do the `refN' operators have to support unaligned fetches?
Why do the `refN' operators have to support unaligned fetches?
     GDB will generate bytecode that fetches multi-byte values at
     GDB will generate bytecode that fetches multi-byte values at
     unaligned addresses whenever the executable's debugging
     unaligned addresses whenever the executable's debugging
     information tells it to.  Furthermore, GDB does not know the value
     information tells it to.  Furthermore, GDB does not know the value
     the pointer will have when GDB generates the bytecode, so it
     the pointer will have when GDB generates the bytecode, so it
     cannot determine whether a particular fetch will be aligned or not.
     cannot determine whether a particular fetch will be aligned or not.
     In particular, structure bitfields may be several bytes long, but
     In particular, structure bitfields may be several bytes long, but
     follow no alignment rules; members of packed structures are not
     follow no alignment rules; members of packed structures are not
     necessarily aligned either.
     necessarily aligned either.
     In general, there are many cases where unaligned references occur
     In general, there are many cases where unaligned references occur
     in correct C code, either at the programmer's explicit request, or
     in correct C code, either at the programmer's explicit request, or
     at the compiler's discretion.  Thus, it is simpler to make the GDB
     at the compiler's discretion.  Thus, it is simpler to make the GDB
     agent bytecodes work correctly in all circumstances than to make
     agent bytecodes work correctly in all circumstances than to make
     GDB guess in each case whether the compiler did the usual thing.
     GDB guess in each case whether the compiler did the usual thing.
Why are there no side-effecting operators?
Why are there no side-effecting operators?
     Because our current client doesn't want them?  That's a cheap
     Because our current client doesn't want them?  That's a cheap
     answer.  I think the real answer is that I'm afraid of
     answer.  I think the real answer is that I'm afraid of
     implementing function calls.  We should re-visit this issue after
     implementing function calls.  We should re-visit this issue after
     the present contract is delivered.
     the present contract is delivered.
Why aren't the `goto' ops PC-relative?
Why aren't the `goto' ops PC-relative?
     The interpreter has the base address around anyway for PC bounds
     The interpreter has the base address around anyway for PC bounds
     checking, and it seemed simpler.
     checking, and it seemed simpler.
Why is there only one offset size for the `goto' ops?
Why is there only one offset size for the `goto' ops?
     Offsets are currently sixteen bits.  I'm not happy with this
     Offsets are currently sixteen bits.  I'm not happy with this
     situation either:
     situation either:
     Suppose we have multiple branch ops with different offset sizes.
     Suppose we have multiple branch ops with different offset sizes.
     As I generate code left-to-right, all my jumps are forward jumps
     As I generate code left-to-right, all my jumps are forward jumps
     (there are no loops in expressions), so I never know the target
     (there are no loops in expressions), so I never know the target
     when I emit the jump opcode.  Thus, I have to either always assume
     when I emit the jump opcode.  Thus, I have to either always assume
     the largest offset size, or do jump relaxation on the code after I
     the largest offset size, or do jump relaxation on the code after I
     generate it, which seems like a big waste of time.
     generate it, which seems like a big waste of time.
     I can imagine a reasonable expression being longer than 256 bytes.
     I can imagine a reasonable expression being longer than 256 bytes.
     I can't imagine one being longer than 64k.  Thus, we need 16-bit
     I can't imagine one being longer than 64k.  Thus, we need 16-bit
     offsets.  This kind of reasoning is so bogus, but relaxation is
     offsets.  This kind of reasoning is so bogus, but relaxation is
     pathetic.
     pathetic.
     The other approach would be to generate code right-to-left.  Then
     The other approach would be to generate code right-to-left.  Then
     I'd always know my offset size.  That might be fun.
     I'd always know my offset size.  That might be fun.
Where is the function call bytecode?
Where is the function call bytecode?
     When we add side-effects, we should add this.
     When we add side-effects, we should add this.
Why does the `reg' bytecode take a 16-bit register number?
Why does the `reg' bytecode take a 16-bit register number?
     Intel's IA-64 architecture has 128 general-purpose registers, and
     Intel's IA-64 architecture has 128 general-purpose registers, and
     128 floating-point registers, and I'm sure it has some random
     128 floating-point registers, and I'm sure it has some random
     control registers.
     control registers.
Why do we need `trace' and `trace_quick'?
Why do we need `trace' and `trace_quick'?
     Because GDB needs to record all the memory contents and registers
     Because GDB needs to record all the memory contents and registers
     an expression touches.  If the user wants to evaluate an expression
     an expression touches.  If the user wants to evaluate an expression
     `x->y->z', the agent must record the values of `x' and `x->y' as
     `x->y->z', the agent must record the values of `x' and `x->y' as
     well as the value of `x->y->z'.
     well as the value of `x->y->z'.
Don't the `trace' bytecodes make the interpreter less general?
Don't the `trace' bytecodes make the interpreter less general?
     They do mean that the interpreter contains special-purpose code,
     They do mean that the interpreter contains special-purpose code,
     but that doesn't mean the interpreter can only be used for that
     but that doesn't mean the interpreter can only be used for that
     purpose.  If an expression doesn't use the `trace' bytecodes, they
     purpose.  If an expression doesn't use the `trace' bytecodes, they
     don't get in its way.
     don't get in its way.
Why doesn't `trace_quick' consume its arguments the way everything else does?
Why doesn't `trace_quick' consume its arguments the way everything else does?
     In general, you do want your operators to consume their arguments;
     In general, you do want your operators to consume their arguments;
     it's consistent, and generally reduces the amount of stack
     it's consistent, and generally reduces the amount of stack
     rearrangement necessary.  However, `trace_quick' is a kludge to
     rearrangement necessary.  However, `trace_quick' is a kludge to
     save space; it only exists so we needn't write `dup const8 SIZE
     save space; it only exists so we needn't write `dup const8 SIZE
     trace' before every memory reference.  Therefore, it's okay for it
     trace' before every memory reference.  Therefore, it's okay for it
     not to consume its arguments; it's meant for a specific context in
     not to consume its arguments; it's meant for a specific context in
     which we know exactly what it should do with the stack.  If we're
     which we know exactly what it should do with the stack.  If we're
     going to have a kludge, it should be an effective kludge.
     going to have a kludge, it should be an effective kludge.
Why does `trace16' exist?
Why does `trace16' exist?
     That opcode was added by the customer that contracted Cygnus for
     That opcode was added by the customer that contracted Cygnus for
     the data tracing work.  I personally think it is unnecessary;
     the data tracing work.  I personally think it is unnecessary;
     objects that large will be quite rare, so it is okay to use `dup
     objects that large will be quite rare, so it is okay to use `dup
     const16 SIZE trace' in those cases.
     const16 SIZE trace' in those cases.
     Whatever we decide to do with `trace16', we should at least leave
     Whatever we decide to do with `trace16', we should at least leave
     opcode 0x30 reserved, to remain compatible with the customer who
     opcode 0x30 reserved, to remain compatible with the customer who
     added it.
     added it.


File: gdb.info,  Node: Trace File Format,  Next: Copying,  Prev: Operating System Information,  Up: Top
File: gdb.info,  Node: Trace File Format,  Next: Copying,  Prev: Operating System Information,  Up: Top
Appendix F Trace File Format
Appendix F Trace File Format
****************************
****************************
The trace file comes in three parts: a header, a textual description
The trace file comes in three parts: a header, a textual description
section, and a trace frame section with binary data.
section, and a trace frame section with binary data.
   The header has the form `\x7fTRACE0\n'.  The first byte is `0x7f' so
   The header has the form `\x7fTRACE0\n'.  The first byte is `0x7f' so
as to indicate that the file contains binary data, while the `0' is a
as to indicate that the file contains binary data, while the `0' is a
version number that may have different values in the future.
version number that may have different values in the future.
   The description section consists of multiple lines of ASCII text
   The description section consists of multiple lines of ASCII text
separated by newline characters (`0xa').  The lines may include a
separated by newline characters (`0xa').  The lines may include a
variety of optional descriptive or context-setting information, such as
variety of optional descriptive or context-setting information, such as
tracepoint definitions or register set size.  GDB will ignore any line
tracepoint definitions or register set size.  GDB will ignore any line
that it does not recognize.  An empty line marks the end of this
that it does not recognize.  An empty line marks the end of this
section.
section.
   The trace frame section consists of a number of consecutive frames.
   The trace frame section consists of a number of consecutive frames.
Each frame begins with a two-byte tracepoint number, followed by a
Each frame begins with a two-byte tracepoint number, followed by a
four-byte size giving the amount of data in the frame.  The data in the
four-byte size giving the amount of data in the frame.  The data in the
frame consists of a number of blocks, each introduced by a character
frame consists of a number of blocks, each introduced by a character
indicating its type (at least register, memory, and trace state
indicating its type (at least register, memory, and trace state
variable).  The data in this section is raw binary, not a hexadecimal
variable).  The data in this section is raw binary, not a hexadecimal
or other encoding; its endianness matches the target's endianness.
or other encoding; its endianness matches the target's endianness.
`R BYTES'
`R BYTES'
     Register block.  The number and ordering of bytes matches that of a
     Register block.  The number and ordering of bytes matches that of a
     `g' packet in the remote protocol.  Note that these are the actual
     `g' packet in the remote protocol.  Note that these are the actual
     bytes, in target order and GDB register order, not a hexadecimal
     bytes, in target order and GDB register order, not a hexadecimal
     encoding.
     encoding.
`M ADDRESS LENGTH BYTES...'
`M ADDRESS LENGTH BYTES...'
     Memory block.  This is a contiguous block of memory, at the 8-byte
     Memory block.  This is a contiguous block of memory, at the 8-byte
     address ADDRESS, with a 2-byte length LENGTH, followed by LENGTH
     address ADDRESS, with a 2-byte length LENGTH, followed by LENGTH
     bytes.
     bytes.
`V NUMBER VALUE'
`V NUMBER VALUE'
     Trace state variable block.  This records the 8-byte signed value
     Trace state variable block.  This records the 8-byte signed value
     VALUE of trace state variable numbered NUMBER.
     VALUE of trace state variable numbered NUMBER.
   Future enhancements of the trace file format may include additional
   Future enhancements of the trace file format may include additional
types of blocks.
types of blocks.


File: gdb.info,  Node: Target Descriptions,  Next: Operating System Information,  Prev: Agent Expressions,  Up: Top
File: gdb.info,  Node: Target Descriptions,  Next: Operating System Information,  Prev: Agent Expressions,  Up: Top
Appendix G Target Descriptions
Appendix G Target Descriptions
******************************
******************************
*Warning:* target descriptions are still under active development, and
*Warning:* target descriptions are still under active development, and
the contents and format may change between GDB releases.  The format is
the contents and format may change between GDB releases.  The format is
expected to stabilize in the future.
expected to stabilize in the future.
   One of the challenges of using GDB to debug embedded systems is that
   One of the challenges of using GDB to debug embedded systems is that
there are so many minor variants of each processor architecture in use.
there are so many minor variants of each processor architecture in use.
It is common practice for vendors to start with a standard processor
It is common practice for vendors to start with a standard processor
core -- ARM, PowerPC, or MIPS, for example -- and then make changes to
core -- ARM, PowerPC, or MIPS, for example -- and then make changes to
adapt it to a particular market niche.  Some architectures have
adapt it to a particular market niche.  Some architectures have
hundreds of variants, available from dozens of vendors.  This leads to
hundreds of variants, available from dozens of vendors.  This leads to
a number of problems:
a number of problems:
   * With so many different customized processors, it is difficult for
   * With so many different customized processors, it is difficult for
     the GDB maintainers to keep up with the changes.
     the GDB maintainers to keep up with the changes.
   * Since individual variants may have short lifetimes or limited
   * Since individual variants may have short lifetimes or limited
     audiences, it may not be worthwhile to carry information about
     audiences, it may not be worthwhile to carry information about
     every variant in the GDB source tree.
     every variant in the GDB source tree.
   * When GDB does support the architecture of the embedded system at
   * When GDB does support the architecture of the embedded system at
     hand, the task of finding the correct architecture name to give the
     hand, the task of finding the correct architecture name to give the
     `set architecture' command can be error-prone.
     `set architecture' command can be error-prone.
   To address these problems, the GDB remote protocol allows a target
   To address these problems, the GDB remote protocol allows a target
system to not only identify itself to GDB, but to actually describe its
system to not only identify itself to GDB, but to actually describe its
own features.  This lets GDB support processor variants it has never
own features.  This lets GDB support processor variants it has never
seen before -- to the extent that the descriptions are accurate, and
seen before -- to the extent that the descriptions are accurate, and
that GDB understands them.
that GDB understands them.
   GDB must be linked with the Expat library to support XML target
   GDB must be linked with the Expat library to support XML target
descriptions.  *Note Expat::.
descriptions.  *Note Expat::.
* Menu:
* Menu:
* Retrieving Descriptions::         How descriptions are fetched from a target.
* Retrieving Descriptions::         How descriptions are fetched from a target.
* Target Description Format::       The contents of a target description.
* Target Description Format::       The contents of a target description.
* Predefined Target Types::         Standard types available for target
* Predefined Target Types::         Standard types available for target
                                    descriptions.
                                    descriptions.
* Standard Target Features::        Features GDB knows about.
* Standard Target Features::        Features GDB knows about.


File: gdb.info,  Node: Retrieving Descriptions,  Next: Target Description Format,  Up: Target Descriptions
File: gdb.info,  Node: Retrieving Descriptions,  Next: Target Description Format,  Up: Target Descriptions
G.1 Retrieving Descriptions
G.1 Retrieving Descriptions
===========================
===========================
Target descriptions can be read from the target automatically, or
Target descriptions can be read from the target automatically, or
specified by the user manually.  The default behavior is to read the
specified by the user manually.  The default behavior is to read the
description from the target.  GDB retrieves it via the remote protocol
description from the target.  GDB retrieves it via the remote protocol
using `qXfer' requests (*note qXfer: General Query Packets.).  The
using `qXfer' requests (*note qXfer: General Query Packets.).  The
ANNEX in the `qXfer' packet will be `target.xml'.  The contents of the
ANNEX in the `qXfer' packet will be `target.xml'.  The contents of the
`target.xml' annex are an XML document, of the form described in *Note
`target.xml' annex are an XML document, of the form described in *Note
Target Description Format::.
Target Description Format::.
   Alternatively, you can specify a file to read for the target
   Alternatively, you can specify a file to read for the target
description.  If a file is set, the target will not be queried.  The
description.  If a file is set, the target will not be queried.  The
commands to specify a file are:
commands to specify a file are:
`set tdesc filename PATH'
`set tdesc filename PATH'
     Read the target description from PATH.
     Read the target description from PATH.
`unset tdesc filename'
`unset tdesc filename'
     Do not read the XML target description from a file.  GDB will use
     Do not read the XML target description from a file.  GDB will use
     the description supplied by the current target.
     the description supplied by the current target.
`show tdesc filename'
`show tdesc filename'
     Show the filename to read for a target description, if any.
     Show the filename to read for a target description, if any.


File: gdb.info,  Node: Target Description Format,  Next: Predefined Target Types,  Prev: Retrieving Descriptions,  Up: Target Descriptions
File: gdb.info,  Node: Target Description Format,  Next: Predefined Target Types,  Prev: Retrieving Descriptions,  Up: Target Descriptions
G.2 Target Description Format
G.2 Target Description Format
=============================
=============================
A target description annex is an XML (http://www.w3.org/XML/) document
A target description annex is an XML (http://www.w3.org/XML/) document
which complies with the Document Type Definition provided in the GDB
which complies with the Document Type Definition provided in the GDB
sources in `gdb/features/gdb-target.dtd'.  This means you can use
sources in `gdb/features/gdb-target.dtd'.  This means you can use
generally available tools like `xmllint' to check that your feature
generally available tools like `xmllint' to check that your feature
descriptions are well-formed and valid.  However, to help people
descriptions are well-formed and valid.  However, to help people
unfamiliar with XML write descriptions for their targets, we also
unfamiliar with XML write descriptions for their targets, we also
describe the grammar here.
describe the grammar here.
   Target descriptions can identify the architecture of the remote
   Target descriptions can identify the architecture of the remote
target and (for some architectures) provide information about custom
target and (for some architectures) provide information about custom
register sets.  They can also identify the OS ABI of the remote target.
register sets.  They can also identify the OS ABI of the remote target.
GDB can use this information to autoconfigure for your target, or to
GDB can use this information to autoconfigure for your target, or to
warn you if you connect to an unsupported target.
warn you if you connect to an unsupported target.
   Here is a simple target description:
   Here is a simple target description:
     
     
       i386:x86-64
       i386:x86-64
     
     
This minimal description only says that the target uses the x86-64
This minimal description only says that the target uses the x86-64
architecture.
architecture.
   A target description has the following overall form, with [ ] marking
   A target description has the following overall form, with [ ] marking
optional elements and ... marking repeatable elements.  The elements
optional elements and ... marking repeatable elements.  The elements
are explained further below.
are explained further below.
     
     
     
     
     
     
       [ARCHITECTURE]
       [ARCHITECTURE]
       [OSABI]
       [OSABI]
       [COMPATIBLE]
       [COMPATIBLE]
       [FEATURE...]
       [FEATURE...]
     
     
The description is generally insensitive to whitespace and line breaks,
The description is generally insensitive to whitespace and line breaks,
under the usual common-sense rules.  The XML version declaration and
under the usual common-sense rules.  The XML version declaration and
document type declaration can generally be omitted (GDB does not
document type declaration can generally be omitted (GDB does not
require them), but specifying them may be useful for XML validation
require them), but specifying them may be useful for XML validation
tools.  The `version' attribute for `' may also be omitted, but
tools.  The `version' attribute for `' may also be omitted, but
we recommend including it; if future versions of GDB use an incompatible
we recommend including it; if future versions of GDB use an incompatible
revision of `gdb-target.dtd', they will detect and report the version
revision of `gdb-target.dtd', they will detect and report the version
mismatch.
mismatch.
G.2.1 Inclusion
G.2.1 Inclusion
---------------
---------------
It can sometimes be valuable to split a target description up into
It can sometimes be valuable to split a target description up into
several different annexes, either for organizational purposes, or to
several different annexes, either for organizational purposes, or to
share files between different possible target descriptions.  You can
share files between different possible target descriptions.  You can
divide a description into multiple files by replacing any element of
divide a description into multiple files by replacing any element of
the target description with an inclusion directive of the form:
the target description with an inclusion directive of the form:
     
     
When GDB encounters an element of this form, it will retrieve the named
When GDB encounters an element of this form, it will retrieve the named
XML DOCUMENT, and replace the inclusion directive with the contents of
XML DOCUMENT, and replace the inclusion directive with the contents of
that document.  If the current description was read using `qXfer', then
that document.  If the current description was read using `qXfer', then
so will be the included document; DOCUMENT will be interpreted as the
so will be the included document; DOCUMENT will be interpreted as the
name of an annex.  If the current description was read from a file, GDB
name of an annex.  If the current description was read from a file, GDB
will look for DOCUMENT as a file in the same directory where it found
will look for DOCUMENT as a file in the same directory where it found
the original description.
the original description.
G.2.2 Architecture
G.2.2 Architecture
------------------
------------------
An `' element has this form:
An `' element has this form:
       ARCH
       ARCH
   ARCH is one of the architectures from the set accepted by `set
   ARCH is one of the architectures from the set accepted by `set
architecture' (*note Specifying a Debugging Target: Targets.).
architecture' (*note Specifying a Debugging Target: Targets.).
G.2.3 OS ABI
G.2.3 OS ABI
------------
------------
This optional field was introduced in GDB version 7.0.  Previous
This optional field was introduced in GDB version 7.0.  Previous
versions of GDB ignore it.
versions of GDB ignore it.
   An `' element has this form:
   An `' element has this form:
       ABI-NAME
       ABI-NAME
   ABI-NAME is an OS ABI name from the same selection accepted by
   ABI-NAME is an OS ABI name from the same selection accepted by
`set osabi' (*note Configuring the Current ABI: ABI.).
`set osabi' (*note Configuring the Current ABI: ABI.).
G.2.4 Compatible Architecture
G.2.4 Compatible Architecture
-----------------------------
-----------------------------
This optional field was introduced in GDB version 7.0.  Previous
This optional field was introduced in GDB version 7.0.  Previous
versions of GDB ignore it.
versions of GDB ignore it.
   A `' element has this form:
   A `' element has this form:
       ARCH
       ARCH
   ARCH is one of the architectures from the set accepted by `set
   ARCH is one of the architectures from the set accepted by `set
architecture' (*note Specifying a Debugging Target: Targets.).
architecture' (*note Specifying a Debugging Target: Targets.).
   A `' element is used to specify that the target is able
   A `' element is used to specify that the target is able
to run binaries in some other than the main target architecture given
to run binaries in some other than the main target architecture given
by the `' element.  For example, on the Cell Broadband
by the `' element.  For example, on the Cell Broadband
Engine, the main architecture is `powerpc:common' or
Engine, the main architecture is `powerpc:common' or
`powerpc:common64', but the system is able to run binaries in the `spu'
`powerpc:common64', but the system is able to run binaries in the `spu'
architecture as well.  The way to describe this capability with
architecture as well.  The way to describe this capability with
`' is as follows:
`' is as follows:
       powerpc:common
       powerpc:common
       spu
       spu
G.2.5 Features
G.2.5 Features
--------------
--------------
Each `' describes some logical portion of the target system.
Each `' describes some logical portion of the target system.
Features are currently used to describe available CPU registers and the
Features are currently used to describe available CPU registers and the
types of their contents.  A `' element has this form:
types of their contents.  A `' element has this form:
     
     
       [TYPE...]
       [TYPE...]
       REG...
       REG...
     
     
Each feature's name should be unique within the description.  The name
Each feature's name should be unique within the description.  The name
of a feature does not matter unless GDB has some special knowledge of
of a feature does not matter unless GDB has some special knowledge of
the contents of that feature; if it does, the feature should have its
the contents of that feature; if it does, the feature should have its
standard name.  *Note Standard Target Features::.
standard name.  *Note Standard Target Features::.
G.2.6 Types
G.2.6 Types
-----------
-----------
Any register's value is a collection of bits which GDB must interpret.
Any register's value is a collection of bits which GDB must interpret.
The default interpretation is a two's complement integer, but other
The default interpretation is a two's complement integer, but other
types can be requested by name in the register description.  Some
types can be requested by name in the register description.  Some
predefined types are provided by GDB (*note Predefined Target Types::),
predefined types are provided by GDB (*note Predefined Target Types::),
and the description can define additional composite types.
and the description can define additional composite types.
   Each type element must have an `id' attribute, which gives a unique
   Each type element must have an `id' attribute, which gives a unique
(within the containing `') name to the type.  Types must be
(within the containing `') name to the type.  Types must be
defined before they are used.
defined before they are used.
   Some targets offer vector registers, which can be treated as arrays
   Some targets offer vector registers, which can be treated as arrays
of scalar elements.  These types are written as `' elements,
of scalar elements.  These types are written as `' elements,
specifying the array element type, TYPE, and the number of elements,
specifying the array element type, TYPE, and the number of elements,
COUNT:
COUNT:
     
     
   If a register's value is usefully viewed in multiple ways, define it
   If a register's value is usefully viewed in multiple ways, define it
with a union type containing the useful representations.  The `'
with a union type containing the useful representations.  The `'
element contains one or more `' elements, each of which has a
element contains one or more `' elements, each of which has a
NAME and a TYPE:
NAME and a TYPE:
     
     
       
       
       ...
       ...
     
     
G.2.7 Registers
G.2.7 Registers
---------------
---------------
Each register is represented as an element with this form:
Each register is represented as an element with this form:
     
     
          bitsize="SIZE"
          bitsize="SIZE"
          [regnum="NUM"]
          [regnum="NUM"]
          [save-restore="SAVE-RESTORE"]
          [save-restore="SAVE-RESTORE"]
          [type="TYPE"]
          [type="TYPE"]
          [group="GROUP"]/>
          [group="GROUP"]/>
The components are as follows:
The components are as follows:
NAME
NAME
     The register's name; it must be unique within the target
     The register's name; it must be unique within the target
     description.
     description.
BITSIZE
BITSIZE
     The register's size, in bits.
     The register's size, in bits.
REGNUM
REGNUM
     The register's number.  If omitted, a register's number is one
     The register's number.  If omitted, a register's number is one
     greater than that of the previous register (either in the current
     greater than that of the previous register (either in the current
     feature or in a preceeding feature); the first register in the
     feature or in a preceeding feature); the first register in the
     target description defaults to zero.  This register number is used
     target description defaults to zero.  This register number is used
     to read or write the register; e.g. it is used in the remote `p'
     to read or write the register; e.g. it is used in the remote `p'
     and `P' packets, and registers appear in the `g' and `G' packets
     and `P' packets, and registers appear in the `g' and `G' packets
     in order of increasing register number.
     in order of increasing register number.
SAVE-RESTORE
SAVE-RESTORE
     Whether the register should be preserved across inferior function
     Whether the register should be preserved across inferior function
     calls; this must be either `yes' or `no'.  The default is `yes',
     calls; this must be either `yes' or `no'.  The default is `yes',
     which is appropriate for most registers except for some system
     which is appropriate for most registers except for some system
     control registers; this is not related to the target's ABI.
     control registers; this is not related to the target's ABI.
TYPE
TYPE
     The type of the register.  TYPE may be a predefined type, a type
     The type of the register.  TYPE may be a predefined type, a type
     defined in the current feature, or one of the special types `int'
     defined in the current feature, or one of the special types `int'
     and `float'.  `int' is an integer type of the correct size for
     and `float'.  `int' is an integer type of the correct size for
     BITSIZE, and `float' is a floating point type (in the
     BITSIZE, and `float' is a floating point type (in the
     architecture's normal floating point format) of the correct size
     architecture's normal floating point format) of the correct size
     for BITSIZE.  The default is `int'.
     for BITSIZE.  The default is `int'.
GROUP
GROUP
     The register group to which this register belongs.  GROUP must be
     The register group to which this register belongs.  GROUP must be
     either `general', `float', or `vector'.  If no GROUP is specified,
     either `general', `float', or `vector'.  If no GROUP is specified,
     GDB will not display the register in `info registers'.
     GDB will not display the register in `info registers'.


File: gdb.info,  Node: Predefined Target Types,  Next: Standard Target Features,  Prev: Target Description Format,  Up: Target Descriptions
File: gdb.info,  Node: Predefined Target Types,  Next: Standard Target Features,  Prev: Target Description Format,  Up: Target Descriptions
G.3 Predefined Target Types
G.3 Predefined Target Types
===========================
===========================
Type definitions in the self-description can build up composite types
Type definitions in the self-description can build up composite types
from basic building blocks, but can not define fundamental types.
from basic building blocks, but can not define fundamental types.
Instead, standard identifiers are provided by GDB for the fundamental
Instead, standard identifiers are provided by GDB for the fundamental
types.  The currently supported types are:
types.  The currently supported types are:
`int8'
`int8'
`int16'
`int16'
`int32'
`int32'
`int64'
`int64'
`int128'
`int128'
     Signed integer types holding the specified number of bits.
     Signed integer types holding the specified number of bits.
`uint8'
`uint8'
`uint16'
`uint16'
`uint32'
`uint32'
`uint64'
`uint64'
`uint128'
`uint128'
     Unsigned integer types holding the specified number of bits.
     Unsigned integer types holding the specified number of bits.
`code_ptr'
`code_ptr'
`data_ptr'
`data_ptr'
     Pointers to unspecified code and data.  The program counter and
     Pointers to unspecified code and data.  The program counter and
     any dedicated return address register may be marked as code
     any dedicated return address register may be marked as code
     pointers; printing a code pointer converts it into a symbolic
     pointers; printing a code pointer converts it into a symbolic
     address.  The stack pointer and any dedicated address registers
     address.  The stack pointer and any dedicated address registers
     may be marked as data pointers.
     may be marked as data pointers.
`ieee_single'
`ieee_single'
     Single precision IEEE floating point.
     Single precision IEEE floating point.
`ieee_double'
`ieee_double'
     Double precision IEEE floating point.
     Double precision IEEE floating point.
`arm_fpa_ext'
`arm_fpa_ext'
     The 12-byte extended precision format used by ARM FPA registers.
     The 12-byte extended precision format used by ARM FPA registers.
`i387_ext'
`i387_ext'
     The 10-byte extended precision format used by x87 registers.
     The 10-byte extended precision format used by x87 registers.
`i386_eflags'
`i386_eflags'
     32bit EFLAGS register used by x86.
     32bit EFLAGS register used by x86.
`i386_mxcsr'
`i386_mxcsr'
     32bit MXCSR register used by x86.
     32bit MXCSR register used by x86.


File: gdb.info,  Node: Standard Target Features,  Prev: Predefined Target Types,  Up: Target Descriptions
File: gdb.info,  Node: Standard Target Features,  Prev: Predefined Target Types,  Up: Target Descriptions
G.4 Standard Target Features
G.4 Standard Target Features
============================
============================
A target description must contain either no registers or all the
A target description must contain either no registers or all the
target's registers.  If the description contains no registers, then GDB
target's registers.  If the description contains no registers, then GDB
will assume a default register layout, selected based on the
will assume a default register layout, selected based on the
architecture.  If the description contains any registers, the default
architecture.  If the description contains any registers, the default
layout will not be used; the standard registers must be described in
layout will not be used; the standard registers must be described in
the target description, in such a way that GDB can recognize them.
the target description, in such a way that GDB can recognize them.
   This is accomplished by giving specific names to feature elements
   This is accomplished by giving specific names to feature elements
which contain standard registers.  GDB will look for features with
which contain standard registers.  GDB will look for features with
those names and verify that they contain the expected registers; if any
those names and verify that they contain the expected registers; if any
known feature is missing required registers, or if any required feature
known feature is missing required registers, or if any required feature
is missing, GDB will reject the target description.  You can add
is missing, GDB will reject the target description.  You can add
additional registers to any of the standard features -- GDB will
additional registers to any of the standard features -- GDB will
display them just as if they were added to an unrecognized feature.
display them just as if they were added to an unrecognized feature.
   This section lists the known features and their expected contents.
   This section lists the known features and their expected contents.
Sample XML documents for these features are included in the GDB source
Sample XML documents for these features are included in the GDB source
tree, in the directory `gdb/features'.
tree, in the directory `gdb/features'.
   Names recognized by GDB should include the name of the company or
   Names recognized by GDB should include the name of the company or
organization which selected the name, and the overall architecture to
organization which selected the name, and the overall architecture to
which the feature applies; so e.g. the feature containing ARM core
which the feature applies; so e.g. the feature containing ARM core
registers is named `org.gnu.gdb.arm.core'.
registers is named `org.gnu.gdb.arm.core'.
   The names of registers are not case sensitive for the purpose of
   The names of registers are not case sensitive for the purpose of
recognizing standard features, but GDB will only display registers
recognizing standard features, but GDB will only display registers
using the capitalization used in the description.
using the capitalization used in the description.
* Menu:
* Menu:
* ARM Features::
* ARM Features::
* i386 Features::
* i386 Features::
* MIPS Features::
* MIPS Features::
* M68K Features::
* M68K Features::
* PowerPC Features::
* PowerPC Features::


File: gdb.info,  Node: ARM Features,  Next: i386 Features,  Up: Standard Target Features
File: gdb.info,  Node: ARM Features,  Next: i386 Features,  Up: Standard Target Features
G.4.1 ARM Features
G.4.1 ARM Features
------------------
------------------
The `org.gnu.gdb.arm.core' feature is required for ARM targets.  It
The `org.gnu.gdb.arm.core' feature is required for ARM targets.  It
should contain registers `r0' through `r13', `sp', `lr', `pc', and
should contain registers `r0' through `r13', `sp', `lr', `pc', and
`cpsr'.
`cpsr'.
   The `org.gnu.gdb.arm.fpa' feature is optional.  If present, it
   The `org.gnu.gdb.arm.fpa' feature is optional.  If present, it
should contain registers `f0' through `f7' and `fps'.
should contain registers `f0' through `f7' and `fps'.
   The `org.gnu.gdb.xscale.iwmmxt' feature is optional.  If present, it
   The `org.gnu.gdb.xscale.iwmmxt' feature is optional.  If present, it
should contain at least registers `wR0' through `wR15' and `wCGR0'
should contain at least registers `wR0' through `wR15' and `wCGR0'
through `wCGR3'.  The `wCID', `wCon', `wCSSF', and `wCASF' registers
through `wCGR3'.  The `wCID', `wCon', `wCSSF', and `wCASF' registers
are optional.
are optional.
   The `org.gnu.gdb.arm.vfp' feature is optional.  If present, it
   The `org.gnu.gdb.arm.vfp' feature is optional.  If present, it
should contain at least registers `d0' through `d15'.  If they are
should contain at least registers `d0' through `d15'.  If they are
present, `d16' through `d31' should also be included.  GDB will
present, `d16' through `d31' should also be included.  GDB will
synthesize the single-precision registers from halves of the
synthesize the single-precision registers from halves of the
double-precision registers.
double-precision registers.
   The `org.gnu.gdb.arm.neon' feature is optional.  It does not need to
   The `org.gnu.gdb.arm.neon' feature is optional.  It does not need to
contain registers; it instructs GDB to display the VFP double-precision
contain registers; it instructs GDB to display the VFP double-precision
registers as vectors and to synthesize the quad-precision registers
registers as vectors and to synthesize the quad-precision registers
from pairs of double-precision registers.  If this feature is present,
from pairs of double-precision registers.  If this feature is present,
`org.gnu.gdb.arm.vfp' must also be present and include 32
`org.gnu.gdb.arm.vfp' must also be present and include 32
double-precision registers.
double-precision registers.


File: gdb.info,  Node: i386 Features,  Next: MIPS Features,  Prev: ARM Features,  Up: Standard Target Features
File: gdb.info,  Node: i386 Features,  Next: MIPS Features,  Prev: ARM Features,  Up: Standard Target Features
G.4.2 i386 Features
G.4.2 i386 Features
-------------------
-------------------
The `org.gnu.gdb.i386.core' feature is required for i386/amd64 targets.
The `org.gnu.gdb.i386.core' feature is required for i386/amd64 targets.
It should describe the following registers:
It should describe the following registers:
   - `eax' through `edi' plus `eip' for i386
   - `eax' through `edi' plus `eip' for i386
   - `rax' through `r15' plus `rip' for amd64
   - `rax' through `r15' plus `rip' for amd64
   - `eflags', `cs', `ss', `ds', `es', `fs', `gs'
   - `eflags', `cs', `ss', `ds', `es', `fs', `gs'
   - `st0' through `st7'
   - `st0' through `st7'
   - `fctrl', `fstat', `ftag', `fiseg', `fioff', `foseg', `fooff' and
   - `fctrl', `fstat', `ftag', `fiseg', `fioff', `foseg', `fooff' and
     `fop'
     `fop'
   The register sets may be different, depending on the target.
   The register sets may be different, depending on the target.
   The `org.gnu.gdb.i386.sse' feature is required.  It should describe
   The `org.gnu.gdb.i386.sse' feature is required.  It should describe
registers:
registers:
   - `xmm0' through `xmm7' for i386
   - `xmm0' through `xmm7' for i386
   - `xmm0' through `xmm15' for amd64
   - `xmm0' through `xmm15' for amd64
   - `mxcsr'
   - `mxcsr'
   The `org.gnu.gdb.i386.linux' feature is optional.  It should
   The `org.gnu.gdb.i386.linux' feature is optional.  It should
describe a single register, `orig_eax'.
describe a single register, `orig_eax'.


File: gdb.info,  Node: MIPS Features,  Next: M68K Features,  Prev: i386 Features,  Up: Standard Target Features
File: gdb.info,  Node: MIPS Features,  Next: M68K Features,  Prev: i386 Features,  Up: Standard Target Features
G.4.3 MIPS Features
G.4.3 MIPS Features
-------------------
-------------------
The `org.gnu.gdb.mips.cpu' feature is required for MIPS targets.  It
The `org.gnu.gdb.mips.cpu' feature is required for MIPS targets.  It
should contain registers `r0' through `r31', `lo', `hi', and `pc'.
should contain registers `r0' through `r31', `lo', `hi', and `pc'.
They may be 32-bit or 64-bit depending on the target.
They may be 32-bit or 64-bit depending on the target.
   The `org.gnu.gdb.mips.cp0' feature is also required.  It should
   The `org.gnu.gdb.mips.cp0' feature is also required.  It should
contain at least the `status', `badvaddr', and `cause' registers.  They
contain at least the `status', `badvaddr', and `cause' registers.  They
may be 32-bit or 64-bit depending on the target.
may be 32-bit or 64-bit depending on the target.
   The `org.gnu.gdb.mips.fpu' feature is currently required, though it
   The `org.gnu.gdb.mips.fpu' feature is currently required, though it
may be optional in a future version of GDB.  It should contain
may be optional in a future version of GDB.  It should contain
registers `f0' through `f31', `fcsr', and `fir'.  They may be 32-bit or
registers `f0' through `f31', `fcsr', and `fir'.  They may be 32-bit or
64-bit depending on the target.
64-bit depending on the target.
   The `org.gnu.gdb.mips.linux' feature is optional.  It should contain
   The `org.gnu.gdb.mips.linux' feature is optional.  It should contain
a single register, `restart', which is used by the Linux kernel to
a single register, `restart', which is used by the Linux kernel to
control restartable syscalls.
control restartable syscalls.


File: gdb.info,  Node: M68K Features,  Next: PowerPC Features,  Prev: MIPS Features,  Up: Standard Target Features
File: gdb.info,  Node: M68K Features,  Next: PowerPC Features,  Prev: MIPS Features,  Up: Standard Target Features
G.4.4 M68K Features
G.4.4 M68K Features
-------------------
-------------------
``org.gnu.gdb.m68k.core''
``org.gnu.gdb.m68k.core''
``org.gnu.gdb.coldfire.core''
``org.gnu.gdb.coldfire.core''
``org.gnu.gdb.fido.core''
``org.gnu.gdb.fido.core''
     One of those features must be always present.  The feature that is
     One of those features must be always present.  The feature that is
     present determines which flavor of m68k is used.  The feature that
     present determines which flavor of m68k is used.  The feature that
     is present should contain registers `d0' through `d7', `a0'
     is present should contain registers `d0' through `d7', `a0'
     through `a5', `fp', `sp', `ps' and `pc'.
     through `a5', `fp', `sp', `ps' and `pc'.
``org.gnu.gdb.coldfire.fp''
``org.gnu.gdb.coldfire.fp''
     This feature is optional.  If present, it should contain registers
     This feature is optional.  If present, it should contain registers
     `fp0' through `fp7', `fpcontrol', `fpstatus' and `fpiaddr'.
     `fp0' through `fp7', `fpcontrol', `fpstatus' and `fpiaddr'.


File: gdb.info,  Node: PowerPC Features,  Prev: M68K Features,  Up: Standard Target Features
File: gdb.info,  Node: PowerPC Features,  Prev: M68K Features,  Up: Standard Target Features
G.4.5 PowerPC Features
G.4.5 PowerPC Features
----------------------
----------------------
The `org.gnu.gdb.power.core' feature is required for PowerPC targets.
The `org.gnu.gdb.power.core' feature is required for PowerPC targets.
It should contain registers `r0' through `r31', `pc', `msr', `cr',
It should contain registers `r0' through `r31', `pc', `msr', `cr',
`lr', `ctr', and `xer'.  They may be 32-bit or 64-bit depending on the
`lr', `ctr', and `xer'.  They may be 32-bit or 64-bit depending on the
target.
target.
   The `org.gnu.gdb.power.fpu' feature is optional.  It should contain
   The `org.gnu.gdb.power.fpu' feature is optional.  It should contain
registers `f0' through `f31' and `fpscr'.
registers `f0' through `f31' and `fpscr'.
   The `org.gnu.gdb.power.altivec' feature is optional.  It should
   The `org.gnu.gdb.power.altivec' feature is optional.  It should
contain registers `vr0' through `vr31', `vscr', and `vrsave'.
contain registers `vr0' through `vr31', `vscr', and `vrsave'.
   The `org.gnu.gdb.power.vsx' feature is optional.  It should contain
   The `org.gnu.gdb.power.vsx' feature is optional.  It should contain
registers `vs0h' through `vs31h'.  GDB will combine these registers
registers `vs0h' through `vs31h'.  GDB will combine these registers
with the floating point registers (`f0' through `f31') and the altivec
with the floating point registers (`f0' through `f31') and the altivec
registers (`vr0' through `vr31') to present the 128-bit wide registers
registers (`vr0' through `vr31') to present the 128-bit wide registers
`vs0' through `vs63', the set of vector registers for POWER7.
`vs0' through `vs63', the set of vector registers for POWER7.
   The `org.gnu.gdb.power.spe' feature is optional.  It should contain
   The `org.gnu.gdb.power.spe' feature is optional.  It should contain
registers `ev0h' through `ev31h', `acc', and `spefscr'.  SPE targets
registers `ev0h' through `ev31h', `acc', and `spefscr'.  SPE targets
should provide 32-bit registers in `org.gnu.gdb.power.core' and provide
should provide 32-bit registers in `org.gnu.gdb.power.core' and provide
the upper halves in `ev0h' through `ev31h'.  GDB will combine these to
the upper halves in `ev0h' through `ev31h'.  GDB will combine these to
present registers `ev0' through `ev31' to the user.
present registers `ev0' through `ev31' to the user.


File: gdb.info,  Node: Operating System Information,  Next: Trace File Format,  Prev: Target Descriptions,  Up: Top
File: gdb.info,  Node: Operating System Information,  Next: Trace File Format,  Prev: Target Descriptions,  Up: Top
Appendix H Operating System Information
Appendix H Operating System Information
***************************************
***************************************
* Menu:
* Menu:
* Process list::
* Process list::
   Users of GDB often wish to obtain information about the state of the
   Users of GDB often wish to obtain information about the state of the
operating system running on the target--for example the list of
operating system running on the target--for example the list of
processes, or the list of open files.  This section describes the
processes, or the list of open files.  This section describes the
mechanism that makes it possible.  This mechanism is similar to the
mechanism that makes it possible.  This mechanism is similar to the
target features mechanism (*note Target Descriptions::), but focuses on
target features mechanism (*note Target Descriptions::), but focuses on
a different aspect of target.
a different aspect of target.
   Operating system information is retrived from the target via the
   Operating system information is retrived from the target via the
remote protocol, using `qXfer' requests (*note qXfer osdata read::).
remote protocol, using `qXfer' requests (*note qXfer osdata read::).
The object name in the request should be `osdata', and the ANNEX
The object name in the request should be `osdata', and the ANNEX
identifies the data to be fetched.
identifies the data to be fetched.


File: gdb.info,  Node: Process list,  Up: Operating System Information
File: gdb.info,  Node: Process list,  Up: Operating System Information
H.1 Process list
H.1 Process list
================
================
When requesting the process list, the ANNEX field in the `qXfer'
When requesting the process list, the ANNEX field in the `qXfer'
request should be `processes'.  The returned data is an XML document.
request should be `processes'.  The returned data is an XML document.
The formal syntax of this document is defined in
The formal syntax of this document is defined in
`gdb/features/osdata.dtd'.
`gdb/features/osdata.dtd'.
   An example document is:
   An example document is:
     
     
     
     
     
     
       
       
         1
         1
         root
         root
         /sbin/init
         /sbin/init
         1,2,3
         1,2,3
       
       
     
     
   Each item should include a column whose name is `pid'.  The value of
   Each item should include a column whose name is `pid'.  The value of
that column should identify the process on the target.  The `user' and
that column should identify the process on the target.  The `user' and
`command' columns are optional, and will be displayed by GDB.  The
`command' columns are optional, and will be displayed by GDB.  The
`cores' column, if present, should contain a comma-separated list of
`cores' column, if present, should contain a comma-separated list of
cores that this process is running on.  Target may provide additional
cores that this process is running on.  Target may provide additional
columns, which GDB currently ignores.
columns, which GDB currently ignores.


File: gdb.info,  Node: Copying,  Next: GNU Free Documentation License,  Prev: Trace File Format,  Up: Top
File: gdb.info,  Node: Copying,  Next: GNU Free Documentation License,  Prev: Trace File Format,  Up: Top
Appendix I GNU GENERAL PUBLIC LICENSE
Appendix I GNU GENERAL PUBLIC LICENSE
*************************************
*************************************
                        Version 3, 29 June 2007
                        Version 3, 29 June 2007
     Copyright (C) 2007 Free Software Foundation, Inc. `http://fsf.org/'
     Copyright (C) 2007 Free Software Foundation, Inc. `http://fsf.org/'
     Everyone is permitted to copy and distribute verbatim copies of this
     Everyone is permitted to copy and distribute verbatim copies of this
     license document, but changing it is not allowed.
     license document, but changing it is not allowed.
Preamble
Preamble
========
========
The GNU General Public License is a free, copyleft license for software
The GNU General Public License is a free, copyleft license for software
and other kinds of works.
and other kinds of works.
   The licenses for most software and other practical works are designed
   The licenses for most software and other practical works are designed
to take away your freedom to share and change the works.  By contrast,
to take away your freedom to share and change the works.  By contrast,
the GNU General Public License is intended to guarantee your freedom to
the GNU General Public License is intended to guarantee your freedom to
share and change all versions of a program--to make sure it remains
share and change all versions of a program--to make sure it remains
free software for all its users.  We, the Free Software Foundation, use
free software for all its users.  We, the Free Software Foundation, use
the GNU General Public License for most of our software; it applies
the GNU General Public License for most of our software; it applies
also to any other work released this way by its authors.  You can apply
also to any other work released this way by its authors.  You can apply
it to your programs, too.
it to your programs, too.
   When we speak of free software, we are referring to freedom, not
   When we speak of free software, we are referring to freedom, not
price.  Our General Public Licenses are designed to make sure that you
price.  Our General Public Licenses are designed to make sure that you
have the freedom to distribute copies of free software (and charge for
have the freedom to distribute copies of free software (and charge for
them if you wish), that you receive source code or can get it if you
them if you wish), that you receive source code or can get it if you
want it, that you can change the software or use pieces of it in new
want it, that you can change the software or use pieces of it in new
free programs, and that you know you can do these things.
free programs, and that you know you can do these things.
   To protect your rights, we need to prevent others from denying you
   To protect your rights, we need to prevent others from denying you
these rights or asking you to surrender the rights.  Therefore, you
these rights or asking you to surrender the rights.  Therefore, you
have certain responsibilities if you distribute copies of the software,
have certain responsibilities if you distribute copies of the software,
or if you modify it: responsibilities to respect the freedom of others.
or if you modify it: responsibilities to respect the freedom of others.
   For example, if you distribute copies of such a program, whether
   For example, if you distribute copies of such a program, whether
gratis or for a fee, you must pass on to the recipients the same
gratis or for a fee, you must pass on to the recipients the same
freedoms that you received.  You must make sure that they, too, receive
freedoms that you received.  You must make sure that they, too, receive
or can get the source code.  And you must show them these terms so they
or can get the source code.  And you must show them these terms so they
know their rights.
know their rights.
   Developers that use the GNU GPL protect your rights with two steps:
   Developers that use the GNU GPL protect your rights with two steps:
(1) assert copyright on the software, and (2) offer you this License
(1) assert copyright on the software, and (2) offer you this License
giving you legal permission to copy, distribute and/or modify it.
giving you legal permission to copy, distribute and/or modify it.
   For the developers' and authors' protection, the GPL clearly explains
   For the developers' and authors' protection, the GPL clearly explains
that there is no warranty for this free software.  For both users' and
that there is no warranty for this free software.  For both users' and
authors' sake, the GPL requires that modified versions be marked as
authors' sake, the GPL requires that modified versions be marked as
changed, so that their problems will not be attributed erroneously to
changed, so that their problems will not be attributed erroneously to
authors of previous versions.
authors of previous versions.
   Some devices are designed to deny users access to install or run
   Some devices are designed to deny users access to install or run
modified versions of the software inside them, although the
modified versions of the software inside them, although the
manufacturer can do so.  This is fundamentally incompatible with the
manufacturer can do so.  This is fundamentally incompatible with the
aim of protecting users' freedom to change the software.  The
aim of protecting users' freedom to change the software.  The
systematic pattern of such abuse occurs in the area of products for
systematic pattern of such abuse occurs in the area of products for
individuals to use, which is precisely where it is most unacceptable.
individuals to use, which is precisely where it is most unacceptable.
Therefore, we have designed this version of the GPL to prohibit the
Therefore, we have designed this version of the GPL to prohibit the
practice for those products.  If such problems arise substantially in
practice for those products.  If such problems arise substantially in
other domains, we stand ready to extend this provision to those domains
other domains, we stand ready to extend this provision to those domains
in future versions of the GPL, as needed to protect the freedom of
in future versions of the GPL, as needed to protect the freedom of
users.
users.
   Finally, every program is threatened constantly by software patents.
   Finally, every program is threatened constantly by software patents.
States should not allow patents to restrict development and use of
States should not allow patents to restrict development and use of
software on general-purpose computers, but in those that do, we wish to
software on general-purpose computers, but in those that do, we wish to
avoid the special danger that patents applied to a free program could
avoid the special danger that patents applied to a free program could
make it effectively proprietary.  To prevent this, the GPL assures that
make it effectively proprietary.  To prevent this, the GPL assures that
patents cannot be used to render the program non-free.
patents cannot be used to render the program non-free.
   The precise terms and conditions for copying, distribution and
   The precise terms and conditions for copying, distribution and
modification follow.
modification follow.
TERMS AND CONDITIONS
TERMS AND CONDITIONS
====================
====================
  0. Definitions.
  0. Definitions.
     "This License" refers to version 3 of the GNU General Public
     "This License" refers to version 3 of the GNU General Public
     License.
     License.
     "Copyright" also means copyright-like laws that apply to other
     "Copyright" also means copyright-like laws that apply to other
     kinds of works, such as semiconductor masks.
     kinds of works, such as semiconductor masks.
     "The Program" refers to any copyrightable work licensed under this
     "The Program" refers to any copyrightable work licensed under this
     License.  Each licensee is addressed as "you".  "Licensees" and
     License.  Each licensee is addressed as "you".  "Licensees" and
     "recipients" may be individuals or organizations.
     "recipients" may be individuals or organizations.
     To "modify" a work means to copy from or adapt all or part of the
     To "modify" a work means to copy from or adapt all or part of the
     work in a fashion requiring copyright permission, other than the
     work in a fashion requiring copyright permission, other than the
     making of an exact copy.  The resulting work is called a "modified
     making of an exact copy.  The resulting work is called a "modified
     version" of the earlier work or a work "based on" the earlier work.
     version" of the earlier work or a work "based on" the earlier work.
     A "covered work" means either the unmodified Program or a work
     A "covered work" means either the unmodified Program or a work
     based on the Program.
     based on the Program.
     To "propagate" a work means to do anything with it that, without
     To "propagate" a work means to do anything with it that, without
     permission, would make you directly or secondarily liable for
     permission, would make you directly or secondarily liable for
     infringement under applicable copyright law, except executing it
     infringement under applicable copyright law, except executing it
     on a computer or modifying a private copy.  Propagation includes
     on a computer or modifying a private copy.  Propagation includes
     copying, distribution (with or without modification), making
     copying, distribution (with or without modification), making
     available to the public, and in some countries other activities as
     available to the public, and in some countries other activities as
     well.
     well.
     To "convey" a work means any kind of propagation that enables other
     To "convey" a work means any kind of propagation that enables other
     parties to make or receive copies.  Mere interaction with a user
     parties to make or receive copies.  Mere interaction with a user
     through a computer network, with no transfer of a copy, is not
     through a computer network, with no transfer of a copy, is not
     conveying.
     conveying.
     An interactive user interface displays "Appropriate Legal Notices"
     An interactive user interface displays "Appropriate Legal Notices"
     to the extent that it includes a convenient and prominently visible
     to the extent that it includes a convenient and prominently visible
     feature that (1) displays an appropriate copyright notice, and (2)
     feature that (1) displays an appropriate copyright notice, and (2)
     tells the user that there is no warranty for the work (except to
     tells the user that there is no warranty for the work (except to
     the extent that warranties are provided), that licensees may
     the extent that warranties are provided), that licensees may
     convey the work under this License, and how to view a copy of this
     convey the work under this License, and how to view a copy of this
     License.  If the interface presents a list of user commands or
     License.  If the interface presents a list of user commands or
     options, such as a menu, a prominent item in the list meets this
     options, such as a menu, a prominent item in the list meets this
     criterion.
     criterion.
  1. Source Code.
  1. Source Code.
     The "source code" for a work means the preferred form of the work
     The "source code" for a work means the preferred form of the work
     for making modifications to it.  "Object code" means any
     for making modifications to it.  "Object code" means any
     non-source form of a work.
     non-source form of a work.
     A "Standard Interface" means an interface that either is an
     A "Standard Interface" means an interface that either is an
     official standard defined by a recognized standards body, or, in
     official standard defined by a recognized standards body, or, in
     the case of interfaces specified for a particular programming
     the case of interfaces specified for a particular programming
     language, one that is widely used among developers working in that
     language, one that is widely used among developers working in that
     language.
     language.
     The "System Libraries" of an executable work include anything,
     The "System Libraries" of an executable work include anything,
     other than the work as a whole, that (a) is included in the normal
     other than the work as a whole, that (a) is included in the normal
     form of packaging a Major Component, but which is not part of that
     form of packaging a Major Component, but which is not part of that
     Major Component, and (b) serves only to enable use of the work
     Major Component, and (b) serves only to enable use of the work
     with that Major Component, or to implement a Standard Interface
     with that Major Component, or to implement a Standard Interface
     for which an implementation is available to the public in source
     for which an implementation is available to the public in source
     code form.  A "Major Component", in this context, means a major
     code form.  A "Major Component", in this context, means a major
     essential component (kernel, window system, and so on) of the
     essential component (kernel, window system, and so on) of the
     specific operating system (if any) on which the executable work
     specific operating system (if any) on which the executable work
     runs, or a compiler used to produce the work, or an object code
     runs, or a compiler used to produce the work, or an object code
     interpreter used to run it.
     interpreter used to run it.
     The "Corresponding Source" for a work in object code form means all
     The "Corresponding Source" for a work in object code form means all
     the source code needed to generate, install, and (for an executable
     the source code needed to generate, install, and (for an executable
     work) run the object code and to modify the work, including
     work) run the object code and to modify the work, including
     scripts to control those activities.  However, it does not include
     scripts to control those activities.  However, it does not include
     the work's System Libraries, or general-purpose tools or generally
     the work's System Libraries, or general-purpose tools or generally
     available free programs which are used unmodified in performing
     available free programs which are used unmodified in performing
     those activities but which are not part of the work.  For example,
     those activities but which are not part of the work.  For example,
     Corresponding Source includes interface definition files
     Corresponding Source includes interface definition files
     associated with source files for the work, and the source code for
     associated with source files for the work, and the source code for
     shared libraries and dynamically linked subprograms that the work
     shared libraries and dynamically linked subprograms that the work
     is specifically designed to require, such as by intimate data
     is specifically designed to require, such as by intimate data
     communication or control flow between those subprograms and other
     communication or control flow between those subprograms and other
     parts of the work.
     parts of the work.
     The Corresponding Source need not include anything that users can
     The Corresponding Source need not include anything that users can
     regenerate automatically from other parts of the Corresponding
     regenerate automatically from other parts of the Corresponding
     Source.
     Source.
     The Corresponding Source for a work in source code form is that
     The Corresponding Source for a work in source code form is that
     same work.
     same work.
  2. Basic Permissions.
  2. Basic Permissions.
     All rights granted under this License are granted for the term of
     All rights granted under this License are granted for the term of
     copyright on the Program, and are irrevocable provided the stated
     copyright on the Program, and are irrevocable provided the stated
     conditions are met.  This License explicitly affirms your unlimited
     conditions are met.  This License explicitly affirms your unlimited
     permission to run the unmodified Program.  The output from running
     permission to run the unmodified Program.  The output from running
     a covered work is covered by this License only if the output,
     a covered work is covered by this License only if the output,
     given its content, constitutes a covered work.  This License
     given its content, constitutes a covered work.  This License
     acknowledges your rights of fair use or other equivalent, as
     acknowledges your rights of fair use or other equivalent, as
     provided by copyright law.
     provided by copyright law.
     You may make, run and propagate covered works that you do not
     You may make, run and propagate covered works that you do not
     convey, without conditions so long as your license otherwise
     convey, without conditions so long as your license otherwise
     remains in force.  You may convey covered works to others for the
     remains in force.  You may convey covered works to others for the
     sole purpose of having them make modifications exclusively for
     sole purpose of having them make modifications exclusively for
     you, or provide you with facilities for running those works,
     you, or provide you with facilities for running those works,
     provided that you comply with the terms of this License in
     provided that you comply with the terms of this License in
     conveying all material for which you do not control copyright.
     conveying all material for which you do not control copyright.
     Those thus making or running the covered works for you must do so
     Those thus making or running the covered works for you must do so
     exclusively on your behalf, under your direction and control, on
     exclusively on your behalf, under your direction and control, on
     terms that prohibit them from making any copies of your
     terms that prohibit them from making any copies of your
     copyrighted material outside their relationship with you.
     copyrighted material outside their relationship with you.
     Conveying under any other circumstances is permitted solely under
     Conveying under any other circumstances is permitted solely under
     the conditions stated below.  Sublicensing is not allowed; section
     the conditions stated below.  Sublicensing is not allowed; section
     10 makes it unnecessary.
     10 makes it unnecessary.
  3. Protecting Users' Legal Rights From Anti-Circumvention Law.
  3. Protecting Users' Legal Rights From Anti-Circumvention Law.
     No covered work shall be deemed part of an effective technological
     No covered work shall be deemed part of an effective technological
     measure under any applicable law fulfilling obligations under
     measure under any applicable law fulfilling obligations under
     article 11 of the WIPO copyright treaty adopted on 20 December
     article 11 of the WIPO copyright treaty adopted on 20 December
     1996, or similar laws prohibiting or restricting circumvention of
     1996, or similar laws prohibiting or restricting circumvention of
     such measures.
     such measures.
     When you convey a covered work, you waive any legal power to forbid
     When you convey a covered work, you waive any legal power to forbid
     circumvention of technological measures to the extent such
     circumvention of technological measures to the extent such
     circumvention is effected by exercising rights under this License
     circumvention is effected by exercising rights under this License
     with respect to the covered work, and you disclaim any intention
     with respect to the covered work, and you disclaim any intention
     to limit operation or modification of the work as a means of
     to limit operation or modification of the work as a means of
     enforcing, against the work's users, your or third parties' legal
     enforcing, against the work's users, your or third parties' legal
     rights to forbid circumvention of technological measures.
     rights to forbid circumvention of technological measures.
  4. Conveying Verbatim Copies.
  4. Conveying Verbatim Copies.
     You may convey verbatim copies of the Program's source code as you
     You may convey verbatim copies of the Program's source code as you
     receive it, in any medium, provided that you conspicuously and
     receive it, in any medium, provided that you conspicuously and
     appropriately publish on each copy an appropriate copyright notice;
     appropriately publish on each copy an appropriate copyright notice;
     keep intact all notices stating that this License and any
     keep intact all notices stating that this License and any
     non-permissive terms added in accord with section 7 apply to the
     non-permissive terms added in accord with section 7 apply to the
     code; keep intact all notices of the absence of any warranty; and
     code; keep intact all notices of the absence of any warranty; and
     give all recipients a copy of this License along with the Program.
     give all recipients a copy of this License along with the Program.
     You may charge any price or no price for each copy that you convey,
     You may charge any price or no price for each copy that you convey,
     and you may offer support or warranty protection for a fee.
     and you may offer support or warranty protection for a fee.
  5. Conveying Modified Source Versions.
  5. Conveying Modified Source Versions.
     You may convey a work based on the Program, or the modifications to
     You may convey a work based on the Program, or the modifications to
     produce it from the Program, in the form of source code under the
     produce it from the Program, in the form of source code under the
     terms of section 4, provided that you also meet all of these
     terms of section 4, provided that you also meet all of these
     conditions:
     conditions:
       a. The work must carry prominent notices stating that you
       a. The work must carry prominent notices stating that you
          modified it, and giving a relevant date.
          modified it, and giving a relevant date.
       b. The work must carry prominent notices stating that it is
       b. The work must carry prominent notices stating that it is
          released under this License and any conditions added under
          released under this License and any conditions added under
          section 7.  This requirement modifies the requirement in
          section 7.  This requirement modifies the requirement in
          section 4 to "keep intact all notices".
          section 4 to "keep intact all notices".
       c. You must license the entire work, as a whole, under this
       c. You must license the entire work, as a whole, under this
          License to anyone who comes into possession of a copy.  This
          License to anyone who comes into possession of a copy.  This
          License will therefore apply, along with any applicable
          License will therefore apply, along with any applicable
          section 7 additional terms, to the whole of the work, and all
          section 7 additional terms, to the whole of the work, and all
          its parts, regardless of how they are packaged.  This License
          its parts, regardless of how they are packaged.  This License
          gives no permission to license the work in any other way, but
          gives no permission to license the work in any other way, but
          it does not invalidate such permission if you have separately
          it does not invalidate such permission if you have separately
          received it.
          received it.
       d. If the work has interactive user interfaces, each must display
       d. If the work has interactive user interfaces, each must display
          Appropriate Legal Notices; however, if the Program has
          Appropriate Legal Notices; however, if the Program has
          interactive interfaces that do not display Appropriate Legal
          interactive interfaces that do not display Appropriate Legal
          Notices, your work need not make them do so.
          Notices, your work need not make them do so.
     A compilation of a covered work with other separate and independent
     A compilation of a covered work with other separate and independent
     works, which are not by their nature extensions of the covered
     works, which are not by their nature extensions of the covered
     work, and which are not combined with it such as to form a larger
     work, and which are not combined with it such as to form a larger
     program, in or on a volume of a storage or distribution medium, is
     program, in or on a volume of a storage or distribution medium, is
     called an "aggregate" if the compilation and its resulting
     called an "aggregate" if the compilation and its resulting
     copyright are not used to limit the access or legal rights of the
     copyright are not used to limit the access or legal rights of the
     compilation's users beyond what the individual works permit.
     compilation's users beyond what the individual works permit.
     Inclusion of a covered work in an aggregate does not cause this
     Inclusion of a covered work in an aggregate does not cause this
     License to apply to the other parts of the aggregate.
     License to apply to the other parts of the aggregate.
  6. Conveying Non-Source Forms.
  6. Conveying Non-Source Forms.
     You may convey a covered work in object code form under the terms
     You may convey a covered work in object code form under the terms
     of sections 4 and 5, provided that you also convey the
     of sections 4 and 5, provided that you also convey the
     machine-readable Corresponding Source under the terms of this
     machine-readable Corresponding Source under the terms of this
     License, in one of these ways:
     License, in one of these ways:
       a. Convey the object code in, or embodied in, a physical product
       a. Convey the object code in, or embodied in, a physical product
          (including a physical distribution medium), accompanied by the
          (including a physical distribution medium), accompanied by the
          Corresponding Source fixed on a durable physical medium
          Corresponding Source fixed on a durable physical medium
          customarily used for software interchange.
          customarily used for software interchange.
       b. Convey the object code in, or embodied in, a physical product
       b. Convey the object code in, or embodied in, a physical product
          (including a physical distribution medium), accompanied by a
          (including a physical distribution medium), accompanied by a
          written offer, valid for at least three years and valid for
          written offer, valid for at least three years and valid for
          as long as you offer spare parts or customer support for that
          as long as you offer spare parts or customer support for that
          product model, to give anyone who possesses the object code
          product model, to give anyone who possesses the object code
          either (1) a copy of the Corresponding Source for all the
          either (1) a copy of the Corresponding Source for all the
          software in the product that is covered by this License, on a
          software in the product that is covered by this License, on a
          durable physical medium customarily used for software
          durable physical medium customarily used for software
          interchange, for a price no more than your reasonable cost of
          interchange, for a price no more than your reasonable cost of
          physically performing this conveying of source, or (2) access
          physically performing this conveying of source, or (2) access
          to copy the Corresponding Source from a network server at no
          to copy the Corresponding Source from a network server at no
          charge.
          charge.
       c. Convey individual copies of the object code with a copy of
       c. Convey individual copies of the object code with a copy of
          the written offer to provide the Corresponding Source.  This
          the written offer to provide the Corresponding Source.  This
          alternative is allowed only occasionally and noncommercially,
          alternative is allowed only occasionally and noncommercially,
          and only if you received the object code with such an offer,
          and only if you received the object code with such an offer,
          in accord with subsection 6b.
          in accord with subsection 6b.
       d. Convey the object code by offering access from a designated
       d. Convey the object code by offering access from a designated
          place (gratis or for a charge), and offer equivalent access
          place (gratis or for a charge), and offer equivalent access
          to the Corresponding Source in the same way through the same
          to the Corresponding Source in the same way through the same
          place at no further charge.  You need not require recipients
          place at no further charge.  You need not require recipients
          to copy the Corresponding Source along with the object code.
          to copy the Corresponding Source along with the object code.
          If the place to copy the object code is a network server, the
          If the place to copy the object code is a network server, the
          Corresponding Source may be on a different server (operated
          Corresponding Source may be on a different server (operated
          by you or a third party) that supports equivalent copying
          by you or a third party) that supports equivalent copying
          facilities, provided you maintain clear directions next to
          facilities, provided you maintain clear directions next to
          the object code saying where to find the Corresponding Source.
          the object code saying where to find the Corresponding Source.
          Regardless of what server hosts the Corresponding Source, you
          Regardless of what server hosts the Corresponding Source, you
          remain obligated to ensure that it is available for as long
          remain obligated to ensure that it is available for as long
          as needed to satisfy these requirements.
          as needed to satisfy these requirements.
       e. Convey the object code using peer-to-peer transmission,
       e. Convey the object code using peer-to-peer transmission,
          provided you inform other peers where the object code and
          provided you inform other peers where the object code and
          Corresponding Source of the work are being offered to the
          Corresponding Source of the work are being offered to the
          general public at no charge under subsection 6d.
          general public at no charge under subsection 6d.
     A separable portion of the object code, whose source code is
     A separable portion of the object code, whose source code is
     excluded from the Corresponding Source as a System Library, need
     excluded from the Corresponding Source as a System Library, need
     not be included in conveying the object code work.
     not be included in conveying the object code work.
     A "User Product" is either (1) a "consumer product", which means
     A "User Product" is either (1) a "consumer product", which means
     any tangible personal property which is normally used for personal,
     any tangible personal property which is normally used for personal,
     family, or household purposes, or (2) anything designed or sold for
     family, or household purposes, or (2) anything designed or sold for
     incorporation into a dwelling.  In determining whether a product
     incorporation into a dwelling.  In determining whether a product
     is a consumer product, doubtful cases shall be resolved in favor of
     is a consumer product, doubtful cases shall be resolved in favor of
     coverage.  For a particular product received by a particular user,
     coverage.  For a particular product received by a particular user,
     "normally used" refers to a typical or common use of that class of
     "normally used" refers to a typical or common use of that class of
     product, regardless of the status of the particular user or of the
     product, regardless of the status of the particular user or of the
     way in which the particular user actually uses, or expects or is
     way in which the particular user actually uses, or expects or is
     expected to use, the product.  A product is a consumer product
     expected to use, the product.  A product is a consumer product
     regardless of whether the product has substantial commercial,
     regardless of whether the product has substantial commercial,
     industrial or non-consumer uses, unless such uses represent the
     industrial or non-consumer uses, unless such uses represent the
     only significant mode of use of the product.
     only significant mode of use of the product.
     "Installation Information" for a User Product means any methods,
     "Installation Information" for a User Product means any methods,
     procedures, authorization keys, or other information required to
     procedures, authorization keys, or other information required to
     install and execute modified versions of a covered work in that
     install and execute modified versions of a covered work in that
     User Product from a modified version of its Corresponding Source.
     User Product from a modified version of its Corresponding Source.
     The information must suffice to ensure that the continued
     The information must suffice to ensure that the continued
     functioning of the modified object code is in no case prevented or
     functioning of the modified object code is in no case prevented or
     interfered with solely because modification has been made.
     interfered with solely because modification has been made.
     If you convey an object code work under this section in, or with,
     If you convey an object code work under this section in, or with,
     or specifically for use in, a User Product, and the conveying
     or specifically for use in, a User Product, and the conveying
     occurs as part of a transaction in which the right of possession
     occurs as part of a transaction in which the right of possession
     and use of the User Product is transferred to the recipient in
     and use of the User Product is transferred to the recipient in
     perpetuity or for a fixed term (regardless of how the transaction
     perpetuity or for a fixed term (regardless of how the transaction
     is characterized), the Corresponding Source conveyed under this
     is characterized), the Corresponding Source conveyed under this
     section must be accompanied by the Installation Information.  But
     section must be accompanied by the Installation Information.  But
     this requirement does not apply if neither you nor any third party
     this requirement does not apply if neither you nor any third party
     retains the ability to install modified object code on the User
     retains the ability to install modified object code on the User
     Product (for example, the work has been installed in ROM).
     Product (for example, the work has been installed in ROM).
     The requirement to provide Installation Information does not
     The requirement to provide Installation Information does not
     include a requirement to continue to provide support service,
     include a requirement to continue to provide support service,
     warranty, or updates for a work that has been modified or
     warranty, or updates for a work that has been modified or
     installed by the recipient, or for the User Product in which it
     installed by the recipient, or for the User Product in which it
     has been modified or installed.  Access to a network may be denied
     has been modified or installed.  Access to a network may be denied
     when the modification itself materially and adversely affects the
     when the modification itself materially and adversely affects the
     operation of the network or violates the rules and protocols for
     operation of the network or violates the rules and protocols for
     communication across the network.
     communication across the network.
     Corresponding Source conveyed, and Installation Information
     Corresponding Source conveyed, and Installation Information
     provided, in accord with this section must be in a format that is
     provided, in accord with this section must be in a format that is
     publicly documented (and with an implementation available to the
     publicly documented (and with an implementation available to the
     public in source code form), and must require no special password
     public in source code form), and must require no special password
     or key for unpacking, reading or copying.
     or key for unpacking, reading or copying.
  7. Additional Terms.
  7. Additional Terms.
     "Additional permissions" are terms that supplement the terms of
     "Additional permissions" are terms that supplement the terms of
     this License by making exceptions from one or more of its
     this License by making exceptions from one or more of its
     conditions.  Additional permissions that are applicable to the
     conditions.  Additional permissions that are applicable to the
     entire Program shall be treated as though they were included in
     entire Program shall be treated as though they were included in
     this License, to the extent that they are valid under applicable
     this License, to the extent that they are valid under applicable
     law.  If additional permissions apply only to part of the Program,
     law.  If additional permissions apply only to part of the Program,
     that part may be used separately under those permissions, but the
     that part may be used separately under those permissions, but the
     entire Program remains governed by this License without regard to
     entire Program remains governed by this License without regard to
     the additional permissions.
     the additional permissions.
     When you convey a copy of a covered work, you may at your option
     When you convey a copy of a covered work, you may at your option
     remove any additional permissions from that copy, or from any part
     remove any additional permissions from that copy, or from any part
     of it.  (Additional permissions may be written to require their own
     of it.  (Additional permissions may be written to require their own
     removal in certain cases when you modify the work.)  You may place
     removal in certain cases when you modify the work.)  You may place
     additional permissions on material, added by you to a covered work,
     additional permissions on material, added by you to a covered work,
     for which you have or can give appropriate copyright permission.
     for which you have or can give appropriate copyright permission.
     Notwithstanding any other provision of this License, for material
     Notwithstanding any other provision of this License, for material
     you add to a covered work, you may (if authorized by the copyright
     you add to a covered work, you may (if authorized by the copyright
     holders of that material) supplement the terms of this License
     holders of that material) supplement the terms of this License
     with terms:
     with terms:
       a. Disclaiming warranty or limiting liability differently from
       a. Disclaiming warranty or limiting liability differently from
          the terms of sections 15 and 16 of this License; or
          the terms of sections 15 and 16 of this License; or
       b. Requiring preservation of specified reasonable legal notices
       b. Requiring preservation of specified reasonable legal notices
          or author attributions in that material or in the Appropriate
          or author attributions in that material or in the Appropriate
          Legal Notices displayed by works containing it; or
          Legal Notices displayed by works containing it; or
       c. Prohibiting misrepresentation of the origin of that material,
       c. Prohibiting misrepresentation of the origin of that material,
          or requiring that modified versions of such material be
          or requiring that modified versions of such material be
          marked in reasonable ways as different from the original
          marked in reasonable ways as different from the original
          version; or
          version; or
       d. Limiting the use for publicity purposes of names of licensors
       d. Limiting the use for publicity purposes of names of licensors
          or authors of the material; or
          or authors of the material; or
       e. Declining to grant rights under trademark law for use of some
       e. Declining to grant rights under trademark law for use of some
          trade names, trademarks, or service marks; or
          trade names, trademarks, or service marks; or
       f. Requiring indemnification of licensors and authors of that
       f. Requiring indemnification of licensors and authors of that
          material by anyone who conveys the material (or modified
          material by anyone who conveys the material (or modified
          versions of it) with contractual assumptions of liability to
          versions of it) with contractual assumptions of liability to
          the recipient, for any liability that these contractual
          the recipient, for any liability that these contractual
          assumptions directly impose on those licensors and authors.
          assumptions directly impose on those licensors and authors.
     All other non-permissive additional terms are considered "further
     All other non-permissive additional terms are considered "further
     restrictions" within the meaning of section 10.  If the Program as
     restrictions" within the meaning of section 10.  If the Program as
     you received it, or any part of it, contains a notice stating that
     you received it, or any part of it, contains a notice stating that
     it is governed by this License along with a term that is a further
     it is governed by this License along with a term that is a further
     restriction, you may remove that term.  If a license document
     restriction, you may remove that term.  If a license document
     contains a further restriction but permits relicensing or
     contains a further restriction but permits relicensing or
     conveying under this License, you may add to a covered work
     conveying under this License, you may add to a covered work
     material governed by the terms of that license document, provided
     material governed by the terms of that license document, provided
     that the further restriction does not survive such relicensing or
     that the further restriction does not survive such relicensing or
     conveying.
     conveying.
     If you add terms to a covered work in accord with this section, you
     If you add terms to a covered work in accord with this section, you
     must place, in the relevant source files, a statement of the
     must place, in the relevant source files, a statement of the
     additional terms that apply to those files, or a notice indicating
     additional terms that apply to those files, or a notice indicating
     where to find the applicable terms.
     where to find the applicable terms.
     Additional terms, permissive or non-permissive, may be stated in
     Additional terms, permissive or non-permissive, may be stated in
     the form of a separately written license, or stated as exceptions;
     the form of a separately written license, or stated as exceptions;
     the above requirements apply either way.
     the above requirements apply either way.
  8. Termination.
  8. Termination.
     You may not propagate or modify a covered work except as expressly
     You may not propagate or modify a covered work except as expressly
     provided under this License.  Any attempt otherwise to propagate or
     provided under this License.  Any attempt otherwise to propagate or
     modify it is void, and will automatically terminate your rights
     modify it is void, and will automatically terminate your rights
     under this License (including any patent licenses granted under
     under this License (including any patent licenses granted under
     the third paragraph of section 11).
     the third paragraph of section 11).
     However, if you cease all violation of this License, then your
     However, if you cease all violation of this License, then your
     license from a particular copyright holder is reinstated (a)
     license from a particular copyright holder is reinstated (a)
     provisionally, unless and until the copyright holder explicitly
     provisionally, unless and until the copyright holder explicitly
     and finally terminates your license, and (b) permanently, if the
     and finally terminates your license, and (b) permanently, if the
     copyright holder fails to notify you of the violation by some
     copyright holder fails to notify you of the violation by some
     reasonable means prior to 60 days after the cessation.
     reasonable means prior to 60 days after the cessation.
     Moreover, your license from a particular copyright holder is
     Moreover, your license from a particular copyright holder is
     reinstated permanently if the copyright holder notifies you of the
     reinstated permanently if the copyright holder notifies you of the
     violation by some reasonable means, this is the first time you have
     violation by some reasonable means, this is the first time you have
     received notice of violation of this License (for any work) from
     received notice of violation of this License (for any work) from
     that copyright holder, and you cure the violation prior to 30 days
     that copyright holder, and you cure the violation prior to 30 days
     after your receipt of the notice.
     after your receipt of the notice.
     Termination of your rights under this section does not terminate
     Termination of your rights under this section does not terminate
     the licenses of parties who have received copies or rights from
     the licenses of parties who have received copies or rights from
     you under this License.  If your rights have been terminated and
     you under this License.  If your rights have been terminated and
     not permanently reinstated, you do not qualify to receive new
     not permanently reinstated, you do not qualify to receive new
     licenses for the same material under section 10.
     licenses for the same material under section 10.
  9. Acceptance Not Required for Having Copies.
  9. Acceptance Not Required for Having Copies.
     You are not required to accept this License in order to receive or
     You are not required to accept this License in order to receive or
     run a copy of the Program.  Ancillary propagation of a covered work
     run a copy of the Program.  Ancillary propagation of a covered work
     occurring solely as a consequence of using peer-to-peer
     occurring solely as a consequence of using peer-to-peer
     transmission to receive a copy likewise does not require
     transmission to receive a copy likewise does not require
     acceptance.  However, nothing other than this License grants you
     acceptance.  However, nothing other than this License grants you
     permission to propagate or modify any covered work.  These actions
     permission to propagate or modify any covered work.  These actions
     infringe copyright if you do not accept this License.  Therefore,
     infringe copyright if you do not accept this License.  Therefore,
     by modifying or propagating a covered work, you indicate your
     by modifying or propagating a covered work, you indicate your
     acceptance of this License to do so.
     acceptance of this License to do so.
 10. Automatic Licensing of Downstream Recipients.
 10. Automatic Licensing of Downstream Recipients.
     Each time you convey a covered work, the recipient automatically
     Each time you convey a covered work, the recipient automatically
     receives a license from the original licensors, to run, modify and
     receives a license from the original licensors, to run, modify and
     propagate that work, subject to this License.  You are not
     propagate that work, subject to this License.  You are not
     responsible for enforcing compliance by third parties with this
     responsible for enforcing compliance by third parties with this
     License.
     License.
     An "entity transaction" is a transaction transferring control of an
     An "entity transaction" is a transaction transferring control of an
     organization, or substantially all assets of one, or subdividing an
     organization, or substantially all assets of one, or subdividing an
     organization, or merging organizations.  If propagation of a
     organization, or merging organizations.  If propagation of a
     covered work results from an entity transaction, each party to that
     covered work results from an entity transaction, each party to that
     transaction who receives a copy of the work also receives whatever
     transaction who receives a copy of the work also receives whatever
     licenses to the work the party's predecessor in interest had or
     licenses to the work the party's predecessor in interest had or
     could give under the previous paragraph, plus a right to
     could give under the previous paragraph, plus a right to
     possession of the Corresponding Source of the work from the
     possession of the Corresponding Source of the work from the
     predecessor in interest, if the predecessor has it or can get it
     predecessor in interest, if the predecessor has it or can get it
     with reasonable efforts.
     with reasonable efforts.
     You may not impose any further restrictions on the exercise of the
     You may not impose any further restrictions on the exercise of the
     rights granted or affirmed under this License.  For example, you
     rights granted or affirmed under this License.  For example, you
     may not impose a license fee, royalty, or other charge for
     may not impose a license fee, royalty, or other charge for
     exercise of rights granted under this License, and you may not
     exercise of rights granted under this License, and you may not
     initiate litigation (including a cross-claim or counterclaim in a
     initiate litigation (including a cross-claim or counterclaim in a
     lawsuit) alleging that any patent claim is infringed by making,
     lawsuit) alleging that any patent claim is infringed by making,
     using, selling, offering for sale, or importing the Program or any
     using, selling, offering for sale, or importing the Program or any
     portion of it.
     portion of it.
 11. Patents.
 11. Patents.
     A "contributor" is a copyright holder who authorizes use under this
     A "contributor" is a copyright holder who authorizes use under this
     License of the Program or a work on which the Program is based.
     License of the Program or a work on which the Program is based.
     The work thus licensed is called the contributor's "contributor
     The work thus licensed is called the contributor's "contributor
     version".
     version".
     A contributor's "essential patent claims" are all patent claims
     A contributor's "essential patent claims" are all patent claims
     owned or controlled by the contributor, whether already acquired or
     owned or controlled by the contributor, whether already acquired or
     hereafter acquired, that would be infringed by some manner,
     hereafter acquired, that would be infringed by some manner,
     permitted by this License, of making, using, or selling its
     permitted by this License, of making, using, or selling its
     contributor version, but do not include claims that would be
     contributor version, but do not include claims that would be
     infringed only as a consequence of further modification of the
     infringed only as a consequence of further modification of the
     contributor version.  For purposes of this definition, "control"
     contributor version.  For purposes of this definition, "control"
     includes the right to grant patent sublicenses in a manner
     includes the right to grant patent sublicenses in a manner
     consistent with the requirements of this License.
     consistent with the requirements of this License.
     Each contributor grants you a non-exclusive, worldwide,
     Each contributor grants you a non-exclusive, worldwide,
     royalty-free patent license under the contributor's essential
     royalty-free patent license under the contributor's essential
     patent claims, to make, use, sell, offer for sale, import and
     patent claims, to make, use, sell, offer for sale, import and
     otherwise run, modify and propagate the contents of its
     otherwise run, modify and propagate the contents of its
     contributor version.
     contributor version.
     In the following three paragraphs, a "patent license" is any
     In the following three paragraphs, a "patent license" is any
     express agreement or commitment, however denominated, not to
     express agreement or commitment, however denominated, not to
     enforce a patent (such as an express permission to practice a
     enforce a patent (such as an express permission to practice a
     patent or covenant not to sue for patent infringement).  To
     patent or covenant not to sue for patent infringement).  To
     "grant" such a patent license to a party means to make such an
     "grant" such a patent license to a party means to make such an
     agreement or commitment not to enforce a patent against the party.
     agreement or commitment not to enforce a patent against the party.
     If you convey a covered work, knowingly relying on a patent
     If you convey a covered work, knowingly relying on a patent
     license, and the Corresponding Source of the work is not available
     license, and the Corresponding Source of the work is not available
     for anyone to copy, free of charge and under the terms of this
     for anyone to copy, free of charge and under the terms of this
     License, through a publicly available network server or other
     License, through a publicly available network server or other
     readily accessible means, then you must either (1) cause the
     readily accessible means, then you must either (1) cause the
     Corresponding Source to be so available, or (2) arrange to deprive
     Corresponding Source to be so available, or (2) arrange to deprive
     yourself of the benefit of the patent license for this particular
     yourself of the benefit of the patent license for this particular
     work, or (3) arrange, in a manner consistent with the requirements
     work, or (3) arrange, in a manner consistent with the requirements
     of this License, to extend the patent license to downstream
     of this License, to extend the patent license to downstream
     recipients.  "Knowingly relying" means you have actual knowledge
     recipients.  "Knowingly relying" means you have actual knowledge
     that, but for the patent license, your conveying the covered work
     that, but for the patent license, your conveying the covered work
     in a country, or your recipient's use of the covered work in a
     in a country, or your recipient's use of the covered work in a
     country, would infringe one or more identifiable patents in that
     country, would infringe one or more identifiable patents in that
     country that you have reason to believe are valid.
     country that you have reason to believe are valid.
     If, pursuant to or in connection with a single transaction or
     If, pursuant to or in connection with a single transaction or
     arrangement, you convey, or propagate by procuring conveyance of, a
     arrangement, you convey, or propagate by procuring conveyance of, a
     covered work, and grant a patent license to some of the parties
     covered work, and grant a patent license to some of the parties
     receiving the covered work authorizing them to use, propagate,
     receiving the covered work authorizing them to use, propagate,
     modify or convey a specific copy of the covered work, then the
     modify or convey a specific copy of the covered work, then the
     patent license you grant is automatically extended to all
     patent license you grant is automatically extended to all
     recipients of the covered work and works based on it.
     recipients of the covered work and works based on it.
     A patent license is "discriminatory" if it does not include within
     A patent license is "discriminatory" if it does not include within
     the scope of its coverage, prohibits the exercise of, or is
     the scope of its coverage, prohibits the exercise of, or is
     conditioned on the non-exercise of one or more of the rights that
     conditioned on the non-exercise of one or more of the rights that
     are specifically granted under this License.  You may not convey a
     are specifically granted under this License.  You may not convey a
     covered work if you are a party to an arrangement with a third
     covered work if you are a party to an arrangement with a third
     party that is in the business of distributing software, under
     party that is in the business of distributing software, under
     which you make payment to the third party based on the extent of
     which you make payment to the third party based on the extent of
     your activity of conveying the work, and under which the third
     your activity of conveying the work, and under which the third
     party grants, to any of the parties who would receive the covered
     party grants, to any of the parties who would receive the covered
     work from you, a discriminatory patent license (a) in connection
     work from you, a discriminatory patent license (a) in connection
     with copies of the covered work conveyed by you (or copies made
     with copies of the covered work conveyed by you (or copies made
     from those copies), or (b) primarily for and in connection with
     from those copies), or (b) primarily for and in connection with
     specific products or compilations that contain the covered work,
     specific products or compilations that contain the covered work,
     unless you entered into that arrangement, or that patent license
     unless you entered into that arrangement, or that patent license
     was granted, prior to 28 March 2007.
     was granted, prior to 28 March 2007.
     Nothing in this License shall be construed as excluding or limiting
     Nothing in this License shall be construed as excluding or limiting
     any implied license or other defenses to infringement that may
     any implied license or other defenses to infringement that may
     otherwise be available to you under applicable patent law.
     otherwise be available to you under applicable patent law.
 12. No Surrender of Others' Freedom.
 12. No Surrender of Others' Freedom.
     If conditions are imposed on you (whether by court order,
     If conditions are imposed on you (whether by court order,
     agreement or otherwise) that contradict the conditions of this
     agreement or otherwise) that contradict the conditions of this
     License, they do not excuse you from the conditions of this
     License, they do not excuse you from the conditions of this
     License.  If you cannot convey a covered work so as to satisfy
     License.  If you cannot convey a covered work so as to satisfy
     simultaneously your obligations under this License and any other
     simultaneously your obligations under this License and any other
     pertinent obligations, then as a consequence you may not convey it
     pertinent obligations, then as a consequence you may not convey it
     at all.  For example, if you agree to terms that obligate you to
     at all.  For example, if you agree to terms that obligate you to
     collect a royalty for further conveying from those to whom you
     collect a royalty for further conveying from those to whom you
     convey the Program, the only way you could satisfy both those
     convey the Program, the only way you could satisfy both those
     terms and this License would be to refrain entirely from conveying
     terms and this License would be to refrain entirely from conveying
     the Program.
     the Program.
 13. Use with the GNU Affero General Public License.
 13. Use with the GNU Affero General Public License.
     Notwithstanding any other provision of this License, you have
     Notwithstanding any other provision of this License, you have
     permission to link or combine any covered work with a work licensed
     permission to link or combine any covered work with a work licensed
     under version 3 of the GNU Affero General Public License into a
     under version 3 of the GNU Affero General Public License into a
     single combined work, and to convey the resulting work.  The terms
     single combined work, and to convey the resulting work.  The terms
     of this License will continue to apply to the part which is the
     of this License will continue to apply to the part which is the
     covered work, but the special requirements of the GNU Affero
     covered work, but the special requirements of the GNU Affero
     General Public License, section 13, concerning interaction through
     General Public License, section 13, concerning interaction through
     a network will apply to the combination as such.
     a network will apply to the combination as such.
 14. Revised Versions of this License.
 14. Revised Versions of this License.
     The Free Software Foundation may publish revised and/or new
     The Free Software Foundation may publish revised and/or new
     versions of the GNU General Public License from time to time.
     versions of the GNU General Public License from time to time.
     Such new versions will be similar in spirit to the present
     Such new versions will be similar in spirit to the present
     version, but may differ in detail to address new problems or
     version, but may differ in detail to address new problems or
     concerns.
     concerns.
     Each version is given a distinguishing version number.  If the
     Each version is given a distinguishing version number.  If the
     Program specifies that a certain numbered version of the GNU
     Program specifies that a certain numbered version of the GNU
     General Public License "or any later version" applies to it, you
     General Public License "or any later version" applies to it, you
     have the option of following the terms and conditions either of
     have the option of following the terms and conditions either of
     that numbered version or of any later version published by the
     that numbered version or of any later version published by the
     Free Software Foundation.  If the Program does not specify a
     Free Software Foundation.  If the Program does not specify a
     version number of the GNU General Public License, you may choose
     version number of the GNU General Public License, you may choose
     any version ever published by the Free Software Foundation.
     any version ever published by the Free Software Foundation.
     If the Program specifies that a proxy can decide which future
     If the Program specifies that a proxy can decide which future
     versions of the GNU General Public License can be used, that
     versions of the GNU General Public License can be used, that
     proxy's public statement of acceptance of a version permanently
     proxy's public statement of acceptance of a version permanently
     authorizes you to choose that version for the Program.
     authorizes you to choose that version for the Program.
     Later license versions may give you additional or different
     Later license versions may give you additional or different
     permissions.  However, no additional obligations are imposed on any
     permissions.  However, no additional obligations are imposed on any
     author or copyright holder as a result of your choosing to follow a
     author or copyright holder as a result of your choosing to follow a
     later version.
     later version.
 15. Disclaimer of Warranty.
 15. Disclaimer of Warranty.
     THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
     THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
     APPLICABLE LAW.  EXCEPT WHEN OTHERWISE STATED IN WRITING THE
     APPLICABLE LAW.  EXCEPT WHEN OTHERWISE STATED IN WRITING THE
     COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS"
     COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS"
     WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED,
     WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED,
     INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
     INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
     MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.  THE ENTIRE
     MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.  THE ENTIRE
     RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU.
     RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU.
     SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL
     SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL
     NECESSARY SERVICING, REPAIR OR CORRECTION.
     NECESSARY SERVICING, REPAIR OR CORRECTION.
 16. Limitation of Liability.
 16. Limitation of Liability.
     IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN
     IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN
     WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES
     WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES
     AND/OR CONVEYS THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU
     AND/OR CONVEYS THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU
     FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR
     FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR
     CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE
     CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE
     THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA
     THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA
     BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
     BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
     PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
     PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
     PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF
     PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF
     THE POSSIBILITY OF SUCH DAMAGES.
     THE POSSIBILITY OF SUCH DAMAGES.
 17. Interpretation of Sections 15 and 16.
 17. Interpretation of Sections 15 and 16.
     If the disclaimer of warranty and limitation of liability provided
     If the disclaimer of warranty and limitation of liability provided
     above cannot be given local legal effect according to their terms,
     above cannot be given local legal effect according to their terms,
     reviewing courts shall apply local law that most closely
     reviewing courts shall apply local law that most closely
     approximates an absolute waiver of all civil liability in
     approximates an absolute waiver of all civil liability in
     connection with the Program, unless a warranty or assumption of
     connection with the Program, unless a warranty or assumption of
     liability accompanies a copy of the Program in return for a fee.
     liability accompanies a copy of the Program in return for a fee.
END OF TERMS AND CONDITIONS
END OF TERMS AND CONDITIONS
===========================
===========================
How to Apply These Terms to Your New Programs
How to Apply These Terms to Your New Programs
=============================================
=============================================
If you develop a new program, and you want it to be of the greatest
If you develop a new program, and you want it to be of the greatest
possible use to the public, the best way to achieve this is to make it
possible use to the public, the best way to achieve this is to make it
free software which everyone can redistribute and change under these
free software which everyone can redistribute and change under these
terms.
terms.
   To do so, attach the following notices to the program.  It is safest
   To do so, attach the following notices to the program.  It is safest
to attach them to the start of each source file to most effectively
to attach them to the start of each source file to most effectively
state the exclusion of warranty; and each file should have at least the
state the exclusion of warranty; and each file should have at least the
"copyright" line and a pointer to where the full notice is found.
"copyright" line and a pointer to where the full notice is found.
     ONE LINE TO GIVE THE PROGRAM'S NAME AND A BRIEF IDEA OF WHAT IT DOES.
     ONE LINE TO GIVE THE PROGRAM'S NAME AND A BRIEF IDEA OF WHAT IT DOES.
     Copyright (C) YEAR NAME OF AUTHOR
     Copyright (C) YEAR NAME OF AUTHOR
     This program is free software: you can redistribute it and/or modify
     This program is free software: you can redistribute it and/or modify
     it under the terms of the GNU General Public License as published by
     it under the terms of the GNU General Public License as published by
     the Free Software Foundation, either version 3 of the License, or (at
     the Free Software Foundation, either version 3 of the License, or (at
     your option) any later version.
     your option) any later version.
     This program is distributed in the hope that it will be useful, but
     This program is distributed in the hope that it will be useful, but
     WITHOUT ANY WARRANTY; without even the implied warranty of
     WITHOUT ANY WARRANTY; without even the implied warranty of
     MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
     MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
     General Public License for more details.
     General Public License for more details.
     You should have received a copy of the GNU General Public License
     You should have received a copy of the GNU General Public License
     along with this program.  If not, see `http://www.gnu.org/licenses/'.
     along with this program.  If not, see `http://www.gnu.org/licenses/'.
   Also add information on how to contact you by electronic and paper
   Also add information on how to contact you by electronic and paper
mail.
mail.
   If the program does terminal interaction, make it output a short
   If the program does terminal interaction, make it output a short
notice like this when it starts in an interactive mode:
notice like this when it starts in an interactive mode:
     PROGRAM Copyright (C) YEAR NAME OF AUTHOR
     PROGRAM Copyright (C) YEAR NAME OF AUTHOR
     This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
     This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
     This is free software, and you are welcome to redistribute it
     This is free software, and you are welcome to redistribute it
     under certain conditions; type `show c' for details.
     under certain conditions; type `show c' for details.
   The hypothetical commands `show w' and `show c' should show the
   The hypothetical commands `show w' and `show c' should show the
appropriate parts of the General Public License.  Of course, your
appropriate parts of the General Public License.  Of course, your
program's commands might be different; for a GUI interface, you would
program's commands might be different; for a GUI interface, you would
use an "about box".
use an "about box".
   You should also get your employer (if you work as a programmer) or
   You should also get your employer (if you work as a programmer) or
school, if any, to sign a "copyright disclaimer" for the program, if
school, if any, to sign a "copyright disclaimer" for the program, if
necessary.  For more information on this, and how to apply and follow
necessary.  For more information on this, and how to apply and follow
the GNU GPL, see `http://www.gnu.org/licenses/'.
the GNU GPL, see `http://www.gnu.org/licenses/'.
   The GNU General Public License does not permit incorporating your
   The GNU General Public License does not permit incorporating your
program into proprietary programs.  If your program is a subroutine
program into proprietary programs.  If your program is a subroutine
library, you may consider it more useful to permit linking proprietary
library, you may consider it more useful to permit linking proprietary
applications with the library.  If this is what you want to do, use the
applications with the library.  If this is what you want to do, use the
GNU Lesser General Public License instead of this License.  But first,
GNU Lesser General Public License instead of this License.  But first,
please read `http://www.gnu.org/philosophy/why-not-lgpl.html'.
please read `http://www.gnu.org/philosophy/why-not-lgpl.html'.
 
 

powered by: WebSVN 2.1.0

© copyright 1999-2024 OpenCores.org, equivalent to Oliscience, all rights reserved. OpenCores®, registered trademark.